Skip to content

Commit 43466c6

Browse files
1 parent 42b9b5c commit 43466c6

7 files changed

Lines changed: 250 additions & 115 deletions

File tree

Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-92mm-2pjq-r785",
4+
"modified": "2026-04-10T14:11:16Z",
5+
"published": "2026-04-09T15:35:07Z",
6+
"aliases": [
7+
"CVE-2026-4660"
8+
],
9+
"summary": "HashiCorp's go-getter library may allow arbitrary file reads",
10+
"details": "HashiCorp's go-getter library up to v1.8.5 may allow arbitrary file reads on the file system during certain git operations through a maliciously crafted URL. This is fixed in go-getter v1.8.6. This vulnerability does not affect the go-getter/v2 branch and package.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/hashicorp/go-getter"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.8.6"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "ADVISORY",
41+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4660"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://discuss.hashicorp.com/t/hcsec-2026-04-go-getter-may-allow-to-arbitrary-filesystem-reads-through-git-operations/77311"
46+
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "https://github.com/hashicorp/go-getter"
50+
}
51+
],
52+
"database_specific": {
53+
"cwe_ids": [
54+
"CWE-200"
55+
],
56+
"severity": "HIGH",
57+
"github_reviewed": true,
58+
"github_reviewed_at": "2026-04-10T14:11:16Z",
59+
"nvd_published_at": "2026-04-09T14:16:32Z"
60+
}
61+
}

advisories/unreviewed/2026/04/GHSA-pq95-94c9-j987/GHSA-pq95-94c9-j987.json renamed to advisories/github-reviewed/2026/04/GHSA-pq95-94c9-j987/GHSA-pq95-94c9-j987.json

Lines changed: 27 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,19 +1,40 @@
11
{
22
"schema_version": "1.4.0",
33
"id": "GHSA-pq95-94c9-j987",
4-
"modified": "2026-04-09T15:35:06Z",
4+
"modified": "2026-04-10T14:10:56Z",
55
"published": "2026-04-07T18:31:37Z",
66
"aliases": [
77
"CVE-2025-70844"
88
],
9+
"summary": "yaffa vulnerable to Cross Site Scripting",
910
"details": "yaffa v2.0.0 is vulnerable to Cross Site Scripting (XSS). An attacker can inject malicious JavaScript into the \"Add Account Group\" function on the account-group page, allowing execution of arbitrary script in the context of users who view the affected page.",
1011
"severity": [
1112
{
1213
"type": "CVSS_V3",
1314
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"
1415
}
1516
],
16-
"affected": [],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Packagist",
21+
"name": "kantorge/yaffa"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "2.0.0"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
1738
"references": [
1839
{
1940
"type": "ADVISORY",
@@ -24,17 +45,17 @@
2445
"url": "https://github.com/J4cky1028/vulnerability-research/tree/main/CVE-2025-70844"
2546
},
2647
{
27-
"type": "WEB",
48+
"type": "PACKAGE",
2849
"url": "https://github.com/kantorge/yaffa"
2950
}
3051
],
3152
"database_specific": {
3253
"cwe_ids": [
33-
"CWE-94"
54+
"CWE-79"
3455
],
3556
"severity": "MODERATE",
36-
"github_reviewed": false,
37-
"github_reviewed_at": null,
57+
"github_reviewed": true,
58+
"github_reviewed_at": "2026-04-10T14:10:56Z",
3859
"nvd_published_at": "2026-04-07T17:16:26Z"
3960
}
4061
}
Lines changed: 59 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,59 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-xgrm-4fwx-7qm8",
4+
"modified": "2026-04-10T14:10:46Z",
5+
"published": "2026-04-07T18:31:36Z",
6+
"aliases": [
7+
"CVE-2026-33815"
8+
],
9+
"summary": "pgx contains memory-safety vulnerability",
10+
"details": "[pgx](github.com/jackc/pgx/v5) is a pure Go driver and toolkit for PostgreSQL. pgx v5.9.1 and earlier contain a memory-safety vulnerability.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Go",
21+
"name": "github.com/jackc/pgx/v5/pgproto3"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"last_affected": "5.9.1"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "ADVISORY",
41+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-33815"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://pkg.go.dev/vuln/GO-2026-4771"
46+
},
47+
{
48+
"type": "PACKAGE",
49+
"url": "github.com/jackc/pgx/v5"
50+
}
51+
],
52+
"database_specific": {
53+
"cwe_ids": [],
54+
"severity": "CRITICAL",
55+
"github_reviewed": true,
56+
"github_reviewed_at": "2026-04-10T14:10:46Z",
57+
"nvd_published_at": "2026-04-07T16:16:24Z"
58+
}
59+
}
Lines changed: 103 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,103 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-xvqc-pp94-fmpx",
4+
"modified": "2026-04-10T14:11:25Z",
5+
"published": "2026-04-09T18:31:27Z",
6+
"aliases": [
7+
"CVE-2026-40046"
8+
],
9+
"summary": "Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT vulnerable to Integer Overflow or Wraparound",
10+
"details": "The fix for \"CVE-2025-66168: MQTT control packet remaining length field is not properly validated\" was only applied to 5.19.2 (and future 5.19.x) releases but was missed for all 6.0.0+ versions. This issue affects Apache ActiveMQ: from 6.0.0 before 6.2.4; Apache ActiveMQ All: from 6.0.0 before 6.2.4; Apache ActiveMQ MQTT: from 6.0.0 before 6.2.4.\n\nUsers are recommended to upgrade to version 6.2.4 or a 5.19.x version starting with 5.19.2 or later (currently latest is 5.19.5), which fixes the issue.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "Maven",
21+
"name": "org.apache.activemq:apache-activemq"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "6.0.0"
29+
},
30+
{
31+
"fixed": "6.2.4"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "Maven",
40+
"name": "org.apache.activemq:activemq-all"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "6.0.0"
48+
},
49+
{
50+
"fixed": "6.2.4"
51+
}
52+
]
53+
}
54+
]
55+
},
56+
{
57+
"package": {
58+
"ecosystem": "Maven",
59+
"name": "org.apache.activemq:activemq-mqtt"
60+
},
61+
"ranges": [
62+
{
63+
"type": "ECOSYSTEM",
64+
"events": [
65+
{
66+
"introduced": "6.0.0"
67+
},
68+
{
69+
"fixed": "6.2.4"
70+
}
71+
]
72+
}
73+
]
74+
}
75+
],
76+
"references": [
77+
{
78+
"type": "ADVISORY",
79+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-40046"
80+
},
81+
{
82+
"type": "WEB",
83+
"url": "https://activemq.apache.org/security-advisories.data/CVE-2026-40046-announcement.txt"
84+
},
85+
{
86+
"type": "WEB",
87+
"url": "https://lists.apache.org/thread/zdntj5rcgjjzrpow84o339lzldy68zrg"
88+
},
89+
{
90+
"type": "WEB",
91+
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66168"
92+
}
93+
],
94+
"database_specific": {
95+
"cwe_ids": [
96+
"CWE-190"
97+
],
98+
"severity": "MODERATE",
99+
"github_reviewed": true,
100+
"github_reviewed_at": "2026-04-10T14:11:25Z",
101+
"nvd_published_at": "2026-04-09T17:16:31Z"
102+
}
103+
}

advisories/unreviewed/2026/04/GHSA-92mm-2pjq-r785/GHSA-92mm-2pjq-r785.json

Lines changed: 0 additions & 36 deletions
This file was deleted.

advisories/unreviewed/2026/04/GHSA-xgrm-4fwx-7qm8/GHSA-xgrm-4fwx-7qm8.json

Lines changed: 0 additions & 34 deletions
This file was deleted.

0 commit comments

Comments
 (0)