Skip to content

Commit 1b7a168

Browse files
Sync EUVD catalog: Sun May 3 00:48:00 UTC 2026
Signed-off-by: AboutCode Automation <automation@aboutcode.org>
1 parent 0c46616 commit 1b7a168

113 files changed

Lines changed: 3696 additions & 82 deletions

File tree

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

advisories/2023/09/EUVD-2023-57355.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
"id": "EUVD-2023-57355",
33
"enisaUuid": "93fcbdfc-b332-3a39-9d79-937eb4a39ce0",
44
"description": "An issue has been discovered in GitLab EE affecting all versions starting from 13.12 before 16.2.7, all versions starting from 16.3 before 16.3.4. It was possible for an attacker to run pipeline jobs as an arbitrary user via scheduled security scan policies. This was a bypass of [CVE-2023-3932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3932) showing additional impact.",
5-
"datePublished": "Sep 19, 2023, 9:30:15 AM",
6-
"dateUpdated": "Apr 4, 2024, 7:43:39 AM",
5+
"datePublished": "Sep 19, 2023, 7:01:14 AM",
6+
"dateUpdated": "May 2, 2026, 4:05:13 AM",
77
"baseScore": 9.6,
88
"baseScoreVersion": "3.1",
99
"baseScoreVector": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N",
10-
"references": "https://gitlab.com/gitlab-org/gitlab/-/issues/425304\nhttps://hackerone.com/reports/2147126\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-5009\n",
10+
"references": "https://gitlab.com/gitlab-org/gitlab/-/issues/425304\nhttps://hackerone.com/reports/2147126\n",
1111
"aliases": "GHSA-g4c2-hhjc-4hgg\nCVE-2023-5009\n",
1212
"assigner": "GitLab",
1313
"epss": 0.03,

advisories/2023/12/EUVD-2023-57403.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
"id": "EUVD-2023-57403",
33
"enisaUuid": "40599168-d5b0-320d-a237-13c5d09cfd2c",
44
"description": "An issue has been discovered in GitLab affecting all versions starting from 9.3 before 16.4.4, all versions starting from 16.5 before 16.5.4, all versions starting from 16.6 before 16.6.2. In certain situations, it may have been possible for developers to override predefined CI variables via the REST API.",
5-
"datePublished": "Dec 15, 2023, 6:30:28 PM",
6-
"dateUpdated": "Dec 15, 2023, 6:30:28 PM",
5+
"datePublished": "Dec 15, 2023, 4:03:05 PM",
6+
"dateUpdated": "May 2, 2026, 4:05:18 AM",
77
"baseScore": 4.3,
88
"baseScoreVersion": "3.1",
99
"baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
10-
"references": "https://gitlab.com/gitlab-org/gitlab/-/issues/425521\nhttps://hackerone.com/reports/2125189\nhttps://nvd.nist.gov/vuln/detail/CVE-2023-5061\n",
10+
"references": "https://gitlab.com/gitlab-org/gitlab/-/issues/425521\nhttps://hackerone.com/reports/2125189\n",
1111
"aliases": "CVE-2023-5061\nGHSA-v64g-f7qf-63xm\n",
1212
"assigner": "GitLab",
1313
"epss": 0.02,

advisories/2024/04/EUVD-2024-27234.json

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,12 +2,12 @@
22
"id": "EUVD-2024-27234",
33
"enisaUuid": "c72aca4e-f64a-3eba-8ac8-544921ccc2ae",
44
"description": "An issue has been discovered in GitLab CE/EE affecting all versions starting from 16.7 to 16.8.6 all versions starting from 16.9 before 16.9.4, all versions starting from 16.10 before 16.10.2. Using the autocomplete for issues references feature a crafted payload may lead to a stored XSS, allowing attackers to perform arbitrary actions on behalf of victims.",
5-
"datePublished": "Apr 12, 2024, 3:30:43 AM",
6-
"dateUpdated": "Apr 12, 2024, 3:30:43 AM",
5+
"datePublished": "Apr 12, 2024, 12:53:21 AM",
6+
"dateUpdated": "May 2, 2026, 4:05:37 AM",
77
"baseScore": 8.7,
88
"baseScoreVersion": "3.1",
99
"baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
10-
"references": "https://gitlab.com/gitlab-org/gitlab/-/issues/448469\nhttps://hackerone.com/reports/2404710\nhttps://nvd.nist.gov/vuln/detail/CVE-2024-2279\n",
10+
"references": "https://gitlab.com/gitlab-org/gitlab/-/issues/448469\nhttps://hackerone.com/reports/2404710\n",
1111
"aliases": "CVE-2024-2279\nGHSA-4g69-rp74-jj24\n",
1212
"assigner": "GitLab",
1313
"epss": 0.51,

advisories/2026/01/EUVD-2026-4405.json

Lines changed: 10 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
11
{
22
"id": "EUVD-2026-4405",
33
"enisaUuid": "91b8ca3c-bb55-3bd8-afa2-341741d0c16a",
4-
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/poll: correctly handle io_poll_add() return value on update\n\nWhen the core of io_uring was updated to handle completions\nconsistently and with fixed return codes, the POLL_REMOVE opcode\nwith updates got slightly broken. If a POLL_ADD is pending and\nthen POLL_REMOVE is used to update the events of that request, if that\nupdate causes the POLL_ADD to now trigger, then that completion is lost\nand a CQE is never posted.\n\nAdditionally, ensure that if an update does cause an existing POLL_ADD\nto complete, that the completion value isn't always overwritten with\n-ECANCELED. For that case, whatever io_poll_add() set the value to\nshould just be retained.",
4+
"description": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
55
"datePublished": "Jan 23, 2026, 2:15:15 PM",
6-
"dateUpdated": "Jan 23, 2026, 2:15:15 PM",
6+
"dateUpdated": "May 2, 2026, 6:18:09 AM",
77
"baseScore": 0.0,
8-
"references": "https://nvd.nist.gov/vuln/detail/CVE-2025-71149\nhttps://git.kernel.org/stable/c/0126560370ed5217958b85657b590ad25e8b9c00\nhttps://git.kernel.org/stable/c/13a8f7b88c2d40c6b33f6216190478dda95d385f\nhttps://git.kernel.org/stable/c/84230ad2d2afbf0c44c32967e525c0ad92e26b4e\nhttps://git.kernel.org/stable/c/8b777ab48441b153502772ecfc78c107d4353f29\nhttps://git.kernel.org/stable/c/c1669c03bfbc2a9b5ebff4428eecebe734c646fe\n",
8+
"references": "",
99
"aliases": "GHSA-4g6c-c5fr-62mx\nCVE-2025-71149\n",
1010
"assigner": "Linux",
1111
"epss": 0.02,
@@ -38,6 +38,13 @@
3838
},
3939
"product_version": "patch: 6.19-rc1"
4040
},
41+
{
42+
"id": "546cc719-572a-3ffc-82e8-57d5c4fb86e2",
43+
"product": {
44+
"name": "Linux"
45+
},
46+
"product_version": "patch: 6.19"
47+
},
4148
{
4249
"id": "5ce89223-136d-3415-ad09-f2f55f42d16c",
4350
"product": {

advisories/2026/02/EUVD-2026-8786.json

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
{
22
"id": "EUVD-2026-8786",
33
"enisaUuid": "f16c948d-bbd4-3b01-b2c2-34f7026354e6",
4-
"description": "c3p0 vulnerable to Remote Code Execution via unsafe deserialization of userOverridesAsString property",
5-
"datePublished": "Feb 25, 2026, 6:35:23 PM",
6-
"dateUpdated": "Feb 25, 2026, 6:35:23 PM",
4+
"description": "c3p0, a JDBC Connection pooling library, is vulnerable to attack via maliciously crafted Java-serialized objects and `javax.naming.Reference` instances. Several c3p0 `ConnectionPoolDataSource` implementations have a property called `userOverridesAsString` which conceptually represents a `Map<String,Map<String,String>>`. Prior to v0.12.0, that property was maintained as a hex-encoded serialized object. Any attacker able to reset this property, on an existing `ConnectionPoolDataSource` or via maliciously crafted serialized objects or `javax.naming.Reference` instances could be tailored execute unexpected code on the application's `CLASSPATH`. The danger of this vulnerability was strongly magnified by vulnerabilities in c3p0's main dependency, mchange-commons-java. This library includes code that mirrors early implementations of JNDI functionality, including ungated support for remote `factoryClassLocation` values. Attackers could set c3p0's `userOverridesAsString` hex-encoded serialized objects that include objects \"indirectly serialized\" via JNDI references. Deserialization of those objects and dereferencing of the embedded `javax.naming.Reference` objects could provoke download and execution of malicious code from a remote `factoryClassLocation`. Although hazard presented by c3p0's vulnerabilites are exarcerbated by vulnerabilities in mchange-commons-java, use of Java-serialized-object hex as the format for a writable Java-Bean property, of objects that may be exposed across JNDI interfaces, represents a serious independent fragility. The `userOverridesAsString` property of c3p0 `ConnectionPoolDataSource` classes has been reimplemented to use a safe CSV-based format, rather than rely upon potentially dangerous Java object deserialization. c3p0-0.12.0+ and above depend upon mchange-commons-java 0.4.0+, which gates support for remote `factoryClassLocation` values by configuration parameters that default to restrictive values. c3p0 additionally enforces the new mchange-commons-java `com.mchange.v2.naming.nameGuardClassName` to prevent injection of unexpected, potentially remote JNDI names. There is no supported workaround for versions of c3p0 prior to 0.12.0.",
5+
"datePublished": "Feb 26, 2026, 12:45:18 AM",
6+
"dateUpdated": "May 2, 2026, 3:55:33 AM",
77
"baseScore": 8.9,
88
"baseScoreVersion": "4.0",
99
"baseScoreVector": "CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H",
1010
"references": "https://github.com/swaldman/c3p0/security/advisories/GHSA-5476-xc4j-rqcv\nhttps://github.com/swaldman/c3p0/commit/e14cbd8166e423e2e9a9d6f08b2add3433492d6e\nhttps://mogwailabs.de/en/blog/2025/02/c3p0-you-little-rascal\nhttps://www.mchange.com/projects/c3p0/#configuring_security\nhttps://www.mchange.com/projects/c3p0/#security-note\n",
1111
"aliases": "GHSA-5476-xc4j-rqcv\nCVE-2026-27830\n",
1212
"assigner": "GitHub_M",
13-
"epss": 0.24,
13+
"epss": 0.17,
1414
"enisaIdProduct": [
1515
{
1616
"id": "febfa839-ea9a-37bb-a10f-27712f75609f",

advisories/2026/04/EUVD-2026-18746.json

Lines changed: 12 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
{
22
"id": "EUVD-2026-18746",
33
"enisaUuid": "d6406df5-dc3b-3a07-bc58-33478915bb81",
4-
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/poll: fix multishot recv missing EOF on wakeup race\n\nWhen a socket send and shutdown() happen back-to-back, both fire\nwake-ups before the receiver's task_work has a chance to run. The first\nwake gets poll ownership (poll_refs=1), and the second bumps it to 2.\nWhen io_poll_check_events() runs, it calls io_poll_issue() which does a\nrecv that reads the data and returns IOU_RETRY. The loop then drains all\naccumulated refs (atomic_sub_return(2) -> 0) and exits, even though only\nthe first event was consumed. Since the shutdown is a persistent state\nchange, no further wakeups will happen, and the multishot recv can hang\nforever.\n\nCheck specifically for HUP in the poll loop, and ensure that another\nloop is done to check for status if more than a single poll activation\nis pending. This ensures we don't lose the shutdown event.",
5-
"datePublished": "Apr 3, 2026, 6:31:22 PM",
6-
"dateUpdated": "Apr 3, 2026, 6:31:22 PM",
4+
"description": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.",
5+
"datePublished": "Apr 3, 2026, 3:15:51 PM",
6+
"dateUpdated": "May 2, 2026, 6:17:49 AM",
77
"baseScore": 0.0,
8-
"references": "https://git.kernel.org/stable/c/0f4ce79b8db7b040373fc664c8bc6c5fd74bd196\nhttps://git.kernel.org/stable/c/bf33554b6abf7e7faeadd8af1b82037ea755a6bb\nhttps://git.kernel.org/stable/c/a68ed2df72131447d131531a08fe4dfcf4fa4653\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-23473\n",
8+
"references": "",
99
"aliases": "GHSA-c5mp-x9x5-3g5v\nCVE-2026-23473\n",
1010
"assigner": "Linux",
11-
"epss": 0.0,
11+
"epss": 0.02,
1212
"enisaIdProduct": [
1313
{
1414
"id": "03529c8c-120e-3e5b-b095-cb8b65a0512e",
@@ -31,6 +31,13 @@
3131
},
3232
"product_version": "patch: 6.18.20"
3333
},
34+
{
35+
"id": "7a869b6a-6b49-3da9-ade2-80149ca4554c",
36+
"product": {
37+
"name": "Linux"
38+
},
39+
"product_version": "patch: 7.0"
40+
},
3441
{
3542
"id": "7ab1bffa-9d46-34c5-a185-3eb86efc896a",
3643
"product": {

advisories/2026/04/EUVD-2026-24451.json

Lines changed: 20 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,16 +2,31 @@
22
"id": "EUVD-2026-24451",
33
"enisaUuid": "1a70953a-f6bf-39ed-a1b4-1701c34cc075",
44
"description": "Vulnerability in the Oracle Application Development Framework (ADF) product of Oracle Fusion Middleware (component: ADF Faces). Supported versions that are affected are 12.2.1.4.0 and 14.1.2.0.0. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle Application Development Framework (ADF) executes to compromise Oracle Application Development Framework (ADF). Successful attacks of this vulnerability can result in takeover of Oracle Application Development Framework (ADF). CVSS 3.1 Base Score 7.8 (Confidentiality, Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H).",
5-
"datePublished": "Apr 21, 2026, 9:31:27 PM",
6-
"dateUpdated": "Apr 21, 2026, 9:31:27 PM",
5+
"datePublished": "Apr 21, 2026, 8:35:50 PM",
6+
"dateUpdated": "May 2, 2026, 3:55:32 AM",
77
"baseScore": 7.8,
88
"baseScoreVersion": "3.1",
99
"baseScoreVector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
10-
"references": "https://www.oracle.com/security-alerts/cpuapr2026.html\nhttps://nvd.nist.gov/vuln/detail/CVE-2026-35243\n",
10+
"references": "https://www.oracle.com/security-alerts/cpuapr2026.html\n",
1111
"aliases": "CVE-2026-35243\nGHSA-gcgv-7762-j94g\n",
1212
"assigner": "oracle",
13-
"epss": 0.0,
14-
"enisaIdProduct": [],
13+
"epss": 0.03,
14+
"enisaIdProduct": [
15+
{
16+
"id": "34444781-a01a-3642-99ee-cd73a4c21d31",
17+
"product": {
18+
"name": "Oracle Application Development Framework (ADF)"
19+
},
20+
"product_version": "14.1.2.0.0"
21+
},
22+
{
23+
"id": "fdf41f30-42fd-326b-8493-eab2b46f7617",
24+
"product": {
25+
"name": "Oracle Application Development Framework (ADF)"
26+
},
27+
"product_version": "12.2.1.4.0"
28+
}
29+
],
1530
"enisaIdVendor": [
1631
{
1732
"id": "a93795a5-e411-3829-a3b0-9f0aa3f1c21e",

advisories/2026/04/EUVD-2026-24639.json

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,15 @@
33
"enisaUuid": "1dc3181e-4971-3818-b455-134c98a54c14",
44
"description": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: algif_aead - Revert to operating out-of-place\n\nThis mostly reverts commit 72548b093ee3 except for the copying of\nthe associated data.\n\nThere is no benefit in operating in-place in algif_aead since the\nsource and destination come from different mappings. Get rid of\nall the complexity added for in-place operation and just copy the\nAD directly.",
55
"datePublished": "Apr 22, 2026, 8:15:10 AM",
6-
"dateUpdated": "Apr 30, 2026, 9:41:45 AM",
6+
"dateUpdated": "May 2, 2026, 9:14:52 PM",
77
"baseScore": 7.8,
88
"baseScoreVersion": "3.1",
99
"baseScoreVector": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
1010
"references": "https://git.kernel.org/stable/c/893d22e0135fa394db81df88697fba6032747667\nhttps://git.kernel.org/stable/c/19d43105a97be0810edbda875f2cd03f30dc130c\nhttps://git.kernel.org/stable/c/961cfa271a918ad4ae452420e7c303149002875b\nhttps://git.kernel.org/stable/c/3115af9644c342b356f3f07a4dd1c8905cd9a6fc\nhttps://git.kernel.org/stable/c/8b88d99341f139e23bdeb1027a2a3ae10d341d82\nhttps://git.kernel.org/stable/c/fafe0fa2995a0f7073c1c358d7d3145bcc9aedd8\nhttps://git.kernel.org/stable/c/ce42ee423e58dffa5ec03524054c9d8bfd4f6237\nhttps://git.kernel.org/stable/c/a664bf3d603dc3bdcf9ae47cc21e0daec706d7a5\n",
1111
"aliases": "GHSA-2274-3hgr-wxv6\nCVE-2026-31431\n",
1212
"assigner": "Linux",
13-
"epss": 0.01,
13+
"epss": 2.25,
14+
"exploitedSince": "May 1, 2026, 12:00:00 AM",
1415
"enisaIdProduct": [
1516
{
1617
"id": "0fedda32-230f-38f4-8244-ef6a08f38661",

advisories/2026/04/EUVD-2026-26440.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@
33
"enisaUuid": "4aad9033-f703-33a5-8a7c-c02dc674c948",
44
"description": "IBM i 7.6, 7.5, 7.4, 7.3, and 7.2 s vulnerable to privilege escalation caused by an invalid IBM i Web Administration GUI authorization check. \u00a0A malicious actor could cause user-controlled code to run with administrator privilege.",
55
"datePublished": "Apr 30, 2026, 9:45:08 PM",
6-
"dateUpdated": "Apr 30, 2026, 9:45:08 PM",
6+
"dateUpdated": "May 2, 2026, 3:55:31 AM",
77
"baseScore": 6.4,
88
"baseScoreVersion": "3.1",
99
"baseScoreVector": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
1010
"references": "https://www.ibm.com/support/pages/node/7269560\n",
1111
"aliases": "CVE-2026-2311\n",
1212
"assigner": "ibm",
13-
"epss": 0.0,
13+
"epss": 0.04,
1414
"enisaIdProduct": [
1515
{
1616
"id": "4b84bbfc-b7f1-3be2-8223-ec54717512ed",

advisories/2026/04/EUVD-2026-26448.json

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,14 +3,14 @@
33
"enisaUuid": "78bd254b-7e9a-3276-b3d4-0448ec31dca2",
44
"description": "IBM Langflow Desktop 1.0.0 through 1.8.4 Langflow allows an attacker to execute arbitrary commands with the privileges of the process running Langflow. This allows reading sensitive environment variables (API keys, DB credentials), modifying files, or launching further attacks on the internal network.",
55
"datePublished": "Apr 30, 2026, 9:11:54 PM",
6-
"dateUpdated": "Apr 30, 2026, 9:11:54 PM",
6+
"dateUpdated": "May 2, 2026, 3:55:24 AM",
77
"baseScore": 8.8,
88
"baseScoreVersion": "3.1",
99
"baseScoreVector": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
1010
"references": "https://www.ibm.com/support/pages/node/7271092\n",
1111
"aliases": "CVE-2026-6543\n",
1212
"assigner": "ibm",
13-
"epss": 0.0,
13+
"epss": 0.04,
1414
"enisaIdProduct": [
1515
{
1616
"id": "4d051890-f6f2-3436-939e-a40a70fe2de0",

0 commit comments

Comments
 (0)