Skip to content

Commit d2e30d1

Browse files
1 parent a5847e4 commit d2e30d1

File tree

2 files changed

+89
-0
lines changed

2 files changed

+89
-0
lines changed
Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,40 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-3wfw-pwxc-r3x9",
4+
"modified": "2026-03-29T21:30:21Z",
5+
"published": "2026-03-29T21:30:21Z",
6+
"aliases": [
7+
"CVE-2026-4946"
8+
],
9+
"details": "Ghidra versions prior to 12.0.3 improperly process annotation directives embedded in automatically extracted binary data, resulting in arbitrary command execution when an analyst interacts with the UI. Specifically, the @execute annotation (which is intended for trusted, user-authored comments) is also parsed in comments generated during auto-analysis (such as CFStrings in Mach-O binaries). This allows a crafted binary to present seemingly benign clickable text which, when clicked, executes attacker-controlled commands on the analyst’s machine.",
10+
"severity": [
11+
{
12+
"type": "CVSS_V3",
13+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"
14+
}
15+
],
16+
"affected": [],
17+
"references": [
18+
{
19+
"type": "WEB",
20+
"url": "https://github.com/NationalSecurityAgency/ghidra/security/advisories/GHSA-mc3p-mq2p-xw6v"
21+
},
22+
{
23+
"type": "ADVISORY",
24+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4946"
25+
},
26+
{
27+
"type": "WEB",
28+
"url": "https://takeonme.org/gcves/GCVE-1337-2026-00000000000000000000000000000000000000000000000001011111111111000111111110000000000000000000000000000000000000000000000000000000110"
29+
}
30+
],
31+
"database_specific": {
32+
"cwe_ids": [
33+
"CWE-78"
34+
],
35+
"severity": "HIGH",
36+
"github_reviewed": false,
37+
"github_reviewed_at": null,
38+
"nvd_published_at": "2026-03-29T20:16:12Z"
39+
}
40+
}
Lines changed: 49 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,49 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-q2q4-jjp8-f6m3",
4+
"modified": "2026-03-29T21:30:21Z",
5+
"published": "2026-03-29T21:30:21Z",
6+
"aliases": [
7+
"CVE-2026-4176"
8+
],
9+
"details": "Perl versions from 5.9.4 before 5.40.4-RC1, from 5.41.0 before 5.42.2-RC1, from 5.43.0 before 5.43.9 contain a vulnerable version of Compress::Raw::Zlib.\n\nCompress::Raw::Zlib is included in the Perl package as a dual-life core module, and is vulnerable to CVE-2026-3381 due to a vendored version of zlib which has several vulnerabilities, including CVE-2026-27171. The bundled Compress::Raw::Zlib was updated to version 2.221 in Perl blead commit c75ae9cc164205e1b6d6dbd57bd2c65c8593fe94.",
10+
"severity": [],
11+
"affected": [],
12+
"references": [
13+
{
14+
"type": "ADVISORY",
15+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4176"
16+
},
17+
{
18+
"type": "WEB",
19+
"url": "https://github.com/Perl/perl5/commit/c75ae9cc164205e1b6d6dbd57bd2c65c8593fe94"
20+
},
21+
{
22+
"type": "WEB",
23+
"url": "https://lists.security.metacpan.org/cve-announce/msg/37638919"
24+
},
25+
{
26+
"type": "WEB",
27+
"url": "https://metacpan.org/release/PMQS/Compress-Raw-Zlib-2.221/source/Changes"
28+
},
29+
{
30+
"type": "WEB",
31+
"url": "https://metacpan.org/release/SHAY/perl-5.40.4/changes"
32+
},
33+
{
34+
"type": "WEB",
35+
"url": "https://metacpan.org/release/SHAY/perl-5.42.2/changes"
36+
},
37+
{
38+
"type": "WEB",
39+
"url": "https://www.cve.org/CVERecord?id=CVE-2026-3381"
40+
}
41+
],
42+
"database_specific": {
43+
"cwe_ids": [],
44+
"severity": null,
45+
"github_reviewed": false,
46+
"github_reviewed_at": null,
47+
"nvd_published_at": "2026-03-29T21:16:15Z"
48+
}
49+
}

0 commit comments

Comments
 (0)