Skip to content

Commit e23c551

Browse files
Update OSV rules (2026-05-08 18:07 UTC)
1 parent 5d93bcd commit e23c551

6 files changed

Lines changed: 51 additions & 6 deletions

File tree

.github/badges/last-updated.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
{"schemaVersion":1,"label":"last updated","message":"2026-05-08 17:07 UTC","color":"green"}
1+
{"schemaVersion":1,"label":"last updated","message":"2026-05-08 18:07 UTC","color":"green"}

.github/badges/npm.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
{"schemaVersion":1,"label":"rules","message":"217744","color":"blue"}
1+
{"schemaVersion":1,"label":"rules","message":"217749","color":"blue"}

.github/badges/pypi.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
{"schemaVersion":1,"label":"rules","message":"16098","color":"blue"}
1+
{"schemaVersion":1,"label":"rules","message":"16099","color":"blue"}

rulesets/npm/all.yaml

Lines changed: 40 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
id: osv-npm
22
title: OSV vulnerabilities for npm
33
description: Auto-generated by osv-rulegen 0.3.0 from https://osv.dev data dump for the npm ecosystem.
4-
date: "2026-05-08T17:07:34Z"
4+
date: "2026-05-08T18:07:27Z"
55
rules:
66
- id: GHSA-2234-fmw7-43wr
77
aliases:
@@ -9179,6 +9179,14 @@ rules:
91799179
version: vers:npm/>=0.3.0|<=0.11.0
91809180
severity: 6.5
91819181
reason: files.photo.gallery command injection
9182+
- id: GHSA-5wm8-gmm8-39j9
9183+
aliases:
9184+
- CVE-2026-44665
9185+
match:
9186+
- purl: pkg:npm/fast-xml-builder
9187+
version: vers:npm/<1.1.7
9188+
severity: 8.7
9189+
reason: fast-xml-builder allows attribute values with unwanted quotes to bypass malicious or unwanted attributes
91829190
- id: GHSA-5wmg-9cvh-qw25
91839191
aliases:
91849192
- CVE-2024-51752
@@ -14946,6 +14954,12 @@ rules:
1494614954
version: vers:npm/<=3.0.0
1494714955
severity: 8.9
1494814956
reason: Prototype Pollution Vulnerability in parse-git-config
14957+
- id: GHSA-8g7g-hmwm-6rv2
14958+
match:
14959+
- purl: pkg:npm/n8n-mcp
14960+
version: vers:npm/<2.50.1
14961+
severity: 8.3
14962+
reason: n8n-mcp affected by path traversal, redirect-following SSRF, and telemetry payload exposure
1494914963
- id: GHSA-8g7p-74h8-hg48
1495014964
aliases:
1495114965
- CVE-2018-3739
@@ -19887,6 +19901,14 @@ rules:
1988719901
version: vers:npm/>=0.4.0|<0.5.3
1988819902
severity: 7.5
1988919903
reason: Fastly Compute@Edge JS Runtime has fixed random number seed during compilation
19904+
- id: GHSA-cmrh-wvq6-wm9r
19905+
aliases:
19906+
- CVE-2026-44694
19907+
match:
19908+
- purl: pkg:npm/n8n-mcp
19909+
version: vers:npm/>=2.18.7|<2.50.2
19910+
severity: 7.2
19911+
reason: n8n-mcp webhook and API client paths has an authenticated SSRF
1989019912
- id: GHSA-cp47-r258-q626
1989119913
match:
1989219914
- purl: pkg:npm/vega
@@ -23696,6 +23718,14 @@ rules:
2369623718
version: vers:npm/<1.3.0
2369723719
severity: 9.6
2369823720
reason: Cross-site Scripting (XSS) in Eclipse Theia
23721+
- id: GHSA-gcmm-c94j-j47x
23722+
aliases:
23723+
- CVE-2026-7738
23724+
match:
23725+
- purl: pkg:npm/%40puchunjie/doc-tools-mcp
23726+
version: vers:npm/<=1.0.18
23727+
severity: 2.1
23728+
reason: '@puchunjie/doc-tools-mcp has a Path Traversal Issue'
2369923729
- id: GHSA-gcv8-gh4r-25x6
2370023730
aliases:
2370123731
- CVE-2022-0613
@@ -35646,6 +35676,14 @@ rules:
3564635676
version: vers:npm/<2026.3.28
3564735677
severity: 2.3
3564835678
reason: OpenClaw affected by SSRF via unguarded image download in fal provider
35679+
- id: GHSA-qxhc-wx3p-2wmg
35680+
aliases:
35681+
- CVE-2026-7768
35682+
match:
35683+
- purl: pkg:npm/%40fastify/accepts-serializer
35684+
version: vers:npm/<6.0.4
35685+
severity: 7.5
35686+
reason: '@fastify/accepts-serializer Vulnerable to Denial of Service via Unbounded Accept Header Cache Growth'
3564935687
- id: GHSA-qxrj-hx23-xp82
3565035688
aliases:
3565135689
- CVE-2023-49803
@@ -1154409,6 +1154447,7 @@ rules:
11544091154447
- id: MAL-2026-3397
11544101154448
match:
11544111154449
- purl: pkg:npm/tecken@0.1.2
1154450+
- purl: pkg:npm/tecken@0.1.13
11544121154451
severity: 10
11544131154452
reason: Malicious code in tecken (npm)
11544141154453
- id: MAL-2026-34

rulesets/nuget/all.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
id: osv-nuget
22
title: OSV vulnerabilities for NuGet
33
description: Auto-generated by osv-rulegen 0.3.0 from https://osv.dev data dump for the NuGet ecosystem.
4-
date: "2026-05-08T17:07:29Z"
4+
date: "2026-05-08T18:07:15Z"
55
rules:
66
- id: GHSA-223g-8w3x-98wr
77
aliases:

rulesets/pypi/all.yaml

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
id: osv-pypi
22
title: OSV vulnerabilities for PyPI
33
description: Auto-generated by osv-rulegen 0.3.0 from https://osv.dev data dump for the PyPI ecosystem.
4-
date: "2026-05-08T17:07:30Z"
4+
date: "2026-05-08T18:07:23Z"
55
rules:
66
- id: GHSA-227r-w5j2-6243
77
aliases:
@@ -34248,6 +34248,12 @@ rules:
3424834248
version: vers:pypi/<1.0.2
3424934249
severity: 5.5
3425034250
reason: Matrix Sydent mishandles emails
34251+
- id: GHSA-q9m2-fhv9-3jcf
34252+
match:
34253+
- purl: pkg:pypi/potato-annotation
34254+
version: vers:pypi/>=2.0.0|<2.4.5
34255+
severity: 5.1
34256+
reason: '`potato-annotation` has a Project-Boundary Bypass'
3425134257
- id: GHSA-q9pw-vmhh-384g
3425234258
aliases:
3425334259
- CVE-2026-44335

0 commit comments

Comments
 (0)