Severity
6.9MEDIUMNVD
GHSA9.8
EPSS
0.0%
top 94.34%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJan 29
Latest updateApr 8

Description

In the Eclipse OMR port library component since release 0.2.0, an API function to return the textual names of all supported processor features was not accounting for the separator inserted between processor features. If the output buffer supplied to this function was incorrectly sized, failing to account for the separator when determining when a write to the buffer was safe could lead to a buffer overflow. This issue is fixed in Eclipse OMR version 0.8.0.

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L

Affected Packages2 packages

NVDeclipse/omr0.20.8.0
CVEListV5eclipse_foundation/eclipse_omr0.2.00.8.0

Patches

🔴Vulnerability Details

10
GHSA
openclaw-claude-bridge: sandbox is not effective - `--allowed-tools ""` does not restrict available tools2026-04-08
GHSA
Budibase: Server-Side Request Forgery via REST Connector with Empty Default Blacklist2026-04-03
GHSA
Electron: Context Isolation bypass via contextBridge VideoFrame transfer2026-04-03
GHSA
DNS Rebinding Protection Disabled by Default in Model Context Protocol Go SDK for Servers Running on Localhost2026-04-01
GHSA
@siteboon/claude-code-ui Vulnerable to Unauthenticated RCE via WebSocket Shell Injection2026-03-11

📋Vendor Advisories

2
Red Hat
github.com/modelcontextprotocol/go-sdk: Model Context Protocol (MCP) Go SDK: DNS rebinding vulnerability allows unauthorized access2026-04-02
Microsoft
Microsoft ACI Confidential Containers Information Disclosure Vulnerability2026-03-10

🕵️Threat Intelligence

1
Wiz
CVE-2026-1188 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-1188 — Incorrect Calculation of Buffer Size | cvebase