{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-02T00:48:13.119","vulnerabilities":[{"cve":{"id":"CVE-2025-32953","sourceIdentifier":"security-advisories@github.com","published":"2025-04-18T21:15:44.087","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"z80pack is a mature emulator of multiple platforms with 8080 and Z80 CPU. In version 1.38 and prior, the `makefile-ubuntu.yml` workflow file uses `actions/upload-artifact@v4` to upload the `z80pack-ubuntu` artifact. This artifact is a zip of the current directory, which includes the automatically generated `.git/config` file containing the run's GITHUB_TOKEN. Seeing as the artifact can be downloaded prior to the end of the workflow, there is a few seconds where an attacker can extract the token from the artifact and use it with the Github API to push malicious code or rewrite release commits in your repository. This issue has been fixed in commit bd95916."},{"lang":"es","value":"z80pack es un emulador maduro para múltiples plataformas con CPU 8080 y Z80. En la versión 1.38 y anteriores, el archivo de flujo de trabajo `makefile-ubuntu.yml` usa `actions/upload-artifact@v4` para cargar el artefacto `z80pack-ubuntu`. Este artefacto es un archivo zip del directorio actual, que incluye el archivo `.git/config` generado automáticamente con el GITHUB_TOKEN de la ejecución. Dado que el artefacto se puede descargar antes de finalizar el flujo de trabajo, hay unos segundos en los que un atacante puede extraer el token del artefacto y usarlo con la API de Github para enviar código malicioso o reescribir las confirmaciones de lanzamiento en el repositorio. Este problema se ha corregido en el commit bd95916."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H","baseScore":8.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.2,"impactScore":5.8}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]}],"references":[{"url":"https://github.com/udo-munk/z80pack/commit/1e06c2fe498ca772002b5c4f6f9e3085061e47da","source":"security-advisories@github.com"},{"url":"https://github.com/udo-munk/z80pack/commit/836c2e37b54f86bb4bed9e1406b67e52aa52308d","source":"security-advisories@github.com"},{"url":"https://github.com/udo-munk/z80pack/commit/95535987d690bd20849fbf143f267283f0e2db91","source":"security-advisories@github.com"},{"url":"https://github.com/udo-munk/z80pack/commit/bd9591615ae7b1e6229aa60a485447441c4a0c15","source":"security-advisories@github.com"},{"url":"https://github.com/udo-munk/z80pack/security/advisories/GHSA-gpjj-f76m-9x3q","source":"security-advisories@github.com"}]}}]}