ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
Packagist
GHSA-769f-539v-f5jg
PrestaShop gamification module ZIP archives were vulnerable from CVE-2017-9841
### Impact We have identified that some gamification module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow, on a webserver, an attacker to perform a RCE. This vulnerability impacts - phpunit before 4.8.28 and 5.x before 5.6.3 as reported in [CVE-2017-9841](h...
null
2020-01-08T03:10:06Z
2020-01-08T03:10:44Z
HIGH
null
null
{'https://build.prestashop.com/news/critical-security-vulnerability-in-prestashop-modules/', 'https://github.com/PrestaShop/gamification/security/advisories/GHSA-769f-539v-f5jg', 'https://github.com/PrestaShop/gamification/commit/5044bda903a7ea9596c21faa2b9a42244763568c'}
null
{'https://github.com/PrestaShop/gamification/commit/5044bda903a7ea9596c21faa2b9a42244763568c'}
{'https://github.com/PrestaShop/gamification/commit/5044bda903a7ea9596c21faa2b9a42244763568c'}
Packagist
GHSA-6m26-25q2-cq46
Cross-site Scripting in microweber
Microweber Cross-site Scripting (XSS) - Stored XSS vulnerability on admin page up to version 1.3.
{'CVE-2022-0763'}
2022-03-09T20:36:46Z
2022-02-27T00:00:15Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/6de9c621-740d-4d7a-9d77-d90c6c87f3b6', 'https://github.com/microweber/microweber/commit/c897d0dc159849763a813184d9b75b966c6360bf', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0763'}
null
{'https://github.com/microweber/microweber/commit/c897d0dc159849763a813184d9b75b966c6360bf'}
{'https://github.com/microweber/microweber/commit/c897d0dc159849763a813184d9b75b966c6360bf'}
Packagist
GHSA-wppj-3pjr-9w79
crater is vulnerable to Unrestricted Upload of File with Dangerous Type
crater is vulnerable to Unrestricted Upload of File with Dangerous Type
{'CVE-2021-4080'}
2022-01-20T15:08:18Z
2022-01-21T23:55:11Z
HIGH
null
{'CWE-434'}
{'https://huntr.dev/bounties/d7453360-baca-4e56-985f-481275fa38db', 'https://github.com/crater-invoice/crater', 'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4080'}
null
{'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d'}
{'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d'}
Packagist
GHSA-553q-hpvp-q8pc
Server-Side Request Forgery in snipe/snipe-it
Admin users on the external network can perform blind POST-based SSRF (issue requests on behalf of the server into the internal network) via the Slack Integration. This vulnerability is capable of port-scanning of the internal network, issue POST requests to web servers on the internal network which can be escalated to...
{'CVE-2021-4075'}
2021-12-07T21:24:53Z
2021-12-10T20:22:15Z
HIGH
null
{'CWE-918'}
{'https://github.com/snipe/snipe-it/commit/4612b9e711b3ff5d2bcddbec5b18866d25f8e34e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4075', 'https://huntr.dev/bounties/4386fd8b-8c80-42bb-87b8-b506c46597de', 'https://github.com/snipe/snipe-it'}
null
{'https://github.com/snipe/snipe-it/commit/4612b9e711b3ff5d2bcddbec5b18866d25f8e34e'}
{'https://github.com/snipe/snipe-it/commit/4612b9e711b3ff5d2bcddbec5b18866d25f8e34e'}
Packagist
GHSA-gjq4-69wj-p6pr
Path traversal in pimcore
The application doesn't perform a check/filter against the value of "importFile" parameter at endpoint "/admin/translation/import". After the API is executed, PHP unlink function will proceed to delete the file.
{'CVE-2022-0665'}
2022-03-02T21:16:04Z
2022-02-23T00:00:59Z
MODERATE
null
{'CWE-22'}
{'https://huntr.dev/bounties/423df64d-c591-4ad9-bf1c-411bcbc06ba3', 'https://github.com/pimcore/pimcore', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0665', 'https://github.com/pimcore/pimcore/commit/28945649a6234ccaa8c94c6cd83d1954603baf3e'}
null
{'https://github.com/pimcore/pimcore/commit/28945649a6234ccaa8c94c6cd83d1954603baf3e'}
{'https://github.com/pimcore/pimcore/commit/28945649a6234ccaa8c94c6cd83d1954603baf3e'}
Packagist
GHSA-r7c9-c69m-rph8
Code Injection in PHPUnit
Util/PHP/eval-stdin.php in PHPUnit starting with 4.8.19 and before 4.8.28, as well as 5.x before 5.6.3, allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a `<?php ` substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendo...
{'CVE-2017-9841'}
2022-04-19T20:16:49Z
2022-03-26T00:19:30Z
CRITICAL
null
{'CWE-94'}
{'http://www.securitytracker.com/id/1039812', 'http://web.archive.org/web/20170701212357/', 'https://github.com/sebastianbergmann/phpunit/commit/284a69fb88a2d0845d23f42974a583d8f59bf5a5', 'https://github.com/sebastianbergmann/phpunit/pull/1955', 'https://github.com/sebastianbergmann/phpunit', 'http://', 'https://github...
null
{'https://github.com/sebastianbergmann/phpunit/commit/284a69fb88a2d0845d23f42974a583d8f59bf5a5', 'https://github.com/sebastianbergmann/phpunit/commit/3aaddb1c5bd9b9b8d070b4cf120e71c36fd08412'}
{'https://github.com/sebastianbergmann/phpunit/commit/3aaddb1c5bd9b9b8d070b4cf120e71c36fd08412', 'https://github.com/sebastianbergmann/phpunit/commit/284a69fb88a2d0845d23f42974a583d8f59bf5a5'}
Packagist
GHSA-h9ph-jcgh-gf69
Cross-site Scripting in Limesurvey
The "File upload question" functionality in LimeSurvey 3.x-LTS through 3.27.18 allows XSS in assets/scripts/modaldialog.js and assets/scripts/uploader.js.
{'CVE-2021-42112'}
2021-10-19T14:51:30Z
2021-10-12T16:40:28Z
MODERATE
null
{'CWE-79'}
{'https://www.on-x.com/sites/default/files/on-x_-_security_advisory_-_limesurvey_-_cve-2021-42112.pdf', 'https://github.com/LimeSurvey/LimeSurvey/commit/d56619a50cfd191bbffd0adb660638a5e438070d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42112', 'https://github.com/LimeSurvey/LimeSurvey', 'https://github.com/LimeSurve...
null
{'https://github.com/LimeSurvey/LimeSurvey/commit/d56619a50cfd191bbffd0adb660638a5e438070d'}
{'https://github.com/LimeSurvey/LimeSurvey/commit/d56619a50cfd191bbffd0adb660638a5e438070d'}
Packagist
GHSA-frxp-xxx8-hrg6
Missing Authorization in DayByDay CRM
In Daybyday CRM, versions 2.0.0 through 2.2.0 are vulnerable to Missing Authorization. An attacker that has the lowest privileges account (employee type user), can view the absences of all users in the system including administrators. This type of user is not authorized to view this kind of information.
{'CVE-2022-22108'}
2022-01-07T20:43:46Z
2022-01-08T00:31:52Z
MODERATE
null
{'CWE-862'}
{'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b', 'https://github.com/Bottelet/DaybydayCRM/', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22108', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22108'}
null
{'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b'}
{'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b'}
Packagist
GHSA-f7q6-xxph-mfm8
Cross-site Scripting in Pimcore
Pimcore prior to version 10.2.10 contains a cross-site scripting vulnerability.
{'CVE-2022-0251'}
2022-02-03T17:53:53Z
2022-01-27T00:01:26Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0251', 'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/commit/3ae96b9d41c117aafa45873ad10077d4b873a3cb', 'https://huntr.dev/bounties/eb4b08f9-cf8b-4335-b3b8-ed44e5fa80a5'}
null
{'https://github.com/pimcore/pimcore/commit/3ae96b9d41c117aafa45873ad10077d4b873a3cb'}
{'https://github.com/pimcore/pimcore/commit/3ae96b9d41c117aafa45873ad10077d4b873a3cb'}
Packagist
GHSA-m3xv-x3ph-mq22
Server-side Template Injection in nystudio107/craft-seomatic
A Server-side Template Injection (SSTI) vulnerability exists in Nystudio107 Seomatic prior to 3.4.12 in src/helpers/UrlHelper.php via the host header.
{'CVE-2021-44618'}
2022-03-24T13:44:50Z
2022-03-12T00:00:34Z
HIGH
null
{'CWE-94'}
{'https://github.com/nystudio107/craft-seomatic', 'https://github.com/nystudio107/craft-seomatic/commit/0c5c0c0e0cb61000d12ec55ebf174745a5bf6469', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44618', 'https://github.com/nystudio107/craft-seomatic/releases/tag/3.4.12'}
null
{'https://github.com/nystudio107/craft-seomatic/commit/0c5c0c0e0cb61000d12ec55ebf174745a5bf6469'}
{'https://github.com/nystudio107/craft-seomatic/commit/0c5c0c0e0cb61000d12ec55ebf174745a5bf6469'}
Packagist
GHSA-2xwq-h7r9-6w27
Cross-site Scripting in kimai2
Cross site request forgery vulnerability is present in delete functionality of doctor feature. This vulnerability is capable of deleting system logs
{'CVE-2021-3957'}
2021-11-22T18:46:48Z
2021-11-23T17:59:40Z
MODERATE
null
{'CWE-352'}
{'https://github.com/kevinpapst/kimai2/commit/6b49535b523dcd36ec59462ee4e67e2b3a9151f3', 'https://huntr.dev/bounties/5fa3098a-ba02-45e0-af56-645e34dbc691', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3957'}
null
{'https://github.com/kevinpapst/kimai2/commit/6b49535b523dcd36ec59462ee4e67e2b3a9151f3'}
{'https://github.com/kevinpapst/kimai2/commit/6b49535b523dcd36ec59462ee4e67e2b3a9151f3'}
Packagist
GHSA-cvh5-p6r6-g2qc
Exposed phpinfo() leadked via documentation files
### Impact The `phpinfo()` can be exposed if the `/vendor` is not protected from public access. This is a rare situation today since the vendor directory is often located outside the web directory or protected via server rule (.htaccess, etc). ### Patches Only the v6, v7 and v8 will be patched respectively in 8.0.7, 7...
{'CVE-2021-37704'}
2021-08-26T20:11:49Z
2021-08-30T16:13:40Z
MODERATE
null
{'CWE-668', 'CWE-200'}
{'https://github.com/PHPSocialNetwork/phpfastcache/pull/814', 'https://github.com/PHPSocialNetwork/phpfastcache/commit/41a77d0d8f126dbd6fbedcd9e6a82e86cdaafa51', 'https://github.com/flextype/flextype/issues/567', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37704', 'https://packagist.org/packages/phpfastcache/phpfastcach...
null
{'https://github.com/PHPSocialNetwork/phpfastcache/commit/41a77d0d8f126dbd6fbedcd9e6a82e86cdaafa51'}
{'https://github.com/PHPSocialNetwork/phpfastcache/commit/41a77d0d8f126dbd6fbedcd9e6a82e86cdaafa51'}
Packagist
GHSA-54qq-9chj-rxhv
Cross-site Scripting in LiveHelperChat
LiveHelperChat prior to version 3.93 contains a cross-site scripting vulnerability.
{'CVE-2022-0395'}
2022-02-04T16:53:54Z
2022-01-29T00:00:33Z
MODERATE
null
{'CWE-79'}
{'https://github.com/livehelperchat/livehelperchat', 'https://huntr.dev/bounties/36abbd6e-239e-4739-8c77-ba212b946a4a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0395', 'https://github.com/livehelperchat/livehelperchat/commit/8fdb4f67ac1a095331aa0fb4630ef9dfe8e75dcb'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/8fdb4f67ac1a095331aa0fb4630ef9dfe8e75dcb'}
{'https://github.com/livehelperchat/livehelperchat/commit/8fdb4f67ac1a095331aa0fb4630ef9dfe8e75dcb'}
Packagist
GHSA-jjp3-m93h-5jm4
Cross-site Scripting in microweber
Microweber drag and drop website builder and CMS with e-commerce. Cross-site Scripting (XSS) discovered in microweber prior to 1.2.12. There is currently no known workaround, users are recommended to update to version 1.2.12.
{'CVE-2022-0928'}
2022-03-24T23:19:35Z
2022-03-12T00:00:34Z
MODERATE
null
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/fc9137c031f7edec5f50d73b300919fb519c924a', 'https://huntr.dev/bounties/085aafdd-ba50-44c7-9650-fa573da29bcd', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0928'}
null
{'https://github.com/microweber/microweber/commit/fc9137c031f7edec5f50d73b300919fb519c924a'}
{'https://github.com/microweber/microweber/commit/fc9137c031f7edec5f50d73b300919fb519c924a'}
Packagist
GHSA-9wrv-g75h-8ccc
Improper Access Control in Shopware
Shopware 6 is an open commerce platform based on Symfony Framework and Vue and supported by a worldwide community and more than 1.500 community extensions. Permissions set to sales channel context by admin-api are still useable within normal user session. We recommend updating to the current version 6.4.10.1. You can g...
{'CVE-2022-24872'}
2022-05-04T03:52:17Z
2022-04-22T21:04:27Z
HIGH
null
{'CWE-732'}
{'https://github.com/shopware/platform/security/advisories/GHSA-9wrv-g75h-8ccc', 'https://github.com/shopware/platform', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24872', 'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c', 'https://docs.shopware.com/en/shopware-6-en/security-updates...
null
{'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c'}
{'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c'}
Packagist
GHSA-c6fg-99pr-25m9
Uncapped length of skin data fields submitted by players
### Impact Some skin data fields (e.g. skinID, geometryName) are not capped in length. These fields are typically saved in the NBT data of a player when the player quits the server, or during an autosave. This is problematic due to the 32767 byte limit on `TAG_String`s. If any of these fields exceeds 32767 bytes, an e...
null
2022-01-06T19:47:00Z
2022-01-06T23:53:58Z
HIGH
null
null
{'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/commit/6492cac5c10f9fa8443ceddd2191a7b65b73f601', 'https://github.com/pmmp/PocketMine-MP/commit/958a9dbf0fe3131ab60319c5a939f5dfbfe5dfbb', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-c6fg-99pr-25m9'}
null
{'https://github.com/pmmp/PocketMine-MP/commit/6492cac5c10f9fa8443ceddd2191a7b65b73f601', 'https://github.com/pmmp/PocketMine-MP/commit/958a9dbf0fe3131ab60319c5a939f5dfbfe5dfbb'}
{'https://github.com/pmmp/PocketMine-MP/commit/6492cac5c10f9fa8443ceddd2191a7b65b73f601', 'https://github.com/pmmp/PocketMine-MP/commit/958a9dbf0fe3131ab60319c5a939f5dfbfe5dfbb'}
Packagist
GHSA-4r8q-gv9j-3xx6
Open Redirect
### Impact In some situations, it is possible to have open redirects where users can be redirected from your site to any other site using a specially crafted URL. This is only the case for installations where the default Hostname Identification is used and the environment uses tenants that have `force_https` set to `tr...
{'CVE-2021-32645'}
2022-03-18T17:55:07Z
2022-03-18T17:55:07Z
MODERATE
null
{'CWE-601'}
{'https://webmasters.googleblog.com/2009/01/open-redirect-urls-is-your-site-being.html', 'https://github.com/tenancy/multi-tenant/commit/9c837a21bccce9bcaeb90033ef200d84f0d9e164', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32645', 'https://packagist.org/packages/hyn/multi-tenant', 'https://github.com/tenancy/multi-tena...
null
{'https://github.com/tenancy/multi-tenant/commit/9c837a21bccce9bcaeb90033ef200d84f0d9e164'}
{'https://github.com/tenancy/multi-tenant/commit/9c837a21bccce9bcaeb90033ef200d84f0d9e164'}
Packagist
GHSA-j29f-m23h-3p8p
Cross-site Scripting in Pimcore
Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0.
{'CVE-2022-0911'}
2022-03-29T15:16:19Z
2022-03-17T00:00:48Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/b242edb1-b036-4dca-9b53-891494dd7a77', 'https://github.com/pimcore/pimcore/pull/11447', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0911'}
null
{'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}
{'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}
Packagist
GHSA-pwwm-pwx2-2hw7
Generation of Error Message Containing Sensitive Information in Snipe-IT
Snipe-IT prior to version 5.3.11 is vulnerable to Generation of Error Message Containing Sensitive Information.
{'CVE-2022-0622'}
2022-02-22T18:12:11Z
2022-02-18T00:00:37Z
MODERATE
null
{'CWE-209'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0622', 'https://github.com/snipe/snipe-it/commit/178e44095141ab805c282f563fb088df1a10b2e2', 'https://huntr.dev/bounties/4ed99dab-5319-4b6b-919a-84a9acd0061a', 'https://github.com/snipe/snipe-it'}
null
{'https://github.com/snipe/snipe-it/commit/178e44095141ab805c282f563fb088df1a10b2e2'}
{'https://github.com/snipe/snipe-it/commit/178e44095141ab805c282f563fb088df1a10b2e2'}
Packagist
GHSA-q67f-3jq4-mww2
Cross-site Scripting in Pimcore
Pimcore version 10.3.2 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 10.3.3.
{'CVE-2022-0831'}
2022-03-11T20:36:49Z
2022-03-05T00:00:45Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pimcore/pimcore/commit/e786fd44aac46febdbf916ed6c328fbe645d80bf', 'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/4152e3a7-27a1-49eb-a6eb-a57506af104f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0831'}
null
{'https://github.com/pimcore/pimcore/commit/e786fd44aac46febdbf916ed6c328fbe645d80bf'}
{'https://github.com/pimcore/pimcore/commit/e786fd44aac46febdbf916ed6c328fbe645d80bf'}
Packagist
GHSA-g996-q5r8-w7g2
Escape validation messages in the PHP templating engine
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, validation messages are not escaped, which can lead to XSS when user input is included. This is related to symfony/framework-bundle.
{'CVE-2019-10909'}
2021-08-18T22:15:15Z
2019-11-12T23:00:53Z
MODERATE
null
{'CWE-79'}
{'https://symfony.com/blog/cve-2019-10909-escape-validation-messages-in-the-php-templating-engine', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10909.yaml', 'https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2', 'https://nvd.nist.gov/vuln/deta...
null
{'https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2'}
{'https://github.com/symfony/symfony/commit/ab4d05358c3d0dd1a36fc8c306829f68e3dd84e2'}
Packagist
GHSA-frqg-7g38-6gcf
Improper escaping of command arguments on Windows leading to command injection
### Impact Windows users running Composer to install untrusted dependencies are affected and should definitely upgrade for safety. Other OSs and WSL are not affected. ### Patches 1.10.23 and 2.1.9 fix the issue ### Workarounds None
{'CVE-2021-41116'}
2021-10-11T18:39:06Z
2021-10-05T20:23:18Z
HIGH
null
{'CWE-77'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41116', 'https://github.com/composer/composer/security/advisories/GHSA-frqg-7g38-6gcf', 'https://www.tenable.com/security/tns-2022-09', 'https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa', 'https://github.com/composer/composer'}
null
{'https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa'}
{'https://github.com/composer/composer/commit/ca5e2f8d505fd3bfac6f7c85b82f2740becbc0aa'}
Packagist
GHSA-ghhm-xrwp-75m9
bookstack is vulnerable to Improper Access Control
bookstack is vulnerable to Improper Access Control
{'CVE-2021-4194'}
2022-01-07T22:38:34Z
2022-01-08T00:34:12Z
MODERATE
null
{'CWE-668', 'CWE-284'}
{'https://github.com/bookstackapp/bookstack', 'https://github.com/bookstackapp/bookstack/commit/cb0d674a71449de883713db2fcdccb6e108992ad', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4194', 'https://huntr.dev/bounties/0bc8b3f7-9057-4eb7-a989-24cd5689f114'}
null
{'https://github.com/bookstackapp/bookstack/commit/cb0d674a71449de883713db2fcdccb6e108992ad'}
{'https://github.com/bookstackapp/bookstack/commit/cb0d674a71449de883713db2fcdccb6e108992ad'}
Packagist
GHSA-7rg4-266c-jqw6
Predictable CSRF tokens in centreon/centreon
An issue was discovered in Centreon-Web in Centreon Platform 20.10.0. The anti-CSRF token generation is predictable, which might allow CSRF attacks that add an admin user.
{'CVE-2021-28055'}
2021-05-07T15:18:01Z
2021-06-08T20:12:56Z
MODERATE
null
{'CWE-330', 'CWE-352'}
{'https://github.com/centreon/centreon/releases/tag/2.8.37', 'https://github.com/centreon/centreon/commit/0261d4b250135eb513fdb7d52ba6fdeb19c6863f', 'https://github.com/centreon/centreon/pull/9612', 'https://github.com/centreon/centreon/commit/626d3fb91cef402df0ebda5a8165d8f45da67c7a', 'https://nvd.nist.gov/vuln/detail...
null
{'https://github.com/centreon/centreon/commit/626d3fb91cef402df0ebda5a8165d8f45da67c7a', 'https://github.com/centreon/centreon/commit/0261d4b250135eb513fdb7d52ba6fdeb19c6863f'}
{'https://github.com/centreon/centreon/commit/626d3fb91cef402df0ebda5a8165d8f45da67c7a', 'https://github.com/centreon/centreon/commit/0261d4b250135eb513fdb7d52ba6fdeb19c6863f'}
Packagist
GHSA-w2f4-hxpm-mq98
bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type
bookstack is vulnerable to Unrestricted Upload of File with Dangerous Type.
{'CVE-2021-3915'}
2021-11-17T21:12:00Z
2021-11-15T23:17:37Z
HIGH
null
{'CWE-434'}
{'https://github.com/BookStackApp/BookStack', 'https://huntr.dev/bounties/fcb65f2d-257a-46f4-bac9-f6ded5649079', 'https://github.com/bookstackapp/bookstack/commit/ae155d67454d6b9f6c93b2bb457aaa4b2eb1a9ed', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3915'}
null
{'https://github.com/bookstackapp/bookstack/commit/ae155d67454d6b9f6c93b2bb457aaa4b2eb1a9ed'}
{'https://github.com/bookstackapp/bookstack/commit/ae155d67454d6b9f6c93b2bb457aaa4b2eb1a9ed'}
Packagist
GHSA-h676-pjr4-hgqx
Path Traversal in S-Cart
A Directory Traversal vulnerability exists in S-Cart 6.7 via download in sc-admin/backup.
{'CVE-2021-44111'}
2022-02-23T15:52:20Z
2022-02-12T00:00:42Z
MODERATE
null
{'CWE-22'}
{'https://github.com/s-cart/s-cart', 'https://github.com/s-cart/core/commit/328dd312866b86144b43941dee2ad942708f70da', 'https://github.com/s-cart/s-cart/issues/102', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44111'}
null
{'https://github.com/s-cart/core/commit/328dd312866b86144b43941dee2ad942708f70da'}
{'https://github.com/s-cart/core/commit/328dd312866b86144b43941dee2ad942708f70da'}
Packagist
GHSA-jgjc-332c-8cmc
SQL injection in phpMyAdmin
An issue was discovered in phpMyAdmin before 4.9.2. A crafted database/table name can be used to trigger a SQL injection attack through the designer feature.
{'CVE-2019-18622'}
2021-08-19T16:24:16Z
2020-01-16T21:56:15Z
CRITICAL
null
{'CWE-89'}
{'https://github.com/phpmyadmin/composer/commit/51acbf53564d9b52e78509a5688ec2b68976b5f7', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W5GW4KEMNCBQYZCIXEJYC42OEBBN2NSH/', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18622', 'https://www.phpmyadmin.net/security/PMASA-201...
null
{'https://github.com/phpmyadmin/composer/commit/51acbf53564d9b52e78509a5688ec2b68976b5f7'}
{'https://github.com/phpmyadmin/composer/commit/51acbf53564d9b52e78509a5688ec2b68976b5f7'}
Packagist
GHSA-qq74-vgcf-54c3
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting via viva cshtm file upload in in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0946'}
2022-03-23T15:37:53Z
2022-03-15T00:01:00Z
MODERATE
null
{'CWE-79'}
{'https://github.com/star7th/showdoc/commit/e5d575928b1371a7e07b09b6592822298335062a', 'https://huntr.dev/bounties/1f8f0021-396e-428e-9748-dd4e359715e1', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0946'}
null
{'https://github.com/star7th/showdoc/commit/e5d575928b1371a7e07b09b6592822298335062a'}
{'https://github.com/star7th/showdoc/commit/e5d575928b1371a7e07b09b6592822298335062a'}
Packagist
GHSA-2xw8-j43j-5vxp
elgg is vulnerable to Cross-site Scripting
elgg is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-4072'}
2022-01-05T17:56:06Z
2022-01-06T21:35:42Z
MODERATE
null
{'CWE-79'}
{'https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4072', 'https://github.com/elgg/elgg', 'https://huntr.dev/bounties/74034253-732a-4251-a0f9-eca5f576c955'}
null
{'https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0'}
{'https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0'}
Packagist
GHSA-jpwx-ffjq-wr4w
Content object state fetch functions open to SQL injection
### Impact This Security Update is about a vulnerability in eZ Publish Legacy. The content object state code could be vulnerable to SQL injection. There is no known exploit, but one might be possible. If you use Legacy in any way, we strongly recommend that you install this update as soon as possible. ### Patches The ...
null
2021-09-03T20:10:38Z
2021-09-07T22:54:23Z
HIGH
null
{'CWE-89'}
{'https://github.com/ezsystems/ezpublish-legacy/commit/f8e3a97afd92efb9148134a4bacb35a875777a42', 'https://developers.ibexa.co/security-advisories/ibexa-sa-2021-005-content-object-state-fetch-functions-open-to-sql-injection', 'https://github.com/ezsystems/ezpublish-legacy', 'https://github.com/ezsystems/ezpublish-legac...
null
{'https://github.com/ezsystems/ezpublish-legacy/commit/f8e3a97afd92efb9148134a4bacb35a875777a42'}
{'https://github.com/ezsystems/ezpublish-legacy/commit/f8e3a97afd92efb9148134a4bacb35a875777a42'}
Packagist
GHSA-6jmh-9gqm-5xrx
Cross-Site Request Forgery (CSRF) in livehelperchat
A CSRF issue is found in the audit configuration under settings. It was found that no CSRF token validation is getting done on the server-side. If we remove the CSRF token and keep the CSRF token field empty, the action is getting performed.
{'CVE-2022-0226'}
2022-01-24T21:11:02Z
2022-01-26T20:21:03Z
MODERATE
null
{'CWE-352'}
{'https://github.com/livehelperchat/livehelperchat/commit/f59ffb02984c0ce2fbb19ac39365066507de9370', 'https://huntr.dev/bounties/635d0abf-7680-47f6-a277-d9a91471c73f', 'https://github.com/livehelperchat/livehelperchat', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0226'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/f59ffb02984c0ce2fbb19ac39365066507de9370'}
{'https://github.com/livehelperchat/livehelperchat/commit/f59ffb02984c0ce2fbb19ac39365066507de9370'}
Packagist
GHSA-7g7r-gr46-q4p5
Cross-Site Request Forgery in yetiforce
Versions of yetiforce 6.3.0 and prior are subject to privilege escalation via a cross site request forgery bug. This allows an attacker to create a new admin account even with SameSite: Strict enabled. This vulnerability can be exploited by any user on the system including guest users.
{'CVE-2022-0269'}
2022-01-31T21:47:28Z
2022-01-27T16:21:33Z
HIGH
null
{'CWE-352'}
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/298c7870e6fe4332d8aa1757a9c8d79f841389ff', 'https://huntr.dev/bounties/a0470915-f6df-45b8-b3a2-01aebe764df0', ' https://github.com/yetiforcecompany/yetiforcecrm', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0269'}
null
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/298c7870e6fe4332d8aa1757a9c8d79f841389ff'}
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/298c7870e6fe4332d8aa1757a9c8d79f841389ff'}
Packagist
GHSA-4r3m-j6x5-48m3
Cross Site Scripting(XSS) Vulnerability in Latest Release 4.3.6 Site basic settings
baserCMS 4.3.6 and earlier is affected by Cross Site Scripting (XSS) via arbitrary script execution. Admin access is required to exploit this vulnerability. The affected components is toolbar.php. The issue is fixed in version 4.3.7.
{'CVE-2020-15155'}
2021-01-07T23:39:22Z
2020-08-28T21:20:42Z
LOW
null
{'CWE-79'}
{'https://basercms.net/security/20200827', 'https://github.com/baserproject/basercms/security/advisories/GHSA-4r3m-j6x5-48m3', 'https://github.com/baserproject/basercms/commit/94cbfab74c9fd6d04492597a1a684674c3c0e30f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15155'}
null
{'https://github.com/baserproject/basercms/commit/94cbfab74c9fd6d04492597a1a684674c3c0e30f'}
{'https://github.com/baserproject/basercms/commit/94cbfab74c9fd6d04492597a1a684674c3c0e30f'}
Packagist
GHSA-qr95-4mq5-r3fh
Phar unserialization vulnerability in phpMussel
### Impact _What kind of vulnerability is it? Who is impacted?_ Anyone using >= v1.0.0 < v1.6.0. ### Patches _Has the problem been patched? What versions should users upgrade to?_ Yes. Upgrading to at least >= v1.6.0 will resolve the problem (though upgrading to v2, which is the current major version, would be prefe...
{'CVE-2020-4043'}
2021-01-08T20:12:50Z
2020-06-10T19:40:30Z
HIGH
null
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-4043', 'https://github.com/phpMussel/phpMussel/security/policy#currently-known-vulnerabilities', 'https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4', 'https://github.com/phpMussel/phpMussel/pull/173', 'https://github.com/phpMussel/phpMusse...
null
{'https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4'}
{'https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4'}
Packagist
GHSA-qf2g-q4mc-w7rr
Cross-site Scripting in Fork CMS
Fork CMS prior to 5.11.1 is vulnerable to stored cross-site scripting. When uploading a new module, the description of the module can contain JavaScript code. The JavaScript code may be executed after uploading the new module and looking at the `Details` page.
{'CVE-2022-0145'}
2022-03-30T21:04:25Z
2022-03-25T00:00:34Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/b5b8c680-3cd9-4477-bcd9-3a29657ba7ba', 'https://github.com/forkcms/forkcms', 'https://github.com/forkcms/forkcms/commit/981730f1a3d59b423ca903b1f4bf79b848a1766e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0145'}
null
{'https://github.com/forkcms/forkcms/commit/981730f1a3d59b423ca903b1f4bf79b848a1766e'}
{'https://github.com/forkcms/forkcms/commit/981730f1a3d59b423ca903b1f4bf79b848a1766e'}
Packagist
GHSA-jf9v-q8vh-3fmc
Cross-site scripting in ICEcoder
In ICEcoder 8.0 allows, a reflected XSS vulnerability was identified in the multipe-results.php page due to insufficient sanitization of the _GET['replace'] variable. As a result, arbitrary Javascript code can get executed.
{'CVE-2021-32106'}
2021-09-09T14:17:19Z
2021-09-09T17:11:11Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32106', 'https://github.com/icecoder/ICEcoder', 'https://prophaze.com/cve/icecoder-8-0-multipe-results-php-replace-cross-site-scripting/', 'https://github.com/icecoder/ICEcoder/commit/21d6ae0f2a3fce7d076ae430d48f5df56bd0f256', 'https://groups.google.com/g/icecoder/c/xcAc8_1UP...
null
{'https://github.com/icecoder/ICEcoder/commit/21d6ae0f2a3fce7d076ae430d48f5df56bd0f256'}
{'https://github.com/icecoder/ICEcoder/commit/21d6ae0f2a3fce7d076ae430d48f5df56bd0f256'}
Packagist
GHSA-p8q8-jfcv-g2h2
Directory Traversal in Archive_Tar
In Archive_Tar before 1.4.14, symlinks can refer to targets outside of the extracted archive, a different vulnerability than CVE-2020-36193.
{'CVE-2021-32610'}
2021-09-20T20:26:41Z
2021-08-09T20:40:06Z
HIGH
null
{'CWE-59'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/', 'https://github.com/pear/Archive_Tar/commit/7789ebb2f34f9e4adb3a4152ad0d1548930a9755', 'https://lists.debian.org/debian-lts-announce/2021/07/msg00023.html', 'https://lists.fedoraproject.o...
null
{'https://github.com/pear/Archive_Tar/commit/7789ebb2f34f9e4adb3a4152ad0d1548930a9755', 'https://github.com/pear/Archive_Tar/commit/b5832439b1f37331fb4f87e67fe4f'}
{'https://github.com/pear/Archive_Tar/commit/7789ebb2f34f9e4adb3a4152ad0d1548930a9755', 'https://github.com/pear/Archive_Tar/commit/b5832439b1f37331fb4f87e67fe4f'}
Packagist
GHSA-9w7h-3wwh-6m5q
Cross-site Scripting in Microweber
Microweber prior to 1.2.15 is vulnerable to reflected cross-site scripting on demo.microweber.org/demo/module/. This allows the execution of arbitrary JavaScript as the attacked user.
{'CVE-2022-1439'}
2022-04-26T13:14:56Z
2022-04-23T00:03:02Z
MODERATE
null
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/ad3928f67b2cd4443f4323d858b666d35a919ba8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1439', 'https://huntr.dev/bounties/86f6a762-0f3d-443d-a676-20f8496907e0', 'https://github.com/microweber/microweber'}
null
{'https://github.com/microweber/microweber/commit/ad3928f67b2cd4443f4323d858b666d35a919ba8'}
{'https://github.com/microweber/microweber/commit/ad3928f67b2cd4443f4323d858b666d35a919ba8'}
Packagist
GHSA-gcvv-gq92-x94r
Authenticated server-side request forgery in file upload via URL.
### Impact Authenticated server-side request forgery in file upload via URL. ### Patches We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For o...
{'CVE-2021-37711'}
2021-08-23T17:22:58Z
2021-08-23T19:42:49Z
HIGH
null
{'CWE-918'}
{'https://github.com/shopware/platform/security/advisories/GHSA-gcvv-gq92-x94r', 'https://github.com/shopware/platform/commit/b9f330e652b743dd2374c02bbe68f28b59a3f502', 'https://github.com/shopware/platform', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37711'}
null
{'https://github.com/shopware/platform/commit/b9f330e652b743dd2374c02bbe68f28b59a3f502'}
{'https://github.com/shopware/platform/commit/b9f330e652b743dd2374c02bbe68f28b59a3f502'}
Packagist
GHSA-c383-q5vf-hx55
Integer Overflow or Wraparound in Microweber
Microweber prior to 1.2.12 is vulnerable to Integer Overflow or Wraparound.
{'CVE-2022-0913'}
2022-03-23T15:33:00Z
2022-03-12T00:00:36Z
HIGH
null
{'CWE-190'}
{'https://huntr.dev/bounties/f5f3e468-663b-4df0-8340-a2d77e4cc75f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0913', 'https://github.com/microweber/microweber/commit/7559e141d0707f8eeff2f9aeaa5a0ca2e3fe6583', 'https://github.com/microweber/microweber'}
null
{'https://github.com/microweber/microweber/commit/7559e141d0707f8eeff2f9aeaa5a0ca2e3fe6583'}
{'https://github.com/microweber/microweber/commit/7559e141d0707f8eeff2f9aeaa5a0ca2e3fe6583'}
Packagist
GHSA-3q55-66g3-p8xq
Cross-site Scripting in microweber
File upload filter bypass leading to stored XSS in GitHub repository microweber/microweber prior to 1.2.12.
{'CVE-2022-0926'}
2022-03-22T19:36:42Z
2022-03-13T00:00:54Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/dc5d1555-0108-4627-b542-93352f35fa17', 'https://github.com/microweber/microweber/commit/89200cfcc2cfefe5554721e7fa3cf52f6a2a9120', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0926', 'https://github.com/microweber/microweber'}
null
{'https://github.com/microweber/microweber/commit/89200cfcc2cfefe5554721e7fa3cf52f6a2a9120'}
{'https://github.com/microweber/microweber/commit/89200cfcc2cfefe5554721e7fa3cf52f6a2a9120'}
Packagist
GHSA-fwh7-v4gf-xv7w
yetiforcecrm is vulnerable to Cross-site Scripting
yetiforcecrm is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-4116'}
2022-01-03T15:55:40Z
2021-12-16T21:00:45Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/7561bae7-9053-4dc8-aa59-b71acfb1712c', 'https://github.com/yetiforcecompany/yetiforcecrm/commit/9cdb012ca64ff1f719f8120d5fd162cd5ef1013f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4116', 'https://github.com/yetiforcecompany/yetiforcecrm'}
null
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/9cdb012ca64ff1f719f8120d5fd162cd5ef1013f'}
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/9cdb012ca64ff1f719f8120d5fd162cd5ef1013f'}
Packagist
GHSA-6xj3-fhrf-rjgc
Cross-site Scripting in microweber
XSS in /demo/module/?module=HERE in GitHub repository microweber/microweber prior to 1.2.15. Typical impact of XSS attacks.
{'CVE-2022-1504'}
2022-04-28T21:11:45Z
2022-04-28T00:00:34Z
MODERATE
null
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/1f6a4de416a85e626dc643bb5ceb916e4802223e', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1504', 'https://huntr.dev/bounties/b8e5c324-3dfe-46b4-8095-1697c6b0a6d6'}
null
{'https://github.com/microweber/microweber/commit/1f6a4de416a85e626dc643bb5ceb916e4802223e'}
{'https://github.com/microweber/microweber/commit/1f6a4de416a85e626dc643bb5ceb916e4802223e'}
Packagist
GHSA-9f46-5r25-5wfm
Time-of-check Time-of-use (TOCTOU) Race Condition in league/flysystem
### Impact The whitespace normalisation using in 1.x and 2.x removes any unicode whitespace. Under certain specific conditions this could potentially allow a malicious user to execute code remotely. The conditions: - A user is allowed to supply the path or filename of an uploaded file. - The supplied path or filena...
{'CVE-2021-32708'}
2021-09-21T14:55:38Z
2021-06-29T03:13:28Z
CRITICAL
null
{'CWE-367'}
{'https://github.com/thephpleague/flysystem/commit/a3c694de9f7e844b76f9d1b61296ebf6e8d89d74', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NWPTENBYKI2IG47GI4DHAACLNRLTWUR5/', 'https://github.com/thephpleague/flysystem', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32708'...
null
{'https://github.com/thephpleague/flysystem/commit/f3ad69181b8afed2c9edf7be5a2918144ff4ea32', 'https://github.com/thephpleague/flysystem/commit/a3c694de9f7e844b76f9d1b61296ebf6e8d89d74'}
{'https://github.com/thephpleague/flysystem/commit/a3c694de9f7e844b76f9d1b61296ebf6e8d89d74', 'https://github.com/thephpleague/flysystem/commit/f3ad69181b8afed2c9edf7be5a2918144ff4ea32'}
Packagist
GHSA-wwvv-x5mq-h3jj
Use of Cryptographically Weak Pseudo-Random Number Generator in yiisoft/yii2-dev
yii2 is vulnerable to Use of Predictable Algorithm in Random Number Generator
{'CVE-2021-3692'}
2021-08-30T20:28:42Z
2021-09-01T18:35:26Z
MODERATE
null
{'CWE-338', 'CWE-330'}
{'https://github.com/yiisoft/yii2', 'https://huntr.dev/bounties/55517f19-5c28-4db2-8b00-f78f841e8aba', 'https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3692'}
null
{'https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46'}
{'https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46'}
Packagist
GHSA-3pg8-c473-w6rr
Stored Cross-site Scripting in showdoc
ShowDoc is a tool for an IT team to share documents online. showdoc contains a stored cross-site scripting vulnerability in the File Library page when uploading a file in .ofd format in versions prior to 2.10.4. At this time, there is no known workaround. Users should update to version 2.10.4.
{'CVE-2022-0967'}
2022-03-25T00:07:36Z
2022-03-16T00:00:46Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0967', 'https://huntr.dev/bounties/9dea3c98-7609-480d-902d-149067bd1e2a', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
null
{'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
{'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
Packagist
GHSA-r6g8-jmj9-g945
Improper Restriction of Rendered UI Layers or Frames in yourls
yourls is vulnerable to Improper Restriction of Rendered UI Layers or Frames
{'CVE-2021-3734'}
2021-08-27T12:54:01Z
2021-08-30T16:22:16Z
MODERATE
null
{'CWE-352', 'CWE-1021'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3734', 'https://github.com/yourls/yourls/commit/0a70acdcfb5fcbc63dbc5750018d608288eba3fe', 'https://huntr.dev/bounties/dd2e2dbe-efe5-49ec-be11-7a7e7c41debd', 'https://github.com/yourls/yourls'}
null
{'https://github.com/yourls/yourls/commit/0a70acdcfb5fcbc63dbc5750018d608288eba3fe'}
{'https://github.com/yourls/yourls/commit/0a70acdcfb5fcbc63dbc5750018d608288eba3fe'}
Packagist
GHSA-3rpf-5rqv-689q
PHP Code Injection by malicious function name in smarty
Template authors could inject php code by choosing a malicous {function} name. Sites that cannot fully trust template authors should update as soon as possible. Please upgrade to 3.1.39 or higher.
{'CVE-2021-26120'}
2022-05-03T03:01:58Z
2021-02-26T19:53:24Z
CRITICAL
null
{'CWE-94'}
{'https://github.com/smarty-php/smarty/blob/master/CHANGELOG.md', 'https://github.com/smarty-php/smarty/commit/165f1bd4d2eec328cfeaca517a725b46001de838', 'https://security.gentoo.org/glsa/202105-06', 'https://github.com/smarty-php/smarty', 'https://srcincite.io/blog/2021/02/18/smarty-template-engine-multiple-sandbox-es...
null
{'https://github.com/smarty-php/smarty/commit/165f1bd4d2eec328cfeaca517a725b46001de838'}
{'https://github.com/smarty-php/smarty/commit/165f1bd4d2eec328cfeaca517a725b46001de838'}
Packagist
GHSA-c676-mcw3-qg55
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-3730'}
2021-08-27T12:48:30Z
2021-08-25T14:50:08Z
MODERATE
null
{'CWE-352'}
{'https://huntr.dev/bounties/ea181323-51f8-46a2-a60f-6a401907feb7', 'https://github.com/firefly-iii/firefly-iii/commit/f80178b1b2b7864d17500a131d570c353c9a26f6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3730', 'https://github.com/firefly-iii/firefly-iii/'}
null
{'https://github.com/firefly-iii/firefly-iii/commit/f80178b1b2b7864d17500a131d570c353c9a26f6'}
{'https://github.com/firefly-iii/firefly-iii/commit/f80178b1b2b7864d17500a131d570c353c9a26f6'}
Packagist
GHSA-m298-fh5c-jc66
Object injection in PHPMailer/PHPMailer
### Impact This is a reintroduction of an earlier issue (CVE-2018-19296) by an unrelated bug fix in PHPMailer 6.1.8. An external file may be unexpectedly executable if it is used as a path to an attachment file via PHP's support for `.phar` files`. Exploitation requires that an attacker is able to provide an unfiltere...
{'CVE-2020-36326'}
2021-05-10T19:27:44Z
2021-05-04T17:42:13Z
CRITICAL
null
{'CWE-502', 'CWE-641'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-36326', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3B5WDPGUFNPG4NAZ6G4BZX43BKLAVA5B/', 'https://github.com/PHPMailer/PHPMailer/security/advisories/GHSA-m298-fh5c-jc66', 'https://github.com/PHPMailer/PHPMailer/commit/e2e07a3...
null
{'https://github.com/PHPMailer/PHPMailer/commit/e2e07a355ee8ff36aba21d0242c5950c56e4c6f9'}
{'https://github.com/PHPMailer/PHPMailer/commit/e2e07a355ee8ff36aba21d0242c5950c56e4c6f9'}
Packagist
GHSA-w68r-5p45-5rqp
Improper Input Validation in Laravel
An issue was discovered in Laravel before 6.18.35 and 7.x before 7.24.0. The $guarded property is mishandled in some situations involving requests with JSON column nesting expressions.
{'CVE-2020-24941'}
2021-05-04T22:46:50Z
2021-05-06T18:54:20Z
HIGH
null
{'CWE-863'}
{'https://blog.laravel.com/security-release-laravel-61835-7240', 'https://nvd.nist.gov/vuln/detail/CVE-2020-24941', 'https://github.com/laravel/framework/commit/897d107775737a958dbd0b2f3ea37877c7526371'}
null
{'https://github.com/laravel/framework/commit/897d107775737a958dbd0b2f3ea37877c7526371'}
{'https://github.com/laravel/framework/commit/897d107775737a958dbd0b2f3ea37877c7526371'}
Packagist
GHSA-36m2-8rhx-f36j
Sandbox bypass in Latte templates
### Impact The problem affects users who use the sandbox in Latte and templates from untrusted sources. ### Patches Sandbox first appeared in Latte 2.8.0. The issue is fixed in the versions 2.8.8, 2.9.6 and 2.10.8. ### References The issues were discovered by - JinYiTong (https://github.com/JinYiTong) - 赵钰迪 <2021201...
{'CVE-2022-21648'}
2022-01-14T19:42:25Z
2022-01-06T23:17:07Z
HIGH
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-21648', 'https://github.com/nette/latte/commit/9e1b4f7d70f7a9c3fa6753ffa7d7e450a3d4abb0', 'https://github.com/nette/latte', 'https://github.com/nette/latte/security/advisories/GHSA-36m2-8rhx-f36j'}
null
{'https://github.com/nette/latte/commit/9e1b4f7d70f7a9c3fa6753ffa7d7e450a3d4abb0'}
{'https://github.com/nette/latte/commit/9e1b4f7d70f7a9c3fa6753ffa7d7e450a3d4abb0'}
Packagist
GHSA-3r8j-pmch-5j2h
Internal exception message exposure for login action in Sylius
## Internal exception message exposure for login action ### Impact Exception messages from internal exceptions (like database exception) are wrapped by `\Symfony\Component\Security\Core\Exception\AuthenticationServiceException` and propagated through the system to UI. Therefore, some internal system information may le...
{'CVE-2019-16768'}
2021-01-08T21:20:32Z
2019-12-05T19:57:04Z
LOW
null
{'CWE-209'}
{'https://github.com/Sylius/Sylius/commit/be245302dfc594d8690fe50dd47631d186aa945f', 'https://github.com/advisories/GHSA-3r8j-pmch-5j2h', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-3r8j-pmch-5j2h', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16768'}
null
{'https://github.com/Sylius/Sylius/commit/be245302dfc594d8690fe50dd47631d186aa945f'}
{'https://github.com/Sylius/Sylius/commit/be245302dfc594d8690fe50dd47631d186aa945f'}
Packagist
GHSA-x8wj-cqmp-3wmm
Cross-site Scripting in Zenario CMS
Zenario CMS 9.0.54156 is vulnerable to Cross Site Scripting (XSS) via upload file to *.SVG. An attacker can send malicious files to victims and steals victim's cookie leads to account takeover. The person viewing the image of a contact can be victim of XSS.
{'CVE-2021-41952'}
2022-03-28T22:21:45Z
2022-03-15T00:00:59Z
MODERATE
null
{'CWE-79'}
{'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41952', 'https://github.com/TribalSystems/Zenario', 'https://github.com/hieuminhnv/Zenario-CMS-9.0-last-version/issues/1', 'https://github.com/TribalSystems/Zenario/releases/tag/9.0.55...
null
{'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007'}
{'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007'}
Packagist
GHSA-g2qj-pmxm-9f8f
User enumeration in authentication mechanisms
Description ----------- The ability to enumerate users was possible without relevant permissions due to different exception messages depending on whether the user existed or not. It was also possible to enumerate users by using a timing attack, by comparing time elapsed when authenticating an existing user and authent...
null
2021-10-08T21:21:12Z
2021-05-17T20:52:32Z
LOW
null
{'CWE-200'}
{'https://github.com/symfony/symfony/security/advisories/GHSA-g2qj-pmxm-9f8f', 'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011', 'https://github.com/symfony/symfony'}
null
{'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011'}
{'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011'}
Packagist
GHSA-68q3-7wjp-7q3j
The filename of uploaded files vulnerable to stored XSS
### Impact The filename of uploaded files was vulnerable to stored XSS. It is not possible to inject javascript code in the file name when creating/uploading the file. But, once created/uploaded, it can be renamed to inject the payload in it. Additionally, the measures to prevent renaming the file to disallowed file...
{'CVE-2020-4041'}
2021-01-08T20:13:40Z
2020-06-09T00:25:34Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-4041', 'https://github.com/bolt/bolt/pull/7853', 'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f', 'https://github.com/bolt/bolt/security/advisories/GHSA-68q3-7wjp-7q3j', 'http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-...
null
{'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f'}
{'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f'}
Packagist
GHSA-4w23-c97g-fq5v
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-4130'}
2022-01-04T20:20:07Z
2022-01-05T20:33:16Z
HIGH
null
{'CWE-352'}
{'https://huntr.dev/bounties/ccf073cd-7f54-4d51-89f2-6b4a2e4ae81e', 'https://github.com/snipe/snipe-it/commit/9b2dd6522f214a3fbee6a4e32699104d0ea2b6ae', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4130', 'https://github.com/snipe/snipe-it'}
null
{'https://github.com/snipe/snipe-it/commit/9b2dd6522f214a3fbee6a4e32699104d0ea2b6ae'}
{'https://github.com/snipe/snipe-it/commit/9b2dd6522f214a3fbee6a4e32699104d0ea2b6ae'}
Packagist
GHSA-7v7w-f7c6-f829
yetiforcecrm is vulnerable to Business Logic Errors
yetiforcecrm is vulnerable to Business Logic Errors.
{'CVE-2021-4111'}
2022-01-03T15:47:58Z
2021-12-16T21:01:15Z
HIGH
null
null
{'https://github.com/yetiforcecompany/yetiforcecrm', 'https://github.com/yetiforcecompany/yetiforcecrm/commit/c1ad7111a090adfcd5898af40724907adc987acf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4111', 'https://huntr.dev/bounties/8afc8981-baff-4082-b640-be535b29eb9a'}
null
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/c1ad7111a090adfcd5898af40724907adc987acf'}
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/c1ad7111a090adfcd5898af40724907adc987acf'}
Packagist
GHSA-952p-fqcp-g8pc
HTML injection possibility in voucher code form in Shopware
### Impact HTML injection possibility in voucher code form ## Patches Patched in 6.4.8.1, maintainers recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ## Workarou...
{'CVE-2022-24746'}
2022-03-18T20:14:15Z
2022-03-10T17:49:26Z
MODERATE
null
{'CWE-79'}
{'https://github.com/shopware/platform/commit/651598a61073cbe59368e311817bdc6e7fb349c6', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2022?category=security-updates', 'https://github.com/shopware/platform', 'https://github.com/shopware/platform/security/advisories/GHSA-952p-fqcp-g8pc'...
null
{'https://github.com/shopware/platform/commit/651598a61073cbe59368e311817bdc6e7fb349c6'}
{'https://github.com/shopware/platform/commit/651598a61073cbe59368e311817bdc6e7fb349c6'}
Packagist
GHSA-699q-wcff-g9mj
Unsafe deserialization in Yii 2
### Impact Remote code execution in case application calls `unserialize()` on user input containing specially crafted string. ### Patches 2.0.38 ### Workarounds Add the following to BatchQueryResult.php: ```php public function __sleep() { throw new \BadMethodCallException('Cannot serialize '.__CLASS__); } pu...
{'CVE-2020-15148'}
2021-01-07T22:56:34Z
2020-09-15T18:19:56Z
HIGH
null
{'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15148', 'https://github.com/yiisoft/yii2/security/advisories/GHSA-699q-wcff-g9mj', 'https://github.com/yiisoft/yii2/commit/9abccb96d7c5ddb569f92d1a748f50ee9b3e2b99'}
null
{'https://github.com/yiisoft/yii2/commit/9abccb96d7c5ddb569f92d1a748f50ee9b3e2b99'}
{'https://github.com/yiisoft/yii2/commit/9abccb96d7c5ddb569f92d1a748f50ee9b3e2b99'}
Packagist
GHSA-5jxc-hmqf-3f73
Cross-Site Scripting in grav
grav prior to version 1.7.24 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-3904'}
2021-11-01T14:06:13Z
2021-11-01T19:17:31Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3904', 'https://github.com/getgrav/grav/commit/afc69a3229bb6fe120b2c1ea27bc6f196ed7284d', 'https://github.com/getgrav/grav/', 'https://huntr.dev/bounties/b1182515-d911-4da9-b4f7-b4c341a62a8d'}
null
{'https://github.com/getgrav/grav/commit/afc69a3229bb6fe120b2c1ea27bc6f196ed7284d'}
{'https://github.com/getgrav/grav/commit/afc69a3229bb6fe120b2c1ea27bc6f196ed7284d'}
Packagist
GHSA-fp63-499m-hq6m
Files or Directories Accessible to External Parties in ether/logs
### Impact A vulnerability was found that allowed authenticated admin users to access any file on the server. ### Patches The vulnerability has been fixed in 3.0.4. ### Workarounds We recommend disabling the plugin if untrustworthy sources have admin access. ### For more information If you have any questions or comm...
{'CVE-2021-32752'}
2021-07-09T14:04:21Z
2021-07-12T16:53:00Z
HIGH
null
{'CWE-552'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32752', 'https://github.com/ethercreative/logs/security/advisories/GHSA-fp63-499m-hq6m', 'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4', 'https://github.com/ethercreative/logs/releases/tag/3.0.4'}
null
{'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4'}
{'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4'}
Packagist
GHSA-5vfx-8w6m-h3v4
Authentication bypass due to improper user-provided security token verification
A malicious user can modify the contents of a `confirmation_token` input during the two-factor authentication process to reference a cache value not associated with the login attempt. In rare cases this can allow a malicious actor to authenticate as a random user in the Panel. The malicious user must target an account ...
{'CVE-2021-41129'}
2021-10-12T21:45:10Z
2021-10-04T20:14:13Z
HIGH
null
{'CWE-639', 'CWE-502', 'CWE-807'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-41129', 'https://github.com/pterodactyl/panel/blob/v1.6.2/CHANGELOG.md#v162', 'https://github.com/pterodactyl/panel/releases/tag/v1.6.2', 'https://github.com/pterodactyl/panel/security/advisories/GHSA-5vfx-8w6m-h3v4', 'https://github.com/pterodactyl/panel', 'https://github.co...
null
{'https://github.com/pterodactyl/panel/commit/4a84c36009be10dbd83051ac1771662c056e4977'}
{'https://github.com/pterodactyl/panel/commit/4a84c36009be10dbd83051ac1771662c056e4977'}
Packagist
GHSA-53m6-44rc-h2q5
Missing server signature validation in OctoberCMS
### Impact This advisory affects authors of plugins and themes listed on the October CMS marketplace where an end-user will inadvertently expose authors to potential financial loss by entering their private license key into a compromised server. It has been disclosed that a project fork of October CMS v1.0 is using a...
{'CVE-2022-23655'}
2022-03-08T18:23:38Z
2022-02-24T13:09:30Z
MODERATE
null
{'CWE-347'}
{'https://github.com/octobercms/october/security/advisories/GHSA-53m6-44rc-h2q5', 'https://github.com/octobercms/october', 'https://github.com/octobercms/october/commit/e3b455ad587282f0fbcb7763c6d9c3d000ca1e6a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23655'}
null
{'https://github.com/octobercms/october/commit/e3b455ad587282f0fbcb7763c6d9c3d000ca1e6a'}
{'https://github.com/octobercms/october/commit/e3b455ad587282f0fbcb7763c6d9c3d000ca1e6a'}
Packagist
GHSA-qwpp-fgrj-h78q
Exposure of Sensitive Information to an Unauthorized Actor
Shopware is an open source eCommerce platform. Versions prior to 5.6.10 are vulnerable to system information leakage in error handling. Users are recommend to update to version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview.
{'CVE-2021-32712'}
2021-06-25T15:32:28Z
2021-09-08T17:59:46Z
MODERATE
null
{'CWE-200'}
{'https://github.com/shopware/shopware/commit/dcb24eb5ec757c991b5a4e2ddced379e5820744d', 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32712', 'https://github.com/shopware/shopware/security/advisories/GHSA-9vxv-wpv4-f52p'}
null
{'https://github.com/shopware/shopware/commit/dcb24eb5ec757c991b5a4e2ddced379e5820744d'}
{'https://github.com/shopware/shopware/commit/dcb24eb5ec757c991b5a4e2ddced379e5820744d'}
Packagist
GHSA-g4m9-5hpf-hx72
Firewall configured with unanimous strategy was not actually unanimous in Symfony
Description ----------- On Symfony before 4.4.0, when a `Firewall` checks an access control rule (using the unanimous strategy), it iterates over all rule attributes and grant access only if *all* calls to the `accessDecisionManager` decide to grant access. As of Symfony 4.4.0, a bug was introduced that prevents the ...
{'CVE-2020-5275'}
2021-01-14T17:48:29Z
2020-03-30T20:09:44Z
HIGH
null
{'CWE-285'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C36JLPHUPKDFAX6D5WYFC4ALO2K7RDUQ/', 'https://github.com/symfony/symfony/security/advisories/GHSA-g4m9-5hpf-hx72', 'https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf', 'https://nvd.nist.gov/v...
null
{'https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf'}
{'https://github.com/symfony/symfony/commit/c935e4a3fba6cc2ab463a6ca382858068d63cebf'}
Packagist
GHSA-59qh-g7m4-j9m9
Cross-site Scripting in livehelperchat
Stored XSS attacks exist in new the form creation flow. New forms can be given a title which will render javascript.
{'CVE-2022-0374'}
2022-02-02T16:05:01Z
2022-01-28T23:06:12Z
MODERATE
null
{'CWE-79'}
{'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102', 'https://huntr.dev/bounties/f8b560a6-aa19-4262-8ae4-cf88204310ef', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0374', 'https://github.com/livehelperchat/livehelperchat/'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102'}
{'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102'}
Packagist
GHSA-m5vr-3m74-jwxp
Missing Required Cryptographic Step Leading to Sensitive Information Disclosure in TYPO3 CMS
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (8.2) > * CWE-325, CWE-20, CWE-200, CWE-502 ### Problem It has been discovered that an internal verification mechanism can be used to generate arbitrary checksums. This allows to inject arbitrary data having a valid cryptographic message...
{'CVE-2020-15098'}
2021-11-19T15:43:34Z
2020-07-29T16:15:19Z
HIGH
null
{'CWE-327', 'CWE-200', 'CWE-325', 'CWE-20', 'CWE-502'}
{'https://nvd.nist.gov/vuln/detail/CVE-2016-5091', 'https://github.com/TYPO3/TYPO3.CMS', 'https://typo3.org/security/advisory/typo3-core-sa-2020-008', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15098', 'https://github.com/TYPO3/TYPO3.CMS/commit/85d3e70dff35a99ef53f4b561114acfa9e5c47e1', 'https://typo3.org/security/advi...
null
{'https://github.com/TYPO3/TYPO3.CMS/commit/85d3e70dff35a99ef53f4b561114acfa9e5c47e1'}
{'https://github.com/TYPO3/TYPO3.CMS/commit/85d3e70dff35a99ef53f4b561114acfa9e5c47e1'}
Packagist
GHSA-2v82-5746-vwqc
XSS in doc_link
### Impact Users of MySQL, MariaDB, PgSQL and SQLite are affected. XSS is in most cases prevented by strict CSP in all modern browsers. The only exception is when Adminer is using a `pdo_` extension to communicate with the database (it is used if the native extensions are not enabled). In browsers without CSP, Adminer ...
{'CVE-2021-29625'}
2022-03-18T17:49:28Z
2022-03-18T17:49:28Z
HIGH
null
{'CWE-79'}
{'https://github.com/vrana/adminer/security/advisories/GHSA-2v82-5746-vwqc', 'https://github.com/vrana/adminer/commit/4043092ec2c0de2258d60a99d0c5958637d051a7', 'https://sourceforge.net/p/adminer/bugs-and-features/797/', 'https://packagist.org/packages/vrana/adminer', 'https://nvd.nist.gov/vuln/detail/CVE-2021-29625'}
null
{'https://github.com/vrana/adminer/commit/4043092ec2c0de2258d60a99d0c5958637d051a7'}
{'https://github.com/vrana/adminer/commit/4043092ec2c0de2258d60a99d0c5958637d051a7'}
Packagist
GHSA-3pc2-fm7p-q2vg
Cross-site Scripting in October
### Impact Pasting content copied from malicious websites into the Froala richeditor could result in a successful self-XSS attack. ### Patches Issue has been patched in Build 467 (v1.0.467). ### Workarounds Apply https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5 to your installatio...
{'CVE-2020-4061'}
2021-03-04T18:26:09Z
2020-07-02T16:55:11Z
LOW
null
{'CWE-79'}
{'https://research.securitum.com/the-curious-case-of-copy-paste/', 'https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5', 'https://github.com/octobercms/october/security/advisories/GHSA-3pc2-fm7p-q2vg', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4061'}
null
{'https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5'}
{'https://github.com/octobercms/october/commit/b384954a29b89117e1c0d6035b3ede4f46df67c5'}
Packagist
GHSA-f7xw-46vh-5jw2
livehelperchat is vulnerable to Cross-site Scripting
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-4132'}
2022-01-04T20:12:09Z
2022-01-05T20:33:47Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4132', 'https://github.com/livehelperchat/livehelperchat', 'https://github.com/livehelperchat/livehelperchat/commit/55b1e3bf62c564db7c919f5293ec1e755c2958d6', 'https://huntr.dev/bounties/7eb80e7c-bb7a-478d-9760-0ea2fa9dc0c2'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/55b1e3bf62c564db7c919f5293ec1e755c2958d6'}
{'https://github.com/livehelperchat/livehelperchat/commit/55b1e3bf62c564db7c919f5293ec1e755c2958d6'}
Packagist
GHSA-8c5p-4362-9333
Path traversal in grav
grav is vulnerable to Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
{'CVE-2021-3924'}
2021-11-08T21:30:39Z
2021-11-10T16:48:15Z
HIGH
null
{'CWE-22'}
{'https://huntr.dev/bounties/7ca13522-d0c9-4eff-a7dd-6fd1a7f205a2', 'https://github.com/getgrav/grav', 'https://github.com/getgrav/grav/commit/8f9c417c04b89dc8d2de60b95e7696821b2826ce', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3924'}
null
{'https://github.com/getgrav/grav/commit/8f9c417c04b89dc8d2de60b95e7696821b2826ce'}
{'https://github.com/getgrav/grav/commit/8f9c417c04b89dc8d2de60b95e7696821b2826ce'}
Packagist
GHSA-6gw4-x63h-5499
Ability to switch customer email address on account detail page and stay verified
### Impact The user may register in a shop by email mail@example.com, verify it, change it to the mail another@domain.com and stay verified and enabled. This may lead to having accounts addressed to totally different emails, that were verified. Note, that this way one is not able to take over any existing account (gues...
{'CVE-2020-15245'}
2021-11-19T13:51:50Z
2020-10-19T20:40:59Z
MODERATE
null
{'CWE-79', 'CWE-862'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15245', 'https://github.com/Sylius/Sylius', 'https://github.com/Sylius/Sylius/security/advisories/GHSA-6gw4-x63h-5499', 'https://github.com/Sylius/Sylius/commit/60636d711a4011e8694d10d201b53632c7e8ecaf'}
null
{'https://github.com/Sylius/Sylius/commit/60636d711a4011e8694d10d201b53632c7e8ecaf'}
{'https://github.com/Sylius/Sylius/commit/60636d711a4011e8694d10d201b53632c7e8ecaf'}
Packagist
GHSA-xhr8-mpwq-2rr2
Automatic named constructor discovery in Valinor
## Design issue - automatic constructor discovery The issue arises when upgrading from `cuyz/valinor:0.3.0` to a newer system on an existing application, which broke due to the wrong constructor being picked. Still, a bigger security concern is problematic, and it is akin to https://github.com/rails/rails/issues/5228...
null
2022-04-01T13:39:45Z
2022-04-01T13:39:45Z
HIGH
null
null
{'https://github.com/CuyZ/Valinor', 'https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b', 'https://github.com/CuyZ/Valinor/security/advisories/GHSA-xhr8-mpwq-2rr2', 'https://github.com/CuyZ/Valinor/releases/tag/0.7.0'}
null
{'https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b'}
{'https://github.com/CuyZ/Valinor/commit/718d3c1bc2ea7d28b4b1f6c062addcd1dde8660b'}
Packagist
GHSA-5jfw-35xp-5m42
Buffer length underflow in LoginPacket causing unchecked exceptions to be thrown
### Impact `LoginPacket` uses `BinaryStream->getLInt()` to read the lengths of JSON payloads it wants to decode. Unfortunately, `BinaryStream->getLInt()` returns a signed integer, meaning that a malicious client can craft a packet with a large uint32 value for payload buffer size (which would be interpreted as a negati...
null
2022-04-05T17:53:22Z
2022-04-05T17:53:22Z
HIGH
null
{'CWE-124'}
{'https://github.com/pmmp/BedrockProtocol', 'https://github.com/pmmp/BedrockProtocol/security/advisories/GHSA-5jfw-35xp-5m42', 'https://github.com/pmmp/BedrockProtocol/commit/e3fce7632b94e83fd6a518a87dcaf6a11681c4ac'}
null
{'https://github.com/pmmp/BedrockProtocol/commit/e3fce7632b94e83fd6a518a87dcaf6a11681c4ac'}
{'https://github.com/pmmp/BedrockProtocol/commit/e3fce7632b94e83fd6a518a87dcaf6a11681c4ac'}
Packagist
GHSA-57qf-82hh-2hmc
Cross-site Scripting in LiveHelperChat
LiveHelperChat prior to version 3.93 is vulnerable to cross-site scripting.
{'CVE-2022-0502'}
2022-02-14T22:30:19Z
2022-02-07T00:00:30Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/34f2aa30-de7f-432a-8749-b43d2774140f', 'https://github.com/livehelperchat/livehelperchat', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0502', 'https://github.com/livehelperchat/livehelperchat/commit/d3b107aaa8ec10816acc762d60e7321079c21706'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/d3b107aaa8ec10816acc762d60e7321079c21706'}
{'https://github.com/livehelperchat/livehelperchat/commit/d3b107aaa8ec10816acc762d60e7321079c21706'}
Packagist
GHSA-8c9x-wfgj-v78w
Open Redirect in showdoc
showdoc is vulnerable to URL Redirection to Untrusted Site
{'CVE-2021-4000'}
2021-12-06T21:57:44Z
2021-12-16T15:31:58Z
MODERATE
null
{'CWE-601'}
{'https://huntr.dev/bounties/e4d803e0-3104-432c-80b3-34bc453c8962', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4000', 'https://github.com/star7th/showdoc/commit/c7f10033eba5f2b5a537f9af9ba2379138e67138', 'https://github.com/star7th/showdoc'}
null
{'https://github.com/star7th/showdoc/commit/c7f10033eba5f2b5a537f9af9ba2379138e67138'}
{'https://github.com/star7th/showdoc/commit/c7f10033eba5f2b5a537f9af9ba2379138e67138'}
Packagist
GHSA-h9vc-2p9g-63gp
Exposure of Sensitive Information to an Unauthorized Actor in pimcore
Exposure of Sensitive Information to an Unauthorized Actor in Packagist pimcore/pimcore prior to 10.3.1.
{'CVE-2022-0565'}
2022-02-24T13:10:51Z
2022-02-15T00:02:47Z
HIGH
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0565', 'https://huntr.dev/bounties/b0b29656-4bbe-41cf-92f6-8579df0b6de5', 'https://github.com/pimcore/pimcore/', 'https://github.com/pimcore/pimcore/commit/7697f709a501860144352696e583a2533a6e1245'}
null
{'https://github.com/pimcore/pimcore/commit/7697f709a501860144352696e583a2533a6e1245'}
{'https://github.com/pimcore/pimcore/commit/7697f709a501860144352696e583a2533a6e1245'}
Packagist
GHSA-7vxc-chqj-h83g
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
showdoc is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-4168'}
2022-01-07T16:11:21Z
2022-01-06T22:02:18Z
MODERATE
null
{'CWE-352'}
{'https://github.com/star7th/showdoc/commit/3ff0c85d439ccbdfadeb96b5a52acf6318041109', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4168', 'https://huntr.dev/bounties/f14431e2-f1f6-4331-ba91-a4ea8b26be0c'}
null
{'https://github.com/star7th/showdoc/commit/3ff0c85d439ccbdfadeb96b5a52acf6318041109'}
{'https://github.com/star7th/showdoc/commit/3ff0c85d439ccbdfadeb96b5a52acf6318041109'}
Packagist
GHSA-xhfx-hgmf-v6vp
Potential Host Header Poisoning on misconfigured servers
### Impact When running on servers that are configured to accept a wildcard as a hostname (i.e. the server routes any request, regardless of the HOST header to an October CMS instance) the potential exists for Host Header Poisoning attacks to succeed. See the following resources for more information on Host Header Pois...
{'CVE-2021-21265'}
2021-03-10T21:07:08Z
2021-03-10T21:07:25Z
LOW
null
{'CWE-644'}
{'https://packagist.org/packages/october/backend', 'https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21265', 'https://github.com/octobercms/october/security/advisories/GHSA-xhfx-hgmf-v6vp', 'https://github.com/octobercms/library/commit/f8...
null
{'https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6', 'https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0'}
{'https://github.com/octobercms/library/commit/f86fcbcd066d6f8b939e8fe897409d152b11c3c6', 'https://github.com/octobercms/october/commit/f638d3f78cfe91d7f6658820f9d5e424306a3db0'}
Packagist
GHSA-9chx-2vqw-8vq5
Path Traversal in the Logs plugin for Craft CMS
The Logs plugin before 3.0.4 for Craft CMS allows remote attackers to read arbitrary files via input to actionStream in Controller.php.
{'CVE-2022-23409'}
2022-02-08T16:08:49Z
2022-02-01T00:01:00Z
MODERATE
null
{'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-23409', 'https://sec-consult.com/vulnerability-lab/', 'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4', 'https://github.com/ethercreative/logs', 'http://packetstormsecurity.com/files/165706/Ethercreative-Logs-3.0.3-Path-Traversal.html', ...
null
{'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4'}
{'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4'}
Packagist
GHSA-rr8m-29g8-8cgc
SQL Injection in Fork CMS
Fork CMS is vulnerable to SQL injection through marking blog comments on bulk as spam in versions prior to 5.11.1.
{'CVE-2022-1064'}
2022-04-01T20:06:24Z
2022-03-26T00:00:32Z
HIGH
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1064', 'https://github.com/forkcms/forkcms/commit/6aca30e10b4181534f73f96d6e2ebeb45ec15069', 'https://github.com/forkcms/forkcms', 'https://huntr.dev/bounties/2f664985-c5fc-485b-b4fc-4c401be2cf40'}
null
{'https://github.com/forkcms/forkcms/commit/6aca30e10b4181534f73f96d6e2ebeb45ec15069'}
{'https://github.com/forkcms/forkcms/commit/6aca30e10b4181534f73f96d6e2ebeb45ec15069'}
Packagist
GHSA-2xhg-w2g5-w95x
CSV Injection in symfony/serializer
Description ----------- CSV Injection, also known as Formula Injection, occurs when websites embed untrusted input inside CSV files. When a spreadsheet program opens a CSV, any cell starting with `=` is interpreted by the software as a formula and could be abused by an attacker. In Symfony 4.1, we've added the opt-in...
{'CVE-2021-41270'}
2021-12-06T21:36:47Z
2021-11-24T21:01:23Z
MODERATE
null
{'CWE-1236'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QSREFD2TJT5LWKM6S4MD3W26NQQ5WJUP/', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41270', 'https://github.com/symfony/symfony/security/advisories/GHSA-2xhg-w2g5-w95x', 'https://github.com/symfony/symfony/releases/tag/v5.3.12',...
null
{'https://github.com/symfony/symfony/commit/3da6f2d45e7536ccb2a26f52fbaf340917e208a8'}
{'https://github.com/symfony/symfony/commit/3da6f2d45e7536ccb2a26f52fbaf340917e208a8'}
Packagist
GHSA-rf3w-29h3-r636
Arbitrary Code Execution in feehi/cms
An arbitrary file upload vulnerability in Feehi CMS v2.0.8 and below allows attackers to execute arbitrary code via a crafted PHP file.
{'CVE-2020-21322'}
2021-09-17T17:54:21Z
2021-09-20T20:45:35Z
HIGH
null
{'CWE-434'}
{'https://github.com/liufee/cms', 'https://nvd.nist.gov/vuln/detail/CVE-2020-21322', 'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9', 'https://github.com/liufee/cms/issues/44'}
null
{'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9'}
{'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9'}
Packagist
GHSA-pccm-j6vj-jwwf
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.webma` file upload.
{'CVE-2022-0962'}
2022-03-29T18:54:13Z
2022-03-15T00:00:54Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/7ebe3e5f-2c86-44de-b83e-2ddb6bbda908', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0962', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
null
{'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
{'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
Packagist
GHSA-pq2f-3fg3-rw99
SQL Injection in WordPress Zero Spam WordPress plugin
The WordPress Zero Spam WordPress plugin before 5.2.13 does not properly sanitise and escape the order and orderby parameters before using them in a SQL statement in the admin dashboard, leading to a SQL injection
{'CVE-2022-0254'}
2022-03-29T15:26:17Z
2022-03-15T00:00:57Z
CRITICAL
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0254', 'https://plugins.trac.wordpress.org/changeset/2680906', 'https://github.com/Highfivery/zero-spam-for-wordpress', 'https://plugins.trac.wordpress.org/changeset/2660225', 'https://github.com/Highfivery/zero-spam-for-wordpress/commit/49723f696f1e2f2a76ac89375910bb036a4895...
null
{'https://github.com/Highfivery/zero-spam-for-wordpress/commit/49723f696f1e2f2a76ac89375910bb036a4895f3'}
{'https://github.com/Highfivery/zero-spam-for-wordpress/commit/49723f696f1e2f2a76ac89375910bb036a4895f3'}
Packagist
GHSA-v4cr-m5f8-gxw8
yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF)
yetiforcecrm is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-4092'}
2021-12-15T15:20:43Z
2021-12-16T14:14:56Z
MODERATE
null
{'CWE-352'}
{'https://github.com/yetiforcecompany/yetiforcecrm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4092', 'https://github.com/yetiforcecompany/yetiforcecrm/commit/585da04bb72d36a894f6ea5939ab909e53fd8c23', 'https://huntr.dev/bounties/7b58c160-bb62-45fe-ad1f-38354378b89e'}
null
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/585da04bb72d36a894f6ea5939ab909e53fd8c23'}
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/585da04bb72d36a894f6ea5939ab909e53fd8c23'}
Packagist
GHSA-m8rp-q82r-c5mf
Cross-site Scripting in microweber
Cross-site Scripting (XSS) - Stored in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0278'}
2022-01-27T18:31:46Z
2022-01-21T18:06:49Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/64495d0f-d5ec-4542-9693-32372c18d030', 'https://github.com/microweber/microweber/commit/b64ef574b82dbf89a908e1569d790c7012d1ccd7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0278', 'https://github.com/microweber/microweber'}
null
{'https://github.com/microweber/microweber/commit/b64ef574b82dbf89a908e1569d790c7012d1ccd7'}
{'https://github.com/microweber/microweber/commit/b64ef574b82dbf89a908e1569d790c7012d1ccd7'}
Packagist
GHSA-x3g3-jh26-76cf
Cross-site Scripting in livehelperchat
LiveHelperChat is vulnerable to Stored XSS at the Name field in the Admin themes of System configuration.
{'CVE-2022-0375'}
2022-02-02T16:05:32Z
2022-01-28T23:06:00Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0375', 'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102', 'https://github.com/livehelperchat/livehelperchat/', 'https://huntr.dev/bounties/28e1c356-6eaa-4d93-af56-938e3b4d40a7'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102'}
{'https://github.com/livehelperchat/livehelperchat/commit/bbfaa26ce54a2a86ce1a42a16496038f5bdfc102'}
Packagist
GHSA-6vx5-cg2p-7g5v
Unrestricted Upload of File with Dangerous Type in microweber
Unrestricted Upload of File with Dangerous Type in GitHub repository microweber/microweber prior to 1.2.12.
{'CVE-2022-0912'}
2022-03-22T21:37:48Z
2022-03-12T00:00:35Z
MODERATE
null
{'CWE-434'}
{'https://github.com/microweber/microweber/commit/24245297231f5dc88bb3a2b20d0e4e25b0ebc789', 'https://huntr.dev/bounties/ae5bb359-7e53-498b-848e-540c05b44c54', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0912'}
null
{'https://github.com/microweber/microweber/commit/24245297231f5dc88bb3a2b20d0e4e25b0ebc789'}
{'https://github.com/microweber/microweber/commit/24245297231f5dc88bb3a2b20d0e4e25b0ebc789'}
Packagist
GHSA-qjhr-c23f-w76q
Inline JS XSS vulnerability in Mautic
### Impact Mautic version 2.1.0 - 2.11.0 is vulnerable to an inline JS XSS attack when using Mautic forms on a Mautic landing page using GET parameters to pre-populate the form. ### Patches Upgrade to 2.12.0 or later. ### Workarounds None ### References https://github.com/mautic/mautic/releases/tag/2.12.0 ### For ...
{'CVE-2017-1000488'}
2021-01-19T21:14:13Z
2021-01-19T21:16:24Z
MODERATE
null
{'CWE-79'}
{'https://github.com/mautic/mautic/releases/tag/2.12.0', 'https://github.com/mautic/mautic/security/advisories/GHSA-qjhr-c23f-w76q', 'https://github.com/mautic/mautic/commit/bda60c0eefbd19c759589e975e63ab1d201c1b8e', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000488'}
null
{'https://github.com/mautic/mautic/commit/bda60c0eefbd19c759589e975e63ab1d201c1b8e'}
{'https://github.com/mautic/mautic/commit/bda60c0eefbd19c759589e975e63ab1d201c1b8e'}
Packagist
GHSA-8rc5-hx3v-2jg7
Sanitizer bypass in svg-sanitizer
It is possible to bypass enshrined/svg-sanitize before 0.13.1 using the "xlink:href" attribute due to mishandling of the xlink namespace by the sanitizer.
{'CVE-2019-10772'}
2021-08-19T19:25:06Z
2020-02-27T20:36:29Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2019-10772', 'https://snyk.io/vuln/SNYK-PHP-ENSHRINEDSVGSANITIZE-536969', 'https://github.com/darylldoyle/svg-sanitizer/commit/6add43e5c5649bc40e3afcb68c522720dcb336f9'}
null
{'https://github.com/darylldoyle/svg-sanitizer/commit/6add43e5c5649bc40e3afcb68c522720dcb336f9'}
{'https://github.com/darylldoyle/svg-sanitizer/commit/6add43e5c5649bc40e3afcb68c522720dcb336f9'}
Packagist
GHSA-vhfp-9wvj-gwvg
XML External Entity vulnerability in MODX CMS
A XML External Entity (XXE) vulnerability was discovered in the modRestServiceRequest component in MODX CMS 2.7.3 which can lead to an information disclosure or denial of service (DOS).
{'CVE-2020-25911'}
2021-11-03T14:51:31Z
2021-11-01T19:19:43Z
CRITICAL
null
{'CWE-611'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-25911', 'https://github.com/modxcms/revolution', 'https://github.com/dahua966/Vul_disclose/blob/main/XXE_modxcms.md', 'https://github.com/modxcms/revolution/pull/15238/commits/1b7ffe02df30f05dbf67dd15e4d8101687c1585a', 'https://github.com/modxcms/revolution/issues/15237', 'ht...
null
{'https://github.com/modxcms/revolution/pull/15238/commits/1b7ffe02df30f05dbf67dd15e4d8101687c1585a'}
{'https://github.com/modxcms/revolution/pull/15238/commits/1b7ffe02df30f05dbf67dd15e4d8101687c1585a'}
Packagist
GHSA-cxg7-84wp-8pcq
yetiforcecrm is vulnerable to Business Logic Errors
yetiforcecrm is vulnerable to Business Logic Errors.
{'CVE-2021-4117'}
2022-01-03T15:47:42Z
2021-12-16T21:01:07Z
HIGH
null
null
{'https://github.com/yetiforcecompany/yetiforcecrm', 'https://github.com/yetiforcecompany/yetiforcecrm/commit/8dccd93442725f245b4b71986bbe6f4f48639239', 'https://huntr.dev/bounties/0b81e572-bdc9-4caf-aa02-81f3c7ad7c0a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4117'}
null
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/8dccd93442725f245b4b71986bbe6f4f48639239'}
{'https://github.com/yetiforcecompany/yetiforcecrm/commit/8dccd93442725f245b4b71986bbe6f4f48639239'}
Packagist
GHSA-5rg2-6qr5-2xp8
Cross-site Scripting in snipe-it
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-3863'}
2021-10-25T20:08:18Z
2021-10-21T17:49:18Z
MODERATE
null
{'CWE-79'}
{'https://github.com/snipe/snipe-it/releases/tag/v5.3.0', 'https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128', 'https://github.com/snipe/snipe-it', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3863', 'https://huntr.dev/bounties/1dbc8d79-1b53-44a3-a576-faec78f29ba0'}
null
{'https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128'}
{'https://github.com/snipe/snipe-it/commit/fc5efd857f61f7e45c61db567bb66612bcb53128'}
Packagist
GHSA-9vh6-qfv6-vcqp
snipe-IT vulnerable to host header injection
Snipe-IT is a free, open-source IT asset/license management systemIn Snipe-IT, versions v3.0-alpha to v5.3.7 are vulnerable to Host Header Injection. By sending a specially crafted host header in the reset password request, it is possible to send password reset links to users which once clicked lead to an attacker cont...
{'CVE-2022-23064'}
2022-05-03T06:29:50Z
2022-05-03T00:00:43Z
HIGH
null
{'CWE-74'}
{'https://github.com/snipe/snipe-it/commit/0c4768fd2a11ac26a61814cef23a71061bfd8bcc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23064', 'https://github.com/snipe/snipe-it', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-23064'}
null
{'https://github.com/snipe/snipe-it/commit/0c4768fd2a11ac26a61814cef23a71061bfd8bcc'}
{'https://github.com/snipe/snipe-it/commit/0c4768fd2a11ac26a61814cef23a71061bfd8bcc'}
Packagist
GHSA-p3w3-4ppm-c3f6
Cross site scripting in FacturaScripts
FacturaScripts prior to version 2022.06 is vulnerable to stored cross-site scripting via upload plugin functionality in zip format.
{'CVE-2022-1514'}
2022-04-29T21:02:47Z
2022-04-29T00:00:23Z
CRITICAL
null
{'CWE-79'}
{'https://github.com/neorazorx/facturascripts/commit/aa9f28cb86467468f43486b77ddef7ff4d3c687e', 'https://github.com/NeoRazorX/facturascripts', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1514', 'https://huntr.dev/bounties/4ae2a917-843a-4ae4-8197-8425a596761c'}
null
{'https://github.com/neorazorx/facturascripts/commit/aa9f28cb86467468f43486b77ddef7ff4d3c687e'}
{'https://github.com/neorazorx/facturascripts/commit/aa9f28cb86467468f43486b77ddef7ff4d3c687e'}
Packagist
GHSA-2v7p-f4qm-r5pc
SQL Injection found in Pimcore
Pimcore is an open source data & experience management platform. A SQL injection was discovered in GridHelperService.php in GitHub repository pimcore/pimcore prior to 10.3.6.
{'CVE-2022-1429'}
2022-05-03T21:01:41Z
2022-04-23T00:03:03Z
HIGH
null
{'CWE-89'}
{'https://huntr.dev/bounties/cfba30b4-85fa-4499-9160-cd6e3119310e', 'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/commit/523a735ab94f004459b84ffdfd3db784586bbd82', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1429'}
null
{'https://github.com/pimcore/pimcore/commit/523a735ab94f004459b84ffdfd3db784586bbd82'}
{'https://github.com/pimcore/pimcore/commit/523a735ab94f004459b84ffdfd3db784586bbd82'}
Packagist
GHSA-6gm7-j668-w6h9
SQL Injection in Pimcore
Pimcore prior to version 10.3.5 is vulnerable SQL injection in RecyclebinController.php. This vulnerability affects data confidentiality.
{'CVE-2022-1219'}
2022-04-22T20:42:11Z
2022-04-09T00:00:30Z
HIGH
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1219', 'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/f700bd18-1fd3-4a05-867f-07176aebc7f6', 'https://github.com/pimcore/pimcore/commit/a697830359df06246acca502ee2455614de68017'}
null
{'https://github.com/pimcore/pimcore/commit/a697830359df06246acca502ee2455614de68017'}
{'https://github.com/pimcore/pimcore/commit/a697830359df06246acca502ee2455614de68017'}
Packagist
GHSA-m4hj-wg2r-qpcr
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
showdoc is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3776'}
2021-11-17T21:10:57Z
2021-11-15T23:13:34Z
MODERATE
null
{'CWE-352'}
{'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3776', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/e0edf27d-437e-44fe-907a-df020f385304'}
null
{'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'}
{'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'}