ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Packagist | GHSA-gf8j-v8x5-h9qp | XSS in enshrined/svg-sanitize due to mishandled script and data values in attributes | enshrined/svg-sanitize before 0.12.0 mishandles script and data values in attributes, as demonstrated by unexpected whitespace such as in the javascript	:alert substring. | {'CVE-2019-18857'} | 2022-02-16T22:20:26Z | 2020-01-08T17:15:37Z | HIGH | null | {'CWE-79'} | {'https://github.com/darylldoyle/svg-sanitizer/commit/51ca4b713f3706d6b27769c6296bbc0c28a5bbd0', 'https://github.com/darylldoyle/svg-sanitizer/compare/0.11.0...0.12.0', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18857', 'https://github.com/darylldoyle/svg-sanitizer'} | null | {'https://github.com/darylldoyle/svg-sanitizer/commit/51ca4b713f3706d6b27769c6296bbc0c28a5bbd0'} | {'https://github.com/darylldoyle/svg-sanitizer/commit/51ca4b713f3706d6b27769c6296bbc0c28a5bbd0'} |
Packagist | GHSA-mf79-f657-47ww | Insufficient Session Expiration in Admidio | Admidio prior to version 4.1.9 is vulnerable to insufficient session expiration. In vulnerable versions, changing the password in one session does not terminate sessions logged in with the old password, which could lead to unauthorized actors maintaining access to an account. | {'CVE-2022-0991'} | 2022-03-28T15:39:13Z | 2022-03-20T00:00:29Z | HIGH | null | {'CWE-613'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0991', 'https://github.com/Admidio/admidio/issues/1238', 'https://github.com/Admidio/admidio', 'https://huntr.dev/bounties/1c406a4e-15d0-4920-8495-731c48473ba4', 'https://github.com/admidio/admidio/commit/e84e472ebe517e2ff5795c46dc10b5f49dc4d46a', 'https://github.com/Admidio/... | null | {'https://github.com/admidio/admidio/commit/e84e472ebe517e2ff5795c46dc10b5f49dc4d46a'} | {'https://github.com/admidio/admidio/commit/e84e472ebe517e2ff5795c46dc10b5f49dc4d46a'} |
Packagist | GHSA-vrgh-5w3c-ggf8 | showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) | showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG). | {'CVE-2021-3990'} | 2021-12-03T15:18:33Z | 2021-12-03T20:38:50Z | MODERATE | null | {'CWE-338'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3990', 'https://github.com/star7th/showdoc/commit/a9886f26c08225e0adca75c67dfca3f7c42b87d0', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/0680067d-56a7-4412-b06e-a267e850ae9f'} | null | {'https://github.com/star7th/showdoc/commit/a9886f26c08225e0adca75c67dfca3f7c42b87d0'} | {'https://github.com/star7th/showdoc/commit/a9886f26c08225e0adca75c67dfca3f7c42b87d0'} |
Packagist | GHSA-vhm6-gw82-6f8j | Cross site scripting in LibreNMS | LibreNMS prior to version 22.2.2 is vulnerable to cross-site scripting. | {'CVE-2022-0772'} | 2022-03-08T18:06:06Z | 2022-02-28T00:00:34Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0772', 'https://huntr.dev/bounties/faae29bd-c43a-468d-8af6-2b6aa4d40f09', 'https://github.com/librenms/librenms/commit/703745d0ed3948623153117d761ce48514e2f281', 'https://github.com/librenms/librenms'} | null | {'https://github.com/librenms/librenms/commit/703745d0ed3948623153117d761ce48514e2f281'} | {'https://github.com/librenms/librenms/commit/703745d0ed3948623153117d761ce48514e2f281'} |
Packagist | GHSA-xh55-2fqp-p775 | Command injection in mail agent settings | ### Impact
Command injection in mail agent settings
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2... | {'CVE-2021-37708'} | 2021-08-26T19:40:02Z | 2021-08-30T16:14:09Z | HIGH | null | {'CWE-77'} | {'https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37708', 'https://github.com/shopware/platform/security/advisories/GHSA-xh55-2fqp-p775', 'https://github.com/shopware/platform'} | null | {'https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa'} | {'https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa'} |
Packagist | GHSA-w2pm-r78h-4m7v | OS Command Injection in Laravel Framework | OS Command injection vulnerability in function link in Filesystem.php in Laravel Framework before 5.8.17. | {'CVE-2020-19316'} | 2022-01-05T17:39:12Z | 2022-01-06T23:13:42Z | HIGH | null | {'CWE-78'} | {'https://github.com/laravel/framework', 'https://nvd.nist.gov/vuln/detail/CVE-2020-19316', 'http://www.netbytesec.com/advisories/OSCommandInjectionInLaravelFramework/', 'https://github.com/laravel/framework/commit/44c3feb604944599ad1c782a9942981c3991fa31'} | null | {'https://github.com/laravel/framework/commit/44c3feb604944599ad1c782a9942981c3991fa31'} | {'https://github.com/laravel/framework/commit/44c3feb604944599ad1c782a9942981c3991fa31'} |
Packagist | GHSA-8x44-pwr2-rgc6 | Cross-site Scripting in pimcore | Pimcore settings module is vulnerable to stored cross site scripting | {'CVE-2022-0348'} | 2022-02-03T19:56:45Z | 2022-01-28T23:05:03Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0348', 'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/commit/832c34aeb9f21f213295a0c28377132df996352a', 'https://huntr.dev/bounties/250e79be-7e5d-4ba3-9c34-655e39ade2f4'} | null | {'https://github.com/pimcore/pimcore/commit/832c34aeb9f21f213295a0c28377132df996352a'} | {'https://github.com/pimcore/pimcore/commit/832c34aeb9f21f213295a0c28377132df996352a'} |
Packagist | GHSA-7h8v-2v8x-h264 | SQL Injection in moodle | In moodle, some database module web services allowed students to add entries within groups they did not belong to. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.8.6, 3.7.9, 3.5.15, and 3.10. | {'CVE-2020-25700'} | 2021-03-24T23:17:53Z | 2021-03-29T20:42:19Z | MODERATE | null | {'CWE-89'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=1895427', 'https://github.com/moodle/moodle/commit/8169aeff59d8ed910ca3545413561005282bbd32', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://moodle.org/mod/forum/discuss.php?d=4139... | null | {'https://github.com/moodle/moodle/commit/8169aeff59d8ed910ca3545413561005282bbd32'} | {'https://github.com/moodle/moodle/commit/8169aeff59d8ed910ca3545413561005282bbd32'} |
Packagist | GHSA-6xxj-gcjq-wgf4 | SQL injection in prestashop/prestashop | ### Impact
Blind SQLi using Search filters with `orderBy` and `sortOrder` parameters
### Patches
The problem is fixed in 1.7.8.2 | {'CVE-2021-43789'} | 2021-12-08T19:28:53Z | 2021-12-07T21:23:17Z | HIGH | null | {'CWE-89'} | {'https://github.com/PrestaShop/PrestaShop', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43789', 'https://github.com/PrestaShop/PrestaShop/issues/26623', 'https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.2', 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-6xxj-gcjq-wgf4', 'https://github.co... | null | {'https://github.com/PrestaShop/PrestaShop/commit/6482b9ddc9dcebf7588dbfd616d2d635218408d6'} | {'https://github.com/PrestaShop/PrestaShop/commit/6482b9ddc9dcebf7588dbfd616d2d635218408d6'} |
Packagist | GHSA-w8cj-mvf9-mpc9 | OS Command injection in Bolt | Bolt before 3.7.2 does not restrict filter options in a Request in the Twig context, and is therefore inconsistent with the "How to Harden Your PHP for Better Security" guidance. | {'CVE-2020-28925'} | 2021-04-07T18:29:19Z | 2021-05-06T18:53:29Z | MODERATE | null | {'CWE-78'} | {'https://github.com/bolt/bolt/compare/3.7.1...3.7.2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28925', 'https://github.com/bolt/bolt/commit/c0cd530e78c2a8c6d71ceb75b10c251b39fb923a'} | null | {'https://github.com/bolt/bolt/commit/c0cd530e78c2a8c6d71ceb75b10c251b39fb923a'} | {'https://github.com/bolt/bolt/commit/c0cd530e78c2a8c6d71ceb75b10c251b39fb923a'} |
Packagist | GHSA-32wx-4gxx-h48f | Users can edit the tags of any discussion | This advisory concerns a vulnerability which was patched and publicly released on October 5, 2020.
### Impact
This vulnerability allowed any registered user to edit the tags of any discussion for which they have READ access using the REST API.
Users were able to remove any existing tag, and add any tag in which they ... | null | 2021-01-26T03:45:41Z | 2021-01-29T18:13:32Z | MODERATE | null | {'CWE-639'} | {'https://github.com/flarum/core/issues/2355', 'https://discuss.flarum.org/d/25059-security-update-to-flarum-tags-010-beta132', 'https://github.com/flarum/tags/security/advisories/GHSA-32wx-4gxx-h48f', 'https://packagist.org/packages/flarum/tags', 'https://github.com/flarum/tags/commit/c8fcd000857493f1e4cc00b6f2771ce38... | null | {'https://github.com/flarum/tags/commit/c8fcd000857493f1e4cc00b6f2771ce388b93e9d'} | {'https://github.com/flarum/tags/commit/c8fcd000857493f1e4cc00b6f2771ce388b93e9d'} |
Packagist | GHSA-f545-vpwp-r9j7 | showdoc is vulnerable to URL Redirection to Untrusted Site | showdoc is vulnerable to URL Redirection to Untrusted Site. | {'CVE-2021-3989'} | 2021-12-03T15:18:14Z | 2021-12-03T20:41:35Z | MODERATE | null | {'CWE-601'} | {'https://huntr.dev/bounties/ffc61eff-efea-42c5-92c2-e043fdf904d5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3989', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/335afc7ed6d6627c3d0434aa9acc168c77117614'} | null | {'https://github.com/star7th/showdoc/commit/335afc7ed6d6627c3d0434aa9acc168c77117614'} | {'https://github.com/star7th/showdoc/commit/335afc7ed6d6627c3d0434aa9acc168c77117614'} |
Packagist | GHSA-5fvx-5p2r-4mvp | Open Redirect in firefly-iii | firefly-iii is vulnerable to URL Redirection to Untrusted Site | {'CVE-2021-3851'} | 2021-10-25T20:08:26Z | 2021-10-21T17:48:41Z | MODERATE | null | {'CWE-601'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3851', 'https://huntr.dev/bounties/549a1040-9b5e-420b-9b80-20700dd9d592', 'https://github.com/firefly-iii/firefly-iii/', 'https://github.com/firefly-iii/firefly-iii/commit/8662dfa4c0f71efef61c31dc015c6f723db8318d'} | null | {'https://github.com/firefly-iii/firefly-iii/commit/8662dfa4c0f71efef61c31dc015c6f723db8318d'} | {'https://github.com/firefly-iii/firefly-iii/commit/8662dfa4c0f71efef61c31dc015c6f723db8318d'} |
Packagist | GHSA-34hv-f45p-4qfq | Open redirect in wwbn/avideo | Open redirect vulnerability in objects/login.json.php in WWBN AVideo through 11.6, allows attackers to arbitrarily redirect users from a crafted url to the login page. A patch is available on the `master` branch of the repository. | {'CVE-2022-27463'} | 2022-04-19T14:13:44Z | 2022-04-06T00:01:29Z | MODERATE | null | {'CWE-601'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-27463', 'https://avideo.tube/', 'https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c', 'https://github.com/WWBN/AVideo'} | null | {'https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c'} | {'https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c'} |
Packagist | GHSA-pqm6-cgwr-x6pf | Signature validation bypass in XmlSecLibs | Rob Richards XmlSecLibs, all versions prior to v3.0.3, as used for example by SimpleSAMLphp, performed incorrect validation of cryptographic signatures in XML messages, allowing an authenticated attacker to impersonate others or elevate privileges by creating a crafted XML message. | {'CVE-2019-3465'} | 2021-08-18T22:14:37Z | 2019-11-08T20:06:46Z | HIGH | null | {'CWE-347'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCSR3V6LNWJAD37VQB6M2K7P4RQSCVFG/', 'https://github.com/robrichards/xmlseclibs/commit/0a53d3c3aa87564910cae4ed01416441d3ae0db5', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/messag... | null | {'https://github.com/robrichards/xmlseclibs/commit/0a53d3c3aa87564910cae4ed01416441d3ae0db5'} | {'https://github.com/robrichards/xmlseclibs/commit/0a53d3c3aa87564910cae4ed01416441d3ae0db5'} |
Packagist | GHSA-68v9-3jjq-rvp4 | Exposure of Sensitive Information to an Unauthorized Actor | Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 the admin api has exposed some internal hidden fields when an association has been loaded with a to many reference. Users are recommend to update to version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly v... | {'CVE-2021-32716'} | 2021-06-25T15:30:08Z | 2021-09-08T18:00:40Z | MODERATE | null | {'CWE-200'} | {'https://github.com/shopware/platform/security/advisories/GHSA-gpmh-g94g-qrhr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32716', 'https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-06-2021'} | null | {'https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb'} | {'https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb'} |
Packagist | GHSA-6wrh-279j-6hvw | HTTP caching is marking private HTTP headers as public in Shopware | ### Impact
HTTP caching is marking private HTTP headers as public
## Patches
Fixed in recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
## Workarounds
For older v... | {'CVE-2022-24747'} | 2022-03-18T20:15:05Z | 2022-03-10T17:55:21Z | MODERATE | null | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-24747', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022', 'https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f', 'https://github.com/shopware/platform', 'https://github.com/shopware/platform/security/adviso... | null | {'https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f'} | {'https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f'} |
Packagist | GHSA-rfcf-m67m-jcrq | Authentication granted to all firewalls instead of just one | Description
-----------
When an application defines multiple firewalls, the authenticated token delivered by one of the firewalls is available to all other firewalls. This can be abused when the application defines different providers for different parts of an application. In such a situation, a user authenticated on ... | {'CVE-2021-32693'} | 2021-10-21T13:55:20Z | 2021-06-21T17:03:44Z | HIGH | null | {'CWE-287'} | {'https://github.com/symfony/security-http', 'https://github.com/symfony/symfony/security/advisories/GHSA-rfcf-m67m-jcrq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32693', 'https://symfony.com/blog/cve-2021-32693-authentication-granted-to-all-firewalls-instead-of-just-one', 'https://github.com/symfony/symfony/commit/... | null | {'https://github.com/symfony/symfony/commit/3084764ad82f29dbb025df19978b9cbc3ab34728', 'https://github.com/symfony/security-http/commit/6bf4c31219773a558b019ee12e54572174ff8129'} | {'https://github.com/symfony/symfony/commit/3084764ad82f29dbb025df19978b9cbc3ab34728', 'https://github.com/symfony/security-http/commit/6bf4c31219773a558b019ee12e54572174ff8129'} |
Packagist | GHSA-r64m-qchj-hrjp | Webcache Poisoning in shopware/platform and shopware/core | ### Impact
Webcache Poisoning via X-Forwarded-Prefix and sub-request
### Patches
We recommend updating to the current version 6.4.6.1. You can get the update to 6.4.6.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
Workarounds
For older version... | null | 2021-11-24T19:58:48Z | 2021-11-24T20:05:19Z | CRITICAL | null | {'CWE-444'} | {'https://github.com/shopware/platform/commit/9062f15450d183f2c666664841efd4f5ef25e0f3', 'https://github.com/shopware/platform/security/advisories/GHSA-r64m-qchj-hrjp', 'https://github.com/shopware/platform'} | null | {'https://github.com/shopware/platform/commit/9062f15450d183f2c666664841efd4f5ef25e0f3'} | {'https://github.com/shopware/platform/commit/9062f15450d183f2c666664841efd4f5ef25e0f3'} |
Packagist | GHSA-4rhm-m2fp-hx7q | Potential CSV Injection vector in OctoberCMS | ### Impact
Any users with the ability to modify any data that could eventually be exported as a CSV file from the `ImportExportController` could potentially introduce a CSV injection into the data to cause the generated CSV export file to be malicious. This requires attackers to achieve the following before a successfu... | {'CVE-2020-5299'} | 2021-03-04T18:26:33Z | 2020-06-03T21:58:35Z | MODERATE | null | {'CWE-77'} | {'https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a', 'https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5299', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Delet... | null | {'https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484', 'https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a'} | {'https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a', 'https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484'} |
Packagist | GHSA-42qm-c3cf-9wv2 | Code injection in dolibarr/dolibarr | Improper php function sanitization, lead to an ability to inject arbitrary PHP code and run arbitrary commands on file system. In the function "dol_eval" in file "dolibarr/htdocs/core/lib/functions.lib.php" dangerous PHP functions are sanitized using "str_replace" and can be bypassed using following code in $s paramete... | {'CVE-2022-0819'} | 2022-03-10T15:55:03Z | 2022-03-03T00:00:49Z | HIGH | null | {'CWE-94'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0819', 'https://huntr.dev/bounties/b03d4415-d4f9-48c8-9ae2-d3aa248027b5', 'https://github.com/dolibarr/dolibarr', 'https://github.com/dolibarr/dolibarr/commit/2a48dd349e7de0d4a38e448b0d2ecbe25e968075'} | null | {'https://github.com/dolibarr/dolibarr/commit/2a48dd349e7de0d4a38e448b0d2ecbe25e968075'} | {'https://github.com/dolibarr/dolibarr/commit/2a48dd349e7de0d4a38e448b0d2ecbe25e968075'} |
Packagist | GHSA-gq77-3r6x-383w | Cross-site Scripting in ShowDoc | ShowDoc version 2.10.3 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 2.10.4. | {'CVE-2022-0880'} | 2022-03-23T14:22:08Z | 2022-03-13T00:00:54Z | MODERATE | null | {'CWE-79'} | {'https://github.com/star7th/showdoc/commit/818d7fe731f452acccacf731ce47ec27ad68049c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0880', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/df347aa9-ed9b-4f75-af99-c83b8aad3bcf'} | null | {'https://github.com/star7th/showdoc/commit/818d7fe731f452acccacf731ce47ec27ad68049c'} | {'https://github.com/star7th/showdoc/commit/818d7fe731f452acccacf731ce47ec27ad68049c'} |
Packagist | GHSA-2q66-6cc3-6xm8 | CSRF issue on preview pages in Bolt CMS | ### Impact
Bolt CMS lacked CSRF protection in the preview generating endpoint. Previews are intended to be generated by the admins, developers, chief-editors, and editors, who are authorized to create content in the application. But due to lack of proper CSRF protection, unauthorized users could generate a preview.
#... | {'CVE-2020-4040'} | 2021-01-08T20:13:19Z | 2020-06-09T00:25:41Z | HIGH | null | {'CWE-352'} | {'https://github.com/bolt/bolt/security/advisories/GHSA-2q66-6cc3-6xm8', 'https://github.com/bolt/bolt/pull/7853', 'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4040', 'http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-... | null | {'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f'} | {'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f'} |
Packagist | GHSA-5q5w-mqp6-g2gh | Unrestricted Upload of File with Dangerous Type in jsdecena/laracom | jsdecena/laracom prior to version 2.0.9 is vulnerable to Unrestricted Upload of File with Dangerous Type. | {'CVE-2022-0472'} | 2022-02-11T20:51:14Z | 2022-02-06T00:01:07Z | MODERATE | null | {'CWE-79', 'CWE-434'} | {'https://huntr.dev/bounties/cb5b8563-15cf-408c-9f79-4871ea0a8713', 'https://github.com/jsdecena/laracom', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0472', 'https://github.com/jsdecena/laracom/commit/256026193ce994dc4c1365e02f414d8a0cd77ae8'} | null | {'https://github.com/jsdecena/laracom/commit/256026193ce994dc4c1365e02f414d8a0cd77ae8'} | {'https://github.com/jsdecena/laracom/commit/256026193ce994dc4c1365e02f414d8a0cd77ae8'} |
Packagist | GHSA-hhrj-wp42-32v3 | Generation of Error Message Containing Sensitive Information in microweber | Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11. | {'CVE-2022-0660'} | 2022-02-28T22:18:00Z | 2022-02-19T00:01:36Z | HIGH | null | {'CWE-209'} | {'https://huntr.dev/bounties/01fd2e0d-b8cf-487f-a16c-7b088ef3a291', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0660', 'https://github.com/microweber/microweber/commit/2417bd2eda2aa2868c1dad1abf62341f22bfc20a', 'https://github.com/microweber/microweber'} | null | {'https://github.com/microweber/microweber/commit/2417bd2eda2aa2868c1dad1abf62341f22bfc20a'} | {'https://github.com/microweber/microweber/commit/2417bd2eda2aa2868c1dad1abf62341f22bfc20a'} |
Packagist | GHSA-6x3j-x9rp-whxp | Unrestricted Upload of File with Dangerous Type in showdoc | showdoc prior to 2.10.2 is vulnerable to Unrestricted Upload of File with Dangerous Type. | {'CVE-2022-0409'} | 2022-03-02T20:59:35Z | 2022-02-20T00:00:32Z | HIGH | null | {'CWE-434'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0409', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/c25bfad1-2611-4226-954f-009e50f966f7', 'https://github.com/star7th/showdoc/commit/7383d7a3c1b0807b6f397ba7df415a0ce7ccc436'} | null | {'https://github.com/star7th/showdoc/commit/7383d7a3c1b0807b6f397ba7df415a0ce7ccc436'} | {'https://github.com/star7th/showdoc/commit/7383d7a3c1b0807b6f397ba7df415a0ce7ccc436'} |
Packagist | GHSA-22hc-47cc-7x6f | Cross-site Scripting in Pimcore | Pimcore prior to 10.4.0 is vulnerable to stored cross-site scripting. | {'CVE-2022-0894'} | 2022-03-28T21:38:55Z | 2022-03-16T00:00:48Z | MODERATE | null | {'CWE-79'} | {'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/pull/11447', 'https://huntr.dev/bounties/18f8e85e-3cbf-4915-b649-8cffe99daa95', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0894'} | null | {'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'} | {'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'} |
Packagist | GHSA-54hw-mhgh-x4vc | Business Logic Errors in pimcore | In pimcore versions prior to 10.2.9 discounts could be negative resulting in unintended behavior. | {'CVE-2021-4146'} | 2022-01-26T22:09:18Z | 2022-01-26T22:09:49Z | MODERATE | null | null | {'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/issues/11024', 'https://github.com/pimcore/pimcore/pull/11206', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4146', 'https://huntr.dev/bounties/47b37054-cafe-4f48-8b40-c86efc7fb760', 'https://github.com/pimcore/pimcore/commit/7011922f7f0f97a82d8c3... | null | {'https://github.com/pimcore/pimcore/commit/7011922f7f0f97a82d8c378559b91fcdb34604a6'} | {'https://github.com/pimcore/pimcore/commit/7011922f7f0f97a82d8c378559b91fcdb34604a6'} |
Packagist | GHSA-vx8v-g3p3-88vg | Weak password hash in LiveHelperChat | The secrethash, which the application relies for multiple security measures, can be brute-forced. The hash is quite small, with only 10 characters of only hexadecimal, making 16^10 possilibities ( 1.099.511.627.776 ). The SHA1 of the secret can be obtained via a captcha string and brute-forced offline with an GPU. | {'CVE-2022-1235'} | 2022-04-19T18:01:53Z | 2022-04-06T00:01:31Z | HIGH | null | {'CWE-916'} | {'https://github.com/livehelperchat/livehelperchat/commit/6538d6df3d8a60fee254170b08dd76a161f7bfdc', 'https://github.com/livehelperchat/livehelperchat', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1235', 'https://huntr.dev/bounties/92f7b2d4-fa88-4c62-a2ee-721eebe01705'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/6538d6df3d8a60fee254170b08dd76a161f7bfdc'} | {'https://github.com/livehelperchat/livehelperchat/commit/6538d6df3d8a60fee254170b08dd76a161f7bfdc'} |
Packagist | GHSA-mg5h-9rhq-4cqx | Cross-site Scripting in ShowDoc | ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4. | {'CVE-2022-0937'} | 2022-03-23T15:40:15Z | 2022-03-15T00:01:02Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/6127739d-f4f2-44cd-ae3d-e3ccb7f0d7b5', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0937', 'https://github.com/star7th/showdoc/commit/42c0d9813df3035728b36116a6ce9116e6fa8ed3'} | null | {'https://github.com/star7th/showdoc/commit/42c0d9813df3035728b36116a6ce9116e6fa8ed3'} | {'https://github.com/star7th/showdoc/commit/42c0d9813df3035728b36116a6ce9116e6fa8ed3'} |
Packagist | GHSA-7rpc-9m88-cf9w | OS Command Injection Vulnerability and Potential Zip Slip Vulnerability in baserCMS | There is an OS Command Injection Vulnerability on the management system of baserCMS.
This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users.
If you are eligible, please update to the new version as soon as possible.
Target
baserCMS 4.5.3 and earlier ver... | {'CVE-2021-41243'} | 2021-12-01T14:32:13Z | 2021-12-01T18:29:42Z | CRITICAL | null | {'CWE-78'} | {'https://github.com/baserproject/basercms/security/advisories/GHSA-7rpc-9m88-cf9w', 'https://github.com/baserproject/basercms', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41243', 'https://github.com/baserproject/basercms/commit/9088b99c329d1faff3a2f1269f37b9a9d8d5f6ff'} | null | {'https://github.com/baserproject/basercms/commit/9088b99c329d1faff3a2f1269f37b9a9d8d5f6ff'} | {'https://github.com/baserproject/basercms/commit/9088b99c329d1faff3a2f1269f37b9a9d8d5f6ff'} |
Packagist | GHSA-9w8f-7wgr-2h7g | kimai2 is vulnerable to Improper Access Control | kimai2 is vulnerable to Improper Access Control | {'CVE-2021-3992'} | 2021-12-03T15:37:45Z | 2021-12-03T20:42:59Z | MODERATE | null | {'CWE-863', 'CWE-284'} | {'https://github.com/kevinpapst/kimai2/commit/ff9acab0fc81f0e9490462739ef15fe4ab028ea5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3992', 'https://huntr.dev/bounties/a0c438fb-c8e1-40cf-acc6-c8a532b80b93', 'https://github.com/kevinpapst/kimai2'} | null | {'https://github.com/kevinpapst/kimai2/commit/ff9acab0fc81f0e9490462739ef15fe4ab028ea5'} | {'https://github.com/kevinpapst/kimai2/commit/ff9acab0fc81f0e9490462739ef15fe4ab028ea5'} |
Packagist | GHSA-4xc7-x2jr-cr74 | Improper Authorization in dolibarr/dolibarr | Dolibarr allows improper access control issues in the userphoto modulepart. The impact could lead to data exposure as the attached files and documents may contain sensitive information of relevant parties such as contacts, suppliers, invoices, orders, stocks, agenda, accounting and more. | {'CVE-2022-0731'} | 2022-03-03T22:06:43Z | 2022-02-24T00:00:52Z | MODERATE | null | {'CWE-863'} | {'https://github.com/dolibarr/dolibarr', 'https://huntr.dev/bounties/e242ab4e-fc70-4b2c-a42d-5b3ee4895de8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0731', 'https://github.com/dolibarr/dolibarr/commit/209ab708d4b65fbd88ba4340d60b7822cb72651a'} | null | {'https://github.com/dolibarr/dolibarr/commit/209ab708d4b65fbd88ba4340d60b7822cb72651a'} | {'https://github.com/dolibarr/dolibarr/commit/209ab708d4b65fbd88ba4340d60b7822cb72651a'} |
Packagist | GHSA-v8mp-hhjq-h4cj | Cross-site Scripting in ShowDoc | ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.ofd` file upload. | {'CVE-2022-0965'} | 2022-03-29T17:36:00Z | 2022-03-16T00:00:46Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/d66c88ce-63e2-4515-a429-8e43a42aa347', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0965', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'} | null | {'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'} | {'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'} |
Packagist | GHSA-wpww-4jf4-4hx8 | Edit feed settings and others, Cross Site Scripting(XSS) Vulnerability in Latest Release 4.4.0 | baserCMS 4.4.0 and earlier is affected by Cross Site Scripting (XSS).
Impact: XSS via Arbitrary script execution.
Attack vector is: Administrator must be logged in.
Components are: Edit feed settings, Edit widget area, Sub site new registration, New category registration
Tested baserCMS Version : 4.4.0 (Latest)
Affect... | {'CVE-2020-15273'} | 2021-01-07T22:49:25Z | 2020-11-04T21:08:38Z | LOW | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15273', 'https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1', 'https://github.com/baserproject/basercms/security/advisories/GHSA-wpww-4jf4-4hx8', 'https://packagist.org/packages/baserproject/basercms'} | null | {'https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1'} | {'https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1'} |
Packagist | GHSA-7gm7-8q8v-9gf2 | Server-Side Request Forgery (SSRF) in Shopware | ### Impact
The attacker can abuse the Admin SDK functionality on the server to read or update internal resources.
### Patches
We recommend updating to the current version 6.4.10.1. You can get the update to 6.4.10.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/d... | {'CVE-2022-24871'} | 2022-04-22T21:04:07Z | 2022-04-22T21:04:07Z | HIGH | null | {'CWE-918'} | {'https://github.com/shopware/platform/security/advisories/GHSA-7gm7-8q8v-9gf2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24871', 'https://github.com/shopware/platform', 'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c', 'https://docs.shopware.com/en/shopware-6-en/security-updates... | null | {'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c'} | {'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c'} |
Packagist | GHSA-r6hh-5g3q-wwgc | Stored Cross-site Scripting in grav | Grav prior to 1.7.31 is vulnerable to stored cross-site scripting. | {'CVE-2022-0970'} | 2022-03-28T22:27:36Z | 2022-03-16T00:00:45Z | HIGH | null | {'CWE-79'} | {'https://huntr.dev/bounties/dd436c44-cbf4-48ac-8817-3a24872534ec', 'https://github.com/getgrav/grav', 'https://github.com/getgrav/grav/commit/f19297d5f70476e7bedae9f2acef6b43615538b8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0970'} | null | {'https://github.com/getgrav/grav/commit/f19297d5f70476e7bedae9f2acef6b43615538b8'} | {'https://github.com/getgrav/grav/commit/f19297d5f70476e7bedae9f2acef6b43615538b8'} |
Packagist | GHSA-fpqv-x9hm-35j9 | Potential XSS vulnerability in Kitodo.Presentation | ### Impact
Kitodo.Presentation fails to properly encode URL parameters for output in HTML making it vulnerable to Cross Site Scripting (XSS). Only sites using the `ListView`, `Navigation` or `PageView` plugins are affected.
It also includes jQuery 3.4.1 which is known to be vulnerable against Cross Site Scripting, alt... | {'CVE-2020-16095'} | 2021-09-23T18:13:50Z | 2020-07-31T17:39:22Z | MODERATE | null | {'CWE-79'} | {'https://github.com/kitodo/kitodo-presentation', 'https://github.com/kitodo/kitodo-presentation/security/advisories/GHSA-fpqv-x9hm-35j9', 'https://github.com/kitodo/kitodo-presentation/commit/6a67256388350cc69efa7f36bbaee50c919ca23c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16095', 'https://typo3.org/help/security-... | null | {'https://github.com/kitodo/kitodo-presentation/commit/6a67256388350cc69efa7f36bbaee50c919ca23c'} | {'https://github.com/kitodo/kitodo-presentation/commit/6a67256388350cc69efa7f36bbaee50c919ca23c'} |
Packagist | GHSA-46c5-pfj8-fv65 | Improperly checked metadata on tools/armour itemstacks received from the client | ### Impact
Due to a workaround applied in 1.13, an attacker may send a negative damage/meta value in a tool or armour item's NBT, which `TypeConverter` then blindly uses as if it was valid without being checked.
When this invalid metadata value reaches `Durable->setDamage()`, an exception is thrown because the metadat... | null | 2022-03-18T22:36:03Z | 2022-03-18T22:36:03Z | HIGH | null | {'CWE-704'} | {'https://github.com/pmmp/PocketMine-MP/commit/c8e1cfcbee4945fd4b63d2a7e96025c59744d4f1', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-46c5-pfj8-fv65', 'https://github.com/pmmp/PocketMine-MP'} | null | {'https://github.com/pmmp/PocketMine-MP/commit/c8e1cfcbee4945fd4b63d2a7e96025c59744d4f1'} | {'https://github.com/pmmp/PocketMine-MP/commit/c8e1cfcbee4945fd4b63d2a7e96025c59744d4f1'} |
Packagist | GHSA-q863-cchm-c6c6 | SQL Injection in Fork CMS | Fork CMS contains a SQL injection vulnerability in versions prior to version 5.11.1. When deleting submissions which belong to a formular (made with module `FormBuilder`), the parameter `id[]` is vulnerable to SQL injection. | {'CVE-2022-0153'} | 2022-03-30T20:34:44Z | 2022-03-25T00:00:33Z | HIGH | null | {'CWE-89'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0153', 'https://github.com/forkcms/forkcms/commit/7a12046a67ae5d8cf04face3ee75e55f03a1a608', 'https://github.com/forkcms/forkcms', 'https://huntr.dev/bounties/841503dd-311c-470a-a8ec-d4579b3274eb'} | null | {'https://github.com/forkcms/forkcms/commit/7a12046a67ae5d8cf04face3ee75e55f03a1a608'} | {'https://github.com/forkcms/forkcms/commit/7a12046a67ae5d8cf04face3ee75e55f03a1a608'} |
Packagist | GHSA-qpgw-2c72-4c89 | Mautic users able to download any files from server using filemanager | ### Impact
Mautic versions 1.0.0 - 2.11.0 are vulnerable to allowing any authorized Mautic user session (must be logged into Mautic) to use the Filemanager to download any file from the server that the web user has access to.
### Patches
Update to 2.12.0 or later.
### Workarounds
None
### For more information
If you... | {'CVE-2017-1000490'} | 2021-01-19T20:50:28Z | 2021-01-19T20:50:38Z | HIGH | null | {'CWE-22'} | {'https://github.com/mautic/mautic/commit/3b01786433ae15e9a23f1eb9b0d3dfdb065b6241', 'https://github.com/mautic/mautic/releases/tag/2.12.0', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000490', 'https://github.com/mautic/mautic/security/advisories/GHSA-qpgw-2c72-4c89'} | null | {'https://github.com/mautic/mautic/commit/3b01786433ae15e9a23f1eb9b0d3dfdb065b6241'} | {'https://github.com/mautic/mautic/commit/3b01786433ae15e9a23f1eb9b0d3dfdb065b6241'} |
Packagist | GHSA-px8v-hxxx-2rgh | Potential Code Injection in Sprout Forms | ### Impact
A potential Server-Side Template Injection vulnerability exists in Sprout Forms which could lead to the execution of Twig code.
### Patches
The problem is fixed in`barrelstrength/sprout-forms:v3.9.0` which upgrades to `barrelstrength/sprout-base-email:v1.2.7`
### Workarounds
Users unable to upgrade shou... | {'CVE-2020-11056'} | 2021-10-27T17:00:42Z | 2020-05-08T21:00:02Z | CRITICAL | null | {'CWE-94', 'CWE-74'} | {'https://github.com/barrelstrength/craft-sprout-base-email/commit/5ef759f4713ede6dbf77c9d9df9f992876e43a49', 'https://github.com/barrelstrength/craft-sprout-forms/security/advisories/GHSA-px8v-hxxx-2rgh', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11056', 'https://github.com/barrelstrength/craft-sprout-forms/blob/v3/C... | null | {'https://github.com/barrelstrength/craft-sprout-base-email/commit/5ef759f4713ede6dbf77c9d9df9f992876e43a49'} | {'https://github.com/barrelstrength/craft-sprout-base-email/commit/5ef759f4713ede6dbf77c9d9df9f992876e43a49'} |
Packagist | GHSA-j878-43hm-8gr5 | Unrestricted Upload of File with Dangerous Type in Microweber | In Microweber prior to 1.2.12, a malicious actor may abuse the Backup/Restore feature to achieve Remote Code Execution. | {'CVE-2022-0921'} | 2022-03-23T15:35:11Z | 2022-03-12T00:00:30Z | MODERATE | null | {'CWE-434'} | {'https://github.com/microweber/microweber/commit/867bdda1b4660b0795ad7f87ab5abe9e44b2b318', 'https://huntr.dev/bounties/e368be37-1cb4-4292-8d48-07132725f622', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0921'} | null | {'https://github.com/microweber/microweber/commit/867bdda1b4660b0795ad7f87ab5abe9e44b2b318'} | {'https://github.com/microweber/microweber/commit/867bdda1b4660b0795ad7f87ab5abe9e44b2b318'} |
Packagist | GHSA-4mqv-gcr3-pff9 | "Cross-site scripting in phpoffice/phpspreadsheet" | "This affects the package phpoffice/phpspreadsheet. The library is vulnerable to XSS when creating an html output from an excel file by adding a comment on any cell. The root cause of this issue is within the HTML writer where user comments are concatenated as part of link and this is returned as HTML." | {'CVE-2020-7776'} | 2021-04-09T21:12:55Z | 2021-05-06T18:53:37Z | MODERATE | null | {'CWE-79'} | {'https://snyk.io/vuln/SNYK-PHP-PHPOFFICEPHPSPREADSHEET-1048856', 'https://github.com/PHPOffice/PhpSpreadsheet/commit/0ed5b800be2136bcb8fa9c1bdf59abc957a98845', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7776', 'https://github.com/PHPOffice/PhpSpreadsheet/blob/master/src/PhpSpreadsheet/Writer/Html.php%23L1792'} | null | {'https://github.com/PHPOffice/PhpSpreadsheet/commit/0ed5b800be2136bcb8fa9c1bdf59abc957a98845'} | {'https://github.com/PHPOffice/PhpSpreadsheet/commit/0ed5b800be2136bcb8fa9c1bdf59abc957a98845'} |
Packagist | GHSA-jjvm-3mfq-7gc7 | Cross-site Scripting in microweber | microweber version 1.2.10 and prior is vulnerable to cross-site scripting. | {'CVE-2022-0506'} | 2022-02-14T22:33:59Z | 2022-02-09T00:00:31Z | MODERATE | null | {'CWE-79'} | {'https://github.com/microweber/microweber/commit/05d55f2befb1b25375ca5371875ff535d6cc5f70', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/0a5ec24c-343e-4cc4-b27b-2beb19a1c35f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0506'} | null | {'https://github.com/microweber/microweber/commit/05d55f2befb1b25375ca5371875ff535d6cc5f70'} | {'https://github.com/microweber/microweber/commit/05d55f2befb1b25375ca5371875ff535d6cc5f70'} |
Packagist | GHSA-vpwq-6cp4-ffqc | Stored Cross-site Scripting in ShowDoc | ShowDoc prior to version 2.10.4 is vulnerable to stored cross-site scripting viva `axd` and `cshtml` file upload. | {'CVE-2022-0945'} | 2022-03-28T18:40:15Z | 2022-03-16T00:00:49Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0945', 'https://github.com/star7th/showdoc/commit/ba45d19e1d77a7eea866dab30eff5da552694891', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/8702e2bf-4af2-4391-b651-c8c89e7d089e'} | null | {'https://github.com/star7th/showdoc/commit/ba45d19e1d77a7eea866dab30eff5da552694891'} | {'https://github.com/star7th/showdoc/commit/ba45d19e1d77a7eea866dab30eff5da552694891'} |
Packagist | GHSA-w3v3-cxq5-9vr4 | Incorrect Default Permissions and Improper Access Control in snipe-it | snipe-it is vulnerable to Improper Access Control/Incorrect Default Permissions. | {'CVE-2022-0179'} | 2022-01-18T22:17:42Z | 2022-01-21T23:58:07Z | MODERATE | null | {'CWE-276', 'CWE-284'} | {'https://github.com/snipe/snipe-it', 'https://huntr.dev/bounties/efdf2ead-f9d1-4767-9f02-d11f762d15e7', 'https://github.com/snipe/snipe-it/commit/cf14a0222c67472086cd08b2155f045edaf75f2e', 'https://github.com/snipe/snipe-it/pull/10498', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0179'} | null | {'https://github.com/snipe/snipe-it/commit/cf14a0222c67472086cd08b2155f045edaf75f2e'} | {'https://github.com/snipe/snipe-it/commit/cf14a0222c67472086cd08b2155f045edaf75f2e'} |
Packagist | GHSA-gg6x-xx78-448c | Reflected XSS when importing CSV in OctoberCMS | ### Impact
A user with the ability to use the import functionality of the `ImportExportController` behavior could be socially engineered by an attacker to upload a maliciously crafted CSV file which could result in a reflected XSS attack on the user in question
### Patches
Issue has been patched in Build 466 (v1.0.466... | {'CVE-2020-5298'} | 2021-03-04T18:26:46Z | 2020-06-03T21:58:32Z | MODERATE | null | {'CWE-87'} | {'https://github.com/octobercms/october/commit/cd0b6a791f995d86071a024464c1702efc50f46c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5298', 'https://github.com/octobercms/october/security/advisories/GHSA-gg6x-xx78-448c', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-... | null | {'https://github.com/octobercms/october/commit/cd0b6a791f995d86071a024464c1702efc50f46c'} | {'https://github.com/octobercms/october/commit/cd0b6a791f995d86071a024464c1702efc50f46c'} |
Packagist | GHSA-5fxf-x22x-5q38 | Cross-site Scripting in microweber | XSS on dynamic_text module in GitHub repository microweber/microweber prior to 1.2.12. | {'CVE-2022-0929'} | 2022-03-22T20:02:30Z | 2022-03-13T00:00:54Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0929', 'https://github.com/microweber/microweber/commit/de6d17b52d261902653fbdd2ecefcaac82e54256', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/66abf7ec-2dd7-4cb7-87f5-e91375883f03'} | null | {'https://github.com/microweber/microweber/commit/de6d17b52d261902653fbdd2ecefcaac82e54256'} | {'https://github.com/microweber/microweber/commit/de6d17b52d261902653fbdd2ecefcaac82e54256'} |
Packagist | GHSA-vxrc-68xx-x48g | Sandbox Information Disclosure | A sandbox information disclosure exists in Twig before 1.38.0 and 2.x before 2.7.0 because, under some circumstances, it is possible to call the __toString() method on an object even if not allowed by the security policy in place. | {'CVE-2019-9942'} | 2022-04-06T20:28:16Z | 2022-03-26T00:25:25Z | LOW | null | null | {'https://seclists.org/bugtraq/2019/Mar/60', 'https://www.debian.org/security/2019/dsa-4419', 'https://github.com/twigphp/Twig/commit/eac5422956e1dcca89a3669a03a3ff32f0502077', 'https://github.com/twigphp/Twig', 'https://symfony.com/blog/twig-sandbox-information-disclosure', 'https://github.com/FriendsOfPHP/security-ad... | null | {'https://github.com/twigphp/Twig/commit/eac5422956e1dcca89a3669a03a3ff32f0502077'} | {'https://github.com/twigphp/Twig/commit/eac5422956e1dcca89a3669a03a3ff32f0502077'} |
Packagist | GHSA-v73w-r9xg-7cr9 | Use of insecure jQuery version in OctoberCMS | ### Impact
Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code.
### Patches
Issue has been patched in Build 466 (v1.0.466) by applying the recommended patch from @jquery.
### Workarounds
Apply htt... | null | 2021-10-08T21:26:19Z | 2020-06-05T19:37:49Z | MODERATE | null | null | {'https://github.com/octobercms/october', 'https://github.com/octobercms/october/commit/5c7ba9fbe9f2b596b2f0e3436ee06b91b97e5892', 'https://github.com/octobercms/october/issues/5097', 'https://github.com/octobercms/october/security/advisories/GHSA-v73w-r9xg-7cr9'} | null | {'https://github.com/octobercms/october/commit/5c7ba9fbe9f2b596b2f0e3436ee06b91b97e5892'} | {'https://github.com/octobercms/october/commit/5c7ba9fbe9f2b596b2f0e3436ee06b91b97e5892'} |
Packagist | GHSA-m2wv-m5pf-284r | Cross-site Scripting in teampass | Teampass 2.1.26 allows reflected XSS via the index.php PATH_INFO. Someone must open a link for the Teampass Password Manager index page containing malicious payload. | {'CVE-2022-26980'} | 2022-04-05T18:37:01Z | 2022-03-29T00:01:09Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-26980', 'https://github.com/nilsteampassnet/TeamPass/commits/teampass_2', 'https://gist.github.com/RNPG/6919286e0daebce7634d0a744e060dca'} | null | {'https://github.com/nilsteampassnet/TeamPass/commits/teampass_2'} | {'https://github.com/nilsteampassnet/TeamPass/commits/teampass_2'} |
Packagist | GHSA-gx7g-wjxg-jwwj | Cross-Site Request Forgery in YOURLS | YOURLS versions 1.8.2 and prior are vulnerable to Cross-Site Request Forgery. | {'CVE-2022-0088'} | 2022-04-18T22:17:42Z | 2022-04-04T00:00:55Z | LOW | null | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0088', 'https://github.com/yourls/yourls/commit/1de256d8694b0ec7d4df2ac1d5976d4055e09d59', 'https://github.com/yourls/yourls', 'https://github.com/YOURLS/YOURLS/pull/3264', 'https://huntr.dev/bounties/d01f0726-1a0f-4575-ae17-4b5319b11c29', 'https://github.com/YOURLS/YOURLS/is... | null | {'https://github.com/yourls/yourls/commit/1de256d8694b0ec7d4df2ac1d5976d4055e09d59'} | {'https://github.com/yourls/yourls/commit/1de256d8694b0ec7d4df2ac1d5976d4055e09d59'} |
Packagist | GHSA-9hgc-wpc5-v8p9 | An attacker can execute malicious javascript in Live Helper Chat | Cross-site Scripting (XSS) in GitHub repository livehelperchat/livehelperchat prior to 3.99v. Attacker can execute malicious javascript on application. | {'CVE-2022-1530'} | 2022-05-03T20:49:15Z | 2022-04-30T00:00:37Z | LOW | null | {'CWE-79'} | {'https://github.com/livehelperchat/livehelperchat/commit/edef7a8387be718d0de2dfd1e722789afb0461bc', 'https://huntr.dev/bounties/8fd8de01-7e83-4324-9cc8-a97acb9b70d6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1530', 'https://github.com/livehelperchat/livehelperchat'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/edef7a8387be718d0de2dfd1e722789afb0461bc'} | {'https://github.com/livehelperchat/livehelperchat/commit/edef7a8387be718d0de2dfd1e722789afb0461bc'} |
Packagist | GHSA-2p89-5f22-8qvf | Exposure of Sensitive Information to an Unauthorized Actor | Shopware is an open source eCommerce platform. Versions prior to 6.3.5.1 may leak of information via Store-API. The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. We recommend to update to ... | {'CVE-2021-32711'} | 2021-06-25T15:29:10Z | 2021-09-08T18:00:32Z | CRITICAL | null | {'CWE-200'} | {'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32711', 'https://github.com/shopware/platform/security/advisories/GHSA-f2vv-h5x4-57gr', 'https://github.com/shopware/platform/commit/157fb84a8b3b4ace4be165a033d559826704829b'} | null | {'https://github.com/shopware/platform/commit/157fb84a8b3b4ace4be165a033d559826704829b'} | {'https://github.com/shopware/platform/commit/157fb84a8b3b4ace4be165a033d559826704829b'} |
Packagist | GHSA-ph98-v78f-jqrm | SQL injection in jackalope/jackalope-doctrine-dbal | ### Impact
Users can provoke SQL injections if they can specify a node name or query.
### Patches
Upgrade to version 1.7.4
If that is not possible, you can escape all places where `$property` is used to filter `sv:name` in the class `Jackalope\Transport\DoctrineDBAL\Query\QOMWalker`: `XPath::escape($property)`.
##... | {'CVE-2021-43822'} | 2021-12-14T15:25:41Z | 2021-12-14T21:08:13Z | HIGH | null | {'CWE-89'} | {'https://github.com/jackalope/jackalope-doctrine-dbal', 'https://github.com/jackalope/jackalope-doctrine-dbal/security/advisories/GHSA-ph98-v78f-jqrm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43822', 'https://github.com/jackalope/jackalope-doctrine-dbal/commit/9d179a36d320330ddb303ea3a7c98d3a33d231db'} | null | {'https://github.com/jackalope/jackalope-doctrine-dbal/commit/9d179a36d320330ddb303ea3a7c98d3a33d231db'} | {'https://github.com/jackalope/jackalope-doctrine-dbal/commit/9d179a36d320330ddb303ea3a7c98d3a33d231db'} |
Packagist | GHSA-wf5p-f5xr-c4jj | SQL Injection in rosariosis | An unauthenticated SQL Injection vulnerability in Rosario Student Information System (aka rosariosis) before 8.1.1 allows remote attackers to execute PostgreSQL statements (e.g., SELECT, INSERT, UPDATE, and DELETE) through /Side.php via the syear parameter. | {'CVE-2021-44427'} | 2021-12-01T21:03:52Z | 2021-12-02T17:48:53Z | CRITICAL | null | {'CWE-89'} | {'https://gitlab.com/francoisjacquet/rosariosis/-/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44427', 'https://github.com/francoisjacquet/rosariosis/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016', 'https://gitlab.com/francoisjacquet/rosariosis/blob/mobile/CHANGES.md#ch... | null | {'https://gitlab.com/francoisjacquet/rosariosis/-/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016', 'https://github.com/francoisjacquet/rosariosis/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016'} | {'https://github.com/francoisjacquet/rosariosis/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016'} |
Packagist | GHSA-fjqg-w8g6-hhq8 | Improper Authentication and Improper Access Control in Dolibarr | In “Dolibarr” application, v3.3.beta1_20121221 to v13.0.2 have “Modify” access for admin level users to change other user’s details but fails to validate already existing “Login” name, while renaming the user “Login”. This leads to complete account takeover of the victim user. This happens since the password gets overw... | {'CVE-2021-25956'} | 2021-10-21T14:19:44Z | 2021-09-02T17:16:28Z | HIGH | null | {'CWE-287', 'CWE-284'} | {'https://github.com/Dolibarr/dolibarr/commit/c4cba43bade736ab89e31013a6ccee59a6e077ee', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25956', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25956', 'https://github.com/Dolibarr/dolibarr'} | null | {'https://github.com/Dolibarr/dolibarr/commit/c4cba43bade736ab89e31013a6ccee59a6e077ee'} | {'https://github.com/Dolibarr/dolibarr/commit/c4cba43bade736ab89e31013a6ccee59a6e077ee'} |
Packagist | GHSA-w4hp-pcp8-qhf3 | Cross-site Scripting in livehelperchat | Stored XSS is found in Settings>Live help configuration>Departments->Departments groups->edit When a user creates a new webhook under the NAME field and puts a payload {{constructor.constructor('alert(1)')()}}, the input gets stored, at user edit groupname , the payload gets executed. | {'CVE-2022-0387'} | 2022-02-03T20:16:38Z | 2022-01-28T23:06:32Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/2e09035b-8f98-4930-b7e8-7abe5f722b98', 'https://github.com/livehelperchat/livehelperchat/commit/ff70c7dd641b68b9afb170b89ec1ef003a4e3444', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0387', 'https://github.com/livehelperchat/livehelperchat'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/ff70c7dd641b68b9afb170b89ec1ef003a4e3444'} | {'https://github.com/livehelperchat/livehelperchat/commit/ff70c7dd641b68b9afb170b89ec1ef003a4e3444'} |
Packagist | GHSA-rgg3-3wh7-w935 | Unrestricted Upload of File with Dangerous Type in Zenario CMS | Zenario CMS 9.0.54156 is vulnerable to File Upload. The web server can be compromised by uploading and executing a web-shell which can run commands, browse system files, browse local resources, attack other servers, and exploit the local vulnerabilities, and so forth. | {'CVE-2021-42171'} | 2022-03-28T22:21:50Z | 2022-03-15T00:00:58Z | CRITICAL | null | {'CWE-434'} | {'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007', 'https://github.com/TribalSystems/Zenario', 'https://github.com/hieuminhnv/Zenario-CMS-9.0-last-version/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42171', 'https://github.com/TribalSystems/Zenario/releases/tag/9.0.55... | null | {'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007'} | {'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007'} |
Packagist | GHSA-8j72-p2wm-6738 | Persistent XSS vulnerability in filename of attached file in PrivateBin | On 24th of December 2019 one of the [property based unit tests](https://github.com/PrivateBin/PrivateBin/blob/master/tst/README.md#property-based-unit-testing) reported a [failure](https://travis-ci.org/PrivateBin/PrivateBin/jobs/629180605#L782). Upon investigation, [@elrido](https://github.com/elrido) discovered that ... | {'CVE-2020-5223'} | 2021-01-14T17:43:40Z | 2020-01-14T20:19:33Z | MODERATE | null | {'CWE-79'} | {'https://privatebin.info/news/v1.3.2-v1.2.2-release.html', 'https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-8j72-p2wm-6738', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5223', 'https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6', 'https://github.com/PrivateBin/Pri... | null | {'https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6'} | {'https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6'} |
Packagist | GHSA-xm9f-vxmx-4m58 | Data Flow Sanitation Issue Fix | ### Impact
Due to missing sanitation in data flow it was possible for admin users to upload arbitrary executable files to the server. | {'CVE-2021-32759'} | 2021-08-30T16:42:38Z | 2021-08-30T17:20:41Z | HIGH | null | {'CWE-20'} | {'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32759', 'https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13', 'https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15', 'https://github.com/OpenMage/magento-lts/commit/34709ac... | null | {'https://github.com/OpenMage/magento-lts/commit/34709ac642d554aa1824892059186dd329db744b'} | {'https://github.com/OpenMage/magento-lts/commit/34709ac642d554aa1824892059186dd329db744b'} |
Packagist | GHSA-vwfx-hh3w-fj99 | Potential XSS injection in the newsletter conditions field | ### Impact
An employee can inject javascript in the newsletter condition field that will then be executed on the front office
### Patches
The issue has been fixed in 2.6.1 | {'CVE-2021-21418'} | 2021-03-31T17:35:42Z | 2021-04-06T17:24:14Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-21418', 'https://github.com/PrestaShop/ps_emailsubscription/security/advisories/GHSA-vwfx-hh3w-fj99', 'https://github.com/PrestaShop/ps_emailsubscription/commit/664ffb225e2afb4a32640bbedad667dc6e660b70', 'https://packagist.org/packages/prestashop/ps_emailsubscription', 'https... | null | {'https://github.com/PrestaShop/ps_emailsubscription/commit/664ffb225e2afb4a32640bbedad667dc6e660b70'} | {'https://github.com/PrestaShop/ps_emailsubscription/commit/664ffb225e2afb4a32640bbedad667dc6e660b70'} |
Packagist | GHSA-5vr6-hm68-5j9p | Cross-site Scripting in LibreNMS | LibreNMS 21.11.0 is affected by is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/forms/poller-groups.inc.php. | {'CVE-2021-44279'} | 2021-12-06T21:36:37Z | 2021-12-03T20:49:16Z | MODERATE | null | {'CWE-79'} | {'https://github.com/librenms/librenms/pull/13554', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44279', 'https://github.com/librenms/librenms/', 'https://github.com/librenms/librenms/pull/13554/commits/4f231a0f49b6c953d506913364ffd7fb3a660630'} | null | {'https://github.com/librenms/librenms/pull/13554/commits/4f231a0f49b6c953d506913364ffd7fb3a660630'} | {'https://github.com/librenms/librenms/pull/13554/commits/4f231a0f49b6c953d506913364ffd7fb3a660630'} |
Packagist | GHSA-jv6v-fvvx-4932 | Arbitrary File Deletion vulnerability in OctoberCMS | ### Impact
An attacker can exploit this vulnerability to delete arbitrary local files of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission.
### Patches
Issue has been patched in Build 466 (v1.0.466).
### Workarounds
Apply https://gith... | {'CVE-2020-5296'} | 2021-03-04T18:28:29Z | 2020-06-03T21:58:21Z | MODERATE | null | {'CWE-73'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5296', 'https://github.com/octobercms/october/security/advisories/GHSA-jv6v-fvvx-4932', 'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-... | null | {'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc'} | {'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc'} |
Packagist | GHSA-v3mr-gp7j-pw5w | Possible SQL injection in tablelookupwizard Contao Extension | ### Impact
The currently selected widget values were not correctly sanitized before passing it to the database, leading to an SQL injection possibility.
### Patches
The issue has been patched in `tablelookupwizard` version 3.3.5 and version 4.0.0.
### For more information
If you have any questions or comments about t... | null | 2022-02-04T17:26:40Z | 2022-02-10T22:33:46Z | HIGH | null | {'CWE-89'} | {'https://github.com/terminal42/contao-tablelookupwizard/commit/a5e723a28f110b7df8ffc4175cef9b061d3cc717', 'https://github.com/terminal42/contao-tablelookupwizard', 'https://github.com/terminal42/contao-tablelookupwizard/security/advisories/GHSA-v3mr-gp7j-pw5w'} | null | {'https://github.com/terminal42/contao-tablelookupwizard/commit/a5e723a28f110b7df8ffc4175cef9b061d3cc717'} | {'https://github.com/terminal42/contao-tablelookupwizard/commit/a5e723a28f110b7df8ffc4175cef9b061d3cc717'} |
Packagist | GHSA-h77r-rp97-7rv4 | Privilage Escalation in moodle | In moodle, insufficient capability checks could lead to users with the ability to course restore adding additional capabilities to roles within that course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, a... | {'CVE-2020-25699'} | 2021-10-20T17:37:39Z | 2021-03-29T20:43:01Z | HIGH | null | {'CWE-863', 'CWE-269'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-25699', 'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5', 'https://github.com/moodle/moodle', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895425', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/messa... | null | {'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5'} | {'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5'} |
Packagist | GHSA-hhr9-7xvh-8xgc | Server side request forgery in LiveHelperChat | SSRF filter bypass port 80, 433 in LiveHelperChat prior to v3.67. An attacker could make the application perform arbitrary requests, bypass CVE-2022-1191 | {'CVE-2022-1213'} | 2022-04-19T17:55:45Z | 2022-04-06T00:01:32Z | HIGH | null | {'CWE-918'} | {'https://huntr.dev/bounties/084387f6-5b9c-4017-baa2-5fcf65b051e1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1213', 'https://github.com/livehelperchat/livehelperchat', 'https://github.com/LiveHelperChat/livehelperchat/issues/1752', 'https://github.com/livehelperchat/livehelperchat/commit/abc9599ee7aded466ca216741dcae... | null | {'https://github.com/livehelperchat/livehelperchat/commit/abc9599ee7aded466ca216741dcaea533c908111'} | {'https://github.com/livehelperchat/livehelperchat/commit/abc9599ee7aded466ca216741dcaea533c908111'} |
Packagist | GHSA-9652-78hp-w58c | Stored cross-site scripting in PressBooks | PressBooks 5.17.3 contains a cross-site scripting (XSS). Stored XSS can be submitted via the Book Info's Long Description Body, and all actions to open or preview the books page will result in the triggering the stored XSS. | {'CVE-2021-3271'} | 2021-03-19T22:19:46Z | 2021-03-29T20:07:39Z | MODERATE | null | {'CWE-79'} | {'https://github.com/pressbooks/pressbooks/commit/941a8c5eaeacea5eb211b54ee55bc0348139cbd8', 'https://www.gosecure.net/blog/2021/02/16/cve-2021-3271-pressbooks-stored-cross-site-scripting-proof-of-concept/', 'https://github.com/pressbooks/pressbooks', 'https://github.com/pressbooks/pressbooks/pull/2072', 'https://nvd.n... | null | {'https://github.com/pressbooks/pressbooks/commit/941a8c5eaeacea5eb211b54ee55bc0348139cbd8'} | {'https://github.com/pressbooks/pressbooks/commit/941a8c5eaeacea5eb211b54ee55bc0348139cbd8'} |
Packagist | GHSA-6qcc-whgp-pjj2 | Cross-site Scripting in Pimcore | Pimcore version 10.3.2 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 10.3.3. | {'CVE-2022-0832'} | 2022-03-11T20:37:01Z | 2022-03-05T00:00:45Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0832', 'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/commit/8ab06bfbb5a05a1b190731d9c7476ec45f5ee878', 'https://huntr.dev/bounties/be450b60-bc8f-4585-96a5-3c4069f1186a'} | null | {'https://github.com/pimcore/pimcore/commit/8ab06bfbb5a05a1b190731d9c7476ec45f5ee878'} | {'https://github.com/pimcore/pimcore/commit/8ab06bfbb5a05a1b190731d9c7476ec45f5ee878'} |
Packagist | GHSA-8wp2-vxpg-xcvp | Cross site scripting in facturascripts | facturasripts is an open source ERP software. Store XSS in title parameter executing at EditUser Page & EditProducto page in GitHub repository neorazorx/facturascripts prior to 2022.04. Cross-site scripting attacks can have devastating consequences. Code injected into a vulnerable application can exfiltrate data or ins... | {'CVE-2022-1457'} | 2022-05-05T13:47:28Z | 2022-04-26T00:00:43Z | CRITICAL | null | {'CWE-79'} | {'https://huntr.dev/bounties/8c80caa0-dc89-43f2-8f5f-db02d2669046', 'https://github.com/neorazorx/facturascripts/commit/b3e7527d1e100898c15fec067825b6bc738613df', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1457', 'https://github.com/neorazorx/facturascripts'} | null | {'https://github.com/neorazorx/facturascripts/commit/b3e7527d1e100898c15fec067825b6bc738613df'} | {'https://github.com/neorazorx/facturascripts/commit/b3e7527d1e100898c15fec067825b6bc738613df'} |
Packagist | GHSA-8qvx-f5gf-g43v | Logic error in dolibarr | The application does not check the input of price number lead to Business Logic error through negative price amount. | {'CVE-2022-0174'} | 2022-01-20T15:34:33Z | 2022-01-12T22:54:50Z | MODERATE | null | {'CWE-20'} | {'https://github.com/dolibarr/dolibarr', 'https://github.com/dolibarr/dolibarr/commit/d892160f4f130385a3ce520f66cb8cf2eb8c5c32', 'https://huntr.dev/bounties/ed3ed4ce-3968-433c-a350-351c8f8b60db', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0174'} | null | {'https://github.com/dolibarr/dolibarr/commit/d892160f4f130385a3ce520f66cb8cf2eb8c5c32'} | {'https://github.com/dolibarr/dolibarr/commit/d892160f4f130385a3ce520f66cb8cf2eb8c5c32'} |
Packagist | GHSA-4h9c-v5vg-5m6m | Access to restricted PHP code by dynamic static class access in smarty | ### Impact
Template authors could run restricted static php methods.
### Patches
Please upgrade to 3.1.40 or higher.
### References
See the [documentation on Smarty security features](https://www.smarty.net/docs/en/advanced.features.tpl#advanced.features.security) on the static_classes access filter.
### For more in... | {'CVE-2021-21408'} | 2022-01-20T15:33:55Z | 2022-01-12T22:43:42Z | HIGH | null | {'CWE-20'} | {'https://github.com/smarty-php/smarty/security/advisories/GHSA-4h9c-v5vg-5m6m', 'https://github.com/smarty-php/smarty/releases/tag/v4.0.3', 'https://github.com/smarty-php/smarty/releases/tag/v3.1.43', 'https://github.com/smarty-php/smarty', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21408', 'https://github.com/smarty-... | null | {'https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664'} | {'https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664'} |
Packagist | GHSA-ghww-cv4v-hmxx | Cross-Site Request Forgery microweber | microweber prior to version 1.2.11 is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2022-0638'} | 2022-02-22T17:24:42Z | 2022-02-18T00:00:34Z | MODERATE | null | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0638', 'https://github.com/microweber/microweber/commit/756096da1260f29ff6f4532234d93d8e41dd5aa8', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/9d3d883c-d74c-4fe2-9978-a8e3d1ccf9f3'} | null | {'https://github.com/microweber/microweber/commit/756096da1260f29ff6f4532234d93d8e41dd5aa8'} | {'https://github.com/microweber/microweber/commit/756096da1260f29ff6f4532234d93d8e41dd5aa8'} |
Packagist | GHSA-f3rf-v9qm-9c89 | Cross-site Scripting in the femanager TYPO3 extension | The extension allows by default to upload SVG files when a logged in frontend user uploads a new profile image. This may lead to Cross-Site Scripting, when the uploaded SVG image is used as is on the website.
Note: If SVG uploads are required, it is recommended to use the TYPO3 extension svg_sanitizer (added to TYPO3 ... | {'CVE-2021-36787'} | 2021-08-30T18:35:42Z | 2021-09-01T18:36:51Z | MODERATE | null | {'CWE-79'} | {'https://github.com/in2code-de/femanager', 'http://seclists.org/fulldisclosure/2022/Jan/53', 'https://github.com/in2code-de/femanager/releases/tag/6.3.1', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-010', 'https://typo3.org/help/security-advisories/security', 'https://extensions.typo3.org/extension/femanage... | null | {'https://github.com/in2code-de/femanager/commit/70f873c60f0e40ffd6a1300218ca368156fc1bf2'} | {'https://github.com/in2code-de/femanager/commit/70f873c60f0e40ffd6a1300218ca368156fc1bf2'} |
Packagist | GHSA-h2fj-77wh-fh5w | Cross-site Scripting in livehelperchat | Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v. | {'CVE-2022-0612'} | 2022-02-24T13:52:12Z | 2022-02-17T00:00:36Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0612', 'https://github.com/livehelperchat/livehelperchat/commit/4d4f1db1701f09177896a38e43fd0c693835f03b', 'https://github.com/livehelperchat/livehelperchat', 'https://huntr.dev/bounties/eadcf7d2-a479-4901-abcc-1505d3f1b32f'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/4d4f1db1701f09177896a38e43fd0c693835f03b'} | {'https://github.com/livehelperchat/livehelperchat/commit/4d4f1db1701f09177896a38e43fd0c693835f03b'} |
Packagist | GHSA-vf23-f26f-mjj9 | Moderate severity vulnerability that affects yourls/yourls | ## Type juggling vulnerability in the API
### Impact
YOURLS through 1.7.3 is affected by a type juggling vulnerability in the API component that can result in login bypass.
### Patches
https://github.com/YOURLS/YOURLS/releases/tag/1.7.4
https://github.com/YOURLS/YOURLS/pull/2542
### References
* https://cve.mitre.or... | {'CVE-2019-14537'} | 2021-09-20T21:42:51Z | 2019-09-23T18:32:02Z | CRITICAL | null | {'CWE-843'} | {'https://github.com/advisories/GHSA-vf23-f26f-mjj9', 'https://github.com/YOURLS/YOURLS/pull/2542', 'https://github.com/Wocanilo/CVE-2019-14537', 'https://github.com/YOURLS/YOURLS', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14537', 'https://github.com/YOURLS/YOURLS/commits/master', 'https://github.com/YOURLS/YOURLS/se... | null | {'https://github.com/YOURLS/YOURLS/commits/master'} | {'https://github.com/YOURLS/YOURLS/commits/master'} |
Packagist | GHSA-c5gj-w4hx-gvmx | Business Logic Errors in microweber | Microweber prior to 1.2.11 can suffer from insecure direct object reference(s). A malicious actor can remove items from a victim's cart. | {'CVE-2022-0688'} | 2022-02-25T19:18:15Z | 2022-02-21T00:00:21Z | LOW | null | null | {'https://huntr.dev/bounties/051ec6d4-0b0a-41bf-9ded-27813037c9c9', 'https://github.com/microweber/microweber/commit/a41f0fddaf08ff12b2b82506b1ca9490c93ab605', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0688', 'https://github.com/microweber/microweber'} | null | {'https://github.com/microweber/microweber/commit/a41f0fddaf08ff12b2b82506b1ca9490c93ab605'} | {'https://github.com/microweber/microweber/commit/a41f0fddaf08ff12b2b82506b1ca9490c93ab605'} |
Packagist | GHSA-3qr6-qrqm-8v86 | Integer Overflow or Wraparound in Microweber | In Microweber prior to 1.2.12, a user can create an account with a password thousands of characters in length, leading to memory corruption/integer overflow. Version 1.2.2 sets maximum password length at 500 characters. | {'CVE-2022-1036'} | 2022-03-30T20:02:35Z | 2022-03-23T00:00:23Z | HIGH | null | {'CWE-190'} | {'https://huntr.dev/bounties/db615581-d5a9-4ca5-a3e9-7a39eceaa424', 'https://github.com/microweber/microweber/commit/82be4f0b4729be870ccefdae99a04833f134aa6a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1036', 'https://github.com/microweber/microweber'} | null | {'https://github.com/microweber/microweber/commit/82be4f0b4729be870ccefdae99a04833f134aa6a'} | {'https://github.com/microweber/microweber/commit/82be4f0b4729be870ccefdae99a04833f134aa6a'} |
Packagist | GHSA-wqq8-mqj9-697f | PrestaShop autoupgrade module ZIP archives were vulnerable from CVE-2017-9841 | ### Impact
We have identified that some autoupgrade module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow, on a webserver, an attacker to perform a RCE.
This vulnerability impacts
- phpunit before 4.8.28 and 5.x before 5.6.3 as reported in [CVE-2017-9841](ht... | null | 2020-01-08T03:06:57Z | 2020-01-08T03:10:30Z | HIGH | null | null | {'https://github.com/PrestaShop/autoupgrade/commit/ce96357ad3ff6278bb28dc225913e75c2f077a32', 'https://github.com/PrestaShop/autoupgrade/security/advisories/GHSA-wqq8-mqj9-697f'} | null | {'https://github.com/PrestaShop/autoupgrade/commit/ce96357ad3ff6278bb28dc225913e75c2f077a32'} | {'https://github.com/PrestaShop/autoupgrade/commit/ce96357ad3ff6278bb28dc225913e75c2f077a32'} |
Packagist | GHSA-28w5-j8xj-2xwc | Cross-site Scripting in the yoast_seo TYPO3 extension | The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability. | {'CVE-2021-36788'} | 2021-08-30T18:43:25Z | 2021-09-01T18:36:44Z | MODERATE | null | {'CWE-79'} | {'https://github.com/Yoast/Yoast-SEO-for-TYPO3', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-012', 'https://github.com/Yoast/Yoast-SEO-for-TYPO3/commit/a8278dae97dce8cd0722d38f7f5a30b563668590', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36788'} | null | {'https://github.com/Yoast/Yoast-SEO-for-TYPO3/commit/a8278dae97dce8cd0722d38f7f5a30b563668590'} | {'https://github.com/Yoast/Yoast-SEO-for-TYPO3/commit/a8278dae97dce8cd0722d38f7f5a30b563668590'} |
Packagist | GHSA-jr37-66pj-36v7 | Cross-site Scripting in DayByDay CRM | In Daybyday CRM, version 2.2.0 is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability that allows low privileged application users to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the “/tasks” page to view all the tasks. | {'CVE-2022-22109'} | 2022-01-10T21:46:18Z | 2022-01-08T00:32:00Z | MODERATE | null | {'CWE-79'} | {'https://github.com/Bottelet/DaybydayCRM', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22109', 'https://github.com/Bottelet/DaybydayCRM/commit/002dc75f400cf307bd00b71a5a93f1e26e52cee2', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22109'} | null | {'https://github.com/Bottelet/DaybydayCRM/commit/002dc75f400cf307bd00b71a5a93f1e26e52cee2'} | {'https://github.com/Bottelet/DaybydayCRM/commit/002dc75f400cf307bd00b71a5a93f1e26e52cee2'} |
Packagist | GHSA-fc38-mxwr-pfhx | Cross-Site Scripting via SVG media files | ### Impact
Cross-Site Scripting via SVG media files
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2... | {'CVE-2021-37710'} | 2021-08-23T17:24:12Z | 2021-08-23T19:43:00Z | HIGH | null | {'CWE-79'} | {'https://github.com/shopware/platform/security/advisories/GHSA-fc38-mxwr-pfhx', 'https://github.com/shopware/platform/commit/abe9f69e1f667800f974acccd3047b4930e4b423', 'https://github.com/shopware/platform', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37710'} | null | {'https://github.com/shopware/platform/commit/abe9f69e1f667800f974acccd3047b4930e4b423'} | {'https://github.com/shopware/platform/commit/abe9f69e1f667800f974acccd3047b4930e4b423'} |
Packagist | GHSA-r89v-cgv7-3jhx | Bypass of fix for CVE-2020-15247, Twig sandbox escape | ### Impact
A bypass of CVE-2020-15247 (fixed in 1.0.469 and 1.1.0) was discovered that has the same impact as CVE-2020-15247:
An authenticated backend user with the `cms.manage_pages`, `cms.manage_layouts`, or `cms.manage_partials` permissions who would **normally** not be permitted to provide PHP code to be executed ... | {'CVE-2020-26231'} | 2021-03-04T18:24:40Z | 2020-11-23T20:54:18Z | LOW | null | {'CWE-862'} | {'https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26231', 'https://github.com/advisories/GHSA-94vp-rmqv-5875', 'https://github.com/octobercms/october/security/advisories/GHSA-r89v-cgv7-3jhx'} | null | {'https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7'} | {'https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7'} |
Packagist | GHSA-2xmm-g482-4439 | DQL injection through sorting parameters blocked | ### Impact
Values added at the end of query sorting were passed directly to the DB. We don't know, if it could lead to direct SQL injections, however, we should not allow for easy injection of values there anyway.
### Patches
The issue is fixed in version 1.10.1 and in 1.11-rc.1
### Workarounds
You have to overwrite... | {'CVE-2022-24752'} | 2022-03-15T19:09:16Z | 2022-03-15T19:09:16Z | CRITICAL | null | {'CWE-89'} | {'https://github.com/Sylius/SyliusGridBundle', 'https://github.com/Sylius/SyliusGridBundle/security/advisories/GHSA-2xmm-g482-4439', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24752', 'https://github.com/Sylius/SyliusGridBundle/commit/73d0791d0575f955e830a3da4c3345f420d2f784', 'https://github.com/Sylius/SyliusGridBundl... | null | {'https://github.com/Sylius/SyliusGridBundle/commit/73d0791d0575f955e830a3da4c3345f420d2f784'} | {'https://github.com/Sylius/SyliusGridBundle/commit/73d0791d0575f955e830a3da4c3345f420d2f784'} |
Packagist | GHSA-rxch-gp62-574w | snipe-it is vulnerable to Cross-site Scripting | snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | {'CVE-2021-4108'} | 2022-01-04T19:01:10Z | 2021-12-16T14:13:27Z | MODERATE | null | {'CWE-79'} | {'https://github.com/snipe/snipe-it/', 'https://huntr.dev/bounties/5069a037-040e-4d77-8526-846e65edfaf4', 'https://github.com/snipe/snipe-it/commit/9d5d1a9f9aae2c8baee48551185da5de0cdb62c2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4108'} | null | {'https://github.com/snipe/snipe-it/commit/9d5d1a9f9aae2c8baee48551185da5de0cdb62c2'} | {'https://github.com/snipe/snipe-it/commit/9d5d1a9f9aae2c8baee48551185da5de0cdb62c2'} |
Packagist | GHSA-7v3x-h7r2-34jv | Insufficient Session Expiration in Pterodactyl API | ### Impact
A vulnerability exists in Pterodactyl Panel `<= 1.6.6` that could allow a malicious attacker that compromises an API key to generate an authenticated user session that is not revoked when the API key is deleted, thus allowing the malicious user to remain logged in as the user the key belonged to.
It is impo... | null | 2022-01-20T16:18:28Z | 2022-01-21T18:43:05Z | MODERATE | null | {'CWE-613'} | {'https://github.com/pterodactyl/panel/security/advisories/GHSA-7v3x-h7r2-34jv', 'https://github.com/pterodactyl/panel/releases/tag/v1.7.0', 'https://github.com/pterodactyl/panel', 'https://github.com/pterodactyl/panel/commit/dfa329ddf242908b60e22e3340ea36359eab1ef4'} | null | {'https://github.com/pterodactyl/panel/commit/dfa329ddf242908b60e22e3340ea36359eab1ef4'} | {'https://github.com/pterodactyl/panel/commit/dfa329ddf242908b60e22e3340ea36359eab1ef4'} |
Packagist | GHSA-6pj2-5fqq-xvjc | Incorrect Authorization in latte/latte | This affects the package latte/latte before 2.10.6. There is a way to bypass allowFunctions that will affect the security of the application. When the template is set to allow/disallow the use of certain functions, adding control characters (x00-x08) after the function will bypass these restrictions. | {'CVE-2021-23803'} | 2022-01-06T18:54:41Z | 2022-01-06T20:56:27Z | CRITICAL | null | {'CWE-863'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-23803', 'https://github.com/nette/latte/issues/279', 'https://snyk.io/vuln/SNYK-PHP-LATTELATTE-1932226', 'https://github.com/nette/latte/commit/227c86eda9a8a6d060ea8501923e768b6d992210', 'https://github.com/nette/latte'} | null | {'https://github.com/nette/latte/commit/227c86eda9a8a6d060ea8501923e768b6d992210'} | {'https://github.com/nette/latte/commit/227c86eda9a8a6d060ea8501923e768b6d992210'} |
Packagist | GHSA-pjjf-hc4q-g298 | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | showdoc is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-3775'} | 2021-11-17T21:11:29Z | 2021-11-15T23:16:17Z | MODERATE | null | {'CWE-352'} | {'https://huntr.dev/bounties/6a59d203-4ca7-4aed-bdb9-1e39b66c77b3', 'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3775', 'https://github.com/star7th/showdoc'} | null | {'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'} | {'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'} |
Packagist | GHSA-8m28-w6xg-35hw | Cross-Site Request Forgery (CSRF) in livehelperchat | livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2022-0231'} | 2022-01-24T22:54:21Z | 2022-01-26T20:22:08Z | MODERATE | null | {'CWE-352'} | {'https://huntr.dev/bounties/adaf98cf-60ab-40e0-aa3b-42ba0d3b7cbf', 'https://github.com/livehelperchat/livehelperchat', 'https://github.com/livehelperchat/livehelperchat/commit/6ad1349dc5e7503b00c5017499a0a895d7654a61', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0231'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/6ad1349dc5e7503b00c5017499a0a895d7654a61'} | {'https://github.com/livehelperchat/livehelperchat/commit/6ad1349dc5e7503b00c5017499a0a895d7654a61'} |
Packagist | GHSA-gp2m-7cfp-h6gf | Incorrect persistent NameID generation in SimpleSAMLphp | ### Background
When a SimpleSAMLphp Identity Provider is misconfigured, a bug in the software when trying to build a persistent `NameID` to univocally identify the authenticating subject could cause different users to get the same identifier generated, depending on the attributes available for them right after authenti... | {'CVE-2017-12873'} | 2021-08-19T16:44:17Z | 2020-01-24T21:28:06Z | CRITICAL | null | {'CWE-384'} | {'https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12873', 'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-gp2m-7cfp-h6gf', 'https://www.debian.org/security/2018/dsa-4127', 'https://github.com/simplesamlphp/simplesamlphp/commit/90dc... | null | {'https://github.com/simplesamlphp/simplesamlphp/commit/90dca835158495b173808273e7df127303b8b953'} | {'https://github.com/simplesamlphp/simplesamlphp/commit/90dca835158495b173808273e7df127303b8b953'} |
Packagist | GHSA-5875-p652-2ppm | Exposure of Resource to Wrong Sphere in microweber | Exposure of Resource to Wrong Sphere in microweber prior to 1.3 allows users to add deleted products to a cart and buy it. | {'CVE-2022-0762'} | 2022-03-09T20:31:39Z | 2022-02-27T00:00:16Z | MODERATE | null | {'CWE-668'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0762', 'https://huntr.dev/bounties/125b5244-5099-485e-bf75-e5f1ed80dd48', 'https://github.com/microweber/microweber/commit/76361264d9fdfff38a1af79c63141455cc4d36e3'} | null | {'https://github.com/microweber/microweber/commit/76361264d9fdfff38a1af79c63141455cc4d36e3'} | {'https://github.com/microweber/microweber/commit/76361264d9fdfff38a1af79c63141455cc4d36e3'} |
Packagist | GHSA-5x33-h32w-6vr2 | Cross site-scripting (XSS) moodle | The filter in the tag manager required extra sanitizing to prevent a reflected XSS risk. This affects 3.9 to 3.9.1, 3.8 to 3.8.4, 3.7 to 3.7.7, 3.5 to 3.5.13 and earlier unsupported versions. Fixed in 3.9.2, 3.8.5, 3.7.8 and 3.5.14. | {'CVE-2020-25628'} | 2021-03-24T23:14:52Z | 2021-03-29T20:43:15Z | MODERATE | null | {'CWE-79'} | {'https://moodle.org/mod/forum/discuss.php?d=410840', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25628', 'https://github.com/moodle/moodle/commit/e8632a4ad0b4da3763cbbe5949594aa449b483bb', 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-69340'} | null | {'https://github.com/moodle/moodle/commit/e8632a4ad0b4da3763cbbe5949594aa449b483bb'} | {'https://github.com/moodle/moodle/commit/e8632a4ad0b4da3763cbbe5949594aa449b483bb'} |
Packagist | GHSA-vgwr-773q-7j3c | Path Traversal within joomla/archive zip class | An issue was discovered in Joomla! 3.0.0 through 3.9.24. Extracting an specifilcy crafted zip package could write files outside of the intended path. | {'CVE-2021-26028'} | 2021-03-24T17:57:48Z | 2021-03-24T17:58:13Z | MODERATE | null | {'CWE-22'} | {'https://developer.joomla.org/security-centre/848-20210308-core-path-traversal-within-joomla-archive-zip-class.html', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/joomla/archive/CVE-2021-26028.yaml', 'https://github.com/joomla-framework/archive/commit/32c9009a1020d16bc1060c0d06339898b697cf2c', 'htt... | null | {'https://github.com/joomla-framework/archive/commit/32c9009a1020d16bc1060c0d06339898b697cf2c'} | {'https://github.com/joomla-framework/archive/commit/32c9009a1020d16bc1060c0d06339898b697cf2c'} |
Packagist | GHSA-56cx-wf47-hx7w | Improper Restriction of Excessive Authentication Attempts | firefly-iii is vulnerable to Improper Restriction of Excessive Authentication Attempts | {'CVE-2021-3663'} | 2021-08-31T20:58:20Z | 2021-08-09T20:38:37Z | MODERATE | null | {'CWE-307'} | {'https://github.com/firefly-iii/firefly-iii', 'https://github.com/firefly-iii/firefly-iii/commit/afc9f4b7ebc8a240c85864a6e1abda62bfeefae8', 'https://github.com/firefly-iii/firefly-iii/releases/tag/5.5.13', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3663', 'https://huntr.dev/bounties/497bdf6d-7dba-49c3-8011-1c64dfbb338... | null | {'https://github.com/firefly-iii/firefly-iii/commit/afc9f4b7ebc8a240c85864a6e1abda62bfeefae8'} | {'https://github.com/firefly-iii/firefly-iii/commit/afc9f4b7ebc8a240c85864a6e1abda62bfeefae8'} |
Packagist | GHSA-wv23-pfj7-2mjj | Authenticated file write leads to remote code execution in october/system | ### Impact
Assuming an attacker with "create, modify and delete website pages" privileges in the backend is able to execute PHP code by running specially crafted Twig code in the template markup.
### Patches
Issue has been patched in Build 473 and v1.1.6
### Workarounds
Apply https://github.com/octobercms/october/... | {'CVE-2021-32649'} | 2022-01-26T22:27:50Z | 2022-01-14T21:08:23Z | HIGH | null | {'CWE-74'} | {'https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26', 'https://github.com/octobercms/october/security/advisories/GHSA-wv23-pfj7-2mjj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32649', 'https://github.com/octobercms/october'} | null | {'https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26'} | {'https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26'} |
Packagist | GHSA-mcx4-f5f5-4859 | Prevent cache poisoning via a Response Content-Type header in Symfony | Description
-----------
When a `Response` does not contain a `Content-Type` header, Symfony falls back to the format defined in the `Accept` header of the request, leading to a possible mismatch between the response's content and `Content-Type` header. When the response is cached, this can lead to a corrupted cache wh... | {'CVE-2020-5255'} | 2021-01-08T20:25:26Z | 2020-03-30T20:09:16Z | LOW | null | {'CWE-435'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C36JLPHUPKDFAX6D5WYFC4ALO2K7RDUQ/', 'https://github.com/symfony/symfony/security/advisories/GHSA-mcx4-f5f5-4859', 'https://github.com/symfony/symfony/commit/dca343442e6a954f96a2609e7b4e9c21ed6d74e6', 'https://symfony.com/bl... | null | {'https://github.com/symfony/symfony/commit/dca343442e6a954f96a2609e7b4e9c21ed6d74e6'} | {'https://github.com/symfony/symfony/commit/dca343442e6a954f96a2609e7b4e9c21ed6d74e6'} |
Packagist | GHSA-9fcc-7g44-mxrj | Cross-site Scripting in ShowDoc | ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via uploading files with files in `.xsd`, `.asa`, and `.aspx` formats. | {'CVE-2022-0942'} | 2022-03-29T17:30:52Z | 2022-03-16T00:00:47Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/a412707c-18da-4c84-adc0-9801ed8068c9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0942', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'} | null | {'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'} | {'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'} |
Packagist | GHSA-m434-m5pv-p35w | Insufficient user authorization in Moodle | A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. The calendar:manageentries capability allowed managers to access or modify any calendar event, but should have been restricted from accessing user level events. | {'CVE-2022-0333'} | 2022-02-02T16:12:13Z | 2022-01-28T22:08:02Z | LOW | null | {'CWE-863'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0333', 'https://github.com/moodle/moodle', 'https://github.com/moodle/moodle/commit/2ee27313cea0d7073f5a6a35eccdfddcb3a9adad', 'https://moodle.org/mod/forum/discuss.php?d=431100', 'https://bugzilla.redhat.com/show_bug.cgi?id=2043663'} | null | {'https://github.com/moodle/moodle/commit/2ee27313cea0d7073f5a6a35eccdfddcb3a9adad'} | {'https://github.com/moodle/moodle/commit/2ee27313cea0d7073f5a6a35eccdfddcb3a9adad'} |
Packagist | GHSA-jm6p-wfjg-xm7x | bookstack is vulnerable to Improper Access Control | bookstack is vulnerable to Improper Access Control. | {'CVE-2021-4026'} | 2021-12-02T15:29:37Z | 2021-12-01T18:26:48Z | MODERATE | null | {'CWE-668', 'CWE-284'} | {'https://github.com/bookstackapp/bookstack/', 'https://github.com/BookStackApp/BookStack/releases/tag/v21.11.2', 'https://github.com/bookstackapp/bookstack/commit/b4fa82e3298a15443ca40bff205b7a16a1031d92', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4026', 'https://huntr.dev/bounties/c6dfa80d-43e6-4b49-95af-cc031bb66b1... | null | {'https://github.com/bookstackapp/bookstack/commit/b4fa82e3298a15443ca40bff205b7a16a1031d92'} | {'https://github.com/bookstackapp/bookstack/commit/b4fa82e3298a15443ca40bff205b7a16a1031d92'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.