ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
Packagist
GHSA-gf8j-v8x5-h9qp
XSS in enshrined/svg-sanitize due to mishandled script and data values in attributes
enshrined/svg-sanitize before 0.12.0 mishandles script and data values in attributes, as demonstrated by unexpected whitespace such as in the javascript	:alert substring.
{'CVE-2019-18857'}
2022-02-16T22:20:26Z
2020-01-08T17:15:37Z
HIGH
null
{'CWE-79'}
{'https://github.com/darylldoyle/svg-sanitizer/commit/51ca4b713f3706d6b27769c6296bbc0c28a5bbd0', 'https://github.com/darylldoyle/svg-sanitizer/compare/0.11.0...0.12.0', 'https://nvd.nist.gov/vuln/detail/CVE-2019-18857', 'https://github.com/darylldoyle/svg-sanitizer'}
null
{'https://github.com/darylldoyle/svg-sanitizer/commit/51ca4b713f3706d6b27769c6296bbc0c28a5bbd0'}
{'https://github.com/darylldoyle/svg-sanitizer/commit/51ca4b713f3706d6b27769c6296bbc0c28a5bbd0'}
Packagist
GHSA-mf79-f657-47ww
Insufficient Session Expiration in Admidio
Admidio prior to version 4.1.9 is vulnerable to insufficient session expiration. In vulnerable versions, changing the password in one session does not terminate sessions logged in with the old password, which could lead to unauthorized actors maintaining access to an account.
{'CVE-2022-0991'}
2022-03-28T15:39:13Z
2022-03-20T00:00:29Z
HIGH
null
{'CWE-613'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0991', 'https://github.com/Admidio/admidio/issues/1238', 'https://github.com/Admidio/admidio', 'https://huntr.dev/bounties/1c406a4e-15d0-4920-8495-731c48473ba4', 'https://github.com/admidio/admidio/commit/e84e472ebe517e2ff5795c46dc10b5f49dc4d46a', 'https://github.com/Admidio/...
null
{'https://github.com/admidio/admidio/commit/e84e472ebe517e2ff5795c46dc10b5f49dc4d46a'}
{'https://github.com/admidio/admidio/commit/e84e472ebe517e2ff5795c46dc10b5f49dc4d46a'}
Packagist
GHSA-vrgh-5w3c-ggf8
showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)
showdoc is vulnerable to Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG).
{'CVE-2021-3990'}
2021-12-03T15:18:33Z
2021-12-03T20:38:50Z
MODERATE
null
{'CWE-338'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3990', 'https://github.com/star7th/showdoc/commit/a9886f26c08225e0adca75c67dfca3f7c42b87d0', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/0680067d-56a7-4412-b06e-a267e850ae9f'}
null
{'https://github.com/star7th/showdoc/commit/a9886f26c08225e0adca75c67dfca3f7c42b87d0'}
{'https://github.com/star7th/showdoc/commit/a9886f26c08225e0adca75c67dfca3f7c42b87d0'}
Packagist
GHSA-vhm6-gw82-6f8j
Cross site scripting in LibreNMS
LibreNMS prior to version 22.2.2 is vulnerable to cross-site scripting.
{'CVE-2022-0772'}
2022-03-08T18:06:06Z
2022-02-28T00:00:34Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0772', 'https://huntr.dev/bounties/faae29bd-c43a-468d-8af6-2b6aa4d40f09', 'https://github.com/librenms/librenms/commit/703745d0ed3948623153117d761ce48514e2f281', 'https://github.com/librenms/librenms'}
null
{'https://github.com/librenms/librenms/commit/703745d0ed3948623153117d761ce48514e2f281'}
{'https://github.com/librenms/librenms/commit/703745d0ed3948623153117d761ce48514e2f281'}
Packagist
GHSA-xh55-2fqp-p775
Command injection in mail agent settings
### Impact Command injection in mail agent settings ### Patches We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2...
{'CVE-2021-37708'}
2021-08-26T19:40:02Z
2021-08-30T16:14:09Z
HIGH
null
{'CWE-77'}
{'https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37708', 'https://github.com/shopware/platform/security/advisories/GHSA-xh55-2fqp-p775', 'https://github.com/shopware/platform'}
null
{'https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa'}
{'https://github.com/shopware/platform/commit/82d8d1995f6ce9054323b2c3522b1b3cf04853aa'}
Packagist
GHSA-w2pm-r78h-4m7v
OS Command Injection in Laravel Framework
OS Command injection vulnerability in function link in Filesystem.php in Laravel Framework before 5.8.17.
{'CVE-2020-19316'}
2022-01-05T17:39:12Z
2022-01-06T23:13:42Z
HIGH
null
{'CWE-78'}
{'https://github.com/laravel/framework', 'https://nvd.nist.gov/vuln/detail/CVE-2020-19316', 'http://www.netbytesec.com/advisories/OSCommandInjectionInLaravelFramework/', 'https://github.com/laravel/framework/commit/44c3feb604944599ad1c782a9942981c3991fa31'}
null
{'https://github.com/laravel/framework/commit/44c3feb604944599ad1c782a9942981c3991fa31'}
{'https://github.com/laravel/framework/commit/44c3feb604944599ad1c782a9942981c3991fa31'}
Packagist
GHSA-8x44-pwr2-rgc6
Cross-site Scripting in pimcore
Pimcore settings module is vulnerable to stored cross site scripting
{'CVE-2022-0348'}
2022-02-03T19:56:45Z
2022-01-28T23:05:03Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0348', 'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/commit/832c34aeb9f21f213295a0c28377132df996352a', 'https://huntr.dev/bounties/250e79be-7e5d-4ba3-9c34-655e39ade2f4'}
null
{'https://github.com/pimcore/pimcore/commit/832c34aeb9f21f213295a0c28377132df996352a'}
{'https://github.com/pimcore/pimcore/commit/832c34aeb9f21f213295a0c28377132df996352a'}
Packagist
GHSA-7h8v-2v8x-h264
SQL Injection in moodle
In moodle, some database module web services allowed students to add entries within groups they did not belong to. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.8.6, 3.7.9, 3.5.15, and 3.10.
{'CVE-2020-25700'}
2021-03-24T23:17:53Z
2021-03-29T20:42:19Z
MODERATE
null
{'CWE-89'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=1895427', 'https://github.com/moodle/moodle/commit/8169aeff59d8ed910ca3545413561005282bbd32', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://moodle.org/mod/forum/discuss.php?d=4139...
null
{'https://github.com/moodle/moodle/commit/8169aeff59d8ed910ca3545413561005282bbd32'}
{'https://github.com/moodle/moodle/commit/8169aeff59d8ed910ca3545413561005282bbd32'}
Packagist
GHSA-6xxj-gcjq-wgf4
SQL injection in prestashop/prestashop
### Impact Blind SQLi using Search filters with `orderBy` and `sortOrder` parameters ### Patches The problem is fixed in 1.7.8.2
{'CVE-2021-43789'}
2021-12-08T19:28:53Z
2021-12-07T21:23:17Z
HIGH
null
{'CWE-89'}
{'https://github.com/PrestaShop/PrestaShop', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43789', 'https://github.com/PrestaShop/PrestaShop/issues/26623', 'https://github.com/PrestaShop/PrestaShop/releases/tag/1.7.8.2', 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-6xxj-gcjq-wgf4', 'https://github.co...
null
{'https://github.com/PrestaShop/PrestaShop/commit/6482b9ddc9dcebf7588dbfd616d2d635218408d6'}
{'https://github.com/PrestaShop/PrestaShop/commit/6482b9ddc9dcebf7588dbfd616d2d635218408d6'}
Packagist
GHSA-w8cj-mvf9-mpc9
OS Command injection in Bolt
Bolt before 3.7.2 does not restrict filter options in a Request in the Twig context, and is therefore inconsistent with the "How to Harden Your PHP for Better Security" guidance.
{'CVE-2020-28925'}
2021-04-07T18:29:19Z
2021-05-06T18:53:29Z
MODERATE
null
{'CWE-78'}
{'https://github.com/bolt/bolt/compare/3.7.1...3.7.2', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28925', 'https://github.com/bolt/bolt/commit/c0cd530e78c2a8c6d71ceb75b10c251b39fb923a'}
null
{'https://github.com/bolt/bolt/commit/c0cd530e78c2a8c6d71ceb75b10c251b39fb923a'}
{'https://github.com/bolt/bolt/commit/c0cd530e78c2a8c6d71ceb75b10c251b39fb923a'}
Packagist
GHSA-32wx-4gxx-h48f
Users can edit the tags of any discussion
This advisory concerns a vulnerability which was patched and publicly released on October 5, 2020. ### Impact This vulnerability allowed any registered user to edit the tags of any discussion for which they have READ access using the REST API. Users were able to remove any existing tag, and add any tag in which they ...
null
2021-01-26T03:45:41Z
2021-01-29T18:13:32Z
MODERATE
null
{'CWE-639'}
{'https://github.com/flarum/core/issues/2355', 'https://discuss.flarum.org/d/25059-security-update-to-flarum-tags-010-beta132', 'https://github.com/flarum/tags/security/advisories/GHSA-32wx-4gxx-h48f', 'https://packagist.org/packages/flarum/tags', 'https://github.com/flarum/tags/commit/c8fcd000857493f1e4cc00b6f2771ce38...
null
{'https://github.com/flarum/tags/commit/c8fcd000857493f1e4cc00b6f2771ce388b93e9d'}
{'https://github.com/flarum/tags/commit/c8fcd000857493f1e4cc00b6f2771ce388b93e9d'}
Packagist
GHSA-f545-vpwp-r9j7
showdoc is vulnerable to URL Redirection to Untrusted Site
showdoc is vulnerable to URL Redirection to Untrusted Site.
{'CVE-2021-3989'}
2021-12-03T15:18:14Z
2021-12-03T20:41:35Z
MODERATE
null
{'CWE-601'}
{'https://huntr.dev/bounties/ffc61eff-efea-42c5-92c2-e043fdf904d5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3989', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/335afc7ed6d6627c3d0434aa9acc168c77117614'}
null
{'https://github.com/star7th/showdoc/commit/335afc7ed6d6627c3d0434aa9acc168c77117614'}
{'https://github.com/star7th/showdoc/commit/335afc7ed6d6627c3d0434aa9acc168c77117614'}
Packagist
GHSA-5fvx-5p2r-4mvp
Open Redirect in firefly-iii
firefly-iii is vulnerable to URL Redirection to Untrusted Site
{'CVE-2021-3851'}
2021-10-25T20:08:26Z
2021-10-21T17:48:41Z
MODERATE
null
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3851', 'https://huntr.dev/bounties/549a1040-9b5e-420b-9b80-20700dd9d592', 'https://github.com/firefly-iii/firefly-iii/', 'https://github.com/firefly-iii/firefly-iii/commit/8662dfa4c0f71efef61c31dc015c6f723db8318d'}
null
{'https://github.com/firefly-iii/firefly-iii/commit/8662dfa4c0f71efef61c31dc015c6f723db8318d'}
{'https://github.com/firefly-iii/firefly-iii/commit/8662dfa4c0f71efef61c31dc015c6f723db8318d'}
Packagist
GHSA-34hv-f45p-4qfq
Open redirect in wwbn/avideo
Open redirect vulnerability in objects/login.json.php in WWBN AVideo through 11.6, allows attackers to arbitrarily redirect users from a crafted url to the login page. A patch is available on the `master` branch of the repository.
{'CVE-2022-27463'}
2022-04-19T14:13:44Z
2022-04-06T00:01:29Z
MODERATE
null
{'CWE-601'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-27463', 'https://avideo.tube/', 'https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c', 'https://github.com/WWBN/AVideo'}
null
{'https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c'}
{'https://github.com/WWBN/AVideo/commit/77e9aa6411ff4b97571eb82e587139ec05ff894c'}
Packagist
GHSA-pqm6-cgwr-x6pf
Signature validation bypass in XmlSecLibs
Rob Richards XmlSecLibs, all versions prior to v3.0.3, as used for example by SimpleSAMLphp, performed incorrect validation of cryptographic signatures in XML messages, allowing an authenticated attacker to impersonate others or elevate privileges by creating a crafted XML message.
{'CVE-2019-3465'}
2021-08-18T22:14:37Z
2019-11-08T20:06:46Z
HIGH
null
{'CWE-347'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OCSR3V6LNWJAD37VQB6M2K7P4RQSCVFG/', 'https://github.com/robrichards/xmlseclibs/commit/0a53d3c3aa87564910cae4ed01416441d3ae0db5', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/messag...
null
{'https://github.com/robrichards/xmlseclibs/commit/0a53d3c3aa87564910cae4ed01416441d3ae0db5'}
{'https://github.com/robrichards/xmlseclibs/commit/0a53d3c3aa87564910cae4ed01416441d3ae0db5'}
Packagist
GHSA-68v9-3jjq-rvp4
Exposure of Sensitive Information to an Unauthorized Actor
Shopware is an open source eCommerce platform. In versions prior to 6.4.1.1 the admin api has exposed some internal hidden fields when an association has been loaded with a to many reference. Users are recommend to update to version 6.4.1.1. You can get the update to 6.4.1.1 regularly via the Auto-Updater or directly v...
{'CVE-2021-32716'}
2021-06-25T15:30:08Z
2021-09-08T18:00:40Z
MODERATE
null
{'CWE-200'}
{'https://github.com/shopware/platform/security/advisories/GHSA-gpmh-g94g-qrhr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32716', 'https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-06-2021'}
null
{'https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb'}
{'https://github.com/shopware/platform/commit/b5c3ce3e93bd121324d72aa9d367cb636ff1c0eb'}
Packagist
GHSA-6wrh-279j-6hvw
HTTP caching is marking private HTTP headers as public in Shopware
### Impact HTTP caching is marking private HTTP headers as public ## Patches Fixed in recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ## Workarounds For older v...
{'CVE-2022-24747'}
2022-03-18T20:15:05Z
2022-03-10T17:55:21Z
MODERATE
null
{'CWE-200'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-24747', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022', 'https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f', 'https://github.com/shopware/platform', 'https://github.com/shopware/platform/security/adviso...
null
{'https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f'}
{'https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f'}
Packagist
GHSA-rfcf-m67m-jcrq
Authentication granted to all firewalls instead of just one
Description ----------- When an application defines multiple firewalls, the authenticated token delivered by one of the firewalls is available to all other firewalls. This can be abused when the application defines different providers for different parts of an application. In such a situation, a user authenticated on ...
{'CVE-2021-32693'}
2021-10-21T13:55:20Z
2021-06-21T17:03:44Z
HIGH
null
{'CWE-287'}
{'https://github.com/symfony/security-http', 'https://github.com/symfony/symfony/security/advisories/GHSA-rfcf-m67m-jcrq', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32693', 'https://symfony.com/blog/cve-2021-32693-authentication-granted-to-all-firewalls-instead-of-just-one', 'https://github.com/symfony/symfony/commit/...
null
{'https://github.com/symfony/symfony/commit/3084764ad82f29dbb025df19978b9cbc3ab34728', 'https://github.com/symfony/security-http/commit/6bf4c31219773a558b019ee12e54572174ff8129'}
{'https://github.com/symfony/symfony/commit/3084764ad82f29dbb025df19978b9cbc3ab34728', 'https://github.com/symfony/security-http/commit/6bf4c31219773a558b019ee12e54572174ff8129'}
Packagist
GHSA-r64m-qchj-hrjp
Webcache Poisoning in shopware/platform and shopware/core
### Impact Webcache Poisoning via X-Forwarded-Prefix and sub-request ### Patches We recommend updating to the current version 6.4.6.1. You can get the update to 6.4.6.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 Workarounds For older version...
null
2021-11-24T19:58:48Z
2021-11-24T20:05:19Z
CRITICAL
null
{'CWE-444'}
{'https://github.com/shopware/platform/commit/9062f15450d183f2c666664841efd4f5ef25e0f3', 'https://github.com/shopware/platform/security/advisories/GHSA-r64m-qchj-hrjp', 'https://github.com/shopware/platform'}
null
{'https://github.com/shopware/platform/commit/9062f15450d183f2c666664841efd4f5ef25e0f3'}
{'https://github.com/shopware/platform/commit/9062f15450d183f2c666664841efd4f5ef25e0f3'}
Packagist
GHSA-4rhm-m2fp-hx7q
Potential CSV Injection vector in OctoberCMS
### Impact Any users with the ability to modify any data that could eventually be exported as a CSV file from the `ImportExportController` could potentially introduce a CSV injection into the data to cause the generated CSV export file to be malicious. This requires attackers to achieve the following before a successfu...
{'CVE-2020-5299'}
2021-03-04T18:26:33Z
2020-06-03T21:58:35Z
MODERATE
null
{'CWE-77'}
{'https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a', 'https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5299', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Delet...
null
{'https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484', 'https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a'}
{'https://github.com/octobercms/library/commit/c84bf03f506052c848f2fddc05f24be631427a1a', 'https://github.com/octobercms/october/commit/802d8c8e09a2b342649393edb6d3ceb958851484'}
Packagist
GHSA-42qm-c3cf-9wv2
Code injection in dolibarr/dolibarr
Improper php function sanitization, lead to an ability to inject arbitrary PHP code and run arbitrary commands on file system. In the function "dol_eval" in file "dolibarr/htdocs/core/lib/functions.lib.php" dangerous PHP functions are sanitized using "str_replace" and can be bypassed using following code in $s paramete...
{'CVE-2022-0819'}
2022-03-10T15:55:03Z
2022-03-03T00:00:49Z
HIGH
null
{'CWE-94'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0819', 'https://huntr.dev/bounties/b03d4415-d4f9-48c8-9ae2-d3aa248027b5', 'https://github.com/dolibarr/dolibarr', 'https://github.com/dolibarr/dolibarr/commit/2a48dd349e7de0d4a38e448b0d2ecbe25e968075'}
null
{'https://github.com/dolibarr/dolibarr/commit/2a48dd349e7de0d4a38e448b0d2ecbe25e968075'}
{'https://github.com/dolibarr/dolibarr/commit/2a48dd349e7de0d4a38e448b0d2ecbe25e968075'}
Packagist
GHSA-gq77-3r6x-383w
Cross-site Scripting in ShowDoc
ShowDoc version 2.10.3 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0880'}
2022-03-23T14:22:08Z
2022-03-13T00:00:54Z
MODERATE
null
{'CWE-79'}
{'https://github.com/star7th/showdoc/commit/818d7fe731f452acccacf731ce47ec27ad68049c', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0880', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/df347aa9-ed9b-4f75-af99-c83b8aad3bcf'}
null
{'https://github.com/star7th/showdoc/commit/818d7fe731f452acccacf731ce47ec27ad68049c'}
{'https://github.com/star7th/showdoc/commit/818d7fe731f452acccacf731ce47ec27ad68049c'}
Packagist
GHSA-2q66-6cc3-6xm8
CSRF issue on preview pages in Bolt CMS
### Impact Bolt CMS lacked CSRF protection in the preview generating endpoint. Previews are intended to be generated by the admins, developers, chief-editors, and editors, who are authorized to create content in the application. But due to lack of proper CSRF protection, unauthorized users could generate a preview. #...
{'CVE-2020-4040'}
2021-01-08T20:13:19Z
2020-06-09T00:25:41Z
HIGH
null
{'CWE-352'}
{'https://github.com/bolt/bolt/security/advisories/GHSA-2q66-6cc3-6xm8', 'https://github.com/bolt/bolt/pull/7853', 'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-4040', 'http://packetstormsecurity.com/files/158299/Bolt-CMS-3.7.0-XSS-CSRF-Shell-...
null
{'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f'}
{'https://github.com/bolt/bolt/commit/b42cbfcf3e3108c46a80581216ba03ef449e419f'}
Packagist
GHSA-5q5w-mqp6-g2gh
Unrestricted Upload of File with Dangerous Type in jsdecena/laracom
jsdecena/laracom prior to version 2.0.9 is vulnerable to Unrestricted Upload of File with Dangerous Type.
{'CVE-2022-0472'}
2022-02-11T20:51:14Z
2022-02-06T00:01:07Z
MODERATE
null
{'CWE-79', 'CWE-434'}
{'https://huntr.dev/bounties/cb5b8563-15cf-408c-9f79-4871ea0a8713', 'https://github.com/jsdecena/laracom', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0472', 'https://github.com/jsdecena/laracom/commit/256026193ce994dc4c1365e02f414d8a0cd77ae8'}
null
{'https://github.com/jsdecena/laracom/commit/256026193ce994dc4c1365e02f414d8a0cd77ae8'}
{'https://github.com/jsdecena/laracom/commit/256026193ce994dc4c1365e02f414d8a0cd77ae8'}
Packagist
GHSA-hhrj-wp42-32v3
Generation of Error Message Containing Sensitive Information in microweber
Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0660'}
2022-02-28T22:18:00Z
2022-02-19T00:01:36Z
HIGH
null
{'CWE-209'}
{'https://huntr.dev/bounties/01fd2e0d-b8cf-487f-a16c-7b088ef3a291', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0660', 'https://github.com/microweber/microweber/commit/2417bd2eda2aa2868c1dad1abf62341f22bfc20a', 'https://github.com/microweber/microweber'}
null
{'https://github.com/microweber/microweber/commit/2417bd2eda2aa2868c1dad1abf62341f22bfc20a'}
{'https://github.com/microweber/microweber/commit/2417bd2eda2aa2868c1dad1abf62341f22bfc20a'}
Packagist
GHSA-6x3j-x9rp-whxp
Unrestricted Upload of File with Dangerous Type in showdoc
showdoc prior to 2.10.2 is vulnerable to Unrestricted Upload of File with Dangerous Type.
{'CVE-2022-0409'}
2022-03-02T20:59:35Z
2022-02-20T00:00:32Z
HIGH
null
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0409', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/c25bfad1-2611-4226-954f-009e50f966f7', 'https://github.com/star7th/showdoc/commit/7383d7a3c1b0807b6f397ba7df415a0ce7ccc436'}
null
{'https://github.com/star7th/showdoc/commit/7383d7a3c1b0807b6f397ba7df415a0ce7ccc436'}
{'https://github.com/star7th/showdoc/commit/7383d7a3c1b0807b6f397ba7df415a0ce7ccc436'}
Packagist
GHSA-22hc-47cc-7x6f
Cross-site Scripting in Pimcore
Pimcore prior to 10.4.0 is vulnerable to stored cross-site scripting.
{'CVE-2022-0894'}
2022-03-28T21:38:55Z
2022-03-16T00:00:48Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/pull/11447', 'https://huntr.dev/bounties/18f8e85e-3cbf-4915-b649-8cffe99daa95', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0894'}
null
{'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}
{'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}
Packagist
GHSA-54hw-mhgh-x4vc
Business Logic Errors in pimcore
In pimcore versions prior to 10.2.9 discounts could be negative resulting in unintended behavior.
{'CVE-2021-4146'}
2022-01-26T22:09:18Z
2022-01-26T22:09:49Z
MODERATE
null
null
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/issues/11024', 'https://github.com/pimcore/pimcore/pull/11206', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4146', 'https://huntr.dev/bounties/47b37054-cafe-4f48-8b40-c86efc7fb760', 'https://github.com/pimcore/pimcore/commit/7011922f7f0f97a82d8c3...
null
{'https://github.com/pimcore/pimcore/commit/7011922f7f0f97a82d8c378559b91fcdb34604a6'}
{'https://github.com/pimcore/pimcore/commit/7011922f7f0f97a82d8c378559b91fcdb34604a6'}
Packagist
GHSA-vx8v-g3p3-88vg
Weak password hash in LiveHelperChat
The secrethash, which the application relies for multiple security measures, can be brute-forced. The hash is quite small, with only 10 characters of only hexadecimal, making 16^10 possilibities ( 1.099.511.627.776 ). The SHA1 of the secret can be obtained via a captcha string and brute-forced offline with an GPU.
{'CVE-2022-1235'}
2022-04-19T18:01:53Z
2022-04-06T00:01:31Z
HIGH
null
{'CWE-916'}
{'https://github.com/livehelperchat/livehelperchat/commit/6538d6df3d8a60fee254170b08dd76a161f7bfdc', 'https://github.com/livehelperchat/livehelperchat', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1235', 'https://huntr.dev/bounties/92f7b2d4-fa88-4c62-a2ee-721eebe01705'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/6538d6df3d8a60fee254170b08dd76a161f7bfdc'}
{'https://github.com/livehelperchat/livehelperchat/commit/6538d6df3d8a60fee254170b08dd76a161f7bfdc'}
Packagist
GHSA-mg5h-9rhq-4cqx
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0937'}
2022-03-23T15:40:15Z
2022-03-15T00:01:02Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/6127739d-f4f2-44cd-ae3d-e3ccb7f0d7b5', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0937', 'https://github.com/star7th/showdoc/commit/42c0d9813df3035728b36116a6ce9116e6fa8ed3'}
null
{'https://github.com/star7th/showdoc/commit/42c0d9813df3035728b36116a6ce9116e6fa8ed3'}
{'https://github.com/star7th/showdoc/commit/42c0d9813df3035728b36116a6ce9116e6fa8ed3'}
Packagist
GHSA-7rpc-9m88-cf9w
OS Command Injection Vulnerability and Potential Zip Slip Vulnerability in baserCMS
There is an OS Command Injection Vulnerability on the management system of baserCMS. This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. If you are eligible, please update to the new version as soon as possible. Target baserCMS 4.5.3 and earlier ver...
{'CVE-2021-41243'}
2021-12-01T14:32:13Z
2021-12-01T18:29:42Z
CRITICAL
null
{'CWE-78'}
{'https://github.com/baserproject/basercms/security/advisories/GHSA-7rpc-9m88-cf9w', 'https://github.com/baserproject/basercms', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41243', 'https://github.com/baserproject/basercms/commit/9088b99c329d1faff3a2f1269f37b9a9d8d5f6ff'}
null
{'https://github.com/baserproject/basercms/commit/9088b99c329d1faff3a2f1269f37b9a9d8d5f6ff'}
{'https://github.com/baserproject/basercms/commit/9088b99c329d1faff3a2f1269f37b9a9d8d5f6ff'}
Packagist
GHSA-9w8f-7wgr-2h7g
kimai2 is vulnerable to Improper Access Control
kimai2 is vulnerable to Improper Access Control
{'CVE-2021-3992'}
2021-12-03T15:37:45Z
2021-12-03T20:42:59Z
MODERATE
null
{'CWE-863', 'CWE-284'}
{'https://github.com/kevinpapst/kimai2/commit/ff9acab0fc81f0e9490462739ef15fe4ab028ea5', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3992', 'https://huntr.dev/bounties/a0c438fb-c8e1-40cf-acc6-c8a532b80b93', 'https://github.com/kevinpapst/kimai2'}
null
{'https://github.com/kevinpapst/kimai2/commit/ff9acab0fc81f0e9490462739ef15fe4ab028ea5'}
{'https://github.com/kevinpapst/kimai2/commit/ff9acab0fc81f0e9490462739ef15fe4ab028ea5'}
Packagist
GHSA-4xc7-x2jr-cr74
Improper Authorization in dolibarr/dolibarr
Dolibarr allows improper access control issues in the userphoto modulepart. The impact could lead to data exposure as the attached files and documents may contain sensitive information of relevant parties such as contacts, suppliers, invoices, orders, stocks, agenda, accounting and more.
{'CVE-2022-0731'}
2022-03-03T22:06:43Z
2022-02-24T00:00:52Z
MODERATE
null
{'CWE-863'}
{'https://github.com/dolibarr/dolibarr', 'https://huntr.dev/bounties/e242ab4e-fc70-4b2c-a42d-5b3ee4895de8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0731', 'https://github.com/dolibarr/dolibarr/commit/209ab708d4b65fbd88ba4340d60b7822cb72651a'}
null
{'https://github.com/dolibarr/dolibarr/commit/209ab708d4b65fbd88ba4340d60b7822cb72651a'}
{'https://github.com/dolibarr/dolibarr/commit/209ab708d4b65fbd88ba4340d60b7822cb72651a'}
Packagist
GHSA-v8mp-hhjq-h4cj
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.ofd` file upload.
{'CVE-2022-0965'}
2022-03-29T17:36:00Z
2022-03-16T00:00:46Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/d66c88ce-63e2-4515-a429-8e43a42aa347', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0965', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
null
{'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
{'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
Packagist
GHSA-wpww-4jf4-4hx8
Edit feed settings and others, Cross Site Scripting(XSS) Vulnerability in Latest Release 4.4.0
baserCMS 4.4.0 and earlier is affected by Cross Site Scripting (XSS). Impact: XSS via Arbitrary script execution. Attack vector is: Administrator must be logged in. Components are: Edit feed settings, Edit widget area, Sub site new registration, New category registration Tested baserCMS Version : 4.4.0 (Latest) Affect...
{'CVE-2020-15273'}
2021-01-07T22:49:25Z
2020-11-04T21:08:38Z
LOW
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-15273', 'https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1', 'https://github.com/baserproject/basercms/security/advisories/GHSA-wpww-4jf4-4hx8', 'https://packagist.org/packages/baserproject/basercms'}
null
{'https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1'}
{'https://github.com/baserproject/basercms/commit/b70474ef9dcee6ad8826360884625dc7ca9041a1'}
Packagist
GHSA-7gm7-8q8v-9gf2
Server-Side Request Forgery (SSRF) in Shopware
### Impact The attacker can abuse the Admin SDK functionality on the server to read or update internal resources. ### Patches We recommend updating to the current version 6.4.10.1. You can get the update to 6.4.10.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/d...
{'CVE-2022-24871'}
2022-04-22T21:04:07Z
2022-04-22T21:04:07Z
HIGH
null
{'CWE-918'}
{'https://github.com/shopware/platform/security/advisories/GHSA-7gm7-8q8v-9gf2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24871', 'https://github.com/shopware/platform', 'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c', 'https://docs.shopware.com/en/shopware-6-en/security-updates...
null
{'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c'}
{'https://github.com/shopware/platform/commit/083765e2d64a00315050c4891800c9e98ba0c77c'}
Packagist
GHSA-r6hh-5g3q-wwgc
Stored Cross-site Scripting in grav
Grav prior to 1.7.31 is vulnerable to stored cross-site scripting.
{'CVE-2022-0970'}
2022-03-28T22:27:36Z
2022-03-16T00:00:45Z
HIGH
null
{'CWE-79'}
{'https://huntr.dev/bounties/dd436c44-cbf4-48ac-8817-3a24872534ec', 'https://github.com/getgrav/grav', 'https://github.com/getgrav/grav/commit/f19297d5f70476e7bedae9f2acef6b43615538b8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0970'}
null
{'https://github.com/getgrav/grav/commit/f19297d5f70476e7bedae9f2acef6b43615538b8'}
{'https://github.com/getgrav/grav/commit/f19297d5f70476e7bedae9f2acef6b43615538b8'}
Packagist
GHSA-fpqv-x9hm-35j9
Potential XSS vulnerability in Kitodo.Presentation
### Impact Kitodo.Presentation fails to properly encode URL parameters for output in HTML making it vulnerable to Cross Site Scripting (XSS). Only sites using the `ListView`, `Navigation` or `PageView` plugins are affected. It also includes jQuery 3.4.1 which is known to be vulnerable against Cross Site Scripting, alt...
{'CVE-2020-16095'}
2021-09-23T18:13:50Z
2020-07-31T17:39:22Z
MODERATE
null
{'CWE-79'}
{'https://github.com/kitodo/kitodo-presentation', 'https://github.com/kitodo/kitodo-presentation/security/advisories/GHSA-fpqv-x9hm-35j9', 'https://github.com/kitodo/kitodo-presentation/commit/6a67256388350cc69efa7f36bbaee50c919ca23c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-16095', 'https://typo3.org/help/security-...
null
{'https://github.com/kitodo/kitodo-presentation/commit/6a67256388350cc69efa7f36bbaee50c919ca23c'}
{'https://github.com/kitodo/kitodo-presentation/commit/6a67256388350cc69efa7f36bbaee50c919ca23c'}
Packagist
GHSA-46c5-pfj8-fv65
Improperly checked metadata on tools/armour itemstacks received from the client
### Impact Due to a workaround applied in 1.13, an attacker may send a negative damage/meta value in a tool or armour item's NBT, which `TypeConverter` then blindly uses as if it was valid without being checked. When this invalid metadata value reaches `Durable->setDamage()`, an exception is thrown because the metadat...
null
2022-03-18T22:36:03Z
2022-03-18T22:36:03Z
HIGH
null
{'CWE-704'}
{'https://github.com/pmmp/PocketMine-MP/commit/c8e1cfcbee4945fd4b63d2a7e96025c59744d4f1', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-46c5-pfj8-fv65', 'https://github.com/pmmp/PocketMine-MP'}
null
{'https://github.com/pmmp/PocketMine-MP/commit/c8e1cfcbee4945fd4b63d2a7e96025c59744d4f1'}
{'https://github.com/pmmp/PocketMine-MP/commit/c8e1cfcbee4945fd4b63d2a7e96025c59744d4f1'}
Packagist
GHSA-q863-cchm-c6c6
SQL Injection in Fork CMS
Fork CMS contains a SQL injection vulnerability in versions prior to version 5.11.1. When deleting submissions which belong to a formular (made with module `FormBuilder`), the parameter `id[]` is vulnerable to SQL injection.
{'CVE-2022-0153'}
2022-03-30T20:34:44Z
2022-03-25T00:00:33Z
HIGH
null
{'CWE-89'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0153', 'https://github.com/forkcms/forkcms/commit/7a12046a67ae5d8cf04face3ee75e55f03a1a608', 'https://github.com/forkcms/forkcms', 'https://huntr.dev/bounties/841503dd-311c-470a-a8ec-d4579b3274eb'}
null
{'https://github.com/forkcms/forkcms/commit/7a12046a67ae5d8cf04face3ee75e55f03a1a608'}
{'https://github.com/forkcms/forkcms/commit/7a12046a67ae5d8cf04face3ee75e55f03a1a608'}
Packagist
GHSA-qpgw-2c72-4c89
Mautic users able to download any files from server using filemanager
### Impact Mautic versions 1.0.0 - 2.11.0 are vulnerable to allowing any authorized Mautic user session (must be logged into Mautic) to use the Filemanager to download any file from the server that the web user has access to. ### Patches Update to 2.12.0 or later. ### Workarounds None ### For more information If you...
{'CVE-2017-1000490'}
2021-01-19T20:50:28Z
2021-01-19T20:50:38Z
HIGH
null
{'CWE-22'}
{'https://github.com/mautic/mautic/commit/3b01786433ae15e9a23f1eb9b0d3dfdb065b6241', 'https://github.com/mautic/mautic/releases/tag/2.12.0', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000490', 'https://github.com/mautic/mautic/security/advisories/GHSA-qpgw-2c72-4c89'}
null
{'https://github.com/mautic/mautic/commit/3b01786433ae15e9a23f1eb9b0d3dfdb065b6241'}
{'https://github.com/mautic/mautic/commit/3b01786433ae15e9a23f1eb9b0d3dfdb065b6241'}
Packagist
GHSA-px8v-hxxx-2rgh
Potential Code Injection in Sprout Forms
### Impact A potential Server-Side Template Injection vulnerability exists in Sprout Forms which could lead to the execution of Twig code. ### Patches The problem is fixed in`barrelstrength/sprout-forms:v3.9.0` which upgrades to `barrelstrength/sprout-base-email:v1.2.7` ### Workarounds Users unable to upgrade shou...
{'CVE-2020-11056'}
2021-10-27T17:00:42Z
2020-05-08T21:00:02Z
CRITICAL
null
{'CWE-94', 'CWE-74'}
{'https://github.com/barrelstrength/craft-sprout-base-email/commit/5ef759f4713ede6dbf77c9d9df9f992876e43a49', 'https://github.com/barrelstrength/craft-sprout-forms/security/advisories/GHSA-px8v-hxxx-2rgh', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11056', 'https://github.com/barrelstrength/craft-sprout-forms/blob/v3/C...
null
{'https://github.com/barrelstrength/craft-sprout-base-email/commit/5ef759f4713ede6dbf77c9d9df9f992876e43a49'}
{'https://github.com/barrelstrength/craft-sprout-base-email/commit/5ef759f4713ede6dbf77c9d9df9f992876e43a49'}
Packagist
GHSA-j878-43hm-8gr5
Unrestricted Upload of File with Dangerous Type in Microweber
In Microweber prior to 1.2.12, a malicious actor may abuse the Backup/Restore feature to achieve Remote Code Execution.
{'CVE-2022-0921'}
2022-03-23T15:35:11Z
2022-03-12T00:00:30Z
MODERATE
null
{'CWE-434'}
{'https://github.com/microweber/microweber/commit/867bdda1b4660b0795ad7f87ab5abe9e44b2b318', 'https://huntr.dev/bounties/e368be37-1cb4-4292-8d48-07132725f622', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0921'}
null
{'https://github.com/microweber/microweber/commit/867bdda1b4660b0795ad7f87ab5abe9e44b2b318'}
{'https://github.com/microweber/microweber/commit/867bdda1b4660b0795ad7f87ab5abe9e44b2b318'}
Packagist
GHSA-4mqv-gcr3-pff9
"Cross-site scripting in phpoffice/phpspreadsheet"
"This affects the package phpoffice/phpspreadsheet. The library is vulnerable to XSS when creating an html output from an excel file by adding a comment on any cell. The root cause of this issue is within the HTML writer where user comments are concatenated as part of link and this is returned as HTML."
{'CVE-2020-7776'}
2021-04-09T21:12:55Z
2021-05-06T18:53:37Z
MODERATE
null
{'CWE-79'}
{'https://snyk.io/vuln/SNYK-PHP-PHPOFFICEPHPSPREADSHEET-1048856', 'https://github.com/PHPOffice/PhpSpreadsheet/commit/0ed5b800be2136bcb8fa9c1bdf59abc957a98845', 'https://nvd.nist.gov/vuln/detail/CVE-2020-7776', 'https://github.com/PHPOffice/PhpSpreadsheet/blob/master/src/PhpSpreadsheet/Writer/Html.php%23L1792'}
null
{'https://github.com/PHPOffice/PhpSpreadsheet/commit/0ed5b800be2136bcb8fa9c1bdf59abc957a98845'}
{'https://github.com/PHPOffice/PhpSpreadsheet/commit/0ed5b800be2136bcb8fa9c1bdf59abc957a98845'}
Packagist
GHSA-jjvm-3mfq-7gc7
Cross-site Scripting in microweber
microweber version 1.2.10 and prior is vulnerable to cross-site scripting.
{'CVE-2022-0506'}
2022-02-14T22:33:59Z
2022-02-09T00:00:31Z
MODERATE
null
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/05d55f2befb1b25375ca5371875ff535d6cc5f70', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/0a5ec24c-343e-4cc4-b27b-2beb19a1c35f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0506'}
null
{'https://github.com/microweber/microweber/commit/05d55f2befb1b25375ca5371875ff535d6cc5f70'}
{'https://github.com/microweber/microweber/commit/05d55f2befb1b25375ca5371875ff535d6cc5f70'}
Packagist
GHSA-vpwq-6cp4-ffqc
Stored Cross-site Scripting in ShowDoc
ShowDoc prior to version 2.10.4 is vulnerable to stored cross-site scripting viva `axd` and `cshtml` file upload.
{'CVE-2022-0945'}
2022-03-28T18:40:15Z
2022-03-16T00:00:49Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0945', 'https://github.com/star7th/showdoc/commit/ba45d19e1d77a7eea866dab30eff5da552694891', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/8702e2bf-4af2-4391-b651-c8c89e7d089e'}
null
{'https://github.com/star7th/showdoc/commit/ba45d19e1d77a7eea866dab30eff5da552694891'}
{'https://github.com/star7th/showdoc/commit/ba45d19e1d77a7eea866dab30eff5da552694891'}
Packagist
GHSA-w3v3-cxq5-9vr4
Incorrect Default Permissions and Improper Access Control in snipe-it
snipe-it is vulnerable to Improper Access Control/Incorrect Default Permissions.
{'CVE-2022-0179'}
2022-01-18T22:17:42Z
2022-01-21T23:58:07Z
MODERATE
null
{'CWE-276', 'CWE-284'}
{'https://github.com/snipe/snipe-it', 'https://huntr.dev/bounties/efdf2ead-f9d1-4767-9f02-d11f762d15e7', 'https://github.com/snipe/snipe-it/commit/cf14a0222c67472086cd08b2155f045edaf75f2e', 'https://github.com/snipe/snipe-it/pull/10498', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0179'}
null
{'https://github.com/snipe/snipe-it/commit/cf14a0222c67472086cd08b2155f045edaf75f2e'}
{'https://github.com/snipe/snipe-it/commit/cf14a0222c67472086cd08b2155f045edaf75f2e'}
Packagist
GHSA-gg6x-xx78-448c
Reflected XSS when importing CSV in OctoberCMS
### Impact A user with the ability to use the import functionality of the `ImportExportController` behavior could be socially engineered by an attacker to upload a maliciously crafted CSV file which could result in a reflected XSS attack on the user in question ### Patches Issue has been patched in Build 466 (v1.0.466...
{'CVE-2020-5298'}
2021-03-04T18:26:46Z
2020-06-03T21:58:32Z
MODERATE
null
{'CWE-87'}
{'https://github.com/octobercms/october/commit/cd0b6a791f995d86071a024464c1702efc50f46c', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5298', 'https://github.com/octobercms/october/security/advisories/GHSA-gg6x-xx78-448c', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-...
null
{'https://github.com/octobercms/october/commit/cd0b6a791f995d86071a024464c1702efc50f46c'}
{'https://github.com/octobercms/october/commit/cd0b6a791f995d86071a024464c1702efc50f46c'}
Packagist
GHSA-5fxf-x22x-5q38
Cross-site Scripting in microweber
XSS on dynamic_text module in GitHub repository microweber/microweber prior to 1.2.12.
{'CVE-2022-0929'}
2022-03-22T20:02:30Z
2022-03-13T00:00:54Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0929', 'https://github.com/microweber/microweber/commit/de6d17b52d261902653fbdd2ecefcaac82e54256', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/66abf7ec-2dd7-4cb7-87f5-e91375883f03'}
null
{'https://github.com/microweber/microweber/commit/de6d17b52d261902653fbdd2ecefcaac82e54256'}
{'https://github.com/microweber/microweber/commit/de6d17b52d261902653fbdd2ecefcaac82e54256'}
Packagist
GHSA-vxrc-68xx-x48g
Sandbox Information Disclosure
A sandbox information disclosure exists in Twig before 1.38.0 and 2.x before 2.7.0 because, under some circumstances, it is possible to call the __toString() method on an object even if not allowed by the security policy in place.
{'CVE-2019-9942'}
2022-04-06T20:28:16Z
2022-03-26T00:25:25Z
LOW
null
null
{'https://seclists.org/bugtraq/2019/Mar/60', 'https://www.debian.org/security/2019/dsa-4419', 'https://github.com/twigphp/Twig/commit/eac5422956e1dcca89a3669a03a3ff32f0502077', 'https://github.com/twigphp/Twig', 'https://symfony.com/blog/twig-sandbox-information-disclosure', 'https://github.com/FriendsOfPHP/security-ad...
null
{'https://github.com/twigphp/Twig/commit/eac5422956e1dcca89a3669a03a3ff32f0502077'}
{'https://github.com/twigphp/Twig/commit/eac5422956e1dcca89a3669a03a3ff32f0502077'}
Packagist
GHSA-v73w-r9xg-7cr9
Use of insecure jQuery version in OctoberCMS
### Impact Passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. ### Patches Issue has been patched in Build 466 (v1.0.466) by applying the recommended patch from @jquery. ### Workarounds Apply htt...
null
2021-10-08T21:26:19Z
2020-06-05T19:37:49Z
MODERATE
null
null
{'https://github.com/octobercms/october', 'https://github.com/octobercms/october/commit/5c7ba9fbe9f2b596b2f0e3436ee06b91b97e5892', 'https://github.com/octobercms/october/issues/5097', 'https://github.com/octobercms/october/security/advisories/GHSA-v73w-r9xg-7cr9'}
null
{'https://github.com/octobercms/october/commit/5c7ba9fbe9f2b596b2f0e3436ee06b91b97e5892'}
{'https://github.com/octobercms/october/commit/5c7ba9fbe9f2b596b2f0e3436ee06b91b97e5892'}
Packagist
GHSA-m2wv-m5pf-284r
Cross-site Scripting in teampass
Teampass 2.1.26 allows reflected XSS via the index.php PATH_INFO. Someone must open a link for the Teampass Password Manager index page containing malicious payload.
{'CVE-2022-26980'}
2022-04-05T18:37:01Z
2022-03-29T00:01:09Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-26980', 'https://github.com/nilsteampassnet/TeamPass/commits/teampass_2', 'https://gist.github.com/RNPG/6919286e0daebce7634d0a744e060dca'}
null
{'https://github.com/nilsteampassnet/TeamPass/commits/teampass_2'}
{'https://github.com/nilsteampassnet/TeamPass/commits/teampass_2'}
Packagist
GHSA-gx7g-wjxg-jwwj
Cross-Site Request Forgery in YOURLS
YOURLS versions 1.8.2 and prior are vulnerable to Cross-Site Request Forgery.
{'CVE-2022-0088'}
2022-04-18T22:17:42Z
2022-04-04T00:00:55Z
LOW
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0088', 'https://github.com/yourls/yourls/commit/1de256d8694b0ec7d4df2ac1d5976d4055e09d59', 'https://github.com/yourls/yourls', 'https://github.com/YOURLS/YOURLS/pull/3264', 'https://huntr.dev/bounties/d01f0726-1a0f-4575-ae17-4b5319b11c29', 'https://github.com/YOURLS/YOURLS/is...
null
{'https://github.com/yourls/yourls/commit/1de256d8694b0ec7d4df2ac1d5976d4055e09d59'}
{'https://github.com/yourls/yourls/commit/1de256d8694b0ec7d4df2ac1d5976d4055e09d59'}
Packagist
GHSA-9hgc-wpc5-v8p9
An attacker can execute malicious javascript in Live Helper Chat
Cross-site Scripting (XSS) in GitHub repository livehelperchat/livehelperchat prior to 3.99v. Attacker can execute malicious javascript on application.
{'CVE-2022-1530'}
2022-05-03T20:49:15Z
2022-04-30T00:00:37Z
LOW
null
{'CWE-79'}
{'https://github.com/livehelperchat/livehelperchat/commit/edef7a8387be718d0de2dfd1e722789afb0461bc', 'https://huntr.dev/bounties/8fd8de01-7e83-4324-9cc8-a97acb9b70d6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1530', 'https://github.com/livehelperchat/livehelperchat'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/edef7a8387be718d0de2dfd1e722789afb0461bc'}
{'https://github.com/livehelperchat/livehelperchat/commit/edef7a8387be718d0de2dfd1e722789afb0461bc'}
Packagist
GHSA-2p89-5f22-8qvf
Exposure of Sensitive Information to an Unauthorized Actor
Shopware is an open source eCommerce platform. Versions prior to 6.3.5.1 may leak of information via Store-API. The vulnerability could only be fixed by changing the API system, which involves a non-backward-compatible change. Only consumers of the Store-API should be affected by this change. We recommend to update to ...
{'CVE-2021-32711'}
2021-06-25T15:29:10Z
2021-09-08T18:00:32Z
CRITICAL
null
{'CWE-200'}
{'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-02-2021', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32711', 'https://github.com/shopware/platform/security/advisories/GHSA-f2vv-h5x4-57gr', 'https://github.com/shopware/platform/commit/157fb84a8b3b4ace4be165a033d559826704829b'}
null
{'https://github.com/shopware/platform/commit/157fb84a8b3b4ace4be165a033d559826704829b'}
{'https://github.com/shopware/platform/commit/157fb84a8b3b4ace4be165a033d559826704829b'}
Packagist
GHSA-ph98-v78f-jqrm
SQL injection in jackalope/jackalope-doctrine-dbal
### Impact Users can provoke SQL injections if they can specify a node name or query. ### Patches Upgrade to version 1.7.4 If that is not possible, you can escape all places where `$property` is used to filter `sv:name` in the class `Jackalope\Transport\DoctrineDBAL\Query\QOMWalker`: `XPath::escape($property)`. ##...
{'CVE-2021-43822'}
2021-12-14T15:25:41Z
2021-12-14T21:08:13Z
HIGH
null
{'CWE-89'}
{'https://github.com/jackalope/jackalope-doctrine-dbal', 'https://github.com/jackalope/jackalope-doctrine-dbal/security/advisories/GHSA-ph98-v78f-jqrm', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43822', 'https://github.com/jackalope/jackalope-doctrine-dbal/commit/9d179a36d320330ddb303ea3a7c98d3a33d231db'}
null
{'https://github.com/jackalope/jackalope-doctrine-dbal/commit/9d179a36d320330ddb303ea3a7c98d3a33d231db'}
{'https://github.com/jackalope/jackalope-doctrine-dbal/commit/9d179a36d320330ddb303ea3a7c98d3a33d231db'}
Packagist
GHSA-wf5p-f5xr-c4jj
SQL Injection in rosariosis
An unauthenticated SQL Injection vulnerability in Rosario Student Information System (aka rosariosis) before 8.1.1 allows remote attackers to execute PostgreSQL statements (e.g., SELECT, INSERT, UPDATE, and DELETE) through /Side.php via the syear parameter.
{'CVE-2021-44427'}
2021-12-01T21:03:52Z
2021-12-02T17:48:53Z
CRITICAL
null
{'CWE-89'}
{'https://gitlab.com/francoisjacquet/rosariosis/-/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44427', 'https://github.com/francoisjacquet/rosariosis/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016', 'https://gitlab.com/francoisjacquet/rosariosis/blob/mobile/CHANGES.md#ch...
null
{'https://gitlab.com/francoisjacquet/rosariosis/-/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016', 'https://github.com/francoisjacquet/rosariosis/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016'}
{'https://github.com/francoisjacquet/rosariosis/commit/e001430aa9fb53d2502fb6f036f6c51c578d2016'}
Packagist
GHSA-fjqg-w8g6-hhq8
Improper Authentication and Improper Access Control in Dolibarr
In “Dolibarr” application, v3.3.beta1_20121221 to v13.0.2 have “Modify” access for admin level users to change other user’s details but fails to validate already existing “Login” name, while renaming the user “Login”. This leads to complete account takeover of the victim user. This happens since the password gets overw...
{'CVE-2021-25956'}
2021-10-21T14:19:44Z
2021-09-02T17:16:28Z
HIGH
null
{'CWE-287', 'CWE-284'}
{'https://github.com/Dolibarr/dolibarr/commit/c4cba43bade736ab89e31013a6ccee59a6e077ee', 'https://nvd.nist.gov/vuln/detail/CVE-2021-25956', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2021-25956', 'https://github.com/Dolibarr/dolibarr'}
null
{'https://github.com/Dolibarr/dolibarr/commit/c4cba43bade736ab89e31013a6ccee59a6e077ee'}
{'https://github.com/Dolibarr/dolibarr/commit/c4cba43bade736ab89e31013a6ccee59a6e077ee'}
Packagist
GHSA-w4hp-pcp8-qhf3
Cross-site Scripting in livehelperchat
Stored XSS is found in Settings>Live help configuration>Departments->Departments groups->edit When a user creates a new webhook under the NAME field and puts a payload {{constructor.constructor('alert(1)')()}}, the input gets stored, at user edit groupname , the payload gets executed.
{'CVE-2022-0387'}
2022-02-03T20:16:38Z
2022-01-28T23:06:32Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/2e09035b-8f98-4930-b7e8-7abe5f722b98', 'https://github.com/livehelperchat/livehelperchat/commit/ff70c7dd641b68b9afb170b89ec1ef003a4e3444', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0387', 'https://github.com/livehelperchat/livehelperchat'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/ff70c7dd641b68b9afb170b89ec1ef003a4e3444'}
{'https://github.com/livehelperchat/livehelperchat/commit/ff70c7dd641b68b9afb170b89ec1ef003a4e3444'}
Packagist
GHSA-rgg3-3wh7-w935
Unrestricted Upload of File with Dangerous Type in Zenario CMS
Zenario CMS 9.0.54156 is vulnerable to File Upload. The web server can be compromised by uploading and executing a web-shell which can run commands, browse system files, browse local resources, attack other servers, and exploit the local vulnerabilities, and so forth.
{'CVE-2021-42171'}
2022-03-28T22:21:50Z
2022-03-15T00:00:58Z
CRITICAL
null
{'CWE-434'}
{'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007', 'https://github.com/TribalSystems/Zenario', 'https://github.com/hieuminhnv/Zenario-CMS-9.0-last-version/issues/2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-42171', 'https://github.com/TribalSystems/Zenario/releases/tag/9.0.55...
null
{'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007'}
{'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007'}
Packagist
GHSA-8j72-p2wm-6738
Persistent XSS vulnerability in filename of attached file in PrivateBin
On 24th of December 2019 one of the [property based unit tests](https://github.com/PrivateBin/PrivateBin/blob/master/tst/README.md#property-based-unit-testing) reported a [failure](https://travis-ci.org/PrivateBin/PrivateBin/jobs/629180605#L782). Upon investigation, [@elrido](https://github.com/elrido) discovered that ...
{'CVE-2020-5223'}
2021-01-14T17:43:40Z
2020-01-14T20:19:33Z
MODERATE
null
{'CWE-79'}
{'https://privatebin.info/news/v1.3.2-v1.2.2-release.html', 'https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-8j72-p2wm-6738', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5223', 'https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6', 'https://github.com/PrivateBin/Pri...
null
{'https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6'}
{'https://github.com/PrivateBin/PrivateBin/commit/8d0ac336d23cd8c98e71d5f21cdadcae9c8a26e6'}
Packagist
GHSA-xm9f-vxmx-4m58
Data Flow Sanitation Issue Fix
### Impact Due to missing sanitation in data flow it was possible for admin users to upload arbitrary executable files to the server.
{'CVE-2021-32759'}
2021-08-30T16:42:38Z
2021-08-30T17:20:41Z
HIGH
null
{'CWE-20'}
{'https://github.com/OpenMage/magento-lts/security/advisories/GHSA-xm9f-vxmx-4m58', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32759', 'https://github.com/OpenMage/magento-lts/releases/tag/v20.0.13', 'https://github.com/OpenMage/magento-lts/releases/tag/v19.4.15', 'https://github.com/OpenMage/magento-lts/commit/34709ac...
null
{'https://github.com/OpenMage/magento-lts/commit/34709ac642d554aa1824892059186dd329db744b'}
{'https://github.com/OpenMage/magento-lts/commit/34709ac642d554aa1824892059186dd329db744b'}
Packagist
GHSA-vwfx-hh3w-fj99
Potential XSS injection in the newsletter conditions field
### Impact An employee can inject javascript in the newsletter condition field that will then be executed on the front office ### Patches The issue has been fixed in 2.6.1
{'CVE-2021-21418'}
2021-03-31T17:35:42Z
2021-04-06T17:24:14Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-21418', 'https://github.com/PrestaShop/ps_emailsubscription/security/advisories/GHSA-vwfx-hh3w-fj99', 'https://github.com/PrestaShop/ps_emailsubscription/commit/664ffb225e2afb4a32640bbedad667dc6e660b70', 'https://packagist.org/packages/prestashop/ps_emailsubscription', 'https...
null
{'https://github.com/PrestaShop/ps_emailsubscription/commit/664ffb225e2afb4a32640bbedad667dc6e660b70'}
{'https://github.com/PrestaShop/ps_emailsubscription/commit/664ffb225e2afb4a32640bbedad667dc6e660b70'}
Packagist
GHSA-5vr6-hm68-5j9p
Cross-site Scripting in LibreNMS
LibreNMS 21.11.0 is affected by is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/forms/poller-groups.inc.php.
{'CVE-2021-44279'}
2021-12-06T21:36:37Z
2021-12-03T20:49:16Z
MODERATE
null
{'CWE-79'}
{'https://github.com/librenms/librenms/pull/13554', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44279', 'https://github.com/librenms/librenms/', 'https://github.com/librenms/librenms/pull/13554/commits/4f231a0f49b6c953d506913364ffd7fb3a660630'}
null
{'https://github.com/librenms/librenms/pull/13554/commits/4f231a0f49b6c953d506913364ffd7fb3a660630'}
{'https://github.com/librenms/librenms/pull/13554/commits/4f231a0f49b6c953d506913364ffd7fb3a660630'}
Packagist
GHSA-jv6v-fvvx-4932
Arbitrary File Deletion vulnerability in OctoberCMS
### Impact An attacker can exploit this vulnerability to delete arbitrary local files of an October CMS server. The vulnerability is only exploitable by an authenticated backend user with the `cms.manage_assets` permission. ### Patches Issue has been patched in Build 466 (v1.0.466). ### Workarounds Apply https://gith...
{'CVE-2020-5296'}
2021-03-04T18:28:29Z
2020-06-03T21:58:21Z
MODERATE
null
{'CWE-73'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5296', 'https://github.com/octobercms/october/security/advisories/GHSA-jv6v-fvvx-4932', 'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc', 'http://packetstormsecurity.com/files/158730/October-CMS-Build-465-XSS-File-Read-File-Deletion-CSV-...
null
{'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc'}
{'https://github.com/octobercms/october/commit/2b8939cc8b5b6fe81e093fe2c9f883ada4e3c8cc'}
Packagist
GHSA-v3mr-gp7j-pw5w
Possible SQL injection in tablelookupwizard Contao Extension
### Impact The currently selected widget values were not correctly sanitized before passing it to the database, leading to an SQL injection possibility. ### Patches The issue has been patched in `tablelookupwizard` version 3.3.5 and version 4.0.0. ### For more information If you have any questions or comments about t...
null
2022-02-04T17:26:40Z
2022-02-10T22:33:46Z
HIGH
null
{'CWE-89'}
{'https://github.com/terminal42/contao-tablelookupwizard/commit/a5e723a28f110b7df8ffc4175cef9b061d3cc717', 'https://github.com/terminal42/contao-tablelookupwizard', 'https://github.com/terminal42/contao-tablelookupwizard/security/advisories/GHSA-v3mr-gp7j-pw5w'}
null
{'https://github.com/terminal42/contao-tablelookupwizard/commit/a5e723a28f110b7df8ffc4175cef9b061d3cc717'}
{'https://github.com/terminal42/contao-tablelookupwizard/commit/a5e723a28f110b7df8ffc4175cef9b061d3cc717'}
Packagist
GHSA-h77r-rp97-7rv4
Privilage Escalation in moodle
In moodle, insufficient capability checks could lead to users with the ability to course restore adding additional capabilities to roles within that course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.14 and earlier unsupported versions. This is fixed in moodle 3.9.3, 3.8.6, 3.7.9, 3.5.15, a...
{'CVE-2020-25699'}
2021-10-20T17:37:39Z
2021-03-29T20:43:01Z
HIGH
null
{'CWE-863', 'CWE-269'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-25699', 'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5', 'https://github.com/moodle/moodle', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895425', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/messa...
null
{'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5'}
{'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5'}
Packagist
GHSA-hhr9-7xvh-8xgc
Server side request forgery in LiveHelperChat
SSRF filter bypass port 80, 433 in LiveHelperChat prior to v3.67. An attacker could make the application perform arbitrary requests, bypass CVE-2022-1191
{'CVE-2022-1213'}
2022-04-19T17:55:45Z
2022-04-06T00:01:32Z
HIGH
null
{'CWE-918'}
{'https://huntr.dev/bounties/084387f6-5b9c-4017-baa2-5fcf65b051e1', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1213', 'https://github.com/livehelperchat/livehelperchat', 'https://github.com/LiveHelperChat/livehelperchat/issues/1752', 'https://github.com/livehelperchat/livehelperchat/commit/abc9599ee7aded466ca216741dcae...
null
{'https://github.com/livehelperchat/livehelperchat/commit/abc9599ee7aded466ca216741dcaea533c908111'}
{'https://github.com/livehelperchat/livehelperchat/commit/abc9599ee7aded466ca216741dcaea533c908111'}
Packagist
GHSA-9652-78hp-w58c
Stored cross-site scripting in PressBooks
PressBooks 5.17.3 contains a cross-site scripting (XSS). Stored XSS can be submitted via the Book Info's Long Description Body, and all actions to open or preview the books page will result in the triggering the stored XSS.
{'CVE-2021-3271'}
2021-03-19T22:19:46Z
2021-03-29T20:07:39Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pressbooks/pressbooks/commit/941a8c5eaeacea5eb211b54ee55bc0348139cbd8', 'https://www.gosecure.net/blog/2021/02/16/cve-2021-3271-pressbooks-stored-cross-site-scripting-proof-of-concept/', 'https://github.com/pressbooks/pressbooks', 'https://github.com/pressbooks/pressbooks/pull/2072', 'https://nvd.n...
null
{'https://github.com/pressbooks/pressbooks/commit/941a8c5eaeacea5eb211b54ee55bc0348139cbd8'}
{'https://github.com/pressbooks/pressbooks/commit/941a8c5eaeacea5eb211b54ee55bc0348139cbd8'}
Packagist
GHSA-6qcc-whgp-pjj2
Cross-site Scripting in Pimcore
Pimcore version 10.3.2 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 10.3.3.
{'CVE-2022-0832'}
2022-03-11T20:37:01Z
2022-03-05T00:00:45Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0832', 'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/commit/8ab06bfbb5a05a1b190731d9c7476ec45f5ee878', 'https://huntr.dev/bounties/be450b60-bc8f-4585-96a5-3c4069f1186a'}
null
{'https://github.com/pimcore/pimcore/commit/8ab06bfbb5a05a1b190731d9c7476ec45f5ee878'}
{'https://github.com/pimcore/pimcore/commit/8ab06bfbb5a05a1b190731d9c7476ec45f5ee878'}
Packagist
GHSA-8wp2-vxpg-xcvp
Cross site scripting in facturascripts
facturasripts is an open source ERP software. Store XSS in title parameter executing at EditUser Page & EditProducto page in GitHub repository neorazorx/facturascripts prior to 2022.04. Cross-site scripting attacks can have devastating consequences. Code injected into a vulnerable application can exfiltrate data or ins...
{'CVE-2022-1457'}
2022-05-05T13:47:28Z
2022-04-26T00:00:43Z
CRITICAL
null
{'CWE-79'}
{'https://huntr.dev/bounties/8c80caa0-dc89-43f2-8f5f-db02d2669046', 'https://github.com/neorazorx/facturascripts/commit/b3e7527d1e100898c15fec067825b6bc738613df', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1457', 'https://github.com/neorazorx/facturascripts'}
null
{'https://github.com/neorazorx/facturascripts/commit/b3e7527d1e100898c15fec067825b6bc738613df'}
{'https://github.com/neorazorx/facturascripts/commit/b3e7527d1e100898c15fec067825b6bc738613df'}
Packagist
GHSA-8qvx-f5gf-g43v
Logic error in dolibarr
The application does not check the input of price number lead to Business Logic error through negative price amount.
{'CVE-2022-0174'}
2022-01-20T15:34:33Z
2022-01-12T22:54:50Z
MODERATE
null
{'CWE-20'}
{'https://github.com/dolibarr/dolibarr', 'https://github.com/dolibarr/dolibarr/commit/d892160f4f130385a3ce520f66cb8cf2eb8c5c32', 'https://huntr.dev/bounties/ed3ed4ce-3968-433c-a350-351c8f8b60db', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0174'}
null
{'https://github.com/dolibarr/dolibarr/commit/d892160f4f130385a3ce520f66cb8cf2eb8c5c32'}
{'https://github.com/dolibarr/dolibarr/commit/d892160f4f130385a3ce520f66cb8cf2eb8c5c32'}
Packagist
GHSA-4h9c-v5vg-5m6m
Access to restricted PHP code by dynamic static class access in smarty
### Impact Template authors could run restricted static php methods. ### Patches Please upgrade to 3.1.40 or higher. ### References See the [documentation on Smarty security features](https://www.smarty.net/docs/en/advanced.features.tpl#advanced.features.security) on the static_classes access filter. ### For more in...
{'CVE-2021-21408'}
2022-01-20T15:33:55Z
2022-01-12T22:43:42Z
HIGH
null
{'CWE-20'}
{'https://github.com/smarty-php/smarty/security/advisories/GHSA-4h9c-v5vg-5m6m', 'https://github.com/smarty-php/smarty/releases/tag/v4.0.3', 'https://github.com/smarty-php/smarty/releases/tag/v3.1.43', 'https://github.com/smarty-php/smarty', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21408', 'https://github.com/smarty-...
null
{'https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664'}
{'https://github.com/smarty-php/smarty/commit/19ae410bf56007a5ef24441cdc6414619cfaf664'}
Packagist
GHSA-ghww-cv4v-hmxx
Cross-Site Request Forgery microweber
microweber prior to version 1.2.11 is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2022-0638'}
2022-02-22T17:24:42Z
2022-02-18T00:00:34Z
MODERATE
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0638', 'https://github.com/microweber/microweber/commit/756096da1260f29ff6f4532234d93d8e41dd5aa8', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/9d3d883c-d74c-4fe2-9978-a8e3d1ccf9f3'}
null
{'https://github.com/microweber/microweber/commit/756096da1260f29ff6f4532234d93d8e41dd5aa8'}
{'https://github.com/microweber/microweber/commit/756096da1260f29ff6f4532234d93d8e41dd5aa8'}
Packagist
GHSA-f3rf-v9qm-9c89
Cross-site Scripting in the femanager TYPO3 extension
The extension allows by default to upload SVG files when a logged in frontend user uploads a new profile image. This may lead to Cross-Site Scripting, when the uploaded SVG image is used as is on the website. Note: If SVG uploads are required, it is recommended to use the TYPO3 extension svg_sanitizer (added to TYPO3 ...
{'CVE-2021-36787'}
2021-08-30T18:35:42Z
2021-09-01T18:36:51Z
MODERATE
null
{'CWE-79'}
{'https://github.com/in2code-de/femanager', 'http://seclists.org/fulldisclosure/2022/Jan/53', 'https://github.com/in2code-de/femanager/releases/tag/6.3.1', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-010', 'https://typo3.org/help/security-advisories/security', 'https://extensions.typo3.org/extension/femanage...
null
{'https://github.com/in2code-de/femanager/commit/70f873c60f0e40ffd6a1300218ca368156fc1bf2'}
{'https://github.com/in2code-de/femanager/commit/70f873c60f0e40ffd6a1300218ca368156fc1bf2'}
Packagist
GHSA-h2fj-77wh-fh5w
Cross-site Scripting in livehelperchat
Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.
{'CVE-2022-0612'}
2022-02-24T13:52:12Z
2022-02-17T00:00:36Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0612', 'https://github.com/livehelperchat/livehelperchat/commit/4d4f1db1701f09177896a38e43fd0c693835f03b', 'https://github.com/livehelperchat/livehelperchat', 'https://huntr.dev/bounties/eadcf7d2-a479-4901-abcc-1505d3f1b32f'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/4d4f1db1701f09177896a38e43fd0c693835f03b'}
{'https://github.com/livehelperchat/livehelperchat/commit/4d4f1db1701f09177896a38e43fd0c693835f03b'}
Packagist
GHSA-vf23-f26f-mjj9
Moderate severity vulnerability that affects yourls/yourls
## Type juggling vulnerability in the API ### Impact YOURLS through 1.7.3 is affected by a type juggling vulnerability in the API component that can result in login bypass. ### Patches https://github.com/YOURLS/YOURLS/releases/tag/1.7.4 https://github.com/YOURLS/YOURLS/pull/2542 ### References * https://cve.mitre.or...
{'CVE-2019-14537'}
2021-09-20T21:42:51Z
2019-09-23T18:32:02Z
CRITICAL
null
{'CWE-843'}
{'https://github.com/advisories/GHSA-vf23-f26f-mjj9', 'https://github.com/YOURLS/YOURLS/pull/2542', 'https://github.com/Wocanilo/CVE-2019-14537', 'https://github.com/YOURLS/YOURLS', 'https://nvd.nist.gov/vuln/detail/CVE-2019-14537', 'https://github.com/YOURLS/YOURLS/commits/master', 'https://github.com/YOURLS/YOURLS/se...
null
{'https://github.com/YOURLS/YOURLS/commits/master'}
{'https://github.com/YOURLS/YOURLS/commits/master'}
Packagist
GHSA-c5gj-w4hx-gvmx
Business Logic Errors in microweber
Microweber prior to 1.2.11 can suffer from insecure direct object reference(s). A malicious actor can remove items from a victim's cart.
{'CVE-2022-0688'}
2022-02-25T19:18:15Z
2022-02-21T00:00:21Z
LOW
null
null
{'https://huntr.dev/bounties/051ec6d4-0b0a-41bf-9ded-27813037c9c9', 'https://github.com/microweber/microweber/commit/a41f0fddaf08ff12b2b82506b1ca9490c93ab605', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0688', 'https://github.com/microweber/microweber'}
null
{'https://github.com/microweber/microweber/commit/a41f0fddaf08ff12b2b82506b1ca9490c93ab605'}
{'https://github.com/microweber/microweber/commit/a41f0fddaf08ff12b2b82506b1ca9490c93ab605'}
Packagist
GHSA-3qr6-qrqm-8v86
Integer Overflow or Wraparound in Microweber
In Microweber prior to 1.2.12, a user can create an account with a password thousands of characters in length, leading to memory corruption/integer overflow. Version 1.2.2 sets maximum password length at 500 characters.
{'CVE-2022-1036'}
2022-03-30T20:02:35Z
2022-03-23T00:00:23Z
HIGH
null
{'CWE-190'}
{'https://huntr.dev/bounties/db615581-d5a9-4ca5-a3e9-7a39eceaa424', 'https://github.com/microweber/microweber/commit/82be4f0b4729be870ccefdae99a04833f134aa6a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1036', 'https://github.com/microweber/microweber'}
null
{'https://github.com/microweber/microweber/commit/82be4f0b4729be870ccefdae99a04833f134aa6a'}
{'https://github.com/microweber/microweber/commit/82be4f0b4729be870ccefdae99a04833f134aa6a'}
Packagist
GHSA-wqq8-mqj9-697f
PrestaShop autoupgrade module ZIP archives were vulnerable from CVE-2017-9841
### Impact We have identified that some autoupgrade module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow, on a webserver, an attacker to perform a RCE. This vulnerability impacts - phpunit before 4.8.28 and 5.x before 5.6.3 as reported in [CVE-2017-9841](ht...
null
2020-01-08T03:06:57Z
2020-01-08T03:10:30Z
HIGH
null
null
{'https://github.com/PrestaShop/autoupgrade/commit/ce96357ad3ff6278bb28dc225913e75c2f077a32', 'https://github.com/PrestaShop/autoupgrade/security/advisories/GHSA-wqq8-mqj9-697f'}
null
{'https://github.com/PrestaShop/autoupgrade/commit/ce96357ad3ff6278bb28dc225913e75c2f077a32'}
{'https://github.com/PrestaShop/autoupgrade/commit/ce96357ad3ff6278bb28dc225913e75c2f077a32'}
Packagist
GHSA-28w5-j8xj-2xwc
Cross-site Scripting in the yoast_seo TYPO3 extension
The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability.
{'CVE-2021-36788'}
2021-08-30T18:43:25Z
2021-09-01T18:36:44Z
MODERATE
null
{'CWE-79'}
{'https://github.com/Yoast/Yoast-SEO-for-TYPO3', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-012', 'https://github.com/Yoast/Yoast-SEO-for-TYPO3/commit/a8278dae97dce8cd0722d38f7f5a30b563668590', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36788'}
null
{'https://github.com/Yoast/Yoast-SEO-for-TYPO3/commit/a8278dae97dce8cd0722d38f7f5a30b563668590'}
{'https://github.com/Yoast/Yoast-SEO-for-TYPO3/commit/a8278dae97dce8cd0722d38f7f5a30b563668590'}
Packagist
GHSA-jr37-66pj-36v7
Cross-site Scripting in DayByDay CRM
In Daybyday CRM, version 2.2.0 is vulnerable to Stored Cross-Site Scripting (XSS) vulnerability that allows low privileged application users to store malicious scripts in the title field of new tasks. These scripts are executed in a victim’s browser when they open the “/tasks” page to view all the tasks.
{'CVE-2022-22109'}
2022-01-10T21:46:18Z
2022-01-08T00:32:00Z
MODERATE
null
{'CWE-79'}
{'https://github.com/Bottelet/DaybydayCRM', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22109', 'https://github.com/Bottelet/DaybydayCRM/commit/002dc75f400cf307bd00b71a5a93f1e26e52cee2', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22109'}
null
{'https://github.com/Bottelet/DaybydayCRM/commit/002dc75f400cf307bd00b71a5a93f1e26e52cee2'}
{'https://github.com/Bottelet/DaybydayCRM/commit/002dc75f400cf307bd00b71a5a93f1e26e52cee2'}
Packagist
GHSA-fc38-mxwr-pfhx
Cross-Site Scripting via SVG media files
### Impact Cross-Site Scripting via SVG media files ### Patches We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2...
{'CVE-2021-37710'}
2021-08-23T17:24:12Z
2021-08-23T19:43:00Z
HIGH
null
{'CWE-79'}
{'https://github.com/shopware/platform/security/advisories/GHSA-fc38-mxwr-pfhx', 'https://github.com/shopware/platform/commit/abe9f69e1f667800f974acccd3047b4930e4b423', 'https://github.com/shopware/platform', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37710'}
null
{'https://github.com/shopware/platform/commit/abe9f69e1f667800f974acccd3047b4930e4b423'}
{'https://github.com/shopware/platform/commit/abe9f69e1f667800f974acccd3047b4930e4b423'}
Packagist
GHSA-r89v-cgv7-3jhx
Bypass of fix for CVE-2020-15247, Twig sandbox escape
### Impact A bypass of CVE-2020-15247 (fixed in 1.0.469 and 1.1.0) was discovered that has the same impact as CVE-2020-15247: An authenticated backend user with the `cms.manage_pages`, `cms.manage_layouts`, or `cms.manage_partials` permissions who would **normally** not be permitted to provide PHP code to be executed ...
{'CVE-2020-26231'}
2021-03-04T18:24:40Z
2020-11-23T20:54:18Z
LOW
null
{'CWE-862'}
{'https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26231', 'https://github.com/advisories/GHSA-94vp-rmqv-5875', 'https://github.com/octobercms/october/security/advisories/GHSA-r89v-cgv7-3jhx'}
null
{'https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7'}
{'https://github.com/octobercms/october/commit/d34fb8ab51108495a9a651b841202d935f4e12f7'}
Packagist
GHSA-2xmm-g482-4439
DQL injection through sorting parameters blocked
### Impact Values added at the end of query sorting were passed directly to the DB. We don't know, if it could lead to direct SQL injections, however, we should not allow for easy injection of values there anyway. ### Patches The issue is fixed in version 1.10.1 and in 1.11-rc.1 ### Workarounds You have to overwrite...
{'CVE-2022-24752'}
2022-03-15T19:09:16Z
2022-03-15T19:09:16Z
CRITICAL
null
{'CWE-89'}
{'https://github.com/Sylius/SyliusGridBundle', 'https://github.com/Sylius/SyliusGridBundle/security/advisories/GHSA-2xmm-g482-4439', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24752', 'https://github.com/Sylius/SyliusGridBundle/commit/73d0791d0575f955e830a3da4c3345f420d2f784', 'https://github.com/Sylius/SyliusGridBundl...
null
{'https://github.com/Sylius/SyliusGridBundle/commit/73d0791d0575f955e830a3da4c3345f420d2f784'}
{'https://github.com/Sylius/SyliusGridBundle/commit/73d0791d0575f955e830a3da4c3345f420d2f784'}
Packagist
GHSA-rxch-gp62-574w
snipe-it is vulnerable to Cross-site Scripting
snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
{'CVE-2021-4108'}
2022-01-04T19:01:10Z
2021-12-16T14:13:27Z
MODERATE
null
{'CWE-79'}
{'https://github.com/snipe/snipe-it/', 'https://huntr.dev/bounties/5069a037-040e-4d77-8526-846e65edfaf4', 'https://github.com/snipe/snipe-it/commit/9d5d1a9f9aae2c8baee48551185da5de0cdb62c2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4108'}
null
{'https://github.com/snipe/snipe-it/commit/9d5d1a9f9aae2c8baee48551185da5de0cdb62c2'}
{'https://github.com/snipe/snipe-it/commit/9d5d1a9f9aae2c8baee48551185da5de0cdb62c2'}
Packagist
GHSA-7v3x-h7r2-34jv
Insufficient Session Expiration in Pterodactyl API
### Impact A vulnerability exists in Pterodactyl Panel `<= 1.6.6` that could allow a malicious attacker that compromises an API key to generate an authenticated user session that is not revoked when the API key is deleted, thus allowing the malicious user to remain logged in as the user the key belonged to. It is impo...
null
2022-01-20T16:18:28Z
2022-01-21T18:43:05Z
MODERATE
null
{'CWE-613'}
{'https://github.com/pterodactyl/panel/security/advisories/GHSA-7v3x-h7r2-34jv', 'https://github.com/pterodactyl/panel/releases/tag/v1.7.0', 'https://github.com/pterodactyl/panel', 'https://github.com/pterodactyl/panel/commit/dfa329ddf242908b60e22e3340ea36359eab1ef4'}
null
{'https://github.com/pterodactyl/panel/commit/dfa329ddf242908b60e22e3340ea36359eab1ef4'}
{'https://github.com/pterodactyl/panel/commit/dfa329ddf242908b60e22e3340ea36359eab1ef4'}
Packagist
GHSA-6pj2-5fqq-xvjc
Incorrect Authorization in latte/latte
This affects the package latte/latte before 2.10.6. There is a way to bypass allowFunctions that will affect the security of the application. When the template is set to allow/disallow the use of certain functions, adding control characters (x00-x08) after the function will bypass these restrictions.
{'CVE-2021-23803'}
2022-01-06T18:54:41Z
2022-01-06T20:56:27Z
CRITICAL
null
{'CWE-863'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-23803', 'https://github.com/nette/latte/issues/279', 'https://snyk.io/vuln/SNYK-PHP-LATTELATTE-1932226', 'https://github.com/nette/latte/commit/227c86eda9a8a6d060ea8501923e768b6d992210', 'https://github.com/nette/latte'}
null
{'https://github.com/nette/latte/commit/227c86eda9a8a6d060ea8501923e768b6d992210'}
{'https://github.com/nette/latte/commit/227c86eda9a8a6d060ea8501923e768b6d992210'}
Packagist
GHSA-pjjf-hc4q-g298
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
showdoc is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3775'}
2021-11-17T21:11:29Z
2021-11-15T23:16:17Z
MODERATE
null
{'CWE-352'}
{'https://huntr.dev/bounties/6a59d203-4ca7-4aed-bdb9-1e39b66c77b3', 'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3775', 'https://github.com/star7th/showdoc'}
null
{'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'}
{'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'}
Packagist
GHSA-8m28-w6xg-35hw
Cross-Site Request Forgery (CSRF) in livehelperchat
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2022-0231'}
2022-01-24T22:54:21Z
2022-01-26T20:22:08Z
MODERATE
null
{'CWE-352'}
{'https://huntr.dev/bounties/adaf98cf-60ab-40e0-aa3b-42ba0d3b7cbf', 'https://github.com/livehelperchat/livehelperchat', 'https://github.com/livehelperchat/livehelperchat/commit/6ad1349dc5e7503b00c5017499a0a895d7654a61', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0231'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/6ad1349dc5e7503b00c5017499a0a895d7654a61'}
{'https://github.com/livehelperchat/livehelperchat/commit/6ad1349dc5e7503b00c5017499a0a895d7654a61'}
Packagist
GHSA-gp2m-7cfp-h6gf
Incorrect persistent NameID generation in SimpleSAMLphp
### Background When a SimpleSAMLphp Identity Provider is misconfigured, a bug in the software when trying to build a persistent `NameID` to univocally identify the authenticating subject could cause different users to get the same identifier generated, depending on the attributes available for them right after authenti...
{'CVE-2017-12873'}
2021-08-19T16:44:17Z
2020-01-24T21:28:06Z
CRITICAL
null
{'CWE-384'}
{'https://lists.debian.org/debian-lts-announce/2017/12/msg00007.html', 'https://nvd.nist.gov/vuln/detail/CVE-2017-12873', 'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-gp2m-7cfp-h6gf', 'https://www.debian.org/security/2018/dsa-4127', 'https://github.com/simplesamlphp/simplesamlphp/commit/90dc...
null
{'https://github.com/simplesamlphp/simplesamlphp/commit/90dca835158495b173808273e7df127303b8b953'}
{'https://github.com/simplesamlphp/simplesamlphp/commit/90dca835158495b173808273e7df127303b8b953'}
Packagist
GHSA-5875-p652-2ppm
Exposure of Resource to Wrong Sphere in microweber
Exposure of Resource to Wrong Sphere in microweber prior to 1.3 allows users to add deleted products to a cart and buy it.
{'CVE-2022-0762'}
2022-03-09T20:31:39Z
2022-02-27T00:00:16Z
MODERATE
null
{'CWE-668'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0762', 'https://huntr.dev/bounties/125b5244-5099-485e-bf75-e5f1ed80dd48', 'https://github.com/microweber/microweber/commit/76361264d9fdfff38a1af79c63141455cc4d36e3'}
null
{'https://github.com/microweber/microweber/commit/76361264d9fdfff38a1af79c63141455cc4d36e3'}
{'https://github.com/microweber/microweber/commit/76361264d9fdfff38a1af79c63141455cc4d36e3'}
Packagist
GHSA-5x33-h32w-6vr2
Cross site-scripting (XSS) moodle
The filter in the tag manager required extra sanitizing to prevent a reflected XSS risk. This affects 3.9 to 3.9.1, 3.8 to 3.8.4, 3.7 to 3.7.7, 3.5 to 3.5.13 and earlier unsupported versions. Fixed in 3.9.2, 3.8.5, 3.7.8 and 3.5.14.
{'CVE-2020-25628'}
2021-03-24T23:14:52Z
2021-03-29T20:43:15Z
MODERATE
null
{'CWE-79'}
{'https://moodle.org/mod/forum/discuss.php?d=410840', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25628', 'https://github.com/moodle/moodle/commit/e8632a4ad0b4da3763cbbe5949594aa449b483bb', 'http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-69340'}
null
{'https://github.com/moodle/moodle/commit/e8632a4ad0b4da3763cbbe5949594aa449b483bb'}
{'https://github.com/moodle/moodle/commit/e8632a4ad0b4da3763cbbe5949594aa449b483bb'}
Packagist
GHSA-vgwr-773q-7j3c
Path Traversal within joomla/archive zip class
An issue was discovered in Joomla! 3.0.0 through 3.9.24. Extracting an specifilcy crafted zip package could write files outside of the intended path.
{'CVE-2021-26028'}
2021-03-24T17:57:48Z
2021-03-24T17:58:13Z
MODERATE
null
{'CWE-22'}
{'https://developer.joomla.org/security-centre/848-20210308-core-path-traversal-within-joomla-archive-zip-class.html', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/joomla/archive/CVE-2021-26028.yaml', 'https://github.com/joomla-framework/archive/commit/32c9009a1020d16bc1060c0d06339898b697cf2c', 'htt...
null
{'https://github.com/joomla-framework/archive/commit/32c9009a1020d16bc1060c0d06339898b697cf2c'}
{'https://github.com/joomla-framework/archive/commit/32c9009a1020d16bc1060c0d06339898b697cf2c'}
Packagist
GHSA-56cx-wf47-hx7w
Improper Restriction of Excessive Authentication Attempts
firefly-iii is vulnerable to Improper Restriction of Excessive Authentication Attempts
{'CVE-2021-3663'}
2021-08-31T20:58:20Z
2021-08-09T20:38:37Z
MODERATE
null
{'CWE-307'}
{'https://github.com/firefly-iii/firefly-iii', 'https://github.com/firefly-iii/firefly-iii/commit/afc9f4b7ebc8a240c85864a6e1abda62bfeefae8', 'https://github.com/firefly-iii/firefly-iii/releases/tag/5.5.13', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3663', 'https://huntr.dev/bounties/497bdf6d-7dba-49c3-8011-1c64dfbb338...
null
{'https://github.com/firefly-iii/firefly-iii/commit/afc9f4b7ebc8a240c85864a6e1abda62bfeefae8'}
{'https://github.com/firefly-iii/firefly-iii/commit/afc9f4b7ebc8a240c85864a6e1abda62bfeefae8'}
Packagist
GHSA-wv23-pfj7-2mjj
Authenticated file write leads to remote code execution in october/system
### Impact Assuming an attacker with "create, modify and delete website pages" privileges in the backend is able to execute PHP code by running specially crafted Twig code in the template markup. ### Patches Issue has been patched in Build 473 and v1.1.6 ### Workarounds Apply https://github.com/octobercms/october/...
{'CVE-2021-32649'}
2022-01-26T22:27:50Z
2022-01-14T21:08:23Z
HIGH
null
{'CWE-74'}
{'https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26', 'https://github.com/octobercms/october/security/advisories/GHSA-wv23-pfj7-2mjj', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32649', 'https://github.com/octobercms/october'}
null
{'https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26'}
{'https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26'}
Packagist
GHSA-mcx4-f5f5-4859
Prevent cache poisoning via a Response Content-Type header in Symfony
Description ----------- When a `Response` does not contain a `Content-Type` header, Symfony falls back to the format defined in the `Accept` header of the request, leading to a possible mismatch between the response's content and `Content-Type` header. When the response is cached, this can lead to a corrupted cache wh...
{'CVE-2020-5255'}
2021-01-08T20:25:26Z
2020-03-30T20:09:16Z
LOW
null
{'CWE-435'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/C36JLPHUPKDFAX6D5WYFC4ALO2K7RDUQ/', 'https://github.com/symfony/symfony/security/advisories/GHSA-mcx4-f5f5-4859', 'https://github.com/symfony/symfony/commit/dca343442e6a954f96a2609e7b4e9c21ed6d74e6', 'https://symfony.com/bl...
null
{'https://github.com/symfony/symfony/commit/dca343442e6a954f96a2609e7b4e9c21ed6d74e6'}
{'https://github.com/symfony/symfony/commit/dca343442e6a954f96a2609e7b4e9c21ed6d74e6'}
Packagist
GHSA-9fcc-7g44-mxrj
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via uploading files with files in `.xsd`, `.asa`, and `.aspx` formats.
{'CVE-2022-0942'}
2022-03-29T17:30:52Z
2022-03-16T00:00:47Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/a412707c-18da-4c84-adc0-9801ed8068c9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0942', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
null
{'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
{'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}
Packagist
GHSA-m434-m5pv-p35w
Insufficient user authorization in Moodle
A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. The calendar:manageentries capability allowed managers to access or modify any calendar event, but should have been restricted from accessing user level events.
{'CVE-2022-0333'}
2022-02-02T16:12:13Z
2022-01-28T22:08:02Z
LOW
null
{'CWE-863'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0333', 'https://github.com/moodle/moodle', 'https://github.com/moodle/moodle/commit/2ee27313cea0d7073f5a6a35eccdfddcb3a9adad', 'https://moodle.org/mod/forum/discuss.php?d=431100', 'https://bugzilla.redhat.com/show_bug.cgi?id=2043663'}
null
{'https://github.com/moodle/moodle/commit/2ee27313cea0d7073f5a6a35eccdfddcb3a9adad'}
{'https://github.com/moodle/moodle/commit/2ee27313cea0d7073f5a6a35eccdfddcb3a9adad'}
Packagist
GHSA-jm6p-wfjg-xm7x
bookstack is vulnerable to Improper Access Control
bookstack is vulnerable to Improper Access Control.
{'CVE-2021-4026'}
2021-12-02T15:29:37Z
2021-12-01T18:26:48Z
MODERATE
null
{'CWE-668', 'CWE-284'}
{'https://github.com/bookstackapp/bookstack/', 'https://github.com/BookStackApp/BookStack/releases/tag/v21.11.2', 'https://github.com/bookstackapp/bookstack/commit/b4fa82e3298a15443ca40bff205b7a16a1031d92', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4026', 'https://huntr.dev/bounties/c6dfa80d-43e6-4b49-95af-cc031bb66b1...
null
{'https://github.com/bookstackapp/bookstack/commit/b4fa82e3298a15443ca40bff205b7a16a1031d92'}
{'https://github.com/bookstackapp/bookstack/commit/b4fa82e3298a15443ca40bff205b7a16a1031d92'}