ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Packagist | GHSA-6m93-343m-3jrc | Cross-site Scripting in HTML2PDF | An issue was discovered in Spipu HTML2PDF before 5.2.4. Attackers can trigger deserialization of arbitrary data via the injection of a malicious <link> tag in the converted HTML document. | {'CVE-2021-45394'} | 2022-01-25T20:48:30Z | 2022-01-21T23:29:48Z | HIGH | null | {'CWE-918', 'CWE-79'} | {'https://github.com/spipu/html2pdf/commit/100a4d509abf8550765cf0e0da83e83abb422585', 'https://github.com/spipu/html2pdf/blob/master/CHANGELOG.md', 'https://github.com/spipu/html2pdf/releases/tag/v5.2.4', 'https://github.com/spipu/html2pdf/commit/2e6bab9a2afe9cfd4d3c3038da64d8ad74e41d7f', 'https://github.com/spipu/html... | null | {'https://github.com/spipu/html2pdf/commit/2e6bab9a2afe9cfd4d3c3038da64d8ad74e41d7f', 'https://github.com/spipu/html2pdf/commit/100a4d509abf8550765cf0e0da83e83abb422585'} | {'https://github.com/spipu/html2pdf/commit/100a4d509abf8550765cf0e0da83e83abb422585', 'https://github.com/spipu/html2pdf/commit/2e6bab9a2afe9cfd4d3c3038da64d8ad74e41d7f'} |
Packagist | GHSA-fw5q-j9p4-3vxg | Blog comment posting, Cross Site Scripting(XSS) Vulnerability in Latest Release 4.4.0 | baserCMS 4.4.0 and earlier is affected by Cross Site Scripting (XSS).
Impact: XSS via Arbitrary script execution.
Components are: Blog comment posting
Tested baserCMS Version : 4.4.0 (Latest)
Affected baserCMS Version : 4.0.0 ~ 4.4.0
Patches : https://basercms.net/security/20201029
Found by yama | {'CVE-2020-15276'} | 2021-01-07T22:49:33Z | 2020-10-30T19:10:20Z | LOW | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15276', 'https://basercms.net/security/20201029', 'https://github.com/baserproject/basercms/commit/d14f506385f21d67d5ff3462f204d4c2321b7c54', 'https://github.com/baserproject/basercms/security/advisories/GHSA-fw5q-j9p4-3vxg'} | null | {'https://github.com/baserproject/basercms/commit/d14f506385f21d67d5ff3462f204d4c2321b7c54'} | {'https://github.com/baserproject/basercms/commit/d14f506385f21d67d5ff3462f204d4c2321b7c54'} |
Packagist | GHSA-c7fm-jx59-wjf6 | Authorization Bypass Through User-Controlled Key in LiveHelperChat | Authorization Bypass Through User-Controlled Key in Packagist remdex/livehelperchat prior to 3.92v. | {'CVE-2022-0266'} | 2022-01-20T16:14:41Z | 2022-01-21T18:50:58Z | MODERATE | null | {'CWE-639'} | {'https://github.com/livehelperchat/livehelperchat', 'https://huntr.dev/bounties/1ac267be-3af8-4774-89f2-77234d144d6b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0266', 'https://github.com/livehelperchat/livehelperchat/commit/cc1122aed0d1ad9f05757eaea2ab9e6a924776bd'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/cc1122aed0d1ad9f05757eaea2ab9e6a924776bd'} | {'https://github.com/livehelperchat/livehelperchat/commit/cc1122aed0d1ad9f05757eaea2ab9e6a924776bd'} |
Packagist | GHSA-r7cj-8hjg-x622 | DBAL 3 SQL Injection Security Vulnerability | We have released a new version Doctrine DBAL 3.1.4 that fixes a critical SQL injection vulnerability in the LIMIT clause generation API provided by the Platform abstraction.
We advise everyone using Doctrine DBAL 3.0.0 up to 3.1.3 to upgrade to 3.1.4 immediately.
The vulnerability can happen when unsanitized input is... | {'CVE-2021-43608'} | 2021-12-16T14:11:44Z | 2021-11-16T17:25:57Z | CRITICAL | null | {'CWE-89'} | {'https://github.com/doctrine/dbal/releases', 'https://github.com/doctrine/dbal/', 'https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43608', 'https://github.com/doctrine/dbal/security/advisories/GHSA-r7cj-8hjg-x622', 'https://www.doctrine-proj... | null | {'https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d'} | {'https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d'} |
Packagist | GHSA-3p85-p4qg-hcrp | pimcore is vulnerable to Cross-site Scripting | pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2021-4081'} | 2021-12-14T15:06:00Z | 2021-12-16T14:27:58Z | MODERATE | null | {'CWE-79'} | {'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/commit/34ed0e050ff679b4b38414aef48ea1ff956f907a', 'https://huntr.dev/bounties/da173e66-76ba-4f98-b8fb-429aabf222d3', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4081'} | null | {'https://github.com/pimcore/pimcore/commit/34ed0e050ff679b4b38414aef48ea1ff956f907a'} | {'https://github.com/pimcore/pimcore/commit/34ed0e050ff679b4b38414aef48ea1ff956f907a'} |
Packagist | GHSA-754h-5r27-7x3r | RCE in Symfony | Description
-----------
The `CachingHttpClient` class from the HttpClient Symfony component relies on the `HttpCache` class to handle requests. `HttpCache` uses internal headers like `X-Body-Eval` and `X-Body-File` to control the restoration of cached responses. The class was initially written with surrogate caching a... | {'CVE-2020-15094'} | 2022-03-18T18:31:48Z | 2020-09-02T17:29:56Z | HIGH | null | {'CWE-212'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HNGUWOEETOFVH4PN3I3YO4QZHQ4AUKF3/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15094', 'https://github.com/symfony/symfony/security/advisories/GHSA-754h-5r27-7x3r', 'https://github.com/symfony/symfony', 'https://packagist.o... | null | {'https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78'} | {'https://github.com/symfony/symfony/commit/d9910e0b33a2e0f993abff41c6fbc86951b66d78'} |
Packagist | GHSA-x7j7-qp7j-hw3q | Cross-site scripting (XSS) from writer field content in the site frontend | ### Impact
Kirby's [writer field](https://getkirby.com/docs/reference/panel/fields/writer) stores its formatted content as HTML code. Unlike with other field types, it is not possible to [escape HTML special characters](https://getkirby.com/docs/guide/templates/escaping) against cross-site scripting (XSS) attacks, oth... | {'CVE-2021-41252'} | 2021-11-16T15:46:57Z | 2021-11-16T17:04:19Z | MODERATE | null | {'CWE-79'} | {'https://github.com/getkirby/kirby/security/advisories/GHSA-x7j7-qp7j-hw3q', 'https://github.com/getkirby/kirby/commit/25fc5c6b330442e6433c99befc688f3698c5d1fc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41252', 'https://github.com/getkirby/kirby/releases/tag/3.5.8', 'https://github.com/getkirby/kirby'} | null | {'https://github.com/getkirby/kirby/commit/25fc5c6b330442e6433c99befc688f3698c5d1fc'} | {'https://github.com/getkirby/kirby/commit/25fc5c6b330442e6433c99befc688f3698c5d1fc'} |
Packagist | GHSA-h3gg-7wx2-cq3h | XSS in Flarum Sticky extension | ### Impact
A change in release beta 14 of the Sticky extension caused the plain text content of the first post of a pinned discussion to be injected as HTML on the discussion list. The issue was discovered following an internal audit.
Any HTML would be injected through Mithril's `m.trust()` helper. This resulted in an... | {'CVE-2021-21283'} | 2021-01-26T20:41:58Z | 2021-01-29T18:13:41Z | MODERATE | null | {'CWE-79'} | {'https://github.com/flarum/sticky/pull/24', 'https://github.com/flarum/sticky/commit/7ebd30462bd405c4c0570b93a6d48710e6c3db19', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21283', 'https://github.com/flarum/sticky/security/advisories/GHSA-h3gg-7wx2-cq3h', 'https://discuss.flarum.org/d/26042-security-update-to-flarum-st... | null | {'https://github.com/flarum/sticky/commit/7ebd30462bd405c4c0570b93a6d48710e6c3db19'} | {'https://github.com/flarum/sticky/commit/7ebd30462bd405c4c0570b93a6d48710e6c3db19'} |
Packagist | GHSA-5r9v-8w62-r26j | livehelperchat is vulnerable to Cross-site Scripting | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2022-0253'} | 2022-01-25T19:13:21Z | 2022-01-21T23:48:25Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/ac7f7eba-ee0b-4a50-bd89-29fd9b3e8303', 'https://github.com/livehelperchat/livehelperchat', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0253', 'https://github.com/livehelperchat/livehelperchat/commit/407d0b1a1fa56fa6f824a19092774f10f4880437'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/407d0b1a1fa56fa6f824a19092774f10f4880437'} | {'https://github.com/livehelperchat/livehelperchat/commit/407d0b1a1fa56fa6f824a19092774f10f4880437'} |
Packagist | GHSA-4qwp-7c67-jmcc | Unauthenticated remote code execution in Ignition | Ignition before 2.5.2, as used in Laravel and other products, allows unauthenticated remote attackers to execute arbitrary code because of insecure usage of file_get_contents() and file_put_contents(). This is exploitable on sites using debug mode with Laravel before 8.4.2. | {'CVE-2021-3129'} | 2021-03-23T00:13:45Z | 2021-03-29T20:23:46Z | CRITICAL | null | {'CWE-94'} | {'http://packetstormsecurity.com/files/165999/Ignition-Remote-Code-Execution.html', 'https://github.com/facade/ignition/pull/334', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/facade/ignition/CVE-2021-3129.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3129', 'https://github.com/facade/ignition/c... | null | {'https://github.com/facade/ignition/commit/11ffca14abd22db779d90b12e193f8000f6d184b'} | {'https://github.com/facade/ignition/commit/11ffca14abd22db779d90b12e193f8000f6d184b'} |
Packagist | GHSA-4gwh-2pqx-f5cc | Cross-site Scripting in LibreNMS | LibreNMS 21.11.0 is affected by is affected by a Cross Site Scripting (XSS) vulnerability in includes/html/common/alert-log.inc.php. | {'CVE-2021-44277'} | 2021-12-03T15:17:38Z | 2021-12-03T20:48:42Z | MODERATE | null | {'CWE-79'} | {'https://github.com/librenms/librenms/pull/13554', 'https://github.com/librenms/librenms/', 'https://github.com/librenms/librenms/pull/13554/commits/fff7b45a7599f8f13a55250dc5f2b957f3394194', 'https://nvd.nist.gov/vuln/detail/CVE-2021-44277'} | null | {'https://github.com/librenms/librenms/pull/13554/commits/fff7b45a7599f8f13a55250dc5f2b957f3394194'} | {'https://github.com/librenms/librenms/pull/13554/commits/fff7b45a7599f8f13a55250dc5f2b957f3394194'} |
Packagist | GHSA-39wj-j3jc-858m | XSS vulnerability leveraged through referrers could allow un-authorized admin access in Mautic | ### Impact
This is a cross-site scripting vulnerability which affects every version of Mautic and could allow an attacker unauthorised administrator level access to Mautic.
This vulnerability was reported by Naveen Sunkavally at Horizon3.ai.
### Patches
Upgrade to 3.2.4 or 2.16.5.
Link to patch for 2.x versions: htt... | {'CVE-2020-35124'} | 2021-01-19T20:43:12Z | 2021-01-19T20:43:56Z | CRITICAL | null | {'CWE-79'} | {'https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-4', 'https://forum.mautic.org/c/announcements/16', 'https://github.com/mautic/mautic/commit/20c5dc39b62164f6922ce53ea42cbb4ccec64e57', 'https://nvd.nist.gov/vuln/detail/CVE-2020-35124', 'https://www.horizon3.ai/disclosures... | null | {'https://github.com/mautic/mautic/commit/20c5dc39b62164f6922ce53ea42cbb4ccec64e57'} | {'https://github.com/mautic/mautic/commit/20c5dc39b62164f6922ce53ea42cbb4ccec64e57'} |
Packagist | GHSA-cqcc-mm6x-vmvw | Persistent Cross-site Scripting vulnerability in PrivateBin | In PrivateBin < v1.4.0 a cross-site scripting (XSS) vulnerability was found. The vulnerability is present since attachments with image preview got introduced in v0.21 of the project, which was at the time still called ZeroBin. The issue is caused by the fact that SVGs can contain JavaScript. This can allow an attacker ... | {'CVE-2022-24833'} | 2022-04-20T16:29:00Z | 2022-04-12T20:45:22Z | HIGH | null | {'CWE-79'} | {'https://github.com/PrivateBin/PrivateBin/security/advisories/GHSA-cqcc-mm6x-vmvw', 'https://github.com/PrivateBin/PrivateBin', 'https://github.com/PrivateBin/PrivateBin/commit/2a4d572c1e9eb9b608d32b0cc0cb3b6c3b684eab', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24833'} | null | {'https://github.com/PrivateBin/PrivateBin/commit/2a4d572c1e9eb9b608d32b0cc0cb3b6c3b684eab'} | {'https://github.com/PrivateBin/PrivateBin/commit/2a4d572c1e9eb9b608d32b0cc0cb3b6c3b684eab'} |
Packagist | GHSA-hf4q-52x6-4p57 | Unrestricted file upload leads to stored cross-site scripting in Microweber | Microweber prior to version 1.2.12 allows unrestricted file upload, which could lead to stored cross-site scripting. | {'CVE-2022-0906'} | 2022-03-28T22:23:29Z | 2022-03-11T00:02:36Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0906', 'https://github.com/microweber/microweber', 'https://github.com/microweber/microweber/commit/d9bae9df873c2d2a13a2eb08d512019d49ebca68', 'https://huntr.dev/bounties/87ed3b42-9824-49b0-91a5-fd908a0601e8'} | null | {'https://github.com/microweber/microweber/commit/d9bae9df873c2d2a13a2eb08d512019d49ebca68'} | {'https://github.com/microweber/microweber/commit/d9bae9df873c2d2a13a2eb08d512019d49ebca68'} |
Packagist | GHSA-v567-q267-phpg | pimcore is vulnerable to Cross-site Scripting | pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2022-0257'} | 2022-01-25T20:49:25Z | 2022-01-21T23:50:11Z | MODERATE | null | {'CWE-79'} | {'https://github.com/pimcore/pimcore/commit/dfaf78b26fb77990267c0cc05b9fcb9f8de7b66d', 'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/bad2073c-bbd5-4425-b3e9-c336b73ddda6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0257'} | null | {'https://github.com/pimcore/pimcore/commit/dfaf78b26fb77990267c0cc05b9fcb9f8de7b66d'} | {'https://github.com/pimcore/pimcore/commit/dfaf78b26fb77990267c0cc05b9fcb9f8de7b66d'} |
Packagist | GHSA-3j78-7m59-r7gv | Private data exposure via REST API in BuddyPress | In BuddyPress before 5.1.2, requests to a certain REST API endpoint can result in private user data getting exposed. Authentication is not needed.
This has been patched in version 5.1.2. | {'CVE-2020-5244'} | 2021-01-08T20:29:11Z | 2020-02-24T17:18:26Z | HIGH | null | {'CWE-284'} | {'https://buddypress.org/2020/01/buddypress-5-1-2/', 'https://github.com/buddypress/BuddyPress/security/advisories/GHSA-3j78-7m59-r7gv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5244', 'https://github.com/buddypress/BuddyPress/commit/39294680369a0c992290577a9d740f4a2f2c2ca3'} | null | {'https://github.com/buddypress/BuddyPress/commit/39294680369a0c992290577a9d740f4a2f2c2ca3'} | {'https://github.com/buddypress/BuddyPress/commit/39294680369a0c992290577a9d740f4a2f2c2ca3'} |
Packagist | GHSA-q73m-3q7r-fpf7 | Cross-site Scripting in ShowDoc | ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload. | {'CVE-2022-0957'} | 2022-03-29T15:46:18Z | 2022-03-16T00:00:48Z | MODERATE | null | {'CWE-79'} | {'https://github.com/star7th/showdoc/pull/1632', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/d1c9ed0d77ea5d56f09be0c492361dca8af745bb', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0957', 'https://huntr.dev/bounties/b4918d45-b635-40db-bb4b-34035e1aca21'} | null | {'https://github.com/star7th/showdoc/commit/d1c9ed0d77ea5d56f09be0c492361dca8af745bb'} | {'https://github.com/star7th/showdoc/commit/d1c9ed0d77ea5d56f09be0c492361dca8af745bb'} |
Packagist | GHSA-hrf4-hcpc-3345 | Denial of service in microweber | Microweber is drag and drop website builder and CMS with E-commerce. The microweber prior 1.2.12 application allows large characters to insert in the input field "post title" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The post title input can be limited to 500 characters or... | {'CVE-2022-0961'} | 2022-03-25T17:09:24Z | 2022-03-16T00:00:48Z | HIGH | null | {'CWE-190'} | {'https://github.com/microweber/microweber/commit/f7acbd075dff4825b35b597b74958de9edce67fc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0961', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/cdf00e14-38a7-4b6b-9bb4-3a71bf24e436'} | null | {'https://github.com/microweber/microweber/commit/f7acbd075dff4825b35b597b74958de9edce67fc'} | {'https://github.com/microweber/microweber/commit/f7acbd075dff4825b35b597b74958de9edce67fc'} |
Packagist | GHSA-84px-q68r-2fc9 | Privilege escalation in the Sulu Admin panel | ### Impact
Impacted are only users which already have access to the admin UI. Over the API it was possible for them to give themselves permissions to areas which they did not already had. This issue was introduced in 2.0.0-RC1 with the new ProfileController putAction.
### Patches
The versions have been patched in 2.... | {'CVE-2021-43835'} | 2021-12-15T22:27:38Z | 2021-12-15T22:55:16Z | HIGH | null | {'CWE-269'} | {'https://github.com/sulu/sulu/security/advisories/GHSA-84px-q68r-2fc9', 'https://github.com/sulu/sulu/commit/30bf8b5a4f83b6f2171a696011757d095edaa28a', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43835', 'https://github.com/sulu/sulu'} | null | {'https://github.com/sulu/sulu/commit/30bf8b5a4f83b6f2171a696011757d095edaa28a'} | {'https://github.com/sulu/sulu/commit/30bf8b5a4f83b6f2171a696011757d095edaa28a'} |
Packagist | GHSA-75c5-f4gw-38r9 | Multiple vulnerabilities through filename manipulation in Archive_Tar | Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed. See: https://github.com/pear/Archive_Tar/issues/33 | {'CVE-2020-28949'} | 2021-09-20T20:26:56Z | 2021-04-22T16:20:59Z | HIGH | null | {'CWE-74'} | {'http://packetstormsecurity.com/files/161095/PEAR-Archive_Tar-Arbitrary-File-Write.html', 'https://nvd.nist.gov/vuln/detail/CVE-2020-28949', 'https://github.com/pear/Archive_Tar', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/', 'https:... | null | {'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da'} | {'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da'} |
Packagist | GHSA-vcgf-vmpc-ph79 | Improper Access Control in microweber | Improper Access Control in Packagist microweber/microweber prior to 1.2.11. | {'CVE-2022-0277'} | 2022-01-27T18:30:40Z | 2022-01-21T18:06:16Z | MODERATE | null | {'CWE-284', 'CWE-269'} | {'https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0277', 'https://huntr.dev/bounties/0e776f3d-35b1-4a9e-8fe8-91e46c0d6316'} | null | {'https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6'} | {'https://github.com/microweber/microweber/commit/e680e134a4215c979bfd2eaf58336be34c8fc6e6'} |
Packagist | GHSA-2cjf-w7c4-fhf6 | Cross-site Scripting in Beanstalk console | Beanstalk console (ptrofimov/beanstalk_console) prior to 1.7.14 is vulnerable to cross-site scripting. | {'CVE-2022-0539'} | 2022-02-11T15:04:27Z | 2022-02-10T00:00:30Z | MODERATE | null | {'CWE-79'} | {'https://github.com/ptrofimov/beanstalk_console/commit/5aea5f912f6e6d19dedb1fdfc25a29a2e1fc1694', 'https://github.com/ptrofimov/beanstalk_console', 'https://huntr.dev/bounties/5f41b182-dda2-4c6f-9668-2a9afaed53af', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0539'} | null | {'https://github.com/ptrofimov/beanstalk_console/commit/5aea5f912f6e6d19dedb1fdfc25a29a2e1fc1694'} | {'https://github.com/ptrofimov/beanstalk_console/commit/5aea5f912f6e6d19dedb1fdfc25a29a2e1fc1694'} |
Packagist | GHSA-f768-8pvq-mm6r | Business Logic Errors in dolibarr/dolibarr | Dolibarr 14.0.5 and prior versions are vulnerable to Business Logic Errors. | {'CVE-2022-0414'} | 2022-02-07T21:10:24Z | 2022-02-01T22:01:47Z | MODERATE | null | null | {'https://github.com/dolibarr/dolibarr', 'https://github.com/dolibarr/dolibarr/commit/37fb02ee760cfff18c795ba468da1ba1c53f4684', 'https://huntr.dev/bounties/76f3b405-9f5d-44b1-8434-b52b56ee395f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0414'} | null | {'https://github.com/dolibarr/dolibarr/commit/37fb02ee760cfff18c795ba468da1ba1c53f4684'} | {'https://github.com/dolibarr/dolibarr/commit/37fb02ee760cfff18c795ba468da1ba1c53f4684'} |
Packagist | GHSA-hgjr-632x-qpp3 | Cross-site scripting vulnerability in file upload | There is a cross-site scripting vulnerability in file upload on the management system of baserCMS.
This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users.
If you are eligible, please update to the new version as soon as possible.
### Target
baserCMS 4.5... | {'CVE-2021-39136'} | 2021-08-26T15:08:57Z | 2021-08-30T16:18:59Z | HIGH | null | {'CWE-79'} | {'http://jvn.jp/en/jp/JVN14134801/index.html', 'https://github.com/baserproject/basercms/commit/568d4cab5ba1cdee7bbf0133c676d02a98f6d7bc', 'https://github.com/baserproject/basercms/security/advisories/GHSA-hgjr-632x-qpp3', 'https://github.com/baserproject/basercms', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39136', 'h... | null | {'https://github.com/baserproject/basercms/commit/568d4cab5ba1cdee7bbf0133c676d02a98f6d7bc'} | {'https://github.com/baserproject/basercms/commit/568d4cab5ba1cdee7bbf0133c676d02a98f6d7bc'} |
Packagist | GHSA-9cq5-xgg4-x477 | SQL Injection in showdoc | Showdoc verions 2.10.2 and prior is vulnerable to SQL injection. A patch is available in the `master` branch of the repository. | {'CVE-2022-0362'} | 2022-02-03T21:37:09Z | 2022-01-27T00:01:15Z | MODERATE | null | {'CWE-89'} | {'https://github.com/star7th/showdoc/commit/2b34e267e4186125f99bfa420140634ad45801fb', 'https://huntr.dev/bounties/e7c72417-eb8f-416c-8480-be76ac0a9091', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0362'} | null | {'https://github.com/star7th/showdoc/commit/2b34e267e4186125f99bfa420140634ad45801fb'} | {'https://github.com/star7th/showdoc/commit/2b34e267e4186125f99bfa420140634ad45801fb'} |
Packagist | GHSA-g585-j55v-38h7 | Cross-site Scripting in ShowDoc | ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload. | {'CVE-2022-0966'} | 2022-03-29T18:40:41Z | 2022-03-16T00:00:45Z | MODERATE | null | {'CWE-79'} | {'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/e06c0d55-00a3-4f82-a009-0310b2e402fe', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0966'} | null | {'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'} | {'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'} |
Packagist | GHSA-38m9-3vg4-rwvp | Cross-site Scripting in microweber | microweber prior to version 1.2.11 is vulnerable to cross-site scripting. | {'CVE-2022-0678'} | 2022-02-23T19:43:59Z | 2022-02-20T00:00:32Z | MODERATE | null | {'CWE-79'} | {'https://github.com/microweber/microweber/commit/2b8fa5aac31e51e2aca83c7ef5d1281ba2e755f8', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0678', 'https://huntr.dev/bounties/d707137a-aace-44c5-b15c-1807035716c0', 'https://github.com/microweber/microweber'} | null | {'https://github.com/microweber/microweber/commit/2b8fa5aac31e51e2aca83c7ef5d1281ba2e755f8'} | {'https://github.com/microweber/microweber/commit/2b8fa5aac31e51e2aca83c7ef5d1281ba2e755f8'} |
Packagist | GHSA-fx3v-553x-3c4q | Stored XSS by authenticated backend user with access to upload files | ### Impact
Backend users with access to upload files were permitted to upload SVG files without any sanitization applied to the uploaded files. Since SVG files support being parsed as HTML by browsers, this means that they could theoretically upload Javascript that would be executed on a path under the website's domain... | {'CVE-2020-15249'} | 2021-03-04T18:24:54Z | 2020-11-23T19:47:59Z | LOW | null | {'CWE-79'} | {'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15249', 'https://github.com/octobercms/october/security/advisories/GHSA-fx3v-553x-3c4q'} | null | {'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4'} | {'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4'} |
Packagist | GHSA-c442-3278-rhrg | Unrestricted File Upload in ShowDoc v2.9.5 | Unrestricted File Upload in ShowDoc v2.9.5 allows remote attackers to execute arbitrary code via the 'file_url' parameter in the component AdminUpdateController.class.php'. | {'CVE-2021-36440'} | 2021-09-16T19:26:04Z | 2021-09-09T17:08:46Z | CRITICAL | null | {'CWE-434'} | {'https://github.com/star7th/showdoc/commit/49b992d4c548c8c615a92b6efe8a50c8f1083abf', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36440', 'https://github.com/star7th/showdoc/issues/1406', 'https://github.com/star7th/showdoc'} | null | {'https://github.com/star7th/showdoc/commit/49b992d4c548c8c615a92b6efe8a50c8f1083abf'} | {'https://github.com/star7th/showdoc/commit/49b992d4c548c8c615a92b6efe8a50c8f1083abf'} |
Packagist | GHSA-w6rp-4vj7-v2m8 | Missing Authorization in DayByDay CRM | In DayByDay CRM, version 2.2.0 is vulnerable to missing authorization. Any application user in the application who has update user permission enabled is able to change the password of other users, including the administrator’s. This allows the attacker to gain access to the highest privileged user in the application. | {'CVE-2022-22111'} | 2022-01-10T21:46:05Z | 2022-01-08T00:31:49Z | HIGH | null | {'CWE-862'} | {'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22111', 'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b', 'https://github.com/Bottelet/DaybydayCRM', 'https://nvd.nist.gov/vuln/detail/CVE-2022-22111'} | null | {'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b'} | {'https://github.com/Bottelet/DaybydayCRM/commit/fe842ea5ede237443f1f45a99aeb839133115d8b'} |
Packagist | GHSA-w6jr-wj64-mc9x | Deserialization of Untrusted Data in Codeigniter4 | ### Impact
Deserialization of Untrusted Data was found in the `old()` function in CodeIgniter4.
Remote attackers may inject auto-loadable arbitrary objects with this vulnerability,
and possibly execute existing PHP code on the server.
We are aware of a working exploit, which can lead to SQL injection.
### Patches
Upg... | {'CVE-2022-21647'} | 2022-01-06T19:32:43Z | 2022-01-06T22:52:41Z | HIGH | null | {'CWE-502'} | {'https://github.com/codeigniter4/CodeIgniter4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21647', 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-w6jr-wj64-mc9x', 'https://github.com/codeigniter4/CodeIgniter4/commit/ce95ed5765256e2f09f3513e7d42790e0d6948f5'} | null | {'https://github.com/codeigniter4/CodeIgniter4/commit/ce95ed5765256e2f09f3513e7d42790e0d6948f5'} | {'https://github.com/codeigniter4/CodeIgniter4/commit/ce95ed5765256e2f09f3513e7d42790e0d6948f5'} |
Packagist | GHSA-25fx-mxc2-76g7 | Unauthorized access to Credit card form exposing payer name and not requiring 3DS | ### Impact
URL to the payment page done after checkout was created with autoincremented payment id (`/pay-with-paypal/{id}`) and therefore it was easy to access for anyone, not even the order's customer. The problem was, the Credit card form has prefilled "credit card holder" field with the Customer's first and last na... | {'CVE-2021-41120'} | 2021-10-05T21:12:27Z | 2021-10-06T17:49:11Z | HIGH | null | {'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-41120', 'https://github.com/Sylius/PayPalPlugin/commit/2adc46be2764ccee22b4247139b8056fb8d1afff', 'https://github.com/Sylius/PayPalPlugin', 'https://github.com/Sylius/PayPalPlugin/commit/814923c2e9d97fe6279dcee866c34ced3d2fb7a7', 'https://github.com/Sylius/PayPalPlugin/securi... | null | {'https://github.com/Sylius/PayPalPlugin/commit/2adc46be2764ccee22b4247139b8056fb8d1afff', 'https://github.com/Sylius/PayPalPlugin/commit/814923c2e9d97fe6279dcee866c34ced3d2fb7a7'} | {'https://github.com/Sylius/PayPalPlugin/commit/814923c2e9d97fe6279dcee866c34ced3d2fb7a7', 'https://github.com/Sylius/PayPalPlugin/commit/2adc46be2764ccee22b4247139b8056fb8d1afff'} |
Packagist | GHSA-5v44-7647-xfw9 | Blind SQL injection in PrestaShop productcomments module | ### Impact
An attacker can use a Blind SQL injection to retrieve data or stop the MySQL service.
### Patches
The problem is fixed in 4.2.1 | {'CVE-2020-26248'} | 2022-01-07T16:07:46Z | 2021-01-20T21:33:53Z | LOW | null | {'CWE-89'} | {'https://github.com/PrestaShop/productcomments/commit/7c2033dd811744e021da8897c80d6c301cd45ffa', 'https://github.com/PrestaShop/productcomments', 'https://nvd.nist.gov/vuln/detail/CVE-2020-26248', 'https://packagist.org/packages/prestashop/productcomments', 'https://github.com/PrestaShop/productcomments/security/advis... | null | {'https://github.com/PrestaShop/productcomments/commit/7c2033dd811744e021da8897c80d6c301cd45ffa'} | {'https://github.com/PrestaShop/productcomments/commit/7c2033dd811744e021da8897c80d6c301cd45ffa'} |
Packagist | GHSA-73q9-7pwj-gm46 | icecoder is vulnerable to Cross-site Scripting | icecoder is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2021-3862'} | 2022-01-19T14:28:08Z | 2022-01-21T23:46:12Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3862', 'https://github.com/icecoder/icecoder/commit/51cf24b2a39138e6a7b5739ef59eb38cd7c39763', 'https://github.com/icecoder/icecoder', 'https://huntr.dev/bounties/5c9c228e-2a39-4643-bb82-2b02a2b0a601'} | null | {'https://github.com/icecoder/icecoder/commit/51cf24b2a39138e6a7b5739ef59eb38cd7c39763'} | {'https://github.com/icecoder/icecoder/commit/51cf24b2a39138e6a7b5739ef59eb38cd7c39763'} |
Packagist | GHSA-p7v4-gm6j-cw9m | XSS in Mautic | ### Impact
This is a cross-site scripting vulnerability relating to creating/editing a company which requires the user to be logged in as an administrator to be executed.
This vulnerability was reported by Dardan Prebreza at Bishop Fox.
### Patches
Upgrade to 3.2.4 or 2.16.5.
Link to patch for 2.x versions: https://... | {'CVE-2021-3142'} | 2021-01-29T20:31:59Z | 2021-01-29T20:51:20Z | HIGH | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3142', 'https://github.com/mautic/mautic/security/advisories/GHSA-p7v4-gm6j-cw9m', 'https://www.mautic.org/blog/community/security-release-all-versions-mautic-prior-2-16-5-and-3-2-3', 'https://github.com/mautic/mautic/releases/tag/3.2.4', 'https://github.com/mautic/mautic/com... | null | {'https://github.com/mautic/mautic/commit/ba31db23e664f889da55a29ff27f797e2ab5cb1b'} | {'https://github.com/mautic/mautic/commit/ba31db23e664f889da55a29ff27f797e2ab5cb1b'} |
Packagist | GHSA-ppfm-rj6p-38q6 | Improper Authorization in librenms | Improper Authorization in Packagist librenms/librenms prior to 22.2.0. | {'CVE-2022-0587'} | 2022-02-24T12:14:14Z | 2022-02-16T00:01:53Z | HIGH | null | {'CWE-285'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0587', 'https://huntr.dev/bounties/0c7c9ecd-33ac-4865-b05b-447ced735469', 'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://github.com/librenms/lib... | null | {'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7'} | {'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7'} |
Packagist | GHSA-h58v-g3q6-q9fx | Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in sulu/sulu | ### Impact
_What kind of vulnerability is it? Who is impacted?_
It is an issue when input HTML into the Tag name. The HTML is execute when the tag name is listed in the auto complete form.
Only admin users are affected and only admin users can create tags.
### Patches
_Has the problem been patched? What versions sh... | {'CVE-2021-41169'} | 2021-10-21T21:33:34Z | 2021-10-22T16:20:53Z | MODERATE | null | {'CWE-79'} | {'https://github.com/sulu/sulu/security/advisories/GHSA-h58v-g3q6-q9fx', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41169', 'https://github.com/sulu/sulu/commit/20007ac70a3af3c9e53a6acb0ef8794b65642445', 'https://github.com/sulu/sulu'} | null | {'https://github.com/sulu/sulu/commit/20007ac70a3af3c9e53a6acb0ef8794b65642445'} | {'https://github.com/sulu/sulu/commit/20007ac70a3af3c9e53a6acb0ef8794b65642445'} |
Packagist | GHSA-6whf-q6p5-84wg | Improper Access Control in Webauthn Framework | Webauthn Framework 3.3.x before 3.3.4 has Incorrect Access Control. An attacker that controls a user's system is able to login to a vulnerable service using an attached FIDO2 authenticator without passing a check of the user presence. | {'CVE-2021-38299'} | 2021-10-06T13:23:34Z | 2021-09-29T17:16:07Z | CRITICAL | null | {'CWE-863'} | {'https://github.com/web-auth/webauthn-framework', 'https://www.fzi.de/en/news/news/detail-en/artikel/fsa-2021-1-fehlende-ueberpruefung-von-user-presence-in-webauthn-framework/', 'https://github.com/web-auth/webauthn-framework/releases', 'https://github.com/web-auth/webauthn-framework/commit/572e239c5702667ca52487faf86... | null | {'https://github.com/web-auth/webauthn-framework/commit/572e239c5702667ca52487faf861abc768a46308'} | {'https://github.com/web-auth/webauthn-framework/commit/572e239c5702667ca52487faf861abc768a46308'} |
Packagist | GHSA-4h44-w6fm-548g | Potential Remote Code Execution in TYPO3 with mediace extension | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C` (9.1)
> * CWE-325, CWE-20, CWE-200, CWE-502
### Problem
It has been discovered that an internal verification mechanism can be used to generate arbitrary checksums. This allows to inject arbitrary data having a valid cryptographic message... | {'CVE-2020-15086'} | 2021-11-19T15:44:20Z | 2020-07-29T16:15:12Z | HIGH | null | {'CWE-502', 'CWE-325', 'CWE-20', 'CWE-200'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-15086', 'https://github.com/FriendsOfTYPO3/mediace/pull/31', 'https://github.com/FriendsOfTYPO3/mediace/security/advisories/GHSA-4h44-w6fm-548g', 'https://github.com/FriendsOfTYPO3/mediace/commit/fa29ffd3e8b275782a8600d2406e1b1e5e16ae75', 'https://github.com/FriendsOfTYPO3/me... | null | {'https://github.com/FriendsOfTYPO3/mediace/commit/fa29ffd3e8b275782a8600d2406e1b1e5e16ae75'} | {'https://github.com/FriendsOfTYPO3/mediace/commit/fa29ffd3e8b275782a8600d2406e1b1e5e16ae75'} |
Packagist | GHSA-2p89-ppc2-mrq4 | Cross site scripting in getgrav/grav | User input is not properly sanitized leading to cross site scrpting (xss) in grav. | {'CVE-2022-0743'} | 2022-03-18T20:45:44Z | 2022-03-02T00:00:22Z | MODERATE | null | {'CWE-79'} | {'https://github.com/getgrav/grav/commit/3dd0cabeac9835fe64dcb4b68c658b39f1f6be2f', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0743', 'https://github.com/getgrav/grav', 'https://huntr.dev/bounties/32ea4ddb-5b41-4bf9-b5a1-ef455fe2d293'} | null | {'https://github.com/getgrav/grav/commit/3dd0cabeac9835fe64dcb4b68c658b39f1f6be2f'} | {'https://github.com/getgrav/grav/commit/3dd0cabeac9835fe64dcb4b68c658b39f1f6be2f'} |
Packagist | GHSA-vxhx-gmhm-623c | Improper Access Control in moodle | Users' enrollment capabilities were not being sufficiently checked in Moodle when they are restored into an existing course. This could lead to them unenrolling users without having permission to do so. Versions affected: 3.5 to 3.5.14, 3.7 to 3.7.8, 3.8 to 3.8.5, 3.9 to 3.9.2 and earlier unsupported versions. Fixed in... | {'CVE-2020-25698'} | 2021-03-24T23:17:35Z | 2021-03-29T20:42:46Z | HIGH | null | {'CWE-284'} | {'https://moodle.org/mod/forum/discuss.php?d=413935', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25698', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895419', 'https://lists.fedoraproject... | null | {'https://github.com/moodle/moodle/commit/c8ac07fb50fa92eee1d574823fbda09e1b309a63'} | {'https://github.com/moodle/moodle/commit/c8ac07fb50fa92eee1d574823fbda09e1b309a63'} |
Packagist | GHSA-rp34-85x3-3764 | Cross-site Scripting in librenms | Cross-site Scripting (XSS) - Generic in Packagist librenms/librenms prior to 22.1.0. | {'CVE-2022-0576'} | 2022-02-24T13:07:04Z | 2022-02-15T00:02:47Z | MODERATE | null | {'CWE-79'} | {'https://github.com/librenms/librenms/commit/135717a9a05c5bf8921f1389cbb469dcbf300bfd', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0576', 'https://huntr.dev/bounties/114ba055-a2f0-4db9-aafb-95df944ba177', 'https://github.com/librenms/lib... | null | {'https://github.com/librenms/librenms/commit/135717a9a05c5bf8921f1389cbb469dcbf300bfd'} | {'https://github.com/librenms/librenms/commit/135717a9a05c5bf8921f1389cbb469dcbf300bfd'} |
Packagist | GHSA-5hfj-r725-wpc4 | Arbitrary code execution in october/system | ### Impact
Assuming an attacker with access to the backend is able to execute PHP code by using the theme import feature. This will bypass the safe mode feature that prevents PHP execution in the CMS templates.
### Patches
Issue has been patched in Build 473 and v1.1.6
### Workarounds
Apply https://github.com/octo... | {'CVE-2021-32650'} | 2022-01-24T22:06:28Z | 2022-01-14T21:08:26Z | HIGH | null | {'CWE-74'} | {'https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26', 'https://github.com/octobercms/october', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32650', 'https://github.com/octobercms/october/security/advisories/GHSA-5hfj-r725-wpc4'} | null | {'https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26'} | {'https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26'} |
Packagist | GHSA-qpv2-jxc7-3638 | Exposure of Sensitive Information in snipe/snipe-it | Snipe-IT prior to v5.3.10 is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor. | {'CVE-2022-0569'} | 2022-02-24T13:13:01Z | 2022-02-15T00:02:47Z | MODERATE | null | {'CWE-200'} | {'https://huntr.dev/bounties/b41d5e63-bcd8-4864-8a2e-8ec74eec520b', 'https://github.com/snipe/snipe-it', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0569', 'https://github.com/snipe/snipe-it/commit/05c0819776b07425b2831cd31a8a0f4e7ac30c09'} | null | {'https://github.com/snipe/snipe-it/commit/05c0819776b07425b2831cd31a8a0f4e7ac30c09'} | {'https://github.com/snipe/snipe-it/commit/05c0819776b07425b2831cd31a8a0f4e7ac30c09'} |
Packagist | GHSA-r992-xph6-h7x2 | Open redirect in microweber | microweber prior to 1.2.11 is vulnerable to open redirect. | {'CVE-2022-0560'} | 2022-02-23T21:57:38Z | 2022-02-12T00:00:48Z | MODERATE | null | {'CWE-601'} | {'https://github.com/microweber/microweber/commit/72d4b12cc487f56a859a8570ada4efb77b4b8c63', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/c9d586e7-0fa1-47ab-a2b3-b890e8dc9b25', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0560'} | null | {'https://github.com/microweber/microweber/commit/72d4b12cc487f56a859a8570ada4efb77b4b8c63'} | {'https://github.com/microweber/microweber/commit/72d4b12cc487f56a859a8570ada4efb77b4b8c63'} |
Packagist | GHSA-v92m-hhhw-vv9v | Code injection in codiad | Codiad Web IDE through 2.8.4 allows PHP Code injection. | {'CVE-2019-19208'} | 2021-08-30T21:59:12Z | 2021-09-01T18:27:12Z | CRITICAL | null | {'CWE-94'} | {'https://github.com/Hacker5preme/Exploits/tree/main/CVE-2019-19208-Exploit', 'https://herolab.usd.de/security-advisories/usd-2019-0049/', 'https://www.exploit-db.com/exploits/49902', 'https://nvd.nist.gov/vuln/detail/CVE-2019-19208', 'https://herolab.usd.de/en/security-advisories/', 'https://github.com/Codiad/Codiad',... | null | {'https://github.com/Codiad/Codiad/commits/master'} | {'https://github.com/Codiad/Codiad/commits/master'} |
Packagist | GHSA-vm37-j55j-8655 | OS Command Injection in Microweber | Microweber is a content management system with drag and drop. Prior to version 1.2.11, Microweber is vulnerable to OS Command Injection. | {'CVE-2022-0557'} | 2022-03-28T15:23:37Z | 2022-02-12T00:00:49Z | HIGH | null | {'CWE-78'} | {'https://github.com/microweber/microweber/commit/0a7e5f1d81de884861ca677ee1aaac31f188d632', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0557', 'http://packetstormsecurity.com/files/166077/Microweber-1.2.11-Shell-Upload.html', 'https://github.com/microweber/microweber', 'https://www.exploit-db.com/exploits/50768', 'http... | null | {'https://github.com/microweber/microweber/commit/0a7e5f1d81de884861ca677ee1aaac31f188d632'} | {'https://github.com/microweber/microweber/commit/0a7e5f1d81de884861ca677ee1aaac31f188d632'} |
Packagist | GHSA-83vp-6jqg-6cmr | Incorrect Authentication in shopware | ### Impact
Modify Customers, create Orders without App Permission
## Patches
We recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
## Workarounds
For older versions... | {'CVE-2022-24748'} | 2022-03-18T20:15:32Z | 2022-03-10T18:02:14Z | MODERATE | null | {'CWE-287'} | {'https://github.com/shopware/platform', 'https://github.com/shopware/platform/security/advisories/GHSA-83vp-6jqg-6cmr', 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022?_ga=2.27683580.172848620.1646933022-368790926.1646933022', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24748', 'htt... | null | {'https://github.com/shopware/core/commit/329e4d7e028dd8081496cf8bd3acc822000b0ec0'} | {'https://github.com/shopware/core/commit/329e4d7e028dd8081496cf8bd3acc822000b0ec0'} |
Packagist | GHSA-32wr-8wxm-852c | Deserialization of Untrusted Data in NukeViet | includes/core/is_user.php in NukeViet before 4.3.04 deserializes the untrusted nvloginhash cookie (i.e., the code relies on PHP's serialization format when JSON can be used to eliminate the risk). | {'CVE-2019-7725'} | 2021-04-07T22:08:23Z | 2021-06-22T15:24:59Z | CRITICAL | null | {'CWE-502'} | {'https://github.com/nukeviet/nukeviet/blob/4.3.04/CHANGELOG.txt', 'https://github.com/nukeviet/nukeviet/blob/nukeviet4.3/CHANGELOG.txt', 'https://github.com/nukeviet/nukeviet/compare/4.3.03...4.3.04', 'https://github.com/nukeviet/nukeviet/pull/2740/commits/05dfb9b4531f12944fe39556f58449b9a56241be', 'https://nvd.nist.g... | null | {'https://github.com/nukeviet/nukeviet/pull/2740/commits/05dfb9b4531f12944fe39556f58449b9a56241be'} | {'https://github.com/nukeviet/nukeviet/pull/2740/commits/05dfb9b4531f12944fe39556f58449b9a56241be'} |
Packagist | GHSA-rgp5-m2pq-3fmg | Cross-site Scripting in microweber | microweber prior to version 1.2.11 is vulnerable to cross-site scripting. | {'CVE-2022-0690'} | 2022-02-23T19:28:54Z | 2022-02-20T00:00:31Z | HIGH | null | {'CWE-79'} | {'https://github.com/microweber/microweber/commit/f7f5d41ba1a08ceed37c00d5f70a3f48b272e9f2', 'https://huntr.dev/bounties/4999a0f4-6efb-4681-b4ba-b36babc366f9', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0690', 'https://github.com/microweber/microweber'} | null | {'https://github.com/microweber/microweber/commit/f7f5d41ba1a08ceed37c00d5f70a3f48b272e9f2'} | {'https://github.com/microweber/microweber/commit/f7f5d41ba1a08ceed37c00d5f70a3f48b272e9f2'} |
Packagist | GHSA-q9p4-qfc8-fvpp | SQL Injection in medoo | columnQuote in medoo before 1.7.5 allows remote attackers to perform a SQL Injection due to improper escaping. | {'CVE-2019-10762'} | 2021-10-08T23:09:47Z | 2021-10-12T16:32:38Z | CRITICAL | null | {'CWE-89'} | {'https://snyk.io/vuln/SNYK-PHP-CATFANMEDOO-474562', 'https://github.com/catfan/Medoo/commit/659864b393961bf224bba1efc03b7dcbed7de533', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10762', 'https://github.com/catfan/Medoo'} | null | {'https://github.com/catfan/Medoo/commit/659864b393961bf224bba1efc03b7dcbed7de533'} | {'https://github.com/catfan/Medoo/commit/659864b393961bf224bba1efc03b7dcbed7de533'} |
Packagist | GHSA-vj9x-w7ch-f46p | pimcore is vulnerable to SQL Injection | pimcore is vulnerable to Improper Neutralization of Special Elements used in an SQL Command | {'CVE-2022-0258'} | 2022-01-19T14:22:43Z | 2022-01-21T23:50:08Z | HIGH | null | {'CWE-89'} | {'https://github.com/pimcore/pimcore/commit/66281c12479dc01a06258d8533eaddfb1770d5bd', 'https://github.com/pimcore/pimcore', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0258', 'https://huntr.dev/bounties/0df891e4-6412-4d9a-a9b7-d9df50311802'} | null | {'https://github.com/pimcore/pimcore/commit/66281c12479dc01a06258d8533eaddfb1770d5bd'} | {'https://github.com/pimcore/pimcore/commit/66281c12479dc01a06258d8533eaddfb1770d5bd'} |
Packagist | GHSA-xjp4-6w75-qrj7 | Remote CLI Command Execution Vulnerability in CodeIgniter4 | ### Impact
This vulnerability allows attackers to execute CLI routes via HTTP request.
### Patches
Upgrade to v4.1.9 or later.
### Workarounds
None.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeI... | {'CVE-2022-24711'} | 2022-03-01T21:44:13Z | 2022-03-01T21:44:13Z | CRITICAL | null | {'CWE-94', 'CWE-20'} | {'https://github.com/codeigniter4/CodeIgniter4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24711', 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-xjp4-6w75-qrj7', 'https://github.com/codeigniter4/CodeIgniter4/commit/202f41ad522ba1d414b9d9c35aba1cb0c156b781'} | null | {'https://github.com/codeigniter4/CodeIgniter4/commit/202f41ad522ba1d414b9d9c35aba1cb0c156b781'} | {'https://github.com/codeigniter4/CodeIgniter4/commit/202f41ad522ba1d414b9d9c35aba1cb0c156b781'} |
Packagist | GHSA-g8rg-7rpr-cwr2 | Information Disclosure in TYPO3 extension sf_event_mgt | A missing access check in the backend module allows an authenticated backend user to export participant data for events which the user does not have access to, resulting in Information Disclosure.
Another missing access check in the backend module allows an authenticated backend user to send emails to event participa... | {'CVE-2020-25026'} | 2021-08-02T14:33:59Z | 2020-09-02T18:03:26Z | MODERATE | null | {'CWE-863'} | {'https://github.com/derhansen/sf_event_mgt/security/advisories/GHSA-g8rg-7rpr-cwr2', 'https://packagist.org/packages/derhansen/sf_event_mgt', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25026', 'https://github.com/derhansen/sf_event_mgt/commit/17edcbf608b252cc1123e1279f0735f6aa28fef4', 'https://typo3.org/help/security-... | null | {'https://github.com/derhansen/sf_event_mgt/commit/17edcbf608b252cc1123e1279f0735f6aa28fef4'} | {'https://github.com/derhansen/sf_event_mgt/commit/17edcbf608b252cc1123e1279f0735f6aa28fef4'} |
Packagist | GHSA-5mj6-3cmq-fh34 | showdoc is vulnerable to Generation of Error Message Containing Sensitive Information | showdoc is vulnerable to Generation of Error Message Containing Sensitive Information | {'CVE-2022-0079'} | 2022-01-06T19:38:50Z | 2022-01-06T22:22:46Z | MODERATE | null | {'CWE-209'} | {'https://huntr.dev/bounties/b37f0e26-355a-4d50-8495-a567c10828ee', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/e43df0a190f68aefa272507d3bd54475f566c1db', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0079'} | null | {'https://github.com/star7th/showdoc/commit/e43df0a190f68aefa272507d3bd54475f566c1db'} | {'https://github.com/star7th/showdoc/commit/e43df0a190f68aefa272507d3bd54475f566c1db'} |
Packagist | GHSA-g5rr-p69h-7v3g | Insufficient type validation in pocketmine/pocketmine-mp | When an inventory interaction is performed (e.g. moving an item around an inventory), the client sends a serialized version of the itemstack to the server, which the server then deserializes and compares against its own copy. If the copies don't match, the transaction is invalid. This involves deserializing item NBT fr... | null | 2022-04-22T20:57:12Z | 2022-04-22T20:57:12Z | HIGH | null | {'CWE-1287', 'CWE-20'} | {'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/commit/5a98b08ee8dc8ff14862cd83d2e4af9d212fefc2', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-g5rr-p69h-7v3g', 'https://github.com/pmmp/PocketMine-MP/releases/tag/4.2.9', 'https://github.com/pmmp/PocketMine-MP/blob/4.2.... | null | {'https://github.com/pmmp/PocketMine-MP/commit/5a98b08ee8dc8ff14862cd83d2e4af9d212fefc2'} | {'https://github.com/pmmp/PocketMine-MP/commit/5a98b08ee8dc8ff14862cd83d2e4af9d212fefc2'} |
Packagist | GHSA-h9q8-5gv2-v6mg | Potential Session Hijacking | ### Impact
Potential session hijacking of store customers.
### Patches
We recommend to update to the current version 6.3.5.2. You can get the update to 6.3.5.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of ... | null | 2021-03-12T22:10:34Z | 2021-03-12T23:09:08Z | LOW | null | {'CWE-613'} | {'https://github.com/shopware/platform/security/advisories/GHSA-h9q8-5gv2-v6mg', 'https://github.com/shopware/platform/commit/010c0154bea57c1fca73277c7431d029db7a972e', 'https://packagist.org/packages/shopware/platform'} | null | {'https://github.com/shopware/platform/commit/010c0154bea57c1fca73277c7431d029db7a972e'} | {'https://github.com/shopware/platform/commit/010c0154bea57c1fca73277c7431d029db7a972e'} |
Packagist | GHSA-33wf-4crm-2322 | Improper Access Control in librenms | Improper Access Control in Packagist librenms/librenms prior to 22.2.0. | {'CVE-2022-0580'} | 2022-02-24T12:12:44Z | 2022-02-16T00:01:58Z | HIGH | null | {'CWE-284'} | {'https://github.com/librenms/librenms', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0580', 'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://huntr.dev/bounties/2494106c-7703-4558-bb1f-1eae59d... | null | {'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7'} | {'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7'} |
Packagist | GHSA-wph3-44rj-92pr | Multiple vulnerabilities leading to RCE | ### Impact
We recently fixed several vulnerabilities affect elFinder 2.1.58. These vulnerabilities can allow an attacker to execute arbitrary code and commands on the server hosting the elFinder PHP connector, even with the minimal configuration.
### Patches
The issues were addressed in our last release, 2.1.59.
... | {'CVE-2021-32682'} | 2021-10-06T20:57:44Z | 2021-06-16T17:04:29Z | CRITICAL | null | {'CWE-918', 'CWE-22', 'CWE-78'} | {'https://github.com/Studio-42/elFinder/security/advisories/GHSA-wph3-44rj-92pr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32682', 'http://packetstormsecurity.com/files/164173/elFinder-Archive-Command-Injection.html', 'https://github.com/Studio-42/elFinder/security/advisories/GHSA-qm58-cvvm-c5qr', 'https://github.com... | null | {'https://github.com/Studio-42/elFinder/commit/a106c350b7dfe666a81d6b576816db9fe0899b17'} | {'https://github.com/Studio-42/elFinder/commit/a106c350b7dfe666a81d6b576816db9fe0899b17'} |
Packagist | GHSA-636j-7x7r-gvw2 | Old sessions not blocked by login enable function in Snipe-IT | Snipe-IT is a FOSS project for asset management in IT Operations. In Snipe-IT versions 5.4.1 and 6.0.0-RC-5 and prior, active sessions are not revoked when a user account is disabled, allowing that user to still access information that they should no longer be able to. Workarounds include using the KillAllSessions cons... | {'CVE-2022-1155'} | 2022-04-13T13:28:21Z | 2022-03-31T00:00:22Z | HIGH | null | {'CWE-613'} | {'https://github.com/snipe/snipe-it/releases/tag/v5.4.2', 'https://github.com/snipe/snipe-it/pull/10876', 'https://huntr.dev/bounties/ebc26354-2414-4f72-88aa-f044aec2b2e1', 'https://github.com/snipe/snipe-it/releases/tag/v6.0.0-RC-6', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1155', 'https://github.com/snipe/snipe-it'... | null | {'https://github.com/snipe/snipe-it/commit/bdabbbd4e98e88ee01e728ceb4fd512661fbd38d'} | {'https://github.com/snipe/snipe-it/commit/bdabbbd4e98e88ee01e728ceb4fd512661fbd38d'} |
Packagist | GHSA-5pv8-ppvj-4h68 | Prevent user enumeration using Guard or the new Authenticator-based Security | Description
-----------
The ability to enumerate users was possible without relevant permissions due to different exception messages depending on whether the user existed or not. It was also possible to enumerate users by using a timing attack, by comparing time elapsed when authenticating an existing user and authent... | {'CVE-2021-21424'} | 2021-05-13T15:25:38Z | 2021-05-13T20:23:02Z | MODERATE | null | {'CWE-200'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VRUS2H2SSOQWNLBD35SKIWIDQEMV2PD3/', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KENRNLB3FYXYGDWRBH2PDBOZZKOD7VY4/', 'https://github.com/symfony/symfony/security/advisories... | null | {'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011'} | {'https://github.com/symfony/symfony/commit/2a581d22cc621b33d5464ed65c4bc2057f72f011'} |
Packagist | GHSA-pfj7-w373-gqch | Cross-Site Request Forgery in firefly-iii | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-3900'} | 2021-10-29T13:49:08Z | 2021-10-28T23:14:21Z | MODERATE | null | {'CWE-352'} | {'https://github.com/firefly-iii/firefly-iii', 'https://huntr.dev/bounties/909e55b6-ef02-4143-92e4-bc3e8397db76', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3900', 'https://github.com/firefly-iii/firefly-iii/commit/c2c8c42ef3194d1aeba8c48240fe2e9063f77635'} | null | {'https://github.com/firefly-iii/firefly-iii/commit/c2c8c42ef3194d1aeba8c48240fe2e9063f77635'} | {'https://github.com/firefly-iii/firefly-iii/commit/c2c8c42ef3194d1aeba8c48240fe2e9063f77635'} |
Packagist | GHSA-x92h-wmg2-6hp7 | Invalid HTTP method overrides allow possible XSS or other attacks in Symfony | In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, HTTP Methods provided as verbs or using the override header may be treated as trusted input, but they are not validated, possibly causing SQL injection or XSS. This is related to symfony/http-foundation. | {'CVE-2019-10913'} | 2021-08-19T15:18:27Z | 2019-12-02T18:10:24Z | CRITICAL | null | {'CWE-79', 'CWE-89'} | {'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-foundation/CVE-2019-10913.yaml', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-2019-10913.yaml', 'https://symfony.com/blog/cve-2019-10913-reject-invalid-http-method-overrides', 'https://symfony.com/cve-... | null | {'https://github.com/symfony/symfony/commit/944e60f083c3bffbc6a0b5112db127a10a66a8ec'} | {'https://github.com/symfony/symfony/commit/944e60f083c3bffbc6a0b5112db127a10a66a8ec'} |
Packagist | GHSA-65mj-7c86-79jf | Authentication Bypass in ADOdb/ADOdb | ### Impact
An attacker can inject values into a PostgreSQL connection string by providing a parameter surrounded by single quotes.
Depending on how the library is used in the client software, this may allow an attacker to bypass the login process, gain access to the server's IP address, etc.
### Patches
The vulnera... | {'CVE-2021-3850'} | 2022-02-07T22:34:28Z | 2022-01-27T15:23:19Z | CRITICAL | null | {'CWE-287', 'CWE-305'} | {'https://github.com/ADOdb/ADOdb/issues/793', 'https://github.com/ADOdb/ADOdb/commit/952de6c4273d9b1e91c2b838044f8c2111150c29', 'https://github.com/ADOdb/ADOdb', 'https://github.com/ADOdb/ADOdb/security/advisories/GHSA-65mj-7c86-79jf', 'https://github.com/ADOdb/ADOdb/commit/b4d5ce70034c5aac3a1d51d317d93c037a0938d2', 'h... | null | {'https://github.com/ADOdb/ADOdb/commit/952de6c4273d9b1e91c2b838044f8c2111150c29', 'https://github.com/ADOdb/ADOdb/commit/b4d5ce70034c5aac3a1d51d317d93c037a0938d2'} | {'https://github.com/ADOdb/ADOdb/commit/952de6c4273d9b1e91c2b838044f8c2111150c29', 'https://github.com/ADOdb/ADOdb/commit/b4d5ce70034c5aac3a1d51d317d93c037a0938d2'} |
Packagist | GHSA-cfcv-q4qq-2ph4 | CKEditor 4 vulnerabilities in versions <4.16.1 | Details see:
https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-m94c-37g6-cjhc ( CVE-2021-37695 )
https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-6226-h7ff-ch6c ( CVE-2021-32808 )
https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-7889-rm5j-hpgg ( CVE-2021-32809 )
Patch:
http... | null | 2021-10-08T21:19:54Z | 2021-08-23T19:42:05Z | MODERATE | null | null | {'https://github.com/pimcore/pimcore/security/advisories/GHSA-cfcv-q4qq-2ph4', 'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/commit/0d2ce3b1db4ac40646cee5104115767505760b6a'} | null | {'https://github.com/pimcore/pimcore/commit/0d2ce3b1db4ac40646cee5104115767505760b6a'} | {'https://github.com/pimcore/pimcore/commit/0d2ce3b1db4ac40646cee5104115767505760b6a'} |
Packagist | GHSA-x5jp-9fmm-m9pf | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | showdoc is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-3683'} | 2021-11-17T21:11:15Z | 2021-11-15T23:13:52Z | MODERATE | null | {'CWE-352'} | {'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3683', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/063a339a-5d78-40d6-a96a-6716960e8134'} | null | {'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'} | {'https://github.com/star7th/showdoc/commit/67093c879a6563aa6ee08003177777d1975e2351'} |
Packagist | GHSA-52qp-jpq7-6c54 | Insecure Deserialization of untrusted data in rmccue/requests | ### Impact
Unserialization of untrusted data.
### Patches
The issue has been patched and users of `Requests` 1.6.0, 1.6.1 and 1.7.0 should update to version 1.8.0.
### References
Publications about the vulnerability:
* https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress
*... | {'CVE-2021-29476'} | 2021-04-27T20:54:56Z | 2021-04-29T21:52:30Z | CRITICAL | null | {'CWE-502'} | {'https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3', 'https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/', 'https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf', 'http... | null | {'https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3'} | {'https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3'} |
Packagist | GHSA-57hg-26h7-9qgv | pimcore is vulnerable to Cross-site Scripting | pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2022-0256'} | 2022-01-25T20:49:09Z | 2022-01-21T23:48:07Z | MODERATE | null | {'CWE-79'} | {'https://github.com/pimcore/pimcore', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0256', 'https://huntr.dev/bounties/8d88e48a-7124-4aaf-9f1d-6cfe4f9a79c1', 'https://github.com/pimcore/pimcore/commit/dff1cb0c466abcd55f1268934de3ed937b7436a7'} | null | {'https://github.com/pimcore/pimcore/commit/dff1cb0c466abcd55f1268934de3ed937b7436a7'} | {'https://github.com/pimcore/pimcore/commit/dff1cb0c466abcd55f1268934de3ed937b7436a7'} |
Packagist | GHSA-h2rj-8wgg-mm43 | Cross-site Scripting in craftcms | Craft CMS before 3.6.13 has an XSS vulnerability. | {'CVE-2021-32470'} | 2022-03-18T17:53:37Z | 2022-03-18T17:53:37Z | MODERATE | null | {'CWE-79'} | {'https://github.com/craftcms/cms/commit/f9378aa154b5f9b64bed3d59cce0c4a8184bf5e6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32470', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3613---2021-05-04'} | null | {'https://github.com/craftcms/cms/commit/f9378aa154b5f9b64bed3d59cce0c4a8184bf5e6'} | {'https://github.com/craftcms/cms/commit/f9378aa154b5f9b64bed3d59cce0c4a8184bf5e6'} |
Packagist | GHSA-cg3q-59w7-rvc2 | Reliance on Cookies without Validation and Integrity Checking in getgrav/grav | grav is vulnerable to Reliance on Cookies without Validation and Integrity Checking. A cookie with an overly broad path can be accessed through other applications on the same domain. Since cookies often carry sensitive information such as session identifiers, sharing cookies across applications can lead a vulnerability... | {'CVE-2021-3818'} | 2021-09-28T20:32:37Z | 2021-09-29T17:12:51Z | MODERATE | null | {'CWE-565'} | {'https://github.com/getgrav/grav/commit/c51fb1779b83f620c0b6f3548d4a96322b55df07', 'https://github.com/getgrav/grav', 'https://huntr.dev/bounties/c2bc65af-7b93-4020-886e-8cdaeb0a58ea'} | null | {'https://github.com/getgrav/grav/commit/c51fb1779b83f620c0b6f3548d4a96322b55df07'} | {'https://github.com/getgrav/grav/commit/c51fb1779b83f620c0b6f3548d4a96322b55df07'} |
Packagist | GHSA-427q-jp8v-ww95 | Cross-site Scripting in kimai2 | CSRF related to duplicate action. (the duplication occurs first before redirecting to edit form). This vulnerability is capable of tricking admin users to duplicate teams. | {'CVE-2021-3976'} | 2021-11-22T18:43:54Z | 2021-11-23T18:16:50Z | MODERATE | null | {'CWE-352'} | {'https://huntr.dev/bounties/0567048a-118c-42ec-9f94-b55533017406', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3976', 'https://github.com/kevinpapst/kimai2/commit/b28e9c120c87222e21a238f1b03a609d6a5d506e'} | null | {'https://github.com/kevinpapst/kimai2/commit/b28e9c120c87222e21a238f1b03a609d6a5d506e'} | {'https://github.com/kevinpapst/kimai2/commit/b28e9c120c87222e21a238f1b03a609d6a5d506e'} |
Packagist | GHSA-j739-gw6q-f4c7 | HTML Injection in Froxlor | Froxlor through 0.10.22 does not perform validation on user input passed in the customermail GET parameter. The value of this parameter is reflected in the login webpage, allowing the injection of arbitrary HTML tags.
Note: Froxlor version 0.10.22 introduces AntiXSS cross-site scripting protection, but AntiXSS only pr... | {'CVE-2020-29653'} | 2022-04-22T20:41:49Z | 2022-04-14T00:00:19Z | MODERATE | null | {'CWE-79'} | {'https://github.com/Froxlor/Froxlor', 'https://nozero.io/en/cve-2020-29653-froxlor-html-injection-dangling-markup/', 'https://github.com/Froxlor/Froxlor/security/advisories', 'https://github.com/Froxlor/Froxlor/commit/6bf5eccc2477257b6c1760a3c3784ae7e0554ce0', 'https://nvd.nist.gov/vuln/detail/CVE-2020-29653'} | null | {'https://github.com/Froxlor/Froxlor/commit/6bf5eccc2477257b6c1760a3c3784ae7e0554ce0'} | {'https://github.com/Froxlor/Froxlor/commit/6bf5eccc2477257b6c1760a3c3784ae7e0554ce0'} |
Packagist | GHSA-hjhp-hwfj-hwf3 | Cross Site Request Forgery in firefly-iii | firefly-iii is vulnerable to a Cross-Site Request Forgery (CSRF) attack which can disable two factor authentication for the target user. | {'CVE-2021-4005'} | 2021-12-06T21:43:09Z | 2021-12-10T20:20:08Z | MODERATE | null | {'CWE-352'} | {'https://github.com/firefly-iii/firefly-iii', 'https://huntr.dev/bounties/bf4ef581-325a-492d-a710-14fcb53f00ff', 'https://github.com/firefly-iii/firefly-iii/commit/03a1601bf343181df9f405dd2109aec483cb7053', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4005'} | null | {'https://github.com/firefly-iii/firefly-iii/commit/03a1601bf343181df9f405dd2109aec483cb7053'} | {'https://github.com/firefly-iii/firefly-iii/commit/03a1601bf343181df9f405dd2109aec483cb7053'} |
Packagist | GHSA-hq3v-rg6f-6hx4 | Use of Insufficiently Random Values in yiisoft/yii2-dev | yii2 is vulnerable to Use of Predictable Algorithm in Random Number Generator | {'CVE-2021-3689'} | 2021-08-30T20:28:40Z | 2021-09-01T18:35:34Z | HIGH | null | {'CWE-330'} | {'https://github.com/yiisoft/yii2', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3689', 'https://huntr.dev/bounties/50aad1d4-eb00-4573-b8a4-dbe38e2c229f', 'https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46'} | null | {'https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46'} | {'https://github.com/yiisoft/yii2/commit/13f27e4d920a05d53236139e8b07007acd046a46'} |
Packagist | GHSA-8w3x-r6x7-c5r5 | Cross-site Scripting in pimcore | pimcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2021-4084'} | 2021-12-14T14:44:34Z | 2021-12-16T14:28:27Z | MODERATE | null | {'CWE-79'} | {'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/dcb37f19-ba53-4498-b953-d21999279266', 'https://github.com/pimcore/pimcore/commit/3c2a14e676a57e5d77a16255965988eef48f9065', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4084'} | null | {'https://github.com/pimcore/pimcore/commit/3c2a14e676a57e5d77a16255965988eef48f9065'} | {'https://github.com/pimcore/pimcore/commit/3c2a14e676a57e5d77a16255965988eef48f9065'} |
Packagist | GHSA-pgcp-m69h-p2gr | Cross-site Scripting (XSS) in moodle | In Moodle, it was possible to include JavaScript when re-naming content bank items. Versions affected: 3.9 to 3.9.2. This is fixed in moodle 3.9.3 and 3.10. | {'CVE-2020-25702'} | 2021-03-24T23:15:17Z | 2021-03-29T20:43:08Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-25702', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://bugzilla.redhat.com/show_bug.cgi?id=1895437', 'https://github.com/moodle/moodle/commit/66be08216e647532b295a9132070d2435ecd7ad9... | null | {'https://github.com/moodle/moodle/commit/66be08216e647532b295a9132070d2435ecd7ad9'} | {'https://github.com/moodle/moodle/commit/66be08216e647532b295a9132070d2435ecd7ad9'} |
Packagist | GHSA-gmrf-99gw-vvwj | /user/sessions endpoint allows detecting valid accounts | This Security Advisory is about a vulnerability in eZ Platform v1.13, v2.5, and v3.2, and in Ibexa DXP and Ibexa Open Source v3.3. The /user/sessions endpoint can let an attacker detect if a given username or email refers to a valid account. This can be detected through differences in the response data or response time... | null | 2021-03-11T17:41:49Z | 2021-03-11T17:42:08Z | HIGH | null | {'CWE-203'} | {'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-gmrf-99gw-vvwj', 'https://packagist.org/packages/ezsystems/ezpublish-kernel', 'https://github.com/ezsystems/ezpublish-kernel/commit/b496f073c3f03707d3531a6941dc098b84e3cbed'} | null | {'https://github.com/ezsystems/ezpublish-kernel/commit/b496f073c3f03707d3531a6941dc098b84e3cbed'} | {'https://github.com/ezsystems/ezpublish-kernel/commit/b496f073c3f03707d3531a6941dc098b84e3cbed'} |
Packagist | GHSA-r6cm-wg48-rh2r | Exposure of Private Personal Information to an Unauthorized Actor in alextselegidis/easyappointments | The software is a booking management system that has a public form to place bookings, and a private area for the calendar and management of services, users, settings, etc. There is a backend API that allows data manipulation, including listing the appointments for a specific time range. This happens on this endpoint: /... | {'CVE-2022-0482'} | 2022-04-17T17:13:16Z | 2022-03-10T00:00:40Z | CRITICAL | null | {'CWE-863', 'CWE-359'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0482', 'https://huntr.dev/bounties/2fe771ef-b615-45ef-9b4d-625978042e26', 'http://packetstormsecurity.com/files/166701/Easy-Appointments-Information-Disclosure.html', 'https://github.com/alextselegidis/easyappointments/releases/tag/1.4.3', 'https://opencirt.com/hacking/securi... | null | {'https://github.com/alextselegidis/easyappointments/commit/44af526a6fc5e898bc1e0132b2af9eb3a9b2c466'} | {'https://github.com/alextselegidis/easyappointments/commit/44af526a6fc5e898bc1e0132b2af9eb3a9b2c466'} |
Packagist | GHSA-m884-279h-32v2 | Exceptions displayed in non-debug configurations in Symfony | Description
-----------
When `ErrorHandler` renders an exception HTML page, it uses un-escaped properties from the related Exception class to render the stacktrace. The security issue comes from the fact that the stacktraces were also displayed in non-`debug` environments.
Resolution
----------
The `ErrorHandler` cl... | {'CVE-2020-5274'} | 2021-05-12T23:54:24Z | 2020-03-30T20:09:31Z | MODERATE | null | {'CWE-209'} | {'https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad', 'https://github.com/symfony/symfony/security/advisories/GHSA-m884-279h-32v2', 'https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5274'} | null | {'https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad', 'https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db'} | {'https://github.com/symfony/symfony/commit/cf80224589ac05402d4f72f5ddf80900ec94d5ad', 'https://github.com/symfony/symfony/commit/629d21b800a15dc649fb0ae9ed7cd9211e7e45db'} |
Packagist | GHSA-x5r2-hj5c-8jx6 | SSRF in adminer | ### Impact
Users of Adminer versions bundling all drivers (e.g. `adminer.php`) are affected.
### Patches
Patched by ccd2374b, included in version [4.7.9](https://github.com/vrana/adminer/releases/tag/v4.7.9).
### Workarounds
* Use a single driver version (e.g. `adminer-mysql.php`).
* Protect access to Adminer also by... | {'CVE-2021-21311'} | 2021-06-24T19:56:17Z | 2021-02-11T20:42:59Z | HIGH | null | {'CWE-918'} | {'https://github.com/vrana/adminer/commit/ccd2374b0b12bd547417bf0dacdf153826c83351', 'https://packagist.org/packages/vrana/adminer', 'https://sourceforge.net/p/adminer/news/2021/02/adminer-479-released/', 'https://github.com/vrana/adminer/files/5957311/Adminer.SSRF.pdf', 'https://lists.debian.org/debian-lts-announce/20... | null | {'https://github.com/vrana/adminer/commit/ccd2374b0b12bd547417bf0dacdf153826c83351'} | {'https://github.com/vrana/adminer/commit/ccd2374b0b12bd547417bf0dacdf153826c83351'} |
Packagist | GHSA-533p-cp2g-99wp | snipe-it is vulnerable to Cross-Site Request Forgery (CSRF) | snipe-it is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-3931'} | 2021-11-17T21:12:46Z | 2021-11-15T23:19:09Z | MODERATE | null | {'CWE-352'} | {'https://huntr.dev/bounties/03b21d69-3bf5-4b2f-a2cf-872dd677a68f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3931', 'https://github.com/snipe/snipe-it', 'https://github.com/snipe/snipe-it/commit/0d811d067c8e064252c0143c39d6cd4c3133679e'} | null | {'https://github.com/snipe/snipe-it/commit/0d811d067c8e064252c0143c39d6cd4c3133679e'} | {'https://github.com/snipe/snipe-it/commit/0d811d067c8e064252c0143c39d6cd4c3133679e'} |
Packagist | GHSA-xg6r-5gx4-qxjm | invoiceninja is vulnerable to Cross-site Scripting | invoiceninja is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2021-3977'} | 2022-01-05T20:32:32Z | 2022-01-06T21:58:34Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/99c4ed09-b66f-474a-bd74-eeccf9339fde', 'https://github.com/invoiceninja/invoiceninja/commit/1186eaa82375692d01d5ef3369c5b7bc7315b55f', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3977', 'https://github.com/invoiceninja/invoiceninja/releases/tag/v5.3.35', 'https://github.com/invoiceninja/invo... | null | {'https://github.com/invoiceninja/invoiceninja/commit/1186eaa82375692d01d5ef3369c5b7bc7315b55f'} | {'https://github.com/invoiceninja/invoiceninja/commit/1186eaa82375692d01d5ef3369c5b7bc7315b55f'} |
Packagist | GHSA-7xj5-fwqr-5378 | Cross-site Scripting in craftcms/cms | Craft CMS before 3.7.29 allows cross-site scripting. | {'CVE-2022-28378'} | 2022-04-18T22:20:39Z | 2022-04-04T00:00:54Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-28378', 'https://github.com/craftcms/cms', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3729---2022-01-18', 'https://github.com/craftcms/cms/commit/7ca2b2d2ccecfb524525afc8ceac6f6e44f84b88'} | null | {'https://github.com/craftcms/cms/commit/7ca2b2d2ccecfb524525afc8ceac6f6e44f84b88'} | {'https://github.com/craftcms/cms/commit/7ca2b2d2ccecfb524525afc8ceac6f6e44f84b88'} |
Packagist | GHSA-mw75-qvfr-hpmr | Cross-site Scripting in ShowDoc | ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4. | {'CVE-2022-0938'} | 2022-03-23T15:38:52Z | 2022-03-15T00:01:01Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/3eb5a8f9-24e3-4eae-a212-070b2fbc237e', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0938', 'https://github.com/star7th/showdoc/commit/830c89a4c2c5fd0dd491422bf8e97b4eb5713f55'} | null | {'https://github.com/star7th/showdoc/commit/830c89a4c2c5fd0dd491422bf8e97b4eb5713f55'} | {'https://github.com/star7th/showdoc/commit/830c89a4c2c5fd0dd491422bf8e97b4eb5713f55'} |
Packagist | GHSA-3p9j-442x-hjp7 | Business Logic Errors in microweber | microweber prior to 1.2.11 allows multiple uses of a single-use coupon. | {'CVE-2022-0689'} | 2022-02-23T19:27:39Z | 2022-02-20T00:00:31Z | MODERATE | null | null | {'https://github.com/microweber/microweber/commit/c3c25ae6c421bb4a65df9e0035edcc2f75594a04', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0689', 'https://huntr.dev/bounties/fa5dbbd3-97fe-41a9-8797-2e54d9a9c649'} | null | {'https://github.com/microweber/microweber/commit/c3c25ae6c421bb4a65df9e0035edcc2f75594a04'} | {'https://github.com/microweber/microweber/commit/c3c25ae6c421bb4a65df9e0035edcc2f75594a04'} |
Packagist | GHSA-gj26-g5qf-jrh7 | Cross-site Scripting in librenms | Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.1.0. | {'CVE-2022-0589'} | 2022-02-24T13:06:10Z | 2022-02-16T00:01:51Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/d943d95c-076f-441a-ab21-cbf6b15f6768', 'https://github.com/librenms/librenms/commit/4c9d4eefd8064a0285f9718ef38f5617d7f9d6fa', 'https://github.com/librenms/librenms', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms.html', 'https://nvd.nist.gov/vuln/detail/CVE-2022... | null | {'https://github.com/librenms/librenms/commit/4c9d4eefd8064a0285f9718ef38f5617d7f9d6fa'} | {'https://github.com/librenms/librenms/commit/4c9d4eefd8064a0285f9718ef38f5617d7f9d6fa'} |
Packagist | GHSA-5fxv-xx5p-g2fv | Integer Overflow in microweber | Microweber is a new generation CMS with drag and drop. The microweber application allows large characters to insert in the input field "first & last name" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The first name & last name input should be limited to 50 characters or max 1... | {'CVE-2022-0968'} | 2022-03-25T17:13:37Z | 2022-03-16T00:00:46Z | HIGH | null | {'CWE-190'} | {'https://huntr.dev/bounties/97e36678-11cf-42c6-889c-892d415d9f9e', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0968', 'https://github.com/microweber/microweber/commit/80e39084729a57dfe749626c3b9d35247a14c49e'} | null | {'https://github.com/microweber/microweber/commit/80e39084729a57dfe749626c3b9d35247a14c49e'} | {'https://github.com/microweber/microweber/commit/80e39084729a57dfe749626c3b9d35247a14c49e'} |
Packagist | GHSA-96v6-hrwg-p378 | Weak Password Requirements in Daybyday CRM | In Daybyday CRM, versions 1.1 through 2.2.0 enforce weak password requirements in the user update functionality. A user with privileges to update his password could change it to a weak password, such as those with a length of a single character. This may allow an attacker to brute-force users’ passwords with minimal to... | {'CVE-2022-22110'} | 2022-01-24T22:07:06Z | 2022-01-08T00:31:51Z | HIGH | null | {'CWE-521'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-22110', 'https://www.whitesourcesoftware.com/vulnerability-database/CVE-2022-22110', 'https://github.com/Bottelet/DaybydayCRM/', 'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b'} | null | {'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b'} | {'https://github.com/Bottelet/DaybydayCRM/commit/a0392f4a4a14e1e3fedaf6817aefce69b6bd661b'} |
Packagist | GHSA-2cqg-q7jm-j35c | snipe-it is vulnerable to Cross-site Scripting | snipe-it is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | {'CVE-2021-3938'} | 2021-11-17T21:13:25Z | 2021-11-15T23:19:42Z | LOW | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3938', 'https://github.com/snipe/snipe-it/commit/9ed1442bd124710f4178992cc4eca5236c7396b9', 'https://huntr.dev/bounties/198a0d67-9189-4170-809b-0f8aea43b063', 'https://github.com/snipe/snipe-it'} | null | {'https://github.com/snipe/snipe-it/commit/9ed1442bd124710f4178992cc4eca5236c7396b9'} | {'https://github.com/snipe/snipe-it/commit/9ed1442bd124710f4178992cc4eca5236c7396b9'} |
Packagist | GHSA-m2jh-fxw4-gphm | HTTP Host Header Injection | ### Meta
* CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N/E:F/RL:O/RC:C` (3.5)
### Problem
It has been discovered that TYPO3 CMS is susceptible to host spoofing due to improper validation of the HTTP _Host_ header. TYPO3 uses the HTTP _Host_ header, for example, to generate absolute URLs during the frontend rende... | {'CVE-2021-41114'} | 2021-10-05T18:47:01Z | 2021-10-05T20:23:35Z | MODERATE | null | {'CWE-20', 'CWE-644'} | {'https://github.com/TYPO3/typo3/security/advisories/GHSA-m2jh-fxw4-gphm', 'https://github.com/TYPO3/typo3/commit/5cbff85506cebe343e5ae59228977547cf8e3cf4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41114', 'https://typo3.org/security/advisory/typo3-core-sa-2021-015', 'https://nvd.nist.gov/vuln/detail/CVE-2014-3941', ... | null | {'https://github.com/TYPO3/typo3/commit/5cbff85506cebe343e5ae59228977547cf8e3cf4'} | {'https://github.com/TYPO3/typo3/commit/5cbff85506cebe343e5ae59228977547cf8e3cf4'} |
Packagist | GHSA-3374-7h99-xr85 | Cross-site scripting in forkcms | Fork CMS Content Management System v5.8.0 was discovered to contain a cross-site scripting (XSS) vulnerability in the `Displayname` field when using the `Add`, `Edit` or `Register' functions. This vulnerability allows attackers to execute arbitrary web scripts or HTML. | {'CVE-2020-23049'} | 2021-10-29T13:52:23Z | 2021-10-25T19:43:05Z | MODERATE | null | {'CWE-79'} | {'https://www.vulnerability-lab.com/get_content.php?id=2208', 'https://nvd.nist.gov/vuln/detail/CVE-2020-23049', 'https://github.com/forkcms/forkcms', 'https://github.com/forkcms/forkcms/commit/6ec6171206a7507a39695edc8bbd1b97ef1041c6'} | null | {'https://github.com/forkcms/forkcms/commit/6ec6171206a7507a39695edc8bbd1b97ef1041c6'} | {'https://github.com/forkcms/forkcms/commit/6ec6171206a7507a39695edc8bbd1b97ef1041c6'} |
Packagist | GHSA-x68c-4gmm-5g43 | kimai2 is vulnerable to Cross-site Scripting | kimai2 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | {'CVE-2021-3985'} | 2021-12-03T15:19:53Z | 2021-12-03T20:40:38Z | HIGH | null | {'CWE-79'} | {'https://huntr.dev/bounties/89d6c3de-efbd-4354-8cc8-46e999e4c5a4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3985', 'https://github.com/kevinpapst/kimai2', 'https://github.com/kevinpapst/kimai2/commit/76e09447c85e762882126b49626a4fe4d93fe8b5', 'https://github.com/kevinpapst/kimai2/releases/tag/1.16.3'} | null | {'https://github.com/kevinpapst/kimai2/commit/76e09447c85e762882126b49626a4fe4d93fe8b5'} | {'https://github.com/kevinpapst/kimai2/commit/76e09447c85e762882126b49626a4fe4d93fe8b5'} |
Packagist | GHSA-h7vq-5qgw-jwwq | CSV Injection Vulnerability | ### Impact
In some circumstances, it was possible to export data in CSV format that could trigger a payload in old versions of Excel.
If you are accepting user input from untrusted sources and will be exporting that data in CSV format from element index pages and there is a chance users will open that on old versions ... | {'CVE-2021-41824'} | 2021-10-18T19:11:00Z | 2021-10-18T19:04:16Z | HIGH | null | {'CWE-1236'} | {'https://github.com/craftcms/cms', 'https://github.com/craftcms/cms/blob/develop/CHANGELOG.md#3714---2021-09-28', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41824', 'https://github.com/craftcms/cms/security/advisories/GHSA-h7vq-5qgw-jwwq', 'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b... | null | {'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2'} | {'https://github.com/craftcms/cms/commit/c9cb2225f1b908fb1e8401d401219228634b26b2'} |
Packagist | GHSA-cpq8-x35g-m439 | Cross-site Scripting in yourls | yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in arbitrary path handling. | {'CVE-2021-3783'} | 2021-09-16T18:19:29Z | 2021-09-20T20:43:15Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/b688e553-d0d9-4ddf-95a3-ff4b78004984', 'https://github.com/yourls/yourls/commit/94f6bab91182142c96ff11f481585b445449efd4', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3783', 'https://github.com/yourls/yourls'} | null | {'https://github.com/yourls/yourls/commit/94f6bab91182142c96ff11f481585b445449efd4'} | {'https://github.com/yourls/yourls/commit/94f6bab91182142c96ff11f481585b445449efd4'} |
Packagist | GHSA-w4pj-7p68-3vgv | Stored XSS in October | ### Impact
A user with access to a markdown FormWidget that stores data persistently could create a stored XSS attack against themselves and any other users with access to the generated HTML from the field.
### Patches
Issue has been patched in Build 466 (v1.0.466) & RainLab.Blog v1.4.1 by restricting the ability to s... | {'CVE-2020-11083'} | 2021-03-04T18:26:22Z | 2020-08-05T14:52:44Z | LOW | null | {'CWE-79'} | {'https://github.com/octobercms/october/security/advisories/GHSA-w4pj-7p68-3vgv', 'https://nvd.nist.gov/vuln/detail/CVE-2020-11083', 'https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94', 'https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746', 'http://... | null | {'https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746', 'https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94'} | {'https://github.com/rainlab/blog-plugin/commit/6ae19a6e16ef3ba730692bc899851342c858bb94', 'https://github.com/octobercms/october/commit/9ecfb4867baae14a0d3f99f5b5c1e8a979ae8746'} |
Packagist | GHSA-7vmw-7x57-q6jw | Cross-site scripting | Shopware is an open source eCommerce platform. Versions prior to 5.6.10 suffer from an authenticated stored XSS in administration vulnerability. Users are recommend to update to the version 5.6.10. You can get the update to 5.6.10 regularly via the Auto-Updater or directly via the download overview. | {'CVE-2021-32713'} | 2021-06-25T15:33:55Z | 2021-09-08T18:00:00Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32713', 'https://docs.shopware.com/en/shopware-5-en/security-updates/security-update-05-2021', 'https://github.com/shopware/shopware/commit/a0850ffbc6f581a8eb8425cc2bf77a0715e21e12', 'https://github.com/shopware/shopware/security/advisories/GHSA-f6p7-8xfw-fjqq'} | null | {'https://github.com/shopware/shopware/commit/a0850ffbc6f581a8eb8425cc2bf77a0715e21e12'} | {'https://github.com/shopware/shopware/commit/a0850ffbc6f581a8eb8425cc2bf77a0715e21e12'} |
Packagist | GHSA-m553-9wmx-533h | Cross-site scripting in Dolibarr | In htdocs/societe/card.php in Dolibarr 10.0.1, the value of the User-Agent HTTP header is copied into the HTML document as plain text between tags, leading to XSS. | {'CVE-2019-16197'} | 2021-08-18T19:24:26Z | 2019-11-08T20:05:31Z | MODERATE | null | {'CWE-79'} | {'http://packetstormsecurity.com/files/154481/Dolibarr-ERP-CRM-10.0.1-Cross-Site-Scripting.html', 'https://nvd.nist.gov/vuln/detail/CVE-2019-16197', 'https://github.com/Dolibarr/dolibarr/commit/c53be23122fc6e7c3c8d65ee8ba979c566380964'} | null | {'https://github.com/Dolibarr/dolibarr/commit/c53be23122fc6e7c3c8d65ee8ba979c566380964'} | {'https://github.com/Dolibarr/dolibarr/commit/c53be23122fc6e7c3c8d65ee8ba979c566380964'} |
Packagist | GHSA-2v2v-fx7r-f2fh | pimcore is vulnerable to Cross-Site Request Forgery (CSRF) | pimcore is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-4082'} | 2021-12-14T14:45:36Z | 2021-12-16T14:28:10Z | MODERATE | null | {'CWE-352'} | {'https://huntr.dev/bounties/81838575-e170-41fb-b451-92c1c8aab092', 'https://github.com/pimcore/pimcore', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4082', 'https://github.com/pimcore/pimcore/commit/3088cec7dc3cbc5a8b26f1269e398e799ee7ee28'} | null | {'https://github.com/pimcore/pimcore/commit/3088cec7dc3cbc5a8b26f1269e398e799ee7ee28'} | {'https://github.com/pimcore/pimcore/commit/3088cec7dc3cbc5a8b26f1269e398e799ee7ee28'} |
Packagist | GHSA-xgx2-332h-9x6q | SQL Injection in Yeswiki | An SQL Injection vlnerability exits in Yeswiki doryphore 20211012 via the email parameter in the registration form. The issue was fixed in Yeswiki version 4.1.0. | {'CVE-2021-43091'} | 2022-03-30T15:24:00Z | 2022-03-26T00:00:32Z | HIGH | null | {'CWE-89'} | {'https://github.com/yeswiki/yeswiki', 'https://github.com/yeswiki/yeswiki/commit/c9785f9a92744c3475f9676a0d8f95de24750094', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43091', 'https://huntr.dev/bounties/07f245a7-ee9f-4b55-a0cc-13d5cb1be6e0/'} | null | {'https://github.com/yeswiki/yeswiki/commit/c9785f9a92744c3475f9676a0d8f95de24750094'} | {'https://github.com/yeswiki/yeswiki/commit/c9785f9a92744c3475f9676a0d8f95de24750094'} |
Packagist | GHSA-67c7-5v9j-227r | Cross-site Scripting in kimai2 | kimai2 is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). | {'CVE-2021-3983'} | 2021-12-03T15:16:39Z | 2021-12-03T20:43:06Z | MODERATE | null | {'CWE-79'} | {'https://github.com/kevinpapst/kimai2/commit/89bfa82c61da0d3639e4038e689e25467baac8a0', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3983', 'https://github.com/kevinpapst/kimai2', 'https://huntr.dev/bounties/c96f3480-dccf-4cc2-99a4-d2b3a7462413', 'https://github.com/kevinpapst/kimai2/releases/tag/1.16.3'} | null | {'https://github.com/kevinpapst/kimai2/commit/89bfa82c61da0d3639e4038e689e25467baac8a0'} | {'https://github.com/kevinpapst/kimai2/commit/89bfa82c61da0d3639e4038e689e25467baac8a0'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.