ecosystem
stringclasses
11 values
vuln_id
stringlengths
10
19
summary
stringlengths
4
220
details
stringlengths
34
13.5k
aliases
stringlengths
17
87
modified_date
stringdate
2019-03-26 14:13:00
2022-05-10 08:46:52
published_date
stringdate
2012-06-17 03:41:00
2022-05-10 08:46:50
severity
stringclasses
5 values
score
float64
0
10
cwe_id
stringclasses
581 values
refs
stringlengths
82
11.6k
introduced
stringclasses
843 values
code_refs
stringlengths
46
940
commits
stringlengths
46
940
Packagist
GHSA-vx6j-pjrh-vgjh
PHP file inclusion in the Sulu admin panel
### Impact _What kind of vulnerability is it? Who is impacted?_ An attacker can read arbitrary local files via a PHP file include. In a default configuration this also leads to remote code execution. * Compromised components: Arbitrary file read on the server, (Potential) Remote code execution * Exploitation pre-requ...
{'CVE-2021-43836'}
2021-12-15T22:27:31Z
2021-12-15T22:54:20Z
HIGH
null
{'CWE-22'}
{'https://github.com/sulu/sulu/commit/9c948f9ce350c68b53af8c3910e2cefc7f722b54', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43836', 'https://github.com/sulu/sulu/security/advisories/GHSA-vx6j-pjrh-vgjh', 'https://github.com/sulu/sulu'}
null
{'https://github.com/sulu/sulu/commit/9c948f9ce350c68b53af8c3910e2cefc7f722b54'}
{'https://github.com/sulu/sulu/commit/9c948f9ce350c68b53af8c3910e2cefc7f722b54'}
Packagist
GHSA-rqgp-ccph-5w65
Cross-Site Request Forgery in firefly-iii
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3901'}
2021-11-02T18:42:29Z
2021-10-28T23:14:14Z
LOW
null
{'CWE-352'}
{'https://github.com/firefly-iii/firefly-iii/commit/b42d8d1e305cad70d9b83b33cd8e0d7a4b2060c2', 'https://huntr.dev/bounties/62508fdc-c26b-4312-bf75-fd3a3f997464', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3901', 'https://github.com/firefly-iii/firefly-iii'}
null
{'https://github.com/firefly-iii/firefly-iii/commit/b42d8d1e305cad70d9b83b33cd8e0d7a4b2060c2'}
{'https://github.com/firefly-iii/firefly-iii/commit/b42d8d1e305cad70d9b83b33cd8e0d7a4b2060c2'}
Packagist
GHSA-93pj-4p65-qmr9
Insufficient user authorization in Moodle
A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. Insufficient capability checks could lead to users accessing their grade report for courses where they did not have the required gradereport/user:view capability.
{'CVE-2022-0334'}
2022-02-02T16:13:31Z
2022-01-28T22:07:40Z
MODERATE
null
{'CWE-668', 'CWE-863'}
{'https://bugzilla.redhat.com/show_bug.cgi?id=2043664', 'https://github.com/moodle/moodle/commit/6d18f136ae88ec97e351a723df570816a959ec68', 'https://github.com/moodle/moodle/commit/1964d68f8500ea3c7b776fa8a2af6266ed109f84', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0334', 'https://moodle.org/mod/forum/discuss.php?d=43...
null
{'https://github.com/moodle/moodle/commit/1964d68f8500ea3c7b776fa8a2af6266ed109f84', 'https://github.com/moodle/moodle/commit/6d18f136ae88ec97e351a723df570816a959ec68'}
{'https://github.com/moodle/moodle/commit/6d18f136ae88ec97e351a723df570816a959ec68', 'https://github.com/moodle/moodle/commit/1964d68f8500ea3c7b776fa8a2af6266ed109f84'}
Packagist
GHSA-55mm-5399-7r63
Reliance on Cookies without validation in OctoberCMS
### Impact Previously encrypted cookie values were not tied to the name of the cookie the value belonged to. This meant that certain classes of attacks that took advantage of other theoretical vulnerabilities in user facing code (nothing exploitable in the core project itself) had a higher chance of succeeding. Speci...
{'CVE-2020-15128'}
2021-03-04T18:25:42Z
2020-08-05T14:52:54Z
MODERATE
null
{'CWE-565', 'CWE-327'}
{'https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c', 'https://github.com/octobercms/library/pull/508', 'https://github.com/octobercms/october/security/advisories/GHSA-55mm-5399-7r63', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15128'}
null
{'https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c'}
{'https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c'}
Packagist
GHSA-6x98-fx9j-7c78
Disabled users able to log in with third party SSO plugin
### Impact Mautic versions 2.0.0 - 2.11.0 with a SSO plugin installed could allow a disabled user to still login using email address ### Patches Upgrade to 2.12.0 or later. ### Workarounds None. ### For more information If you have any questions or comments about this advisory: * Email us at [security@mautic.org](ma...
{'CVE-2017-1000489'}
2021-01-19T21:13:44Z
2021-01-19T21:16:19Z
MODERATE
null
{'CWE-287'}
{'https://github.com/mautic/mautic/commit/fd933cbef795b04cabdc50527cb18e037488fef9', 'https://github.com/mautic/mautic/releases/tag/2.12.0', 'https://github.com/mautic/mautic/security/advisories/GHSA-6x98-fx9j-7c78', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000489'}
null
{'https://github.com/mautic/mautic/commit/fd933cbef795b04cabdc50527cb18e037488fef9'}
{'https://github.com/mautic/mautic/commit/fd933cbef795b04cabdc50527cb18e037488fef9'}
Packagist
GHSA-wg8p-w946-c482
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload.
{'CVE-2022-0956'}
2022-03-29T16:42:37Z
2022-03-16T00:00:47Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/5b0e3f02-309f-4b59-8020-d7ac0f1999f2', 'https://github.com/star7th/showdoc/commit/56e450c3adf75c707500d7231a78c9fc894c7f13', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0956', 'https://github.com/star7th/showdoc'}
null
{'https://github.com/star7th/showdoc/commit/56e450c3adf75c707500d7231a78c9fc894c7f13'}
{'https://github.com/star7th/showdoc/commit/56e450c3adf75c707500d7231a78c9fc894c7f13'}
Packagist
GHSA-hj8g-cw8x-2c6m
Cross-site Scripting in Microweber
Microweber prior to version 1.3 is vulnerable to reflected cross-site scripting.
{'CVE-2022-0719'}
2022-02-24T21:51:08Z
2022-02-24T00:00:53Z
HIGH
null
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/a5925f74d39775771d4c37c8d4c1acbb762fda0a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0719', 'https://huntr.dev/bounties/bcdce15b-7f40-4971-a061-c25c6053c312', 'https://github.com/microweber/microweber'}
null
{'https://github.com/microweber/microweber/commit/a5925f74d39775771d4c37c8d4c1acbb762fda0a'}
{'https://github.com/microweber/microweber/commit/a5925f74d39775771d4c37c8d4c1acbb762fda0a'}
Packagist
GHSA-c9hq-g4q8-w893
Privilage Escalation in moodle
If the upload course tool in Moodle was used to delete an enrollment method which did not exist or was not already enabled, the tool would erroneously enable that enrollment method. This could lead to unintended users gaining access to the course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5....
{'CVE-2020-25701'}
2021-03-24T23:17:02Z
2021-03-29T20:42:55Z
MODERATE
null
{'CWE-863'}
{'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25701', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://moodle.org/mod/forum/discuss.php?d=413939',...
null
{'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5'}
{'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5'}
Packagist
GHSA-mjvc-j6rv-9xj8
Insertion of Sensitive Information Into Debugging Code in Microweber
Microweber prior to 1.3 may expose sensitive information about a server and a user when running the server in debug mode.
{'CVE-2022-0721'}
2022-02-24T21:47:33Z
2022-02-24T00:00:54Z
HIGH
null
{'CWE-215'}
{'https://github.com/microweber/microweber/commit/b12e1a490c79460bff019f34b2e17112249b16ec', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0721', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/ae267d39-9750-4c69-be8b-4f915da089fb'}
null
{'https://github.com/microweber/microweber/commit/b12e1a490c79460bff019f34b2e17112249b16ec'}
{'https://github.com/microweber/microweber/commit/b12e1a490c79460bff019f34b2e17112249b16ec'}
Packagist
GHSA-32m2-9f76-4gv8
Business Logic Errors in SilverStripe Framework
SilverStripe Framework prior to version 4.10.1 is vulnerable to business logic errors.
{'CVE-2022-0227'}
2022-02-11T20:51:39Z
2022-02-06T00:01:01Z
MODERATE
null
null
{'https://github.com/silverstripe/silverstripe-framework', 'https://github.com/silverstripe/silverstripe-framework/commit/cbf2987a616e9ef4d7eccae5d763ef2179bdbcc2', 'https://huntr.dev/bounties/35631e3a-f4b9-41ad-857c-7e3021932a72', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0227'}
null
{'https://github.com/silverstripe/silverstripe-framework/commit/cbf2987a616e9ef4d7eccae5d763ef2179bdbcc2'}
{'https://github.com/silverstripe/silverstripe-framework/commit/cbf2987a616e9ef4d7eccae5d763ef2179bdbcc2'}
Packagist
GHSA-8wf2-3ggj-78q9
Improper Authentication in phpmyadmin
An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances.
{'CVE-2022-23807'}
2022-01-28T22:31:16Z
2022-01-28T22:44:40Z
MODERATE
null
{'CWE-287'}
{'https://github.com/phpmyadmin/phpmyadmin', 'https://github.com/phpmyadmin/phpmyadmin/commit/ca54f1db050859eb8555875c6aa5d7796fdf4b32', 'https://www.phpmyadmin.net/security/PMASA-2022-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23807'}
null
{'https://github.com/phpmyadmin/phpmyadmin/commit/ca54f1db050859eb8555875c6aa5d7796fdf4b32'}
{'https://github.com/phpmyadmin/phpmyadmin/commit/ca54f1db050859eb8555875c6aa5d7796fdf4b32'}
Packagist
GHSA-4xww-6h7v-29jg
User enumeration in livehelperchat
livehelperchat is vulnerable to Generation of Error Message Containing Sensitive Information. There is an observable discrepancy between errors generated for users that exist and those that do not.
{'CVE-2022-0083'}
2022-01-12T19:34:13Z
2022-01-21T23:37:07Z
MODERATE
null
{'CWE-209'}
{'https://huntr.dev/bounties/4c477440-3b03-42eb-a6e2-a31b55090736', 'https://github.com/livehelperchat/livehelperchat', 'https://github.com/livehelperchat/livehelperchat/commit/fbed8728be59040a7218610e72f6eceb5f8bc152', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0083'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/fbed8728be59040a7218610e72f6eceb5f8bc152'}
{'https://github.com/livehelperchat/livehelperchat/commit/fbed8728be59040a7218610e72f6eceb5f8bc152'}
Packagist
GHSA-728c-42pc-fwxg
Unrestricted Upload of File with Dangerous Type in Crater
Unrestricted Upload of File with Dangerous Type in GitHub repository crater-invoice/crater prior to 6.0.
{'CVE-2022-0242'}
2022-01-19T14:08:43Z
2022-01-21T23:54:50Z
HIGH
null
{'CWE-434'}
{'https://github.com/crater-invoice/crater/commit/dcb3ddecb9f4cde622cc42c51a2760747797624f', 'https://github.com/crater-invoice/crater', 'https://huntr.dev/bounties/19f3e5f7-b419-44b1-9c37-7e4404cbec94', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0242'}
null
{'https://github.com/crater-invoice/crater/commit/dcb3ddecb9f4cde622cc42c51a2760747797624f'}
{'https://github.com/crater-invoice/crater/commit/dcb3ddecb9f4cde622cc42c51a2760747797624f'}
Packagist
GHSA-gf2c-93hm-r9j5
Cross-site Scripting in kimai2
kimai2 is vulnerable to Cross-Site Request Forgery (CSRF) in deleting invoice templates. This vulnerability is capable of tricking admin user to delete invoice templates.
{'CVE-2021-3963'}
2021-11-22T18:42:37Z
2021-11-23T18:16:43Z
MODERATE
null
{'CWE-352'}
{'https://github.com/kevinpapst/kimai2/commit/95796ab2560ad93f44068a88f0fad758c2053514', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3963', 'https://huntr.dev/bounties/3abf308b-7dbd-4864-b1a9-5c45b876def8'}
null
{'https://github.com/kevinpapst/kimai2/commit/95796ab2560ad93f44068a88f0fad758c2053514'}
{'https://github.com/kevinpapst/kimai2/commit/95796ab2560ad93f44068a88f0fad758c2053514'}
Packagist
GHSA-h76r-vgf3-j6w5
Auth bypass and account takeover in October CMS
### Impact An attacker can exploit this vulnerability to bypass authentication using a specially crafted persist cookie. - To exploit this vulnerability, an attacker must obtain a Laravel’s secret key for cookie encryption and signing. - Due to the logic of how this mechanism works, a targeted user account must be lo...
{'CVE-2021-29487'}
2022-01-20T15:39:14Z
2021-08-30T16:13:50Z
HIGH
null
{'CWE-287'}
{'https://github.com/octobercms/october/security/advisories/GHSA-h76r-vgf3-j6w5', 'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/october', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374', 'https://nvd.nist.g...
null
{'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'}
{'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'}
Packagist
GHSA-x7cr-6qr6-2hh6
Missing input validation can lead to command execution in composer
The Composer method `VcsDriver::getFileContent()` with user-controlled `$file` or `$identifier` arguments is susceptible to an argument injection vulnerability. It can be leveraged to gain arbitrary command execution if the Mercurial or the Git driver are used. This led to a vulnerability on Packagist.org and Private ...
{'CVE-2022-24828'}
2022-04-22T20:15:38Z
2022-04-22T20:15:38Z
HIGH
null
{'CWE-94', 'CWE-20'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QD7JQWL6C4GVROO25DTXWYWM6BPOPPCG/', 'https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709', 'https://www.tenable.com/security/tns-2022-09', 'https://lists.fedoraproject.org/archives/list/pack...
null
{'https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709'}
{'https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709'}
Packagist
GHSA-xp82-jmw8-mjxp
Unrestricted Upload of File with Dangerous Type in ShowDoc
There is a Unrestricted Upload of File vulnerability in ShowDoc prior to version 2.10.4.
{'CVE-2022-1034'}
2022-03-30T19:58:48Z
2022-03-23T00:00:23Z
HIGH
null
{'CWE-434'}
{'https://github.com/star7th/showdoc/commit/bd792a89c0325836fbd64784f4c4117c0171416b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1034', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/d205c489-3266-4ac4-acb7-c8ee570887f7'}
null
{'https://github.com/star7th/showdoc/commit/bd792a89c0325836fbd64784f4c4117c0171416b'}
{'https://github.com/star7th/showdoc/commit/bd792a89c0325836fbd64784f4c4117c0171416b'}
Packagist
GHSA-24m3-w8g9-jwpq
Information disclosure of source code in SimpleSAMLphp
### Background The module controller in `SimpleSAML\Module` that processes requests for pages hosted by modules, has code to identify paths ending with `.php` and process those as PHP code. If no other suitable way of handling the given path exists it presents the file to the browser. ### Description The check to id...
{'CVE-2020-5301'}
2021-10-20T22:23:05Z
2020-04-22T20:59:44Z
LOW
null
{'CWE-178', 'CWE-200'}
{'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-24m3-w8g9-jwpq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5301', 'https://github.com/simplesamlphp/simplesamlphp/', 'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e'}
null
{'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e'}
{'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e'}
Packagist
GHSA-xc47-3rch-cv57
Improper Access Control in snipe-it
Users with no system permissions are able to see and create personal access tokens
{'CVE-2022-0178'}
2022-01-26T20:23:15Z
2022-01-26T20:24:23Z
MODERATE
null
{'CWE-284'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0178', 'https://huntr.dev/bounties/81c6b974-d0b3-410b-a902-8324a55b1368', 'https://github.com/snipe/snipe-it', 'https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0'}
null
{'https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0'}
{'https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0'}
Packagist
GHSA-7733-hjv6-4h47
Cross-Site Scripting in ternary conditional operator
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C`(5.0) > * CWE-79 --- :information_source:  This vulnerability has been fixed in May 2019 already, CVE and GHSA were assigned later in October 2020 --- ### Problem It has been discovered that the Fluid Engine (package `typo3fluid/f...
{'CVE-2020-15241'}
2021-11-19T15:11:11Z
2020-10-08T19:55:53Z
MODERATE
null
{'CWE-79', 'CWE-601'}
{'https://github.com/TYPO3/Fluid', 'https://github.com/TYPO3/Fluid/security/advisories/GHSA-7733-hjv6-4h47', 'https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d', 'https://typo3.org/security/advisory/typo3-core-sa-2019-013', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15241'}
null
{'https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d'}
{'https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d'}
Packagist
GHSA-q2cv-94xm-qvg4
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3921'}
2021-11-17T21:12:31Z
2021-11-15T23:18:00Z
MODERATE
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3921', 'https://huntr.dev/bounties/724d3fd5-9f04-45c4-98d6-35a7d15468f5', 'https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684', 'https://github.com/firefly-iii/firefly-iii'}
null
{'https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684'}
{'https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684'}
Packagist
GHSA-m9fq-c9hp-59g7
Cross-site Scripting in yourls
yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in edit dialog.
{'CVE-2021-3785'}
2021-09-24T13:08:49Z
2021-09-20T20:42:52Z
MODERATE
null
{'CWE-79'}
{'https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3785', 'https://huntr.dev/bounties/b4085d13-54fa-4419-a2ce-1d780cc31638', 'https://github.com/yourls/yourls'}
null
{'https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff'}
{'https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff'}
Packagist
GHSA-xw7v-qrhc-jjg2
Access Control vulnerability in Dolibarr
An Access Control vulnerability exists in Dolibarr ERP/CRM 13.0.2, fixed version is 14.0.1, in the forgot-password function becuase the application allows email addresses as usernames, which can cause a Denial of Service.
{'CVE-2021-37517'}
2022-04-18T22:21:50Z
2022-04-01T00:00:41Z
HIGH
null
{'CWE-863'}
{'https://github.com/Dolibarr/dolibarr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37517', 'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c', 'https://github.com/Dolibarr/dolibarr/releases/tag/14.0.1'}
null
{'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c'}
{'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c'}
Packagist
GHSA-6vfw-74wr-3chh
Cross-site Scripting in Crater Invoice
Crater invoice prior to version 6.0.0 has a cross-site scripting vulnerability.
{'CVE-2022-0372'}
2022-02-03T21:01:10Z
2022-01-28T00:03:42Z
MODERATE
null
{'CWE-79'}
{'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0372', 'https://huntr.dev/bounties/563232b9-5a93-4f4d-8389-ed805b262ef1', 'https://github.com/crater-invoice/crater', 'https://github.com/crater-invoice/crater/pull/681'}
null
{'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d'}
{'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d'}
Packagist
GHSA-v94v-pxqp-5qgj
Cross-site Scripting in ShowDoc
The upload feature of ShowDoc prior to version 2.10.4 allows files with the extension `.*html`, which leads to stored cross-site scripting.
{'CVE-2022-0950'}
2022-03-28T19:27:08Z
2022-03-16T00:00:48Z
MODERATE
null
{'CWE-79', 'CWE-434'}
{'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0950', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/acc23996-bd57-448f-9eb4-05a8a046c2dc'}
null
{'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3'}
{'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3'}
Packagist
GHSA-j8cx-j9j2-f29w
Insecure Storage of Sensitive Information in Microweber
Microweber prior to version 1.3 does not strip images of EXIF data, exposing information about users' locations, device hardware, and device software.
{'CVE-2022-0724'}
2022-02-24T22:27:40Z
2022-02-24T00:00:53Z
HIGH
null
{'CWE-922'}
{'https://huntr.dev/bounties/0cdc4a29-dada-4264-b326-8b65b4f11062', 'https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0724'}
null
{'https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3'}
{'https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3'}
Packagist
GHSA-q7rv-6hp3-vh96
Improper Input Validation in guzzlehttp/psr7
### Impact In proper header parsing. An attacker could sneak in a new line character and pass untrusted values. ### Patches The issue is patched in 1.8.4 and 2.1.1 ### Workarounds There are no known workarounds.
{'CVE-2022-24775'}
2022-03-25T19:26:33Z
2022-03-25T19:26:33Z
HIGH
null
{'CWE-20'}
{'https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24775', 'https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1', 'https://www.drupal.org/sa-core-2022-006', 'https://github.com/guzzle/psr7', 'https://github.com/guzzl...
null
{'https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1', 'https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc'}
{'https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1', 'https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc'}
Packagist
GHSA-wjfq-88q2-r34j
Unhandled exception when decoding form response JSON
### Impact When handling form responses from the client (`ModalFormResponsePacket`), the Minecraft Windows client may send weird JSON that `json_decode()` can't understand. A workaround for this is implemented in `InGamePacketHandler::stupid_json_decode()`. An `InvalidArgumentException` is thrown by this function when...
null
2022-01-21T21:16:09Z
2022-01-21T23:02:14Z
HIGH
null
null
{'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-wjfq-88q2-r34j', 'https://github.com/pmmp/PocketMine-MP/blob/4.0.7/changelogs/4.0.md#407', 'https://github.com/pmmp/PocketMine-MP/commit/56fe71d939c38fe14e18a31a673a9331bcc0e4ca'}
null
{'https://github.com/pmmp/PocketMine-MP/commit/56fe71d939c38fe14e18a31a673a9331bcc0e4ca'}
{'https://github.com/pmmp/PocketMine-MP/commit/56fe71d939c38fe14e18a31a673a9331bcc0e4ca'}
Packagist
GHSA-q3j3-w37x-hq2q
Webcache Poisoning in symfony/http-kernel
Description ----------- When a Symfony application is running behind a proxy or a load-balancer, you can tell Symfony to look for the `X-Forwarded-*` HTTP headers. HTTP headers that are not part of the "trusted_headers" allowed list are ignored and protect you from "Cache poisoning" attacks. In Symfony 5.2, we've ad...
{'CVE-2021-41267'}
2021-11-25T00:18:27Z
2021-11-24T20:04:25Z
MODERATE
null
{'CWE-444'}
{'https://github.com/symfony/symfony/security/advisories/GHSA-q3j3-w37x-hq2q', 'https://github.com/symfony/symfony/pull/44243', 'https://github.com/symfony/symfony/releases/tag/v5.3.12', 'https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4126...
null
{'https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487'}
{'https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487'}
Packagist
GHSA-cx2r-mf6x-55rx
Stored XSS with custom URLs in PrestaShop module ps_linklist
### Impact Stored XSS when using custom URLs. ### Patches The problem is fixed in 3.1.0 ### References [Cross-site Scripting (XSS) - Stored (CWE-79)](https://cwe.mitre.org/data/definitions/79.html)
{'CVE-2020-5273'}
2021-10-08T22:31:21Z
2021-10-12T16:01:36Z
MODERATE
null
{'CWE-79'}
{'https://github.com/PrestaShop/ps_linklist/commit/83e6e0bdda2287f4d6e64127cb90c41d26b5ad82', 'https://github.com/PrestaShop/ps_linklist/security/advisories/GHSA-cx2r-mf6x-55rx', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5273', 'https://github.com/PrestaShop/ps_linklist'}
null
{'https://github.com/PrestaShop/ps_linklist/commit/83e6e0bdda2287f4d6e64127cb90c41d26b5ad82'}
{'https://github.com/PrestaShop/ps_linklist/commit/83e6e0bdda2287f4d6e64127cb90c41d26b5ad82'}
Packagist
GHSA-pm3v-qxf6-fgxv
Cross-site Scripting in pimcore
Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.2.9.
{'CVE-2022-0285'}
2022-01-27T18:32:20Z
2022-01-21T18:08:43Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0285', 'https://github.com/pimcore/pimcore/commit/b432225952e2a5ab0268f401b85a14480369b835', 'https://huntr.dev/bounties/321918b2-aa01-410e-9f7c-dca5f286bc9c', 'https://github.com/pimcore/pimcore'}
null
{'https://github.com/pimcore/pimcore/commit/b432225952e2a5ab0268f401b85a14480369b835'}
{'https://github.com/pimcore/pimcore/commit/b432225952e2a5ab0268f401b85a14480369b835'}
Packagist
GHSA-8vq6-5f66-hp3r
Logic error in dolibarr/dolibarr
In dolibarr/dolibarr prior to 16.0 any low privileged users could update their login name which should only be updated by admin.
{'CVE-2022-0746'}
2022-03-07T13:41:24Z
2022-02-26T00:00:44Z
MODERATE
null
null
{'https://huntr.dev/bounties/b812ea22-0c02-46fe-b89f-04519dfb1ebd', 'https://github.com/dolibarr/dolibarr', 'https://github.com/dolibarr/dolibarr/commit/4973019630d51ad76b7c1a4141ec7a33053a7d21', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0746'}
null
{'https://github.com/dolibarr/dolibarr/commit/4973019630d51ad76b7c1a4141ec7a33053a7d21'}
{'https://github.com/dolibarr/dolibarr/commit/4973019630d51ad76b7c1a4141ec7a33053a7d21'}
Packagist
GHSA-wwgf-3xp7-cxj4
Potentially sensitive data exposure in Symfony Web Socket Bundle
### Impact Inside `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::onPublish()`, messages are arbitrarily broadcasted to the related Topic if `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::dispatch()` does not succeed. The `dispatch()` method can be considered to not succeed if (d...
null
2021-09-22T20:22:02Z
2020-07-07T16:33:45Z
MODERATE
null
{'CWE-200'}
{'https://github.com/GeniusesOfSymfony/WebSocketBundle', 'https://github.com/FriendsOfPHP/security-advisories/commit/942fd37245cb724ba8cc8d6f11f075a1bd53b338', 'https://github.com/GeniusesOfSymfony/WebSocketBundle/security/advisories/GHSA-wwgf-3xp7-cxj4', 'https://snyk.io/vuln/SNYK-PHP-GOSWEBSOCKETBUNDLE-575401'}
null
{'https://github.com/FriendsOfPHP/security-advisories/commit/942fd37245cb724ba8cc8d6f11f075a1bd53b338'}
{'https://github.com/FriendsOfPHP/security-advisories/commit/942fd37245cb724ba8cc8d6f11f075a1bd53b338'}
Packagist
GHSA-xxq4-3742-3h28
Generation of Error Message Containing Sensitive Information in microweber
microweber version 1.2.10 and prior may generate an error message containing sensitive information.
{'CVE-2022-0504'}
2022-02-09T22:23:35Z
2022-02-09T00:00:31Z
MODERATE
null
{'CWE-209'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0504', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/285ff8a0-a273-4d62-ba01-3e4b4e18467b', 'https://github.com/microweber/microweber/commit/e607e5f745cd99d5c06a7fce16b3577fab8e1250'}
null
{'https://github.com/microweber/microweber/commit/e607e5f745cd99d5c06a7fce16b3577fab8e1250'}
{'https://github.com/microweber/microweber/commit/e607e5f745cd99d5c06a7fce16b3577fab8e1250'}
Packagist
GHSA-3c33-3465-fhx2
Exposure of Resource to Wrong Sphere in LibreNMS
An issue was discovered in LibreNMS before 1.65.1. It has insufficient access control for normal users because of "'guard' => 'admin'" instead of "'middleware' => ['can:admin']" in routes/web.php.
{'CVE-2020-15877'}
2021-07-26T19:20:01Z
2021-09-08T17:27:16Z
HIGH
null
{'CWE-668'}
{'https://community.librenms.org/c/announcements', 'https://github.com/librenms/librenms/pull/11915', 'https://github.com/librenms/librenms/commit/e5bb6d80bc308fc56b9a01ffb76c34159995353c', 'https://github.com/librenms/librenms/compare/1.65...1.65.1', 'https://github.com/librenms/librenms/releases/tag/1.65.1', 'https:/...
null
{'https://github.com/librenms/librenms/commit/e5bb6d80bc308fc56b9a01ffb76c34159995353c'}
{'https://github.com/librenms/librenms/commit/e5bb6d80bc308fc56b9a01ffb76c34159995353c'}
Packagist
GHSA-455w-gv5p-wgg3
Cross-site Scripting in pimcore
pimcore is vulnerable to Stored XSS at Name field in the setting tab of the Global Targeting Rules.
{'CVE-2022-0260'}
2022-01-26T22:10:34Z
2022-01-26T22:10:48Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/pull/11205', 'https://github.com/pimcore/pimcore/commit/665976327ad3c2c87efa2a5a64d696032c0a8109', 'https://huntr.dev/bounties/89e4ab60-21ec-4396-92ad-5b78d4c2897e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0260'}
null
{'https://github.com/pimcore/pimcore/commit/665976327ad3c2c87efa2a5a64d696032c0a8109'}
{'https://github.com/pimcore/pimcore/commit/665976327ad3c2c87efa2a5a64d696032c0a8109'}
Packagist
GHSA-4574-qv3w-fcmg
Deserialization of Untrusted Data in codeception/codeception
This affects the package codeception/codeception from 4.0.0 before 4.1.22 and before 3.1.3. The RunProcess class can be leveraged as a gadget to run arbitrary commands on a system that is deserializing user input without validation.
{'CVE-2021-23420'}
2021-08-30T19:17:39Z
2021-09-01T18:36:15Z
CRITICAL
null
{'CWE-502'}
{'https://github.com/Codeception/Codeception/commit/802a108057d250ee563120eaa5365a519afc0a71', 'https://github.com/Codeception/Codeception/commit/cbce9ea7f4664052fa1ac6b36f5b5a6dbd864d71', 'https://github.com/Codeception/Codeception/blob/4.1/ext/RunProcess.php#L52', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23420', 'h...
null
{'https://github.com/Codeception/Codeception/commit/802a108057d250ee563120eaa5365a519afc0a71', 'https://github.com/Codeception/Codeception/commit/cbce9ea7f4664052fa1ac6b36f5b5a6dbd864d71'}
{'https://github.com/Codeception/Codeception/commit/cbce9ea7f4664052fa1ac6b36f5b5a6dbd864d71', 'https://github.com/Codeception/Codeception/commit/802a108057d250ee563120eaa5365a519afc0a71'}
Packagist
GHSA-6r86-2jm9-9mh4
File upload restriction bypass in Zenario CMS
Zenario CMS 9.2 allows an authenticated admin user to bypass the file upload restriction by creating a new 'File/MIME Types' using the '.phar' extension. Then an attacker can upload a malicious file, intercept the request and change the extension to '.phar' in order to run commands on the server.
{'CVE-2022-23043'}
2022-03-04T21:39:12Z
2022-02-25T00:01:07Z
HIGH
null
{'CWE-434'}
{'https://fluidattacks.com/advisories/simone/', 'https://github.com/TribalSystems/Zenario/releases/tag/9.2.55826', 'https://github.com/TribalSystems/Zenario', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23043', 'https://github.com/TribalSystems/Zenario/commit/f0682d22688d9921dc0dfd6e858900ebf2706f19'}
null
{'https://github.com/TribalSystems/Zenario/commit/f0682d22688d9921dc0dfd6e858900ebf2706f19'}
{'https://github.com/TribalSystems/Zenario/commit/f0682d22688d9921dc0dfd6e858900ebf2706f19'}
Packagist
GHSA-pc32-x737-74cv
Cross-site Scripting in Pimcore
Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0.
{'CVE-2022-0704'}
2022-03-29T15:16:23Z
2022-03-17T00:00:48Z
MODERATE
null
{'CWE-79'}
{'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/pull/11447', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0704', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://huntr.dev/bounties/4142a8b4-b439-4328-aaa3-52f6fedfd0a6'}
null
{'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}
{'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}
Packagist
GHSA-f884-gm86-cg3q
PrestaShop module ps_facetedsearch might be vulnerable from CVE-2017-9841
### Impact We have identified that some ps_facetedsearch module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow, on a webserver, an attacker to perform a RCE. This vulnerability impacts - phpunit before 4.8.28 and 5.x before 5.6.3 as reported in [CVE-2017-984...
null
2020-01-07T17:20:13Z
2020-01-07T17:20:47Z
HIGH
null
null
{'https://github.com/PrestaShop/ps_facetedsearch/commit/47c4785a21ee3b1734b2d46f044f9659a151feca', 'https://github.com/PrestaShop/ps_facetedsearch/security/advisories/GHSA-f884-gm86-cg3q'}
null
{'https://github.com/PrestaShop/ps_facetedsearch/commit/47c4785a21ee3b1734b2d46f044f9659a151feca'}
{'https://github.com/PrestaShop/ps_facetedsearch/commit/47c4785a21ee3b1734b2d46f044f9659a151feca'}
Packagist
GHSA-7r79-mrp6-8mhq
Rate limit missing in microweber
Microweber prior to version 1.3 does not rate limit password reset emails.
{'CVE-2022-0777'}
2022-03-10T16:00:56Z
2022-03-02T00:00:19Z
HIGH
null
{'CWE-640'}
{'https://github.com/microweber/microweber/commit/a3944cf9d1d8c41a48297ddc98302934e2511b0f', 'https://huntr.dev/bounties/b36be8cd-544f-42bd-990d-aa1a46df44d7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0777', 'https://github.com/microweber/microweber'}
null
{'https://github.com/microweber/microweber/commit/a3944cf9d1d8c41a48297ddc98302934e2511b0f'}
{'https://github.com/microweber/microweber/commit/a3944cf9d1d8c41a48297ddc98302934e2511b0f'}
Packagist
GHSA-xcr3-4qvr-54rh
Cross-site Scripting in Pimcore
Pimcore prior to version 10.4 is vulnerable to stored cross-site scripting in Tooltip.
{'CVE-2022-1351'}
2022-04-22T20:46:44Z
2022-04-15T00:00:45Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-1351', 'https://github.com/pimcore/pimcore/commit/8c39a8b8f14dce078b31f61c4da599ca6f8fc7ac', 'https://huntr.dev/bounties/c23ae6c2-2e53-4bf5-85b0-e90418476615', 'https://github.com/pimcore/pimcore'}
null
{'https://github.com/pimcore/pimcore/commit/8c39a8b8f14dce078b31f61c4da599ca6f8fc7ac'}
{'https://github.com/pimcore/pimcore/commit/8c39a8b8f14dce078b31f61c4da599ca6f8fc7ac'}
Packagist
GHSA-x8wj-6m73-gfqp
Relative Path Traversal (CWE-23) in chunked uploads in oneup/uploader-bundle
### Impact The vulnerability was identified in the web service for a chunked file upload. While the names of the POST parameters vary with the used frontend, their values are always used in the same way to build a path where the chunks are stored and assembled temporarily. By not validating these parameters properly, O...
{'CVE-2020-5237'}
2021-01-08T20:30:34Z
2020-02-18T18:59:24Z
HIGH
null
{'CWE-23', 'CWE-22'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-5237', 'https://github.com/1up-lab/OneupUploaderBundle/commit/a6011449b716f163fe1ae323053077e59212350c', 'https://github.com/1up-lab/OneupUploaderBundle/security/advisories/GHSA-x8wj-6m73-gfqp', 'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-003.t...
null
{'https://github.com/1up-lab/OneupUploaderBundle/commit/a6011449b716f163fe1ae323053077e59212350c'}
{'https://github.com/1up-lab/OneupUploaderBundle/commit/a6011449b716f163fe1ae323053077e59212350c'}
Packagist
GHSA-xh99-hw7h-wf63
Unchecked validity of Facing values in PlayerActionPacket
### Impact A remote attacker may crash a server by sending `PlayerActionPacket` with invalid facing values (e.g. negative), specifically with `START_BREAK` or `CRACK_BLOCK` actions, or with a `UseItemTransactionData` (typically in `InventoryTransactionPacket`). ### Patches f126479c37ff00a717a828f5271cf8e821d12d6c ###...
null
2022-01-13T22:08:36Z
2022-01-13T22:25:44Z
HIGH
null
null
{'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-xh99-hw7h-wf63', 'https://github.com/pmmp/PocketMine-MP/commit/f126479c37ff00a717a828f5271cf8e821d12d6c'}
null
{'https://github.com/pmmp/PocketMine-MP/commit/f126479c37ff00a717a828f5271cf8e821d12d6c'}
{'https://github.com/pmmp/PocketMine-MP/commit/f126479c37ff00a717a828f5271cf8e821d12d6c'}
Packagist
GHSA-qw36-p97w-vcqr
Cookie persistence after password changes in symfony/security-bundle
Description ----------- Since the rework of the Remember me cookie in Symfony 5.3, the cookie is not invalidated anymore when the user changes its password. Attackers can therefore maintain their access to the account even if the password is changed as long as they have had the chance to login once and get a valid r...
{'CVE-2021-41268'}
2021-12-01T14:36:09Z
2021-11-24T20:05:22Z
MODERATE
null
{'CWE-384'}
{'https://github.com/symfony/symfony/pull/44243', 'https://github.com/symfony/symfony/releases/tag/v5.3.12', 'https://github.com/symfony/symfony/security/advisories/GHSA-qw36-p97w-vcqr', 'https://github.com/symfony/symfony', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41268', 'https://github.com/symfony/symfony/commit/3...
null
{'https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc'}
{'https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc'}
Packagist
GHSA-jh5x-hfhg-78jq
Deserialization of Untrusted Data in Archive_Tar
Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blocked but PHAR: is not blocked. See: https://github.com/pear/Archive_Tar/issues/33
{'CVE-2020-28948'}
2022-04-01T18:11:11Z
2021-04-22T16:20:50Z
HIGH
null
{'CWE-502'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/', 'https://www.drupal.org/sa-core-2020-013', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/', 'https://git...
null
{'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da'}
{'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da'}
Packagist
GHSA-8wcc-f2vq-h4gx
Cross-site Scripting in livehelperchat
Stored XSS is found in Settings>Live help configuration>Personal Theme>static content. Under the NAME field put a payload {{constructor.constructor('alert(1)')()}} while creating content, and you will see that the input gets stored, and every time the user visits, the payload gets executed.
{'CVE-2022-0370'}
2022-02-03T20:34:04Z
2022-01-28T23:06:22Z
MODERATE
null
{'CWE-79'}
{'https://github.com/livehelperchat/livehelperchat', 'https://huntr.dev/bounties/fbe4b376-57ce-42cd-a9a9-049c4099b3ca', 'https://github.com/livehelperchat/livehelperchat/commit/9f5bc33c943349bd765b991db0b7f6b6ef05cfdb', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0370'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/9f5bc33c943349bd765b991db0b7f6b6ef05cfdb'}
{'https://github.com/livehelperchat/livehelperchat/commit/9f5bc33c943349bd765b991db0b7f6b6ef05cfdb'}
Packagist
GHSA-c697-r227-pq6h
Unrestricted Upload of File with Dangerous Type in pimcore
Unrestricted Upload of File with Dangerous Type in Packagist pimcore/pimcore
{'CVE-2022-0263'}
2022-01-25T20:47:39Z
2022-01-21T23:33:58Z
HIGH
null
{'CWE-434'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0263', 'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/96506857-06bc-4c84-88b7-4f397715bcf6', 'https://github.com/pimcore/pimcore/commit/35d1853baf64d6a1d90fd8803e52439da53a3911'}
null
{'https://github.com/pimcore/pimcore/commit/35d1853baf64d6a1d90fd8803e52439da53a3911'}
{'https://github.com/pimcore/pimcore/commit/35d1853baf64d6a1d90fd8803e52439da53a3911'}
Packagist
GHSA-gp6w-ccqv-p7qr
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-3729'}
2021-08-24T20:06:36Z
2021-08-25T14:49:58Z
MODERATE
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-3729', 'https://huntr.dev/bounties/d32f3d5a-0738-41ba-89de-34f2a772de76', 'https://github.com/firefly-iii/firefly-iii/commit/06d319cd71b7787aa919b3ba1ccf51e4ade67712', 'https://github.com/firefly-iii/firefly-iii/'}
null
{'https://github.com/firefly-iii/firefly-iii/commit/06d319cd71b7787aa919b3ba1ccf51e4ade67712'}
{'https://github.com/firefly-iii/firefly-iii/commit/06d319cd71b7787aa919b3ba1ccf51e4ade67712'}
Packagist
GHSA-hx6g-q9v2-xh7v
Information exposure in elgg
elgg is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor. Forms in the view namespace 'forms/admin' were not protected by an AdminGatekeeper in case of AJAX requests to 'ajax/form/admin/'.
{'CVE-2021-3980'}
2021-12-06T22:01:08Z
2021-12-16T15:30:48Z
HIGH
null
{'CWE-359'}
{'https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126', 'https://huntr.dev/bounties/1f43f11e-4bd8-451f-a244-dc9541cdc0ac', 'https://github.com/Elgg/Elgg/pull/13791', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3980', 'https://github.com/Elgg/Elgg'}
null
{'https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126'}
{'https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126'}
Packagist
GHSA-p48w-vf3c-rqjx
Cross-Site Scripting in Bootstrap Package
### Problem It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability. The following templates are affected by the vulnerability: * `Resources/Private/Partials/ContentElements/Carousel/Item/CallToAc...
{'CVE-2021-21365'}
2021-04-27T19:43:14Z
2021-04-29T21:51:21Z
MODERATE
null
{'CWE-79'}
{'https://github.com/benjaminkott/bootstrap_package/security/advisories/GHSA-p48w-vf3c-rqjx', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-007', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21365', 'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'}
null
{'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'}
{'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'}
Packagist
GHSA-93wh-35r4-6qmw
Exposure of Sensitive Information to an Unauthorized Actor in moodle
It was possible for some users without permission to view other users' full names to do so via the online users block in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17.
{'CVE-2021-20281'}
2021-03-24T23:14:27Z
2021-03-29T20:43:23Z
MODERATE
null
{'CWE-200'}
{'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/', 'https://moodle.org/mod/forum/discuss.php?d=419652', 'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c', 'https://bugzilla.redhat.com/show_bug.cgi?id=19390...
null
{'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c'}
{'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c'}
Packagist
GHSA-g475-pch5-6wvv
Authentication bypass in MAGMI
MAGMI versions prior to 0.7.24 are vulnerable to a remote authentication bypass due to allowing default credentials in the event there is a database connection failure. A remote attacker can trigger this connection failure if the Mysql setting max_connections (default 151) is lower than Apache (or another web server) s...
{'CVE-2020-5777'}
2021-05-05T19:06:27Z
2021-05-06T18:54:35Z
CRITICAL
null
{'CWE-287'}
{'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5777', 'https://www.tenable.com/security/research/tra-2020-51'}
null
{'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f'}
{'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f'}
Packagist
GHSA-wg4r-q74r-p7c8
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting due to unrestricted file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
{'CVE-2022-0941'}
2022-03-23T15:42:44Z
2022-03-15T00:01:03Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0941', 'https://huntr.dev/bounties/040a910e-e689-4fcb-9e4f-95206515d1bc', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f'}
null
{'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f'}
{'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f'}
Packagist
GHSA-xwjr-6fj7-fc6h
Local File Inclusion by unauthenticated users
### Impact An attacker can exploit this vulnerability to read local files on an October CMS server. The vulnerability is exploitable by unauthenticated users via a specially crafted request. ### Patches Issue has been patched in Build 469 (v1.0.469) and v1.1.0. ### Workarounds Apply https://github.com/octobercms/libr...
{'CVE-2020-15246'}
2021-11-19T13:46:03Z
2020-11-23T19:48:12Z
HIGH
null
{'CWE-863', 'CWE-22'}
{'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4', 'https://github.com/octobercms/october/security/advisories/GHSA-xwjr-6fj7-fc6h', 'https://github.com/octobercms/october', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15246'}
null
{'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4'}
{'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4'}
Packagist
GHSA-r5gm-4p5w-pq2p
Remote code execution in verot/class.upload.php
class.upload.php in verot.net class.upload before 1.0.3 and 2.x before 2.0.4, as used in the K2 extension for Joomla! and other products, omits .phar from the set of dangerous file extensions.
{'CVE-2019-19576'}
2021-08-19T16:24:46Z
2020-01-16T22:17:40Z
CRITICAL
null
{'CWE-434'}
{'https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1', 'https://medium.com/@jra8908/cve-2019-19576-e9da712b779', 'https://github.com/verot/class.upload.php/compare/2.0.3...2.0.4', 'https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2', 'https:/...
null
{'https://github.com/getk2/k2/commit/d1344706c4b74c2ae7659b286b5a066117155124', 'https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2', 'https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1'}
{'https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1', 'https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2', 'https://github.com/getk2/k2/commit/d1344706c4b74c2ae7659b286b5a066117155124'}
Packagist
GHSA-97cc-825c-399g
Cross site scripting in remdex/livehelperchat
livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
{'CVE-2021-4050'}
2021-12-09T18:07:18Z
2021-12-10T20:33:29Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4050', 'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec', 'https://huntr.dev/bounties/27eb39d7-7636-4c4b-922c-a2f8fbe1ba05'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec'}
{'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec'}
Packagist
GHSA-m5vx-8chx-qvmm
Form validation can be skipped
### Impact By crafting a special `GET` request containing a valid form state, a form can be submitted without invoking any validators. We consider the severity _low_ because it is not possible to _change_ any form values since the form state is secured with an HMAC that is still verified. That means that this issue can...
{'CVE-2021-32697'}
2021-07-29T14:34:11Z
2021-06-22T15:15:08Z
MODERATE
null
{'CWE-20'}
{'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246', 'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32697', 'https://github.com/neos/form-ghsa-m5vx-8chx-qvmm/pull/1', 'https://github.com/neos/form/security/advisories...
null
{'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246', 'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567'}
{'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567', 'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246'}
Packagist
GHSA-mrvj-7q4f-5p42
Cross-site scripting in eZ Platform Kernel
### Impact In file upload it is possible by certain means to upload files like .html and .js. These may contain XSS exploits which will be run when links to them are accessed by victims. ### Patches The fix consists simply of adding common types of scriptable file types to the configuration of the already existing fil...
null
2021-03-19T19:56:16Z
2021-03-19T19:56:42Z
HIGH
null
{'CWE-79'}
{'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b', 'https://packagist.org/packages/ezsystems/ezplatform-kernel#v1.2.5.1', 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-mrvj-7q4f-5p42', 'https://packagist.org/packages/ezsystems/ezpublish-kernel#v7....
null
{'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b'}
{'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b'}
Packagist
GHSA-jj8r-p9f5-fmvv
Cross-site Scripting in TYPO3 extension
The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows XSS.
{'CVE-2021-36785'}
2021-08-30T17:07:59Z
2021-08-30T17:22:25Z
MODERATE
null
{'CWE-79'}
{'https://typo3.org/security/advisory/typo3-ext-sa-2021-011', 'https://typo3.org/help/security-advisories/security', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36785', 'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48', 'https://github.com/miniOrangeDev/minioran...
null
{'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48'}
{'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48'}
Packagist
GHSA-hxmr-5gv9-6p8v
Cross-site Scripting in librenms
Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.2.0.
{'CVE-2022-0575'}
2022-02-24T13:06:37Z
2022-02-15T00:02:47Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/13951f51-deed-4a3d-8275-52306cc5a87d', 'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54', 'https://github.com/librenms/librenms', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0575', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms...
null
{'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54'}
{'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54'}
Packagist
GHSA-g3h8-cg9x-47qw
PHP Phar archives could be uploaded by Panel users as content files and executed in Kirby
### Impact An editor with full access to the Kirby Panel can upload a PHP `.phar` file and execute it on the server. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users, as they can gain access to the server with such a Phar file. Visitors without Panel acce...
{'CVE-2020-26255'}
2021-01-07T22:37:40Z
2020-12-08T14:42:08Z
LOW
null
{'CWE-434'}
{'https://github.com/getkirby/kirby/security/advisories/GHSA-g3h8-cg9x-47qw', 'https://packagist.org/packages/getkirby/panel', 'https://packagist.org/packages/getkirby/cms', 'https://github.com/getkirby/kirby/releases/tag/3.4.5', 'https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09', 'http...
null
{'https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881', 'https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09'}
{'https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881', 'https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09'}
Packagist
GHSA-mxr5-mc97-63rc
Account Takeover in Octobercms
### Impact An attacker can request an account password reset and then gain access to the account using a specially crafted request. - To exploit this vulnerability, an attacker must know the username of an administrator and have access to the password reset form. ### Patches - Issue has been patched in Build 472 an...
{'CVE-2021-32648'}
2022-02-23T22:21:06Z
2021-08-30T16:13:02Z
HIGH
null
{'CWE-287'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-32648', 'https://github.com/octobercms/october/security/advisories/GHSA-mxr5-mc97-63rc', 'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/october', 'https://github.com/octobercms/library/commit/016a297b1be...
null
{'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'}
{'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'}
Packagist
GHSA-9f8f-574q-8jmf
Manipulation of product reviews via API
### Impact Manipulation of product reviews via API ### Patches We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ### Workarounds For older versions of 6.1, 6.2,...
{'CVE-2021-37707'}
2021-08-26T19:40:47Z
2021-08-30T16:14:00Z
MODERATE
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-37707', 'https://github.com/shopware/platform/security/advisories/GHSA-9f8f-574q-8jmf', 'https://github.com/shopware/platform', 'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be'}
null
{'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be'}
{'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be'}
Packagist
GHSA-cjw5-f2x5-r4q5
Cross-site Scripting in TastyIgniter
TastyIgniter prior to version 3.3.0 is vulnerable to Document Object Model (DOM) based Cross-site Scripting (XSS).
{'CVE-2022-0602'}
2022-04-19T14:12:53Z
2022-04-06T00:01:29Z
HIGH
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0602', 'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554', 'https://github.com/tastyigniter/TastyIgniter', 'https://huntr.dev/bounties/615f1788-d474-4580-b0ef-5edd50274010'}
null
{'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554'}
{'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554'}
Packagist
GHSA-735v-wx75-xmmm
Cross-site Scripting in grav
In grav prior to version 1.7.28, a low privilege user can create a page with arbitrary javascript by bypassing insufficent XSS filtering.
{'CVE-2022-0268'}
2022-01-31T21:45:04Z
2022-01-27T18:27:56Z
MODERATE
null
{'CWE-79'}
{'https://huntr.dev/bounties/67085545-331e-4469-90f3-a1a46a078d39', 'https://github.com/getgrav/grav', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0268', 'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735'}
null
{'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735'}
{'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735'}
Packagist
GHSA-cchx-mfrc-fwqr
Improper authentication in Symfony
In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, a vulnerability would allow an attacker to authenticate as a privileged user on sites with user registration and remember me login functionality enabled. This is related to symfony/security.
{'CVE-2019-10911'}
2021-09-30T18:40:15Z
2020-02-12T18:45:08Z
HIGH
null
{'CWE-287', 'CWE-200'}
{'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security/CVE-2019-10911.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10911', 'https://symfony.com/blog/cve-2019-10911-add-a-separator-in-the-remember-me-co...
null
{'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081'}
{'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081'}
Packagist
GHSA-f9p3-h6cg-2cjr
Improper neutralization of formula elements in yii-helpers
Formula Injection/CSV Injection due to Improper Neutralization of Formula Elements in CSV File in GitHub repository luyadev/yii-helpers prior to 1.2.1. Successful exploitation can lead to impacts such as client-sided command injection, code execution, or remote ex-filtration of contained confidential data.
{'CVE-2022-1544'}
2022-05-04T03:01:04Z
2022-05-03T00:00:46Z
HIGH
null
{'CWE-1236'}
{'https://huntr.dev/bounties/fa6d6e75-bc7a-40f6-9bdd-2541318912d4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1544', 'https://github.com/luyadev/yii-helpers', 'https://github.com/luyadev/yii-helpers/commit/9956ed63f516110c2b588471507b870e748c4cfb'}
null
{'https://github.com/luyadev/yii-helpers/commit/9956ed63f516110c2b588471507b870e748c4cfb'}
{'https://github.com/luyadev/yii-helpers/commit/9956ed63f516110c2b588471507b870e748c4cfb'}
Packagist
GHSA-7x2h-3v2v-24p9
Cross-Site Request Forgery in microweber
microweber version 1.2.10 and prior is vulnerable to cross-site request forgery.
{'CVE-2022-0505'}
2022-02-14T22:33:33Z
2022-02-09T00:00:31Z
MODERATE
null
{'CWE-352'}
{'https://huntr.dev/bounties/65b5a243-3f0c-4df3-9bab-898332180968', 'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0505'}
null
{'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292'}
{'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292'}
Packagist
GHSA-jq4p-mq33-w375
Cross-site Scripting when rendering error messages in laminas-form
### Impact When rendering validation error messages via the `formElementErrors()` view helper shipped with laminas-form, many messages will contain the submitted value. However, in vulnerable versions of laminas-form, the value was not being escaped for HTML contexts, which can potentially lead to a Reflected Cross-Si...
{'CVE-2022-23598'}
2022-02-07T21:16:31Z
2022-01-28T23:08:29Z
MODERATE
null
{'CWE-79'}
{'https://github.com/laminas/laminas-form/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23598', 'https://github.com/laminas/laminas-form/security/advisories/GHSA-jq4p-mq33-w375', 'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37', 'https://getlaminas.org/security/advisory/LP-2022-...
null
{'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37'}
{'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37'}
Packagist
GHSA-75p7-527p-w8wp
Server-Side Request Forgery and Open Redirect in AllTube Download
### Impact On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured). The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the...
{'CVE-2022-24739'}
2022-03-09T20:13:46Z
2022-03-09T15:17:31Z
HIGH
null
{'CWE-918', 'CWE-601'}
{'https://github.com/Rudloff/alltube', 'https://github.com/ytdl-org/youtube-dl/issues/30691', 'https://github.com/Rudloff/alltube/releases/tag/3.0.3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24739', 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d', 'https://github.com/Rudloff/allt...
null
{'https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a', 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d', 'https://github.com/Rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'}
{'https://github.com/Rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a', 'https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a', 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d'}
Packagist
GHSA-f77h-m9w2-vvg2
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
showdoc is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-4017'}
2021-12-02T20:24:56Z
2021-12-03T20:38:57Z
HIGH
null
{'CWE-352'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-4017', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/1d8439e8-b3f7-40f8-8b30-f9cb05ff2bcd', 'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'}
null
{'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'}
{'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'}
Packagist
GHSA-356r-77q8-f64f
Cross-Site Request Forgery in firefly-iii
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). This has been mitigated in version 5.6.1
{'CVE-2021-3819'}
2021-09-30T18:35:17Z
2021-09-29T17:12:37Z
MODERATE
null
{'CWE-352'}
{'https://huntr.dev/bounties/da82f7b6-4ffc-4109-87a4-a2a790bd44e5', 'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9', 'https://github.com/firefly-iii/firefly-iii'}
null
{'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9'}
{'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9'}
Packagist
GHSA-738m-f33v-qc2r
SMTP Injection in PHPMailer
### Impact Attackers could inject arbitrary SMTP commands via by exploiting the fact that valid email addresses may contain line breaks, which are not handled correctly in some contexts. ### Patches Fixed in 5.2.14 in [this commit](https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0)...
{'CVE-2015-8476'}
2020-03-05T21:57:18Z
2020-03-05T22:09:19Z
LOW
null
{'CWE-20'}
{'https://nvd.nist.gov/vuln/detail/CVE-2015-8476', 'http://www.securityfocus.com/bid/78619', 'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177130.html', 'http://www.openwall.com/lists/oss-security/2015/1...
null
{'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0'}
{'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0'}
Packagist
GHSA-4286-h47h-m5v6
Improper Authentication in showdoc
ShowDoc 2.8.3 ihas a file upload vulnerability, where attackers can use the vulnerability to obtain server permissions.
{'CVE-2021-41745'}
2021-10-25T18:46:11Z
2021-10-25T19:43:24Z
HIGH
null
{'CWE-434', 'CWE-287'}
{'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41745', 'https://www.cnvd.org.cn/flaw/show/CNVD-2020-49480', 'https://github.com/purple-WL/SHOWDOC-file-upload-vulnerability'}
null
{'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e'}
{'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e'}
Packagist
GHSA-6fmv-q269-55cw
Edit template, Remote Code Execution (RCE) Vulnerability in Latest Release 4.4.0
baserCMS 4.4.0 and earlier is affected by Remote Code Execution (RCE). Impact: XSS via Arbitrary script execution. Attack vector is: Administrator must be logged in. Components are: Edit template. Tested baserCMS Version : 4.4.0 (Latest) Affected baserCMS Version : 4.0.0 ~ 4.4.0 Patches : https://basercms.net/security...
{'CVE-2020-15277'}
2021-01-08T21:18:07Z
2020-10-30T17:05:59Z
HIGH
null
{'CWE-434', 'CWE-74'}
{'https://basercms.net/security/20201029', 'https://github.com/baserproject/basercms/security/advisories/GHSA-6fmv-q269-55cw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15277', 'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b'}
null
{'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b'}
{'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b'}
Packagist
GHSA-jmhf-9fj8-88gh
Open Redirect in AllTube
### Impact Releases prior to 3.0.1 are vulnerable to an open redirect vulnerability that allows an attacker to construct a URL that redirects to an arbitrary external domain. ### Patches 3.0.1 contains a fix for this vulnerability. (The 1.x and 2.x releases are not maintained anymore.) ### References * https://github...
{'CVE-2022-0692'}
2022-03-02T21:07:57Z
2022-02-23T21:15:01Z
MODERATE
null
{'CWE-601'}
{'https://github.com/Rudloff/alltube', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0692', 'https://github.com/Rudloff/alltube/security/advisories/GHSA-jmhf-9fj8-88gh', 'https://huntr.dev/bounties/4fb39400-e08b-47af-8c1f-5093c9a51203', 'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'}
null
{'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'}
{'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'}
Packagist
GHSA-c53v-qmrx-93hg
Open redirect in shopware
### Impact Arbitrary redirect while using certain URLs ### Patches We recommend updating to the current version 5.7.7. You can get the update to 5.7.7 regularly via the Auto-Updater or directly via the download overview. For older versions you can use the Security Plugin: https://store.shopware.com/en/swag57529436...
{'CVE-2022-21651'}
2022-01-06T20:18:17Z
2022-01-06T23:49:19Z
MODERATE
null
{'CWE-601'}
{'https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022', 'https://github.com/shopware/shopware/security/advisories/GHSA-c53v-qmrx-93hg', 'https://github.com/shopware/shopware', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21651', 'https://github.com/shopware/shopware/commit/a90046c765c57a46c...
null
{'https://github.com/shopware/shopware/commit/a90046c765c57a46c4399dce17bd174253c32886'}
{'https://github.com/shopware/shopware/commit/a90046c765c57a46c4399dce17bd174253c32886'}
Packagist
GHSA-rpg7-q4cv-p466
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF)
livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-4123'}
2022-01-04T18:52:37Z
2021-12-17T20:00:16Z
MODERATE
null
{'CWE-352'}
{'https://huntr.dev/bounties/52182545-fdd6-4d4f-9fba-25010f7f8cba', 'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106', 'https://github.com/livehelperchat/livehelperchat', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4123'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106'}
{'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106'}
Packagist
GHSA-q3x2-jvp3-wj78
Unrestricted XML files leading to cross-site scripting in Microweber
Microweber prior to 1.2.12 allows unrestricted upload of XML files, which malicious actors can exploit to cause a stored cross-site scripting attack.
{'CVE-2022-0963'}
2022-03-29T15:42:17Z
2022-03-16T00:00:47Z
MODERATE
null
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08', 'https://huntr.dev/bounties/a89a4198-0880-4aa2-8439-a463f39f244c', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0963'}
null
{'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08'}
{'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08'}
Packagist
GHSA-9pgx-gcph-mpqr
XSS via the history parameter in SQL command
### Impact Users of Adminer versions supporting SQL command (most versions, e.g. MySQL) using browsers not encoding URL parameters before sending to server (likely Edge, not Chrome, not Firefox) are affected. ### Patches Patched by 5c395afc, included in version [4.7.9](https://github.com/vrana/adminer/releases/tag/v4....
{'CVE-2020-35572'}
2021-10-06T21:19:31Z
2021-02-11T20:42:28Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2020-35572', 'https://sourceforge.net/p/adminer/news/2021/02/adminer-479-released/', 'https://sourceforge.net/p/adminer/bugs-and-features/775/', 'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd', 'https://sourceforge.net/p/adminer/news/', 'https://...
null
{'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd'}
{'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd'}
Packagist
GHSA-2p6g-gjp8-ggg9
Validation bypass in personnummer
Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages was locked and we wanted to be sure to update all packages before any disclosure was released. The issue is deemed being a Low severity vulnerability. ### Impact This vulnerabili...
null
2020-09-11T16:41:24Z
2020-09-09T17:29:34Z
LOW
null
null
{'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab', 'https://github.com/personnummer/php/security/advisories/GHSA-2p6g-gjp8-ggg9', 'https://packagist.org/packages/personnummer/personnummer'}
null
{'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab'}
{'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab'}
Packagist
GHSA-vrgp-3ph6-2wwq
SQL Injection in Dolibarr
An SQL Injection vulnerability exists in Dolibarr ERP/CRM 13.0.2 (fixed version is 14.0.0) via a POST request to the country_id parameter in an UPDATE statement.
{'CVE-2021-36625'}
2022-04-13T14:57:08Z
2022-04-01T00:00:41Z
HIGH
null
{'CWE-89'}
{'https://github.com/Dolibarr/dolibarr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36625', 'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'}
null
{'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'}
{'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'}
Packagist
GHSA-389p-fchr-q2mg
Path Traversal in ImpressCMS
ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress.
{'CVE-2022-24977'}
2022-02-25T17:59:00Z
2022-02-15T00:02:47Z
CRITICAL
null
{'CWE-22'}
{'https://github.com/ImpressCMS/impresscms', 'https://github.com/ImpressCMS/impresscms/compare/1.4.1...v1.4.2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24977', 'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261', 'https://r0.haxors.org/posts?id=8'}
null
{'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261'}
{'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261'}
Packagist
GHSA-g92x-8m54-p89v
Cross-Site Request Forgery in snipe-it
snipe-it is vulnerable to Cross-Site Request Forgery (CSRF).
{'CVE-2021-3858'}
2021-10-22T13:56:56Z
2021-10-21T17:48:55Z
MODERATE
null
{'CWE-352'}
{'https://github.com/snipe/snipe-it/releases/tag/v5.3.0', 'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3', 'https://github.com/snipe/snipe-it', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3858', 'https://huntr.dev/bounties/a2fac2eb-100d-45b1-9ac7-71847c2f2b6b'}
null
{'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3'}
{'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3'}
Packagist
GHSA-jx5q-g37m-h5hj
Client-Side JavaScript Prototype Pollution in oro/platform
### Summary By sending a specially crafted request, an attacker could inject properties into existing JavaScript language construct prototypes, such as objects. Later this injection may lead to JS code execution by libraries that are vulnerable to Prototype Pollution. ### Workarounds Configure WAF to drop requests c...
{'CVE-2021-43852'}
2022-01-04T22:46:13Z
2022-01-06T18:29:51Z
MODERATE
null
{'CWE-74', 'CWE-1321'}
{'https://nvd.nist.gov/vuln/detail/CVE-2021-43852', 'https://github.com/oroinc/platform/security/advisories/GHSA-jx5q-g37m-h5hj', 'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9', 'https://github.com/oroinc/platform'}
null
{'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9'}
{'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9'}
Packagist
GHSA-7322-jrq4-x5hf
File reference keys leads to incorrect hashes on HMAC algorithms
### Impact Users of HMAC-based algorithms (HS256, HS384, and HS512) combined with `Lcobucci\JWT\Signer\Key\LocalFileReference` as key are having their tokens issued/validated using the file path as hashing key - instead of the contents. The HMAC hashing functions take any string as input and, since users can issue an...
{'CVE-2021-41106'}
2021-09-29T18:04:31Z
2021-09-29T17:09:40Z
MODERATE
null
{'CWE-345'}
{'https://github.com/lcobucci/jwt', 'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73', 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41106'}
null
{'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73', 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c'}
{'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73', 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c'}
Packagist
GHSA-9vwf-54m9-gc4f
snipe-it is vulnerable to Improper Access Control
snipe-it is vulnerable to Improper Access Control
{'CVE-2021-4089'}
2021-12-15T15:21:35Z
2021-12-16T14:32:39Z
MODERATE
null
{'CWE-863', 'CWE-284'}
{'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24', 'https://github.com/snipe/snipe-it', 'https://huntr.dev/bounties/19453ef1-4d77-4cff-b7e8-1bc8f3af0862', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4089'}
null
{'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24'}
{'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24'}
Packagist
GHSA-rphc-h572-2x9f
Cross-site Scripting in showdoc/showdoc
ShowDoc is a tool greatly applicable for an IT team to share documents online. showdoc/showdoc allows .properties files to upload which lead to stored XSS in versions prior to 2.10.4. This allows attackers to execute malicious scripts in the user's browser. This issue was patched in version 2.10.4. There is currently n...
{'CVE-2022-0960'}
2022-03-24T22:38:55Z
2022-03-15T00:00:55Z
CRITICAL
null
{'CWE-79', 'CWE-434'}
{'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0960', 'https://huntr.dev/bounties/462cd8a7-b1a9-4e93-af71-b56ba1d7ad4e'}
null
{'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f'}
{'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f'}
Packagist
GHSA-wwgq-9jhf-qgw6
Cross-Site Request Forgery allowing sending of test emails and generation of node auto-deployment keys
### Impact Due to improperly configured CSRF protections on two routes, a malicious user could execute a CSRF-based attack against the following endpoints: * Sending a test email. * Generating a node auto-deployment token. At no point would any data be exposed to the malicious user, this would simply trigger email sp...
{'CVE-2021-41273'}
2021-11-17T21:08:25Z
2021-11-18T15:46:57Z
MODERATE
null
{'CWE-352'}
{'https://github.com/pterodactyl/panel/security/advisories/GHSA-wwgq-9jhf-qgw6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41273', 'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5', 'https://github.com/pterodactyl/panel'}
null
{'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5'}
{'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5'}
Packagist
GHSA-wc7v-77jr-5c3m
bookstack is vulnerable to Cross-Site Request Forgery (CSRF)
bookstack is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-3944'}
2021-12-03T15:35:34Z
2021-12-03T20:38:37Z
LOW
null
{'CWE-352'}
{'https://huntr.dev/bounties/65551490-5ade-49aa-8b8d-274c2ca9fdc9', 'https://github.com/bookstackapp/bookstack', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3944', 'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb'}
null
{'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb'}
{'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb'}
Packagist
GHSA-vwxp-9qmf-w299
Cross-site Scripting in LiveHelperChat
LiveHelperChat (remdex/livehelperchat in Packagist) has a stored Cross-site Scripting (XSS) vulnerability prior to version 3.93.
{'CVE-2022-0394'}
2022-02-03T19:18:02Z
2022-02-01T00:49:48Z
MODERATE
null
{'CWE-79'}
{'https://nvd.nist.gov/vuln/detail/CVE-2022-0394', 'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3', 'https://github.com/livehelperchat/livehelperchat', 'https://huntr.dev/bounties/e13823d0-271c-448b-a0c5-8549ea7ea272'}
null
{'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3'}
{'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3'}
Packagist
GHSA-rfjc-xrmf-5vvw
Privilege escalation by backend users assigned to the default "Publisher" system role
### Impact Backend users with the default "Publisher" system role have access to create & manage users where they can choose which role the new user has. This means that a user with "Publisher" access has the ability to escalate their access to "Developer" access. ### Patches Issue has been patched in Build 470 (v1.0...
{'CVE-2020-15248'}
2021-11-19T13:40:25Z
2020-11-23T19:47:27Z
LOW
null
{'CWE-863', 'CWE-269'}
{'https://github.com/octobercms/october/security/advisories/GHSA-rfjc-xrmf-5vvw', 'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982', 'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829', 'https://github.com/octobercms/october', 'https://nvd.nist.g...
null
{'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829', 'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982'}
{'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982', 'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829'}
Packagist
GHSA-xp5q-77mh-6hm2
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF)
{'CVE-2021-3728'}
2021-08-24T20:02:07Z
2021-08-25T14:50:17Z
MODERATE
null
{'CWE-352'}
{'https://huntr.dev/bounties/dd54c5a1-0d4a-4f02-a111-7ce4ddc67a4d', 'https://github.com/firefly-iii/firefly-iii/', 'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3728'}
null
{'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e'}
{'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e'}
Packagist
GHSA-3wwj-wh2w-g4xp
CRLF Injection in microweber
CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11.
{'CVE-2022-0666'}
2022-02-23T15:04:54Z
2022-02-19T00:01:35Z
HIGH
null
{'CWE-93'}
{'https://huntr.dev/bounties/7215afc7-9133-4749-8e8e-0569317dbd55', 'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0666', 'https://github.com/microweber/microweber'}
null
{'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128'}
{'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128'}
Packagist
GHSA-4p92-fv6v-fhfj
Cross-site Scripting in microweber
Microweber prior to 1.2.11 is vulnerable to reflected cross-site scripting.
{'CVE-2022-0723'}
2022-03-09T20:43:44Z
2022-02-27T00:00:15Z
MODERATE
null
{'CWE-79'}
{'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/16b0547b-1bb3-493c-8a00-5b6a11fca1c5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0723'}
null
{'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5'}
{'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5'}
Packagist
GHSA-j5qg-w9jg-3wg3
Inability to de-op players if listed in ops.txt with non-lowercase letters
### Impact Originally reported in iTXTech/Genisys#1188 ```txt PotterHarry98 potterharry98 ``` `deop PotterHarry98` will remove `potterharry98` from the ops.txt but not `PotterHarry98`. Operator permissions are checked using `Config->exists()` with `lowercase=true`, which will result in a match: https://github.com/p...
null
2021-12-16T15:47:47Z
2021-12-16T18:53:57Z
LOW
null
null
{'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-j5qg-w9jg-3wg3', 'https://github.com/pmmp/PocketMine-MP/blob/4.0.3/changelogs/4.0.md#403', 'https://github.com/iTXTech/Genisy...
null
{'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e'}
{'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e'}
Packagist
GHSA-qv7g-j98v-8pp7
XSS vulnerability on email template preview page
### Summary Email template preview is vulnerable to XSS payload added to email template content. The attacker should have permission to create or edit an email template. For successful payload, execution attacked user should preview a vulnerable email template. ### Workarounds There are no workarounds that address t...
{'CVE-2021-41236'}
2022-01-04T17:51:41Z
2022-01-06T18:34:35Z
MODERATE
null
{'CWE-79'}
{'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a', 'https://github.com/oroinc/platform', 'https://github.com/oroinc/platform/security/advisories/GHSA-qv7g-j98v-8pp7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41236'}
null
{'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a'}
{'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a'}
Packagist
GHSA-579x-cjvr-cqj9
Observable Response Discrepancy in Lost Password Service
### Impact It is possible to enumerate usernames via the forgot password functionality ### Patches Update to version `10.1.3` or apply this patch manually: https://github.com/pimcore/pimcore/pull/10223.patch ### Workarounds Apply https://github.com/pimcore/pimcore/pull/10223.patch manually.
{'CVE-2021-39189'}
2021-09-17T18:38:47Z
2021-09-20T19:53:55Z
MODERATE
null
{'CWE-203', 'CWE-204'}
{'https://github.com/pimcore/pimcore/pull/10223.patch', 'https://github.com/pimcore/pimcore', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39189', 'https://github.com/pimcore/pimcore/security/advisories/GHSA-579x-cjvr-cqj9', 'https://huntr.dev/bounties/12462a99-ebf8-4e39-80b3-54a16caa3f4c/', 'https://github.com/pimcore/p...
null
{'https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce'}
{'https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce'}
Packagist
GHSA-mr6r-82x4-f4jj
Timing attacks might allow practical recovery of the long-term private key
In elliptic-php versions priot to 1.0.6, Timing attacks might be possible which can result in practical recovery of the long-term private key generated by the library under certain conditions. Leakage of a bit-length of the scalar during scalar multiplication is possible on an elliptic curve which might allow practical...
{'CVE-2019-10764'}
2021-08-18T22:40:49Z
2019-11-20T01:34:50Z
HIGH
null
{'CWE-203'}
{'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10764', 'https://minerva.crocs.fi.muni.cz/', 'https://snyk.io/vuln/SNYK-PHP-SIMPLITOELLIPTICPHP-534576'}
null
{'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9'}
{'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9'}