ecosystem stringclasses 11
values | vuln_id stringlengths 10 19 | summary stringlengths 4 220 ⌀ | details stringlengths 34 13.5k | aliases stringlengths 17 87 ⌀ | modified_date stringdate 2019-03-26 14:13:00 2022-05-10 08:46:52 | published_date stringdate 2012-06-17 03:41:00 2022-05-10 08:46:50 | severity stringclasses 5
values | score float64 0 10 ⌀ | cwe_id stringclasses 581
values | refs stringlengths 82 11.6k | introduced stringclasses 843
values | code_refs stringlengths 46 940 | commits stringlengths 46 940 |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Packagist | GHSA-vx6j-pjrh-vgjh | PHP file inclusion in the Sulu admin panel | ### Impact
_What kind of vulnerability is it? Who is impacted?_
An attacker can read arbitrary local files via a PHP file include. In a default configuration this also leads to remote code execution.
* Compromised components: Arbitrary file read on the server, (Potential) Remote code execution
* Exploitation pre-requ... | {'CVE-2021-43836'} | 2021-12-15T22:27:31Z | 2021-12-15T22:54:20Z | HIGH | null | {'CWE-22'} | {'https://github.com/sulu/sulu/commit/9c948f9ce350c68b53af8c3910e2cefc7f722b54', 'https://nvd.nist.gov/vuln/detail/CVE-2021-43836', 'https://github.com/sulu/sulu/security/advisories/GHSA-vx6j-pjrh-vgjh', 'https://github.com/sulu/sulu'} | null | {'https://github.com/sulu/sulu/commit/9c948f9ce350c68b53af8c3910e2cefc7f722b54'} | {'https://github.com/sulu/sulu/commit/9c948f9ce350c68b53af8c3910e2cefc7f722b54'} |
Packagist | GHSA-rqgp-ccph-5w65 | Cross-Site Request Forgery in firefly-iii | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-3901'} | 2021-11-02T18:42:29Z | 2021-10-28T23:14:14Z | LOW | null | {'CWE-352'} | {'https://github.com/firefly-iii/firefly-iii/commit/b42d8d1e305cad70d9b83b33cd8e0d7a4b2060c2', 'https://huntr.dev/bounties/62508fdc-c26b-4312-bf75-fd3a3f997464', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3901', 'https://github.com/firefly-iii/firefly-iii'} | null | {'https://github.com/firefly-iii/firefly-iii/commit/b42d8d1e305cad70d9b83b33cd8e0d7a4b2060c2'} | {'https://github.com/firefly-iii/firefly-iii/commit/b42d8d1e305cad70d9b83b33cd8e0d7a4b2060c2'} |
Packagist | GHSA-93pj-4p65-qmr9 | Insufficient user authorization in Moodle | A flaw was found in Moodle in versions 3.11 to 3.11.4, 3.10 to 3.10.8, 3.9 to 3.9.11 and earlier unsupported versions. Insufficient capability checks could lead to users accessing their grade report for courses where they did not have the required gradereport/user:view capability. | {'CVE-2022-0334'} | 2022-02-02T16:13:31Z | 2022-01-28T22:07:40Z | MODERATE | null | {'CWE-668', 'CWE-863'} | {'https://bugzilla.redhat.com/show_bug.cgi?id=2043664', 'https://github.com/moodle/moodle/commit/6d18f136ae88ec97e351a723df570816a959ec68', 'https://github.com/moodle/moodle/commit/1964d68f8500ea3c7b776fa8a2af6266ed109f84', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0334', 'https://moodle.org/mod/forum/discuss.php?d=43... | null | {'https://github.com/moodle/moodle/commit/1964d68f8500ea3c7b776fa8a2af6266ed109f84', 'https://github.com/moodle/moodle/commit/6d18f136ae88ec97e351a723df570816a959ec68'} | {'https://github.com/moodle/moodle/commit/6d18f136ae88ec97e351a723df570816a959ec68', 'https://github.com/moodle/moodle/commit/1964d68f8500ea3c7b776fa8a2af6266ed109f84'} |
Packagist | GHSA-55mm-5399-7r63 | Reliance on Cookies without validation in OctoberCMS | ### Impact
Previously encrypted cookie values were not tied to the name of the cookie the value belonged to. This meant that certain classes of attacks that took advantage of other theoretical vulnerabilities in user facing code (nothing exploitable in the core project itself) had a higher chance of succeeding.
Speci... | {'CVE-2020-15128'} | 2021-03-04T18:25:42Z | 2020-08-05T14:52:54Z | MODERATE | null | {'CWE-565', 'CWE-327'} | {'https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c', 'https://github.com/octobercms/library/pull/508', 'https://github.com/octobercms/october/security/advisories/GHSA-55mm-5399-7r63', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15128'} | null | {'https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c'} | {'https://github.com/octobercms/library/commit/28310d4fb336a1741b39498f4474497644a6875c'} |
Packagist | GHSA-6x98-fx9j-7c78 | Disabled users able to log in with third party SSO plugin | ### Impact
Mautic versions 2.0.0 - 2.11.0 with a SSO plugin installed could allow a disabled user to still login using email address
### Patches
Upgrade to 2.12.0 or later.
### Workarounds
None.
### For more information
If you have any questions or comments about this advisory:
* Email us at [security@mautic.org](ma... | {'CVE-2017-1000489'} | 2021-01-19T21:13:44Z | 2021-01-19T21:16:19Z | MODERATE | null | {'CWE-287'} | {'https://github.com/mautic/mautic/commit/fd933cbef795b04cabdc50527cb18e037488fef9', 'https://github.com/mautic/mautic/releases/tag/2.12.0', 'https://github.com/mautic/mautic/security/advisories/GHSA-6x98-fx9j-7c78', 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000489'} | null | {'https://github.com/mautic/mautic/commit/fd933cbef795b04cabdc50527cb18e037488fef9'} | {'https://github.com/mautic/mautic/commit/fd933cbef795b04cabdc50527cb18e037488fef9'} |
Packagist | GHSA-wg8p-w946-c482 | Cross-site Scripting in ShowDoc | ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload. | {'CVE-2022-0956'} | 2022-03-29T16:42:37Z | 2022-03-16T00:00:47Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/5b0e3f02-309f-4b59-8020-d7ac0f1999f2', 'https://github.com/star7th/showdoc/commit/56e450c3adf75c707500d7231a78c9fc894c7f13', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0956', 'https://github.com/star7th/showdoc'} | null | {'https://github.com/star7th/showdoc/commit/56e450c3adf75c707500d7231a78c9fc894c7f13'} | {'https://github.com/star7th/showdoc/commit/56e450c3adf75c707500d7231a78c9fc894c7f13'} |
Packagist | GHSA-hj8g-cw8x-2c6m | Cross-site Scripting in Microweber | Microweber prior to version 1.3 is vulnerable to reflected cross-site scripting. | {'CVE-2022-0719'} | 2022-02-24T21:51:08Z | 2022-02-24T00:00:53Z | HIGH | null | {'CWE-79'} | {'https://github.com/microweber/microweber/commit/a5925f74d39775771d4c37c8d4c1acbb762fda0a', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0719', 'https://huntr.dev/bounties/bcdce15b-7f40-4971-a061-c25c6053c312', 'https://github.com/microweber/microweber'} | null | {'https://github.com/microweber/microweber/commit/a5925f74d39775771d4c37c8d4c1acbb762fda0a'} | {'https://github.com/microweber/microweber/commit/a5925f74d39775771d4c37c8d4c1acbb762fda0a'} |
Packagist | GHSA-c9hq-g4q8-w893 | Privilage Escalation in moodle | If the upload course tool in Moodle was used to delete an enrollment method which did not exist or was not already enabled, the tool would erroneously enable that enrollment method. This could lead to unintended users gaining access to the course. Versions affected: 3.9 to 3.9.2, 3.8 to 3.8.5, 3.7 to 3.7.8, 3.5 to 3.5.... | {'CVE-2020-25701'} | 2021-03-24T23:17:02Z | 2021-03-29T20:42:55Z | MODERATE | null | {'CWE-863'} | {'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5', 'https://nvd.nist.gov/vuln/detail/CVE-2020-25701', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4NNFCHPPHRJNJROIX6SYMHOC6HMKP3GU/', 'https://moodle.org/mod/forum/discuss.php?d=413939',... | null | {'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5'} | {'https://github.com/moodle/moodle/commit/b8e1eec4c77c858de87fedf4e405e929539ea0c5'} |
Packagist | GHSA-mjvc-j6rv-9xj8 | Insertion of Sensitive Information Into Debugging Code in Microweber | Microweber prior to 1.3 may expose sensitive information about a server and a user when running the server in debug mode. | {'CVE-2022-0721'} | 2022-02-24T21:47:33Z | 2022-02-24T00:00:54Z | HIGH | null | {'CWE-215'} | {'https://github.com/microweber/microweber/commit/b12e1a490c79460bff019f34b2e17112249b16ec', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0721', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/ae267d39-9750-4c69-be8b-4f915da089fb'} | null | {'https://github.com/microweber/microweber/commit/b12e1a490c79460bff019f34b2e17112249b16ec'} | {'https://github.com/microweber/microweber/commit/b12e1a490c79460bff019f34b2e17112249b16ec'} |
Packagist | GHSA-32m2-9f76-4gv8 | Business Logic Errors in SilverStripe Framework | SilverStripe Framework prior to version 4.10.1 is vulnerable to business logic errors. | {'CVE-2022-0227'} | 2022-02-11T20:51:39Z | 2022-02-06T00:01:01Z | MODERATE | null | null | {'https://github.com/silverstripe/silverstripe-framework', 'https://github.com/silverstripe/silverstripe-framework/commit/cbf2987a616e9ef4d7eccae5d763ef2179bdbcc2', 'https://huntr.dev/bounties/35631e3a-f4b9-41ad-857c-7e3021932a72', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0227'} | null | {'https://github.com/silverstripe/silverstripe-framework/commit/cbf2987a616e9ef4d7eccae5d763ef2179bdbcc2'} | {'https://github.com/silverstripe/silverstripe-framework/commit/cbf2987a616e9ef4d7eccae5d763ef2179bdbcc2'} |
Packagist | GHSA-8wf2-3ggj-78q9 | Improper Authentication in phpmyadmin | An issue was discovered in phpMyAdmin 4.9 before 4.9.8 and 5.1 before 5.1.2. A valid user who is already authenticated to phpMyAdmin can manipulate their account to bypass two-factor authentication for future login instances. | {'CVE-2022-23807'} | 2022-01-28T22:31:16Z | 2022-01-28T22:44:40Z | MODERATE | null | {'CWE-287'} | {'https://github.com/phpmyadmin/phpmyadmin', 'https://github.com/phpmyadmin/phpmyadmin/commit/ca54f1db050859eb8555875c6aa5d7796fdf4b32', 'https://www.phpmyadmin.net/security/PMASA-2022-1/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23807'} | null | {'https://github.com/phpmyadmin/phpmyadmin/commit/ca54f1db050859eb8555875c6aa5d7796fdf4b32'} | {'https://github.com/phpmyadmin/phpmyadmin/commit/ca54f1db050859eb8555875c6aa5d7796fdf4b32'} |
Packagist | GHSA-4xww-6h7v-29jg | User enumeration in livehelperchat | livehelperchat is vulnerable to Generation of Error Message Containing Sensitive Information. There is an observable discrepancy between errors generated for users that exist and those that do not. | {'CVE-2022-0083'} | 2022-01-12T19:34:13Z | 2022-01-21T23:37:07Z | MODERATE | null | {'CWE-209'} | {'https://huntr.dev/bounties/4c477440-3b03-42eb-a6e2-a31b55090736', 'https://github.com/livehelperchat/livehelperchat', 'https://github.com/livehelperchat/livehelperchat/commit/fbed8728be59040a7218610e72f6eceb5f8bc152', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0083'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/fbed8728be59040a7218610e72f6eceb5f8bc152'} | {'https://github.com/livehelperchat/livehelperchat/commit/fbed8728be59040a7218610e72f6eceb5f8bc152'} |
Packagist | GHSA-728c-42pc-fwxg | Unrestricted Upload of File with Dangerous Type in Crater | Unrestricted Upload of File with Dangerous Type in GitHub repository crater-invoice/crater prior to 6.0. | {'CVE-2022-0242'} | 2022-01-19T14:08:43Z | 2022-01-21T23:54:50Z | HIGH | null | {'CWE-434'} | {'https://github.com/crater-invoice/crater/commit/dcb3ddecb9f4cde622cc42c51a2760747797624f', 'https://github.com/crater-invoice/crater', 'https://huntr.dev/bounties/19f3e5f7-b419-44b1-9c37-7e4404cbec94', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0242'} | null | {'https://github.com/crater-invoice/crater/commit/dcb3ddecb9f4cde622cc42c51a2760747797624f'} | {'https://github.com/crater-invoice/crater/commit/dcb3ddecb9f4cde622cc42c51a2760747797624f'} |
Packagist | GHSA-gf2c-93hm-r9j5 | Cross-site Scripting in kimai2 | kimai2 is vulnerable to Cross-Site Request Forgery (CSRF) in deleting invoice templates. This vulnerability is capable of tricking admin user to delete invoice templates. | {'CVE-2021-3963'} | 2021-11-22T18:42:37Z | 2021-11-23T18:16:43Z | MODERATE | null | {'CWE-352'} | {'https://github.com/kevinpapst/kimai2/commit/95796ab2560ad93f44068a88f0fad758c2053514', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3963', 'https://huntr.dev/bounties/3abf308b-7dbd-4864-b1a9-5c45b876def8'} | null | {'https://github.com/kevinpapst/kimai2/commit/95796ab2560ad93f44068a88f0fad758c2053514'} | {'https://github.com/kevinpapst/kimai2/commit/95796ab2560ad93f44068a88f0fad758c2053514'} |
Packagist | GHSA-h76r-vgf3-j6w5 | Auth bypass and account takeover in October CMS | ### Impact
An attacker can exploit this vulnerability to bypass authentication using a specially crafted persist cookie.
- To exploit this vulnerability, an attacker must obtain a Laravel’s secret key for cookie encryption and signing.
- Due to the logic of how this mechanism works, a targeted user account must be lo... | {'CVE-2021-29487'} | 2022-01-20T15:39:14Z | 2021-08-30T16:13:50Z | HIGH | null | {'CWE-287'} | {'https://github.com/octobercms/october/security/advisories/GHSA-h76r-vgf3-j6w5', 'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/october', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374', 'https://nvd.nist.g... | null | {'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'} | {'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'} |
Packagist | GHSA-x7cr-6qr6-2hh6 | Missing input validation can lead to command execution in composer | The Composer method `VcsDriver::getFileContent()` with user-controlled `$file` or `$identifier` arguments is susceptible to an argument injection vulnerability. It can be leveraged to gain arbitrary command execution if the Mercurial or the Git driver are used.
This led to a vulnerability on Packagist.org and Private ... | {'CVE-2022-24828'} | 2022-04-22T20:15:38Z | 2022-04-22T20:15:38Z | HIGH | null | {'CWE-94', 'CWE-20'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QD7JQWL6C4GVROO25DTXWYWM6BPOPPCG/', 'https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709', 'https://www.tenable.com/security/tns-2022-09', 'https://lists.fedoraproject.org/archives/list/pack... | null | {'https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709'} | {'https://github.com/composer/composer/commit/2c40c53637c5c7e43fff7c09d3d324d632734709'} |
Packagist | GHSA-xp82-jmw8-mjxp | Unrestricted Upload of File with Dangerous Type in ShowDoc | There is a Unrestricted Upload of File vulnerability in ShowDoc prior to version 2.10.4. | {'CVE-2022-1034'} | 2022-03-30T19:58:48Z | 2022-03-23T00:00:23Z | HIGH | null | {'CWE-434'} | {'https://github.com/star7th/showdoc/commit/bd792a89c0325836fbd64784f4c4117c0171416b', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1034', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/d205c489-3266-4ac4-acb7-c8ee570887f7'} | null | {'https://github.com/star7th/showdoc/commit/bd792a89c0325836fbd64784f4c4117c0171416b'} | {'https://github.com/star7th/showdoc/commit/bd792a89c0325836fbd64784f4c4117c0171416b'} |
Packagist | GHSA-24m3-w8g9-jwpq | Information disclosure of source code in SimpleSAMLphp | ### Background
The module controller in `SimpleSAML\Module` that processes requests for pages
hosted by modules, has code to identify paths ending with `.php` and process
those as PHP code. If no other suitable way of handling the given path exists it
presents the file to the browser.
### Description
The check to id... | {'CVE-2020-5301'} | 2021-10-20T22:23:05Z | 2020-04-22T20:59:44Z | LOW | null | {'CWE-178', 'CWE-200'} | {'https://github.com/simplesamlphp/simplesamlphp/security/advisories/GHSA-24m3-w8g9-jwpq', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5301', 'https://github.com/simplesamlphp/simplesamlphp/', 'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e'} | null | {'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e'} | {'https://github.com/simplesamlphp/simplesamlphp/commit/47968d26a2fd3ed52da70dc09210921d612ce44e'} |
Packagist | GHSA-xc47-3rch-cv57 | Improper Access Control in snipe-it | Users with no system permissions are able to see and create personal access tokens | {'CVE-2022-0178'} | 2022-01-26T20:23:15Z | 2022-01-26T20:24:23Z | MODERATE | null | {'CWE-284'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0178', 'https://huntr.dev/bounties/81c6b974-d0b3-410b-a902-8324a55b1368', 'https://github.com/snipe/snipe-it', 'https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0'} | null | {'https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0'} | {'https://github.com/snipe/snipe-it/commit/0e5ef53c352754de2778ffa20c85da15fd6f7ae0'} |
Packagist | GHSA-7733-hjv6-4h47 | Cross-Site Scripting in ternary conditional operator | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C`(5.0)
> * CWE-79
---
:information_source: This vulnerability has been fixed in May 2019 already, CVE and GHSA were assigned later in October 2020
---
### Problem
It has been discovered that the Fluid Engine (package `typo3fluid/f... | {'CVE-2020-15241'} | 2021-11-19T15:11:11Z | 2020-10-08T19:55:53Z | MODERATE | null | {'CWE-79', 'CWE-601'} | {'https://github.com/TYPO3/Fluid', 'https://github.com/TYPO3/Fluid/security/advisories/GHSA-7733-hjv6-4h47', 'https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d', 'https://typo3.org/security/advisory/typo3-core-sa-2019-013', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15241'} | null | {'https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d'} | {'https://github.com/TYPO3/Fluid/commit/9ef6a8ffff2e812025fc0701b4ce72eea6911a3d'} |
Packagist | GHSA-q2cv-94xm-qvg4 | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-3921'} | 2021-11-17T21:12:31Z | 2021-11-15T23:18:00Z | MODERATE | null | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3921', 'https://huntr.dev/bounties/724d3fd5-9f04-45c4-98d6-35a7d15468f5', 'https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684', 'https://github.com/firefly-iii/firefly-iii'} | null | {'https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684'} | {'https://github.com/firefly-iii/firefly-iii/commit/47fa9e39561a9ec9e210e4023d090a7b33381684'} |
Packagist | GHSA-m9fq-c9hp-59g7 | Cross-site Scripting in yourls | yourls is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in edit dialog. | {'CVE-2021-3785'} | 2021-09-24T13:08:49Z | 2021-09-20T20:42:52Z | MODERATE | null | {'CWE-79'} | {'https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3785', 'https://huntr.dev/bounties/b4085d13-54fa-4419-a2ce-1d780cc31638', 'https://github.com/yourls/yourls'} | null | {'https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff'} | {'https://github.com/yourls/yourls/commit/1d8e224ebabb8a4c75b97f026950ed710faab0ff'} |
Packagist | GHSA-xw7v-qrhc-jjg2 | Access Control vulnerability in Dolibarr | An Access Control vulnerability exists in Dolibarr ERP/CRM 13.0.2, fixed version is 14.0.1, in the forgot-password function becuase the application allows email addresses as usernames, which can cause a Denial of Service. | {'CVE-2021-37517'} | 2022-04-18T22:21:50Z | 2022-04-01T00:00:41Z | HIGH | null | {'CWE-863'} | {'https://github.com/Dolibarr/dolibarr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-37517', 'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c', 'https://github.com/Dolibarr/dolibarr/releases/tag/14.0.1'} | null | {'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c'} | {'https://github.com/Dolibarr/dolibarr/commit/b57eb8284e830e30eefb26e3c5ede076ea24037c'} |
Packagist | GHSA-6vfw-74wr-3chh | Cross-site Scripting in Crater Invoice | Crater invoice prior to version 6.0.0 has a cross-site scripting vulnerability. | {'CVE-2022-0372'} | 2022-02-03T21:01:10Z | 2022-01-28T00:03:42Z | MODERATE | null | {'CWE-79'} | {'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0372', 'https://huntr.dev/bounties/563232b9-5a93-4f4d-8389-ed805b262ef1', 'https://github.com/crater-invoice/crater', 'https://github.com/crater-invoice/crater/pull/681'} | null | {'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d'} | {'https://github.com/crater-invoice/crater/commit/cdc913d16cf624aee852bc9163a7c6ffc8d1da9d'} |
Packagist | GHSA-v94v-pxqp-5qgj | Cross-site Scripting in ShowDoc | The upload feature of ShowDoc prior to version 2.10.4 allows files with the extension `.*html`, which leads to stored cross-site scripting. | {'CVE-2022-0950'} | 2022-03-28T19:27:08Z | 2022-03-16T00:00:48Z | MODERATE | null | {'CWE-79', 'CWE-434'} | {'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0950', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/acc23996-bd57-448f-9eb4-05a8a046c2dc'} | null | {'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3'} | {'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3'} |
Packagist | GHSA-j8cx-j9j2-f29w | Insecure Storage of Sensitive Information in Microweber | Microweber prior to version 1.3 does not strip images of EXIF data, exposing information about users' locations, device hardware, and device software. | {'CVE-2022-0724'} | 2022-02-24T22:27:40Z | 2022-02-24T00:00:53Z | HIGH | null | {'CWE-922'} | {'https://huntr.dev/bounties/0cdc4a29-dada-4264-b326-8b65b4f11062', 'https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0724'} | null | {'https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3'} | {'https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3'} |
Packagist | GHSA-q7rv-6hp3-vh96 | Improper Input Validation in guzzlehttp/psr7 | ### Impact
In proper header parsing. An attacker could sneak in a new line character and pass untrusted values.
### Patches
The issue is patched in 1.8.4 and 2.1.1
### Workarounds
There are no known workarounds.
| {'CVE-2022-24775'} | 2022-03-25T19:26:33Z | 2022-03-25T19:26:33Z | HIGH | null | {'CWE-20'} | {'https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24775', 'https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1', 'https://www.drupal.org/sa-core-2022-006', 'https://github.com/guzzle/psr7', 'https://github.com/guzzl... | null | {'https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1', 'https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc'} | {'https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1', 'https://github.com/guzzle/psr7/pull/486/commits/9a96d9db668b485361ed9de7b5bf1e54895df1dc'} |
Packagist | GHSA-wjfq-88q2-r34j | Unhandled exception when decoding form response JSON | ### Impact
When handling form responses from the client (`ModalFormResponsePacket`), the Minecraft Windows client may send weird JSON that `json_decode()` can't understand. A workaround for this is implemented in `InGamePacketHandler::stupid_json_decode()`.
An `InvalidArgumentException` is thrown by this function when... | null | 2022-01-21T21:16:09Z | 2022-01-21T23:02:14Z | HIGH | null | null | {'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-wjfq-88q2-r34j', 'https://github.com/pmmp/PocketMine-MP/blob/4.0.7/changelogs/4.0.md#407', 'https://github.com/pmmp/PocketMine-MP/commit/56fe71d939c38fe14e18a31a673a9331bcc0e4ca'} | null | {'https://github.com/pmmp/PocketMine-MP/commit/56fe71d939c38fe14e18a31a673a9331bcc0e4ca'} | {'https://github.com/pmmp/PocketMine-MP/commit/56fe71d939c38fe14e18a31a673a9331bcc0e4ca'} |
Packagist | GHSA-q3j3-w37x-hq2q | Webcache Poisoning in symfony/http-kernel | Description
-----------
When a Symfony application is running behind a proxy or a load-balancer, you can tell Symfony to look for the `X-Forwarded-*` HTTP headers. HTTP headers that are not part of the "trusted_headers" allowed list are ignored and protect you from "Cache poisoning" attacks.
In Symfony 5.2, we've ad... | {'CVE-2021-41267'} | 2021-11-25T00:18:27Z | 2021-11-24T20:04:25Z | MODERATE | null | {'CWE-444'} | {'https://github.com/symfony/symfony/security/advisories/GHSA-q3j3-w37x-hq2q', 'https://github.com/symfony/symfony/pull/44243', 'https://github.com/symfony/symfony/releases/tag/v5.3.12', 'https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4126... | null | {'https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487'} | {'https://github.com/symfony/symfony/commit/95dcf51682029e89450aee86267e3d553aa7c487'} |
Packagist | GHSA-cx2r-mf6x-55rx | Stored XSS with custom URLs in PrestaShop module ps_linklist | ### Impact
Stored XSS when using custom URLs.
### Patches
The problem is fixed in 3.1.0
### References
[Cross-site Scripting (XSS) - Stored (CWE-79)](https://cwe.mitre.org/data/definitions/79.html) | {'CVE-2020-5273'} | 2021-10-08T22:31:21Z | 2021-10-12T16:01:36Z | MODERATE | null | {'CWE-79'} | {'https://github.com/PrestaShop/ps_linklist/commit/83e6e0bdda2287f4d6e64127cb90c41d26b5ad82', 'https://github.com/PrestaShop/ps_linklist/security/advisories/GHSA-cx2r-mf6x-55rx', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5273', 'https://github.com/PrestaShop/ps_linklist'} | null | {'https://github.com/PrestaShop/ps_linklist/commit/83e6e0bdda2287f4d6e64127cb90c41d26b5ad82'} | {'https://github.com/PrestaShop/ps_linklist/commit/83e6e0bdda2287f4d6e64127cb90c41d26b5ad82'} |
Packagist | GHSA-pm3v-qxf6-fgxv | Cross-site Scripting in pimcore | Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.2.9. | {'CVE-2022-0285'} | 2022-01-27T18:32:20Z | 2022-01-21T18:08:43Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0285', 'https://github.com/pimcore/pimcore/commit/b432225952e2a5ab0268f401b85a14480369b835', 'https://huntr.dev/bounties/321918b2-aa01-410e-9f7c-dca5f286bc9c', 'https://github.com/pimcore/pimcore'} | null | {'https://github.com/pimcore/pimcore/commit/b432225952e2a5ab0268f401b85a14480369b835'} | {'https://github.com/pimcore/pimcore/commit/b432225952e2a5ab0268f401b85a14480369b835'} |
Packagist | GHSA-8vq6-5f66-hp3r | Logic error in dolibarr/dolibarr | In dolibarr/dolibarr prior to 16.0 any low privileged users could update their login name which should only be updated by admin. | {'CVE-2022-0746'} | 2022-03-07T13:41:24Z | 2022-02-26T00:00:44Z | MODERATE | null | null | {'https://huntr.dev/bounties/b812ea22-0c02-46fe-b89f-04519dfb1ebd', 'https://github.com/dolibarr/dolibarr', 'https://github.com/dolibarr/dolibarr/commit/4973019630d51ad76b7c1a4141ec7a33053a7d21', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0746'} | null | {'https://github.com/dolibarr/dolibarr/commit/4973019630d51ad76b7c1a4141ec7a33053a7d21'} | {'https://github.com/dolibarr/dolibarr/commit/4973019630d51ad76b7c1a4141ec7a33053a7d21'} |
Packagist | GHSA-wwgf-3xp7-cxj4 | Potentially sensitive data exposure in Symfony Web Socket Bundle | ### Impact
Inside `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::onPublish()`, messages are arbitrarily broadcasted to the related Topic if `Gos\Bundle\WebSocketBundle\Server\App\Dispatcher\TopicDispatcher::dispatch()` does not succeed. The `dispatch()` method can be considered to not succeed if (d... | null | 2021-09-22T20:22:02Z | 2020-07-07T16:33:45Z | MODERATE | null | {'CWE-200'} | {'https://github.com/GeniusesOfSymfony/WebSocketBundle', 'https://github.com/FriendsOfPHP/security-advisories/commit/942fd37245cb724ba8cc8d6f11f075a1bd53b338', 'https://github.com/GeniusesOfSymfony/WebSocketBundle/security/advisories/GHSA-wwgf-3xp7-cxj4', 'https://snyk.io/vuln/SNYK-PHP-GOSWEBSOCKETBUNDLE-575401'} | null | {'https://github.com/FriendsOfPHP/security-advisories/commit/942fd37245cb724ba8cc8d6f11f075a1bd53b338'} | {'https://github.com/FriendsOfPHP/security-advisories/commit/942fd37245cb724ba8cc8d6f11f075a1bd53b338'} |
Packagist | GHSA-xxq4-3742-3h28 | Generation of Error Message Containing Sensitive Information in microweber | microweber version 1.2.10 and prior may generate an error message containing sensitive information. | {'CVE-2022-0504'} | 2022-02-09T22:23:35Z | 2022-02-09T00:00:31Z | MODERATE | null | {'CWE-209'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0504', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/285ff8a0-a273-4d62-ba01-3e4b4e18467b', 'https://github.com/microweber/microweber/commit/e607e5f745cd99d5c06a7fce16b3577fab8e1250'} | null | {'https://github.com/microweber/microweber/commit/e607e5f745cd99d5c06a7fce16b3577fab8e1250'} | {'https://github.com/microweber/microweber/commit/e607e5f745cd99d5c06a7fce16b3577fab8e1250'} |
Packagist | GHSA-3c33-3465-fhx2 | Exposure of Resource to Wrong Sphere in LibreNMS | An issue was discovered in LibreNMS before 1.65.1. It has insufficient access control for normal users because of "'guard' => 'admin'" instead of "'middleware' => ['can:admin']" in routes/web.php. | {'CVE-2020-15877'} | 2021-07-26T19:20:01Z | 2021-09-08T17:27:16Z | HIGH | null | {'CWE-668'} | {'https://community.librenms.org/c/announcements', 'https://github.com/librenms/librenms/pull/11915', 'https://github.com/librenms/librenms/commit/e5bb6d80bc308fc56b9a01ffb76c34159995353c', 'https://github.com/librenms/librenms/compare/1.65...1.65.1', 'https://github.com/librenms/librenms/releases/tag/1.65.1', 'https:/... | null | {'https://github.com/librenms/librenms/commit/e5bb6d80bc308fc56b9a01ffb76c34159995353c'} | {'https://github.com/librenms/librenms/commit/e5bb6d80bc308fc56b9a01ffb76c34159995353c'} |
Packagist | GHSA-455w-gv5p-wgg3 | Cross-site Scripting in pimcore | pimcore is vulnerable to Stored XSS at Name field in the setting tab of the Global Targeting Rules. | {'CVE-2022-0260'} | 2022-01-26T22:10:34Z | 2022-01-26T22:10:48Z | MODERATE | null | {'CWE-79'} | {'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/pull/11205', 'https://github.com/pimcore/pimcore/commit/665976327ad3c2c87efa2a5a64d696032c0a8109', 'https://huntr.dev/bounties/89e4ab60-21ec-4396-92ad-5b78d4c2897e', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0260'} | null | {'https://github.com/pimcore/pimcore/commit/665976327ad3c2c87efa2a5a64d696032c0a8109'} | {'https://github.com/pimcore/pimcore/commit/665976327ad3c2c87efa2a5a64d696032c0a8109'} |
Packagist | GHSA-4574-qv3w-fcmg | Deserialization of Untrusted Data in codeception/codeception | This affects the package codeception/codeception from 4.0.0 before 4.1.22 and before 3.1.3. The RunProcess class can be leveraged as a gadget to run arbitrary commands on a system that is deserializing user input without validation. | {'CVE-2021-23420'} | 2021-08-30T19:17:39Z | 2021-09-01T18:36:15Z | CRITICAL | null | {'CWE-502'} | {'https://github.com/Codeception/Codeception/commit/802a108057d250ee563120eaa5365a519afc0a71', 'https://github.com/Codeception/Codeception/commit/cbce9ea7f4664052fa1ac6b36f5b5a6dbd864d71', 'https://github.com/Codeception/Codeception/blob/4.1/ext/RunProcess.php#L52', 'https://nvd.nist.gov/vuln/detail/CVE-2021-23420', 'h... | null | {'https://github.com/Codeception/Codeception/commit/802a108057d250ee563120eaa5365a519afc0a71', 'https://github.com/Codeception/Codeception/commit/cbce9ea7f4664052fa1ac6b36f5b5a6dbd864d71'} | {'https://github.com/Codeception/Codeception/commit/cbce9ea7f4664052fa1ac6b36f5b5a6dbd864d71', 'https://github.com/Codeception/Codeception/commit/802a108057d250ee563120eaa5365a519afc0a71'} |
Packagist | GHSA-6r86-2jm9-9mh4 | File upload restriction bypass in Zenario CMS | Zenario CMS 9.2 allows an authenticated admin user to bypass the file upload restriction by creating a new 'File/MIME Types' using the '.phar' extension. Then an attacker can upload a malicious file, intercept the request and change the extension to '.phar' in order to run commands on the server. | {'CVE-2022-23043'} | 2022-03-04T21:39:12Z | 2022-02-25T00:01:07Z | HIGH | null | {'CWE-434'} | {'https://fluidattacks.com/advisories/simone/', 'https://github.com/TribalSystems/Zenario/releases/tag/9.2.55826', 'https://github.com/TribalSystems/Zenario', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23043', 'https://github.com/TribalSystems/Zenario/commit/f0682d22688d9921dc0dfd6e858900ebf2706f19'} | null | {'https://github.com/TribalSystems/Zenario/commit/f0682d22688d9921dc0dfd6e858900ebf2706f19'} | {'https://github.com/TribalSystems/Zenario/commit/f0682d22688d9921dc0dfd6e858900ebf2706f19'} |
Packagist | GHSA-pc32-x737-74cv | Cross-site Scripting in Pimcore | Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0. | {'CVE-2022-0704'} | 2022-03-29T15:16:23Z | 2022-03-17T00:00:48Z | MODERATE | null | {'CWE-79'} | {'https://github.com/pimcore/pimcore', 'https://github.com/pimcore/pimcore/pull/11447', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0704', 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9', 'https://huntr.dev/bounties/4142a8b4-b439-4328-aaa3-52f6fedfd0a6'} | null | {'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'} | {'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'} |
Packagist | GHSA-f884-gm86-cg3q | PrestaShop module ps_facetedsearch might be vulnerable from CVE-2017-9841 | ### Impact
We have identified that some ps_facetedsearch module ZIP archives have been built with phpunit dev dependencies. PHPUnit contains a php script that would allow, on a webserver, an attacker to perform a RCE.
This vulnerability impacts
- phpunit before 4.8.28 and 5.x before 5.6.3 as reported in [CVE-2017-984... | null | 2020-01-07T17:20:13Z | 2020-01-07T17:20:47Z | HIGH | null | null | {'https://github.com/PrestaShop/ps_facetedsearch/commit/47c4785a21ee3b1734b2d46f044f9659a151feca', 'https://github.com/PrestaShop/ps_facetedsearch/security/advisories/GHSA-f884-gm86-cg3q'} | null | {'https://github.com/PrestaShop/ps_facetedsearch/commit/47c4785a21ee3b1734b2d46f044f9659a151feca'} | {'https://github.com/PrestaShop/ps_facetedsearch/commit/47c4785a21ee3b1734b2d46f044f9659a151feca'} |
Packagist | GHSA-7r79-mrp6-8mhq | Rate limit missing in microweber | Microweber prior to version 1.3 does not rate limit password reset emails. | {'CVE-2022-0777'} | 2022-03-10T16:00:56Z | 2022-03-02T00:00:19Z | HIGH | null | {'CWE-640'} | {'https://github.com/microweber/microweber/commit/a3944cf9d1d8c41a48297ddc98302934e2511b0f', 'https://huntr.dev/bounties/b36be8cd-544f-42bd-990d-aa1a46df44d7', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0777', 'https://github.com/microweber/microweber'} | null | {'https://github.com/microweber/microweber/commit/a3944cf9d1d8c41a48297ddc98302934e2511b0f'} | {'https://github.com/microweber/microweber/commit/a3944cf9d1d8c41a48297ddc98302934e2511b0f'} |
Packagist | GHSA-xcr3-4qvr-54rh | Cross-site Scripting in Pimcore | Pimcore prior to version 10.4 is vulnerable to stored cross-site scripting in Tooltip. | {'CVE-2022-1351'} | 2022-04-22T20:46:44Z | 2022-04-15T00:00:45Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-1351', 'https://github.com/pimcore/pimcore/commit/8c39a8b8f14dce078b31f61c4da599ca6f8fc7ac', 'https://huntr.dev/bounties/c23ae6c2-2e53-4bf5-85b0-e90418476615', 'https://github.com/pimcore/pimcore'} | null | {'https://github.com/pimcore/pimcore/commit/8c39a8b8f14dce078b31f61c4da599ca6f8fc7ac'} | {'https://github.com/pimcore/pimcore/commit/8c39a8b8f14dce078b31f61c4da599ca6f8fc7ac'} |
Packagist | GHSA-x8wj-6m73-gfqp | Relative Path Traversal (CWE-23) in chunked uploads in oneup/uploader-bundle | ### Impact
The vulnerability was identified in the web service for a chunked file
upload. While the names of the POST parameters vary with the used
frontend, their values are always used in the same way to build a path
where the chunks are stored and assembled temporarily. By not validating
these parameters properly, O... | {'CVE-2020-5237'} | 2021-01-08T20:30:34Z | 2020-02-18T18:59:24Z | HIGH | null | {'CWE-23', 'CWE-22'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-5237', 'https://github.com/1up-lab/OneupUploaderBundle/commit/a6011449b716f163fe1ae323053077e59212350c', 'https://github.com/1up-lab/OneupUploaderBundle/security/advisories/GHSA-x8wj-6m73-gfqp', 'https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2020-003.t... | null | {'https://github.com/1up-lab/OneupUploaderBundle/commit/a6011449b716f163fe1ae323053077e59212350c'} | {'https://github.com/1up-lab/OneupUploaderBundle/commit/a6011449b716f163fe1ae323053077e59212350c'} |
Packagist | GHSA-xh99-hw7h-wf63 | Unchecked validity of Facing values in PlayerActionPacket | ### Impact
A remote attacker may crash a server by sending `PlayerActionPacket` with invalid facing values (e.g. negative), specifically with `START_BREAK` or `CRACK_BLOCK` actions, or with a `UseItemTransactionData` (typically in `InventoryTransactionPacket`).
### Patches
f126479c37ff00a717a828f5271cf8e821d12d6c
###... | null | 2022-01-13T22:08:36Z | 2022-01-13T22:25:44Z | HIGH | null | null | {'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-xh99-hw7h-wf63', 'https://github.com/pmmp/PocketMine-MP/commit/f126479c37ff00a717a828f5271cf8e821d12d6c'} | null | {'https://github.com/pmmp/PocketMine-MP/commit/f126479c37ff00a717a828f5271cf8e821d12d6c'} | {'https://github.com/pmmp/PocketMine-MP/commit/f126479c37ff00a717a828f5271cf8e821d12d6c'} |
Packagist | GHSA-qw36-p97w-vcqr | Cookie persistence after password changes in symfony/security-bundle | Description
-----------
Since the rework of the Remember me cookie in Symfony 5.3, the cookie is not invalidated anymore when the user changes its password.
Attackers can therefore maintain their access to the account even if the password is changed as long as they have had the chance to login once and get a valid r... | {'CVE-2021-41268'} | 2021-12-01T14:36:09Z | 2021-11-24T20:05:22Z | MODERATE | null | {'CWE-384'} | {'https://github.com/symfony/symfony/pull/44243', 'https://github.com/symfony/symfony/releases/tag/v5.3.12', 'https://github.com/symfony/symfony/security/advisories/GHSA-qw36-p97w-vcqr', 'https://github.com/symfony/symfony', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41268', 'https://github.com/symfony/symfony/commit/3... | null | {'https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc'} | {'https://github.com/symfony/symfony/commit/36a808b857cd3240244f4b224452fb1e70dc6dfc'} |
Packagist | GHSA-jh5x-hfhg-78jq | Deserialization of Untrusted Data in Archive_Tar | Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blocked but PHAR: is not blocked. See: https://github.com/pear/Archive_Tar/issues/33 | {'CVE-2020-28948'} | 2022-04-01T18:11:11Z | 2021-04-22T16:20:50Z | HIGH | null | {'CWE-502'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VJQQYDAOWHD6RDITDRPHFW7WY6BS3V5N/', 'https://www.drupal.org/sa-core-2020-013', 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/42GPGVVFTLJYAKRI75IVB5R45NYQGEUR/', 'https://git... | null | {'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da'} | {'https://github.com/pear/Archive_Tar/commit/0670a05fdab997036a3fc3ef113b8f5922e574da'} |
Packagist | GHSA-8wcc-f2vq-h4gx | Cross-site Scripting in livehelperchat | Stored XSS is found in Settings>Live help configuration>Personal Theme>static content. Under the NAME field put a payload {{constructor.constructor('alert(1)')()}} while creating content, and you will see that the input gets stored, and every time the user visits, the payload gets executed. | {'CVE-2022-0370'} | 2022-02-03T20:34:04Z | 2022-01-28T23:06:22Z | MODERATE | null | {'CWE-79'} | {'https://github.com/livehelperchat/livehelperchat', 'https://huntr.dev/bounties/fbe4b376-57ce-42cd-a9a9-049c4099b3ca', 'https://github.com/livehelperchat/livehelperchat/commit/9f5bc33c943349bd765b991db0b7f6b6ef05cfdb', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0370'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/9f5bc33c943349bd765b991db0b7f6b6ef05cfdb'} | {'https://github.com/livehelperchat/livehelperchat/commit/9f5bc33c943349bd765b991db0b7f6b6ef05cfdb'} |
Packagist | GHSA-c697-r227-pq6h | Unrestricted Upload of File with Dangerous Type in pimcore | Unrestricted Upload of File with Dangerous Type in Packagist pimcore/pimcore | {'CVE-2022-0263'} | 2022-01-25T20:47:39Z | 2022-01-21T23:33:58Z | HIGH | null | {'CWE-434'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0263', 'https://github.com/pimcore/pimcore', 'https://huntr.dev/bounties/96506857-06bc-4c84-88b7-4f397715bcf6', 'https://github.com/pimcore/pimcore/commit/35d1853baf64d6a1d90fd8803e52439da53a3911'} | null | {'https://github.com/pimcore/pimcore/commit/35d1853baf64d6a1d90fd8803e52439da53a3911'} | {'https://github.com/pimcore/pimcore/commit/35d1853baf64d6a1d90fd8803e52439da53a3911'} |
Packagist | GHSA-gp6w-ccqv-p7qr | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-3729'} | 2021-08-24T20:06:36Z | 2021-08-25T14:49:58Z | MODERATE | null | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-3729', 'https://huntr.dev/bounties/d32f3d5a-0738-41ba-89de-34f2a772de76', 'https://github.com/firefly-iii/firefly-iii/commit/06d319cd71b7787aa919b3ba1ccf51e4ade67712', 'https://github.com/firefly-iii/firefly-iii/'} | null | {'https://github.com/firefly-iii/firefly-iii/commit/06d319cd71b7787aa919b3ba1ccf51e4ade67712'} | {'https://github.com/firefly-iii/firefly-iii/commit/06d319cd71b7787aa919b3ba1ccf51e4ade67712'} |
Packagist | GHSA-hx6g-q9v2-xh7v | Information exposure in elgg | elgg is vulnerable to Exposure of Private Personal Information to an Unauthorized Actor. Forms in the view namespace 'forms/admin' were not protected by an AdminGatekeeper in case of AJAX requests to 'ajax/form/admin/'. | {'CVE-2021-3980'} | 2021-12-06T22:01:08Z | 2021-12-16T15:30:48Z | HIGH | null | {'CWE-359'} | {'https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126', 'https://huntr.dev/bounties/1f43f11e-4bd8-451f-a244-dc9541cdc0ac', 'https://github.com/Elgg/Elgg/pull/13791', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3980', 'https://github.com/Elgg/Elgg'} | null | {'https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126'} | {'https://github.com/elgg/elgg/commit/572d210e2392f1fdf47ff2f38665372a6535c126'} |
Packagist | GHSA-p48w-vf3c-rqjx | Cross-Site Scripting in Bootstrap Package | ### Problem
It has been discovered that rendering content in the website frontend is vulnerable to cross-site scripting. A valid backend user account is needed to exploit this vulnerability.
The following templates are affected by the vulnerability:
* `Resources/Private/Partials/ContentElements/Carousel/Item/CallToAc... | {'CVE-2021-21365'} | 2021-04-27T19:43:14Z | 2021-04-29T21:51:21Z | MODERATE | null | {'CWE-79'} | {'https://github.com/benjaminkott/bootstrap_package/security/advisories/GHSA-p48w-vf3c-rqjx', 'https://typo3.org/security/advisory/typo3-ext-sa-2021-007', 'https://nvd.nist.gov/vuln/detail/CVE-2021-21365', 'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'} | null | {'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'} | {'https://github.com/benjaminkott/bootstrap_package/commit/de3a568fc311d6712d9339643e51e8627c80530b'} |
Packagist | GHSA-93wh-35r4-6qmw | Exposure of Sensitive Information to an Unauthorized Actor in moodle | It was possible for some users without permission to view other users' full names to do so via the online users block in moodle before 3.10.2, 3.9.5, 3.8.8, 3.5.17. | {'CVE-2021-20281'} | 2021-03-24T23:14:27Z | 2021-03-29T20:43:23Z | MODERATE | null | {'CWE-200'} | {'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFH5DDMU5TZ3JT4Q52WMRAHACA5MHIMT/', 'https://moodle.org/mod/forum/discuss.php?d=419652', 'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c', 'https://bugzilla.redhat.com/show_bug.cgi?id=19390... | null | {'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c'} | {'https://github.com/moodle/moodle/commit/33d6017287e1835513a3de8edd3fbf7a6a90af9c'} |
Packagist | GHSA-g475-pch5-6wvv | Authentication bypass in MAGMI | MAGMI versions prior to 0.7.24 are vulnerable to a remote authentication bypass due to allowing default credentials in the event there is a database connection failure. A remote attacker can trigger this connection failure if the Mysql setting max_connections (default 151) is lower than Apache (or another web server) s... | {'CVE-2020-5777'} | 2021-05-05T19:06:27Z | 2021-05-06T18:54:35Z | CRITICAL | null | {'CWE-287'} | {'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f', 'https://nvd.nist.gov/vuln/detail/CVE-2020-5777', 'https://www.tenable.com/security/research/tra-2020-51'} | null | {'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f'} | {'https://github.com/dweeves/magmi-git/commit/dde71de5cfd505fe78e5caf21d6531b61450a16f'} |
Packagist | GHSA-wg4r-q74r-p7c8 | Cross-site Scripting in ShowDoc | ShowDoc is vulnerable to stored cross-site scripting due to unrestricted file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4. | {'CVE-2022-0941'} | 2022-03-23T15:42:44Z | 2022-03-15T00:01:03Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0941', 'https://huntr.dev/bounties/040a910e-e689-4fcb-9e4f-95206515d1bc', 'https://github.com/star7th/showdoc', 'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f'} | null | {'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f'} | {'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f'} |
Packagist | GHSA-xwjr-6fj7-fc6h | Local File Inclusion by unauthenticated users | ### Impact
An attacker can exploit this vulnerability to read local files on an October CMS server. The vulnerability is exploitable by unauthenticated users via a specially crafted request.
### Patches
Issue has been patched in Build 469 (v1.0.469) and v1.1.0.
### Workarounds
Apply https://github.com/octobercms/libr... | {'CVE-2020-15246'} | 2021-11-19T13:46:03Z | 2020-11-23T19:48:12Z | HIGH | null | {'CWE-863', 'CWE-22'} | {'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4', 'https://github.com/octobercms/october/security/advisories/GHSA-xwjr-6fj7-fc6h', 'https://github.com/octobercms/october', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15246'} | null | {'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4'} | {'https://github.com/octobercms/library/commit/80aab47f044a2660aa352450f55137598f362aa4'} |
Packagist | GHSA-r5gm-4p5w-pq2p | Remote code execution in verot/class.upload.php | class.upload.php in verot.net class.upload before 1.0.3 and 2.x before 2.0.4, as used in the K2 extension for Joomla! and other products, omits .phar from the set of dangerous file extensions. | {'CVE-2019-19576'} | 2021-08-19T16:24:46Z | 2020-01-16T22:17:40Z | CRITICAL | null | {'CWE-434'} | {'https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1', 'https://medium.com/@jra8908/cve-2019-19576-e9da712b779', 'https://github.com/verot/class.upload.php/compare/2.0.3...2.0.4', 'https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2', 'https:/... | null | {'https://github.com/getk2/k2/commit/d1344706c4b74c2ae7659b286b5a066117155124', 'https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2', 'https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1'} | {'https://github.com/verot/class.upload.php/commit/5a7505ddec956fdc9e9c071ae5089865559174f1', 'https://github.com/verot/class.upload.php/commit/db1b4fe50c1754696970d8b437f07e7b94a7ebf2', 'https://github.com/getk2/k2/commit/d1344706c4b74c2ae7659b286b5a066117155124'} |
Packagist | GHSA-97cc-825c-399g | Cross site scripting in remdex/livehelperchat | livehelperchat is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | {'CVE-2021-4050'} | 2021-12-09T18:07:18Z | 2021-12-10T20:33:29Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-4050', 'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec', 'https://huntr.dev/bounties/27eb39d7-7636-4c4b-922c-a2f8fbe1ba05'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec'} | {'https://github.com/livehelperchat/livehelperchat/commit/0ce1dd2a13509747c240c8484228a5df8d6e03ec'} |
Packagist | GHSA-m5vx-8chx-qvmm | Form validation can be skipped | ### Impact
By crafting a special `GET` request containing a valid form state, a form can be submitted without invoking any validators.
We consider the severity _low_ because it is not possible to _change_ any form values since the form state is secured with an HMAC that is still verified.
That means that this issue can... | {'CVE-2021-32697'} | 2021-07-29T14:34:11Z | 2021-06-22T15:15:08Z | MODERATE | null | {'CWE-20'} | {'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246', 'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567', 'https://nvd.nist.gov/vuln/detail/CVE-2021-32697', 'https://github.com/neos/form-ghsa-m5vx-8chx-qvmm/pull/1', 'https://github.com/neos/form/security/advisories... | null | {'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246', 'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567'} | {'https://github.com/neos/form/commit/049d415295be8d4a0478ccba97dba1bb81649567', 'https://github.com/neos/form/commit/69de4219b1f58157e2be6b05811463875d75c246'} |
Packagist | GHSA-mrvj-7q4f-5p42 | Cross-site scripting in eZ Platform Kernel | ### Impact
In file upload it is possible by certain means to upload files like .html and .js. These may contain XSS exploits which will be run when links to them are accessed by victims.
### Patches
The fix consists simply of adding common types of scriptable file types to the configuration of the already existing fil... | null | 2021-03-19T19:56:16Z | 2021-03-19T19:56:42Z | HIGH | null | {'CWE-79'} | {'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b', 'https://packagist.org/packages/ezsystems/ezplatform-kernel#v1.2.5.1', 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-mrvj-7q4f-5p42', 'https://packagist.org/packages/ezsystems/ezpublish-kernel#v7.... | null | {'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b'} | {'https://github.com/ezsystems/ezpublish-kernel/commit/29fecd2afe86f763510f10c02f14962d028f311b'} |
Packagist | GHSA-jj8r-p9f5-fmvv | Cross-site Scripting in TYPO3 extension | The miniorange_saml (aka Miniorange Saml) extension before 1.4.3 for TYPO3 allows XSS. | {'CVE-2021-36785'} | 2021-08-30T17:07:59Z | 2021-08-30T17:22:25Z | MODERATE | null | {'CWE-79'} | {'https://typo3.org/security/advisory/typo3-ext-sa-2021-011', 'https://typo3.org/help/security-advisories/security', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36785', 'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48', 'https://github.com/miniOrangeDev/minioran... | null | {'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48'} | {'https://github.com/miniOrangeDev/miniorange-saml-typo3-sso/commit/1fe2802267ffe1b48823d9d8b3a496c870a0af48'} |
Packagist | GHSA-hxmr-5gv9-6p8v | Cross-site Scripting in librenms | Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.2.0. | {'CVE-2022-0575'} | 2022-02-24T13:06:37Z | 2022-02-15T00:02:47Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/13951f51-deed-4a3d-8275-52306cc5a87d', 'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54', 'https://github.com/librenms/librenms', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0575', 'https://notes.netbytesec.com/2022/02/multiple-vulnerabilities-in-librenms... | null | {'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54'} | {'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54'} |
Packagist | GHSA-g3h8-cg9x-47qw | PHP Phar archives could be uploaded by Panel users as content files and executed in Kirby | ### Impact
An editor with full access to the Kirby Panel can upload a PHP `.phar` file and execute it on the server. This vulnerability is critical if you might have potential attackers in your group of authenticated Panel users, as they can gain access to the server with such a Phar file.
Visitors without Panel acce... | {'CVE-2020-26255'} | 2021-01-07T22:37:40Z | 2020-12-08T14:42:08Z | LOW | null | {'CWE-434'} | {'https://github.com/getkirby/kirby/security/advisories/GHSA-g3h8-cg9x-47qw', 'https://packagist.org/packages/getkirby/panel', 'https://packagist.org/packages/getkirby/cms', 'https://github.com/getkirby/kirby/releases/tag/3.4.5', 'https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09', 'http... | null | {'https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881', 'https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09'} | {'https://github.com/getkirby-v2/panel/commit/5a569d4e3ddaea2b6628d7ec1472a3e8bc410881', 'https://github.com/getkirby/kirby/commit/db8f371b13036861c9cc5ba3e85e27f73fce5e09'} |
Packagist | GHSA-mxr5-mc97-63rc | Account Takeover in Octobercms | ### Impact
An attacker can request an account password reset and then gain access to the account using a specially crafted request.
- To exploit this vulnerability, an attacker must know the username of an administrator and have access to the password reset form.
### Patches
- Issue has been patched in Build 472 an... | {'CVE-2021-32648'} | 2022-02-23T22:21:06Z | 2021-08-30T16:13:02Z | HIGH | null | {'CWE-287'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-32648', 'https://github.com/octobercms/october/security/advisories/GHSA-mxr5-mc97-63rc', 'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/october', 'https://github.com/octobercms/library/commit/016a297b1be... | null | {'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'} | {'https://github.com/octobercms/library/commit/5bd1a28140b825baebe6becd4f7562299d3de3b9', 'https://github.com/octobercms/library/commit/016a297b1bec55d2e53bc889458ed2cb5c3e9374'} |
Packagist | GHSA-9f8f-574q-8jmf | Manipulation of product reviews via API | ### Impact
Manipulation of product reviews via API
### Patches
We recommend updating to the current version 6.4.3.1. You can get the update to 6.4.3.1 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
### Workarounds
For older versions of 6.1, 6.2,... | {'CVE-2021-37707'} | 2021-08-26T19:40:47Z | 2021-08-30T16:14:00Z | MODERATE | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-37707', 'https://github.com/shopware/platform/security/advisories/GHSA-9f8f-574q-8jmf', 'https://github.com/shopware/platform', 'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be'} | null | {'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be'} | {'https://github.com/shopware/platform/commit/912b96de3b839c6c5525c98cbb58f537c2d838be'} |
Packagist | GHSA-cjw5-f2x5-r4q5 | Cross-site Scripting in TastyIgniter | TastyIgniter prior to version 3.3.0 is vulnerable to Document Object Model (DOM) based Cross-site Scripting (XSS). | {'CVE-2022-0602'} | 2022-04-19T14:12:53Z | 2022-04-06T00:01:29Z | HIGH | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0602', 'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554', 'https://github.com/tastyigniter/TastyIgniter', 'https://huntr.dev/bounties/615f1788-d474-4580-b0ef-5edd50274010'} | null | {'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554'} | {'https://github.com/tastyigniter/tastyigniter/commit/992d4ce6444805c3132e3635a01b6fd222063554'} |
Packagist | GHSA-735v-wx75-xmmm | Cross-site Scripting in grav | In grav prior to version 1.7.28, a low privilege user can create a page with arbitrary javascript by bypassing insufficent XSS filtering. | {'CVE-2022-0268'} | 2022-01-31T21:45:04Z | 2022-01-27T18:27:56Z | MODERATE | null | {'CWE-79'} | {'https://huntr.dev/bounties/67085545-331e-4469-90f3-a1a46a078d39', 'https://github.com/getgrav/grav', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0268', 'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735'} | null | {'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735'} | {'https://github.com/getgrav/grav/commit/6f2fa9311afb9ecd34030dec2aff7b39e9e7e735'} |
Packagist | GHSA-cchx-mfrc-fwqr | Improper authentication in Symfony | In Symfony before 2.7.51, 2.8.x before 2.8.50, 3.x before 3.4.26, 4.x before 4.1.12, and 4.2.x before 4.2.7, a vulnerability would allow an attacker to authenticate as a privileged user on sites with user registration and remember me login functionality enabled. This is related to symfony/security. | {'CVE-2019-10911'} | 2021-09-30T18:40:15Z | 2020-02-12T18:45:08Z | HIGH | null | {'CWE-287', 'CWE-200'} | {'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081', 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/security/CVE-2019-10911.yaml', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10911', 'https://symfony.com/blog/cve-2019-10911-add-a-separator-in-the-remember-me-co... | null | {'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081'} | {'https://github.com/symfony/symfony/commit/a29ce2817cf43bb1850cf6af114004ac26c7a081'} |
Packagist | GHSA-f9p3-h6cg-2cjr | Improper neutralization of formula elements in yii-helpers | Formula Injection/CSV Injection due to Improper Neutralization of Formula Elements in CSV File in GitHub repository luyadev/yii-helpers prior to 1.2.1. Successful exploitation can lead to impacts such as client-sided command injection, code execution, or remote ex-filtration of contained confidential data. | {'CVE-2022-1544'} | 2022-05-04T03:01:04Z | 2022-05-03T00:00:46Z | HIGH | null | {'CWE-1236'} | {'https://huntr.dev/bounties/fa6d6e75-bc7a-40f6-9bdd-2541318912d4', 'https://nvd.nist.gov/vuln/detail/CVE-2022-1544', 'https://github.com/luyadev/yii-helpers', 'https://github.com/luyadev/yii-helpers/commit/9956ed63f516110c2b588471507b870e748c4cfb'} | null | {'https://github.com/luyadev/yii-helpers/commit/9956ed63f516110c2b588471507b870e748c4cfb'} | {'https://github.com/luyadev/yii-helpers/commit/9956ed63f516110c2b588471507b870e748c4cfb'} |
Packagist | GHSA-7x2h-3v2v-24p9 | Cross-Site Request Forgery in microweber | microweber version 1.2.10 and prior is vulnerable to cross-site request forgery. | {'CVE-2022-0505'} | 2022-02-14T22:33:33Z | 2022-02-09T00:00:31Z | MODERATE | null | {'CWE-352'} | {'https://huntr.dev/bounties/65b5a243-3f0c-4df3-9bab-898332180968', 'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0505'} | null | {'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292'} | {'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292'} |
Packagist | GHSA-jq4p-mq33-w375 | Cross-site Scripting when rendering error messages in laminas-form | ### Impact
When rendering validation error messages via the `formElementErrors()` view helper shipped with laminas-form, many messages will contain the submitted value. However, in vulnerable versions of laminas-form, the value was not being escaped for HTML contexts, which can potentially lead to a Reflected Cross-Si... | {'CVE-2022-23598'} | 2022-02-07T21:16:31Z | 2022-01-28T23:08:29Z | MODERATE | null | {'CWE-79'} | {'https://github.com/laminas/laminas-form/', 'https://nvd.nist.gov/vuln/detail/CVE-2022-23598', 'https://github.com/laminas/laminas-form/security/advisories/GHSA-jq4p-mq33-w375', 'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37', 'https://getlaminas.org/security/advisory/LP-2022-... | null | {'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37'} | {'https://github.com/laminas/laminas-form/commit/43005a3ec4c2292d4f825273768d9b884acbca37'} |
Packagist | GHSA-75p7-527p-w8wp | Server-Side Request Forgery and Open Redirect in AllTube Download | ### Impact
On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured).
The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the... | {'CVE-2022-24739'} | 2022-03-09T20:13:46Z | 2022-03-09T15:17:31Z | HIGH | null | {'CWE-918', 'CWE-601'} | {'https://github.com/Rudloff/alltube', 'https://github.com/ytdl-org/youtube-dl/issues/30691', 'https://github.com/Rudloff/alltube/releases/tag/3.0.3', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24739', 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d', 'https://github.com/Rudloff/allt... | null | {'https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a', 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d', 'https://github.com/Rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'} | {'https://github.com/Rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a', 'https://github.com/Rudloff/alltube/commit/8913f27716400dabf4906a5ad690a5238f73496a', 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d'} |
Packagist | GHSA-f77h-m9w2-vvg2 | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | showdoc is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-4017'} | 2021-12-02T20:24:56Z | 2021-12-03T20:38:57Z | HIGH | null | {'CWE-352'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-4017', 'https://github.com/star7th/showdoc', 'https://huntr.dev/bounties/1d8439e8-b3f7-40f8-8b30-f9cb05ff2bcd', 'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'} | null | {'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'} | {'https://github.com/star7th/showdoc/commit/654e871a3923e79076818a9a03533fe88222c871'} |
Packagist | GHSA-356r-77q8-f64f | Cross-Site Request Forgery in firefly-iii | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF). This has been mitigated in version 5.6.1 | {'CVE-2021-3819'} | 2021-09-30T18:35:17Z | 2021-09-29T17:12:37Z | MODERATE | null | {'CWE-352'} | {'https://huntr.dev/bounties/da82f7b6-4ffc-4109-87a4-a2a790bd44e5', 'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9', 'https://github.com/firefly-iii/firefly-iii'} | null | {'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9'} | {'https://github.com/firefly-iii/firefly-iii/commit/578f350498b75f31d321c78a608c7f7b3b7b07e9'} |
Packagist | GHSA-738m-f33v-qc2r | SMTP Injection in PHPMailer | ### Impact
Attackers could inject arbitrary SMTP commands via by exploiting the fact that valid email addresses may contain line breaks, which are not handled correctly in some contexts.
### Patches
Fixed in 5.2.14 in [this commit](https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0)... | {'CVE-2015-8476'} | 2020-03-05T21:57:18Z | 2020-03-05T22:09:19Z | LOW | null | {'CWE-20'} | {'https://nvd.nist.gov/vuln/detail/CVE-2015-8476', 'http://www.securityfocus.com/bid/78619', 'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0', 'http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177130.html', 'http://www.openwall.com/lists/oss-security/2015/1... | null | {'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0'} | {'https://github.com/PHPMailer/PHPMailer/commit/6687a96a18b8f12148881e4ddde795ae477284b0'} |
Packagist | GHSA-4286-h47h-m5v6 | Improper Authentication in showdoc | ShowDoc 2.8.3 ihas a file upload vulnerability, where attackers can use the vulnerability to obtain server permissions. | {'CVE-2021-41745'} | 2021-10-25T18:46:11Z | 2021-10-25T19:43:24Z | HIGH | null | {'CWE-434', 'CWE-287'} | {'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41745', 'https://www.cnvd.org.cn/flaw/show/CNVD-2020-49480', 'https://github.com/purple-WL/SHOWDOC-file-upload-vulnerability'} | null | {'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e'} | {'https://github.com/star7th/showdoc/commit/aec3df841958059c1db9ab1af25acc2af81e4e0e'} |
Packagist | GHSA-6fmv-q269-55cw | Edit template, Remote Code Execution (RCE) Vulnerability in Latest Release 4.4.0 | baserCMS 4.4.0 and earlier is affected by Remote Code Execution (RCE).
Impact: XSS via Arbitrary script execution.
Attack vector is: Administrator must be logged in.
Components are: Edit template.
Tested baserCMS Version : 4.4.0 (Latest)
Affected baserCMS Version : 4.0.0 ~ 4.4.0
Patches : https://basercms.net/security... | {'CVE-2020-15277'} | 2021-01-08T21:18:07Z | 2020-10-30T17:05:59Z | HIGH | null | {'CWE-434', 'CWE-74'} | {'https://basercms.net/security/20201029', 'https://github.com/baserproject/basercms/security/advisories/GHSA-6fmv-q269-55cw', 'https://nvd.nist.gov/vuln/detail/CVE-2020-15277', 'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b'} | null | {'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b'} | {'https://github.com/baserproject/basercms/commit/bb027c3967b0430adcff2d2fedbc23d39077563b'} |
Packagist | GHSA-jmhf-9fj8-88gh | Open Redirect in AllTube | ### Impact
Releases prior to 3.0.1 are vulnerable to an open redirect vulnerability that allows an attacker to construct a URL that redirects to an arbitrary external domain.
### Patches
3.0.1 contains a fix for this vulnerability.
(The 1.x and 2.x releases are not maintained anymore.)
### References
* https://github... | {'CVE-2022-0692'} | 2022-03-02T21:07:57Z | 2022-02-23T21:15:01Z | MODERATE | null | {'CWE-601'} | {'https://github.com/Rudloff/alltube', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0692', 'https://github.com/Rudloff/alltube/security/advisories/GHSA-jmhf-9fj8-88gh', 'https://huntr.dev/bounties/4fb39400-e08b-47af-8c1f-5093c9a51203', 'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'} | null | {'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'} | {'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'} |
Packagist | GHSA-c53v-qmrx-93hg | Open redirect in shopware | ### Impact
Arbitrary redirect while using certain URLs
### Patches
We recommend updating to the current version 5.7.7. You can get the update to 5.7.7 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag57529436... | {'CVE-2022-21651'} | 2022-01-06T20:18:17Z | 2022-01-06T23:49:19Z | MODERATE | null | {'CWE-601'} | {'https://docs.shopware.com/en/shopware-5-en/securityupdates/security-update-01-2022', 'https://github.com/shopware/shopware/security/advisories/GHSA-c53v-qmrx-93hg', 'https://github.com/shopware/shopware', 'https://nvd.nist.gov/vuln/detail/CVE-2022-21651', 'https://github.com/shopware/shopware/commit/a90046c765c57a46c... | null | {'https://github.com/shopware/shopware/commit/a90046c765c57a46c4399dce17bd174253c32886'} | {'https://github.com/shopware/shopware/commit/a90046c765c57a46c4399dce17bd174253c32886'} |
Packagist | GHSA-rpg7-q4cv-p466 | livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF) | livehelperchat is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-4123'} | 2022-01-04T18:52:37Z | 2021-12-17T20:00:16Z | MODERATE | null | {'CWE-352'} | {'https://huntr.dev/bounties/52182545-fdd6-4d4f-9fba-25010f7f8cba', 'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106', 'https://github.com/livehelperchat/livehelperchat', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4123'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106'} | {'https://github.com/livehelperchat/livehelperchat/commit/2a98c69cf8899afb9a76d737527abb1dd96fa106'} |
Packagist | GHSA-q3x2-jvp3-wj78 | Unrestricted XML files leading to cross-site scripting in Microweber | Microweber prior to 1.2.12 allows unrestricted upload of XML files, which malicious actors can exploit to cause a stored cross-site scripting attack. | {'CVE-2022-0963'} | 2022-03-29T15:42:17Z | 2022-03-16T00:00:47Z | MODERATE | null | {'CWE-79'} | {'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08', 'https://huntr.dev/bounties/a89a4198-0880-4aa2-8439-a463f39f244c', 'https://github.com/microweber/microweber', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0963'} | null | {'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08'} | {'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08'} |
Packagist | GHSA-9pgx-gcph-mpqr | XSS via the history parameter in SQL command | ### Impact
Users of Adminer versions supporting SQL command (most versions, e.g. MySQL) using browsers not encoding URL parameters before sending to server (likely Edge, not Chrome, not Firefox) are affected.
### Patches
Patched by 5c395afc, included in version [4.7.9](https://github.com/vrana/adminer/releases/tag/v4.... | {'CVE-2020-35572'} | 2021-10-06T21:19:31Z | 2021-02-11T20:42:28Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2020-35572', 'https://sourceforge.net/p/adminer/news/2021/02/adminer-479-released/', 'https://sourceforge.net/p/adminer/bugs-and-features/775/', 'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd', 'https://sourceforge.net/p/adminer/news/', 'https://... | null | {'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd'} | {'https://github.com/vrana/adminer/commit/5c395afc098e501be3417017c6421968aac477bd'} |
Packagist | GHSA-2p6g-gjp8-ggg9 | Validation bypass in personnummer | Back in min June a security vulnerability was reported to the team, the reason for the slow response was due to ownership of some packages
was locked and we wanted to be sure to update all packages before any disclosure was released.
The issue is deemed being a Low severity vulnerability.
### Impact
This vulnerabili... | null | 2020-09-11T16:41:24Z | 2020-09-09T17:29:34Z | LOW | null | null | {'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab', 'https://github.com/personnummer/php/security/advisories/GHSA-2p6g-gjp8-ggg9', 'https://packagist.org/packages/personnummer/personnummer'} | null | {'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab'} | {'https://github.com/personnummer/php/commit/3d22e5316d8546ac939e7818cd69118f874152ab'} |
Packagist | GHSA-vrgp-3ph6-2wwq | SQL Injection in Dolibarr | An SQL Injection vulnerability exists in Dolibarr ERP/CRM 13.0.2 (fixed version is 14.0.0) via a POST request to the country_id parameter in an UPDATE statement. | {'CVE-2021-36625'} | 2022-04-13T14:57:08Z | 2022-04-01T00:00:41Z | HIGH | null | {'CWE-89'} | {'https://github.com/Dolibarr/dolibarr', 'https://nvd.nist.gov/vuln/detail/CVE-2021-36625', 'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'} | null | {'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'} | {'https://github.com/Dolibarr/dolibarr/commit/abb1ad6bf0469eccd2b58beb20bdabc18fc36e22'} |
Packagist | GHSA-389p-fchr-q2mg | Path Traversal in ImpressCMS | ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress. | {'CVE-2022-24977'} | 2022-02-25T17:59:00Z | 2022-02-15T00:02:47Z | CRITICAL | null | {'CWE-22'} | {'https://github.com/ImpressCMS/impresscms', 'https://github.com/ImpressCMS/impresscms/compare/1.4.1...v1.4.2', 'https://nvd.nist.gov/vuln/detail/CVE-2022-24977', 'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261', 'https://r0.haxors.org/posts?id=8'} | null | {'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261'} | {'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261'} |
Packagist | GHSA-g92x-8m54-p89v | Cross-Site Request Forgery in snipe-it | snipe-it is vulnerable to Cross-Site Request Forgery (CSRF). | {'CVE-2021-3858'} | 2021-10-22T13:56:56Z | 2021-10-21T17:48:55Z | MODERATE | null | {'CWE-352'} | {'https://github.com/snipe/snipe-it/releases/tag/v5.3.0', 'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3', 'https://github.com/snipe/snipe-it', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3858', 'https://huntr.dev/bounties/a2fac2eb-100d-45b1-9ac7-71847c2f2b6b'} | null | {'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3'} | {'https://github.com/snipe/snipe-it/commit/84c73aae5dcafa9529ceeeda6e8cdda5a42129c3'} |
Packagist | GHSA-jx5q-g37m-h5hj | Client-Side JavaScript Prototype Pollution in oro/platform | ### Summary
By sending a specially crafted request, an attacker could inject properties into existing JavaScript language construct prototypes, such as objects. Later this injection may lead to JS code execution by libraries that are vulnerable to Prototype Pollution.
### Workarounds
Configure WAF to drop requests c... | {'CVE-2021-43852'} | 2022-01-04T22:46:13Z | 2022-01-06T18:29:51Z | MODERATE | null | {'CWE-74', 'CWE-1321'} | {'https://nvd.nist.gov/vuln/detail/CVE-2021-43852', 'https://github.com/oroinc/platform/security/advisories/GHSA-jx5q-g37m-h5hj', 'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9', 'https://github.com/oroinc/platform'} | null | {'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9'} | {'https://github.com/oroinc/platform/commit/62c26936b3adee9c20255dcd9f8ee5c299b464a9'} |
Packagist | GHSA-7322-jrq4-x5hf | File reference keys leads to incorrect hashes on HMAC algorithms | ### Impact
Users of HMAC-based algorithms (HS256, HS384, and HS512) combined with `Lcobucci\JWT\Signer\Key\LocalFileReference` as key are having their tokens issued/validated using the file path as hashing key - instead of the contents.
The HMAC hashing functions take any string as input and, since users can issue an... | {'CVE-2021-41106'} | 2021-09-29T18:04:31Z | 2021-09-29T17:09:40Z | MODERATE | null | {'CWE-345'} | {'https://github.com/lcobucci/jwt', 'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73', 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41106'} | null | {'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73', 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c'} | {'https://github.com/lcobucci/jwt/commit/8175de5b841fbe3fd97d2d49b3fc15c4ecb39a73', 'https://github.com/lcobucci/jwt/commit/c45bb8b961a8e742d8f6b88ef5ff1bd5cca5d01c'} |
Packagist | GHSA-9vwf-54m9-gc4f | snipe-it is vulnerable to Improper Access Control | snipe-it is vulnerable to Improper Access Control | {'CVE-2021-4089'} | 2021-12-15T15:21:35Z | 2021-12-16T14:32:39Z | MODERATE | null | {'CWE-863', 'CWE-284'} | {'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24', 'https://github.com/snipe/snipe-it', 'https://huntr.dev/bounties/19453ef1-4d77-4cff-b7e8-1bc8f3af0862', 'https://nvd.nist.gov/vuln/detail/CVE-2021-4089'} | null | {'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24'} | {'https://github.com/snipe/snipe-it/commit/1699c09758e56f740437674a8d6ba36443399f24'} |
Packagist | GHSA-rphc-h572-2x9f | Cross-site Scripting in showdoc/showdoc | ShowDoc is a tool greatly applicable for an IT team to share documents online. showdoc/showdoc allows .properties files to upload which lead to stored XSS in versions prior to 2.10.4. This allows attackers to execute malicious scripts in the user's browser. This issue was patched in version 2.10.4. There is currently n... | {'CVE-2022-0960'} | 2022-03-24T22:38:55Z | 2022-03-15T00:00:55Z | CRITICAL | null | {'CWE-79', 'CWE-434'} | {'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f', 'https://github.com/star7th/showdoc', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0960', 'https://huntr.dev/bounties/462cd8a7-b1a9-4e93-af71-b56ba1d7ad4e'} | null | {'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f'} | {'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f'} |
Packagist | GHSA-wwgq-9jhf-qgw6 | Cross-Site Request Forgery allowing sending of test emails and generation of node auto-deployment keys | ### Impact
Due to improperly configured CSRF protections on two routes, a malicious user could execute a CSRF-based attack against the following endpoints:
* Sending a test email.
* Generating a node auto-deployment token.
At no point would any data be exposed to the malicious user, this would simply trigger email sp... | {'CVE-2021-41273'} | 2021-11-17T21:08:25Z | 2021-11-18T15:46:57Z | MODERATE | null | {'CWE-352'} | {'https://github.com/pterodactyl/panel/security/advisories/GHSA-wwgq-9jhf-qgw6', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41273', 'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5', 'https://github.com/pterodactyl/panel'} | null | {'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5'} | {'https://github.com/pterodactyl/panel/commit/bf9cbe2c6d5266c6914223e067c56175de7fc3a5'} |
Packagist | GHSA-wc7v-77jr-5c3m | bookstack is vulnerable to Cross-Site Request Forgery (CSRF) | bookstack is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-3944'} | 2021-12-03T15:35:34Z | 2021-12-03T20:38:37Z | LOW | null | {'CWE-352'} | {'https://huntr.dev/bounties/65551490-5ade-49aa-8b8d-274c2ca9fdc9', 'https://github.com/bookstackapp/bookstack', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3944', 'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb'} | null | {'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb'} | {'https://github.com/bookstackapp/bookstack/commit/88e6f93abf54192a69cc8080e0dc6516ee68ccbb'} |
Packagist | GHSA-vwxp-9qmf-w299 | Cross-site Scripting in LiveHelperChat | LiveHelperChat (remdex/livehelperchat in Packagist) has a stored Cross-site Scripting (XSS) vulnerability prior to version 3.93. | {'CVE-2022-0394'} | 2022-02-03T19:18:02Z | 2022-02-01T00:49:48Z | MODERATE | null | {'CWE-79'} | {'https://nvd.nist.gov/vuln/detail/CVE-2022-0394', 'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3', 'https://github.com/livehelperchat/livehelperchat', 'https://huntr.dev/bounties/e13823d0-271c-448b-a0c5-8549ea7ea272'} | null | {'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3'} | {'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3'} |
Packagist | GHSA-rfjc-xrmf-5vvw | Privilege escalation by backend users assigned to the default "Publisher" system role | ### Impact
Backend users with the default "Publisher" system role have access to create & manage users where they can choose which role the new user has. This means that a user with "Publisher" access has the ability to escalate their access to "Developer" access.
### Patches
Issue has been patched in Build 470 (v1.0... | {'CVE-2020-15248'} | 2021-11-19T13:40:25Z | 2020-11-23T19:47:27Z | LOW | null | {'CWE-863', 'CWE-269'} | {'https://github.com/octobercms/october/security/advisories/GHSA-rfjc-xrmf-5vvw', 'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982', 'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829', 'https://github.com/octobercms/october', 'https://nvd.nist.g... | null | {'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829', 'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982'} | {'https://github.com/octobercms/october/commit/4c650bb775ab849e48202a4923bac93bd74f9982', 'https://github.com/octobercms/october/commit/78a37298a4ed4602b383522344a31e311402d829'} |
Packagist | GHSA-xp5q-77mh-6hm2 | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | firefly-iii is vulnerable to Cross-Site Request Forgery (CSRF) | {'CVE-2021-3728'} | 2021-08-24T20:02:07Z | 2021-08-25T14:50:17Z | MODERATE | null | {'CWE-352'} | {'https://huntr.dev/bounties/dd54c5a1-0d4a-4f02-a111-7ce4ddc67a4d', 'https://github.com/firefly-iii/firefly-iii/', 'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e', 'https://nvd.nist.gov/vuln/detail/CVE-2021-3728'} | null | {'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e'} | {'https://github.com/firefly-iii/firefly-iii/commit/14cdce113e0eb8090d09066fcd2b5cf03b5ac84e'} |
Packagist | GHSA-3wwj-wh2w-g4xp | CRLF Injection in microweber | CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11. | {'CVE-2022-0666'} | 2022-02-23T15:04:54Z | 2022-02-19T00:01:35Z | HIGH | null | {'CWE-93'} | {'https://huntr.dev/bounties/7215afc7-9133-4749-8e8e-0569317dbd55', 'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0666', 'https://github.com/microweber/microweber'} | null | {'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128'} | {'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128'} |
Packagist | GHSA-4p92-fv6v-fhfj | Cross-site Scripting in microweber | Microweber prior to 1.2.11 is vulnerable to reflected cross-site scripting. | {'CVE-2022-0723'} | 2022-03-09T20:43:44Z | 2022-02-27T00:00:15Z | MODERATE | null | {'CWE-79'} | {'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5', 'https://github.com/microweber/microweber', 'https://huntr.dev/bounties/16b0547b-1bb3-493c-8a00-5b6a11fca1c5', 'https://nvd.nist.gov/vuln/detail/CVE-2022-0723'} | null | {'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5'} | {'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5'} |
Packagist | GHSA-j5qg-w9jg-3wg3 | Inability to de-op players if listed in ops.txt with non-lowercase letters | ### Impact
Originally reported in iTXTech/Genisys#1188
```txt
PotterHarry98
potterharry98
```
`deop PotterHarry98`
will remove `potterharry98` from the ops.txt but not `PotterHarry98`.
Operator permissions are checked using `Config->exists()` with `lowercase=true`, which will result in a match:
https://github.com/p... | null | 2021-12-16T15:47:47Z | 2021-12-16T18:53:57Z | LOW | null | null | {'https://github.com/pmmp/PocketMine-MP', 'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e', 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-j5qg-w9jg-3wg3', 'https://github.com/pmmp/PocketMine-MP/blob/4.0.3/changelogs/4.0.md#403', 'https://github.com/iTXTech/Genisy... | null | {'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e'} | {'https://github.com/pmmp/PocketMine-MP/commit/4d37b79ff7f9d9452e988387f97919a9a1c4954e'} |
Packagist | GHSA-qv7g-j98v-8pp7 | XSS vulnerability on email template preview page | ### Summary
Email template preview is vulnerable to XSS payload added to email template content. The attacker should have permission to create or edit an email template. For successful payload, execution attacked user should preview a vulnerable email template.
### Workarounds
There are no workarounds that address t... | {'CVE-2021-41236'} | 2022-01-04T17:51:41Z | 2022-01-06T18:34:35Z | MODERATE | null | {'CWE-79'} | {'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a', 'https://github.com/oroinc/platform', 'https://github.com/oroinc/platform/security/advisories/GHSA-qv7g-j98v-8pp7', 'https://nvd.nist.gov/vuln/detail/CVE-2021-41236'} | null | {'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a'} | {'https://github.com/oroinc/platform/commit/2a089c971fc70bc63baf8770d29ee515ce5a415a'} |
Packagist | GHSA-579x-cjvr-cqj9 | Observable Response Discrepancy in Lost Password Service | ### Impact
It is possible to enumerate usernames via the forgot password functionality
### Patches
Update to version `10.1.3` or apply this patch manually: https://github.com/pimcore/pimcore/pull/10223.patch
### Workarounds
Apply https://github.com/pimcore/pimcore/pull/10223.patch manually.
| {'CVE-2021-39189'} | 2021-09-17T18:38:47Z | 2021-09-20T19:53:55Z | MODERATE | null | {'CWE-203', 'CWE-204'} | {'https://github.com/pimcore/pimcore/pull/10223.patch', 'https://github.com/pimcore/pimcore', 'https://nvd.nist.gov/vuln/detail/CVE-2021-39189', 'https://github.com/pimcore/pimcore/security/advisories/GHSA-579x-cjvr-cqj9', 'https://huntr.dev/bounties/12462a99-ebf8-4e39-80b3-54a16caa3f4c/', 'https://github.com/pimcore/p... | null | {'https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce'} | {'https://github.com/pimcore/pimcore/pull/10223/commits/d0a4de39cf05dce6af71f8ca039132bdfcbb0dce'} |
Packagist | GHSA-mr6r-82x4-f4jj | Timing attacks might allow practical recovery of the long-term private key | In elliptic-php versions priot to 1.0.6, Timing attacks might be possible which can result in practical recovery of the long-term private key generated by the library under certain conditions. Leakage of a bit-length of the scalar during scalar multiplication is possible on an elliptic curve which might allow practical... | {'CVE-2019-10764'} | 2021-08-18T22:40:49Z | 2019-11-20T01:34:50Z | HIGH | null | {'CWE-203'} | {'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9', 'https://nvd.nist.gov/vuln/detail/CVE-2019-10764', 'https://minerva.crocs.fi.muni.cz/', 'https://snyk.io/vuln/SNYK-PHP-SIMPLITOELLIPTICPHP-534576'} | null | {'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9'} | {'https://github.com/simplito/elliptic-php/commit/15652609aa55968d56685c2a9120535ccdc00fd9'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.