schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-77hf-23pq-2g7c | 2022-11-03T22:19:38Z | 2022-06-16T00:00:26Z | null | ['CVE-2022-33140'] | Code injection in Apache NiFi and NiFi Registry | The optional ShellUserGroupProvider in Apache NiFi 1.10.0 to 1.16.2 and Apache NiFi Registry 0.6.0 to 1.16.2 does not neutralize arguments for group resolution commands, allowing injection of operating system commands on Linux and macOS platforms. The ShellUserGroupProvider is not included in the default configuration.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi.registry:nifi-registry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '1.16.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi:nifi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33140'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/nifi'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/bzs2pcdjsdrh5039oslmfr9mbs9qqdhr'}, {'type': 'WEB', 'url': 'https://nifi.apache.org/security.html#CVE-2022-33140'}] | {'cwe_ids': ['CWE-74', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:49:10Z', 'nvd_published_at': '2022-06-15T15:15:00Z'} |
1.4.0 | GHSA-54px-mhwv-5v8x | 2022-06-17T00:55:34Z | 2022-06-11T00:00:17Z | null | ['CVE-2022-24429'] | Code injection via SVG file in convert-svg-core | The package convert-svg-core before 0.6.3 are vulnerable to Arbitrary Code Injection when using a specially crafted SVG file. An attacker can read arbitrary files from the file system and then show the file content as a converted PNG file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'convert-svg-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24429'}, {'type': 'WEB', 'url': 'https://github.com/neocotic/convert-svg/issues/84'}, {'type': 'WEB', 'url': 'https://github.com/neocotic/convert-svg/commit/a43dffaab0f1e419d5be84e2e7356b86ffac3cf1'}, {'type': 'PACKAGE', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:55:34Z', 'nvd_published_at': '2022-06-10T20:15:00Z'} |
1.4.0 | GHSA-73pr-g6jj-5hc9 | 2022-07-08T17:05:08Z | 2022-06-29T00:00:27Z | null | ['CVE-2021-3779'] | Externally Controlled Reference to a Resource in Another Sphere in ruby-mysql | A malicious actor can read arbitrary files from a client that uses ruby-mysql to communicate to a rogue MySQL server and issue database queries. In these cases, the server has the option to create a database reply using the LOAD DATA LOCAL statement, which instructs the client to provide additional data from a local fi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'ruby-mysql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3779'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ruby-mysql/CVE-2021-3779.yml'}, {'type': 'WEB', 'url': 'https://www.rapid7.com/blog/post/2022/06/28/cve-2021-3779-ruby-mysql-gem-client-file-read-fixed/'},... | {'cwe_ids': ['CWE-610'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:08:34Z', 'nvd_published_at': '2022-06-28T17:15:00Z'} |
1.4.0 | GHSA-38j3-6fm8-pfgc | 2022-06-23T21:25:08Z | 2022-06-15T00:00:24Z | null | ['CVE-2021-40660'] | Regular expression denial of service in Delight Nashorn Sandbox | An issue was discovered in Delight Nashorn Sandbox. There is an ReDoS vulnerability that can be exploited to launching a denial of service (DoS) attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.javadelight:delight-nashorn-sandbox'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40660'}, {'type': 'WEB', 'url': 'https://github.com/javadelight/delight-nashorn-sandbox/issues/117'}, {'type': 'WEB', 'url': 'https://github.com/javadelight/delight-nashorn-sandbox/commit/9c8c3f3afca35e4dd176c959e1c2c5514c9d3131'}, {'type': 'PACKAG... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:14:44Z', 'nvd_published_at': '2022-06-14T14:15:00Z'} |
1.4.0 | GHSA-49j4-v37g-5gg2 | 2022-07-05T22:59:36Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34204'] | Missing Authorization in Jenkins EasyQA Plugin | A missing permission check in Jenkins EasyQA Plugin 1.0 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.geteasyqa:easyqa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34204'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/easyqa-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2281'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:36Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-958j-443g-7mm7 | 2022-06-02T20:50:21Z | 2022-06-02T20:50:21Z | null | ['CVE-2022-1884'] | OS Command Injection in gogs | ### Impact
The malicious user is able to upload a crafted `config` file into repository's `.git` directory with to gain SSH access to the server. All Windows installations with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129) are a... | [] | [{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-958j-443g-7mm7'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/6968'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/pull/6970'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}, {'type': 'WEB', 'url': 'https... | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:50:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q8v3-7h6q-g39q | 2022-12-05T21:44:51Z | 2022-06-24T00:00:32Z | null | ['CVE-2022-34205'] | Cross-Site Request Forgery in Jenkins Jianliao Notification Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Jianliao Notification Plugin 1.1 and earlier allows attackers to send HTTP POST requests to an attacker-specified URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jianliao'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34205'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jianliao-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2240'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:36Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-v78m-2q7v-fjqp | 2022-07-12T21:59:11Z | 2022-06-22T17:52:51Z | null | ['CVE-2022-31099'] | Uncontrolled Recursion in rulex | ### Impact
When parsing untrusted rulex expressions, the stack may overflow, possibly enabling a Denial of Service attack. This happens when parsing an expression with several hundred levels of nesting, causing the process to abort immediately.
This is a security concern for you, if
- your service parses untrusted rul... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'rulex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rulex-rs/rulex/security/advisories/GHSA-v78m-2q7v-fjqp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31099'}, {'type': 'WEB', 'url': 'https://github.com/rulex-rs/rulex/commit/60aa2dc03a22d69c8800fec81f99c96958a11363'}, {'type': 'PACKAGE', 'url': 'h... | {'cwe_ids': ['CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T17:52:51Z', 'nvd_published_at': '2022-06-27T23:15:00Z'} |
1.4.0 | GHSA-374w-gwqr-fmxg | 2022-07-21T15:23:45Z | 2022-06-17T21:46:14Z | null | ['CVE-2022-33154'] | brotkrueml/schema fails to properly encode user input for output in HTML context, leading to XSS | The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'brotkrueml/schema'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'brotkrueml/schema'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.1'}]}]}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33154'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/brotkrueml/schema/CVE-2022-33154.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/brotkrueml/schema'}, {'type': 'WEB', 'url': 'https://typo3.org/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:46:14Z', 'nvd_published_at': '2022-07-12T22:15:00Z'} |
1.4.0 | GHSA-72r2-rg28-47v9 | 2023-06-13T16:28:21Z | 2022-06-16T23:44:51Z | null | [] | `read` on uninitialized buffer may cause UB (bite::read::BiteReadExpandedExt::read_framed_max) | Affected versions of this crate calls a user provided `Read` implementation on an uninitialized buffer. `Read` on uninitialized buffer is defined as undefined behavior in Rust.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'bite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/hinaria/bite/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/hinaria/bite'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0153.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:44:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7v4j-8wvr-v55r | 2022-06-20T18:24:00Z | 2022-06-16T23:40:38Z | null | [] | `array!` macro is unsound when its length is impure constant | Affected versions of this crate did substitute the array length provided by an user at compile-time multiple times.
When an impure constant expression is passed as an array length (such as a result of an impure procedural macro), this can result in the initialization of an array with uninitialized types, which in turn... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'array-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/xfix/array-macro/commit/d5b63f72090f3809c21ac28f9cfd84f12559bf7d'}, {'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/blob/main/crates/array-macro/RUSTSEC-2022-0017.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/xfix/array-macro'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:40:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-88r9-hfj2-54hv | 2022-12-05T21:56:13Z | 2022-06-24T00:00:32Z | null | ['CVE-2022-34198'] | Cross-site Scripting in Jenkins Stash Branch Parameter Plugin | Jenkins Stash Branch Parameter Plugin 0.3.0 and earlier does not escape the name and description of Stash Branch parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:StashBranchParameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34198'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/stash-branch-parameters-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:44Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-pmcv-mgcf-rvxg | 2022-06-16T23:51:32Z | 2022-06-16T23:51:32Z | null | [] | Non-aligned u32 read in Chacha20 encryption and decryption | The implementation does not enforce alignment requirements on input slices while incorrectly assuming 4-byte alignment through an unsafe call to `std::slice::from_raw_parts_mut`, which breaks the contract and introduces undefined behavior.
This affects Chacha20 encryption and decryption in crypto2.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'crypto2'}, 'ecosystem_specific': {'affected_functions': ['crypto2::streamcipher::Chacha20::decrypt_slice', 'crypto2::streamcipher::Chacha20::encrypt_slice', 'crypto2::streamcipher::xor_si512_inplace']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'l... | [{'type': 'WEB', 'url': 'https://github.com/shadowsocks/crypto2/issues/27'}, {'type': 'PACKAGE', 'url': 'https://github.com/shadowsocks/crypto2'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0121.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:51:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5hfm-g799-wjw6 | 2022-06-29T22:42:13Z | 2022-06-21T00:00:48Z | null | ['CVE-2017-20058'] | Cross site scripting in Elefant CMS | A vulnerability classified as problematic was found in Elefant CMS 1.3.12-RC. Affected by this vulnerability is an unknown functionality of the component Version Comparison. The manipulation leads to basic cross site scripting (Persistent). The attack can be launched remotely. Upgrading to version 1.3.13 is able to add... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'elefant/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20058'}, {'type': 'PACKAGE', 'url': 'https://github.com/jbroadway/elefant'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.97255'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Feb/36'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:42:13Z', 'nvd_published_at': '2022-06-20T05:15:00Z'} |
1.4.0 | GHSA-xwj7-29j7-rw76 | 2022-06-29T22:42:02Z | 2022-06-21T00:00:48Z | null | ['CVE-2017-20057'] | Cross site scripting in Elefant CMS | A vulnerability classified as problematic has been found in Elefant CMS 1.3.12-RC. Affected is an unknown function. The manipulation of the argument username leads to basic cross site scripting (Persistent). It is possible to launch the attack remotely. Upgrading to version 1.3.13 is able to address this issue. It is r... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'elefant/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20057'}, {'type': 'PACKAGE', 'url': 'https://github.com/jbroadway/elefant'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.97254'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Feb/36'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:42:02Z', 'nvd_published_at': '2022-06-20T05:15:00Z'} |
1.4.0 | GHSA-7v28-g2pq-ggg8 | 2022-08-10T22:15:39Z | 2022-06-17T01:16:03Z | null | [] | Ghost vulnerable to remote code execution in locale setting change | ### Impact
A [vulnerability](https://www.cve.org/CVERecord?id=CVE-2022-24785) in an upstream library means an authenticated attacker can abuse locale input to execute arbitrary commands from a file that has previously been uploaded using the file upload functionality in the post editor.
### Patches
Fixed in 5.2.3, a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.48.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-7v28-g2pq-ggg8'}, {'type': 'PACKAGE', 'url': 'https://github.com/TryGhost/Ghost'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:16:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cxcc-q839-2cw9 | 2023-06-13T17:06:58Z | 2022-06-16T23:48:53Z | null | [] | columnar: `Read` on uninitialized buffer may cause UB (ColumnarReadExt::read_typed_vec()) | Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation (`ColumnarReadExt::read_typed_vec()`).
Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer.
Reading from unini... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'columnar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.19'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/frankmcsherry/columnar/issues/6'}, {'type': 'PACKAGE', 'url': 'https://github.com/frankmcsherry/columnar'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0087.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:48:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-52vj-mr2j-f8jh | 2022-06-03T22:20:22Z | 2022-06-03T00:00:58Z | null | ['CVE-2020-28246'] | Server-Side Template Injection in formio | A Server-Side Template Injection (SSTI) was discovered in Form.io 2.0.0. This leads to Remote Code Execution during deletion of the default Email template URL. | [] | [{'package': {'ecosystem': 'npm', 'name': 'formio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28246'}, {'type': 'WEB', 'url': 'https://github.com/formio/enterprise-release/blob/master/API-Server-Change-Log.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/formio/formio'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:20:22Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-f67m-9j94-qv9j | 2022-06-16T23:59:29Z | 2022-06-16T23:59:29Z | null | [] | Parser creates invalid uninitialized value | Affected versions of this crate called `mem::uninitialized()` in the HTTP1 parser to create values of type `httparse::Header` (from the `httparse` crate).
This is unsound, since `Header` contains references and thus must be non-null.
The flaw was corrected by avoiding the use of `mem::uninitialized()`, using `MaybeUn... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'hyper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.12'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/hyperium/hyper/pull/2545'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyperium/hyper'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0022.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:59:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qx2j-85q5-ffp8 | 2022-07-07T17:14:28Z | 2022-06-24T00:00:32Z | null | ['CVE-2022-34296'] | Query predicate bypass in Zalando Skipper | In Zalando Skipper before 0.13.218, a query predicate could be bypassed via a prepared request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/zalando/skipper'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.218'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34296'}, {'type': 'WEB', 'url': 'https://github.com/zalando/skipper/pull/2028'}, {'type': 'WEB', 'url': 'https://github.com/zalando/skipper/commit/998a658ce5a68a336a98f4e63e4371e200860dfc'}, {'type': 'PACKAGE', 'url': 'https://github.com/zalando/sk... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:23:27Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-pgw7-wx7w-2w33 | 2022-07-29T18:13:25Z | 2022-06-17T01:02:29Z | null | ['CVE-2022-32210'] | ProxyAgent vulnerable to MITM | ### Description
`Undici.ProxyAgent` never verifies the remote server's certificate, and always exposes all request & response data to the proxy. This unexpectedly means that proxies can MitM all HTTPS traffic, and if the proxy's URL is HTTP then it also means that nominally HTTPS requests are actually sent via plain-t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'undici'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.2'}, {'fixed': '5.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.5.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/nodejs/undici/security/advisories/GHSA-pgw7-wx7w-2w33'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32210'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1583680'}, {'type': 'PACKAGE', 'url': 'https://github.com/nodejs/undici'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:02:29Z', 'nvd_published_at': '2022-07-14T15:15:00Z'} |
1.4.0 | GHSA-pf6p-25r2-fx45 | 2022-08-12T21:03:44Z | 2022-06-29T00:00:27Z | null | ['CVE-2022-0085'] | Server-Side Request Forgery in dompdf/dompdf | Server-Side Request Forgery (SSRF) in GitHub repository dompdf/dompdf prior to 2.0.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dompdf/dompdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0085'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/commit/bb1ef65011a14730b7cfbe73506b4bb8a03704bd'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/dompdf/dompdf/CVE-2022-0085.yaml'}, {'type':... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:12:46Z', 'nvd_published_at': '2022-06-28T15:15:00Z'} |
1.4.0 | GHSA-xwx5-5c9g-x68x | 2022-06-10T19:53:55Z | 2022-06-10T19:53:55Z | null | ['CVE-2022-31045'] | Ill-formed headers may lead to unexpected behavior in Istio | ### Impact
Ill-formed headers sent to Envoy in certain configurations can lead to unexpected memory access resulting in undefined behavior or crashing.
You are at most risk if you have an Istio ingress Gateway exposed to external traffic.
### Patches
1.12.8, 1.13.5, 1.14.1
### Workarounds
No.
### References
More de... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.18'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.5'}]}]}, {'package': {'e... | [{'type': 'WEB', 'url': 'https://github.com/istio/istio/security/advisories/GHSA-xwx5-5c9g-x68x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31045'}, {'type': 'PACKAGE', 'url': 'https://github.com/istio/istio'}, {'type': 'WEB', 'url': 'https://istio.io/latest/news/security/istio-security-20... | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-10T19:53:55Z', 'nvd_published_at': '2022-06-09T21:15:00Z'} |
1.4.0 | GHSA-hmx9-jm3v-33hv | 2023-06-13T17:07:52Z | 2022-06-16T23:46:08Z | null | [] | InputStream::read_exact : `Read` on uninitialized buffer causes UB | Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation.
Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer.
Reading from uninitialized memory produces undefined val... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'buffoon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/carllerche/buffoon/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/carllerche/buffoon'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0154.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:46:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wjh9-344g-vc49 | 2022-06-15T18:57:13Z | 2022-06-09T00:00:24Z | null | ['CVE-2022-1997'] | Cross-site Scripting in RosarioSIS | Cross-site Scripting (XSS) - Stored in GitHub repository francoisjacquet/rosariosis prior to 9.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1997'}, {'type': 'WEB', 'url': 'https://github.com/francoisjacquet/rosariosis/commit/6b22c0b5b40fad891c8cf9e7eeff3e42a35c0bf8'}, {'type': 'PACKAGE', 'url': 'https://github.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://huntr.dev/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:50:39Z', 'nvd_published_at': '2022-06-08T14:15:00Z'} |
1.4.0 | GHSA-hgm9-pww2-93pc | 2022-06-29T22:42:30Z | 2022-06-21T00:00:48Z | null | ['CVE-2017-20061'] | Cross site scripting in Elefant CMS | A vulnerability has been found in Elefant CMS 1.3.12-RC and classified as problematic. This vulnerability affects unknown code of the file /admin/extended. The manipulation of the argument name with the input %3Cimg%20src=no%20onerror=alert(1)%3E leads to basic cross site scripting (Reflected). The attack can be initia... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'elefant/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20061'}, {'type': 'PACKAGE', 'url': 'https://github.com/jbroadway/elefant'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.97258'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Feb/36'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:42:30Z', 'nvd_published_at': '2022-06-20T05:15:00Z'} |
1.4.0 | GHSA-5q86-62xr-3r57 | 2022-06-29T21:49:09Z | 2022-06-17T01:02:56Z | null | ['CVE-2022-31054'] | Uses of deprecated API can be used to cause DoS in user-facing endpoints | ### Impact
Several `HandleRoute` endpoints make use of the deprecated `ioutil.ReadAll()`. `ioutil.ReadAll()` reads all the data into memory. As such, an attacker who sends a large request to the Argo Events server will be able to crash it and cause denial of service.
Eventsources susceptible to an out-of-memory denial... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-events'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-events/security/advisories/GHSA-5q86-62xr-3r57'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31054'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-events/issues/1946'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/a... | {'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:02:56Z', 'nvd_published_at': '2022-06-13T20:15:00Z'} |
1.4.0 | GHSA-9hpw-r23r-xgm5 | 2022-06-17T00:25:46Z | 2022-06-17T00:25:46Z | null | [] | Data race in `Iter` and `IterMut` | In the affected version of this crate, `{Iter, IterMut}::next` used a weaker memory ordering when loading values than what was required, exposing a potential data race
when iterating over a `ThreadLocal`'s values.
Crates using `Iter::next`, or `IterMut::next` are affected by this issue.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'thread_local'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Amanieu/thread_local-rs/issues/33'}, {'type': 'PACKAGE', 'url': 'https://github.com/Amanieu/thread_local-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0006.html'}] | {'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:25:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rcxc-3w2m-mp8h | 2022-06-22T21:22:42Z | 2022-06-22T21:22:42Z | null | ['CVE-2022-31604'] | Unsafe deserialisation in the PKI implementation scheme of NVFlare | ### Impact
NVFLARE contains a vulnerability in its PKI implementation module, where The CA credentials are transported via pickle and no safe deserialization. The deserialization of Untrusted Data may allow an unprivileged network attacker to cause Remote Code Execution, Denial Of Service, and Impact to both Confidenti... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'nvflare'}, 'ecosystem_specific': {'affected_functions': ['nvflare.lighter.impl.cert.CertBuilder.initialize', 'nvflare.lighter.impl.cert.CertBuilder._build_write_cert_pair', 'nvflare.lighter.impl.cert.CertBuilder.finalize']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intro... | [{'type': 'WEB', 'url': 'https://github.com/NVIDIA/NVFlare/security/advisories/GHSA-rcxc-3w2m-mp8h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31604'}, {'type': 'WEB', 'url': 'https://github.com/NVIDIA/NVFlare/commit/fd018eea9dff925a765079a94c2f017920fcda67'}, {'type': 'PACKAGE', 'url': 'h... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T21:22:42Z', 'nvd_published_at': '2022-07-01T18:15:00Z'} |
1.4.0 | GHSA-77mv-4rg7-r8qv | 2022-06-17T21:43:45Z | 2022-06-17T21:43:45Z | null | ['CVE-2022-31070'] | Potential Sensitive Cookie Exposure in NPM Packages @finastra/nestjs-proxy, @ffdc/nestjs-proxy | The nestjs-proxy library did not have a way to block sensitive cookies (e.g. session cookies) from being forwarded to backend services configured by the application developer. This could have led to sensitive cookies being inadvertently exposed to such services that should not see them.
The patched version now blocks ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@finastra/nestjs-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Finastra/finastra-nodejs-libs/security/advisories/GHSA-77mv-4rg7-r8qv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31070'}, {'type': 'WEB', 'url': 'https://github.com/Finastra/finastra-nodejs-libs/pull/232'}, {'type': 'PACKAGE', 'url': 'https://gi... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:43:45Z', 'nvd_published_at': '2022-06-15T19:15:00Z'} |
1.4.0 | GHSA-jpp7-7chh-cf67 | 2022-07-07T17:16:00Z | 2022-06-28T00:01:01Z | null | ['CVE-2022-2218'] | Cross site scripting in parse-url | Cross-site Scripting (XSS) - Stored in GitHub repository ionicabizau/parse-url prior to 7.0.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2218'}, {'type': 'WEB', 'url': 'https://github.com/ionicabizau/parse-url/commit/21c72ab9412228eea753e2abc48f8962707b1fe3'}, {'type': 'PACKAGE', 'url': 'https://github.com/ionicabizau/parse-url'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:05:51Z', 'nvd_published_at': '2022-06-27T13:15:00Z'} |
1.4.0 | GHSA-5gc4-cx9x-9c43 | 2022-06-20T22:01:28Z | 2022-06-09T00:00:29Z | null | ['CVE-2022-21122'] | Code Injection in metacalc | The package metacalc before 0.0.2 is vulnerable to Arbitrary Code Execution when it exposes JavaScript's Math class to the v8 context. As the Math class is exposed to user-land, it can be used to get access to JavaScript's Function constructor. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'metacalc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21122'}, {'type': 'WEB', 'url': 'https://github.com/metarhia/metacalc/pull/16'}, {'type': 'WEB', 'url': 'https://github.com/metarhia/metacalc/commit/625c23d63eabfa16fc815f5832b147b08d2144bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/metarhia... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:50:50Z', 'nvd_published_at': '2022-06-08T09:15:00Z'} |
1.4.0 | GHSA-28p5-7rg4-8v99 | 2023-06-13T17:33:19Z | 2022-06-16T23:59:12Z | null | [] | Reading on uninitialized buffer may cause UB ( `gfx_auxil::read_spirv()` ) | Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation.
Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer.
Reading from uninitialized memory produces undefined val... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'gfx-auxil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.10.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gfx-rs/gfx/issues/3567'}, {'type': 'PACKAGE', 'url': 'https://github.com/gfx-rs/gfx'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0091.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:59:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jhqp-vf4w-rpwq | 2022-06-21T22:51:05Z | 2022-06-21T22:51:05Z | null | ['CVE-2022-31016'] | DoS through large manifest files in Argo CD | ### Impact
All versions of Argo CD starting with v0.7.0 are vulnerable to an uncontrolled memory consumption bug, allowing an authorized malicious user to crash the [repo-server](https://argo-cd.readthedocs.io/en/stable/operator-manual/architecture/#repository-server) service. The repo-server is a critical component o... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '2.1.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.7'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'range... | [{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-jhqp-vf4w-rpwq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31016'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}] | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T22:51:05Z', 'nvd_published_at': '2022-06-25T08:15:00Z'} |
1.4.0 | GHSA-3r95-23jp-mhvg | 2022-06-24T19:55:29Z | 2022-06-17T20:55:48Z | null | ['CVE-2022-31048'] | Cross-Site Scripting in TYPO3's Form Framework | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (4.9)
### Problem
It has been discovered that the Form Designer backend module of the Form Framework is vulnerable to cross-site scripting. A valid backend user account with access to the form module is needed to exploit this vulnerabili... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.47'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.35'}]}]},... | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-3r95-23jp-mhvg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31048'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/6f2554dc4ea0b670fd5599c54fd788d4db96c4a0'}, {'type': 'WEB', 'url': 'https://git... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T20:55:48Z', 'nvd_published_at': '2022-06-14T21:15:00Z'} |
1.4.0 | GHSA-q56h-x9h5-q53c | 2022-06-17T21:48:55Z | 2022-06-10T00:00:56Z | null | ['CVE-2022-31830'] | Server-Side Request Forgery in kityminder | Kity Minder v1.3.5 was discovered to contain a Server-Side Request Forgery (SSRF) via the init function at ImageCapture.class.php. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'kityminder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31830'}, {'type': 'WEB', 'url': 'https://github.com/fex-team/kityminder/issues/345'}, {'type': 'PACKAGE', 'url': 'https://github.com/fex-team/kityminder'}] | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:48:55Z', 'nvd_published_at': '2022-06-09T14:15:00Z'} |
1.4.0 | GHSA-gwpf-95jc-63rv | 2022-06-17T01:01:48Z | 2022-06-03T00:00:41Z | null | ['CVE-2022-1982'] | Uncontrolled Resource Consumption in Mattermost server | Uncontrolled resource consumption in Mattermost version 6.6.0 and earlier allows an authenticated attacker to crash the server via a crafted SVG attachment on a post. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.6.0'}, {'fixed': '6.6.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1982'}, {'type': 'WEB', 'url': 'https://github.com/mattermost/mattermost-server/pull/19988'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost-server'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:01:48Z', 'nvd_published_at': '2022-06-02T18:15:00Z'} |
1.4.0 | GHSA-c7q8-m4xw-c674 | 2022-07-14T21:36:35Z | 2022-06-29T22:09:53Z | null | ['CVE-2022-24444'] | Hybridsessions does not expire session id on logout | When using the hybridsessions module is used without the session-manager module installed and sessions IDs are saved to disk, unexpired SessionIDs of logged out users can still be used to make authenticated requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/hybridsessions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.4.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/hybridsessions'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24444'}, {'type': 'WEB', 'url': 'https://docs.silverstripe.org/en/4/changelogs/4.10.1/'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/s... | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:09:53Z', 'nvd_published_at': '2022-06-28T22:15:00Z'} |
1.4.0 | GHSA-3885-8gqc-3wpf | 2022-07-08T17:03:07Z | 2022-06-14T21:57:52Z | null | ['CVE-2022-30184'] | Potential leak of NuGet.org API key | ### Description
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0 and .NET Core 3.1, NuGet (NuGet.exe, NuGet.Commands, NuGet.CommandLine, NuGet.CommandLine.XPlat version range from 3.5.0 to 6.2.0). This advisory also provides guidance on what developers can do to u... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'NuGet.Commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '4.9.5'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'NuGet.CommandLine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.0'}, {'fixed': '4.9.5'}]}]}, {'pack... | [{'type': 'WEB', 'url': 'https://github.com/NuGet/NuGet.Client/security/advisories/GHSA-3885-8gqc-3wpf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30184'}, {'type': 'PACKAGE', 'url': 'https://github.com/NuGet/NuGet.Client'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-14T21:57:52Z', 'nvd_published_at': '2022-06-15T22:15:00Z'} |
1.4.0 | GHSA-4263-q746-94mw | 2022-06-20T22:35:46Z | 2022-06-18T00:00:20Z | null | ['CVE-2022-22138'] | Uncontrolled Resource Consumption in fast-string-search | All versions of package fast-string-search are vulnerable to Denial of Service (DoS) when computations are incorrect for non-string inputs. One can cause the V8 to attempt reading from non-permitted locations and cause a segmentation fault due to the violation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'fast-string-search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22138'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-FASTSTRINGSEARCH-2392367'}] | {'cwe_ids': ['CWE-400', 'CWE-682'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:35:46Z', 'nvd_published_at': '2022-06-17T20:15:00Z'} |
1.4.0 | GHSA-q579-9wp9-gfp2 | 2023-06-13T20:10:22Z | 2022-06-17T00:14:18Z | null | [] | Window can read out of bounds if Read instance returns more bytes than buffer size | `rdiff` performs a diff of two provided strings or files. As part of its reading code it uses the return value of a `Read` instance to set the length of its internal character vector.
If the `Read` implementation claims that it has read more bytes than the length of the provided buffer, the length of the vector will b... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'rdiff'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/dyule/rdiff/issues/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/dyule/rdiff'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0094.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:14:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6923-546p-6rrc | 2022-12-05T22:16:44Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34189'] | Cross-site Scripting in Jenkins Image Tag Parameter Plugin | Jenkins Image Tag Parameter Plugin 1.10 and earlier does not escape the name and description of Image Tag parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that p... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:image-tag-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34189'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/image-tag-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:33Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-g5fm-jp9v-2432 | 2022-07-08T17:05:36Z | 2022-06-21T20:06:36Z | null | ['CVE-2022-31093'] | Improper Handling of `callbackUrl` parameter in next-auth | ### Impact
An attacker can send a request to an app using NextAuth.js with an invalid `callbackUrl` query parameter, which internally we convert to a `URL` object. The URL instantiation would fail due to a malformed URL being passed into the constructor, causing it to throw an unhandled error which led to our **API ro... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.29.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.5.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-g5fm-jp9v-2432'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31093'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/commit/25517b73153332d948114bacdff3b5908de91d85'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-754'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:06:36Z', 'nvd_published_at': '2022-06-27T22:15:00Z'} |
1.4.0 | GHSA-x95w-qf3m-pqpx | 2022-12-05T22:22:26Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34187'] | Cross-site Scripting in Jenkins Filesystem List Parameter Plugin | Jenkins Filesystem List Parameter Plugin 0.0.7 and earlier does not escape the name and description of File system objects list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnera... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'aendter.jenkins.plugins:filesystem-list-parameter-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34187'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/filesystem-list-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:22Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-jhfv-8936-g652 | 2022-12-05T22:18:07Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34188'] | Cross-site Scripting in Jenkins Hidden Parameter Plugin | Jenkins Hidden Parameter Plugin 0.0.4 and earlier does not escape the name and description of Hidden Parameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:hidden-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34188'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/hidden-parameter-plugin/commit/b1cf577b0fe6c5db1e25031a653d84dc424e6bb9#diff-4ef68932c4bd2675faf307ce8adc92598e41c5aed65cc7bf9d86cc8d41010eedR5-R6'}, {'type': 'PACKAGE', 'url': 'https://... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:25Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-342c-vcff-2ff2 | 2022-06-02T20:53:43Z | 2022-06-02T20:53:43Z | null | [] | Login timing attack in ezsystems/ezplatform-kernel | Ibexa DXP is using random execution time to hinder timing attacks against user accounts, a method of discovering whether a given account exists in a system without knowing its password, thus affecting privacy. This implementation was found to not be good enough in some situations. The fix replaces this with constant ti... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.19'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-kernel/security/advisories/GHSA-342c-vcff-2ff2'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-006-vulnerabilities-in-page-builder-login-and-commerce'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezpl... | {'cwe_ids': ['CWE-208'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:53:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pv38-mqpp-v72h | 2022-12-05T22:14:30Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34191'] | Cross-site Scripting in Jenkins NS-ND Integration Performance Publisher Plugin | Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.77 and earlier does not escape the name of NetStorm Test parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability req... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:cavisson-ns-nd-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.0.129'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34191'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin/commit/5b6dc5957edc3eff1b7ef2c3b52264524161b734'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin/commit/6321f09... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:11Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-85q9-7467-r53q | 2022-06-17T21:51:45Z | 2022-06-17T21:51:45Z | null | [] | XSS Vulnerability in Markdown Editor | ### Impact
InvenTree uses [EasyMDE](https://github.com/Ionaru/easy-markdown-editor) for displaying markdown text in various places (e.g. for the various "notes" fields associated with various models).
By default, EasyMDE does not sanitize input data, and it is possible for malicious code to be injected into the markd... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'inventree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.7.3'}}] | [{'type': 'WEB', 'url': 'https://github.com/inventree/InvenTree/security/advisories/GHSA-85q9-7467-r53q'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:51:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4hpr-hh77-6q9p | 2022-06-17T21:03:23Z | 2022-06-10T00:00:55Z | null | ['CVE-2022-2036'] | Cross site scripting in francoisjacquet/rosariosis | A Cross-site Scripting (XSS) vulnerability exists in in GitHub repository francoisjacquet/rosariosis prior to 9.1. HTML entities are not properly decoded from the URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2036'}, {'type': 'WEB', 'url': 'https://github.com/francoisjacquet/rosariosis/commit/6e213b17e6ac3a3961e1eabcdaba1c892844398a'}, {'type': 'PACKAGE', 'url': 'https://github.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://huntr.dev/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:03:23Z', 'nvd_published_at': '2022-06-09T17:15:00Z'} |
1.4.0 | GHSA-26qj-cr27-r5c4 | 2023-07-10T13:04:36Z | 2022-06-15T21:24:14Z | null | ['CVE-2022-31071'] | Octopoller gem published with world-writable files | ### Impact
Version [0.2.0](https://rubygems.org/gems/octopoller/versions/0.2.0) of the octopoller gem was published containing world-writeable files. Specifically, the gem was packed with files having their permissions set to `-rw-rw-rw-` (i.e. 0666) instead of `rw-r--r--` (i.e. 0644).
This means everyone who is not... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'octopoller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.3.0'}]}], 'versions': ['0.2.0']}] | [{'type': 'WEB', 'url': 'https://github.com/octokit/octopoller.rb/security/advisories/GHSA-26qj-cr27-r5c4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31071'}, {'type': 'WEB', 'url': 'https://github.com/octokit/octopoller.rb/commit/abed2b8d05abe2cc3eb6bdfb34e53d465e7c7874'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-276'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-15T21:24:14Z', 'nvd_published_at': '2022-06-15T23:15:00Z'} |
1.4.0 | GHSA-pj96-4jhv-v792 | 2022-06-02T20:46:30Z | 2022-06-02T20:46:30Z | null | [] | Cross site scripting via cookies in gogs | ### Impact
There is no known practical impact other than it is just possible to manipulate CSRF cookie and XSS the malicious user self.
### Patches
Invalid characters of CSRF tokens are stripped after reading cookie. Users should upgrade to 0.12.8 or the latest 0.13.0+dev.
### Workarounds
No need for workarounds.
... | [] | [{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-pj96-4jhv-v792'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/6953'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}] | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:46:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3jhm-87m6-x959 | 2022-06-25T07:12:08Z | 2022-06-25T07:12:08Z | null | [] | Path traversal mitigation bypass in OctoRPKI | ### Impact
The existing URI path filters in OctoRPKI (version < 1.4.3) mitigating Path traversal vulnerability could be bypassed by an attacker. In case a malicious TAL file is parsed, it was possible to write files outside the base cache folder.
### Patches
The issue was fixed in version 1.4.3
### References
[CVE-20... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki/cmd/octorpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-3jhm-87m6-x959'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-cqh2-vc2f-q4fh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3907'}, {'type': 'PACKAGE', 'url': 'http... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:12:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cxgw-r5jg-7xwq | 2022-07-11T19:27:57Z | 2022-06-30T00:00:29Z | null | ['CVE-2022-2073'] | Code injection in grav | Grav is vulnerable to Server Side Template Injection via Twig. According to a previous vulnerability report, Twig should not render dangerous functions by default, such as system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.34'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2073'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/9d6a2dba09fd4e56f5cdfb9a399caea355bfeb83'}, {'type': 'PACKAGE', 'url': 'https://github.com/getgrav/grav'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3ef640e6-9e25-4ecb-... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:13:18Z', 'nvd_published_at': '2022-06-29T19:15:00Z'} |
1.4.0 | GHSA-3fvg-4v2m-98jf | 2022-07-05T21:25:54Z | 2022-06-25T07:19:06Z | null | ['CVE-2022-25898'] | JWS and JWT signature validation vulnerability with special characters | ### Impact
Jsrsasign supports JWS(JSON Web Signatures) and JWT(JSON Web Token) validation. However JWS or JWT signature with non Base64URL encoding special characters or number escaped characters may be validated as valid by mistake.
For example, even if a string of non Base64URL encoding characters such as `!@$%` or... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jsrsasign'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.0'}, {'fixed': '10.5.25'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25898'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/commit/4536a6e9e8bcf1a644ab7c07ed96e453347dae41'}, {'type': 'WEB', 'url': 'https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-25898'}, {'type': 'PACKAGE', 'url': 'https://githu... | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:19:06Z', 'nvd_published_at': '2022-07-01T20:15:00Z'} |
1.4.0 | GHSA-5hh2-f4h9-446g | 2022-12-05T22:24:22Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34185'] | Cross-site Scripting in Jenkins Date Parameter Plugin | Jenkins Date Parameter Plugin 0.0.4 and earlier does not escape the name and description of Date parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'me.leejay.jenkins:date-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34185'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/date-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:18Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-67hm-27mx-9cg7 | 2022-06-23T06:44:34Z | 2022-06-13T00:00:19Z | null | ['CVE-2021-41641'] | Link Following in Deno | Deno <=1.14.0 file sandbox does not handle symbolic links correctly. When running Deno with specific write access, the Deno.symlink method can be used to gain access to any directory. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'deno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41641'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/issues/12152'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/pull/12554'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/commit/d44011a69e0674acfa9c59bd7ad7f05... | {'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:44:34Z', 'nvd_published_at': '2022-06-12T13:15:00Z'} |
1.4.0 | GHSA-vhfw-v69p-crcw | 2022-09-01T20:11:21Z | 2022-06-17T21:44:58Z | null | ['CVE-2022-29864'] | Uncontrolled Resource Consumption in OPCFoundation.NetStandard.Opc.Ua.Core | A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to cause a server to trigger an out of memory exception by sending a large number of message chunks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.368.58'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.368.53'}}] | [{'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-vhfw-v69p-crcw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29864'}, {'type': 'WEB', 'url': 'https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:44:58Z', 'nvd_published_at': '2022-06-16T18:15:00Z'} |
1.4.0 | GHSA-62wf-24c4-8r76 | 2022-12-06T00:12:32Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34170'] | Cross-site Scripting vulnerability in Jenkins | Since Jenkins 2.320 and LTS 2.332.1, help icon tooltips no longer escape the feature name, effectively undoing the fix for [SECURITY-1955](https://www.jenkins.io/security/advisory/2020-08-12/#SECURITY-1955).
This vulnerability is known to be exploitable by attackers with Job/Configure permission.
Jenkins 2.356, LTS 2... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.350'}, {'fixed': '2.356'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.320'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34170'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2781'}] | {'cwe_ids': ['CWE-22', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T00:12:32Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-w24x-87mr-4r23 | 2022-06-25T07:21:52Z | 2022-06-24T00:00:30Z | null | ['CVE-2022-22980'] | SpEL Injection in Spring Data MongoDB | A Spring Data MongoDB application is vulnerable to SpEL Injection when using @Query or @Aggregation-annotated query methods with SpEL expressions that contain query parameter placeholders for value binding if the input is not sanitized. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-mongodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.4.0'}, {'fixed': '3.4.1'}]}], 'versions': ['3.4.0']}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-mongodb'}, 'ranges': [{'type':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22980'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-22980'}] | {'cwe_ids': ['CWE-917'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:21:52Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-67mx-jc2f-jgjm | 2022-06-17T19:21:46Z | 2022-06-08T22:34:21Z | null | ['CVE-2022-1986'] | OS Command Injection in file editor in Gogs | ### Impact
The malicious user is able to update a crafted `config` file into repository's `.git` directory in combination with crafted file deletion to gain SSH access to the server. All installations with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-67mx-jc2f-jgjm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1986'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/38aff73251cc46ced96dd608dab6190415032a82'}, {'type': 'PACKAGE', 'url': 'https://gith... | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:34:21Z', 'nvd_published_at': '2022-06-09T17:15:00Z'} |
1.4.0 | GHSA-v6h8-5cp2-j9w4 | 2022-07-05T22:59:40Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34206'] | Missing Authorization in Jenkins Jianliao Notification Plugin | A missing permission check in Jenkins Jianliao Notification Plugin 1.1 and earlier allows attackers with Overall/Read permission to send HTTP POST requests to an attacker-specified URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jianliao'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34206'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2240'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:40Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-x9jp-4w8m-4f3c | 2022-06-10T19:51:18Z | 2022-06-10T19:51:18Z | null | [] | Cross Site Scripting vulnerability in django-jsonform's admin form. | ### Description
django-jsonform stores the raw JSON data of the db field in a hidden textarea on the admin page. However, that data was kept in the textarea after unescaping it using the `safe` template filter. This opens up possibilities for XSS attacks.
This only affects the admin pages where the django-jsonform is... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-jsonform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/bhch/django-jsonform/security/advisories/GHSA-x9jp-4w8m-4f3c'}, {'type': 'PACKAGE', 'url': 'https://github.com/bhch/django-jsonform'}] | {'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-10T19:51:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2gqg-2rg7-gh33 | 2022-06-15T19:47:49Z | 2022-06-03T00:01:06Z | null | ['CVE-2022-29711'] | Cross site scripting in librenms | LibreNMS v22.3.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component /Table/GraylogController.php. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29711'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/13931'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/cc6112b8fb36039b862b42d86eb79ef7ee89d31b'}, {'type': 'PACKAGE', 'url': 'https://github.com/libre... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:28:33Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-5phc-849h-vcxg | 2023-06-13T17:07:59Z | 2022-06-16T23:45:49Z | null | [] | `Read` on uninitialized buffer can cause UB (impl of `ReadKVExt`) | Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation.
Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer.
Reading from uninitialized memory produces undefined val... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'bronzedb-protocol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Hexilee/BronzeDB/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/Hexilee/BronzeDB'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0084.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:45:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5h75-pvq4-82c9 | 2022-06-23T17:49:22Z | 2022-06-23T00:00:33Z | null | ['CVE-2022-23080'] | Server-Side Request Forgery in Directus | Directus versions v9.0.0-beta.2 through 9.6.0 are vulnerable to server-side request forgery (SSRF) in the media upload functionality, which allows a low privileged user to perform internal network port scans. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'directus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-beta.2'}, {'fixed': '9.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23080'}, {'type': 'WEB', 'url': 'https://github.com/directus/directus/commit/6da3f1ed5034115b1da00440008351bf0d808d83'}, {'type': 'PACKAGE', 'url': 'https://github.com/directus/directus'}, {'type': 'WEB', 'url': 'https://www.mend.io/vulnerability-d... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T17:49:22Z', 'nvd_published_at': '2022-06-22T16:15:00Z'} |
1.4.0 | GHSA-gfg9-x6px-r7gr | 2022-06-16T23:09:17Z | 2022-06-16T23:09:17Z | null | [] | Library exclusively intended to obfuscate code. | This crate allows you to write safe functions with unsafe bodies without the `unsafe` keyword.
The value this adds is questionable, and hides `unsafe` usages from naive analysis.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'plutonium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.2'}]}]}] | [{'type': 'PACKAGE', 'url': 'https://github.com/mxxo/plutonium'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0011.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:09:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-39r3-h8q6-2phq | 2022-12-05T23:25:33Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34178'] | Reflected Cross site scripting in Jenkins Embeddable Build Status Plugin | Jenkins Embeddable Build Status Plugin 2.0.3 allows specifying a 'link' query parameter that build status badges will link to, without restricting possible values, resulting in a reflected cross-site scripting (XSS) vulnerability.
Embeddable Build Status Plugin 2.0.4 limits URLs to `http` and `https` protocols and cor... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:embeddable-build-status'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34178'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/embeddable-build-status-plugin/commit/0fc4a199506328b08dcd0aca572a2ca79ca38714'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/embeddable-build-status-plugin'}, {'type': 'WEB... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:54Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-rq99-93c5-33f6 | 2022-12-05T21:43:41Z | 2022-06-24T00:00:32Z | null | ['CVE-2022-34209'] | Cross-Site Request Forgery in Jenkins ThreadFix Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins ThreadFix Plugin 1.5.4 and earlier allows attackers to connect to an attacker-specified URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:threadfix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34209'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/threadfix-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2249'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:17:01Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-77vq-4j66-46m5 | 2022-12-05T21:42:03Z | 2022-06-24T00:00:32Z | null | ['CVE-2022-34210'] | Missing permission check in Jenkins ThreadFix Plugin | A missing permission check in Jenkins ThreadFix Plugin 1.5.4 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:threadfix'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34210'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/threadfix-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2249'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:17:02Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-mcqm-6ff4-53qx | 2022-06-24T00:53:31Z | 2022-06-14T00:00:38Z | null | ['CVE-2022-29894'] | Cross-site Scripting in Strapi | Strapi v3.x.x versions and earlier contain a stored cross-site scripting vulnerability in file upload function. By exploiting this vulnerability, an arbitrary script may be executed on the web browser of the user who is logging in to the product with the administrative privilege. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.6.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29894'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN44550983/index.html'}, {'type': 'WEB', 'url': 'https://strapi.io/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:53:31Z', 'nvd_published_at': '2022-06-13T05:15:00Z'} |
1.4.0 | GHSA-fqx3-r75h-vc89 | 2022-06-07T21:07:31Z | 2022-06-07T21:07:31Z | null | [] | Improperly checked IDs on itemstacks received from the client leading to server crash in PocketMine-MP | ### Impact
Due to a workaround for unmapped network items implemented in 4.0.0-BETA5 (8ac16345a3bc099b62c1f5cfbf3b736e621c3f76), arbitrary item IDs are able to be written into an item's NBT. The intended purpose of this is to make said unmapped network items able to be moved around the inventory without issues.
This l... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-BETA5'}, {'fixed': '4.4.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-fqx3-r75h-vc89'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/5fd685e07d61ef670584ed11a52fd5f4b99a81a7'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/8ac16345a3bc099b62c1f5cfbf3b736e... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-07T21:07:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3pp4-64mp-9cg9 | 2022-06-17T00:27:30Z | 2022-06-17T00:27:30Z | null | [] | Memory Safety Issue when using `patch` or `merge` on `state` and assign the result back to `state` | Affected versions of this crate maintains references to memory that might have been freed already.
If affects the following two `tremor-script` language constructs:
* A [Merge](https://www.tremor.rs/docs/tremor-script/index#merge) where we assign the result back to the target expression
and the expression to be merg... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'tremor-script'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.2'}, {'fixed': '0.11.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tremor-rs/tremor-runtime/pull/1217'}, {'type': 'PACKAGE', 'url': 'https://github.com/tremor-rs/tremor-runtime'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0111.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:27:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5f47-rcg5-9m24 | 2022-06-20T21:37:08Z | 2022-06-11T00:00:18Z | null | ['CVE-2022-24278'] | Directory traversal in convert-svg-core | The package convert-svg-core before 0.6.4 is vulnerable to Directory Traversal due to improper sanitization of SVG tags. Exploiting this vulnerability is possible by using a specially crafted SVG file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'convert-svg-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24278'}, {'type': 'WEB', 'url': 'https://github.com/neocotic/convert-svg/issues/86'}, {'type': 'WEB', 'url': 'https://github.com/neocotic/convert-svg/pull/87'}, {'type': 'WEB', 'url': 'https://github.com/neocotic/convert-svg/commit/2bbc498c50292386... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:56:38Z', 'nvd_published_at': '2022-06-10T20:15:00Z'} |
1.4.0 | GHSA-7558-6q45-6x7m | 2022-12-05T22:23:30Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34186'] | Cross-site Scripting in Jenkins Dynamic Extended Choice Parameter Plugin | Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier does not escape the name and description of Moded Extended Choice parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.moded.extendedchoiceparameter:dynamic_extended_choice_parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34186'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dynamic-extended-choice-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:29Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-w248-ffj2-4v5q | 2022-06-20T21:59:37Z | 2022-06-09T23:47:23Z | null | ['CVE-2022-31043'] | Fix failure to strip Authorization header on HTTP downgrade | ### Impact
`Authorization` headers on requests are sensitive information. On making a request using the `https` scheme to a server which responds with a redirect to a URI with the `http` scheme, we should not forward the `Authorization` header on. This is much the same as to how we don't forward on the header if the h... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '6.5.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.4.4'}]... | [{'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/security/advisories/GHSA-w248-ffj2-4v5q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31043'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-200', 'CWE-212', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:47:23Z', 'nvd_published_at': '2022-06-10T00:15:00Z'} |
1.4.0 | GHSA-pc9c-547w-hhmc | 2022-12-05T21:59:40Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34196'] | Cross-site Scripting in Jenkins REST List Parameter Plugin | Jenkins REST List Parameter Plugin 1.5.2 and earlier does not escape the name and description of REST list parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:rest-list-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34196'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rest-list-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:58Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-vqpp-q5x5-qj4r | 2022-12-05T21:44:20Z | 2022-06-24T00:00:32Z | null | ['CVE-2022-34207'] | Cross-Site Request Forgery in Jenkins Beaker builder Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Beaker builder Plugin 1.10 and earlier allows attackers to connect to an attacker-specified URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:beaker-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34207'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/beaker-builder-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2248'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:39Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-rj88-4777-828h | 2022-06-03T22:33:18Z | 2022-06-03T00:00:58Z | null | ['CVE-2021-34079'] | Command injection in docker-tester | OS Command injection vulnerability in Mintzo Docker-Tester through 1.2.1 allows attackers to execute arbitrary commands via shell metacharacters in the 'ports' entry of a crafted docker-compose.yml file. | [] | [{'package': {'ecosystem': 'npm', 'name': 'docker-tester'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34079'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4786'}, {'type': 'PACKAGE', 'url': 'https://github.com/mintzo/docker-testing'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/docker-tester'}] | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:33:18Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-j8c7-3jpq-8985 | 2022-06-17T19:21:49Z | 2022-06-10T00:00:55Z | null | ['CVE-2022-2016'] | Cross-site Scripting in FacturaScripts | Cross-site Scripting (XSS) - Reflected in GitHub repository neorazorx/facturascripts. A patch is available on the `master` branch of the repository in commit 7b4ddb92. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'facturascripts/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2022.08'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2016'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/7b4ddb9269a230e2dd07c6a8d3211c9a88f4f09f'}, {'type': 'PACKAGE', 'url': 'https://github.com/neorazorx/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-10T19:53:42Z', 'nvd_published_at': '2022-06-09T16:15:00Z'} |
1.4.0 | GHSA-gwp3-f7mr-qpfv | 2022-06-03T22:21:32Z | 2022-06-03T00:00:59Z | null | ['CVE-2021-34084'] | OS Command Injection in s3-uploader | OS command injection vulnerability in Turistforeningen node-s3-uploader through 2.0.3 for Node.js allows attackers to execute arbitrary commands via the metadata() function. | [] | [{'package': {'ecosystem': 'npm', 'name': 's3-uploader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34084'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4776'}, {'type': 'PACKAGE', 'url': 'https://github.com/Turistforeningen/node-s3-uploader'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:21:32Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-q754-vwc4-p6qj | 2022-07-08T17:05:54Z | 2022-06-22T17:53:34Z | null | ['CVE-2022-31057'] | Authenticated Stored Cross-site Scripting in Shopware | ### Impact
Authenticated Stored XSS in Administration
### Patches
We recommend updating to version 5.7.12. You can get the update to 5.7.12 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/de/changelog-sw5/#5-7-12
For older versions you can use the Security Plugin:
https:... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.12'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-q754-vwc4-p6qj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31057'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/3e025a0a3e123f4108082645b1ced6fb548f7b6f'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T17:53:34Z', 'nvd_published_at': '2022-06-27T20:15:00Z'} |
1.4.0 | GHSA-qfr5-wjpw-q4c4 | 2022-06-29T21:52:17Z | 2022-06-19T00:00:21Z | null | ['CVE-2021-46823'] | Denial of Service in python-ldap | python-ldap before 3.4.0 is vulnerable to a denial of service when ldap.schema is used for untrusted schema definitions, because of a regular expression denial of service (ReDoS) flaw in the LDAP schema parser. By sending crafted regex input, a remote authenticated attacker could exploit this vulnerability to cause a d... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-ldap'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/python-ldap/python-ldap/security/advisories/GHSA-r8wq-qrxc-hmcm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46823'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/221507'}, {'type': 'PACKAGE', 'url': 'https://github... | {'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:36:32Z', 'nvd_published_at': '2022-06-18T16:15:00Z'} |
1.4.0 | GHSA-3j8f-xvm3-ffx4 | 2022-07-08T17:05:50Z | 2022-06-29T00:00:57Z | null | ['CVE-2022-0624'] | Authorization Bypass in parse-path | Authorization Bypass Through User-Controlled Key in GitHub repository ionicabizau/parse-path prior to 5.0.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-path'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0624'}, {'type': 'WEB', 'url': 'https://github.com/ionicabizau/parse-path/commit/f9ad8856a3c8ae18e1cf4caef5edbabbc42840e8'}, {'type': 'PACKAGE', 'url': 'https://github.com/ionicabizau/parse-path'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties... | {'cwe_ids': ['CWE-639'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:13:37Z', 'nvd_published_at': '2022-06-28T09:15:00Z'} |
1.4.0 | GHSA-65r6-w7vr-c75r | 2022-12-05T22:27:45Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34183'] | Cross-site Scripting in Jenkins Agent Server Parameter Plugin | Jenkins Agent Server Parameter Plugin 1.1 and earlier does not escape the name and description of Agent Server parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:agent-server-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34183'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/agent-server-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T23:00:00Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-9grj-j43m-mjqr | 2022-12-05T23:37:15Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34174'] | Observable timing discrepancy allows determining username validity in Jenkins | In Jenkins 2.355 and earlier, LTS 2.332.3 and earlier, an observable timing discrepancy on the login form allows distinguishing between login attempts with an invalid username, and login attempts with a valid username and wrong password, when using the Jenkins user database security realm. This allows attackers to dete... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.334'}, {'fixed': '2.356'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34174'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2566'}] | {'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:37:15Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-rxhx-9fj6-6h2m | 2022-06-20T18:15:47Z | 2022-06-16T23:53:32Z | null | [] | enum_map macro can cause UB when `Enum` trait is incorrectly implemented | Affected versions of this crate did not properly check the length of an enum when using `enum_map!` macro, trusting user-provided length.
When the `LENGTH` in the `Enum` trait does not match the array length in the `EnumArray` trait, this can result in the initialization of the enum map with uninitialized types, which... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'enum-map'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-2'}, {'fixed': '2.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/xfix/enum-map/commit/b824e232f2fb47837740070096ac253df8e80dfc'}, {'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/blob/main/crates/enum-map/RUSTSEC-2022-0010.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/xfix/enum-map'}, {'type': 'WEB', 'url': 'https://gi... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:53:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7495-24mx-hph2 | 2022-12-05T21:53:31Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34201'] | Missing permission check in Jenkins Convertigo Mobile Platform Plugin | A missing permission check in Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.convertigo.jenkins.plugins:convertigo-mobile-platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34201'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/convertigo-mobile-platform-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2276'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:47Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-5g4r-2qhx-vqfm | 2022-06-06T21:22:05Z | 2022-06-06T21:22:05Z | null | ['CVE-2022-31026'] | Use of Uninitialized Variable in trilogy | ### Impact
When authenticating, a malicious server could return a specially crafted authentication packet, causing the client to read and return up to 12 bytes of data from an uninitialized variable in stack memory.
### Patches
Users of the trilogy gem should upgrade to version 2.1.1
### Workarounds
This issue can... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'trilogy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/github/trilogy/security/advisories/GHSA-5g4r-2qhx-vqfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31026'}, {'type': 'WEB', 'url': 'https://github.com/github/trilogy/commit/6bed62789eaf119902b0fe247d2a91d56c31a962'}, {'type': 'PACKAGE', 'url': 'h... | {'cwe_ids': ['CWE-908'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-06T21:22:05Z', 'nvd_published_at': '2022-06-09T13:15:00Z'} |
1.4.0 | GHSA-8fvr-7945-mg7w | 2022-06-20T21:36:42Z | 2022-06-14T00:00:37Z | null | ['CVE-2022-2060'] | Cross site scripting in dolibarr | A Cross-site Scripting (XSS) vulnerability exists in the admin/accountant.php file. The fields `town`, `name`, and `Accountant code` can be used to escape double quote protection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2060'}, {'type': 'WEB', 'url': 'https://github.com/dolibarr/dolibarr/commit/2b5b9957c3010a5db9d1988c2efe5b209b16b47f'}, {'type': 'PACKAGE', 'url': 'https://github.com/dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2acfc8fe-... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:10:52Z', 'nvd_published_at': '2022-06-13T09:15:00Z'} |
1.4.0 | GHSA-jx34-gqqq-r6gm | 2022-07-11T19:25:29Z | 2022-06-29T22:14:03Z | null | ['CVE-2022-25238'] | Stored XSS via HTML fields in SilverStripe Framework | SilverStripe Framework through 4.10.8 allows XSS, inside of script tags that can can be added to website content via XHR by an authenticated CMS user if the cwp-core module is not installed on the sanitise_server_side contig is not set to true in project code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25238'}, {'type': 'WEB', 'url': 'https://docs.silverstripe.org/en/4/changelogs/4.10.1/'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/s... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:14:03Z', 'nvd_published_at': '2022-06-28T22:15:00Z'} |
1.4.0 | GHSA-mmh6-m7v9-5956 | 2022-06-03T22:25:16Z | 2022-06-03T00:01:00Z | null | ['CVE-2021-43308'] | Regular expression denial of service in markdown-link-extractor | An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the markdown-link-extractor npm package, when an attacker is able to supply arbitrary input to the module's exported function | [] | [{'package': {'ecosystem': 'npm', 'name': 'markdown-link-extractor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'markdown-link-extractor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43308'}, {'type': 'PACKAGE', 'url': 'https://github.com/tcort/markdown-link-extractor'}, {'type': 'WEB', 'url': 'https://research.jfrog.com/vulnerabilities/markdown-link-extractor-redos-xray-211350/'}] | {'cwe_ids': ['CWE-1333'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:25:16Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-xfjq-5m4w-cc6h | 2022-07-05T22:59:47Z | 2022-06-24T00:00:32Z | null | ['CVE-2022-34208'] | Missing Authorization in Jenkins Beaker builder Plugin | A missing permission check in Jenkins Beaker builder Plugin 1.10 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:beaker-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34208'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/beaker-builder-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2248'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:47Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-jmwx-r3gq-qq3p | 2022-06-17T00:27:57Z | 2022-06-17T00:27:57Z | null | [] | vec-const attempts to construct a Vec from a pointer to a const slice | Affected versions of this crate claimed to construct a const `Vec` with nonzero length and capacity, but that cannot be done because such a `Vec` requires a pointer from an allocator.
The implementation was later changed to just construct a `std::borrow::Cow`.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'vec-const'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Eolu/vec-const/issues/1#issuecomment-898908241'}, {'type': 'PACKAGE', 'url': 'https://github.com/Eolu/vec-const/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0082.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:27:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wwh2-r387-g5rm | 2023-06-13T22:06:25Z | 2022-06-17T00:26:05Z | null | [] | tower-http's improper validation of Windows paths could lead to directory traversal attack | `tower_http::services::fs::ServeDir` didn't correctly validate Windows paths meaning paths like `/foo/bar/c:/windows/web/screen/img101.png` would be allowed and respond with the contents of `c:/windows/web/screen/img101.png`. Thus users could potentially read files anywhere on the filesystem. This only impacts Windows.... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'tower-http'}, 'ecosystem_specific': {'affected_functions': ['tower_http::services::fs::ServeDir']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.2.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'tower-http'}, 'ecosystem_speci... | [{'type': 'WEB', 'url': 'https://github.com/tower-rs/tower-http/pull/204'}, {'type': 'PACKAGE', 'url': 'https://github.com/tower-rs/tower-http'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0135.html'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:26:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6692-8qqf-79jc | 2022-06-17T00:24:29Z | 2022-06-17T00:24:29Z | null | [] | `Read` on uninitialized buffer may cause UB ('tectonic_xdv' crate) | Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation.
Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined va... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'tectonic_xdv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.12'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tectonic-typesetting/tectonic/issues/752'}, {'type': 'WEB', 'url': 'https://github.com/tectonic-typesetting/tectonic/commit/cdff034e6d93cdfdafd13d8c6956e22fa5a57b79'}, {'type': 'PACKAGE', 'url': 'https://github.com/tectonic-typesetting/tectonic'}, {'type': 'WEB', 'url': 'http... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:24:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9h79-5m2f-mqj2 | 2022-12-05T21:39:19Z | 2022-06-24T00:00:32Z | null | ['CVE-2022-34213'] | Squash TM Publisher (Squash4Jenkins) Plugin stores passwords stored in plain text | Squash TM Publisher (Squash4Jenkins) Plugin 1.0.0 and earlier stores passwords unencrypted in its global configuration file `org.jenkinsci.squashtm.core.SquashTMPublisher.xml` on the Jenkins controller as part of its configuration.
These passwords can be viewed by users with access to the Jenkins controller file syste... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:squashtm-publisher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34213'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/squashtm-publisher-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2089'}] | {'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T21:14:56Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-q4qm-xhf9-4p8f | 2022-09-13T21:28:10Z | 2022-06-03T00:01:07Z | null | ['CVE-2022-30034'] | Flower OAuth authentication bypass | All versions of Flower, a web UI for the Celery Python RPC framework, as of 05-02-2022 are vulnerable to an OAuth authentication bypass. An attacker could then access the Flower API to discover and invoke arbitrary Celery RPC calls or deny service by shutting down Celery task nodes. A fix was released in version 1.2.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'flower'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30034'}, {'type': 'WEB', 'url': 'https://github.com/mher/flower/issues/1217'}, {'type': 'WEB', 'url': 'https://github.com/mher/flower/pull/1216'}, {'type': 'PACKAGE', 'url': 'https://github.com/mher/flower'}, {'type': 'WEB', 'url': 'https://github.... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:29:21Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-qmx3-m648-hr74 | 2022-07-05T18:03:15Z | 2022-06-23T00:00:34Z | null | ['CVE-2022-32549'] | Log Injection in Apache Sling Commons Log and Apache Sling API | Apache Sling Commons Log <= 5.4.0 and Apache Sling API <= 2.25.0 are vulnerable to log injection. The ability to forge logs may allow an attacker to cover tracks by injecting fake logs and potentially corrupt log files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.commons.log'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32549'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/7z6h3806mwcov5kx6l96pq839sn0po1v'}] | {'cwe_ids': ['CWE-116', 'CWE-117'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T17:48:50Z', 'nvd_published_at': '2022-06-22T15:15:00Z'} |
1.4.0 | GHSA-5c5f-7vfq-3732 | 2022-07-05T21:24:30Z | 2022-06-07T00:00:31Z | null | ['CVE-2022-32511'] | JMESPath for Ruby uses unsafe JSON.load when safe JSON.parse is preferable | jmespath.rb (aka JMESPath for Ruby) before 1.6.1 uses JSON.load in a situation where JSON.parse is preferable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'jmespath'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32511'}, {'type': 'WEB', 'url': 'https://github.com/jmespath/jmespath.rb/pull/55'}, {'type': 'WEB', 'url': 'https://github.com/jmespath/jmespath.rb/commit/e8841280053a9d9a0c90f36223f926c8b9e4ec49'}, {'type': 'PACKAGE', 'url': 'https://github.com/jm... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-07T21:14:51Z', 'nvd_published_at': '2022-06-06T22:15:00Z'} |
1.4.0 | GHSA-pg8v-g4xq-hww9 | 2022-07-07T17:13:54Z | 2022-06-25T00:00:54Z | null | ['CVE-2022-32209'] | Rails::Html::Sanitizer vulnerable to Cross-site Scripting | Versions of Rails::Html::Sanitizer prior to version 1.4.3 are vulnerable to XSS with certain configurations of Rails::Html::Sanitizer which allows an attacker to inject content when the application developer has overridden the sanitizer's allowed tags to allow both `select` and `style` elements. Code is only impacted ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'rails-html-sanitizer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32209'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails-html-sanitizer/commit/45a5c10fed3d9aa141594c80afa06d748fa0967d'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1530898'}, {'type': 'PACKAGE', 'url': 'https://github.com/rails/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T18:10:35Z', 'nvd_published_at': '2022-06-24T15:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.