schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-hj9c-8jmm-8c52 | 2022-06-29T21:50:23Z | 2022-06-02T15:37:27Z | null | ['CVE-2022-29244'] | Packing does not respect root-level ignore files in workspaces | ### Impact
`npm pack` ignores root-level `.gitignore` & `.npmignore` file exclusion directives when run in a workspace or with a workspace flag (ie. `--workspaces`, `--workspace=<name>`). Anyone who has run `npm pack` or `npm publish` with workspaces, as of [v7.9.0](https://github.com/npm/cli/releases/tag/v7.9.0) & [v7... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.9.0'}, {'fixed': '8.11.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/npm/cli/security/advisories/GHSA-hj9c-8jmm-8c52'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29244'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/node/pull/43210'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/node/releases/tag/v16.15.1... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T15:37:27Z', 'nvd_published_at': '2022-06-13T14:15:00Z'} |
1.4.0 | GHSA-jp3w-3q88-34cf | 2022-06-17T00:17:08Z | 2022-06-17T00:17:08Z | null | [] | Miscomputation when performing AES encryption in rust-crypto | The following Rust program demonstrates some strangeness in AES encryption - if you have an immutable key slice and then operate on that slice, you get different encryption output than if you operate on a copy of that key.
For these functions, we expect that extending a 16 byte key to a 32 byte key by repeating it giv... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'rust-crypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.36'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/DaGenix/rust-crypto/issues/476'}, {'type': 'PACKAGE', 'url': 'https://github.com/DaGenix/rust-crypto/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0011.html'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:17:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9fmg-89fx-r33w | 2022-07-11T19:25:18Z | 2022-06-29T22:39:50Z | null | ['CVE-2021-41559'] | Quadratic blowup in Convert::xml2array() | Silverstripe silverstripe/framework 4.x until 4.10.9 has a quadratic blowup in Convert::xml2array() that enables a remote attack via a crafted XML document. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41559'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2021-41559.yaml'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/releases'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-776'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:39:50Z', 'nvd_published_at': '2022-06-28T22:15:00Z'} |
1.4.0 | GHSA-rphm-c8gw-3r38 | 2022-06-15T19:44:56Z | 2022-06-03T00:00:58Z | null | ['CVE-2021-34078'] | OS Command Injection in lifion-verify-deps | lifion-verify-dependencies through 1.1.0 is vulnerable to OS command injection via a crafted dependency name on the scanned project's package.json file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'lifion-verify-deps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34078'}, {'type': 'WEB', 'url': 'https://github.com/lifion/lifion-verify-deps/commit/be1133d5b78e3caa0004fa60207013dca4e1bf38'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4785'}, {'type': 'PACKAGE', 'url': 'https://git... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:19:56Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-8mv5-7x95-7wcf | 2023-06-13T18:35:51Z | 2022-06-17T00:12:33Z | null | [] | `mopa` is technically unsound | The `mopa` crate redefines the deprecated `TraitObject` struct from `core::raw` like so:
```rust
#[repr(C)]
#[derive(Copy, Clone)]
#[doc(hidden)]
pub struct TraitObject {
pub data: *mut (),
pub vtable: *mut (),
}
```
This is done to then transmute a reference to a trait object (`&dyn Trait` for any trait `Trait... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'mopa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/chris-morgan/mopa/issues/13'}, {'type': 'PACKAGE', 'url': 'https://github.com/chris-morgan/mopa'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0095.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:12:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9qrp-h7fw-42hg | 2022-06-01T19:56:34Z | 2022-06-01T19:56:34Z | null | ['CVE-2022-29253'] | Path Traversal in XWiki Platform | ### Impact
One can ask for any file located in the classloader using the template API and a path with ".." in it. For example
```
{{template name="../xwiki.hbm.xml"/}}
```
To our knownledge none of the available files of the classloader in XWiki Standard contain any strong confidential data, hence the low confident... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.3-rc-1'}, {'fixed': '13.10.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9qrp-h7fw-42hg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29253'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/4917c8f355717bb636d763844528b1fe0f95e8e2'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-22', 'CWE-24'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T19:56:34Z', 'nvd_published_at': '2022-05-25T21:15:00Z'} |
1.4.0 | GHSA-r7pq-3x6p-7jcm | 2022-09-01T20:12:37Z | 2022-06-17T21:45:15Z | null | ['CVE-2022-29863'] | Memory Allocation with Excessive Size Value in OPCFoundation.NetStandard.Opc.Ua.Core | A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to cause a server to trigger an out of memory exception with a carefully crafted message. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.368.58'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.368.53'}}] | [{'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-r7pq-3x6p-7jcm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29863'}, {'type': 'WEB', 'url': 'https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022... | {'cwe_ids': ['CWE-789'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:45:15Z', 'nvd_published_at': '2022-06-16T18:15:00Z'} |
1.4.0 | GHSA-mj46-r4gr-5x83 | 2022-06-06T18:59:37Z | 2022-06-03T22:32:06Z | null | ['CVE-2022-25863'] | Unsanitized JavaScript code injection possible in gatsby-plugin-mdx | ### Impact
The gatsby-plugin-mdx plugin prior to versions 3.15.2 and 2.14.1 passes input through to the `gray-matter` npm package, which is vulnerable to JavaScript injection in its default configuration, unless input is sanitized. The vulnerability is present when passing input in both webpack (MDX files in `src/page... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'gatsby-plugin-mdx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'gatsby-plugin-mdx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.15.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-mj46-r4gr-5x83'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25863'}, {'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/pull/35830'}, {'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/pull/... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:32:06Z', 'nvd_published_at': '2022-06-10T20:15:00Z'} |
1.4.0 | GHSA-jqwc-c49r-4w2x | 2022-06-29T22:08:25Z | 2022-06-29T22:08:25Z | null | ['CVE-2022-31104'] | Miscompilation of `i8x16.swizzle` and `select` with v128 inputs | ### Impact
Wasmtime's implementation of the [SIMD proposal for WebAssembly](https://github.com/webassembly/simd) on x86_64 contained two distinct bugs in the instruction lowerings implemented in Cranelift. The aarch64 implementation of the simd proposal is not affected. The bugs were presented in the `i8x16.swizzle` a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.38.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'cranelift-codegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.85.1'}]}], 'database_s... | [{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-jqwc-c49r-4w2x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31104'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/pull/4317'}, {'type': 'WEB', 'url': 'https://github.com/by... | {'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:08:25Z', 'nvd_published_at': '2022-06-28T00:15:00Z'} |
1.4.0 | GHSA-rppc-655v-7j3c | 2022-07-11T19:26:57Z | 2022-06-29T22:12:39Z | null | ['CVE-2022-28803'] | Stored XSS in link tags added via XHR in SilverStripe Framework | SilverStripe Framework 4.x prior to 4.10.9 is vulnerable to cross-site scripting inside the href attribute of an HTML hyperlink, which can be added to website content via XMLHttpRequest (XHR) by an authenticated CMS user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28803'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2022-28803.yaml'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2022-28803'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:12:39Z', 'nvd_published_at': '2022-06-29T01:15:00Z'} |
1.4.0 | GHSA-wgrg-5h56-jg27 | 2022-06-17T00:13:59Z | 2022-06-17T00:13:59Z | null | [] | Out-of-bounds write in nix::unistd::getgrouplist | On certain platforms, if a user has more than 16 groups, the
`nix::unistd::getgrouplist` function will call the libc `getgrouplist`
function with a length parameter greater than the size of the buffer it
provides, resulting in an out-of-bounds write and memory corruption.
The libc `getgrouplist` function takes an in/o... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'nix'}, 'ecosystem_specific': {'affected_functions': ['nix::unistd::getgrouplist']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.16.0'}, {'fixed': '0.20.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'nix'}, 'ecosystem_specific': {'affected_func... | [{'type': 'WEB', 'url': 'https://github.com/nix-rust/nix/issues/1541'}, {'type': 'PACKAGE', 'url': 'https://github.com/nix-rust/nix'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0119.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:13:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3x96-m42v-hvh5 | 2022-06-29T21:50:47Z | 2022-06-23T00:00:35Z | null | ['CVE-2022-2174'] | Cross-site Scripting in Microweber | Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.2.18. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2174'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/c51285f791e48e536111cd57a9544ccbf7f33961'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:53:14Z', 'nvd_published_at': '2022-06-22T12:15:00Z'} |
1.4.0 | GHSA-r48q-9g5r-8q2h | 2022-06-17T18:18:04Z | 2022-06-09T00:00:23Z | null | ['CVE-2022-1996'] | Authorization Bypass Through User-Controlled Key in go-restful | Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3.8.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/emicklei/go-restful/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.8.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/emicklei/go-restful'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1996'}, {'type': 'WEB', 'url': 'https://github.com/emicklei/go-restful/issues/489'}, {'type': 'WEB', 'url': 'https://github.com/emicklei/go-restful/commit/926662532deb450272956c7bc573978464aae74e'}, {'type': 'WEB', 'url': 'https://github.com/emickl... | {'cwe_ids': ['CWE-639'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:50:21Z', 'nvd_published_at': '2022-06-08T13:15:00Z'} |
1.4.0 | GHSA-m9vj-44f3-78xw | 2022-06-03T15:46:13Z | 2022-06-01T00:00:35Z | null | ['CVE-2022-23082'] | Path traversal in CureKit | CureKit versions v1.0.1 through v1.1.3 are vulnerable to path traversal as the function `isFileOutsideDir` fails to sanitize the user input which may lead to path traversal. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.whitesource:curekit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.1'}, {'fixed': '1.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23082'}, {'type': 'WEB', 'url': 'https://github.com/whitesource/CureKit/commit/af35e870ed09411d2f1fae6db1b04598cd1a31b6'}, {'type': 'PACKAGE', 'url': 'https://github.com/whitesource/CureKit'}, {'type': 'WEB', 'url': 'https://www.mend.io/vulnerabili... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T15:45:42Z', 'nvd_published_at': '2022-05-31T15:15:00Z'} |
1.4.0 | GHSA-h588-76vg-prgj | 2023-02-09T14:20:32Z | 2022-06-16T23:41:29Z | null | [] | `DecimalArray` does not perform bound checks on accessing values and offsets | `DecimalArray` performs insufficient bounds checks, which allows out-of-bounds reads in safe code if the lenght of the backing buffer is not a multiple of 16.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'arrow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/apache/arrow-rs/issues/775'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/arrow-rs/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0117.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:41:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xjfw-5vv5-vjq2 | 2022-06-01T20:25:54Z | 2022-06-01T20:25:54Z | null | ['CVE-2022-29258'] | Cross-site Scripting in Filter Stream Converter Application in XWiki Platform | ### Impact
We found a possible XSS vector in the `Filter.FilterStreamDescriptorForm` wiki page related to pretty much all the form fields printed in the home page of the application.
### Patches
The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, 13.10.3.
### Workarounds
The easiest workaround is to edit th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-filter-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.4'}, {'fixed': '12.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-filter-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events'... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xjfw-5vv5-vjq2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29258'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/21906acb5ee2304552f56f9bbdbf8e7d368f7f3a'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-116', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T20:25:54Z', 'nvd_published_at': '2022-05-31T17:15:00Z'} |
1.4.0 | GHSA-p3rc-946h-8cf5 | 2022-12-05T23:33:28Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34175'] | Unauthorized view fragment access in Jenkins | Jenkins uses the Stapler web framework to render its UI views. These views are frequently composed of several view fragments, enabling plugins to extend existing views with more content.
Before [SECURITY-534](https://www.jenkins.io/security/advisory/2019-07-17/#SECURITY-534) was fixed in Jenkins 2.186 and LTS 2.176.2,... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.335'}, {'fixed': '2.356'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34175'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2777'}] | {'cwe_ids': ['CWE-693', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:31:06Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-2m7h-86qq-fp4v | 2022-06-21T20:03:23Z | 2022-06-21T20:03:23Z | null | ['CVE-2022-31034'] | Insecure entropy in Argo CD's PKCE/Oauth2/OIDC params | ### Impact
All versions of Argo CD starting with v0.11.0 are vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or UI. The vulnerabilities are due to the use of insufficiently random values in parameters in Oauth2/OIDC login flows. In each case, using a relatively-predictable (time-... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '2.1.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.7'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'rang... | [{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-2m7h-86qq-fp4v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31034'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/17f7f4f462bdb233e1b9b36f67099f41052d8cb0'}, {'type': 'PACKAGE', 'url'... | {'cwe_ids': ['CWE-330', 'CWE-331'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:03:23Z', 'nvd_published_at': '2022-06-27T19:15:00Z'} |
1.4.0 | GHSA-gvxv-p9rv-gmcg | 2022-07-21T15:55:07Z | 2022-06-17T21:46:28Z | null | ['CVE-2022-33156'] | brotkrueml/typo3-matomo-integration vulnerable to Cross-Site Scripting | The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'brotkrueml/typo3-matomo-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33156'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/brotkrueml/typo3-matomo-integration/CVE-2022-33156.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/brotkrueml/typo3-matomo-integration'}, {'type... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:46:28Z', 'nvd_published_at': '2022-07-12T23:15:00Z'} |
1.4.0 | GHSA-wc36-xgcc-jwpr | 2022-06-17T00:01:02Z | 2022-06-17T00:01:02Z | null | [] | Failure to verify the public key of a `SignedEnvelope` against the `PeerId` in a `PeerRecord` | Affected versions of this crate did not check that the public key the signature was created with matches the peer ID of the peer record.
Any combination was considered valid.
This allows an attacker to republish an existing `PeerRecord` with a different `PeerId`.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'libp2p-core'}, 'ecosystem_specific': {'affected_functions': ['libp2p_core::PeerRecord::from_signed_envelope']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.30.0-rc.1'}, {'fixed': '0.30.2'}]}]}] | [{'type': 'PACKAGE', 'url': 'https://github.com/libp2p/rust-libp2p'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0009.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:01:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3x3w-vcjx-7796 | 2022-06-08T22:28:13Z | 2022-06-08T00:00:41Z | null | ['CVE-2020-36534'] | Cross-Site Request Forgery in easyii CMS | A vulnerability was found in easyii CMS. It has been classified as problematic. Affected is an unknown function of the file /admin/sign/out. The manipulation leads to cross site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'noumo/easyii'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36534'}, {'type': 'WEB', 'url': 'https://github.com/noumo/easyii/issues/222'}, {'type': 'PACKAGE', 'url': 'https://github.com/noumo/easyii/'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.160278'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:28:13Z', 'nvd_published_at': '2022-06-07T18:15:00Z'} |
1.4.0 | GHSA-g28x-pgr3-qqx6 | 2022-07-13T19:19:18Z | 2022-06-15T21:24:16Z | null | ['CVE-2022-31072'] | Octokit gem published with world-writable files | ### Impact
Versions [4.23.0](https://rubygems.org/gems/octokit/versions/4.23.0) and [4.24.0](https://rubygems.org/gems/octokit/versions/4.24.0) of the octokit gem were published containing world-writeable files.
Specifically, the gem was packed with files having their permissions set to `-rw-rw-rw-` (i.e. 0666) inst... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'octokit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.23.0'}, {'fixed': '4.25.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/octokit/octokit.rb/security/advisories/GHSA-g28x-pgr3-qqx6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31072'}, {'type': 'WEB', 'url': 'https://github.com/octokit/octokit.rb/commit/1c8edecc9cf23d1ceb959d91a416a69f55ce7d55'}, {'type': 'PACKAGE', '... | {'cwe_ids': ['CWE-276'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-15T21:24:16Z', 'nvd_published_at': '2022-06-15T23:15:00Z'} |
1.4.0 | GHSA-x938-fvfw-7jh5 | 2022-06-25T07:11:05Z | 2022-06-25T07:11:05Z | null | ['CVE-2022-31077'] | CloudCore CSI Driver: Malicious response from KubeEdge can crash CSI Driver controller server | ### Impact
A malicious message response from KubeEdge can crash the CSI Driver controller server by triggering a nil-pointer dereference panic. As a consequence, the CSI Driver controller will be in denial of service. An attacker would already need to be an authenticated user of the Cloud, and only when the authenticat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.1'}]}], 'versions': ['1.10.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduc... | [{'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/security/advisories/GHSA-x938-fvfw-7jh5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31077'}, {'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/pull/3899'}, {'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/... | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:11:05Z', 'nvd_published_at': '2022-06-27T21:15:00Z'} |
1.4.0 | GHSA-fvxf-r9fw-49pc | 2022-09-01T20:10:12Z | 2022-06-17T21:44:39Z | null | ['CVE-2022-29865'] | Incorrect Implementation of Authentication Algorithm in OPCFoundation.NetStandard.Opc.Ua.Core | A vulnerability was discovered in the OPC UA .NET Standard Stack that
- allows a malicious client or server to bypass the application authentication mechanism
- and allow a connection to an untrusted peer. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.368.58'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.368.53'}}] | [{'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-fvxf-r9fw-49pc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29865'}, {'type': 'WEB', 'url': 'https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:44:39Z', 'nvd_published_at': '2022-06-16T17:15:00Z'} |
1.4.0 | GHSA-gm48-83x4-84jg | 2022-06-17T19:20:46Z | 2022-06-10T00:00:56Z | null | ['CVE-2022-24969'] | Server-side request forgery in Apache Dubbo | bypass CVE-2021-25640 > In Apache Dubbo prior to 2.6.12 and 2.7.15, the usage of parseURL method will lead to the bypass of the white host check which can cause open redirect or SSRF vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.7.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.alibaba:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.6.12'}]}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25640'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24969'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gw4j-4229-q4px'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/1xbckc3467wfk5r7n2o44... | {'cwe_ids': ['CWE-601', 'CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-10T19:53:04Z', 'nvd_published_at': '2022-06-09T16:15:00Z'} |
1.4.0 | GHSA-pv7h-hx5h-mgfj | 2022-06-20T21:58:53Z | 2022-06-11T00:00:17Z | null | ['CVE-2022-25845'] | Unsafe deserialization in com.alibaba:fastjson | The package com.alibaba:fastjson before 1.2.83 is vulnerable to Deserialization of Untrusted Data by bypassing the default autoType shutdown restrictions, which is possible under certain conditions. Exploiting this vulnerability allows attacking remote servers. Workaround: If upgrading is not possible, you can enable [... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba:fastjson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.83'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25845'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/fastjson/commit/35db4adad70c32089542f23c272def1ad920a60d'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/fastjson/commit/8f3410f81cbd437f7c459f8868445d50ad301f15'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:58:22Z', 'nvd_published_at': '2022-06-10T20:15:00Z'} |
1.4.0 | GHSA-v25c-8349-v2q3 | 2022-06-29T22:03:36Z | 2022-06-15T00:00:27Z | null | ['CVE-2021-40616'] | Incorrect Authorization in thinkcmf | thinkcmf v5.1.7 has an unauthorized vulnerability. The attacker can modify the password of the administrator account with id 1 through the background user management group permissions. The use condition is that the background user management group authority is required. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'thinkcmf/thinkcmf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40616'}, {'type': 'WEB', 'url': 'https://github.com/thinkcmf/thinkcmf/issues/722'}, {'type': 'PACKAGE', 'url': 'https://github.com/thinkcmf/thinkcmf'}] | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:03:36Z', 'nvd_published_at': '2022-06-14T10:15:00Z'} |
1.4.0 | GHSA-7f7g-8q3x-jpx9 | 2022-06-29T22:41:51Z | 2022-06-21T00:00:48Z | null | ['CVE-2017-20059'] | Cross site scripting in Elefant CMS | A vulnerability, which was classified as problematic, has been found in Elefant CMS 1.3.12-RC. Affected by this issue is some unknown functionality of the component Title Handler. The manipulation with the input </title><img src=no onerror=alert(1)> leads to basic cross site scripting (Persistent). The attack may be la... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'elefant/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20059'}, {'type': 'PACKAGE', 'url': 'https://github.com/jbroadway/elefant'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.97256'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Feb/36'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:41:51Z', 'nvd_published_at': '2022-06-20T05:15:00Z'} |
1.4.0 | GHSA-8f4f-v9x5-cg6j | 2022-06-25T07:19:34Z | 2022-06-25T07:19:34Z | null | ['CVE-2022-31076'] | CloudCore UDS Server: Malicious Message can crash CloudCore | ### Impact
A malicious message can crash CloudCore by triggering a null-pointer dereference in the UDS Server. Since the UDS Server only communicates with the CSI Driver on the cloud side, the attack is limited to the local host network. As such, an attacker would already need to be an authenticated user of the Cloud.
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.1'}]}], 'versions': ['1.10.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduc... | [{'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/security/advisories/GHSA-8f4f-v9x5-cg6j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31076'}, {'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/pull/3899/commits/5d60ae9eabd6b6b7afe38758e19bbe8137664701'}, {'type': 'PA... | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:19:34Z', 'nvd_published_at': '2022-06-27T20:15:00Z'} |
1.4.0 | GHSA-7f3x-x4pr-wqhj | 2022-07-07T17:15:41Z | 2022-06-28T00:01:02Z | null | ['CVE-2022-2216'] | Server-Side Request Forgery in parse-url | Server-Side Request Forgery (SSRF) in GitHub repository ionicabizau/parse-url prior to 7.0.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2216'}, {'type': 'WEB', 'url': 'https://github.com/ionicabizau/parse-url/commit/21c72ab9412228eea753e2abc48f8962707b1fe3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/505a3d39-2723-4a06-b1f7-9b2d133c92e1'}] | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:07:53Z', 'nvd_published_at': '2022-06-27T12:15:00Z'} |
1.4.0 | GHSA-r67p-m7g9-gxw6 | 2022-06-16T23:51:58Z | 2022-06-16T23:51:58Z | null | [] | `Read` on uninitialized memory may cause UB (fn preamble_skipcount()) | Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation (within `fn preamble_skipcount()`).
Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer.
Reading from uniniti... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'csv-sniffer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jblondin/csv-sniffer/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/jblondin/csv-sniffer/pull/2'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0088.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:51:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r7cj-wmwv-hfw5 | 2022-06-16T23:40:50Z | 2022-06-16T23:40:50Z | null | [] | `BinaryArray` does not perform bound checks on reading values and offsets | `BinaryArray` performs insufficient validation on creation, which allows out-of-bounds reads in safe code.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'arrow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.0'}]}]}] | [{'type': 'PACKAGE', 'url': 'https://github.com/apache/arrow-rs'}, {'type': 'WEB', 'url': 'https://github.com/apache/arrow-rs/blob/6.4.0/CHANGELOG.md#640-2021-12-10'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0116.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:40:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f4q6-9qm4-h8j4 | 2022-06-09T23:48:49Z | 2022-06-09T23:48:49Z | null | ['CVE-2022-24065'] | OS Command Injection in cookiecutter | The package cookiecutter before 2.1.1 is vulnerable to Command Injection via hg argument injection. When calling the cookiecutter function from Python code with the checkout parameter, it is passed to the hg checkout command in a way that additional flags can be set. The additional flags can be used to perform a comman... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'cookiecutter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24065'}, {'type': 'WEB', 'url': 'https://github.com/cookiecutter/cookiecutter/commit/fdffddb31fd2b46344dfa317531ff155e7999f77'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f4q6-9qm4-h8j4'}, {'type': 'PACKAGE', 'url': 'https://g... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:48:49Z', 'nvd_published_at': '2022-06-08T08:15:00Z'} |
1.4.0 | GHSA-72p8-v4hg-v45p | 2022-06-15T18:57:58Z | 2022-06-01T19:50:15Z | null | ['CVE-2022-29245'] | Weak private key generation in SSH.NET | During an **X25519** key exchange, the client’s private is generated with [**System.Random**](https://docs.microsoft.com/en-us/dotnet/api/system.random):
```cs
var rnd = new Random();
_privateKey = new byte[MontgomeryCurve25519.PrivateKeySizeInBytes];
rnd.NextBytes(_privateKey);
```
Source: [KeyExchangeECCurve25519.c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'SSH.NET'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2020.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sshnet/SSH.NET/security/advisories/GHSA-72p8-v4hg-v45p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29245'}, {'type': 'WEB', 'url': 'https://github.com/sshnet/SSH.NET/commit/03c6d60736b8f7b42e44d6989a53f9b644a091fb'}, {'type': 'WEB', 'url': 'https... | {'cwe_ids': ['CWE-330', 'CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T19:50:15Z', 'nvd_published_at': '2022-05-31T17:15:00Z'} |
1.4.0 | GHSA-rwf4-gx62-rqfw | 2022-06-08T22:28:27Z | 2022-06-08T22:28:27Z | null | [] | `MsQueue` `push`/`pop` use the wrong orderings | Affected versions of this crate use orderings which are too weak to support this data structure.
It is likely this has caused memory corruption in the wild: <https://github.com/crossbeam-rs/crossbeam/issues/97#issuecomment-412785919>.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'crossbeam'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/issues/97#issuecomment-412785919'}, {'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/pull/98'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossbeam-rs/crossbeam'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:28:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mq8j-3h7h-p8g7 | 2022-06-16T23:14:33Z | 2022-06-16T23:14:33Z | null | ['CVE-2022-29247'] | Compromised child renderer processes could obtain IPC access without nodeIntegrationInSubFrames being enabled | ### Impact
This vulnerability allows a renderer with JS execution to obtain access to a new renderer process with `nodeIntegrationInSubFrames` enabled which in turn allows effective access to `ipcRenderer`.
Please note the misleadingly named `nodeIntegrationInSubFrames` option does not implicitly grant Node.js access ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.5.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.0'}, {'fixed': '16.2.6'}]}]}, {'package': {'ecosystem': ... | [{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-mq8j-3h7h-p8g7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29247'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}] | {'cwe_ids': ['CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:14:33Z', 'nvd_published_at': '2022-06-13T21:15:00Z'} |
1.4.0 | GHSA-p9p4-97g9-wcrh | 2022-06-03T22:19:23Z | 2022-06-03T22:19:23Z | null | ['CVE-2022-31023'] | Dev error stack trace leaking into prod in Play Framework | ### Impact
Play Framework, when run in dev mode, shows verbose errors for easy debugging, including an exception stack trace. Play does this by configuring its `DefaultHttpErrorHandler` to do so based on the application mode. In its Scala API Play also provides a static object `DefaultHttpErrorHandler` that is configu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play_2.13'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8... | [{'type': 'WEB', 'url': 'https://github.com/playframework/playframework/security/advisories/GHSA-p9p4-97g9-wcrh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31023'}, {'type': 'WEB', 'url': 'https://github.com/playframework/playframework/pull/11305'}, {'type': 'PACKAGE', 'url': 'https://gith... | {'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:19:23Z', 'nvd_published_at': '2022-06-02T18:15:00Z'} |
1.4.0 | GHSA-4v9q-cgpw-cf38 | 2023-06-03T00:38:54Z | 2022-06-06T21:23:58Z | null | ['CVE-2022-29255'] | Multiple evaluation of contract address in call in vyper | ### Impact
when a calling an external contract with no return value, the contract address could be evaluated twice. this is usually only an efficiency problem, but if evaluation of the contract address has side effects, it could result in double evaluation of the side effects.
in the following example, `Foo(msg.sender... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ecosystem_specific': {'affected_functions': ['vyper.codegen.external_call.ir_for_external_call']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-4v9q-cgpw-cf38'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29255'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/6b4d8ff185de071252feaa1c319712b2d6577f8d'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-670'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-06T21:23:58Z', 'nvd_published_at': '2022-06-09T09:15:00Z'} |
1.4.0 | GHSA-6882-385p-hhhw | 2022-12-05T22:13:12Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34192'] | Cross-site Scripting in Jenkins ontrack Jenkins Plugin | Jenkins ontrack Jenkins Plugin 4.0.0 and earlier does not escape the name of Ontrack: Multi Parameter choice, Ontrack: Parameter choice, and Ontrack: SingleParameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure per... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ontrack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34192'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ontrack-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:10Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-f2wf-25xc-69c9 | 2022-06-20T21:56:53Z | 2022-06-09T23:47:25Z | null | ['CVE-2022-31042'] | Failure to strip the Cookie header on change in host or HTTP downgrade | ### Impact
`Cookie` headers on requests are sensitive information. On making a request using the `https` scheme to a server which responds with a redirect to a URI with the `http` scheme, or on making a request to a server which responds with a redirect to a a URI to a different host, we should not forward the `Cookie... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '6.5.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.4.4'}]... | [{'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/security/advisories/GHSA-f2wf-25xc-69c9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31042'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-200', 'CWE-212'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:47:25Z', 'nvd_published_at': '2022-06-10T00:15:00Z'} |
1.4.0 | GHSA-xpww-g9jx-hp8r | 2022-06-17T00:19:35Z | 2022-06-17T00:19:35Z | null | [] | Miscomputed sha2 results when using AVX2 backend | The v0.9.7 release of the `sha2` crate introduced a new AVX2-accelerated
backend which was automatically enabled for all x86/x86_64 CPUs where AVX2
support was autodetected at runtime.
This backend was buggy and would miscompute results for long messages
(i.e. messages spanning multiple SHA blocks).
The crate has sin... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'sha2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.7'}, {'fixed': '0.9.8'}]}], 'versions': ['0.9.7']}] | [{'type': 'WEB', 'url': 'https://github.com/RustCrypto/hashes/pull/314'}, {'type': 'PACKAGE', 'url': 'https://github.com/RustCrypto/hashes'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0100.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:19:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p782-xgp4-8hr8 | 2023-08-30T10:04:35Z | 2022-06-24T00:00:30Z | null | ['CVE-2022-29526'] | golang.org/x/sys/unix has Incorrect privilege reporting in syscall | Go before 1.17.10 and 1.18.x before 1.18.2 has Incorrect Privilege Reporting in syscall. When called with a non-zero flags parameter, the Faccessat function could incorrectly report that a file is accessible. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/sys/unix'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20220412211240-33da011f77ad'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/sys'}, 'ecosystem_specific': {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29526'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/issues/52313'}, {'type': 'PACKAGE', 'url': 'https://github.com/golang/go'}, {'type': 'WEB', 'url': 'https://go.dev/cl/399539'}, {'type': 'WEB', 'url': 'https://go.dev/cl/400074'}, {'type... | {'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:30:54Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-hrf3-622q-8366 | 2022-06-22T21:22:46Z | 2022-06-22T21:22:46Z | null | ['CVE-2022-31605'] | Unsafe yaml deserialization in NVFlare | ### Impact
NVFLARE contains a vulnerability in its utils module, where YAML files are loaded via yaml.load() instead of yaml.safe_load(). The deserialization of Untrusted Data, may allow an unprivileged network attacker to cause Remote Code Execution, Denial Of Service, and Impact to both Confidentiality and Integrity.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'nvflare'}, 'ecosystem_specific': {'affected_functions': ['nvflare.lighter.provision.main', 'nvflare.lighter.utils.load_yaml']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/NVIDIA/NVFlare/security/advisories/GHSA-hrf3-622q-8366'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31605'}, {'type': 'WEB', 'url': 'https://github.com/NVIDIA/NVFlare/commit/4de9782697ecb12f39bcae83221bd8d3498959be'}, {'type': 'PACKAGE', 'url': 'h... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T21:22:46Z', 'nvd_published_at': '2022-07-01T18:15:00Z'} |
1.4.0 | GHSA-5247-whvj-83qw | 2022-12-05T22:15:47Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34190'] | Cross-site Scripting in Jenkins Maven Metadata Plugin | Jenkins Maven Metadata Plugin for Jenkins CI server Plugin 2.1 and earlier does not escape the name and description of List maven artifact versions parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploita... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'eu.markov.jenkins.plugin.mvnmeta:maven-metadata-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34190'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/maven-metadata-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:17Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-7xhv-mpjw-422f | 2022-06-15T19:45:17Z | 2022-06-03T00:00:59Z | null | ['CVE-2021-34083'] | Command injection in google-it | Google-it is a Node.js package which allows its users to send search queries to Google and receive the results in a JSON format. When using the 'Open in browser' option in versions up to 1.6.2, google-it will unsafely concat the result's link retrieved from google to a shell command, potentially exposing the server to ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'google-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34083'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4777'}, {'type': 'PACKAGE', 'url': 'https://github.com/PatNeedham/google-it'}, {'type': 'WEB', 'url': 'https://github.com/PatNeedham/google-it/blob/v1.6.2/lib/googleIt... | {'cwe_ids': ['CWE-74', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:23:45Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-rh9j-f5f8-rvgc | 2022-06-20T21:20:53Z | 2022-06-17T22:09:09Z | null | ['CVE-2022-31083'] | Authentication bypass vulnerability in Apple Game Center auth adapter | ### Impact
The certificate in Apple Game Center auth adapter not validated. As a result, authentication could potentially be bypassed by making a fake certificate accessible via certain Apple domains and providing the URL to that certificate in an authData object.
### Patches
To prevent this, a new `rootCertificateUrl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.11'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-rh9j-f5f8-rvgc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31083'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/pull/8054'}, {'type': 'WEB', 'url': 'https://github.... | {'cwe_ids': ['CWE-287', 'CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T22:09:09Z', 'nvd_published_at': '2022-06-17T19:15:00Z'} |
1.4.0 | GHSA-jq66-xh47-j9f3 | 2023-08-25T00:12:18Z | 2022-06-16T23:06:58Z | null | ['CVE-2020-25575'] | Type confusion if __private_get_type_id__ is overriden | An issue was discovered in the failure crate through 0.1.5 for Rust. It has a type confusion flaw when downcasting. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'streebog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'failure'}, 'ecosystem_specific': {'affected_functions': ['failure::Fail::__private_get_type_id__']}, 'ranges': [{'type': '... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25575'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang-nursery/failure/issues/336'}, {'type': 'WEB', 'url': 'https://github.com/RustCrypto/hashes/pull/91'}, {'type': 'WEB', 'url': 'https://boats.gitlab.io/blog/post/failure-to-fehler/'}, {'ty... | {'cwe_ids': ['CWE-843'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:06:58Z', 'nvd_published_at': '2020-09-14T19:15:00Z'} |
1.4.0 | GHSA-jvq4-cgfw-jgf4 | 2022-06-20T21:57:36Z | 2022-06-12T00:00:44Z | null | ['CVE-2021-41502'] | Cross site scripting in intelliants/subrion | An issue was discovered in Subrion CMS v4.2.1 There is a stored cross-site scripting (XSS) vulnerability that can execute malicious JavaScript code by modifying the name of the uploaded image, closing the html tag, or adding the onerror attribute. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41502'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/885'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:01:26Z', 'nvd_published_at': '2022-06-11T14:15:00Z'} |
1.4.0 | GHSA-xcp5-j5fj-3xp6 | 2022-12-05T21:52:48Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34202'] | User passwords stored in plain text by Jenkins EasyQA Plugin | EasyQA Plugin 1.0 and earlier stores user passwords unencrypted in its global configuration file `EasyQAPluginProperties.xml` on the Jenkins controller as part of its configuration.
These passwords can be viewed by users with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.geteasyqa:easyqa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34202'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/easyqa-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2066'}] | {'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:55Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-9c9f-7x9p-4wqp | 2022-06-17T00:16:11Z | 2022-06-17T00:16:11Z | null | [] | A malicious coder can get unsound access to TCell or TLCell memory | This is impossible to do by accident, but by carefully constructing
marker types to be covariant, a malicious coder can cheat the
singleton check in `TCellOwner` and `TLCellOwner`, giving unsound
access to cell memory. This could take the form of getting two
mutable references to the same memory, or a mutable referenc... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'qcell'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/uazu/qcell/issues/20'}, {'type': 'PACKAGE', 'url': 'https://github.com/uazu/qcell'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0007.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:16:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g377-x8rg-c9mf | 2022-07-12T21:24:07Z | 2022-06-30T00:00:41Z | null | ['CVE-2022-33107'] | Deserialization of Untrusted Data in topthink/framework | ThinkPHP v6.0.12 was discovered to contain a deserialization vulnerability via the component vendor\league\flysystem-cached-adapter\src\Storage\AbstractCache.php. This vulnerability allows attackers to execute arbitrary code via a crafted payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33107'}, {'type': 'WEB', 'url': 'https://github.com/top-think/framework/issues/2717'}, {'type': 'PACKAGE', 'url': 'https://github.com/top-think/framework'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T21:24:07Z', 'nvd_published_at': '2022-06-29T12:15:00Z'} |
1.4.0 | GHSA-v68g-62v9-39w5 | 2022-07-13T19:56:53Z | 2022-06-29T22:40:16Z | null | ['CVE-2022-29858'] | Unpublished, protected files can be published via shortcode | Silverstripe silverstripe/assets through 1.10 is vulnerable to improper access control that allows protected images to be published by changing an existing image short code on website content. Draft protected images can be published by changing an existing image shortcode on website content to match the ID of the draft... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/assets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29858'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-assets/commit/5f6a73b010c01587ffbfb954441f6b7cbb54e767'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:40:16Z', 'nvd_published_at': '2022-06-28T22:15:00Z'} |
1.4.0 | GHSA-438w-rjj9-5fjf | 2022-12-05T22:01:57Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34195'] | Cross-site Scripting in Jenkins Repository Connector Plugin | Jenkins Repository Connector Plugin 2.2.0 and earlier does not escape the name and description of Maven Repository Artifact parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerabili... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:repository-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34195'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/repository-connector-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:05Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-4whx-7p29-mq22 | 2022-06-06T21:22:28Z | 2022-06-06T21:22:28Z | null | ['CVE-2022-31011'] | TiDB authentication bypass vulnerability | ### Impact
Under certain conditions, an attacker can construct malicious authentication requests to bypass the authentication process, resulting in privilege escalation or unauthorized access.
Only users using TiDB 5.3.0 are affected by this vulnerability.
### Patches
Please upgrade to TiDB 5.3.1 or higher version
##... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/pingcap/tidb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.1'}]}], 'versions': ['5.3.0']}] | [{'type': 'WEB', 'url': 'https://github.com/pingcap/tidb/security/advisories/GHSA-4whx-7p29-mq22'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31011'}, {'type': 'PACKAGE', 'url': 'https://github.com/pingcap/tidb'}, {'type': 'WEB', 'url': 'https://github.com/pingcap/tidb/releases/tag/v5.3.1'}... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-06T21:22:28Z', 'nvd_published_at': '2022-05-31T20:15:00Z'} |
1.4.0 | GHSA-fh99-4pgr-8j99 | 2022-06-17T20:55:14Z | 2022-06-17T20:55:14Z | null | ['CVE-2022-31047'] | Insertion of Sensitive Information into Log File in typo3/cms-core | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C` (4.9)
### Problem
It has been discovered that system internal credentials or keys (e.g. database credentials) have been logged as plaintext in exception handlers, when logging the complete exception stack trace.
### Solution
Update to T... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.6.57'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.47'}]}]},... | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-fh99-4pgr-8j99'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31047'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/c93ea692e7dfef03b7c50fe5437487545bee4d6a'}, {'type': 'WEB', 'url': 'https://git... | {'cwe_ids': ['CWE-209', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T20:55:14Z', 'nvd_published_at': '2022-06-14T21:15:00Z'} |
1.4.0 | GHSA-9w9f-6mg8-jp7w | 2023-02-14T21:38:16Z | 2022-06-03T22:17:51Z | null | ['CVE-2022-31022'] | Missing Role Based Access Control for the REST handlers in bleve/http package | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Bleve includes HTTP utilities under bleve/http package, that are used by its sample application.
(https://github.com/blevesearch/bleve-explorer)
These HTTP methods paves way for exploitation of a node’s filesystem where the bleve index resides,
if the u... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/blevesearch/bleve'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/blevesearch/bleve/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last... | [{'type': 'WEB', 'url': 'https://github.com/blevesearch/bleve/security/advisories/GHSA-9w9f-6mg8-jp7w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31022'}, {'type': 'WEB', 'url': 'https://github.com/blevesearch/bleve/commit/1c7509d6a17d36f265c90b4e8f4e3a3182fe79ff'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:17:51Z', 'nvd_published_at': '2022-06-01T20:15:00Z'} |
1.4.0 | GHSA-wwjw-r3gj-39fq | 2022-06-24T19:54:44Z | 2022-06-17T20:57:27Z | null | ['CVE-2022-31050'] | Insufficient Session Expiration in TYPO3's Admin Tool | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L/E:F/RL:O/RC:C` (5.6)
### Problem
Admin Tool sessions initiated via the TYPO3 backend user interface have not been revoked even if the corresponding user account was degraded to lower permissions or disabled completely. This way, sessions in the admin t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.29'}]}]... | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-wwjw-r3gj-39fq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31050'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/592387972912290c135ebecc91768a67f83a3a4d'}, {'type': 'WEB', 'url': 'https://git... | {'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T20:57:27Z', 'nvd_published_at': '2022-06-14T21:15:00Z'} |
1.4.0 | GHSA-pm37-5j5m-6cvw | 2022-06-29T21:50:35Z | 2022-06-22T00:00:55Z | null | ['CVE-2022-30874'] | Cross-site Scripting in NukeViet CMS | There is a Cross Site Scripting Stored (XSS) vulnerability in NukeViet CMS before 4.5.02. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'nukeviet/nukeviet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.02'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30874'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/commit/1f328bb8cd256f88bd45fc3ec5a50ae951da2501'}, {'type': 'PACKAGE', 'url': 'https://github.com/nukeviet/nukeviet'}, {'type': 'WEB', 'url': 'https://nukeviet.vn/vi/news/Tin-tuc... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:43:10Z', 'nvd_published_at': '2022-06-21T15:15:00Z'} |
1.4.0 | GHSA-29q6-p2cg-4v23 | 2022-12-05T23:27:46Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34177'] | Arbitrary file write vulnerability in Jenkins Pipeline: Input Step Plugin | Pipeline: Input Step Plugin 448.v37cea_9a_10a_70 and earlier allows Pipeline authors to specify `file` parameters for Pipeline `input` steps even though they are unsupported. Although the uploaded file is not copied to the workspace, Jenkins archives the file on the controller as part of build metadata using the parame... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-input-step'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '449.v77f0e8b'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34177'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/pipeline-input-step-plugin/commit/77f0e8b845c4ad429f6c717eab21cf4e7a69168e'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-input-step-plugin'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:27Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-56j7-2pm8-rgmx | 2022-06-02T20:52:23Z | 2022-06-02T20:52:23Z | null | ['CVE-2021-32546'] | OS Command Injection in gogs | ### Impact
The malicious user is able to update a crafted `config` file into repository's `.git` directory with to gain SSH access to the server. All installations with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129) are affected.... | [] | [{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-56j7-2pm8-rgmx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32546'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/6555'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/pull/6986'}, {'type': ... | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:52:23Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-h6wm-mr85-4h9g | 2022-06-23T21:25:22Z | 2022-06-14T00:00:37Z | null | ['CVE-2022-2066'] | Cross site scripting in facturascripts | A Cross-site Scripting (XSS) vulnerability exists in the fsNick parameter in facturascripts prior to version 2022.06 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'facturascripts/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.06'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2066'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/73a6595ca85984d65f656c6356fabb23d1936c54'}, {'type': 'PACKAGE', 'url': 'https://github.com/NeoRazorX/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:07:55Z', 'nvd_published_at': '2022-06-13T13:15:00Z'} |
1.4.0 | GHSA-23f2-vgr6-fwv7 | 2022-06-03T22:28:53Z | 2022-06-03T00:01:06Z | null | ['CVE-2022-29712'] | Command injection in librenms | LibreNMS v22.3.0 was discovered to contain multiple command injection vulnerabilities via the service_ip, hostname, and service_param parameters. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29712'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/13932'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/8b82341cb742e7bd4966964b399012f7ba017e0b'}, {'type': 'PACKAGE', 'url': 'https://github.com/libre... | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:28:53Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-mpg5-fvwp-42m2 | 2022-06-16T23:52:24Z | 2022-06-16T23:52:24Z | null | [] | Unsoundness in `dashmap` references | Reference returned by some methods of `Ref` (and similar types) may outlive the `Ref` and escape the lock.
This causes undefined behavior and may result in a segfault.
More information in [`dashmap#167`](https://github.com/xacrimon/dashmap/issues/167) issue.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'dashmap'}, 'ecosystem_specific': {'affected_functions': ['dashmap::mapref::multiple::RefMulti::key', 'dashmap::mapref::multiple::RefMulti::pair', 'dashmap::mapref::multiple::RefMulti::value', 'dashmap::mapref::multiple::RefMutMulti::key', 'dashmap::mapref::multiple::RefM... | [{'type': 'WEB', 'url': 'https://github.com/xacrimon/dashmap/issues/167'}, {'type': 'PACKAGE', 'url': 'https://github.com/xacrimon/dashmap'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0002.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:52:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-526x-rm7j-v389 | 2022-06-14T20:05:46Z | 2022-06-03T00:01:07Z | null | ['CVE-2022-30324'] | Privilege escalation in Hashicorp Nomad | HashiCorp Nomad and Nomad Enterprise version 0.2.0 up to 1.3.0 were impacted by go-getter vulnerabilities enabling privilege escalation through the artifact stanza in submitted jobs onto the client agent host. Fixed in 1.1.14, 1.2.8, and 1.3.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '1.1.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30324'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-14-nomad-impacted-by-go-getter-vulnerabilities/39932'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/no... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:30:32Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-xggc-qprg-x6mw | 2022-06-23T17:40:34Z | 2022-06-23T17:40:34Z | null | ['CVE-2022-31098'] | Weave GitOps leaked cluster credentials into logs on connection errors | ### Impact
A vulnerability in the logging of Weave GitOps could allow an authenticated remote attacker to view sensitive cluster configurations, aka KubeConfg, of registered Kubernetes clusters, including the service account tokens in plain text from Weave GitOps's pod logs on the management cluster. An unauthorized re... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/weaveworks/weave-gitops'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.1-rc.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.8.1-rc.5'}}] | [{'type': 'WEB', 'url': 'https://github.com/weaveworks/weave-gitops/security/advisories/GHSA-xggc-qprg-x6mw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31098'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/weave-gitops/commit/567356f471353fb5c676c77f5abc2a04631d50ca'}, {'type': 'P... | {'cwe_ids': ['CWE-200', 'CWE-209', 'CWE-532', 'CWE-538'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T17:40:34Z', 'nvd_published_at': '2022-06-27T22:15:00Z'} |
1.4.0 | GHSA-83gg-pwxf-jr89 | 2022-06-20T18:27:06Z | 2022-06-16T23:40:19Z | null | [] | `array!` macro is unsound in presence of traits that implement methods it calls internally | Affected versions of this crate called some methods using auto-ref. The affected code looked like this.
```rust
let mut arr = $crate::__core::mem::MaybeUninit::uninit();
let mut vec = $crate::__ArrayVec::<T>::new(arr.as_mut_ptr() as *mut T);
```
In this case, the problem is that `as_mut_ptr` is a method of `&mut Mayb... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'array-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.2'}, {'fixed': '1.0.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/xfix/array-macro/commit/01940637dd8f3bfeeee3faf9639fa9ae52f19f4d'}, {'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/blob/main/crates/array-macro/RUSTSEC-2020-0161.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/xfix/array-macro'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:40:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xw6g-jjvf-wwf9 | 2022-06-20T22:25:46Z | 2022-06-20T22:25:46Z | null | ['CVE-2022-31089'] | Invalid file request can crash server | ### Impact
Certain types of invalid files requests are not handled properly and can crash the server. If you are running multiple Parse Server instances in a cluster, the availability impact may be low; if you are running Parse Server as a single instance without redundancy, the availability impact may be high.
### Pa... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.12'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-xw6g-jjvf-wwf9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31089'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/5be375dec2fa35425c1003ae81c55995ac72af92'}, {... | {'cwe_ids': ['CWE-252'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:25:46Z', 'nvd_published_at': '2022-06-27T21:15:00Z'} |
1.4.0 | GHSA-pp3c-cf6j-m3ff | 2022-06-15T18:57:22Z | 2022-06-07T00:00:31Z | null | ['CVE-2022-29631'] | Server-Side Request Forgery in Jodd HTTP | Jodd HTTP v6.0.9 was discovered to contain multiple CLRF injection vulnerabilities via the components jodd.http.HttpRequest#set and `jodd.http.HttpRequest#send. These vulnerabilities allow attackers to execute Server-Side Request Forgery (SSRF) via a crafted TCP payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jodd:jodd-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '6.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29631'}, {'type': 'WEB', 'url': 'https://github.com/oblac/jodd-http/issues/9'}, {'type': 'WEB', 'url': 'https://github.com/oblac/jodd/issues/787'}, {'type': 'WEB', 'url': 'https://github.com/oblac/jodd-http/commit/e50f573c8f6a39212ade68c6eb1256b288... | {'cwe_ids': ['CWE-74', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-07T21:14:24Z', 'nvd_published_at': '2022-06-06T21:15:00Z'} |
1.4.0 | GHSA-j562-c3cw-3p5g | 2022-06-17T21:39:48Z | 2022-06-17T21:39:48Z | null | ['CVE-2022-31069'] | Potential Authorization Header Exposure in NPM Packages @finastra/nestjs-proxy, @ffdc/nestjs-proxy | The nestjs-proxy library did not have a way to control when Authorization headers should should be forwarded for specific backend services configured by the application developer. This could have resulted in sensitive information such as OAuth bearer access tokens being inadvertently exposed to such services that shoul... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@finastra/nestjs-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Finastra/finastra-nodejs-libs/security/advisories/GHSA-j562-c3cw-3p5g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31069'}, {'type': 'WEB', 'url': 'https://github.com/Finastra/finastra-nodejs-libs/pull/231'}, {'type': 'PACKAGE', 'url': 'https://gi... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:39:48Z', 'nvd_published_at': '2022-06-15T19:15:00Z'} |
1.4.0 | GHSA-g7xr-v82w-qggq | 2022-06-20T22:35:33Z | 2022-06-13T00:00:19Z | null | ['CVE-2021-41749'] | Code Injection in SEOmatic | In the SEOmatic plugin up to 3.4.11 for Craft CMS 3, it is possible for unauthenticated attackers to perform a Server-Side Template Injection, allowing for remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'nystudio107/craft-seomatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41749'}, {'type': 'WEB', 'url': 'https://github.com/nystudio107/craft-seomatic/commit/3fee7d50147cdf3f999cfc1e04cbc3fb3d9f2f7d'}, {'type': 'PACKAGE', 'url': 'https://github.com/nystudio107/craft-seomatic'}, {'type': 'WEB', 'url': 'https://github.co... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:35:33Z', 'nvd_published_at': '2022-06-12T11:15:00Z'} |
1.4.0 | GHSA-rwqr-c348-m5wr | 2022-07-05T21:27:19Z | 2022-06-24T00:00:31Z | 2022-06-28T16:39:06Z | ['CVE-2022-33124'] | Withdrawn: Denial of Service in aiohttp | ## Withdrawn
This advisory has been withdrawn because the maintainers of aiohttp and multiple third parties disputed the validity of the issue. There is not sufficient evidence for the claims in the original report.
## Original Description
aiohttp v3.8.1 was discovered to contain an invalid IPv6 URL which can lead to ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'aiohttp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33124'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp/issues/6772'}, {'type': 'PACKAGE', 'url': 'https://github.com/aio-libs/aiohttp'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:22:37Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-24h8-cpqm-qmf3 | 2022-12-05T21:54:16Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34200'] | Cross-Site Request Forgery in Jenkins Convertigo Mobile Platform Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier allows attackers to connect to an attacker-specified URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.convertigo.jenkins.plugins:convertigo-mobile-platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34200'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/convertigo-mobile-platform-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2276'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:41Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-7f84-p6r5-jr6q | 2022-12-06T00:05:44Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34171'] | Cross-site Scripting vulnerability in Jenkins | Since Jenkins 2.321 and LTS 2.332.1, the HTML output generated for new symbol-based SVG icons includes the `title` attribute of `l:ionicon` until Jenkins 2.334 and `alt` attribute of `l:icon` since Jenkins 2.335 without further escaping.
This vulnerability is known to be exploitable by attackers with Job/Configure per... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.350'}, {'fixed': '2.356'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.346'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34171'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2781'}] | {'cwe_ids': ['CWE-22', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T00:05:44Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-cqhr-q835-62gm | 2022-12-05T21:57:49Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34197'] | Cross-site Scripting in Jenkins Sauce OnDemand Plugin | Jenkins Sauce OnDemand Plugin 1.204 and earlier does not escape the name and description of Sauce Labs Browsers parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sauce-ondemand'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.205'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.204'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34197'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/sauce-ondemand-plugin/commit/cb00db7ff1fb3fd73c9a2f0c307960ae597a5932'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/sauce-ondemand-plugin'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:50Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-8639-qx56-r428 | 2022-06-01T20:26:37Z | 2022-06-01T20:26:37Z | null | ['CVE-2022-31000'] | CSRF allows attacker to finalize/unfinalize order adjustments in solidus_backend | ### Impact
CSRF vulnerability allowing attackers to change the state of an order's adjustments if they hold its number, and the execution happens on a store administrator's computer.
Reproduction steps:
- Take an order's number.
- Log in as an administrator.
- Visit that order's adjustments section (_Orders -> {Click ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'solidus_backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.6'}]}]}, {'p... | [{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/security/advisories/GHSA-8639-qx56-r428'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31000'}, {'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/commit/de796a2e0be7f154cae48b46e267501559d9716c'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T20:26:37Z', 'nvd_published_at': '2022-06-01T18:15:00Z'} |
1.4.0 | GHSA-gpw4-7mcw-m8vx | 2022-12-05T22:11:57Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34193'] | Cross-site Scripting in Jenkins Package Version Plugin | Jenkins Package Version Plugin 1.0.1 and earlier does not escape the name of Package version parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulnerability requires that parameters are... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.lilicurroad.jenkins:packageversion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34193'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/packageversion-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:07Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-6xj9-hpq3-w3qw | 2022-06-14T20:08:24Z | 2022-06-03T00:01:08Z | null | ['CVE-2022-30506'] | Code injection in MCMS | An arbitrary file upload vulnerability was discovered in MCMS 5.2.7, allowing an attacker to execute arbitrary code through a crafted ZIP file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30506'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/mingSoft/MCMS'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I56AID'}] | {'cwe_ids': ['CWE-434', 'CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:30:58Z', 'nvd_published_at': '2022-06-02T14:15:00Z'} |
1.4.0 | GHSA-4453-g295-24mh | 2022-06-29T22:42:21Z | 2022-06-21T00:00:48Z | null | ['CVE-2017-20060'] | Cross site scripting in Elefant CMS | A vulnerability, which was classified as problematic, was found in Elefant CMS 1.3.12-RC. This affects an unknown part of the component Blog Post Handler. The manipulation leads to basic cross site scripting (Persistent). It is possible to initiate the attack remotely. Upgrading to version 1.3.13 is able to address thi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'elefant/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20060'}, {'type': 'PACKAGE', 'url': 'https://github.com/jbroadway/elefant'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.97257'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Feb/36'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:42:21Z', 'nvd_published_at': '2022-06-20T05:15:00Z'} |
1.4.0 | GHSA-x4mq-m75f-mx8m | 2022-07-05T21:26:36Z | 2022-06-17T00:30:33Z | null | [] | Delegate functions are missing `Send` bound | Affected versions of this crate did not require event handlers to have `Send` bound despite there being no guarantee of them being called on any particular thread, which can potentially lead to data races and undefined behavior.
The flaw was corrected in commit [afe3252](https://github.com/microsoft/windows-rs/commit/... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'windows'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.2'}, {'fixed': '0.32.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/microsoft/windows-rs/issues/1409'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/windows-rs/commit/afe32525c22209aa8f632a0f4ad607863b51796a'}, {'type': 'PACKAGE', 'url': 'https://github.com/microsoft/windows-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories... | {'cwe_ids': ['CWE-820'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:30:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c8f7-x2g7-7fxj | 2022-10-19T20:54:09Z | 2022-06-02T14:23:29Z | null | [] | Phoenix-ws source code and data in extensions folder is publicly available | ### Impact
All of the source code, files, and folders in `phoenix_files/extensions/` are available to end users through a simple HTTP GET request.
### Patches
The issue has been patched. The users of version 1.0.6 and above are not effected. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'phoenix-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Froggo8311/Phoenix/security/advisories/GHSA-c8f7-x2g7-7fxj'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froggo8311/Phoenix'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T14:23:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4cf5-xmhp-3xj7 | 2022-07-11T19:25:50Z | 2022-06-30T00:00:41Z | null | ['CVE-2022-32532'] | Improper Authorization in Apache Shiro | Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32532'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/shiro'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/y8260dw8vbm99oq7zv6y3mzn5ovk90xh'}] | {'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:52:31Z', 'nvd_published_at': '2022-06-29T00:15:00Z'} |
1.4.0 | GHSA-hmqg-p8f8-3qrw | 2022-06-20T22:28:11Z | 2022-06-18T00:00:19Z | null | ['CVE-2022-25872'] | Out-of-bounds Read in fast-string-search | All versions of package fast-string-search are vulnerable to Out-of-bounds Read due to incorrect memory freeing and length calculation for any non-string input as the source. This allows the attacker to read previously allocated memory. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'fast-string-search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25872'}, {'type': 'PACKAGE', 'url': 'https://github.com/magiclen/node-fast-string-search'}, {'type': 'WEB', 'url': 'https://github.com/magiclen/node-fast-string-search/blob/c8dd9fc966abc80b327f509e63360f59e0de9fb5/src/fast-string-search.c%23L192'},... | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:28:11Z', 'nvd_published_at': '2022-06-17T20:15:00Z'} |
1.4.0 | GHSA-v829-j9rr-85v9 | 2022-06-29T21:52:07Z | 2022-06-22T00:00:54Z | null | ['CVE-2021-41924'] | Cross-site Scripting in krayin/laravel-crm | Webkul krayin crm before 1.2.2 is vulnerable to Cross Site Scripting (XSS). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'krayin/laravel-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41924'}, {'type': 'WEB', 'url': 'https://github.com/krayin/laravel-crm/pull/195/commits/882dc2e7e7e9149b96cf1ccacf34900960b92fb7'}, {'type': 'PACKAGE', 'url': 'https://github.com/krayin/laravel-crm'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:10:22Z', 'nvd_published_at': '2022-06-21T15:15:00Z'} |
1.4.0 | GHSA-6fp8-cxc9-4fr9 | 2022-09-01T20:09:19Z | 2022-06-17T21:44:23Z | null | ['CVE-2022-29866'] | Uncontrolled Resource Consumption in OPCFoundation.NetStandard.Opc.Ua.Core | A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to trigger a stack overflow exception in a server that exposes an HTTPS endpoint. | [] | [{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.368.58'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.368.53'}}] | [{'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-6fp8-cxc9-4fr9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29866'}, {'type': 'WEB', 'url': 'https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:44:23Z', 'nvd_published_at': '2022-06-16T18:15:00Z'} |
1.4.0 | GHSA-fcqr-gh8w-wm8f | 2022-12-05T22:09:09Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34194'] | Cross-site Scripting in Jenkins Readonly Parameter Plugin | Jenkins Readonly Parameter Plugin 1.0.0 and earlier does not escape the name and description of Readonly String and Readonly Text parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
Exploitation of this vulne... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:readonly-parameters'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34194'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/readonly-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:00Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-6293-2vg2-pmp5 | 2022-06-24T00:53:03Z | 2022-06-14T00:00:37Z | null | ['CVE-2022-2064'] | Insufficient Session Expiration in NocoDB | Insufficient Session Expiration in GitHub repository nocodb/nocodb prior to 0.91.9. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'nocodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.91.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2064'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/pull/2262'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/pull/2338'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/commit/c9b5111b25aea2781e19395a8e9107ddbd23... | {'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:53:03Z', 'nvd_published_at': '2022-06-13T12:15:00Z'} |
1.4.0 | GHSA-9g55-pg62-m8hh | 2022-06-16T23:49:25Z | 2022-06-16T23:49:25Z | null | [] | Channel creates zero value of any type | Affected versions of this crate called `mem::zeroed()` to create values of a user-supplied type `T`.
This is unsound e.g. if `T` is a reference type (which must be non-null).
The flaw was corrected by avoiding the use of `mem::zeroed()`, using `MaybeUninit` instead.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'crossbeam-channel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/pull/458'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossbeam-rs/crossbeam'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0019.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:49:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6xc4-7fmm-65q2 | 2022-07-06T16:49:22Z | 2022-06-25T00:00:53Z | null | ['CVE-2022-21829'] | Code injection in concrete CMS | Concrete CMS Versions 9.0.0 through 9.0.2 and 8.5.7 and below can download zip files over HTTP and execute code from those zip files which could lead to an RCE. Fixed by enforcing ‘concrete_secure’ instead of ‘concrete’. Concrete now only makes requests over https even a request comes in via http. Concrete CMS security... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21829'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1482520'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/858-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concr... | {'cwe_ids': ['CWE-319', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:07:26Z', 'nvd_published_at': '2022-06-24T15:15:00Z'} |
1.4.0 | GHSA-3m6f-3gfg-4x56 | 2022-06-17T00:19:49Z | 2022-06-17T00:19:49Z | null | [] | Panic on incorrect date input to `simple_asn1` | Version 0.6.0 of the `simple_asn1` crate panics on certain malformed
inputs to its parsing functions, including `from_der` and `der_decode`.
Because this crate is frequently used with inputs from the network, this
should be considered a security vulnerability.
The issue occurs when parsing the old ASN.1 "UTCTime" time... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'simple_asn1'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '0.6.1'}]}], 'versions': ['0.6.0']}] | [{'type': 'WEB', 'url': 'https://github.com/acw/simple_asn1/issues/27'}, {'type': 'WEB', 'url': 'https://github.com/acw/simple_asn1/commit/d7d39d709577710e9dc8833ee57d200eef366db8'}, {'type': 'PACKAGE', 'url': 'https://github.com/acw/simple_asn1'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-012... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:19:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jf5h-cf95-w759 | 2022-06-17T00:16:24Z | 2022-06-17T00:16:24Z | null | [] | Optional `Deserialize` implementations lacking validation | When activating the non-default feature `serialize`, most structs implement
`serde::Deserialize` without sufficient validation. This allows breaking
invariants in safe code, leading to:
* Undefined behavior in `as_string()` methods (which use
`std::str::from_utf8_unchecked()` internally).
* Panics due to failed asse... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'raw-cpuid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '9.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gz/rust-cpuid/issues/43'}, {'type': 'PACKAGE', 'url': 'https://github.com/gz/rust-cpuid'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0089.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:16:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mx8q-jqwm-85mv | 2023-06-30T20:40:22Z | 2022-06-14T00:00:37Z | null | ['CVE-2022-2062'] | NocoDB information disclosure vulnerability | In NocoDB prior to 0.91.7, the SMTP plugin doesn't have verification or validation. This allows attackers to make requests to internal servers and read the contents. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'nocodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.91.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2062'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/commit/a18f5dd53811b9ec1c1bb2fdbfb328c0c87d7fb4'}, {'type': 'PACKAGE', 'url': 'https://github.com/nocodb/nocodb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/35593b4c-f127-469... | {'cwe_ids': ['CWE-200', 'CWE-209', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:40:22Z', 'nvd_published_at': '2022-06-13T12:15:00Z'} |
1.4.0 | GHSA-7rq4-qcpw-74gq | 2022-06-17T01:17:22Z | 2022-06-17T01:17:22Z | null | [] | Formula Injection in Exported Data | ### Impact
Datasets exported to file (e.g. CSV / XLS) are not sufficiently sanitized, to neutralize potential formula injection
### Patches
- The issue is addressed in the upcoming 0.8.0 release
- This fix will also be back-ported to the 0.7.x branch, applied to the 0.7.2 release
### Workarounds
Users exporting un... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'inventree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/inventree/InvenTree/security/advisories/GHSA-7rq4-qcpw-74gq'}, {'type': 'PACKAGE', 'url': 'https://github.com/inventree/inventree-python/'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:17:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x2pg-mjhr-2m5x | 2022-06-20T22:00:29Z | 2022-06-09T23:51:25Z | null | ['CVE-2022-31051'] | Exposure of Sensitive Information to an Unauthorized Actor in semantic-release | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Secrets that would normally be masked by semantic-release can be accidentally disclosed if they contain characters that are excluded from uri encoding by [encodeURI](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/encodeUR... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'semantic-release'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '17.0.4'}, {'fixed': '19.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/semantic-release/semantic-release/security/advisories/GHSA-x2pg-mjhr-2m5x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31051'}, {'type': 'WEB', 'url': 'https://github.com/semantic-release/semantic-release/pull/2449'}, {'type': 'WEB', 'url': 'https... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:51:25Z', 'nvd_published_at': '2022-06-09T20:15:00Z'} |
1.4.0 | GHSA-6g4r-q7qg-6qx6 | 2022-12-05T23:51:57Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34173'] | Cross-site Scripting vulnerability in Jenkins | Since Jenkins 2.340, the tooltip of the build button in list views supports HTML without escaping the job display name.
This vulnerability is known to be exploitable by attackers with Job/Configure permission.
Jenkins 2.356 addresses this vulnerability. The tooltip of the build button in list views is now escaped.
N... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.340'}, {'fixed': '2.356'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34173'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2781'}] | {'cwe_ids': ['CWE-22', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:51:57Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-7r3r-gq8p-v9jj | 2022-07-07T17:15:28Z | 2022-06-23T17:48:19Z | null | ['CVE-2022-31103'] | Improper handling of CSS at-rules in lettersanitizer | ### Impact
All versions of lettersanitizer below 1.0.2 are affected by a denial of service issue when processing a CSS at-rule `@keyframes`.
This package is depended on by [react-letter](https://github.com/mat-sz/react-letter), therefore everyone using react-letter is also at risk.
### Patches
The problem has been ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'lettersanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mat-sz/lettersanitizer/security/advisories/GHSA-7r3r-gq8p-v9jj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31103'}, {'type': 'WEB', 'url': 'https://github.com/mat-sz/react-letter/issues/17'}, {'type': 'WEB', 'url': 'https://github.com/mat-sz/lett... | {'cwe_ids': ['CWE-754'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T17:48:19Z', 'nvd_published_at': '2022-06-27T23:15:00Z'} |
1.4.0 | GHSA-93mx-2vf9-28c4 | 2022-12-05T22:37:25Z | 2022-06-24T00:00:31Z | null | ['CVE-2022-34179'] | Path Traversal vulnerability in Jenkins Embeddable Build Status Plugin | Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows attackers without Overall/Read permission to specify paths to othe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:embeddable-build-status'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34179'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/embeddable-build-status-plugin/commit/63f82f28d989d30a23089a0a66c11f222651a8c6'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/embeddable-build-status-plugin'}, {'type': 'WEB... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:51Z', 'nvd_published_at': '2022-06-23T17:15:00Z'} |
1.4.0 | GHSA-rvgf-69j7-xh78 | 2023-09-07T18:48:21Z | 2022-06-18T00:00:20Z | null | ['CVE-2022-25345'] | Uncontrolled Resource Consumption in @discordjs/opus | Improperly handled errors in @discordjs/opus cause hard crashes instead of returning the error to user land. All versions of package @discordjs/opus (<= 0.7.0) are vulnerable to Denial of Service (DoS) when trying to encode using an encoder with zero channels, or a non-initialized buffer. This leads to a hard crash due... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@discordjs/opus'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25345'}, {'type': 'WEB', 'url': 'https://github.com/discordjs/opus/commit/406249f3fca484a2af97a34ceb989019efa09bc7'}, {'type': 'PACKAGE', 'url': 'https://github.com/discordjs/opus'}, {'type': 'WEB', 'url': 'https://github.com/discordjs/opus/blob/3c... | {'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:30:01Z', 'nvd_published_at': '2022-06-17T20:15:00Z'} |
1.4.0 | GHSA-77xc-hjv8-ww97 | 2022-06-29T21:48:38Z | 2022-06-16T23:18:47Z | null | ['CVE-2022-29257'] | AutoUpdater module fails to validate certain nested components of the bundle | ### Impact
This vulnerability allows attackers who have control over a given apps update server / update storage to serve maliciously crafted update packages that pass the code signing validation check but contain malicious code in some components.
Please note that this kind of attack would require **significant** pri... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.5.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.0'}, {'fixed': '16.2.0'}]}]}, {'package': {'ecosystem': ... | [{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-77xc-hjv8-ww97'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29257'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:18:47Z', 'nvd_published_at': '2022-06-13T22:15:00Z'} |
1.4.0 | GHSA-vv7q-mfpc-qgm5 | 2022-08-22T16:36:48Z | 2022-06-08T00:00:43Z | 2022-08-22T16:36:48Z | ['CVE-2022-31279'] | Unserialized Pop Chain in Laravel | ## Withdrawn
This advisory has been withdrawn because it is not a security issue and the CVE has been revoked.
## Original Description
Laravel 9.1.8, when processing attacker-controlled data for deserialization, allows Remote Code Execution (RCE) via an unserialized pop chain in __destruct in Illuminate\Broadcasting\P... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'laravel/laravel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31279'}, {'type': 'WEB', 'url': 'https://github.com/1nhann/vulns/issues/1#issuecomment-1213126338'}, {'type': 'WEB', 'url': 'https://github.com/1nhann/vulns/issues/3'}, {'type': 'WEB', 'url': 'https://github.com/ambionics/phpggc/issues/118'}, {'typ... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:27:54Z', 'nvd_published_at': '2022-06-07T16:15:00Z'} |
1.4.0 | GHSA-2927-hv3p-f3vp | 2022-06-14T20:01:41Z | 2022-06-03T00:00:29Z | null | ['CVE-2022-29718'] | Open redirect in caddy | Caddy v2.4 was discovered to contain an open redirect vulnerability. A remote unauthenticated attacker may exploit this vulnerability to redirect users to arbitrary web URLs by tricking the victim users to click on crafted links. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/caddyserver/caddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/caddyserver/caddy/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29718'}, {'type': 'WEB', 'url': 'https://github.com/caddyserver/caddy/pull/4499'}, {'type': 'WEB', 'url': 'https://github.com/caddyserver/caddy/pull/4499/commits/b23bdcf99cfbd09d50555a999a16468404789230'}, {'type': 'PACKAGE', 'url': 'https://github... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:16:20Z', 'nvd_published_at': '2022-06-02T21:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.