schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-hj9c-8jmm-8c52
2022-06-29T21:50:23Z
2022-06-02T15:37:27Z
null
['CVE-2022-29244']
Packing does not respect root-level ignore files in workspaces
### Impact `npm pack` ignores root-level `.gitignore` & `.npmignore` file exclusion directives when run in a workspace or with a workspace flag (ie. `--workspaces`, `--workspace=<name>`). Anyone who has run `npm pack` or `npm publish` with workspaces, as of [v7.9.0](https://github.com/npm/cli/releases/tag/v7.9.0) & [v7...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'npm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.9.0'}, {'fixed': '8.11.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/npm/cli/security/advisories/GHSA-hj9c-8jmm-8c52'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29244'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/node/pull/43210'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/node/releases/tag/v16.15.1...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T15:37:27Z', 'nvd_published_at': '2022-06-13T14:15:00Z'}
1.4.0
GHSA-jp3w-3q88-34cf
2022-06-17T00:17:08Z
2022-06-17T00:17:08Z
null
[]
Miscomputation when performing AES encryption in rust-crypto
The following Rust program demonstrates some strangeness in AES encryption - if you have an immutable key slice and then operate on that slice, you get different encryption output than if you operate on a copy of that key. For these functions, we expect that extending a 16 byte key to a 32 byte key by repeating it giv...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'rust-crypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.36'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/DaGenix/rust-crypto/issues/476'}, {'type': 'PACKAGE', 'url': 'https://github.com/DaGenix/rust-crypto/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0011.html'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:17:08Z', 'nvd_published_at': None}
1.4.0
GHSA-9fmg-89fx-r33w
2022-07-11T19:25:18Z
2022-06-29T22:39:50Z
null
['CVE-2021-41559']
Quadratic blowup in Convert::xml2array()
Silverstripe silverstripe/framework 4.x until 4.10.9 has a quadratic blowup in Convert::xml2array() that enables a remote attack via a crafted XML document.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41559'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2021-41559.yaml'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/releases'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-776'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:39:50Z', 'nvd_published_at': '2022-06-28T22:15:00Z'}
1.4.0
GHSA-rphm-c8gw-3r38
2022-06-15T19:44:56Z
2022-06-03T00:00:58Z
null
['CVE-2021-34078']
OS Command Injection in lifion-verify-deps
lifion-verify-dependencies through 1.1.0 is vulnerable to OS command injection via a crafted dependency name on the scanned project's package.json file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'lifion-verify-deps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34078'}, {'type': 'WEB', 'url': 'https://github.com/lifion/lifion-verify-deps/commit/be1133d5b78e3caa0004fa60207013dca4e1bf38'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4785'}, {'type': 'PACKAGE', 'url': 'https://git...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:19:56Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
1.4.0
GHSA-8mv5-7x95-7wcf
2023-06-13T18:35:51Z
2022-06-17T00:12:33Z
null
[]
`mopa` is technically unsound
The `mopa` crate redefines the deprecated `TraitObject` struct from `core::raw` like so: ```rust #[repr(C)] #[derive(Copy, Clone)] #[doc(hidden)] pub struct TraitObject { pub data: *mut (), pub vtable: *mut (), } ``` This is done to then transmute a reference to a trait object (`&dyn Trait` for any trait `Trait...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'mopa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/chris-morgan/mopa/issues/13'}, {'type': 'PACKAGE', 'url': 'https://github.com/chris-morgan/mopa'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0095.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:12:33Z', 'nvd_published_at': None}
1.4.0
GHSA-9qrp-h7fw-42hg
2022-06-01T19:56:34Z
2022-06-01T19:56:34Z
null
['CVE-2022-29253']
Path Traversal in XWiki Platform
### Impact One can ask for any file located in the classloader using the template API and a path with ".." in it. For example ``` {{template name="../xwiki.hbm.xml"/}} ``` To our knownledge none of the available files of the classloader in XWiki Standard contain any strong confidential data, hence the low confident...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.3-rc-1'}, {'fixed': '13.10.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9qrp-h7fw-42hg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29253'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/4917c8f355717bb636d763844528b1fe0f95e8e2'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-22', 'CWE-24'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T19:56:34Z', 'nvd_published_at': '2022-05-25T21:15:00Z'}
1.4.0
GHSA-r7pq-3x6p-7jcm
2022-09-01T20:12:37Z
2022-06-17T21:45:15Z
null
['CVE-2022-29863']
Memory Allocation with Excessive Size Value in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to cause a server to trigger an out of memory exception with a carefully crafted message.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.368.58'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.368.53'}}]
[{'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-r7pq-3x6p-7jcm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29863'}, {'type': 'WEB', 'url': 'https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022...
{'cwe_ids': ['CWE-789'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:45:15Z', 'nvd_published_at': '2022-06-16T18:15:00Z'}
1.4.0
GHSA-mj46-r4gr-5x83
2022-06-06T18:59:37Z
2022-06-03T22:32:06Z
null
['CVE-2022-25863']
Unsanitized JavaScript code injection possible in gatsby-plugin-mdx
### Impact The gatsby-plugin-mdx plugin prior to versions 3.15.2 and 2.14.1 passes input through to the `gray-matter` npm package, which is vulnerable to JavaScript injection in its default configuration, unless input is sanitized. The vulnerability is present when passing input in both webpack (MDX files in `src/page...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'gatsby-plugin-mdx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'gatsby-plugin-mdx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.15.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/security/advisories/GHSA-mj46-r4gr-5x83'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25863'}, {'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/pull/35830'}, {'type': 'WEB', 'url': 'https://github.com/gatsbyjs/gatsby/pull/...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:32:06Z', 'nvd_published_at': '2022-06-10T20:15:00Z'}
1.4.0
GHSA-jqwc-c49r-4w2x
2022-06-29T22:08:25Z
2022-06-29T22:08:25Z
null
['CVE-2022-31104']
Miscompilation of `i8x16.swizzle` and `select` with v128 inputs
### Impact Wasmtime's implementation of the [SIMD proposal for WebAssembly](https://github.com/webassembly/simd) on x86_64 contained two distinct bugs in the instruction lowerings implemented in Cranelift. The aarch64 implementation of the simd proposal is not affected. The bugs were presented in the `i8x16.swizzle` a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.38.1'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'cranelift-codegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.85.1'}]}], 'database_s...
[{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-jqwc-c49r-4w2x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31104'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/pull/4317'}, {'type': 'WEB', 'url': 'https://github.com/by...
{'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:08:25Z', 'nvd_published_at': '2022-06-28T00:15:00Z'}
1.4.0
GHSA-rppc-655v-7j3c
2022-07-11T19:26:57Z
2022-06-29T22:12:39Z
null
['CVE-2022-28803']
Stored XSS in link tags added via XHR in SilverStripe Framework
SilverStripe Framework 4.x prior to 4.10.9 is vulnerable to cross-site scripting inside the href attribute of an HTML hyperlink, which can be added to website content via XMLHttpRequest (XHR) by an authenticated CMS user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28803'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2022-28803.yaml'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2022-28803'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:12:39Z', 'nvd_published_at': '2022-06-29T01:15:00Z'}
1.4.0
GHSA-wgrg-5h56-jg27
2022-06-17T00:13:59Z
2022-06-17T00:13:59Z
null
[]
Out-of-bounds write in nix::unistd::getgrouplist
On certain platforms, if a user has more than 16 groups, the `nix::unistd::getgrouplist` function will call the libc `getgrouplist` function with a length parameter greater than the size of the buffer it provides, resulting in an out-of-bounds write and memory corruption. The libc `getgrouplist` function takes an in/o...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'nix'}, 'ecosystem_specific': {'affected_functions': ['nix::unistd::getgrouplist']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.16.0'}, {'fixed': '0.20.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'nix'}, 'ecosystem_specific': {'affected_func...
[{'type': 'WEB', 'url': 'https://github.com/nix-rust/nix/issues/1541'}, {'type': 'PACKAGE', 'url': 'https://github.com/nix-rust/nix'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0119.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:13:59Z', 'nvd_published_at': None}
1.4.0
GHSA-3x96-m42v-hvh5
2022-06-29T21:50:47Z
2022-06-23T00:00:35Z
null
['CVE-2022-2174']
Cross-site Scripting in Microweber
Cross-site Scripting (XSS) - Reflected in GitHub repository microweber/microweber prior to 1.2.18.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2174'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/c51285f791e48e536111cd57a9544ccbf7f33961'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:53:14Z', 'nvd_published_at': '2022-06-22T12:15:00Z'}
1.4.0
GHSA-r48q-9g5r-8q2h
2022-06-17T18:18:04Z
2022-06-09T00:00:23Z
null
['CVE-2022-1996']
Authorization Bypass Through User-Controlled Key in go-restful
Authorization Bypass Through User-Controlled Key in GitHub repository emicklei/go-restful prior to v3.8.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/emicklei/go-restful/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.8.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/emicklei/go-restful'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1996'}, {'type': 'WEB', 'url': 'https://github.com/emicklei/go-restful/issues/489'}, {'type': 'WEB', 'url': 'https://github.com/emicklei/go-restful/commit/926662532deb450272956c7bc573978464aae74e'}, {'type': 'WEB', 'url': 'https://github.com/emickl...
{'cwe_ids': ['CWE-639'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:50:21Z', 'nvd_published_at': '2022-06-08T13:15:00Z'}
1.4.0
GHSA-m9vj-44f3-78xw
2022-06-03T15:46:13Z
2022-06-01T00:00:35Z
null
['CVE-2022-23082']
Path traversal in CureKit
CureKit versions v1.0.1 through v1.1.3 are vulnerable to path traversal as the function `isFileOutsideDir` fails to sanitize the user input which may lead to path traversal.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.whitesource:curekit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.1'}, {'fixed': '1.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23082'}, {'type': 'WEB', 'url': 'https://github.com/whitesource/CureKit/commit/af35e870ed09411d2f1fae6db1b04598cd1a31b6'}, {'type': 'PACKAGE', 'url': 'https://github.com/whitesource/CureKit'}, {'type': 'WEB', 'url': 'https://www.mend.io/vulnerabili...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T15:45:42Z', 'nvd_published_at': '2022-05-31T15:15:00Z'}
1.4.0
GHSA-h588-76vg-prgj
2023-02-09T14:20:32Z
2022-06-16T23:41:29Z
null
[]
`DecimalArray` does not perform bound checks on accessing values and offsets
`DecimalArray` performs insufficient bounds checks, which allows out-of-bounds reads in safe code if the lenght of the backing buffer is not a multiple of 16.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'arrow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/apache/arrow-rs/issues/775'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/arrow-rs/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0117.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:41:29Z', 'nvd_published_at': None}
1.4.0
GHSA-xjfw-5vv5-vjq2
2022-06-01T20:25:54Z
2022-06-01T20:25:54Z
null
['CVE-2022-29258']
Cross-site Scripting in Filter Stream Converter Application in XWiki Platform
### Impact We found a possible XSS vector in the `Filter.FilterStreamDescriptorForm` wiki page related to pretty much all the form fields printed in the home page of the application. ### Patches The issue is patched in versions 12.10.11, 14.0-rc-1, 13.4.7, 13.10.3. ### Workarounds The easiest workaround is to edit th...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-filter-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.4'}, {'fixed': '12.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-filter-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events'...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xjfw-5vv5-vjq2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29258'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/21906acb5ee2304552f56f9bbdbf8e7d368f7f3a'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-116', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T20:25:54Z', 'nvd_published_at': '2022-05-31T17:15:00Z'}
1.4.0
GHSA-p3rc-946h-8cf5
2022-12-05T23:33:28Z
2022-06-24T00:00:31Z
null
['CVE-2022-34175']
Unauthorized view fragment access in Jenkins
Jenkins uses the Stapler web framework to render its UI views. These views are frequently composed of several view fragments, enabling plugins to extend existing views with more content. Before [SECURITY-534](https://www.jenkins.io/security/advisory/2019-07-17/#SECURITY-534) was fixed in Jenkins 2.186 and LTS 2.176.2,...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.335'}, {'fixed': '2.356'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34175'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2777'}]
{'cwe_ids': ['CWE-693', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:31:06Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-2m7h-86qq-fp4v
2022-06-21T20:03:23Z
2022-06-21T20:03:23Z
null
['CVE-2022-31034']
Insecure entropy in Argo CD's PKCE/Oauth2/OIDC params
### Impact All versions of Argo CD starting with v0.11.0 are vulnerable to a variety of attacks when an SSO login is initiated from the Argo CD CLI or UI. The vulnerabilities are due to the use of insufficiently random values in parameters in Oauth2/OIDC login flows. In each case, using a relatively-predictable (time-...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.11.0'}, {'fixed': '2.1.16'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.7'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'rang...
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-2m7h-86qq-fp4v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31034'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/17f7f4f462bdb233e1b9b36f67099f41052d8cb0'}, {'type': 'PACKAGE', 'url'...
{'cwe_ids': ['CWE-330', 'CWE-331'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:03:23Z', 'nvd_published_at': '2022-06-27T19:15:00Z'}
1.4.0
GHSA-gvxv-p9rv-gmcg
2022-07-21T15:55:07Z
2022-06-17T21:46:28Z
null
['CVE-2022-33156']
brotkrueml/typo3-matomo-integration vulnerable to Cross-Site Scripting
The extension fails to properly encode user input for output in HTML context. A TYPO3 backend user account is required to exploit the vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'brotkrueml/typo3-matomo-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33156'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/brotkrueml/typo3-matomo-integration/CVE-2022-33156.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/brotkrueml/typo3-matomo-integration'}, {'type...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:46:28Z', 'nvd_published_at': '2022-07-12T23:15:00Z'}
1.4.0
GHSA-wc36-xgcc-jwpr
2022-06-17T00:01:02Z
2022-06-17T00:01:02Z
null
[]
Failure to verify the public key of a `SignedEnvelope` against the `PeerId` in a `PeerRecord`
Affected versions of this crate did not check that the public key the signature was created with matches the peer ID of the peer record. Any combination was considered valid. This allows an attacker to republish an existing `PeerRecord` with a different `PeerId`.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'libp2p-core'}, 'ecosystem_specific': {'affected_functions': ['libp2p_core::PeerRecord::from_signed_envelope']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.30.0-rc.1'}, {'fixed': '0.30.2'}]}]}]
[{'type': 'PACKAGE', 'url': 'https://github.com/libp2p/rust-libp2p'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0009.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:01:02Z', 'nvd_published_at': None}
1.4.0
GHSA-3x3w-vcjx-7796
2022-06-08T22:28:13Z
2022-06-08T00:00:41Z
null
['CVE-2020-36534']
Cross-Site Request Forgery in easyii CMS
A vulnerability was found in easyii CMS. It has been classified as problematic. Affected is an unknown function of the file /admin/sign/out. The manipulation leads to cross site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'noumo/easyii'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36534'}, {'type': 'WEB', 'url': 'https://github.com/noumo/easyii/issues/222'}, {'type': 'PACKAGE', 'url': 'https://github.com/noumo/easyii/'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.160278'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:28:13Z', 'nvd_published_at': '2022-06-07T18:15:00Z'}
1.4.0
GHSA-g28x-pgr3-qqx6
2022-07-13T19:19:18Z
2022-06-15T21:24:16Z
null
['CVE-2022-31072']
Octokit gem published with world-writable files
### Impact Versions [4.23.0](https://rubygems.org/gems/octokit/versions/4.23.0) and [4.24.0](https://rubygems.org/gems/octokit/versions/4.24.0) of the octokit gem were published containing world-writeable files. Specifically, the gem was packed with files having their permissions set to `-rw-rw-rw-` (i.e. 0666) inst...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'octokit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.23.0'}, {'fixed': '4.25.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/octokit/octokit.rb/security/advisories/GHSA-g28x-pgr3-qqx6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31072'}, {'type': 'WEB', 'url': 'https://github.com/octokit/octokit.rb/commit/1c8edecc9cf23d1ceb959d91a416a69f55ce7d55'}, {'type': 'PACKAGE', '...
{'cwe_ids': ['CWE-276'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-15T21:24:16Z', 'nvd_published_at': '2022-06-15T23:15:00Z'}
1.4.0
GHSA-x938-fvfw-7jh5
2022-06-25T07:11:05Z
2022-06-25T07:11:05Z
null
['CVE-2022-31077']
CloudCore CSI Driver: Malicious response from KubeEdge can crash CSI Driver controller server
### Impact A malicious message response from KubeEdge can crash the CSI Driver controller server by triggering a nil-pointer dereference panic. As a consequence, the CSI Driver controller will be in denial of service. An attacker would already need to be an authenticated user of the Cloud, and only when the authenticat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.1'}]}], 'versions': ['1.10.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduc...
[{'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/security/advisories/GHSA-x938-fvfw-7jh5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31077'}, {'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/pull/3899'}, {'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/...
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:11:05Z', 'nvd_published_at': '2022-06-27T21:15:00Z'}
1.4.0
GHSA-fvxf-r9fw-49pc
2022-09-01T20:10:12Z
2022-06-17T21:44:39Z
null
['CVE-2022-29865']
Incorrect Implementation of Authentication Algorithm in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that - allows a malicious client or server to bypass the application authentication mechanism - and allow a connection to an untrusted peer.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.368.58'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.368.53'}}]
[{'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-fvxf-r9fw-49pc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29865'}, {'type': 'WEB', 'url': 'https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:44:39Z', 'nvd_published_at': '2022-06-16T17:15:00Z'}
1.4.0
GHSA-gm48-83x4-84jg
2022-06-17T19:20:46Z
2022-06-10T00:00:56Z
null
['CVE-2022-24969']
Server-side request forgery in Apache Dubbo
bypass CVE-2021-25640 > In Apache Dubbo prior to 2.6.12 and 2.7.15, the usage of parseURL method will lead to the bypass of the white host check which can cause open redirect or SSRF vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.7.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.alibaba:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.6.12'}]}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25640'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24969'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-gw4j-4229-q4px'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/1xbckc3467wfk5r7n2o44...
{'cwe_ids': ['CWE-601', 'CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-10T19:53:04Z', 'nvd_published_at': '2022-06-09T16:15:00Z'}
1.4.0
GHSA-pv7h-hx5h-mgfj
2022-06-20T21:58:53Z
2022-06-11T00:00:17Z
null
['CVE-2022-25845']
Unsafe deserialization in com.alibaba:fastjson
The package com.alibaba:fastjson before 1.2.83 is vulnerable to Deserialization of Untrusted Data by bypassing the default autoType shutdown restrictions, which is possible under certain conditions. Exploiting this vulnerability allows attacking remote servers. Workaround: If upgrading is not possible, you can enable [...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba:fastjson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.83'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25845'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/fastjson/commit/35db4adad70c32089542f23c272def1ad920a60d'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/fastjson/commit/8f3410f81cbd437f7c459f8868445d50ad301f15'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:58:22Z', 'nvd_published_at': '2022-06-10T20:15:00Z'}
1.4.0
GHSA-v25c-8349-v2q3
2022-06-29T22:03:36Z
2022-06-15T00:00:27Z
null
['CVE-2021-40616']
Incorrect Authorization in thinkcmf
thinkcmf v5.1.7 has an unauthorized vulnerability. The attacker can modify the password of the administrator account with id 1 through the background user management group permissions. The use condition is that the background user management group authority is required.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thinkcmf/thinkcmf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.1.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40616'}, {'type': 'WEB', 'url': 'https://github.com/thinkcmf/thinkcmf/issues/722'}, {'type': 'PACKAGE', 'url': 'https://github.com/thinkcmf/thinkcmf'}]
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:03:36Z', 'nvd_published_at': '2022-06-14T10:15:00Z'}
1.4.0
GHSA-7f7g-8q3x-jpx9
2022-06-29T22:41:51Z
2022-06-21T00:00:48Z
null
['CVE-2017-20059']
Cross site scripting in Elefant CMS
A vulnerability, which was classified as problematic, has been found in Elefant CMS 1.3.12-RC. Affected by this issue is some unknown functionality of the component Title Handler. The manipulation with the input </title><img src=no onerror=alert(1)> leads to basic cross site scripting (Persistent). The attack may be la...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'elefant/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20059'}, {'type': 'PACKAGE', 'url': 'https://github.com/jbroadway/elefant'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.97256'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Feb/36'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:41:51Z', 'nvd_published_at': '2022-06-20T05:15:00Z'}
1.4.0
GHSA-8f4f-v9x5-cg6j
2022-06-25T07:19:34Z
2022-06-25T07:19:34Z
null
['CVE-2022-31076']
CloudCore UDS Server: Malicious Message can crash CloudCore
### Impact A malicious message can crash CloudCore by triggering a null-pointer dereference in the UDS Server. Since the UDS Server only communicates with the CSI Driver on the cloud side, the attack is limited to the local host network. As such, an attacker would already need to be an authenticated user of the Cloud. ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.1'}]}], 'versions': ['1.10.0']}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduc...
[{'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/security/advisories/GHSA-8f4f-v9x5-cg6j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31076'}, {'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/pull/3899/commits/5d60ae9eabd6b6b7afe38758e19bbe8137664701'}, {'type': 'PA...
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:19:34Z', 'nvd_published_at': '2022-06-27T20:15:00Z'}
1.4.0
GHSA-7f3x-x4pr-wqhj
2022-07-07T17:15:41Z
2022-06-28T00:01:02Z
null
['CVE-2022-2216']
Server-Side Request Forgery in parse-url
Server-Side Request Forgery (SSRF) in GitHub repository ionicabizau/parse-url prior to 7.0.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2216'}, {'type': 'WEB', 'url': 'https://github.com/ionicabizau/parse-url/commit/21c72ab9412228eea753e2abc48f8962707b1fe3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/505a3d39-2723-4a06-b1f7-9b2d133c92e1'}]
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:07:53Z', 'nvd_published_at': '2022-06-27T12:15:00Z'}
1.4.0
GHSA-r67p-m7g9-gxw6
2022-06-16T23:51:58Z
2022-06-16T23:51:58Z
null
[]
`Read` on uninitialized memory may cause UB (fn preamble_skipcount())
Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation (within `fn preamble_skipcount()`). Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uniniti...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'csv-sniffer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jblondin/csv-sniffer/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/jblondin/csv-sniffer/pull/2'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0088.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:51:58Z', 'nvd_published_at': None}
1.4.0
GHSA-r7cj-wmwv-hfw5
2022-06-16T23:40:50Z
2022-06-16T23:40:50Z
null
[]
`BinaryArray` does not perform bound checks on reading values and offsets
`BinaryArray` performs insufficient validation on creation, which allows out-of-bounds reads in safe code.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'arrow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.0'}]}]}]
[{'type': 'PACKAGE', 'url': 'https://github.com/apache/arrow-rs'}, {'type': 'WEB', 'url': 'https://github.com/apache/arrow-rs/blob/6.4.0/CHANGELOG.md#640-2021-12-10'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0116.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:40:50Z', 'nvd_published_at': None}
1.4.0
GHSA-f4q6-9qm4-h8j4
2022-06-09T23:48:49Z
2022-06-09T23:48:49Z
null
['CVE-2022-24065']
OS Command Injection in cookiecutter
The package cookiecutter before 2.1.1 is vulnerable to Command Injection via hg argument injection. When calling the cookiecutter function from Python code with the checkout parameter, it is passed to the hg checkout command in a way that additional flags can be set. The additional flags can be used to perform a comman...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'cookiecutter'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24065'}, {'type': 'WEB', 'url': 'https://github.com/cookiecutter/cookiecutter/commit/fdffddb31fd2b46344dfa317531ff155e7999f77'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f4q6-9qm4-h8j4'}, {'type': 'PACKAGE', 'url': 'https://g...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:48:49Z', 'nvd_published_at': '2022-06-08T08:15:00Z'}
1.4.0
GHSA-72p8-v4hg-v45p
2022-06-15T18:57:58Z
2022-06-01T19:50:15Z
null
['CVE-2022-29245']
Weak private key generation in SSH.NET
During an **X25519** key exchange, the client’s private is generated with [**System.Random**](https://docs.microsoft.com/en-us/dotnet/api/system.random): ```cs var rnd = new Random(); _privateKey = new byte[MontgomeryCurve25519.PrivateKeySizeInBytes]; rnd.NextBytes(_privateKey); ``` Source: [KeyExchangeECCurve25519.c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'SSH.NET'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2020.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sshnet/SSH.NET/security/advisories/GHSA-72p8-v4hg-v45p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29245'}, {'type': 'WEB', 'url': 'https://github.com/sshnet/SSH.NET/commit/03c6d60736b8f7b42e44d6989a53f9b644a091fb'}, {'type': 'WEB', 'url': 'https...
{'cwe_ids': ['CWE-330', 'CWE-338'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T19:50:15Z', 'nvd_published_at': '2022-05-31T17:15:00Z'}
1.4.0
GHSA-rwf4-gx62-rqfw
2022-06-08T22:28:27Z
2022-06-08T22:28:27Z
null
[]
`MsQueue` `push`/`pop` use the wrong orderings
Affected versions of this crate use orderings which are too weak to support this data structure. It is likely this has caused memory corruption in the wild: <https://github.com/crossbeam-rs/crossbeam/issues/97#issuecomment-412785919>.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'crossbeam'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/issues/97#issuecomment-412785919'}, {'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/pull/98'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossbeam-rs/crossbeam'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:28:27Z', 'nvd_published_at': None}
1.4.0
GHSA-mq8j-3h7h-p8g7
2022-06-16T23:14:33Z
2022-06-16T23:14:33Z
null
['CVE-2022-29247']
Compromised child renderer processes could obtain IPC access without nodeIntegrationInSubFrames being enabled
### Impact This vulnerability allows a renderer with JS execution to obtain access to a new renderer process with `nodeIntegrationInSubFrames` enabled which in turn allows effective access to `ipcRenderer`. Please note the misleadingly named `nodeIntegrationInSubFrames` option does not implicitly grant Node.js access ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.5.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.0'}, {'fixed': '16.2.6'}]}]}, {'package': {'ecosystem': ...
[{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-mq8j-3h7h-p8g7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29247'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}]
{'cwe_ids': ['CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:14:33Z', 'nvd_published_at': '2022-06-13T21:15:00Z'}
1.4.0
GHSA-p9p4-97g9-wcrh
2022-06-03T22:19:23Z
2022-06-03T22:19:23Z
null
['CVE-2022-31023']
Dev error stack trace leaking into prod in Play Framework
### Impact Play Framework, when run in dev mode, shows verbose errors for easy debugging, including an exception stack trace. Play does this by configuring its `DefaultHttpErrorHandler` to do so based on the application mode. In its Scala API Play also provides a static object `DefaultHttpErrorHandler` that is configu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play_2.13'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8...
[{'type': 'WEB', 'url': 'https://github.com/playframework/playframework/security/advisories/GHSA-p9p4-97g9-wcrh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31023'}, {'type': 'WEB', 'url': 'https://github.com/playframework/playframework/pull/11305'}, {'type': 'PACKAGE', 'url': 'https://gith...
{'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:19:23Z', 'nvd_published_at': '2022-06-02T18:15:00Z'}
1.4.0
GHSA-4v9q-cgpw-cf38
2023-06-03T00:38:54Z
2022-06-06T21:23:58Z
null
['CVE-2022-29255']
Multiple evaluation of contract address in call in vyper
### Impact when a calling an external contract with no return value, the contract address could be evaluated twice. this is usually only an efficiency problem, but if evaluation of the contract address has side effects, it could result in double evaluation of the side effects. in the following example, `Foo(msg.sender...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'vyper'}, 'ecosystem_specific': {'affected_functions': ['vyper.codegen.external_call.ir_for_external_call']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/security/advisories/GHSA-4v9q-cgpw-cf38'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29255'}, {'type': 'WEB', 'url': 'https://github.com/vyperlang/vyper/commit/6b4d8ff185de071252feaa1c319712b2d6577f8d'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-670'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-06T21:23:58Z', 'nvd_published_at': '2022-06-09T09:15:00Z'}
1.4.0
GHSA-6882-385p-hhhw
2022-12-05T22:13:12Z
2022-06-24T00:00:31Z
null
['CVE-2022-34192']
Cross-site Scripting in Jenkins ontrack Jenkins Plugin
Jenkins ontrack Jenkins Plugin 4.0.0 and earlier does not escape the name of Ontrack: Multi Parameter choice, Ontrack: Parameter choice, and Ontrack: SingleParameter parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure per...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ontrack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34192'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ontrack-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:10Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-f2wf-25xc-69c9
2022-06-20T21:56:53Z
2022-06-09T23:47:25Z
null
['CVE-2022-31042']
Failure to strip the Cookie header on change in host or HTTP downgrade
### Impact `Cookie` headers on requests are sensitive information. On making a request using the `https` scheme to a server which responds with a redirect to a URI with the `http` scheme, or on making a request to a server which responds with a redirect to a a URI to a different host, we should not forward the `Cookie...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '6.5.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/guzzle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.4.4'}]...
[{'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/security/advisories/GHSA-f2wf-25xc-69c9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31042'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/guzzle/commit/e3ff079b22820c2029d4c2a87796b6a0b8716ad8'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-200', 'CWE-212'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:47:25Z', 'nvd_published_at': '2022-06-10T00:15:00Z'}
1.4.0
GHSA-xpww-g9jx-hp8r
2022-06-17T00:19:35Z
2022-06-17T00:19:35Z
null
[]
Miscomputed sha2 results when using AVX2 backend
The v0.9.7 release of the `sha2` crate introduced a new AVX2-accelerated backend which was automatically enabled for all x86/x86_64 CPUs where AVX2 support was autodetected at runtime. This backend was buggy and would miscompute results for long messages (i.e. messages spanning multiple SHA blocks). The crate has sin...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'sha2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.7'}, {'fixed': '0.9.8'}]}], 'versions': ['0.9.7']}]
[{'type': 'WEB', 'url': 'https://github.com/RustCrypto/hashes/pull/314'}, {'type': 'PACKAGE', 'url': 'https://github.com/RustCrypto/hashes'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0100.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:19:35Z', 'nvd_published_at': None}
1.4.0
GHSA-p782-xgp4-8hr8
2023-08-30T10:04:35Z
2022-06-24T00:00:30Z
null
['CVE-2022-29526']
golang.org/x/sys/unix has Incorrect privilege reporting in syscall
Go before 1.17.10 and 1.18.x before 1.18.2 has Incorrect Privilege Reporting in syscall. When called with a non-zero flags parameter, the Faccessat function could incorrectly report that a file is accessible.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/sys/unix'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20220412211240-33da011f77ad'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/sys'}, 'ecosystem_specific': {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29526'}, {'type': 'WEB', 'url': 'https://github.com/golang/go/issues/52313'}, {'type': 'PACKAGE', 'url': 'https://github.com/golang/go'}, {'type': 'WEB', 'url': 'https://go.dev/cl/399539'}, {'type': 'WEB', 'url': 'https://go.dev/cl/400074'}, {'type...
{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:30:54Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-hrf3-622q-8366
2022-06-22T21:22:46Z
2022-06-22T21:22:46Z
null
['CVE-2022-31605']
Unsafe yaml deserialization in NVFlare
### Impact NVFLARE contains a vulnerability in its utils module, where YAML files are loaded via yaml.load() instead of yaml.safe_load(). The deserialization of Untrusted Data, may allow an unprivileged network attacker to cause Remote Code Execution, Denial Of Service, and Impact to both Confidentiality and Integrity....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'nvflare'}, 'ecosystem_specific': {'affected_functions': ['nvflare.lighter.provision.main', 'nvflare.lighter.utils.load_yaml']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/NVIDIA/NVFlare/security/advisories/GHSA-hrf3-622q-8366'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31605'}, {'type': 'WEB', 'url': 'https://github.com/NVIDIA/NVFlare/commit/4de9782697ecb12f39bcae83221bd8d3498959be'}, {'type': 'PACKAGE', 'url': 'h...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T21:22:46Z', 'nvd_published_at': '2022-07-01T18:15:00Z'}
1.4.0
GHSA-5247-whvj-83qw
2022-12-05T22:15:47Z
2022-06-24T00:00:31Z
null
['CVE-2022-34190']
Cross-site Scripting in Jenkins Maven Metadata Plugin
Jenkins Maven Metadata Plugin for Jenkins CI server Plugin 2.1 and earlier does not escape the name and description of List maven artifact versions parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploita...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'eu.markov.jenkins.plugin.mvnmeta:maven-metadata-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34190'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/maven-metadata-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:17Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-7xhv-mpjw-422f
2022-06-15T19:45:17Z
2022-06-03T00:00:59Z
null
['CVE-2021-34083']
Command injection in google-it
Google-it is a Node.js package which allows its users to send search queries to Google and receive the results in a JSON format. When using the 'Open in browser' option in versions up to 1.6.2, google-it will unsafely concat the result's link retrieved from google to a shell command, potentially exposing the server to ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'google-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34083'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2021-4777'}, {'type': 'PACKAGE', 'url': 'https://github.com/PatNeedham/google-it'}, {'type': 'WEB', 'url': 'https://github.com/PatNeedham/google-it/blob/v1.6.2/lib/googleIt...
{'cwe_ids': ['CWE-74', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:23:45Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
1.4.0
GHSA-rh9j-f5f8-rvgc
2022-06-20T21:20:53Z
2022-06-17T22:09:09Z
null
['CVE-2022-31083']
Authentication bypass vulnerability in Apple Game Center auth adapter
### Impact The certificate in Apple Game Center auth adapter not validated. As a result, authentication could potentially be bypassed by making a fake certificate accessible via certain Apple domains and providing the URL to that certificate in an authData object. ### Patches To prevent this, a new `rootCertificateUrl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.11'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-rh9j-f5f8-rvgc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31083'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/pull/8054'}, {'type': 'WEB', 'url': 'https://github....
{'cwe_ids': ['CWE-287', 'CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T22:09:09Z', 'nvd_published_at': '2022-06-17T19:15:00Z'}
1.4.0
GHSA-jq66-xh47-j9f3
2023-08-25T00:12:18Z
2022-06-16T23:06:58Z
null
['CVE-2020-25575']
Type confusion if __private_get_type_id__ is overriden
An issue was discovered in the failure crate through 0.1.5 for Rust. It has a type confusion flaw when downcasting. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'streebog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'failure'}, 'ecosystem_specific': {'affected_functions': ['failure::Fail::__private_get_type_id__']}, 'ranges': [{'type': '...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25575'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang-nursery/failure/issues/336'}, {'type': 'WEB', 'url': 'https://github.com/RustCrypto/hashes/pull/91'}, {'type': 'WEB', 'url': 'https://boats.gitlab.io/blog/post/failure-to-fehler/'}, {'ty...
{'cwe_ids': ['CWE-843'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:06:58Z', 'nvd_published_at': '2020-09-14T19:15:00Z'}
1.4.0
GHSA-jvq4-cgfw-jgf4
2022-06-20T21:57:36Z
2022-06-12T00:00:44Z
null
['CVE-2021-41502']
Cross site scripting in intelliants/subrion
An issue was discovered in Subrion CMS v4.2.1 There is a stored cross-site scripting (XSS) vulnerability that can execute malicious JavaScript code by modifying the name of the uploaded image, closing the html tag, or adding the onerror attribute.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41502'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/885'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:01:26Z', 'nvd_published_at': '2022-06-11T14:15:00Z'}
1.4.0
GHSA-xcp5-j5fj-3xp6
2022-12-05T21:52:48Z
2022-06-24T00:00:31Z
null
['CVE-2022-34202']
User passwords stored in plain text by Jenkins EasyQA Plugin
EasyQA Plugin 1.0 and earlier stores user passwords unencrypted in its global configuration file `EasyQAPluginProperties.xml` on the Jenkins controller as part of its configuration. These passwords can be viewed by users with access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.geteasyqa:easyqa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34202'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/easyqa-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2066'}]
{'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:55Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-9c9f-7x9p-4wqp
2022-06-17T00:16:11Z
2022-06-17T00:16:11Z
null
[]
A malicious coder can get unsound access to TCell or TLCell memory
This is impossible to do by accident, but by carefully constructing marker types to be covariant, a malicious coder can cheat the singleton check in `TCellOwner` and `TLCellOwner`, giving unsound access to cell memory. This could take the form of getting two mutable references to the same memory, or a mutable referenc...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'qcell'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/uazu/qcell/issues/20'}, {'type': 'PACKAGE', 'url': 'https://github.com/uazu/qcell'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0007.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:16:11Z', 'nvd_published_at': None}
1.4.0
GHSA-g377-x8rg-c9mf
2022-07-12T21:24:07Z
2022-06-30T00:00:41Z
null
['CVE-2022-33107']
Deserialization of Untrusted Data in topthink/framework
ThinkPHP v6.0.12 was discovered to contain a deserialization vulnerability via the component vendor\league\flysystem-cached-adapter\src\Storage\AbstractCache.php. This vulnerability allows attackers to execute arbitrary code via a crafted payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33107'}, {'type': 'WEB', 'url': 'https://github.com/top-think/framework/issues/2717'}, {'type': 'PACKAGE', 'url': 'https://github.com/top-think/framework'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T21:24:07Z', 'nvd_published_at': '2022-06-29T12:15:00Z'}
1.4.0
GHSA-v68g-62v9-39w5
2022-07-13T19:56:53Z
2022-06-29T22:40:16Z
null
['CVE-2022-29858']
Unpublished, protected files can be published via shortcode
Silverstripe silverstripe/assets through 1.10 is vulnerable to improper access control that allows protected images to be published by changing an existing image short code on website content. Draft protected images can be published by changing an existing image shortcode on website content to match the ID of the draft...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/assets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29858'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-assets/commit/5f6a73b010c01587ffbfb954441f6b7cbb54e767'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:40:16Z', 'nvd_published_at': '2022-06-28T22:15:00Z'}
1.4.0
GHSA-438w-rjj9-5fjf
2022-12-05T22:01:57Z
2022-06-24T00:00:31Z
null
['CVE-2022-34195']
Cross-site Scripting in Jenkins Repository Connector Plugin
Jenkins Repository Connector Plugin 2.2.0 and earlier does not escape the name and description of Maven Repository Artifact parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of this vulnerabili...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:repository-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34195'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/repository-connector-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:05Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-4whx-7p29-mq22
2022-06-06T21:22:28Z
2022-06-06T21:22:28Z
null
['CVE-2022-31011']
TiDB authentication bypass vulnerability
### Impact Under certain conditions, an attacker can construct malicious authentication requests to bypass the authentication process, resulting in privilege escalation or unauthorized access. Only users using TiDB 5.3.0 are affected by this vulnerability. ### Patches Please upgrade to TiDB 5.3.1 or higher version ##...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pingcap/tidb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.0'}, {'fixed': '5.3.1'}]}], 'versions': ['5.3.0']}]
[{'type': 'WEB', 'url': 'https://github.com/pingcap/tidb/security/advisories/GHSA-4whx-7p29-mq22'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31011'}, {'type': 'PACKAGE', 'url': 'https://github.com/pingcap/tidb'}, {'type': 'WEB', 'url': 'https://github.com/pingcap/tidb/releases/tag/v5.3.1'}...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-06T21:22:28Z', 'nvd_published_at': '2022-05-31T20:15:00Z'}
1.4.0
GHSA-fh99-4pgr-8j99
2022-06-17T20:55:14Z
2022-06-17T20:55:14Z
null
['CVE-2022-31047']
Insertion of Sensitive Information into Log File in typo3/cms-core
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N/E:F/RL:O/RC:C` (4.9) ### Problem It has been discovered that system internal credentials or keys (e.g. database credentials) have been logged as plaintext in exception handlers, when logging the complete exception stack trace. ### Solution Update to T...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.6.57'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.47'}]}]},...
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-fh99-4pgr-8j99'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31047'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/c93ea692e7dfef03b7c50fe5437487545bee4d6a'}, {'type': 'WEB', 'url': 'https://git...
{'cwe_ids': ['CWE-209', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T20:55:14Z', 'nvd_published_at': '2022-06-14T21:15:00Z'}
1.4.0
GHSA-9w9f-6mg8-jp7w
2023-02-14T21:38:16Z
2022-06-03T22:17:51Z
null
['CVE-2022-31022']
Missing Role Based Access Control for the REST handlers in bleve/http package
### Impact _What kind of vulnerability is it? Who is impacted?_ Bleve includes HTTP utilities under bleve/http package, that are used by its sample application. (https://github.com/blevesearch/bleve-explorer) These HTTP methods paves way for exploitation of a node’s filesystem where the bleve index resides, if the u...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/blevesearch/bleve'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/blevesearch/bleve/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last...
[{'type': 'WEB', 'url': 'https://github.com/blevesearch/bleve/security/advisories/GHSA-9w9f-6mg8-jp7w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31022'}, {'type': 'WEB', 'url': 'https://github.com/blevesearch/bleve/commit/1c7509d6a17d36f265c90b4e8f4e3a3182fe79ff'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:17:51Z', 'nvd_published_at': '2022-06-01T20:15:00Z'}
1.4.0
GHSA-wwjw-r3gj-39fq
2022-06-24T19:54:44Z
2022-06-17T20:57:27Z
null
['CVE-2022-31050']
Insufficient Session Expiration in TYPO3's Admin Tool
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L/E:F/RL:O/RC:C` (5.6) ### Problem Admin Tool sessions initiated via the TYPO3 backend user interface have not been revoked even if the corresponding user account was degraded to lower permissions or disabled completely. This way, sessions in the admin t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.35'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.29'}]}]...
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-wwjw-r3gj-39fq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31050'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/592387972912290c135ebecc91768a67f83a3a4d'}, {'type': 'WEB', 'url': 'https://git...
{'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T20:57:27Z', 'nvd_published_at': '2022-06-14T21:15:00Z'}
1.4.0
GHSA-pm37-5j5m-6cvw
2022-06-29T21:50:35Z
2022-06-22T00:00:55Z
null
['CVE-2022-30874']
Cross-site Scripting in NukeViet CMS
There is a Cross Site Scripting Stored (XSS) vulnerability in NukeViet CMS before 4.5.02.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nukeviet/nukeviet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.02'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30874'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/commit/1f328bb8cd256f88bd45fc3ec5a50ae951da2501'}, {'type': 'PACKAGE', 'url': 'https://github.com/nukeviet/nukeviet'}, {'type': 'WEB', 'url': 'https://nukeviet.vn/vi/news/Tin-tuc...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T06:43:10Z', 'nvd_published_at': '2022-06-21T15:15:00Z'}
1.4.0
GHSA-29q6-p2cg-4v23
2022-12-05T23:27:46Z
2022-06-24T00:00:31Z
null
['CVE-2022-34177']
Arbitrary file write vulnerability in Jenkins Pipeline: Input Step Plugin
Pipeline: Input Step Plugin 448.v37cea_9a_10a_70 and earlier allows Pipeline authors to specify `file` parameters for Pipeline `input` steps even though they are unsupported. Although the uploaded file is not copied to the workspace, Jenkins archives the file on the controller as part of build metadata using the parame...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-input-step'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '449.v77f0e8b'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34177'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/pipeline-input-step-plugin/commit/77f0e8b845c4ad429f6c717eab21cf4e7a69168e'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-input-step-plugin'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:27Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-56j7-2pm8-rgmx
2022-06-02T20:52:23Z
2022-06-02T20:52:23Z
null
['CVE-2021-32546']
OS Command Injection in gogs
### Impact The malicious user is able to update a crafted `config` file into repository's `.git` directory with to gain SSH access to the server. All installations with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129) are affected....
[]
[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-56j7-2pm8-rgmx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32546'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/6555'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/pull/6986'}, {'type': ...
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T20:52:23Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
1.4.0
GHSA-h6wm-mr85-4h9g
2022-06-23T21:25:22Z
2022-06-14T00:00:37Z
null
['CVE-2022-2066']
Cross site scripting in facturascripts
A Cross-site Scripting (XSS) vulnerability exists in the fsNick parameter in facturascripts prior to version 2022.06
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'facturascripts/facturascripts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.06'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2066'}, {'type': 'WEB', 'url': 'https://github.com/neorazorx/facturascripts/commit/73a6595ca85984d65f656c6356fabb23d1936c54'}, {'type': 'PACKAGE', 'url': 'https://github.com/NeoRazorX/facturascripts'}, {'type': 'WEB', 'url': 'https://huntr.dev/boun...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:07:55Z', 'nvd_published_at': '2022-06-13T13:15:00Z'}
1.4.0
GHSA-23f2-vgr6-fwv7
2022-06-03T22:28:53Z
2022-06-03T00:01:06Z
null
['CVE-2022-29712']
Command injection in librenms
LibreNMS v22.3.0 was discovered to contain multiple command injection vulnerabilities via the service_ip, hostname, and service_param parameters.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29712'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/13932'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/8b82341cb742e7bd4966964b399012f7ba017e0b'}, {'type': 'PACKAGE', 'url': 'https://github.com/libre...
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:28:53Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
1.4.0
GHSA-mpg5-fvwp-42m2
2022-06-16T23:52:24Z
2022-06-16T23:52:24Z
null
[]
Unsoundness in `dashmap` references
Reference returned by some methods of `Ref` (and similar types) may outlive the `Ref` and escape the lock. This causes undefined behavior and may result in a segfault. More information in [`dashmap#167`](https://github.com/xacrimon/dashmap/issues/167) issue.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'dashmap'}, 'ecosystem_specific': {'affected_functions': ['dashmap::mapref::multiple::RefMulti::key', 'dashmap::mapref::multiple::RefMulti::pair', 'dashmap::mapref::multiple::RefMulti::value', 'dashmap::mapref::multiple::RefMutMulti::key', 'dashmap::mapref::multiple::RefM...
[{'type': 'WEB', 'url': 'https://github.com/xacrimon/dashmap/issues/167'}, {'type': 'PACKAGE', 'url': 'https://github.com/xacrimon/dashmap'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0002.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:52:24Z', 'nvd_published_at': None}
1.4.0
GHSA-526x-rm7j-v389
2022-06-14T20:05:46Z
2022-06-03T00:01:07Z
null
['CVE-2022-30324']
Privilege escalation in Hashicorp Nomad
HashiCorp Nomad and Nomad Enterprise version 0.2.0 up to 1.3.0 were impacted by go-getter vulnerabilities enabling privilege escalation through the artifact stanza in submitted jobs onto the client agent host. Fixed in 1.1.14, 1.2.8, and 1.3.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '1.1.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '1.2...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30324'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-14-nomad-impacted-by-go-getter-vulnerabilities/39932'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/no...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:30:32Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
1.4.0
GHSA-xggc-qprg-x6mw
2022-06-23T17:40:34Z
2022-06-23T17:40:34Z
null
['CVE-2022-31098']
Weave GitOps leaked cluster credentials into logs on connection errors
### Impact A vulnerability in the logging of Weave GitOps could allow an authenticated remote attacker to view sensitive cluster configurations, aka KubeConfg, of registered Kubernetes clusters, including the service account tokens in plain text from Weave GitOps's pod logs on the management cluster. An unauthorized re...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/weaveworks/weave-gitops'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.1-rc.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.8.1-rc.5'}}]
[{'type': 'WEB', 'url': 'https://github.com/weaveworks/weave-gitops/security/advisories/GHSA-xggc-qprg-x6mw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31098'}, {'type': 'WEB', 'url': 'https://github.com/weaveworks/weave-gitops/commit/567356f471353fb5c676c77f5abc2a04631d50ca'}, {'type': 'P...
{'cwe_ids': ['CWE-200', 'CWE-209', 'CWE-532', 'CWE-538'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T17:40:34Z', 'nvd_published_at': '2022-06-27T22:15:00Z'}
1.4.0
GHSA-83gg-pwxf-jr89
2022-06-20T18:27:06Z
2022-06-16T23:40:19Z
null
[]
`array!` macro is unsound in presence of traits that implement methods it calls internally
Affected versions of this crate called some methods using auto-ref. The affected code looked like this. ```rust let mut arr = $crate::__core::mem::MaybeUninit::uninit(); let mut vec = $crate::__ArrayVec::<T>::new(arr.as_mut_ptr() as *mut T); ``` In this case, the problem is that `as_mut_ptr` is a method of `&mut Mayb...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'array-macro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.2'}, {'fixed': '1.0.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xfix/array-macro/commit/01940637dd8f3bfeeee3faf9639fa9ae52f19f4d'}, {'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/blob/main/crates/array-macro/RUSTSEC-2020-0161.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/xfix/array-macro'}, {'type': 'WEB', 'url': 'h...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:40:19Z', 'nvd_published_at': None}
1.4.0
GHSA-xw6g-jjvf-wwf9
2022-06-20T22:25:46Z
2022-06-20T22:25:46Z
null
['CVE-2022-31089']
Invalid file request can crash server
### Impact Certain types of invalid files requests are not handled properly and can crash the server. If you are running multiple Parse Server instances in a cluster, the availability impact may be low; if you are running Parse Server as a single instance without redundancy, the availability impact may be high. ### Pa...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.12'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-xw6g-jjvf-wwf9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31089'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/5be375dec2fa35425c1003ae81c55995ac72af92'}, {...
{'cwe_ids': ['CWE-252'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:25:46Z', 'nvd_published_at': '2022-06-27T21:15:00Z'}
1.4.0
GHSA-pp3c-cf6j-m3ff
2022-06-15T18:57:22Z
2022-06-07T00:00:31Z
null
['CVE-2022-29631']
Server-Side Request Forgery in Jodd HTTP
Jodd HTTP v6.0.9 was discovered to contain multiple CLRF injection vulnerabilities via the components jodd.http.HttpRequest#set and `jodd.http.HttpRequest#send. These vulnerabilities allow attackers to execute Server-Side Request Forgery (SSRF) via a crafted TCP payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jodd:jodd-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '6.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29631'}, {'type': 'WEB', 'url': 'https://github.com/oblac/jodd-http/issues/9'}, {'type': 'WEB', 'url': 'https://github.com/oblac/jodd/issues/787'}, {'type': 'WEB', 'url': 'https://github.com/oblac/jodd-http/commit/e50f573c8f6a39212ade68c6eb1256b288...
{'cwe_ids': ['CWE-74', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-07T21:14:24Z', 'nvd_published_at': '2022-06-06T21:15:00Z'}
1.4.0
GHSA-j562-c3cw-3p5g
2022-06-17T21:39:48Z
2022-06-17T21:39:48Z
null
['CVE-2022-31069']
Potential Authorization Header Exposure in NPM Packages @finastra/nestjs-proxy, @ffdc/nestjs-proxy
The nestjs-proxy library did not have a way to control when Authorization headers should should be forwarded for specific backend services configured by the application developer. This could have resulted in sensitive information such as OAuth bearer access tokens being inadvertently exposed to such services that shoul...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@finastra/nestjs-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Finastra/finastra-nodejs-libs/security/advisories/GHSA-j562-c3cw-3p5g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31069'}, {'type': 'WEB', 'url': 'https://github.com/Finastra/finastra-nodejs-libs/pull/231'}, {'type': 'PACKAGE', 'url': 'https://gi...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:39:48Z', 'nvd_published_at': '2022-06-15T19:15:00Z'}
1.4.0
GHSA-g7xr-v82w-qggq
2022-06-20T22:35:33Z
2022-06-13T00:00:19Z
null
['CVE-2021-41749']
Code Injection in SEOmatic
In the SEOmatic plugin up to 3.4.11 for Craft CMS 3, it is possible for unauthenticated attackers to perform a Server-Side Template Injection, allowing for remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nystudio107/craft-seomatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41749'}, {'type': 'WEB', 'url': 'https://github.com/nystudio107/craft-seomatic/commit/3fee7d50147cdf3f999cfc1e04cbc3fb3d9f2f7d'}, {'type': 'PACKAGE', 'url': 'https://github.com/nystudio107/craft-seomatic'}, {'type': 'WEB', 'url': 'https://github.co...
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:35:33Z', 'nvd_published_at': '2022-06-12T11:15:00Z'}
1.4.0
GHSA-rwqr-c348-m5wr
2022-07-05T21:27:19Z
2022-06-24T00:00:31Z
2022-06-28T16:39:06Z
['CVE-2022-33124']
Withdrawn: Denial of Service in aiohttp
## Withdrawn This advisory has been withdrawn because the maintainers of aiohttp and multiple third parties disputed the validity of the issue. There is not sufficient evidence for the claims in the original report. ## Original Description aiohttp v3.8.1 was discovered to contain an invalid IPv6 URL which can lead to ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'aiohttp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33124'}, {'type': 'WEB', 'url': 'https://github.com/aio-libs/aiohttp/issues/6772'}, {'type': 'PACKAGE', 'url': 'https://github.com/aio-libs/aiohttp'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-25T07:22:37Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-24h8-cpqm-qmf3
2022-12-05T21:54:16Z
2022-06-24T00:00:31Z
null
['CVE-2022-34200']
Cross-Site Request Forgery in Jenkins Convertigo Mobile Platform Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier allows attackers to connect to an attacker-specified URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.convertigo.jenkins.plugins:convertigo-mobile-platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34200'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/convertigo-mobile-platform-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2276'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:41Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-7f84-p6r5-jr6q
2022-12-06T00:05:44Z
2022-06-24T00:00:31Z
null
['CVE-2022-34171']
Cross-site Scripting vulnerability in Jenkins
Since Jenkins 2.321 and LTS 2.332.1, the HTML output generated for new symbol-based SVG icons includes the `title` attribute of `l:ionicon` until Jenkins 2.334 and `alt` attribute of `l:icon` since Jenkins 2.335 without further escaping. This vulnerability is known to be exploitable by attackers with Job/Configure per...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.350'}, {'fixed': '2.356'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.346'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34171'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2781'}]
{'cwe_ids': ['CWE-22', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T00:05:44Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-cqhr-q835-62gm
2022-12-05T21:57:49Z
2022-06-24T00:00:31Z
null
['CVE-2022-34197']
Cross-site Scripting in Jenkins Sauce OnDemand Plugin
Jenkins Sauce OnDemand Plugin 1.204 and earlier does not escape the name and description of Sauce Labs Browsers parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of this vulnerability requires ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sauce-ondemand'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.205'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.204'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34197'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/sauce-ondemand-plugin/commit/cb00db7ff1fb3fd73c9a2f0c307960ae597a5932'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/sauce-ondemand-plugin'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:55:50Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-8639-qx56-r428
2022-06-01T20:26:37Z
2022-06-01T20:26:37Z
null
['CVE-2022-31000']
CSRF allows attacker to finalize/unfinalize order adjustments in solidus_backend
### Impact CSRF vulnerability allowing attackers to change the state of an order's adjustments if they hold its number, and the execution happens on a store administrator's computer. Reproduction steps: - Take an order's number. - Log in as an administrator. - Visit that order's adjustments section (_Orders -> {Click ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'solidus_backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.16'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'solidus_backend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.6'}]}]}, {'p...
[{'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/security/advisories/GHSA-8639-qx56-r428'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31000'}, {'type': 'WEB', 'url': 'https://github.com/solidusio/solidus/commit/de796a2e0be7f154cae48b46e267501559d9716c'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-06-01T20:26:37Z', 'nvd_published_at': '2022-06-01T18:15:00Z'}
1.4.0
GHSA-gpw4-7mcw-m8vx
2022-12-05T22:11:57Z
2022-06-24T00:00:31Z
null
['CVE-2022-34193']
Cross-site Scripting in Jenkins Package Version Plugin
Jenkins Package Version Plugin 1.0.1 and earlier does not escape the name of Package version parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of this vulnerability requires that parameters are...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.lilicurroad.jenkins:packageversion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34193'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/packageversion-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:07Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-6xj9-hpq3-w3qw
2022-06-14T20:08:24Z
2022-06-03T00:01:08Z
null
['CVE-2022-30506']
Code injection in MCMS
An arbitrary file upload vulnerability was discovered in MCMS 5.2.7, allowing an attacker to execute arbitrary code through a crafted ZIP file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30506'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/mingSoft/MCMS'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I56AID'}]
{'cwe_ids': ['CWE-434', 'CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:30:58Z', 'nvd_published_at': '2022-06-02T14:15:00Z'}
1.4.0
GHSA-4453-g295-24mh
2022-06-29T22:42:21Z
2022-06-21T00:00:48Z
null
['CVE-2017-20060']
Cross site scripting in Elefant CMS
A vulnerability, which was classified as problematic, was found in Elefant CMS 1.3.12-RC. This affects an unknown part of the component Blog Post Handler. The manipulation leads to basic cross site scripting (Persistent). It is possible to initiate the attack remotely. Upgrading to version 1.3.13 is able to address thi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'elefant/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-20060'}, {'type': 'PACKAGE', 'url': 'https://github.com/jbroadway/elefant'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.97257'}, {'type': 'WEB', 'url': 'http://seclists.org/fulldisclosure/2017/Feb/36'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:42:21Z', 'nvd_published_at': '2022-06-20T05:15:00Z'}
1.4.0
GHSA-x4mq-m75f-mx8m
2022-07-05T21:26:36Z
2022-06-17T00:30:33Z
null
[]
Delegate functions are missing `Send` bound
Affected versions of this crate did not require event handlers to have `Send` bound despite there being no guarantee of them being called on any particular thread, which can potentially lead to data races and undefined behavior. The flaw was corrected in commit [afe3252](https://github.com/microsoft/windows-rs/commit/...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'windows'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.2'}, {'fixed': '0.32.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/microsoft/windows-rs/issues/1409'}, {'type': 'WEB', 'url': 'https://github.com/microsoft/windows-rs/commit/afe32525c22209aa8f632a0f4ad607863b51796a'}, {'type': 'PACKAGE', 'url': 'https://github.com/microsoft/windows-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories...
{'cwe_ids': ['CWE-820'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:30:33Z', 'nvd_published_at': None}
1.4.0
GHSA-c8f7-x2g7-7fxj
2022-10-19T20:54:09Z
2022-06-02T14:23:29Z
null
[]
Phoenix-ws source code and data in extensions folder is publicly available
### Impact All of the source code, files, and folders in `phoenix_files/extensions/` are available to end users through a simple HTTP GET request. ### Patches The issue has been patched. The users of version 1.0.6 and above are not effected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'phoenix-ws'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Froggo8311/Phoenix/security/advisories/GHSA-c8f7-x2g7-7fxj'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froggo8311/Phoenix'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-02T14:23:29Z', 'nvd_published_at': None}
1.4.0
GHSA-4cf5-xmhp-3xj7
2022-07-11T19:25:50Z
2022-06-30T00:00:41Z
null
['CVE-2022-32532']
Improper Authorization in Apache Shiro
Apache Shiro before 1.9.1, A RegexRequestMatcher can be misconfigured to be bypassed on some servlet containers. Applications using RegExPatternMatcher with `.` in the regular expression are possibly vulnerable to an authorization bypass.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32532'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/shiro'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/y8260dw8vbm99oq7zv6y3mzn5ovk90xh'}]
{'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:52:31Z', 'nvd_published_at': '2022-06-29T00:15:00Z'}
1.4.0
GHSA-hmqg-p8f8-3qrw
2022-06-20T22:28:11Z
2022-06-18T00:00:19Z
null
['CVE-2022-25872']
Out-of-bounds Read in fast-string-search
All versions of package fast-string-search are vulnerable to Out-of-bounds Read due to incorrect memory freeing and length calculation for any non-string input as the source. This allows the attacker to read previously allocated memory.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'fast-string-search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25872'}, {'type': 'PACKAGE', 'url': 'https://github.com/magiclen/node-fast-string-search'}, {'type': 'WEB', 'url': 'https://github.com/magiclen/node-fast-string-search/blob/c8dd9fc966abc80b327f509e63360f59e0de9fb5/src/fast-string-search.c%23L192'},...
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:28:11Z', 'nvd_published_at': '2022-06-17T20:15:00Z'}
1.4.0
GHSA-v829-j9rr-85v9
2022-06-29T21:52:07Z
2022-06-22T00:00:54Z
null
['CVE-2021-41924']
Cross-site Scripting in krayin/laravel-crm
Webkul krayin crm before 1.2.2 is vulnerable to Cross Site Scripting (XSS).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'krayin/laravel-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41924'}, {'type': 'WEB', 'url': 'https://github.com/krayin/laravel-crm/pull/195/commits/882dc2e7e7e9149b96cf1ccacf34900960b92fb7'}, {'type': 'PACKAGE', 'url': 'https://github.com/krayin/laravel-crm'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:10:22Z', 'nvd_published_at': '2022-06-21T15:15:00Z'}
1.4.0
GHSA-6fp8-cxc9-4fr9
2022-09-01T20:09:19Z
2022-06-17T21:44:23Z
null
['CVE-2022-29866']
Uncontrolled Resource Consumption in OPCFoundation.NetStandard.Opc.Ua.Core
A vulnerability was discovered in the OPC UA .NET Standard Stack that allows a malicious client to trigger a stack overflow exception in a server that exposes an HTTPS endpoint.
[]
[{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.368.58'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.368.53'}}]
[{'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/security/advisories/GHSA-6fp8-cxc9-4fr9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29866'}, {'type': 'WEB', 'url': 'https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20CVE-2022...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:44:23Z', 'nvd_published_at': '2022-06-16T18:15:00Z'}
1.4.0
GHSA-fcqr-gh8w-wm8f
2022-12-05T22:09:09Z
2022-06-24T00:00:31Z
null
['CVE-2022-34194']
Cross-site Scripting in Jenkins Readonly Parameter Plugin
Jenkins Readonly Parameter Plugin 1.0.0 and earlier does not escape the name and description of Readonly String and Readonly Text parameters on views displaying parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Exploitation of this vulne...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:readonly-parameters'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34194'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/readonly-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2784'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:00Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-6293-2vg2-pmp5
2022-06-24T00:53:03Z
2022-06-14T00:00:37Z
null
['CVE-2022-2064']
Insufficient Session Expiration in NocoDB
Insufficient Session Expiration in GitHub repository nocodb/nocodb prior to 0.91.9.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'nocodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.91.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2064'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/pull/2262'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/pull/2338'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/commit/c9b5111b25aea2781e19395a8e9107ddbd23...
{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T00:53:03Z', 'nvd_published_at': '2022-06-13T12:15:00Z'}
1.4.0
GHSA-9g55-pg62-m8hh
2022-06-16T23:49:25Z
2022-06-16T23:49:25Z
null
[]
Channel creates zero value of any type
Affected versions of this crate called `mem::zeroed()` to create values of a user-supplied type `T`. This is unsound e.g. if `T` is a reference type (which must be non-null). The flaw was corrected by avoiding the use of `mem::zeroed()`, using `MaybeUninit` instead.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'crossbeam-channel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/pull/458'}, {'type': 'PACKAGE', 'url': 'https://github.com/crossbeam-rs/crossbeam'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0019.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:49:25Z', 'nvd_published_at': None}
1.4.0
GHSA-6xc4-7fmm-65q2
2022-07-06T16:49:22Z
2022-06-25T00:00:53Z
null
['CVE-2022-21829']
Code injection in concrete CMS
Concrete CMS Versions 9.0.0 through 9.0.2 and 8.5.7 and below can download zip files over HTTP and execute code from those zip files which could lead to an RCE. Fixed by enforcing ‘concrete_secure’ instead of ‘concrete’. Concrete now only makes requests over https even a request comes in via http. Concrete CMS security...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21829'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1482520'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/858-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concr...
{'cwe_ids': ['CWE-319', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T22:07:26Z', 'nvd_published_at': '2022-06-24T15:15:00Z'}
1.4.0
GHSA-3m6f-3gfg-4x56
2022-06-17T00:19:49Z
2022-06-17T00:19:49Z
null
[]
Panic on incorrect date input to `simple_asn1`
Version 0.6.0 of the `simple_asn1` crate panics on certain malformed inputs to its parsing functions, including `from_der` and `der_decode`. Because this crate is frequently used with inputs from the network, this should be considered a security vulnerability. The issue occurs when parsing the old ASN.1 "UTCTime" time...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'simple_asn1'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.6.0'}, {'fixed': '0.6.1'}]}], 'versions': ['0.6.0']}]
[{'type': 'WEB', 'url': 'https://github.com/acw/simple_asn1/issues/27'}, {'type': 'WEB', 'url': 'https://github.com/acw/simple_asn1/commit/d7d39d709577710e9dc8833ee57d200eef366db8'}, {'type': 'PACKAGE', 'url': 'https://github.com/acw/simple_asn1'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-012...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:19:49Z', 'nvd_published_at': None}
1.4.0
GHSA-jf5h-cf95-w759
2022-06-17T00:16:24Z
2022-06-17T00:16:24Z
null
[]
Optional `Deserialize` implementations lacking validation
When activating the non-default feature `serialize`, most structs implement `serde::Deserialize` without sufficient validation. This allows breaking invariants in safe code, leading to: * Undefined behavior in `as_string()` methods (which use `std::str::from_utf8_unchecked()` internally). * Panics due to failed asse...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'raw-cpuid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '9.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gz/rust-cpuid/issues/43'}, {'type': 'PACKAGE', 'url': 'https://github.com/gz/rust-cpuid'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0089.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T00:16:24Z', 'nvd_published_at': None}
1.4.0
GHSA-mx8q-jqwm-85mv
2023-06-30T20:40:22Z
2022-06-14T00:00:37Z
null
['CVE-2022-2062']
NocoDB information disclosure vulnerability
In NocoDB prior to 0.91.7, the SMTP plugin doesn't have verification or validation. This allows attackers to make requests to internal servers and read the contents.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'nocodb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.91.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2062'}, {'type': 'WEB', 'url': 'https://github.com/nocodb/nocodb/commit/a18f5dd53811b9ec1c1bb2fdbfb328c0c87d7fb4'}, {'type': 'PACKAGE', 'url': 'https://github.com/nocodb/nocodb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/35593b4c-f127-469...
{'cwe_ids': ['CWE-200', 'CWE-209', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:40:22Z', 'nvd_published_at': '2022-06-13T12:15:00Z'}
1.4.0
GHSA-7rq4-qcpw-74gq
2022-06-17T01:17:22Z
2022-06-17T01:17:22Z
null
[]
Formula Injection in Exported Data
### Impact Datasets exported to file (e.g. CSV / XLS) are not sufficiently sanitized, to neutralize potential formula injection ### Patches - The issue is addressed in the upcoming 0.8.0 release - This fix will also be back-ported to the 0.7.x branch, applied to the 0.7.2 release ### Workarounds Users exporting un...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'inventree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/inventree/InvenTree/security/advisories/GHSA-7rq4-qcpw-74gq'}, {'type': 'PACKAGE', 'url': 'https://github.com/inventree/inventree-python/'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T01:17:22Z', 'nvd_published_at': None}
1.4.0
GHSA-x2pg-mjhr-2m5x
2022-06-20T22:00:29Z
2022-06-09T23:51:25Z
null
['CVE-2022-31051']
Exposure of Sensitive Information to an Unauthorized Actor in semantic-release
### Impact _What kind of vulnerability is it? Who is impacted?_ Secrets that would normally be masked by semantic-release can be accidentally disclosed if they contain characters that are excluded from uri encoding by [encodeURI](https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Global_Objects/encodeUR...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'semantic-release'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '17.0.4'}, {'fixed': '19.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/semantic-release/semantic-release/security/advisories/GHSA-x2pg-mjhr-2m5x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31051'}, {'type': 'WEB', 'url': 'https://github.com/semantic-release/semantic-release/pull/2449'}, {'type': 'WEB', 'url': 'https...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-09T23:51:25Z', 'nvd_published_at': '2022-06-09T20:15:00Z'}
1.4.0
GHSA-6g4r-q7qg-6qx6
2022-12-05T23:51:57Z
2022-06-24T00:00:31Z
null
['CVE-2022-34173']
Cross-site Scripting vulnerability in Jenkins
Since Jenkins 2.340, the tooltip of the build button in list views supports HTML without escaping the job display name. This vulnerability is known to be exploitable by attackers with Job/Configure permission. Jenkins 2.356 addresses this vulnerability. The tooltip of the build button in list views is now escaped. N...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.340'}, {'fixed': '2.356'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34173'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-22/#SECURITY-2781'}]
{'cwe_ids': ['CWE-22', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:51:57Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-7r3r-gq8p-v9jj
2022-07-07T17:15:28Z
2022-06-23T17:48:19Z
null
['CVE-2022-31103']
Improper handling of CSS at-rules in lettersanitizer
### Impact All versions of lettersanitizer below 1.0.2 are affected by a denial of service issue when processing a CSS at-rule `@keyframes`. This package is depended on by [react-letter](https://github.com/mat-sz/react-letter), therefore everyone using react-letter is also at risk. ### Patches The problem has been ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'lettersanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mat-sz/lettersanitizer/security/advisories/GHSA-7r3r-gq8p-v9jj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31103'}, {'type': 'WEB', 'url': 'https://github.com/mat-sz/react-letter/issues/17'}, {'type': 'WEB', 'url': 'https://github.com/mat-sz/lett...
{'cwe_ids': ['CWE-754'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-23T17:48:19Z', 'nvd_published_at': '2022-06-27T23:15:00Z'}
1.4.0
GHSA-93mx-2vf9-28c4
2022-12-05T22:37:25Z
2022-06-24T00:00:31Z
null
['CVE-2022-34179']
Path Traversal vulnerability in Jenkins Embeddable Build Status Plugin
Jenkins Embeddable Build Status Plugin 2.0.3 and earlier allows specifying a `style` query parameter that is used to choose a different SVG image style without restricting possible values, resulting in a relative path traversal vulnerability that allows attackers without Overall/Read permission to specify paths to othe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:embeddable-build-status'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34179'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/embeddable-build-status-plugin/commit/63f82f28d989d30a23089a0a66c11f222651a8c6'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/embeddable-build-status-plugin'}, {'type': 'WEB...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:59:51Z', 'nvd_published_at': '2022-06-23T17:15:00Z'}
1.4.0
GHSA-rvgf-69j7-xh78
2023-09-07T18:48:21Z
2022-06-18T00:00:20Z
null
['CVE-2022-25345']
Uncontrolled Resource Consumption in @discordjs/opus
Improperly handled errors in @discordjs/opus cause hard crashes instead of returning the error to user land. All versions of package @discordjs/opus (<= 0.7.0) are vulnerable to Denial of Service (DoS) when trying to encode using an encoder with zero channels, or a non-initialized buffer. This leads to a hard crash due...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@discordjs/opus'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25345'}, {'type': 'WEB', 'url': 'https://github.com/discordjs/opus/commit/406249f3fca484a2af97a34ceb989019efa09bc7'}, {'type': 'PACKAGE', 'url': 'https://github.com/discordjs/opus'}, {'type': 'WEB', 'url': 'https://github.com/discordjs/opus/blob/3c...
{'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:30:01Z', 'nvd_published_at': '2022-06-17T20:15:00Z'}
1.4.0
GHSA-77xc-hjv8-ww97
2022-06-29T21:48:38Z
2022-06-16T23:18:47Z
null
['CVE-2022-29257']
AutoUpdater module fails to validate certain nested components of the bundle
### Impact This vulnerability allows attackers who have control over a given apps update server / update storage to serve maliciously crafted update packages that pass the code signing validation check but contain malicious code in some components. Please note that this kind of attack would require **significant** pri...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.5.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.0'}, {'fixed': '16.2.0'}]}]}, {'package': {'ecosystem': ...
[{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-77xc-hjv8-ww97'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29257'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-16T23:18:47Z', 'nvd_published_at': '2022-06-13T22:15:00Z'}
1.4.0
GHSA-vv7q-mfpc-qgm5
2022-08-22T16:36:48Z
2022-06-08T00:00:43Z
2022-08-22T16:36:48Z
['CVE-2022-31279']
Unserialized Pop Chain in Laravel
## Withdrawn This advisory has been withdrawn because it is not a security issue and the CVE has been revoked. ## Original Description Laravel 9.1.8, when processing attacker-controlled data for deserialization, allows Remote Code Execution (RCE) via an unserialized pop chain in __destruct in Illuminate\Broadcasting\P...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'laravel/laravel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.1.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31279'}, {'type': 'WEB', 'url': 'https://github.com/1nhann/vulns/issues/1#issuecomment-1213126338'}, {'type': 'WEB', 'url': 'https://github.com/1nhann/vulns/issues/3'}, {'type': 'WEB', 'url': 'https://github.com/ambionics/phpggc/issues/118'}, {'typ...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:27:54Z', 'nvd_published_at': '2022-06-07T16:15:00Z'}
1.4.0
GHSA-2927-hv3p-f3vp
2022-06-14T20:01:41Z
2022-06-03T00:00:29Z
null
['CVE-2022-29718']
Open redirect in caddy
Caddy v2.4 was discovered to contain an open redirect vulnerability. A remote unauthenticated attacker may exploit this vulnerability to redirect users to arbitrary web URLs by tricking the victim users to click on crafted links.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/caddyserver/caddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/caddyserver/caddy/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29718'}, {'type': 'WEB', 'url': 'https://github.com/caddyserver/caddy/pull/4499'}, {'type': 'WEB', 'url': 'https://github.com/caddyserver/caddy/pull/4499/commits/b23bdcf99cfbd09d50555a999a16468404789230'}, {'type': 'PACKAGE', 'url': 'https://github...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T22:16:20Z', 'nvd_published_at': '2022-06-02T21:15:00Z'}