schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-pprq-4488-wgqx | 2023-03-06T20:45:53Z | 2022-05-13T01:21:57Z | null | ['CVE-2019-11065'] | Insecure transport protocol in Gradle | Gradle versions from 1.4 to 5.3.1 use an insecure HTTP URL to download dependencies when the built-in JavaScript or CoffeeScript Gradle plugins are used. Dependency artifacts could have been maliciously compromised by a MITM attack against the ajax.googleapis.com web site. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.gradle:gradle-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4'}, {'fixed': '5.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11065'}, {'type': 'WEB', 'url': 'https://github.com/gradle/gradle/pull/8927'}, {'type': 'PACKAGE', 'url': 'https://github.com/gradle/gradle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraprojec... | {'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T23:02:27Z', 'nvd_published_at': '2019-04-10T00:29:00Z'} |
1.4.0 | GHSA-7f2c-vp52-gmfw | 2023-08-16T23:05:33Z | 2022-05-17T03:45:51Z | null | ['CVE-2014-7144'] | OpenStack keystonemiddleware does not verify certificate | OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the "insecure" option is set in a paste configuration (`paste.ini`) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'keystonemiddleware'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'keystonemiddleware'}, 'ecosystem_specific': {'affected_functions': ['... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7144'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/python-keystoneclient/+bug/1353315'}, {'type': 'WEB', 'url': 'https://github.com/openstack/ossa/blob/23e15de721f4a6890374a231d93524e02965a97f/ossa/OSSA-2014-030.yaml'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:05:33Z', 'nvd_published_at': '2014-10-02T14:55:00Z'} |
1.4.0 | GHSA-vp55-fhxx-vcx8 | 2023-05-16T17:57:47Z | 2022-05-24T17:26:39Z | null | ['CVE-2020-15777'] | Maven Extension plugin for Gradle Enterprise vulnerable to Deserialization of Untrusted Data | An issue was discovered in the Maven Extension plugin before 1.6 for Gradle Enterprise. It is vulnerable to, in the worst case, Remote Code Execution, and in the general case, local privilege escalation. Internally, the plugin uses a socket connection to send serialized Java objects that are deserialized by a Java stan... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.gradle:gradle-enterprise-maven-extension'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15777'}, {'type': 'WEB', 'url': 'https://docs.gradle.com/enterprise/maven-extension/#1_6'}, {'type': 'WEB', 'url': 'https://docs.gradle.com/enterprise/maven-extension/#release_history'}, {'type': 'WEB', 'url': 'https://security.gradle.com/advisory/... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-16T17:57:47Z', 'nvd_published_at': '2020-08-25T22:15:00Z'} |
1.4.0 | GHSA-h7wm-ph43-c39p | 2022-06-17T21:35:13Z | 2022-05-17T01:16:31Z | null | ['CVE-2017-14158'] | Scrapy denial of service vulnerability | Scrapy 1.4 allows remote attackers to cause a denial of service (memory consumption) via large files because arbitrarily many files are read into memory, which is especially problematic if the files are then individually written in a separate thread to a slow storage resource, as demonstrated by interaction between dat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'scrapy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7'}, {'last_affected': '2.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-14158'}, {'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/issues/482'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h7wm-ph43-c39p'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/blob/8b7a4d62a95e8f6... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:35:13Z', 'nvd_published_at': '2017-09-05T17:29:00Z'} |
1.4.0 | GHSA-m8x6-6r63-qvj2 | 2023-04-25T16:37:01Z | 2022-05-20T19:54:56Z | null | ['CVE-2022-24899'] | Cross site scripting via canonical tag in Contao | ### Impact
Untrusted users can inject malicious code into the canonical tag, which is then executed on the web page (front end).
### Patches
Update to Contao 4.13.3.
### Workarounds
Disable canonical tags in the root page settings.
### References
https://contao.org/en/security-advisories/cross-site-scripting-via... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.13.0'}, {'fixed': '4.13.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-m8x6-6r63-qvj2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24899'}, {'type': 'WEB', 'url': 'https://github.com/contao/contao/commit/199206849a87ddd0fa5cf674eb3c58292fd8366c'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-20T19:54:56Z', 'nvd_published_at': '2022-05-06T00:15:00Z'} |
1.4.0 | GHSA-4vrv-ch96-6h42 | 2022-06-28T23:45:33Z | 2022-05-13T01:52:26Z | null | ['CVE-2018-3258'] | Improper Privilege Management in MySQL Connectors Java | Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'mysql:mysql-connector-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3258'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1545'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181018-0002/'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoc... | {'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:45:33Z', 'nvd_published_at': '2018-10-17T01:31:00Z'} |
1.4.0 | GHSA-r3fq-cmmw-cpmm | 2023-08-24T13:02:38Z | 2022-05-24T16:46:50Z | null | ['CVE-2019-12452'] | Containous Traefik Exposes Password Hashes | types/types.go in Containous Traefik 1.7.x through 1.7.11, when the `--api` flag is used and the API is publicly reachable and exposed without sufficient access control (which is contrary to the API documentation), allows remote authenticated users to discover password hashes by reading the Basic HTTP Authentication or... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.11'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12452'}, {'type': 'WEB', 'url': 'https://github.com/containous/traefik/issues/4917'}, {'type': 'WEB', 'url': 'https://github.com/containous/traefik/pull/4918'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/commit/a169fec2e08e391d24b50... | {'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T19:46:49Z', 'nvd_published_at': '2019-05-29T19:29:00Z'} |
1.4.0 | GHSA-q5rg-wg7h-73m5 | 2023-07-17T23:09:56Z | 2022-05-24T16:55:40Z | null | ['CVE-2019-10665'] | LibreNMS Information Disclosure | An issue was discovered in LibreNMS through 1.47. The scripts that handle the graphing options (`html/includes/graphs/common.inc.php` and `html/includes/graphs/graphs.inc.php`) do not sufficiently validate or encode several fields of user supplied input. Some parameters are filtered with `mysqli_real_escape_string`, wh... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.47'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10665'}, {'type': 'WEB', 'url': 'https://github.com/spaceraccoon/CVE-2020-10665'}, {'type': 'WEB', 'url': 'https://www.activecyber.us/activelabs/docker-desktop-local-privilege-escalation-cve-2020-10665'}, {'type': 'WEB', 'url': 'https://www.darkmat... | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T23:09:56Z', 'nvd_published_at': '2019-09-09T13:15:00Z'} |
1.4.0 | GHSA-wmhw-fvg9-87fc | 2023-08-03T22:14:42Z | 2022-05-17T02:52:21Z | null | ['CVE-2015-8234'] | OpenStack Glance Signature Verification Bypass | The image signature algorithm in OpenStack Glance 11.0.0 allows remote attackers to bypass the signature verification process via a crafted image, which triggers an MD5 collision. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'glance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '11.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8234'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/glance/+bug/1516031'}, {'type': 'WEB', 'url': 'https://seclists.org/oss-sec/2015/q4/303'}, {'type': 'WEB', 'url': 'https://wiki.openstack.org/wiki/OSSN/OSSN-0061'}] | {'cwe_ids': ['CWE-328'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T22:14:42Z', 'nvd_published_at': '2017-03-29T14:59:00Z'} |
1.4.0 | GHSA-c3cg-mv5w-cvw8 | 2023-01-14T05:27:19Z | 2022-05-24T17:08:47Z | null | ['CVE-2020-2120'] | XXE vulnerability in FitNesse Plugin | FitNesse Plugin 1.30 and earlier does not configure the XML parser to prevent XML external entity (XXE) attacks.
This allows a user able to control the input files for its post-build step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller, server-side... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:fitnesse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.31'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2120'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/fitnesse-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1751'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/02... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:27:19Z', 'nvd_published_at': '2020-02-12T15:15:00Z'} |
1.4.0 | GHSA-hh3v-5chw-wgh7 | 2023-07-28T20:39:28Z | 2022-05-14T02:22:18Z | null | ['CVE-2016-7240'] | ChakraCore RCE Vulnerability | The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7200, CVE-2016-7201, CVE-2016-7202, CVE-2016... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7240'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1982'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/c2787ef8fdb7401922e9ec6540e4e5895d11c631'}, {'type': 'WEB', 'url': 'https://docs.microso... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:39:28Z', 'nvd_published_at': '2016-11-10T06:59:00Z'} |
1.4.0 | GHSA-83g2-8m93-v3w7 | 2023-02-08T00:33:11Z | 2022-05-24T19:03:21Z | null | ['CVE-2021-33194'] | golang.org/x/net/html Infinite Loop vulnerability | Go through 1.15.12 and 1.16.x through 1.16.4 has a golang.org/x/net/html infinite loop via crafted ParseFragment input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net/html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20210520170846-37e1c6afe023'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33194'}, {'type': 'WEB', 'url': 'https://github.com/golang/net/commit/37e1c6afe02340126705deced573a85ab75209d7'}, {'type': 'WEB', 'url': 'https://go.dev/cl/311090'}, {'type': 'WEB', 'url': 'https://go.dev/issue/46288'}, {'type': 'WEB', 'url': 'http... | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:33:11Z', 'nvd_published_at': '2021-05-26T15:15:00Z'} |
1.4.0 | GHSA-mv42-px54-87jw | 2022-07-06T20:07:28Z | 2022-05-14T01:10:17Z | null | ['CVE-2016-0714'] | Improper Access Control in Apache Tomcat | The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web app... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.0.M2'}]}], 'versions': ['9.0.0.M1']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0714'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1087'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1088'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?... | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:07:28Z', 'nvd_published_at': '2016-02-25T01:59:00Z'} |
1.4.0 | GHSA-6m68-3w55-6mx4 | 2022-11-08T14:19:47Z | 2022-05-14T00:57:16Z | null | ['CVE-2017-9795'] | Apache Geode OQL method invocation vulnerability | When an Apache Geode cluster before v1.3.0 is operating in secure mode, a user with read access to specific regions within a Geode cluster may execute OQL queries that allow read and write access to objects within unauthorized regions. In addition a user could invoke methods that allow remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9795'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/GEODE-3247'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0fc5ea3c1ea06fe7058a0ab56d593914b05f728a6c93c5a6755956c7@%3Cuser.geode.apache.org%3E'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T14:19:47Z', 'nvd_published_at': '2018-01-10T03:29:00Z'} |
1.4.0 | GHSA-9284-j4c9-779q | 2022-07-06T20:22:18Z | 2022-05-14T02:49:30Z | null | ['CVE-2015-1833'] | Improper Input Validation in Apache Jackrabbit | XML external entity (XXE) vulnerability in Apache Jackrabbit before 2.0.6, 2.2.x before 2.2.14, 2.4.x before 2.4.6, 2.6.x before 2.6.6, 2.8.x before 2.8.1, and 2.10.x before 2.10.1 allows remote attackers to read arbitrary files and send requests to intranet servers via a crafted WebDAV request. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:jackrabbit-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:jackrab... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1833'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/JCR-3883'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/37110/'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/jackrabbit-announce/201505.mbox... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:22:18Z', 'nvd_published_at': '2015-05-29T15:59:00Z'} |
1.4.0 | GHSA-rghw-6px2-fgwc | 2022-06-22T18:49:12Z | 2022-05-24T22:28:56Z | null | ['CVE-2021-20328'] | Improper Certificate Validation in MongoDB | Specific versions of the Java driver that support client-side field level encryption (CSFLE) fail to perform correct host name verification on the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Java dr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.mongodb:mongodb-driver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.11.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.mongodb:mongodb-driver'}, 'ra... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20328'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/JAVA-4017'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:49:12Z', 'nvd_published_at': '2021-02-25T17:15:00Z'} |
1.4.0 | GHSA-4rpv-g4gq-rh4m | 2023-08-28T23:47:48Z | 2022-05-17T03:46:18Z | null | ['CVE-2013-7073'] | TYPO3 vulnerable to Information Disclosure via Content Editing Wizards component | The Content Editing Wizards component in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, 6.0.0 through 6.0.11, and 6.1.0 through 6.1.6 does not check permissions, which allows remote authenticated editors to read arbitrary TYPO3 table columns via unspecified parameters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.31'}}, {'package': {'ecosystem': 'Packagist', ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7073'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00028.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-08/m... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:47:48Z', 'nvd_published_at': '2013-12-23T23:55:00Z'} |
1.4.0 | GHSA-rpv4-63g3-9x23 | 2023-08-04T21:49:50Z | 2022-05-13T01:27:10Z | null | ['CVE-2017-8342'] | Radicale is vulnerable to timing oracles and simple bruteforce attacks | Radicale before 1.1.2 and 2.0.0rc1 is prone to timing oracles and simple brute-force attacks when using the htpasswd authentication method. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Radicale'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Radicale'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'typ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-8342'}, {'type': 'WEB', 'url': 'https://github.com/Kozea/Radicale/commit/059ba8dec1f22ccbeab837e288b3833a099cee2d'}, {'type': 'WEB', 'url': 'https://github.com/Kozea/Radicale/commit/190b1dd795f0c552a4992445a231da760211183b'}, {'type': 'WEB', 'url':... | {'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T21:49:50Z', 'nvd_published_at': '2017-04-30T15:59:00Z'} |
1.4.0 | GHSA-mc22-25r3-2w9w | 2022-12-06T21:54:46Z | 2022-05-13T01:40:56Z | null | ['CVE-2017-1000084'] | Parameterized Trigger Plugin fails to check Item/Build permission | Parameterized Trigger Plugin fails to check Item/Build permission: The Parameterized Trigger Plugin did not check the build authentication it was running as and allowed triggering any other project in Jenkins. The plugin has been adapted to now check for Item/Build permission before triggering a downstream build. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:parameterized-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.35.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000084'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/parameterized-trigger-plugin/pull/114'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/parameterized-trigger-plugin'}, {'type': 'WEB', 'url': 'https://issues.jenkins.io/brow... | {'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:54:46Z', 'nvd_published_at': '2017-10-05T01:29:00Z'} |
1.4.0 | GHSA-73wv-rgj7-vjj9 | 2023-08-03T18:51:11Z | 2022-05-24T17:44:38Z | null | ['CVE-2021-28380'] | Aimeos Typo3 extension contains Cross-site Scripting vulnerability | The aimeos (aka Aimeos shop and e-commerce framework) extension before 19.10.12 and 20.x before 20.10.5 for TYPO3 allows Cross-site Scripting (XSS) via a backend user account. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'aimeos/aimeos-typo3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.10.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'aimeos/aimeos-typo3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.1... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28380'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-003'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T23:06:27Z', 'nvd_published_at': '2021-03-16T20:15:00Z'} |
1.4.0 | GHSA-4hxv-95rc-jqg7 | 2022-11-08T12:38:22Z | 2022-05-17T00:18:13Z | null | ['CVE-2017-1000209'] | nv-websocket-client allows attackers to spoof SSL/TLS servers via an arbitrary valid certificate | The Java WebSocket client nv-websocket-client does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL/TLS servers via an arbitrary valid certificate. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.neovisionaries:nv-websocket-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000209'}, {'type': 'WEB', 'url': 'https://github.com/TakahikoKawasaki/nv-websocket-client/pull/107'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T12:38:22Z', 'nvd_published_at': '2017-11-17T02:29:00Z'} |
1.4.0 | GHSA-9qh2-6fxg-9m4g | 2022-09-30T23:13:59Z | 2022-05-14T01:55:28Z | null | ['CVE-2018-16982'] | Open Chinese Convert subject to Denial of Service via Out-of-bounds Read | Open Chinese Convert (OpenCC) 1.0.5 allows attackers to cause a denial of service (segmentation fault) because BinaryDict::NewFromFile in BinaryDict.cpp may have out-of-bounds keyOffset and valueOffset values via a crafted .ocd file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'opencc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'OpenCC'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16982'}, {'type': 'WEB', 'url': 'https://github.com/BYVoid/OpenCC/issues/303'}, {'type': 'WEB', 'url': 'https://github.com/BYVoid/OpenCC/pull/309'}, {'type': 'WEB', 'url': 'https://github.com/BYVoid/OpenCC/pull/560'}, {'type': 'WEB', 'url': 'https:... | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T13:10:06Z', 'nvd_published_at': '2018-09-13T02:29:00Z'} |
1.4.0 | GHSA-r2xf-w5pj-9pw8 | 2023-08-16T22:09:18Z | 2022-05-14T01:18:38Z | null | ['CVE-2014-0111'] | Apache Syncope JEXL Code Injection | Apache Syncope 1.0.0 before 1.0.9 and 1.1.0 before 1.1.7 allows remote administrators to execute arbitrary Java code via vectors related to Apache Commons JEXL expressions, "derived schema definition," "user / role templates," and "account links of resource mappings." | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope'}, 'ecosystem_specific': {'af... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0111'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208163011/http://www.securityfocus.com/archive/1/531841/100/0/threaded'}, {'type': 'WEB', 'url': 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201404.mbox/%3C534CE273.9020... | {'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:09:18Z', 'nvd_published_at': '2014-04-17T14:55:00Z'} |
1.4.0 | GHSA-7j4h-8wpf-rqfh | 2022-07-08T19:14:49Z | 2022-05-13T01:01:06Z | null | ['CVE-2013-4002'] | Missing XML Validation in Apache Xerces2 | XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 an... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'xerces:xercesImpl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:0414'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/85260'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/XERCESJ-1679'}, {... | {'cwe_ids': ['CWE-112'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:14:49Z', 'nvd_published_at': '2013-07-23T11:03:00Z'} |
1.4.0 | GHSA-qqh2-h6gw-6x8x | 2023-08-16T22:44:09Z | 2022-05-14T04:01:57Z | null | ['CVE-2014-3943'] | Typo3 XSS Vulnerabilities | Multiple cross-site scripting (XSS) vulnerabilities in unspecified backend components in TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allow remote authenticated editors to inject arbitrary web script or HTML via unknown parameters. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.34'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.33'}}, {'package': {'ecosystem': 'Packagist', ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3943'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229060129/http://www.securityfocus.com/bid/67625'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.html'}, {'type': 'WEB', 'url': 'http://typo3.or... | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:44:09Z', 'nvd_published_at': '2014-06-03T14:55:00Z'} |
1.4.0 | GHSA-7v7g-mh53-89hw | 2022-12-22T03:34:41Z | 2022-05-24T17:33:08Z | null | ['CVE-2020-2311'] | Missing permission check in Jenkins AWS Global Configuration Plugin allows replacing plugin configuration | AWS Global Configuration Plugin 1.5 and earlier does not perform a permission check in an HTTP endpoint processing form submissions.
This allows attackers with Overall/Read permission to replace the global AWS configuration.
AWS Global Configuration Plugin 1.6 properly performs permission checks when processing confi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:aws-global-configuration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2311'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/aws-global-configuration-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2101'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T03:34:41Z', 'nvd_published_at': '2020-11-04T15:15:00Z'} |
1.4.0 | GHSA-6g23-fww6-rfrj | 2023-07-21T20:38:06Z | 2022-05-13T01:20:48Z | null | ['CVE-2018-8354'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8391, CVE-2018-8456, CVE-2018-8457, CVE-2018-8459. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8354'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5688'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/5192cdc08a030a580ba15d1d9aa50f81a6d92211'}, {'type': 'WEB', 'url': 'https://portal.msrc.... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:38:06Z', 'nvd_published_at': '2018-09-13T00:29:00Z'} |
1.4.0 | GHSA-5fp8-c45m-256p | 2022-06-21T20:08:57Z | 2022-05-24T19:20:42Z | null | ['CVE-2021-42250'] | Improper Encoding or Escaping of Output in Apache Superset | Improper output neutralization for Logs. A specific Apache Superset HTTP endpoint allowed for an authenticated user to forge log entries or inject malicious content into logs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42250'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5fp8-c45m-256p'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset/'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-s... | {'cwe_ids': ['CWE-116'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:08:57Z', 'nvd_published_at': '2021-11-17T15:15:00Z'} |
1.4.0 | GHSA-x7f3-62pm-9p38 | 2022-05-31T23:27:52Z | 2022-05-20T00:00:26Z | null | ['CVE-2022-28946'] | Out of bounds memory access in github.com/open-policy-agent/opa | An issue in the component ast/parser.go of Open Policy Agent v0.39.0 causes the application to incorrectly interpret every expression, causing a Denial of Service (DoS) via triggering out-of-range memory access. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/open-policy-agent/opa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.40.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28946'}, {'type': 'WEB', 'url': 'https://github.com/open-policy-agent/opa/pull/4548'}, {'type': 'WEB', 'url': 'https://github.com/open-policy-agent/opa/commit/e9d3828db670cbe11129885f37f08cbf04935264'}, {'type': 'PACKAGE', 'url': 'https://github.co... | {'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T20:20:13Z', 'nvd_published_at': '2022-05-19T19:15:00Z'} |
1.4.0 | GHSA-rv97-r8f7-8wmg | 2022-09-09T00:56:25Z | 2022-05-24T22:00:03Z | null | ['CVE-2019-10329'] | Plaintext password storage in Jenkins InfluxDB Plugin | Jenkins InfluxDB Plugin Prior to 1.22 stored credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:influxdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10329'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/influxdb-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1403'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/0... | {'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-09T00:56:25Z', 'nvd_published_at': '2019-05-31T15:29:00Z'} |
1.4.0 | GHSA-7f62-4887-cfv5 | 2022-05-25T19:31:53Z | 2022-05-11T00:01:38Z | null | ['CVE-2022-1397'] | Privilege escalation in easyappointments | The Easy!Appointments API authorization is checked against the user's existence, without validating the permissions. As a result, a low privileged user (eg. provider) can create a new admin user via the "/api/v1/admins/" endpoint and take over the system. A [patch](https://github.com/alextselegidis/easyappointments/com... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'alextselegidis/easyappointments'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1397'}, {'type': 'WEB', 'url': 'https://github.com/alextselegidis/easyappointments/commit/63dbb51decfcc1631c398ecd6d30e3a337845526'}, {'type': 'PACKAGE', 'url': 'https://github.com/alextselegidis/easyappointments'}, {'type': 'WEB', 'url': 'https://... | {'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:31:53Z', 'nvd_published_at': '2022-05-10T14:15:00Z'} |
1.4.0 | GHSA-ch37-ch8w-cfrq | 2023-07-20T14:49:19Z | 2022-05-24T17:32:59Z | null | ['CVE-2020-26211'] | Bookstack Cross-site Scripting vulnerability | In BookStack before version 0.30.4, a user with permissions to edit a page could insert JavaScript code through the use of `javascript:` URIs within a link or form which would run, within the context of the current page, when clicked or submitted. Additionally, a user with permissions to edit a page could insert a part... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'ssddanbrown/bookstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.30.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/BookStackApp/BookStack/security/advisories/GHSA-r2cf-8778-3jgp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26211'}, {'type': 'WEB', 'url': 'https://github.com/BookStackApp/BookStack/commit/bbd1384acbe7e52c21f89af69f2dc391c95dbf54'}, {'type': 'PAC... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T14:49:19Z', 'nvd_published_at': '2020-11-03T21:15:00Z'} |
1.4.0 | GHSA-8mc4-2xrc-g582 | 2023-07-13T17:15:08Z | 2022-05-24T17:07:14Z | null | ['CVE-2020-7937'] | Plone cross site scripting (XSS) | An XSS issue in the title field in Plone 5.0 through 5.2.1 allows users with a certain privilege level to insert JavaScript that will be executed when other users access the site. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'last_affected': '5.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7937'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20200121'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20200121/xss-in-the-title-field-on-plone-5-0-and-higher'}, {'type': 'WEB', 'url': 'https://www.openwall.com/list... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:15:08Z', 'nvd_published_at': '2020-01-23T21:15:00Z'} |
1.4.0 | GHSA-fh32-35w2-rxcc | 2022-06-17T22:23:08Z | 2022-05-02T03:53:13Z | null | ['CVE-2009-4269'] | Use of Password Hash With Insufficient Computational Effort in Apache Derby | The password hash generation algorithm in the BUILTIN authentication functionality for Apache Derby before 10.6.1.0 performs a transformation that reduces the size of the set of inputs to SHA-1, which produces a small search space that makes it easier for local and possibly remote attackers to crack passwords by genera... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.derby:derby'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.6.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.5.3.01'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-4269'}, {'type': 'WEB', 'url': 'https://github.com/apache/derby/commit/178ca0cfb796b5a5788d25ded0978773ea254332'}, {'type': 'WEB', 'url': 'https://github.com/apache/derby/commit/23f97a597716ee5b08eff698b7177850ad8e1294'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-916'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T22:23:08Z', 'nvd_published_at': '2010-08-16T20:00:00Z'} |
1.4.0 | GHSA-mwrx-hx6x-3hhv | 2023-08-14T22:39:42Z | 2022-05-14T01:51:59Z | null | ['CVE-2012-0838'] | Apache Struts Code injection due to conversion error | Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-0838'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/WW-3668'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN79099262/index.html'}, {'type': 'WEB', 'url': 'http://jv... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T23:00:54Z', 'nvd_published_at': '2012-03-02T22:55:00Z'} |
1.4.0 | GHSA-pwx5-xg7g-wpc5 | 2023-08-29T21:28:26Z | 2022-05-17T01:38:35Z | null | ['CVE-2012-5825'] | Tweepy does not verify SSL Certificate | Tweepy does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, related to use of the Python httplib library. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'tweepy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5825'}, {'type': 'WEB', 'url': 'https://github.com/tweepy/tweepy/issues/279'}, {'type': 'WEB', 'url': 'https://github.com/tweepy/tweepy/pull/400'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/79831'}, {'type': 'PACK... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:28:26Z', 'nvd_published_at': '2012-11-04T22:55:00Z'} |
1.4.0 | GHSA-c329-r874-xc7j | 2023-01-05T21:05:44Z | 2022-05-24T17:10:30Z | null | ['CVE-2020-2158'] | Remote Code Execution vulnerability in Jenkins Literate Plugin | Jenkins Literate Plugin 1.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:literate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2158'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/literate-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1750'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/03... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T21:05:44Z', 'nvd_published_at': '2020-03-09T16:15:00Z'} |
1.4.0 | GHSA-x33v-f3gp-gw2c | 2022-07-08T19:07:51Z | 2022-05-14T02:10:10Z | null | ['CVE-2013-2132'] | Use of NullPointerException Catch to Detect NULL Pointer Dereference in Pymongo | bson/_cbsonmodule.c in the mongo-python-driver (aka. pymongo) before 2.5.2, as used in MongoDB, allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to decoding of an "invalid DBRef." | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'pymongo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2132'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-python-driver/commit/a060c15ef87e0f0e72974c7c0e57fe811bbd06a2'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=710597'}, {'type': 'ADVISORY', 'url': 'https... | {'cwe_ids': ['CWE-395'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:07:51Z', 'nvd_published_at': '2013-08-15T17:55:00Z'} |
1.4.0 | GHSA-922h-8q8g-w7fx | 2022-12-06T21:49:59Z | 2022-05-24T17:03:48Z | null | ['CVE-2019-16570'] | Jenkins RapidDeploy Plugin Cross-Site Request Forgery plugin | A cross-site request forgery vulnerability in Jenkins RapidDeploy Plugin 4.1 and earlier allows attackers to connect to an attacker-specified web server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rapiddeploy-jenkins'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16570'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1604'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/17/1'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:49:59Z', 'nvd_published_at': '2019-12-17T15:15:00Z'} |
1.4.0 | GHSA-gcvp-cwgw-wx8j | 2023-07-31T19:51:27Z | 2022-05-17T02:37:29Z | null | ['CVE-2016-5704'] | phpMyAdmin XSS Vulnerability | Cross-site scripting (XSS) vulnerability in the table-structure page in phpMyAdmin 4.6.x before 4.6.3 allows remote attackers to inject arbitrary web script or HTML via vectors involving a comment. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5704'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/72213573182896bd6a6e5af5ba1881dd87c4a20b'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-32'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/sec... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:51:27Z', 'nvd_published_at': '2016-07-03T01:59:00Z'} |
1.4.0 | GHSA-pgxh-wfw4-jx2v | 2023-08-03T20:01:52Z | 2022-05-17T00:36:02Z | null | ['CVE-2015-5963'] | Django denial of service via empty session record creation | `contrib.sessions.middleware.SessionMiddleware` in Django 1.8.x before 1.8.4, 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions allows remote attackers to cause a denial of service (session store consumption or session record removal) via a large number of requests to `contrib.auth.views.logout`, wh... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['django.contrib.sessions.middleware.SessionMiddleware']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_speci... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5963'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/2f5485346ee6f84b4e52068c04e043092daf55f7'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/575f59f9bc7c59a5e41a081d1f5f55fc859c5012'}, {'type': 'WEB', 'url': '... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T20:01:52Z', 'nvd_published_at': '2015-08-24T14:59:00Z'} |
1.4.0 | GHSA-p5jh-8rxp-wqjj | 2022-12-20T22:38:03Z | 2022-05-24T17:27:07Z | null | ['CVE-2020-2244'] | XSS vulnerability in Jenkins Build Failure Analyzer Plugin | Jenkins Build Failure Analyzer Plugin 1.27.0 and earlier does not escape matching text in a form validation response, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers able to provide console output for builds used to test build log indications.
Build Failure Analyzer Plugin 1.27.1 escap... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.sonyericsson.jenkins.plugins.bfa:build-failure-analyzer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.27.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.27.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2244'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/build-failure-analyzer-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1770'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:38:03Z', 'nvd_published_at': '2020-09-01T14:15:00Z'} |
1.4.0 | GHSA-hxpw-7x95-q38m | 2022-12-12T21:03:30Z | 2022-05-17T00:29:01Z | null | ['CVE-2017-1000108'] | Jenkins Pipeline: Input Step Plugin | The Pipeline: Input Step Plugin by default allowed users with Item/Read access to a pipeline to interact with the step to provide input. This has been changed, and now requires users to have the Item/Build permission instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-input-step'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000108'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-input-step-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-08-07/'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:03:30Z', 'nvd_published_at': '2017-10-05T01:29:00Z'} |
1.4.0 | GHSA-5xf9-3v63-ww6f | 2022-07-07T23:01:28Z | 2022-05-13T01:09:20Z | null | ['CVE-2014-0110'] | Uncontrolled Resource Consumption in Apache CXF | Apache CXF before 2.6.14 and 2.7.x before 2.7.11 allows remote attackers to cause a denial of service (/tmp disk consumption) via a large invalid SOAP message. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.11'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0110'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc7... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:01:28Z', 'nvd_published_at': '2014-05-08T14:29:00Z'} |
1.4.0 | GHSA-595x-hh6c-hfv8 | 2022-06-03T18:37:30Z | 2022-05-27T00:00:48Z | null | ['CVE-2022-30500'] | SQL injection in jflyfox jfinal | Jfinal cms 5.1.0 is vulnerable to SQL Injection. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'com.jflyfox:jflyfox_jfinal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30500'}, {'type': 'WEB', 'url': 'https://github.com/jflyfox/jfinal_cms/issues/35'}, {'type': 'PACKAGE', 'url': 'https://github.com/jflyfox/jflyfox_jfinal'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T18:37:30Z', 'nvd_published_at': '2022-05-26T16:15:00Z'} |
1.4.0 | GHSA-9hjv-9h75-xmpp | 2022-07-06T20:06:41Z | 2022-05-14T01:18:35Z | null | ['CVE-2016-0763'] | Improper Verification of Source of a Communication Channel in Apache Tomcat | The setGlobalContext method in org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M3 does not consider whether ResourceLinkFactory.setGlobalContext callers are authorized, which allows remote authenticated users to bypass intended SecurityManag... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.68'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0763'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1087'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1088'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?... | {'cwe_ids': ['CWE-940'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:06:41Z', 'nvd_published_at': '2016-02-25T01:59:00Z'} |
1.4.0 | GHSA-qmf3-w5jf-cv54 | 2022-12-21T15:28:36Z | 2022-05-24T17:19:05Z | null | ['CVE-2020-2199'] | XSS vulnerability in Jenkins Subversion Partial Release Manager Plugin | Subversion Partial Release Manager Plugin 1.0.1 and earlier does not escape the error message for the repository URL field form validation.
This results in a reflected cross-site scripting (XSS) vulnerability that can also be exploited similar to a stored cross-site scripting vulnerability by users with Job/Configure ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:svn-partial-release-mgr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2199'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/svn-partial-release-mgr-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1726'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-s... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T15:28:36Z', 'nvd_published_at': '2020-06-03T13:15:00Z'} |
1.4.0 | GHSA-273v-g3x4-r3rc | 2022-11-01T22:01:42Z | 2022-05-14T03:47:38Z | null | ['CVE-2014-3607'] | Improper Certificate Validation in vt-ldap | DefaultHostnameVerifier in Ldaptive (formerly vt-ldap) does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'edu.vt.middleware:vt-ldap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'edu.internet2.middleware:shibboleth-identityprovider'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3607'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1140438'}, {'type': 'WEB', 'url': 'https://code.google.com/archive/p/vt-middleware/issues/226'}, {'type': 'WEB', 'url': 'https://code.google.com/archive/p/vt-middleware/iss... | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:01:42Z', 'nvd_published_at': '2018-01-08T19:29:00Z'} |
1.4.0 | GHSA-mmvj-j7hq-rx85 | 2023-08-01T20:20:53Z | 2022-05-13T01:12:49Z | null | ['CVE-2015-5340'] | Moodle sensitive information disclosure | Moodle through 2.6.11, 2.7.x before 2.7.11, 2.8.x before 2.8.9, and 2.9.x before 2.9.3 does not consider the moodle/badges:viewbadges capability, which allows remote authenticated users to obtain sensitive badge information via a request involving (1) `badges/overview.php` or (2) `badges/view.php`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7'}, {'fixed': '2.7.11'}]}]},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5340'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/47d5c29202e299fdbe54229d3f6b0c381835eae3'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=323235'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=mood... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T20:20:53Z', 'nvd_published_at': '2016-02-22T05:59:00Z'} |
1.4.0 | GHSA-mc8m-x6hf-cw2g | 2023-01-27T00:51:55Z | 2022-05-14T03:47:44Z | null | ['CVE-2014-4997'] | point-cli allows local users to obtain sensitive information by listing the process | `lib/commands/setup.rb` in the point-cli gem 0.0.1 for Ruby places credentials on the curl command line, which allows local users to obtain sensitive information by listing the process. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'point-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4997'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229054941/http://www.securityfocus.com/bid/68735'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/07/16'}, {'type': 'WEB', 'url': 'http://www.openwall.com... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:51:55Z', 'nvd_published_at': '2018-01-10T18:29:00Z'} |
1.4.0 | GHSA-23q7-59jj-2pj4 | 2023-08-21T19:49:57Z | 2022-05-24T17:17:37Z | null | ['CVE-2020-12790'] | SEOmatic for CraftCMS allows Server-Side Template Injection | In the SEOmatic plugin before 3.2.49 for Craft CMS, helpers/DynamicMeta.php does not properly sanitize the URL. This leads to Server-Side Template Injection and credentials disclosure via a crafted Twig template after a semicolon. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'nystudio107/craft-seomatic'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.49'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12790'}, {'type': 'WEB', 'url': 'https://github.com/nystudio107/craft-seomatic/commit/82f4a25b28fd622393da6592dc9e5ccee7fc5be3'}, {'type': 'WEB', 'url': 'https://github.com/nystudio107/craft-seomatic/commit/82f4a25b28fd622393da6592dc9e5ccee7fc5be3#... | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T00:18:26Z', 'nvd_published_at': '2020-05-11T19:15:00Z'} |
1.4.0 | GHSA-7w89-qqxx-c62r | 2022-11-01T23:36:00Z | 2022-05-13T01:30:58Z | null | ['CVE-2016-4988'] | Cross-site Scripting in Jenkins Build Failure Analyzer plugin | Cross-site scripting (XSS) vulnerability in the Build Failure Analyzer plugin before 1.16.0 in Jenkins allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.sonyericsson.jenkins.plugins.bfa:build-failure-analyzer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4988'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2016-06-20/'}, {'type': 'WEB', 'url': 'https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-06-20'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T23:36:00Z', 'nvd_published_at': '2017-02-09T15:59:00Z'} |
1.4.0 | GHSA-g4g7-q726-v5hg | 2023-07-22T00:04:30Z | 2022-05-14T01:14:35Z | null | ['CVE-2018-11406'] | Symfony CSRF Token Fixation | An issue was discovered in the Security component in Symfony 2.7.x before 2.7.48, 2.8.x before 2.8.41, 3.3.x before 3.3.17, 3.4.x before 3.4.11, and 4.0.x before 4.0.11. By default, a user's session is invalidated when the user is logged out. This behavior can be disabled through the invalidate_session option. In this ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7'}, {'fixed': '2.7.48'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8'}, {'fixed': '2.8.41'}]}]}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11406'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G4XNBMFW33H47O5TZGA7JYCVLDBCXAJV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-annou... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-22T00:04:30Z', 'nvd_published_at': '2018-06-13T16:29:00Z'} |
1.4.0 | GHSA-v46q-xjp5-7p6r | 2022-12-20T22:37:42Z | 2022-05-24T17:27:07Z | null | ['CVE-2020-2243'] | Stored XSS vulnerability in Jenkins Cadence vManager Plugin | Jenkins Cadence vManager Plugin 3.0.4 and earlier does not escape build descriptions in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Run/Update permission.
Cadence vManager Plugin 3.0.5 removes affected tooltips. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:vmanager-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2243'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/vmanager-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1936'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/09... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:37:42Z', 'nvd_published_at': '2020-09-01T14:15:00Z'} |
1.4.0 | GHSA-2gw6-73wc-x88f | 2022-11-08T14:33:24Z | 2022-05-17T02:50:39Z | null | ['CVE-2017-5649'] | Apache Geode information disclosure vulnerability | Apache Geode before 1.1.1, when a cluster has enabled security by setting the security-manager property, allows remote authenticated users with CLUSTER:READ but not DATA:READ permission to access the data browser page in Pulse and consequently execute an OQL query that exposes data stored in the cluster. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.1'}]}], 'versions': ['1.1.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5649'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/geode-user/201704.mbox/%3cCAEwge-E4y=EVfhwpfRwsbnBH_hBS3Q-BJS+1BX5omYGW4dnR1w@mail.gmail.com%3e'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T14:33:24Z', 'nvd_published_at': '2017-04-04T18:59:00Z'} |
1.4.0 | GHSA-8cxp-cjm8-fj36 | 2022-06-28T15:22:16Z | 2022-05-24T17:10:48Z | null | ['CVE-2019-10807'] | Improper Neutralization of Special Elements used in an OS Command in Blamer | Blamer versions prior to 1.0.1 allows execution of arbitrary commands. It is possible to inject arbitrary commands as part of the arguments provided to blamer. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'blamer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10807'}, {'type': 'WEB', 'url': 'https://github.com/kucherenko/blamer/commit/5fada8c9b6986ecd28942b724fa682e77ce1e11c'}, {'type': 'PACKAGE', 'url': 'https://github.com/kucherenko/blamer'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BLAMER... | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T15:22:16Z', 'nvd_published_at': '2020-03-11T22:23:00Z'} |
1.4.0 | GHSA-2fmv-j5xj-4fmq | 2023-08-15T22:33:28Z | 2022-05-13T01:12:51Z | null | ['CVE-2014-0215'] | Moodle Reveals Student Information Meant To Be Anonymous | The blind-marking implementation in Moodle through 2.3.11, 2.4.x before 2.4.10, 2.5.x before 2.5.6, and 2.6.x before 2.6.3 allows remote authenticated users to de-anonymize student identities by (1) using a screen reader or (2) reading the HTML source. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.2'}}, {'package': {'ecosystem': 'Packagist'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0215'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=260363'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/05/19/1'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T22:33:28Z', 'nvd_published_at': '2014-05-27T00:55:00Z'} |
1.4.0 | GHSA-wc67-4cg3-35wf | 2023-07-20T22:18:01Z | 2022-05-13T01:18:39Z | null | ['CVE-2018-0946'] | ChakraCore RCE Vulnerability | A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0945, CVE-2018-0951, CVE-2018-0953, CVE-2018-0954, CVE-2018-... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0946'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/bee1e247bf6acbc8c862c7fc1d597ce9cab7446e'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0946'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T22:18:01Z', 'nvd_published_at': '2018-05-09T19:29:00Z'} |
1.4.0 | GHSA-jfgp-q2hg-w285 | 2023-08-21T18:37:50Z | 2022-05-24T17:18:11Z | null | ['CVE-2020-13226'] | WSO2 API Manager vulnerable to SSRF | WSO2 API Manager 3.0.0 does not properly restrict outbound network access from a Publisher node, opening up the possibility of SSRF to this node's entire intranet. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wso2.am:am-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13226'}, {'type': 'WEB', 'url': 'https://github.com/wso2/docs-apim/issues/816'}, {'type': 'WEB', 'url': 'https://github.com/wso2/product-apim/issues/7677'}, {'type': 'WEB', 'url': 'https://docs.wso2.com/display/Security/Security+Advisories'}, {'typ... | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T00:30:32Z', 'nvd_published_at': '2020-05-20T12:15:00Z'} |
1.4.0 | GHSA-7592-93rm-6gpx | 2022-06-30T17:34:41Z | 2022-05-13T01:01:02Z | null | ['CVE-2018-1000193'] | Injection in Jenkins | A improper neutralization of control sequences vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in HudsonPrivateSecurityRealm.java that allows users to sign up using user names containing control characters that can then appear to have the same name as other users, and cannot be deleted via the UI... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.107.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.107.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000193'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/de7aaab441151fb1760855fec83681c6a8756a45'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advis... | {'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T17:34:41Z', 'nvd_published_at': '2018-06-05T21:29:00Z'} |
1.4.0 | GHSA-8xgx-75qw-6268 | 2022-06-08T22:33:10Z | 2022-05-01T18:45:58Z | null | ['CVE-2007-6741'] | Improper privilege management in pyftpdlib | The ftp_PORT function in FTPServer.py in pyftpdlib before 0.2.0 does not prevent TCP connections to privileged ports if the destination IP address matches the source IP address of the connection from the FTP client, which might allow remote authenticated users to conduct FTP bounce attacks via crafted FTP data, as demo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyftpdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-6741'}, {'type': 'WEB', 'url': 'https://github.com/giampaolo/pyftpdlib/issues/11'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8xgx-75qw-6268'}, {'type': 'PACKAGE', 'url': 'https://github.com/giampaolo/pyftpdlib'}, {'type': 'WE... | {'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:33:10Z', 'nvd_published_at': '2010-10-19T20:00:00Z'} |
1.4.0 | GHSA-jfmq-4g4m-99rh | 2022-11-08T23:03:33Z | 2022-05-13T01:42:51Z | null | ['CVE-2017-12973'] | Nimbus JOSE+JWT vulnerable to padding oracle attack | Nimbus JOSE+JWT before 4.39 proceeds improperly after detection of an invalid HMAC in authenticated AES-CBC decryption, which allows attackers to conduct a padding oracle attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.nimbusds:nimbus-jose-jwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.39'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12973'}, {'type': 'WEB', 'url': 'https://bitbucket.org/connect2id/nimbus-jose-jwt/commits/6a29f10f723f406eb25555f55842c59a43a38912'}, {'type': 'WEB', 'url': 'https://bitbucket.org/connect2id/nimbus-jose-jwt/issues/223/aescbc-return-immediately-on-i... | {'cwe_ids': ['CWE-354'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T23:03:33Z', 'nvd_published_at': '2017-08-20T16:29:00Z'} |
1.4.0 | GHSA-jq6x-99hj-q636 | 2022-11-21T20:39:49Z | 2022-11-21T20:39:49Z | null | ['CVE-2022-41884'] | Seg fault in `ndarray_tensor_bridge` due to zero and large inputs | ### Impact
If a numpy array is created with a shape such that one element is zero and the others sum to a large number, an error will be raised. E.g. the following raises an error:
```python
np.ones((0, 2**31, 2**31))
```
An example of a proof of concept:
```python
import numpy as np
import tensorflow as tf
input_val ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jq6x-99hj-q636'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41884'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/2b56169c16e375c521a3bc8ea658811cc0793784'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-670'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:39:49Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-jfmc-3975-fv5f | 2022-11-22T00:11:04Z | 2022-11-15T12:00:19Z | null | ['CVE-2022-43694'] | Concrete CMS vulnerable to Reflected Cross-site Scripting via image manipulation library | Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to Reflected XSS in the image manipulation library due to un-sanitized output. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.3'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43694'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/913-release-n... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:11:04Z', 'nvd_published_at': '2022-11-14T19:15:00Z'} |
1.4.0 | GHSA-g9cp-9fw3-56cf | 2022-11-22T19:14:12Z | 2022-11-22T15:30:26Z | null | ['CVE-2022-42097'] | Cross-site Scripting in Backdrop CMS | Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via 'Comment.'s | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'backdrop/backdrop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.23.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42097'}, {'type': 'WEB', 'url': 'https://github.com/backdrop/backdrop/releases/tag/1.23.0'}, {'type': 'WEB', 'url': 'https://github.com/bypazs/CVE-2022-42097'}, {'type': 'WEB', 'url': 'https://grimthereaperteam.medium.com/cve-2022-42097-backdrop-xs... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:14:12Z', 'nvd_published_at': '2022-11-22T13:15:00Z'} |
1.4.0 | GHSA-vv3r-fxqp-vr3f | 2022-11-30T19:21:18Z | 2022-11-21T23:58:07Z | null | ['CVE-2022-38147'] | XSS via uploaded gpx file | A malicious content author could upload a GPX file with a Javascript payload. The payload could then be executed by luring a legitimate user to view the file in a browser with support for GPX files. GPX is an XML-based format used to store GPS data.
By default, Silverstripe CMS will no longer allow GPX files to be upl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/assets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.11.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38147'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/assets/CVE-2022-38147.yaml'}, {'type': 'WEB', 'url': 'https://www.sil... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:58:07Z', 'nvd_published_at': '2022-11-23T03:15:00Z'} |
1.4.0 | GHSA-xgq8-jq9w-77r5 | 2022-11-22T00:17:23Z | 2022-11-15T19:00:52Z | null | ['CVE-2022-40309'] | Apache Archiva subject to arbitrary directory deletion by users. | Apache Archiva prior to 2.2.9 allows an authenticated user to delete arbitrary directories. Users with write permissions to a repository can delete arbitrary directories. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.archiva:archiva-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40309'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/archiva'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/1odl4p85r96n27k577jk6ftrp19xfc27'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/11/15/3'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:17:23Z', 'nvd_published_at': '2022-11-15T13:15:00Z'} |
1.4.0 | GHSA-5jph-wrq7-v9hf | 2022-11-26T20:18:04Z | 2022-11-23T06:30:24Z | null | ['CVE-2022-4044'] | Denial of service in Mattermost | A denial-of-service vulnerability in Mattermost allows an authenticated user to crash the server via multiple large autoresponder messages. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4044'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1680241'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}] | {'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T22:17:54Z', 'nvd_published_at': '2022-11-23T06:15:00Z'} |
1.4.0 | GHSA-ff9j-pwxg-q5p2 | 2022-11-08T14:49:05Z | 2022-11-04T12:00:25Z | null | ['CVE-2022-42743'] | deep-parse-json vulnerable to Prototype Pollution | deep-parse-json version 1.0.2 allows an external attacker to edit or add new properties to an object. This is possible because the application does not correctly validate the incoming JSON keys, thus allowing the `__proto__` property to be edited. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'deep-parse-json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42743'}, {'type': 'WEB', 'url': 'https://github.com/sibu-github/deep-parse-json/issues/6'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/buuren/'}, {'type': 'PACKAGE', 'url': 'https://github.com/sibu-github/deep-parse-json'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T14:49:05Z', 'nvd_published_at': '2022-11-03T20:15:00Z'} |
1.4.0 | GHSA-8w5g-3wcv-9g2j | 2022-11-22T00:10:10Z | 2022-11-22T00:10:10Z | null | ['CVE-2022-41880'] | Tensorflow vulnerable to Out-of-Bounds Read | ### Impact
When the [`BaseCandidateSamplerOp`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/candidate_sampler_ops.cc) function receives a value in `true_classes` larger than `range_max`, a heap oob vuln occurs.
```python
tf.raw_ops.ThreadUnsafeUnigramCandidateSampler(
true_classes=[... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.1'}]}]}, {'package':... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8w5g-3wcv-9g2j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41880'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/b389f5c944cadfdfe599b3f1e4026e036f30d2d4'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:10:10Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-6x99-gv2v-q76v | 2022-11-21T20:41:45Z | 2022-11-21T20:41:45Z | null | ['CVE-2022-41888'] | FPE in `tf.image.generate_bounding_box_proposals` | ### Impact
When running on GPU, [`tf.image.generate_bounding_box_proposals`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/image/generate_box_proposals_op.cu.cc) receives a `scores` input that must be of rank 4 but is not checked.
```python
import tensorflow as tf
a = tf.constant(value=[... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6x99-gv2v-q76v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41888'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/cf35502463a88ca7185a99daa7031df60b3c1c98'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:41:45Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-wc6r-4ggc-79w5 | 2022-11-28T21:06:08Z | 2022-11-21T23:59:47Z | null | ['CVE-2022-37429'] | Stored XSS using HTMLEditor | A malicious content author could add a JavaScript payload to the href attribute of a link by splitting a javascript URL with white space characters.
An attacker must have access to the CMS to exploit this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.11.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37429'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2022-37429.yaml'}, {'type': 'WEB', 'url': 'https://www.... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:59:47Z', 'nvd_published_at': '2022-11-23T02:15:00Z'} |
1.4.0 | GHSA-g8jw-8vpv-pv5q | 2022-11-23T17:38:30Z | 2022-11-21T21:30:14Z | null | ['CVE-2022-42096'] | Cross-site Scripting in Backdrop CMS | Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via Post content. The account must have admin privileges. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'backdrop/backdrop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.23.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42096'}, {'type': 'WEB', 'url': 'https://github.com/backdrop/backdrop/releases/tag/1.23.0'}, {'type': 'WEB', 'url': 'https://github.com/bypazs/CVE-2022-42096'}, {'type': 'WEB', 'url': 'https://grimthereaperteam.medium.com/cve-2022-42096-backdrop-xs... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:02:09Z', 'nvd_published_at': '2022-11-21T21:15:00Z'} |
1.4.0 | GHSA-vc47-6rqg-c7f5 | 2023-01-26T21:12:34Z | 2022-11-19T00:30:55Z | null | ['CVE-2021-33621'] | HTTP response splitting in CGI | Ruby gem cgi.rb prior to versions 0.3.5, 0.2.2 and 0.1.0.2 allow HTTP header injection. If a CGI application using the CGI library inserts untrusted input into the HTTP response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. This issu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'cgi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.3.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'cgi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'t... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33621'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1204695'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cgi/CVE-2021-33621.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-ann... | {'cwe_ids': ['CWE-436'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-24T01:59:37Z', 'nvd_published_at': '2022-11-18T23:15:00Z'} |
1.4.0 | GHSA-fhw8-8j55-vwgq | 2023-08-18T20:44:39Z | 2022-11-16T12:00:18Z | null | ['CVE-2022-45047'] | Unsafe deserialization in Apache MINA SSHD | Class org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider in Apache MINA SSHD <= 2.9.1 uses Java deserialization to load a serialized java.security.PrivateKey. The class is one of several implementations that an implementor using Apache MINA SSHD can choose for loading the host keys of an SSH server.
Unt... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sshd:sshd-common'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.sshd:sshd-core'}, 'ecosystem_specific': {'affect... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45047'}, {'type': 'WEB', 'url': 'https://github.com/apache/mina-sshd/commit/03238d51586f6b3c0bdbb1a23cf16799344d6c32'}, {'type': 'WEB', 'url': 'https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:46:32Z', 'nvd_published_at': '2022-11-16T09:15:00Z'} |
1.4.0 | GHSA-83w4-x5w9-hf4h | 2022-11-21T22:33:41Z | 2022-11-17T21:30:49Z | null | ['CVE-2022-43183'] | XXL-JOB vulnerable to Server-Side Request Forgery (SSRF) | XXL-Job before v2.3.1 contains a Server-Side Request Forgery (SSRF) via the component /admin/controller/JobLogController.java. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-job-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43183'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-job/issues/3002'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-job'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-job/releases/tag/2.3.1'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:33:41Z', 'nvd_published_at': '2022-11-17T21:15:00Z'} |
1.4.0 | GHSA-x9wp-gfrr-p5rp | 2022-11-21T22:23:19Z | 2022-11-16T12:00:23Z | null | ['CVE-2022-45389'] | Missing Authorization in Jenkins XP-Dev Plugin | A missing permission check in Jenkins XP-Dev Plugin 1.0 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to an attacker-specified repository. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.cloudbees.jenkins.plugins:xpdev'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45389'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xpdev-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2853'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:23:19Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-p5v9-g8w8-5q4v | 2022-11-21T22:35:39Z | 2022-11-21T22:35:39Z | null | ['CVE-2022-41930'] | Missing Authorization to enable or disable users in org.xwiki.platform:xwiki-platform-user-profile-ui | ### Impact
Any user (logged in or not) with access to the page XWiki.XWikiUserProfileSheet can enable or disable any user profile. This might allow to a disabled user to re-enable themselves, or to an attacker to disable any user of the wiki.
### Patches
The problem has been patched in XWiki 13.10.7, 14.5RC1 and 14... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-user-profile-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.4'}, {'fixed': '13.10.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-user-profile-ui'}, 'ranges': [{'type': 'ECOSYSTEM'... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p5v9-g8w8-5q4v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41930'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/5be1cc0adf917bf10899c47723fa451e950271fa'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:35:39Z', 'nvd_published_at': '2022-11-23T19:15:00Z'} |
1.4.0 | GHSA-rp7f-fhm8-9hpf | 2022-11-28T15:51:19Z | 2022-11-22T15:30:26Z | null | ['CVE-2022-33012'] | Account Takeover Through Password Reset Poisoning | Microweber 1.2.15 was discovered to allow attackers to perform an account takeover via a host header injection attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33012'}, {'type': 'WEB', 'url': 'https://blog.jitendrapatro.me/cve-2022-33012-account-takeover-through-password-reset-poisoning/'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://github.com/s... | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:16:32Z', 'nvd_published_at': '2022-11-22T14:15:00Z'} |
1.4.0 | GHSA-wcjj-qm5v-j4pc | 2022-12-15T16:57:17Z | 2022-11-16T12:00:23Z | null | ['CVE-2022-45384'] | Jenkins Reverse Proxy Auth Plugin vulnerable due to plaintext storage of passwords | Jenkins Reverse Proxy Auth Plugin versions 1.7.3 and earlier stores the LDAP manager password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by attackers with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:reverse-proxy-auth-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.3'}, {'fixed': '1.7.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45384'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/reverse-proxy-auth-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2094'}] | {'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:22:01Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-rmf2-pwfq-h75j | 2022-11-29T17:55:59Z | 2022-11-22T12:30:22Z | null | ['CVE-2022-40189'] | OS Command Injection in Apache Airflow | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Apache Airflow Pig Provider, Apache Airflow allows an attacker to control commands executed in the task execution context, without write access to DAG files. This issue affects Pig Provider versions prior to 4.0.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40189'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/27644'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/yxnfzfw2w9pj5s785k3rlyly4y44sd15'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:17:21Z', 'nvd_published_at': '2022-11-22T10:15:00Z'} |
1.4.0 | GHSA-24hp-84jp-8wgm | 2022-12-15T21:15:05Z | 2022-11-16T12:00:23Z | null | ['CVE-2022-45398'] | Cross-Site Request Forgery in Jenkins Cluster Statistics Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Cluster Statistics Plugin 0.4.6 and earlier allows attackers to delete recorded Jenkins Cluster Statistics. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.zeroturnaround:cluster-stats'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45398'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cluster-stats-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2938'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:25:59Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-gmpq-xrxj-xh8m | 2023-02-07T04:09:29Z | 2022-11-11T00:05:15Z | null | ['CVE-2022-41892'] | Arches vulnerable to execution of arbitrary SQL | ### Impact
With a carefully crafted web request, it's possible to execute certain unwanted sql statements against the database.
Anyone running the impacted versions (<=6.1.1, 6.2.0, >=7.0.0, <=7.1.1) should upgrade as soon as possible.
### Patches
The problem has been patched in the following versions: [6.1.2](https... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'arches'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.1'}}, {'package': {'ecosystem': 'PyPI', 'name': 'arches'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introd... | [{'type': 'WEB', 'url': 'https://github.com/archesproject/arches/security/advisories/GHSA-gmpq-xrxj-xh8m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41892'}, {'type': 'WEB', 'url': 'https://github.com/archesproject/arches/commit/7ed53e23a616edf3301d95814d9d64de5e3072a9'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-11T00:05:15Z', 'nvd_published_at': '2022-11-11T04:15:00Z'} |
1.4.0 | GHSA-q56r-mw39-944g | 2022-11-22T00:12:39Z | 2022-11-15T12:00:16Z | null | ['CVE-2022-43690'] | Concrete CMS vulnerable to Improper Authentication | Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 did not use strict comparison for the legacy_salt so that limited authentication bypass could occur if using this functionality. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.3'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43690'}, {'type': 'WEB', 'url': 'https://github.com/concretecms/concretecms/commit/a4dc73a4a47823373d4b4824534bb9b7d251f72c'}, {'type': 'WEB', 'url': 'https://github.com/concretecms/concretecms/commit/d5dd12c40efed326b26862391b7e1e6f414cdd55'}, {'t... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:12:39Z', 'nvd_published_at': '2022-11-14T23:15:00Z'} |
1.4.0 | GHSA-p88w-fhxw-xvcc | 2022-11-28T15:50:31Z | 2022-11-21T23:25:00Z | null | ['CVE-2022-41936'] | Exposure of Private Personal Information to an Unauthorized Actor in org.xwiki.platform:xwiki-platform-rest-server | ### Impact
The `modifications` rest endpoint does not filter out entries according to the user's rights. Therefore, information hidden from unauthorized users are exposed though the `modifications` rest endpoint (e.g., comments, page names...).
### Patches
Users should upgrade to XWiki 14.6+, 14.4.3+, or13.10.8+. Ol... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rest-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.1'}, {'fixed': '13.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rest-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p88w-fhxw-xvcc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41936'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/38dc1aa1a4435f24d58f5b8e4566cbcb0971f8ff'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-359'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:25:00Z', 'nvd_published_at': '2022-11-22T01:15:00Z'} |
1.4.0 | GHSA-562r-vg33-8x8h | 2022-12-12T20:28:04Z | 2022-11-23T22:17:25Z | null | ['CVE-2022-41946'] | TemporaryFolder on unix-like systems does not limit access to created files | **Vulnerability**
`PreparedStatement.setText(int, InputStream)`
and
`PreparedStatemet.setBytea(int, InputStream)`
will create a temporary file if the InputStream is larger than 51k
Example of vulnerable code:
```java
String s = "some very large string greater than 51200 bytes";
PreparedStatement.setInputStream(... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '42.2.0'}, {'fixed': '42.2.27'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '42.3.0'}, {'fixed... | [{'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-562r-vg33-8x8h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41946'}, {'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/commit/9008dc9aade6dbfe4efafcd6872ebc55f4699cf5'}, {'type': 'PACKAGE', 'url': 'htt... | {'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T22:17:25Z', 'nvd_published_at': '2022-11-23T20:15:00Z'} |
1.4.0 | GHSA-25mx-2mxm-6343 | 2022-11-03T18:14:05Z | 2022-11-03T18:14:05Z | null | ['CVE-2022-39382'] | @keystone-6/core's NODE_ENV defaults to development with esbuild | ### Impact
`@keystone-6/core@3.0.0 || 3.0.1` users that use `NODE_ENV` in their own code (**not dependencies**) to trigger security-sensitive functionality in a production build are vulnerable to `NODE_ENV` being inlined to `"development"` for user code.
If your dependencies use `NODE_ENV` to trigger particular behavi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@keystone-6/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/security/advisories/GHSA-25mx-2mxm-6343'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39382'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/8031/'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/ke... | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T18:14:05Z', 'nvd_published_at': '2022-11-03T14:15:00Z'} |
1.4.0 | GHSA-xxcj-rhqg-m46g | 2022-11-21T20:42:00Z | 2022-11-21T20:42:00Z | null | ['CVE-2022-41889'] | Segfault via invalid attributes in `pywrap_tfe_src.cc` | ### Impact
If a list of quantized tensors is assigned to an attribute, the pywrap code fails to parse the tensor and returns a `nullptr`, which is not caught. An example can be seen in [`tf.compat.v1.extract_volume_patches`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/image/generate_box... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xxcj-rhqg-m46g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41889'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e9e95553e5411834d215e6770c81a83a3d0866ce'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:42:00Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-h95w-p3x6-wwj6 | 2022-11-06T02:47:48Z | 2022-11-04T19:01:16Z | null | ['CVE-2022-3721'] | Froxlor vulnerable to Code Injection | Froxlor prior to version 0.10.39 is vulnerable to Code Injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.39'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3721'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/1182453c18a83309a3470b2775c148ede740806c'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a3c506f0-5f8a... | {'cwe_ids': ['CWE-79', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T20:54:01Z', 'nvd_published_at': '2022-11-04T13:15:00Z'} |
1.4.0 | GHSA-3fgr-xjr6-xqm8 | 2022-11-28T22:07:33Z | 2022-11-28T22:07:33Z | null | [] | code injection in phpxmlrpc/phpxmlrpc | code injection in `Wrapper::buildClientWrapperCode` via manipulation of the `$client` argument. It was possible to force the client to access local files or connect to undesired urls instead of the intended target server's url. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpxmlrpc/phpxmlrpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/issues/80'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpxmlrpc/phpxmlrpc/2022-11-28-2.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/gggeek/phpxmlrpc'}, {'type': 'WEB', 'url': 'https://github.com/gggeek/... | {'cwe_ids': ['CWE-95'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-28T22:07:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gr58-76rp-mmg4 | 2022-11-30T19:32:53Z | 2022-11-24T18:30:26Z | null | ['CVE-2022-2650'] | wger vulnerable to brute force attempts | Improper Restriction of Excessive Authentication Attempts in GitHub repository wger-project/wger prior to 2.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'wger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2650'}, {'type': 'WEB', 'url': 'https://github.com/wger-project/wger/commit/5e3167e3a2dc95836fa2607fe201524c031a2c4c'}, {'type': 'PACKAGE', 'url': 'https://github.com/wger-project/wger'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f0d85efa-... | {'cwe_ids': ['CWE-307'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T23:53:06Z', 'nvd_published_at': '2022-11-24T17:15:00Z'} |
1.4.0 | GHSA-6c6p-h79f-g6p4 | 2022-11-09T22:07:01Z | 2022-11-09T22:07:01Z | null | ['CVE-2022-39388'] | Istio may allow identity impersonation if user has localhost access | ### Impact
User can impersonate any workload identity within the service mesh if they have localhost access to the Istiod control plane.
### Patches
1.15.3
### Workarounds
No. If using 1.15.2 please upgrade to 1.15.3 or later.
### References
None at this time.
### For more information
If you have any questions or ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/istio/istio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0-beta.0'}, {'fixed': '1.15.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/istio/istio/security/advisories/GHSA-6c6p-h79f-g6p4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39388'}, {'type': 'WEB', 'url': 'https://github.com/istio/istio/commit/346260e5115e9fbc65ba8a559bc686e6ca046a32'}, {'type': 'WEB', 'url': 'https://git... | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-09T22:07:01Z', 'nvd_published_at': '2022-11-10T20:15:00Z'} |
1.4.0 | GHSA-rr8h-f97q-8p9c | 2022-11-22T17:50:13Z | 2022-11-22T00:00:07Z | null | ['CVE-2022-38148'] | Blind SQL Injection via GridFieldSortableHeader | Gridfield state is vulnerable to SQL injections. The vast majority of Gridfields in Silverstripe CMS are affected by this vulnerability.
An attacker with CMS access could execute an arbitrary SQL statement by adding an SQL payload in some parts of the GridField state. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.11.0'}, {'fixe... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38148'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2022-38148.yaml'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2022-38148'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:00:07Z', 'nvd_published_at': '2022-11-21T16:15:00Z'} |
1.4.0 | GHSA-3xg8-cc8f-9wv2 | 2022-11-26T20:22:00Z | 2022-11-19T21:30:26Z | null | ['CVE-2022-4064'] | Unsanitized input leading to code injection in Dalli | A vulnerability was found in Dalli. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation leads to injection. The exploit has been disclosed to the public and may be used. The name of the patch is 48d594dae55934476fec6178... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'dalli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4064'}, {'type': 'WEB', 'url': 'https://github.com/petergoldstein/dalli/issues/932'}, {'type': 'WEB', 'url': 'https://github.com/petergoldstein/dalli/pull/933'}, {'type': 'WEB', 'url': 'https://github.com/petergoldstein/dalli/commit/48d594dae559344... | {'cwe_ids': ['CWE-74'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:54:20Z', 'nvd_published_at': '2022-11-19T19:15:00Z'} |
1.4.0 | GHSA-43xg-8wmj-cw8h | 2023-08-31T00:26:53Z | 2022-11-01T19:00:29Z | null | ['CVE-2022-31777'] | Apache Spark vulnerable to Log Injection | A stored cross-site scripting (XSS) vulnerability in Apache Spark 3.2.1 and earlier, and 3.3.0, allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the logs which would be returned in logs rendered in the UI. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core'}, 'ecosystem_specific': {'affe... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31777'}, {'type': 'WEB', 'url': 'https://github.com/apache/spark/commit/ad90195de56688ce0898691eb9d04297ab0871ad'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/spark'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tre... | {'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T21:03:46Z', 'nvd_published_at': '2022-11-01T16:15:00Z'} |
1.4.0 | GHSA-w58w-79xv-6vcj | 2022-11-21T20:39:20Z | 2022-11-21T20:39:20Z | null | ['CVE-2022-41883'] | Out of bounds segmentation fault due to unequal op inputs in Tensorflow | ### Impact
[`tf.raw_ops.DynamicStitch`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/dynamic_stitch_op.cc) specifies input sizes when it is [registered](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/ops/data_flow_ops.cc).
```cpp
REGISTER_OP("DynamicStitch")
.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.1'}]}], 'versions': ['2.10.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w58w-79xv-6vcj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41883'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f5381e0e10b5a61344109c1b7c174c68110f7629'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:39:20Z', 'nvd_published_at': '2022-11-18T21:15:00Z'} |
1.4.0 | GHSA-xvwp-h6jv-7472 | 2022-11-21T22:03:45Z | 2022-11-21T22:03:45Z | null | ['CVE-2022-41900'] | FractionalMaxPool and FractionalAVGPool heap out-of-bounds acess | ### Impact
An input `pooling_ratio` that is smaller than 1 will trigger a heap OOB in [`tf.raw_ops.FractionalMaxPool`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/fractional_max_pool_op.cc) and [`tf.raw_ops.FractionalAvgPool`](https://github.com/tensorflow/tensorflow/blob/master/tensorf... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xvwp-h6jv-7472'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41900'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/216525144ee7c910296f5b05d214ca1327c9ce48'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:03:45Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-4p38-rc98-cr39 | 2022-12-02T22:20:32Z | 2022-11-30T15:30:27Z | null | ['CVE-2022-44136'] | Zenario CMS is vulnerable to Remote Code Execution (RCE). | Zenario CMS 9.3.57186 is vulnerable to RCE. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.57473'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44136'}, {'type': 'WEB', 'url': 'https://github.com/TribalSystems/Zenario/commit/4f95a557af3c0b82e448a6ff8f4c167525972e4a'}, {'type': 'WEB', 'url': 'https://com0t.github.io/zenar.io/2022/10/18/Unauthent-RCE-Zenar.io~9.3.html'}, {'type': 'PACKAGE', ... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:20:32Z', 'nvd_published_at': '2022-11-30T15:15:00Z'} |
1.4.0 | GHSA-96vh-4rfp-c42c | 2022-12-02T22:21:13Z | 2022-11-29T18:30:18Z | null | ['CVE-2022-21126'] | HTSJDK is vulnerable to exposure of resource(s) to the wrong sphere | The package com.github.samtools:htsjdk before 3.0.1 are vulnerable to Creation of Temporary File in Directory with Insecure Permissions due to the createTempDir() function in util/IOUtil.java not checking for the existence of the temporary directory before attempting to create it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.github.samtools:htsjdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21126'}, {'type': 'WEB', 'url': 'https://github.com/samtools/htsjdk/pull/1617'}, {'type': 'WEB', 'url': 'https://github.com/samtools/htsjdk/commit/4a4024a97ee3e87096df6ad9b22c8260bd527772'}, {'type': 'PACKAGE', 'url': 'https://github.com/samtools/h... | {'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:21:13Z', 'nvd_published_at': '2022-11-29T17:15:00Z'} |
1.4.0 | GHSA-9pqq-h9qv-28fp | 2022-12-15T21:06:25Z | 2022-11-16T12:00:23Z | null | ['CVE-2022-45388'] | Jenkins Config Rotator Plugin vulnerable to path traversal | Jenkins Config Rotator Plugin 2.0.1 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing unauthenticated attackers to read arbitrary files with '.xml' extension on the Jenkins controller file system. Currently there is no known workaround and no fix available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:config-rotator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45388'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/config-rotator-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2842'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:23:04Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.