schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-pprq-4488-wgqx
2023-03-06T20:45:53Z
2022-05-13T01:21:57Z
null
['CVE-2019-11065']
Insecure transport protocol in Gradle
Gradle versions from 1.4 to 5.3.1 use an insecure HTTP URL to download dependencies when the built-in JavaScript or CoffeeScript Gradle plugins are used. Dependency artifacts could have been maliciously compromised by a MITM attack against the ajax.googleapis.com web site.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.gradle:gradle-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4'}, {'fixed': '5.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11065'}, {'type': 'WEB', 'url': 'https://github.com/gradle/gradle/pull/8927'}, {'type': 'PACKAGE', 'url': 'https://github.com/gradle/gradle'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraprojec...
{'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T23:02:27Z', 'nvd_published_at': '2019-04-10T00:29:00Z'}
1.4.0
GHSA-7f2c-vp52-gmfw
2023-08-16T23:05:33Z
2022-05-17T03:45:51Z
null
['CVE-2014-7144']
OpenStack keystonemiddleware does not verify certificate
OpenStack keystonemiddleware (formerly python-keystoneclient) 0.x before 0.11.0 and 1.x before 1.2.0 disables certification verification when the "insecure" option is set in a paste configuration (`paste.ini`) file regardless of the value, which allows remote attackers to conduct man-in-the-middle attacks via a crafted...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'keystonemiddleware'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'keystonemiddleware'}, 'ecosystem_specific': {'affected_functions': ['...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-7144'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/python-keystoneclient/+bug/1353315'}, {'type': 'WEB', 'url': 'https://github.com/openstack/ossa/blob/23e15de721f4a6890374a231d93524e02965a97f/ossa/OSSA-2014-030.yaml'}, {'type': 'WEB', 'url...
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T23:05:33Z', 'nvd_published_at': '2014-10-02T14:55:00Z'}
1.4.0
GHSA-vp55-fhxx-vcx8
2023-05-16T17:57:47Z
2022-05-24T17:26:39Z
null
['CVE-2020-15777']
Maven Extension plugin for Gradle Enterprise vulnerable to Deserialization of Untrusted Data
An issue was discovered in the Maven Extension plugin before 1.6 for Gradle Enterprise. It is vulnerable to, in the worst case, Remote Code Execution, and in the general case, local privilege escalation. Internally, the plugin uses a socket connection to send serialized Java objects that are deserialized by a Java stan...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.gradle:gradle-enterprise-maven-extension'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15777'}, {'type': 'WEB', 'url': 'https://docs.gradle.com/enterprise/maven-extension/#1_6'}, {'type': 'WEB', 'url': 'https://docs.gradle.com/enterprise/maven-extension/#release_history'}, {'type': 'WEB', 'url': 'https://security.gradle.com/advisory/...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-16T17:57:47Z', 'nvd_published_at': '2020-08-25T22:15:00Z'}
1.4.0
GHSA-h7wm-ph43-c39p
2022-06-17T21:35:13Z
2022-05-17T01:16:31Z
null
['CVE-2017-14158']
Scrapy denial of service vulnerability
Scrapy 1.4 allows remote attackers to cause a denial of service (memory consumption) via large files because arbitrarily many files are read into memory, which is especially problematic if the files are then individually written in a separate thread to a slow storage resource, as demonstrated by interaction between dat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'scrapy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7'}, {'last_affected': '2.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-14158'}, {'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/issues/482'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-h7wm-ph43-c39p'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/blob/8b7a4d62a95e8f6...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T21:35:13Z', 'nvd_published_at': '2017-09-05T17:29:00Z'}
1.4.0
GHSA-m8x6-6r63-qvj2
2023-04-25T16:37:01Z
2022-05-20T19:54:56Z
null
['CVE-2022-24899']
Cross site scripting via canonical tag in Contao
### Impact Untrusted users can inject malicious code into the canonical tag, which is then executed on the web page (front end). ### Patches Update to Contao 4.13.3. ### Workarounds Disable canonical tags in the root page settings. ### References https://contao.org/en/security-advisories/cross-site-scripting-via...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.13.0'}, {'fixed': '4.13.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/contao/contao/security/advisories/GHSA-m8x6-6r63-qvj2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24899'}, {'type': 'WEB', 'url': 'https://github.com/contao/contao/commit/199206849a87ddd0fa5cf674eb3c58292fd8366c'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-20T19:54:56Z', 'nvd_published_at': '2022-05-06T00:15:00Z'}
1.4.0
GHSA-4vrv-ch96-6h42
2022-06-28T23:45:33Z
2022-05-13T01:52:26Z
null
['CVE-2018-3258']
Improper Privilege Management in MySQL Connectors Java
Vulnerability in the MySQL Connectors component of Oracle MySQL (subcomponent: Connector/J). Supported versions that are affected are 8.0.12 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Connectors. Successful attacks of this vu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'mysql:mysql-connector-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-3258'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2019:1545'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20181018-0002/'}, {'type': 'WEB', 'url': 'http://www.oracle.com/technetwork/security-advisory/cpuoc...
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T23:45:33Z', 'nvd_published_at': '2018-10-17T01:31:00Z'}
1.4.0
GHSA-r3fq-cmmw-cpmm
2023-08-24T13:02:38Z
2022-05-24T16:46:50Z
null
['CVE-2019-12452']
Containous Traefik Exposes Password Hashes
types/types.go in Containous Traefik 1.7.x through 1.7.11, when the `--api` flag is used and the API is publicly reachable and exposed without sufficient access control (which is contrary to the API documentation), allows remote authenticated users to discover password hashes by reading the Basic HTTP Authentication or...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.7.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.7.11'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12452'}, {'type': 'WEB', 'url': 'https://github.com/containous/traefik/issues/4917'}, {'type': 'WEB', 'url': 'https://github.com/containous/traefik/pull/4918'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/commit/a169fec2e08e391d24b50...
{'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-14T19:46:49Z', 'nvd_published_at': '2019-05-29T19:29:00Z'}
1.4.0
GHSA-q5rg-wg7h-73m5
2023-07-17T23:09:56Z
2022-05-24T16:55:40Z
null
['CVE-2019-10665']
LibreNMS Information Disclosure
An issue was discovered in LibreNMS through 1.47. The scripts that handle the graphing options (`html/includes/graphs/common.inc.php` and `html/includes/graphs/graphs.inc.php`) do not sufficiently validate or encode several fields of user supplied input. Some parameters are filtered with `mysqli_real_escape_string`, wh...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.47'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10665'}, {'type': 'WEB', 'url': 'https://github.com/spaceraccoon/CVE-2020-10665'}, {'type': 'WEB', 'url': 'https://www.activecyber.us/activelabs/docker-desktop-local-privilege-escalation-cve-2020-10665'}, {'type': 'WEB', 'url': 'https://www.darkmat...
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-17T23:09:56Z', 'nvd_published_at': '2019-09-09T13:15:00Z'}
1.4.0
GHSA-wmhw-fvg9-87fc
2023-08-03T22:14:42Z
2022-05-17T02:52:21Z
null
['CVE-2015-8234']
OpenStack Glance Signature Verification Bypass
The image signature algorithm in OpenStack Glance 11.0.0 allows remote attackers to bypass the signature verification process via a crafted image, which triggers an MD5 collision.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'glance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '11.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8234'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/glance/+bug/1516031'}, {'type': 'WEB', 'url': 'https://seclists.org/oss-sec/2015/q4/303'}, {'type': 'WEB', 'url': 'https://wiki.openstack.org/wiki/OSSN/OSSN-0061'}]
{'cwe_ids': ['CWE-328'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T22:14:42Z', 'nvd_published_at': '2017-03-29T14:59:00Z'}
1.4.0
GHSA-c3cg-mv5w-cvw8
2023-01-14T05:27:19Z
2022-05-24T17:08:47Z
null
['CVE-2020-2120']
XXE vulnerability in FitNesse Plugin
FitNesse Plugin 1.30 and earlier does not configure the XML parser to prevent XML external entity (XXE) attacks. This allows a user able to control the input files for its post-build step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenkins controller, server-side...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:fitnesse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.31'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2120'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/fitnesse-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-02-12/#SECURITY-1751'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/02...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-14T05:27:19Z', 'nvd_published_at': '2020-02-12T15:15:00Z'}
1.4.0
GHSA-hh3v-5chw-wgh7
2023-07-28T20:39:28Z
2022-05-14T02:22:18Z
null
['CVE-2016-7240']
ChakraCore RCE Vulnerability
The Chakra JavaScript scripting engine in Microsoft Edge allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site, aka "Scripting Engine Memory Corruption Vulnerability," a different vulnerability than CVE-2016-7200, CVE-2016-7201, CVE-2016-7202, CVE-2016...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-7240'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/1982'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/c2787ef8fdb7401922e9ec6540e4e5895d11c631'}, {'type': 'WEB', 'url': 'https://docs.microso...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-28T20:39:28Z', 'nvd_published_at': '2016-11-10T06:59:00Z'}
1.4.0
GHSA-83g2-8m93-v3w7
2023-02-08T00:33:11Z
2022-05-24T19:03:21Z
null
['CVE-2021-33194']
golang.org/x/net/html Infinite Loop vulnerability
Go through 1.15.12 and 1.16.x through 1.16.4 has a golang.org/x/net/html infinite loop via crafted ParseFragment input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net/html'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20210520170846-37e1c6afe023'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33194'}, {'type': 'WEB', 'url': 'https://github.com/golang/net/commit/37e1c6afe02340126705deced573a85ab75209d7'}, {'type': 'WEB', 'url': 'https://go.dev/cl/311090'}, {'type': 'WEB', 'url': 'https://go.dev/issue/46288'}, {'type': 'WEB', 'url': 'http...
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:33:11Z', 'nvd_published_at': '2021-05-26T15:15:00Z'}
1.4.0
GHSA-mv42-px54-87jw
2022-07-06T20:07:28Z
2022-05-14T01:10:17Z
null
['CVE-2016-0714']
Improper Access Control in Apache Tomcat
The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web app...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.M1'}, {'fixed': '9.0.0.M2'}]}], 'versions': ['9.0.0.M1']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0714'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1087'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1088'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?...
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:07:28Z', 'nvd_published_at': '2016-02-25T01:59:00Z'}
1.4.0
GHSA-6m68-3w55-6mx4
2022-11-08T14:19:47Z
2022-05-14T00:57:16Z
null
['CVE-2017-9795']
Apache Geode OQL method invocation vulnerability
When an Apache Geode cluster before v1.3.0 is operating in secure mode, a user with read access to specific regions within a Geode cluster may execute OQL queries that allow read and write access to objects within unauthorized regions. In addition a user could invoke methods that allow remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9795'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/GEODE-3247'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/0fc5ea3c1ea06fe7058a0ab56d593914b05f728a6c93c5a6755956c7@%3Cuser.geode.apache.org%3E'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T14:19:47Z', 'nvd_published_at': '2018-01-10T03:29:00Z'}
1.4.0
GHSA-9284-j4c9-779q
2022-07-06T20:22:18Z
2022-05-14T02:49:30Z
null
['CVE-2015-1833']
Improper Input Validation in Apache Jackrabbit
XML external entity (XXE) vulnerability in Apache Jackrabbit before 2.0.6, 2.2.x before 2.2.14, 2.4.x before 2.4.6, 2.6.x before 2.6.6, 2.8.x before 2.8.1, and 2.10.x before 2.10.1 allows remote attackers to read arbitrary files and send requests to intranet servers via a crafted WebDAV request.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:jackrabbit-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.jackrabbit:jackrab...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-1833'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/JCR-3883'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/37110/'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/jackrabbit-announce/201505.mbox...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:22:18Z', 'nvd_published_at': '2015-05-29T15:59:00Z'}
1.4.0
GHSA-rghw-6px2-fgwc
2022-06-22T18:49:12Z
2022-05-24T22:28:56Z
null
['CVE-2021-20328']
Improper Certificate Validation in MongoDB
Specific versions of the Java driver that support client-side field level encryption (CSFLE) fail to perform correct host name verification on the KMS server’s certificate. This vulnerability in combination with a privileged network position active MITM attack could result in interception of traffic between the Java dr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.mongodb:mongodb-driver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.11.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.mongodb:mongodb-driver'}, 'ra...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20328'}, {'type': 'WEB', 'url': 'https://jira.mongodb.org/browse/JAVA-4017'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:49:12Z', 'nvd_published_at': '2021-02-25T17:15:00Z'}
1.4.0
GHSA-4rpv-g4gq-rh4m
2023-08-28T23:47:48Z
2022-05-17T03:46:18Z
null
['CVE-2013-7073']
TYPO3 vulnerable to Information Disclosure via Content Editing Wizards component
The Content Editing Wizards component in TYPO3 4.5.0 through 4.5.31, 4.7.0 through 4.7.16, 6.0.0 through 6.0.11, and 6.1.0 through 6.1.6 does not check permissions, which allows remote authenticated editors to read arbitrary TYPO3 table columns via unspecified parameters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.31'}}, {'package': {'ecosystem': 'Packagist', ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-7073'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00028.html'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2016-08/m...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-28T23:47:48Z', 'nvd_published_at': '2013-12-23T23:55:00Z'}
1.4.0
GHSA-rpv4-63g3-9x23
2023-08-04T21:49:50Z
2022-05-13T01:27:10Z
null
['CVE-2017-8342']
Radicale is vulnerable to timing oracles and simple bruteforce attacks
Radicale before 1.1.2 and 2.0.0rc1 is prone to timing oracles and simple brute-force attacks when using the htpasswd authentication method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Radicale'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Radicale'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'typ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-8342'}, {'type': 'WEB', 'url': 'https://github.com/Kozea/Radicale/commit/059ba8dec1f22ccbeab837e288b3833a099cee2d'}, {'type': 'WEB', 'url': 'https://github.com/Kozea/Radicale/commit/190b1dd795f0c552a4992445a231da760211183b'}, {'type': 'WEB', 'url':...
{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-08-04T21:49:50Z', 'nvd_published_at': '2017-04-30T15:59:00Z'}
1.4.0
GHSA-mc22-25r3-2w9w
2022-12-06T21:54:46Z
2022-05-13T01:40:56Z
null
['CVE-2017-1000084']
Parameterized Trigger Plugin fails to check Item/Build permission
Parameterized Trigger Plugin fails to check Item/Build permission: The Parameterized Trigger Plugin did not check the build authentication it was running as and allowed triggering any other project in Jenkins. The plugin has been adapted to now check for Item/Build permission before triggering a downstream build.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:parameterized-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.35.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000084'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/parameterized-trigger-plugin/pull/114'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/parameterized-trigger-plugin'}, {'type': 'WEB', 'url': 'https://issues.jenkins.io/brow...
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:54:46Z', 'nvd_published_at': '2017-10-05T01:29:00Z'}
1.4.0
GHSA-73wv-rgj7-vjj9
2023-08-03T18:51:11Z
2022-05-24T17:44:38Z
null
['CVE-2021-28380']
Aimeos Typo3 extension contains Cross-site Scripting vulnerability
The aimeos (aka Aimeos shop and e-commerce framework) extension before 19.10.12 and 20.x before 20.10.5 for TYPO3 allows Cross-site Scripting (XSS) via a backend user account.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'aimeos/aimeos-typo3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.10.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'aimeos/aimeos-typo3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0'}, {'fixed': '20.1...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28380'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2021-003'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T23:06:27Z', 'nvd_published_at': '2021-03-16T20:15:00Z'}
1.4.0
GHSA-4hxv-95rc-jqg7
2022-11-08T12:38:22Z
2022-05-17T00:18:13Z
null
['CVE-2017-1000209']
nv-websocket-client allows attackers to spoof SSL/TLS servers via an arbitrary valid certificate
The Java WebSocket client nv-websocket-client does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL/TLS servers via an arbitrary valid certificate.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.neovisionaries:nv-websocket-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000209'}, {'type': 'WEB', 'url': 'https://github.com/TakahikoKawasaki/nv-websocket-client/pull/107'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T12:38:22Z', 'nvd_published_at': '2017-11-17T02:29:00Z'}
1.4.0
GHSA-9qh2-6fxg-9m4g
2022-09-30T23:13:59Z
2022-05-14T01:55:28Z
null
['CVE-2018-16982']
Open Chinese Convert subject to Denial of Service via Out-of-bounds Read
Open Chinese Convert (OpenCC) 1.0.5 allows attackers to cause a denial of service (segmentation fault) because BinaryDict::NewFromFile in BinaryDict.cpp may have out-of-bounds keyOffset and valueOffset values via a crafted .ocd file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'opencc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'OpenCC'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-16982'}, {'type': 'WEB', 'url': 'https://github.com/BYVoid/OpenCC/issues/303'}, {'type': 'WEB', 'url': 'https://github.com/BYVoid/OpenCC/pull/309'}, {'type': 'WEB', 'url': 'https://github.com/BYVoid/OpenCC/pull/560'}, {'type': 'WEB', 'url': 'https:...
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T13:10:06Z', 'nvd_published_at': '2018-09-13T02:29:00Z'}
1.4.0
GHSA-r2xf-w5pj-9pw8
2023-08-16T22:09:18Z
2022-05-14T01:18:38Z
null
['CVE-2014-0111']
Apache Syncope JEXL Code Injection
Apache Syncope 1.0.0 before 1.0.9 and 1.1.0 before 1.1.7 allows remote administrators to execute arbitrary Java code via vectors related to Apache Commons JEXL expressions, "derived schema definition," "user / role templates," and "account links of resource mappings."
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.syncope:syncope'}, 'ecosystem_specific': {'af...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0111'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20201208163011/http://www.securityfocus.com/archive/1/531841/100/0/threaded'}, {'type': 'WEB', 'url': 'http://mail-archives.us.apache.org/mod_mbox/www-announce/201404.mbox/%3C534CE273.9020...
{'cwe_ids': ['CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:09:18Z', 'nvd_published_at': '2014-04-17T14:55:00Z'}
1.4.0
GHSA-7j4h-8wpf-rqfh
2022-07-08T19:14:49Z
2022-05-13T01:01:06Z
null
['CVE-2013-4002']
Missing XML Validation in Apache Xerces2
XMLscanner.java in Apache Xerces2 Java Parser before 2.12.0, as used in the Java Runtime Environment (JRE) in IBM Java 5.0 before 5.0 SR16-FP3, 6 before 6 SR14, 6.0.1 before 6.0.1 SR6, and 7 before 7 SR5 as well as Oracle Java SE 7u40 and earlier, Java SE 6u60 and earlier, Java SE 5.0u51 and earlier, JRockit R28.2.8 an...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'xerces:xercesImpl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4002'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2014:0414'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/85260'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/XERCESJ-1679'}, {...
{'cwe_ids': ['CWE-112'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:14:49Z', 'nvd_published_at': '2013-07-23T11:03:00Z'}
1.4.0
GHSA-qqh2-h6gw-6x8x
2023-08-16T22:44:09Z
2022-05-14T04:01:57Z
null
['CVE-2014-3943']
Typo3 XSS Vulnerabilities
Multiple cross-site scripting (XSS) vulnerabilities in unspecified backend components in TYPO3 4.5.0 before 4.5.34, 4.7.0 before 4.7.19, 6.0.0 before 6.0.14, 6.1.0 before 6.1.9, and 6.2.0 before 6.2.3 allow remote authenticated editors to inject arbitrary web script or HTML via unknown parameters.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.34'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.33'}}, {'package': {'ecosystem': 'Packagist', ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3943'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229060129/http://www.securityfocus.com/bid/67625'}, {'type': 'WEB', 'url': 'http://lists.opensuse.org/opensuse-updates/2014-06/msg00037.html'}, {'type': 'WEB', 'url': 'http://typo3.or...
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2023-08-16T22:44:09Z', 'nvd_published_at': '2014-06-03T14:55:00Z'}
1.4.0
GHSA-7v7g-mh53-89hw
2022-12-22T03:34:41Z
2022-05-24T17:33:08Z
null
['CVE-2020-2311']
Missing permission check in Jenkins AWS Global Configuration Plugin allows replacing plugin configuration
AWS Global Configuration Plugin 1.5 and earlier does not perform a permission check in an HTTP endpoint processing form submissions. This allows attackers with Overall/Read permission to replace the global AWS configuration. AWS Global Configuration Plugin 1.6 properly performs permission checks when processing confi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:aws-global-configuration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2311'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/aws-global-configuration-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-11-04/#SECURITY-2101'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T03:34:41Z', 'nvd_published_at': '2020-11-04T15:15:00Z'}
1.4.0
GHSA-6g23-fww6-rfrj
2023-07-21T20:38:06Z
2022-05-13T01:20:48Z
null
['CVE-2018-8354']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-8391, CVE-2018-8456, CVE-2018-8457, CVE-2018-8459.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-8354'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/pull/5688'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/5192cdc08a030a580ba15d1d9aa50f81a6d92211'}, {'type': 'WEB', 'url': 'https://portal.msrc....
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-21T20:38:06Z', 'nvd_published_at': '2018-09-13T00:29:00Z'}
1.4.0
GHSA-5fp8-c45m-256p
2022-06-21T20:08:57Z
2022-05-24T19:20:42Z
null
['CVE-2021-42250']
Improper Encoding or Escaping of Output in Apache Superset
Improper output neutralization for Logs. A specific Apache Superset HTTP endpoint allowed for an authenticated user to forge log entries or inject malicious content into logs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42250'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5fp8-c45m-256p'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset/'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-s...
{'cwe_ids': ['CWE-116'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:08:57Z', 'nvd_published_at': '2021-11-17T15:15:00Z'}
1.4.0
GHSA-x7f3-62pm-9p38
2022-05-31T23:27:52Z
2022-05-20T00:00:26Z
null
['CVE-2022-28946']
Out of bounds memory access in github.com/open-policy-agent/opa
An issue in the component ast/parser.go of Open Policy Agent v0.39.0 causes the application to incorrectly interpret every expression, causing a Denial of Service (DoS) via triggering out-of-range memory access.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/open-policy-agent/opa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.40.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28946'}, {'type': 'WEB', 'url': 'https://github.com/open-policy-agent/opa/pull/4548'}, {'type': 'WEB', 'url': 'https://github.com/open-policy-agent/opa/commit/e9d3828db670cbe11129885f37f08cbf04935264'}, {'type': 'PACKAGE', 'url': 'https://github.co...
{'cwe_ids': ['CWE-119'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T20:20:13Z', 'nvd_published_at': '2022-05-19T19:15:00Z'}
1.4.0
GHSA-rv97-r8f7-8wmg
2022-09-09T00:56:25Z
2022-05-24T22:00:03Z
null
['CVE-2019-10329']
Plaintext password storage in Jenkins InfluxDB Plugin
Jenkins InfluxDB Plugin Prior to 1.22 stored credentials unencrypted in its global configuration file on the Jenkins master where they can be viewed by users with access to the master file system.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:influxdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10329'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/influxdb-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-05-31/#SECURITY-1403'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/0...
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-09T00:56:25Z', 'nvd_published_at': '2019-05-31T15:29:00Z'}
1.4.0
GHSA-7f62-4887-cfv5
2022-05-25T19:31:53Z
2022-05-11T00:01:38Z
null
['CVE-2022-1397']
Privilege escalation in easyappointments
The Easy!Appointments API authorization is checked against the user's existence, without validating the permissions. As a result, a low privileged user (eg. provider) can create a new admin user via the "/api/v1/admins/" endpoint and take over the system. A [patch](https://github.com/alextselegidis/easyappointments/com...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'alextselegidis/easyappointments'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1397'}, {'type': 'WEB', 'url': 'https://github.com/alextselegidis/easyappointments/commit/63dbb51decfcc1631c398ecd6d30e3a337845526'}, {'type': 'PACKAGE', 'url': 'https://github.com/alextselegidis/easyappointments'}, {'type': 'WEB', 'url': 'https://...
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-25T19:31:53Z', 'nvd_published_at': '2022-05-10T14:15:00Z'}
1.4.0
GHSA-ch37-ch8w-cfrq
2023-07-20T14:49:19Z
2022-05-24T17:32:59Z
null
['CVE-2020-26211']
Bookstack Cross-site Scripting vulnerability
In BookStack before version 0.30.4, a user with permissions to edit a page could insert JavaScript code through the use of `javascript:` URIs within a link or form which would run, within the context of the current page, when clicked or submitted. Additionally, a user with permissions to edit a page could insert a part...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'ssddanbrown/bookstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.30.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/BookStackApp/BookStack/security/advisories/GHSA-r2cf-8778-3jgp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26211'}, {'type': 'WEB', 'url': 'https://github.com/BookStackApp/BookStack/commit/bbd1384acbe7e52c21f89af69f2dc391c95dbf54'}, {'type': 'PAC...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T14:49:19Z', 'nvd_published_at': '2020-11-03T21:15:00Z'}
1.4.0
GHSA-8mc4-2xrc-g582
2023-07-13T17:15:08Z
2022-05-24T17:07:14Z
null
['CVE-2020-7937']
Plone cross site scripting (XSS)
An XSS issue in the title field in Plone 5.0 through 5.2.1 allows users with a certain privilege level to insert JavaScript that will be executed when other users access the site.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Plone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'last_affected': '5.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7937'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20200121'}, {'type': 'WEB', 'url': 'https://plone.org/security/hotfix/20200121/xss-in-the-title-field-on-plone-5-0-and-higher'}, {'type': 'WEB', 'url': 'https://www.openwall.com/list...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T17:15:08Z', 'nvd_published_at': '2020-01-23T21:15:00Z'}
1.4.0
GHSA-fh32-35w2-rxcc
2022-06-17T22:23:08Z
2022-05-02T03:53:13Z
null
['CVE-2009-4269']
Use of Password Hash With Insufficient Computational Effort in Apache Derby
The password hash generation algorithm in the BUILTIN authentication functionality for Apache Derby before 10.6.1.0 performs a transformation that reduces the size of the set of inputs to SHA-1, which produces a small search space that makes it easier for local and possibly remote attackers to crack passwords by genera...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.derby:derby'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.6.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.5.3.01'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2009-4269'}, {'type': 'WEB', 'url': 'https://github.com/apache/derby/commit/178ca0cfb796b5a5788d25ded0978773ea254332'}, {'type': 'WEB', 'url': 'https://github.com/apache/derby/commit/23f97a597716ee5b08eff698b7177850ad8e1294'}, {'type': 'WEB', 'url': 'ht...
{'cwe_ids': ['CWE-916'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-17T22:23:08Z', 'nvd_published_at': '2010-08-16T20:00:00Z'}
1.4.0
GHSA-mwrx-hx6x-3hhv
2023-08-14T22:39:42Z
2022-05-14T01:51:59Z
null
['CVE-2012-0838']
Apache Struts Code injection due to conversion error
Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-0838'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/struts'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/WW-3668'}, {'type': 'WEB', 'url': 'http://jvn.jp/en/jp/JVN79099262/index.html'}, {'type': 'WEB', 'url': 'http://jv...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T23:00:54Z', 'nvd_published_at': '2012-03-02T22:55:00Z'}
1.4.0
GHSA-pwx5-xg7g-wpc5
2023-08-29T21:28:26Z
2022-05-17T01:38:35Z
null
['CVE-2012-5825']
Tweepy does not verify SSL Certificate
Tweepy does not verify that the server hostname matches a domain name in the subject's Common Name (CN) or subjectAltName field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate, related to use of the Python httplib library.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'tweepy'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2012-5825'}, {'type': 'WEB', 'url': 'https://github.com/tweepy/tweepy/issues/279'}, {'type': 'WEB', 'url': 'https://github.com/tweepy/tweepy/pull/400'}, {'type': 'WEB', 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/79831'}, {'type': 'PACK...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-29T21:28:26Z', 'nvd_published_at': '2012-11-04T22:55:00Z'}
1.4.0
GHSA-c329-r874-xc7j
2023-01-05T21:05:44Z
2022-05-24T17:10:30Z
null
['CVE-2020-2158']
Remote Code Execution vulnerability in Jenkins Literate Plugin
Jenkins Literate Plugin 1.0 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types, resulting in a remote code execution vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:literate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2158'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/literate-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-03-09/#SECURITY-1750'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/03...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-05T21:05:44Z', 'nvd_published_at': '2020-03-09T16:15:00Z'}
1.4.0
GHSA-x33v-f3gp-gw2c
2022-07-08T19:07:51Z
2022-05-14T02:10:10Z
null
['CVE-2013-2132']
Use of NullPointerException Catch to Detect NULL Pointer Dereference in Pymongo
bson/_cbsonmodule.c in the mongo-python-driver (aka. pymongo) before 2.5.2, as used in MongoDB, allows context-dependent attackers to cause a denial of service (NULL pointer dereference and crash) via vectors related to decoding of an "invalid DBRef."
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'pymongo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-2132'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/mongo-python-driver/commit/a060c15ef87e0f0e72974c7c0e57fe811bbd06a2'}, {'type': 'WEB', 'url': 'https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=710597'}, {'type': 'ADVISORY', 'url': 'https...
{'cwe_ids': ['CWE-395'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:07:51Z', 'nvd_published_at': '2013-08-15T17:55:00Z'}
1.4.0
GHSA-922h-8q8g-w7fx
2022-12-06T21:49:59Z
2022-05-24T17:03:48Z
null
['CVE-2019-16570']
Jenkins RapidDeploy Plugin Cross-Site Request Forgery plugin
A cross-site request forgery vulnerability in Jenkins RapidDeploy Plugin 4.1 and earlier allows attackers to connect to an attacker-specified web server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rapiddeploy-jenkins'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16570'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2019-12-17/#SECURITY-1604'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2019/12/17/1'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:49:59Z', 'nvd_published_at': '2019-12-17T15:15:00Z'}
1.4.0
GHSA-gcvp-cwgw-wx8j
2023-07-31T19:51:27Z
2022-05-17T02:37:29Z
null
['CVE-2016-5704']
phpMyAdmin XSS Vulnerability
Cross-site scripting (XSS) vulnerability in the table-structure page in phpMyAdmin 4.6.x before 4.6.3 allows remote attackers to inject arbitrary web script or HTML via vectors involving a comment.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6'}, {'fixed': '4.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-5704'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/72213573182896bd6a6e5af5ba1881dd87c4a20b'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/201701-32'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/sec...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-31T19:51:27Z', 'nvd_published_at': '2016-07-03T01:59:00Z'}
1.4.0
GHSA-pgxh-wfw4-jx2v
2023-08-03T20:01:52Z
2022-05-17T00:36:02Z
null
['CVE-2015-5963']
Django denial of service via empty session record creation
`contrib.sessions.middleware.SessionMiddleware` in Django 1.8.x before 1.8.4, 1.7.x before 1.7.10, 1.4.x before 1.4.22, and possibly other versions allows remote attackers to cause a denial of service (session store consumption or session record removal) via a large number of requests to `contrib.auth.views.logout`, wh...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['django.contrib.sessions.middleware.SessionMiddleware']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_speci...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5963'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/2f5485346ee6f84b4e52068c04e043092daf55f7'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/575f59f9bc7c59a5e41a081d1f5f55fc859c5012'}, {'type': 'WEB', 'url': '...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T20:01:52Z', 'nvd_published_at': '2015-08-24T14:59:00Z'}
1.4.0
GHSA-p5jh-8rxp-wqjj
2022-12-20T22:38:03Z
2022-05-24T17:27:07Z
null
['CVE-2020-2244']
XSS vulnerability in Jenkins Build Failure Analyzer Plugin
Jenkins Build Failure Analyzer Plugin 1.27.0 and earlier does not escape matching text in a form validation response, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers able to provide console output for builds used to test build log indications. Build Failure Analyzer Plugin 1.27.1 escap...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.sonyericsson.jenkins.plugins.bfa:build-failure-analyzer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.27.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.27.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2244'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/build-failure-analyzer-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1770'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:38:03Z', 'nvd_published_at': '2020-09-01T14:15:00Z'}
1.4.0
GHSA-hxpw-7x95-q38m
2022-12-12T21:03:30Z
2022-05-17T00:29:01Z
null
['CVE-2017-1000108']
Jenkins Pipeline: Input Step Plugin
The Pipeline: Input Step Plugin by default allowed users with Item/Read access to a pipeline to interact with the step to provide input. This has been changed, and now requires users to have the Item/Build permission instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-input-step'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-1000108'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-input-step-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2017-08-07/'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:03:30Z', 'nvd_published_at': '2017-10-05T01:29:00Z'}
1.4.0
GHSA-5xf9-3v63-ww6f
2022-07-07T23:01:28Z
2022-05-13T01:09:20Z
null
['CVE-2014-0110']
Uncontrolled Resource Consumption in Apache CXF
Apache CXF before 2.6.14 and 2.7.x before 2.7.11 allows remote attackers to cause a denial of service (/tmp disk consumption) via a large invalid SOAP message.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.14'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.11'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0110'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r36e44ffc1a9b365327df62cdfaabe85b9a5637de102cea07d79b2dbf@%3Ccommits.cxf.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc774278135816e7afc943dc9fc7...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T23:01:28Z', 'nvd_published_at': '2014-05-08T14:29:00Z'}
1.4.0
GHSA-595x-hh6c-hfv8
2022-06-03T18:37:30Z
2022-05-27T00:00:48Z
null
['CVE-2022-30500']
SQL injection in jflyfox jfinal
Jfinal cms 5.1.0 is vulnerable to SQL Injection.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.jflyfox:jflyfox_jfinal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30500'}, {'type': 'WEB', 'url': 'https://github.com/jflyfox/jfinal_cms/issues/35'}, {'type': 'PACKAGE', 'url': 'https://github.com/jflyfox/jflyfox_jfinal'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-03T18:37:30Z', 'nvd_published_at': '2022-05-26T16:15:00Z'}
1.4.0
GHSA-9hjv-9h75-xmpp
2022-07-06T20:06:41Z
2022-05-14T01:18:35Z
null
['CVE-2016-0763']
Improper Verification of Source of a Communication Channel in Apache Tomcat
The setGlobalContext method in org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M3 does not consider whether ResourceLinkFactory.setGlobalContext callers are authorized, which allows remote authenticated users to bypass intended SecurityManag...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.68'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-0763'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1087'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2016:1088'}, {'type': 'WEB', 'url': 'https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?...
{'cwe_ids': ['CWE-940'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:06:41Z', 'nvd_published_at': '2016-02-25T01:59:00Z'}
1.4.0
GHSA-qmf3-w5jf-cv54
2022-12-21T15:28:36Z
2022-05-24T17:19:05Z
null
['CVE-2020-2199']
XSS vulnerability in Jenkins Subversion Partial Release Manager Plugin
Subversion Partial Release Manager Plugin 1.0.1 and earlier does not escape the error message for the repository URL field form validation. This results in a reflected cross-site scripting (XSS) vulnerability that can also be exploited similar to a stored cross-site scripting vulnerability by users with Job/Configure ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:svn-partial-release-mgr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2199'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/svn-partial-release-mgr-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-06-03/#SECURITY-1726'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-s...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T15:28:36Z', 'nvd_published_at': '2020-06-03T13:15:00Z'}
1.4.0
GHSA-273v-g3x4-r3rc
2022-11-01T22:01:42Z
2022-05-14T03:47:38Z
null
['CVE-2014-3607']
Improper Certificate Validation in vt-ldap
DefaultHostnameVerifier in Ldaptive (formerly vt-ldap) does not properly verify that the server hostname matches a domain name in the subject's Common Name (CN) field of the X.509 certificate, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'edu.vt.middleware:vt-ldap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'edu.internet2.middleware:shibboleth-identityprovider'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3607'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1140438'}, {'type': 'WEB', 'url': 'https://code.google.com/archive/p/vt-middleware/issues/226'}, {'type': 'WEB', 'url': 'https://code.google.com/archive/p/vt-middleware/iss...
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T22:01:42Z', 'nvd_published_at': '2018-01-08T19:29:00Z'}
1.4.0
GHSA-mmvj-j7hq-rx85
2023-08-01T20:20:53Z
2022-05-13T01:12:49Z
null
['CVE-2015-5340']
Moodle sensitive information disclosure
Moodle through 2.6.11, 2.7.x before 2.7.11, 2.8.x before 2.8.9, and 2.9.x before 2.9.3 does not consider the moodle/badges:viewbadges capability, which allows remote authenticated users to obtain sensitive badge information via a request involving (1) `badges/overview.php` or (2) `badges/view.php`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7'}, {'fixed': '2.7.11'}]}]},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5340'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/47d5c29202e299fdbe54229d3f6b0c381835eae3'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=323235'}, {'type': 'WEB', 'url': 'http://git.moodle.org/gw?p=mood...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-01T20:20:53Z', 'nvd_published_at': '2016-02-22T05:59:00Z'}
1.4.0
GHSA-mc8m-x6hf-cw2g
2023-01-27T00:51:55Z
2022-05-14T03:47:44Z
null
['CVE-2014-4997']
point-cli allows local users to obtain sensitive information by listing the process
`lib/commands/setup.rb` in the point-cli gem 0.0.1 for Ruby places credentials on the curl command line, which allows local users to obtain sensitive information by listing the process.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'point-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-4997'}, {'type': 'WEB', 'url': 'https://web.archive.org/web/20200229054941/http://www.securityfocus.com/bid/68735'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2014/07/07/16'}, {'type': 'WEB', 'url': 'http://www.openwall.com...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:51:55Z', 'nvd_published_at': '2018-01-10T18:29:00Z'}
1.4.0
GHSA-23q7-59jj-2pj4
2023-08-21T19:49:57Z
2022-05-24T17:17:37Z
null
['CVE-2020-12790']
SEOmatic for CraftCMS allows Server-Side Template Injection
In the SEOmatic plugin before 3.2.49 for Craft CMS, helpers/DynamicMeta.php does not properly sanitize the URL. This leads to Server-Side Template Injection and credentials disclosure via a crafted Twig template after a semicolon.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nystudio107/craft-seomatic'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.49'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12790'}, {'type': 'WEB', 'url': 'https://github.com/nystudio107/craft-seomatic/commit/82f4a25b28fd622393da6592dc9e5ccee7fc5be3'}, {'type': 'WEB', 'url': 'https://github.com/nystudio107/craft-seomatic/commit/82f4a25b28fd622393da6592dc9e5ccee7fc5be3#...
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T00:18:26Z', 'nvd_published_at': '2020-05-11T19:15:00Z'}
1.4.0
GHSA-7w89-qqxx-c62r
2022-11-01T23:36:00Z
2022-05-13T01:30:58Z
null
['CVE-2016-4988']
Cross-site Scripting in Jenkins Build Failure Analyzer plugin
Cross-site scripting (XSS) vulnerability in the Build Failure Analyzer plugin before 1.16.0 in Jenkins allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.sonyericsson.jenkins.plugins.bfa:build-failure-analyzer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-4988'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2016-06-20/'}, {'type': 'WEB', 'url': 'https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-06-20'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T23:36:00Z', 'nvd_published_at': '2017-02-09T15:59:00Z'}
1.4.0
GHSA-g4g7-q726-v5hg
2023-07-22T00:04:30Z
2022-05-14T01:14:35Z
null
['CVE-2018-11406']
Symfony CSRF Token Fixation
An issue was discovered in the Security component in Symfony 2.7.x before 2.7.48, 2.8.x before 2.8.41, 3.3.x before 3.3.17, 3.4.x before 3.4.11, and 4.0.x before 4.0.11. By default, a user's session is invalidated when the user is logged out. This behavior can be disabled through the invalidate_session option. In this ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7'}, {'fixed': '2.7.48'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/symfony'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8'}, {'fixed': '2.8.41'}]}]}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11406'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G4XNBMFW33H47O5TZGA7JYCVLDBCXAJV/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-annou...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-22T00:04:30Z', 'nvd_published_at': '2018-06-13T16:29:00Z'}
1.4.0
GHSA-v46q-xjp5-7p6r
2022-12-20T22:37:42Z
2022-05-24T17:27:07Z
null
['CVE-2020-2243']
Stored XSS vulnerability in Jenkins Cadence vManager Plugin
Jenkins Cadence vManager Plugin 3.0.4 and earlier does not escape build descriptions in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Run/Update permission. Cadence vManager Plugin 3.0.5 removes affected tooltips.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:vmanager-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2243'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/vmanager-plugin'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advisory/2020-09-01/#SECURITY-1936'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2020/09...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:37:42Z', 'nvd_published_at': '2020-09-01T14:15:00Z'}
1.4.0
GHSA-2gw6-73wc-x88f
2022-11-08T14:33:24Z
2022-05-17T02:50:39Z
null
['CVE-2017-5649']
Apache Geode information disclosure vulnerability
Apache Geode before 1.1.1, when a cluster has enabled security by setting the security-manager property, allows remote authenticated users with CLUSTER:READ but not DATA:READ permission to access the data browser page in Pulse and consequently execute an OQL query that exposes data stored in the cluster.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.1'}]}], 'versions': ['1.1.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-5649'}, {'type': 'WEB', 'url': 'http://mail-archives.apache.org/mod_mbox/geode-user/201704.mbox/%3cCAEwge-E4y=EVfhwpfRwsbnBH_hBS3Q-BJS+1BX5omYGW4dnR1w@mail.gmail.com%3e'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T14:33:24Z', 'nvd_published_at': '2017-04-04T18:59:00Z'}
1.4.0
GHSA-8cxp-cjm8-fj36
2022-06-28T15:22:16Z
2022-05-24T17:10:48Z
null
['CVE-2019-10807']
Improper Neutralization of Special Elements used in an OS Command in Blamer
Blamer versions prior to 1.0.1 allows execution of arbitrary commands. It is possible to inject arbitrary commands as part of the arguments provided to blamer.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'blamer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10807'}, {'type': 'WEB', 'url': 'https://github.com/kucherenko/blamer/commit/5fada8c9b6986ecd28942b724fa682e77ce1e11c'}, {'type': 'PACKAGE', 'url': 'https://github.com/kucherenko/blamer'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BLAMER...
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-28T15:22:16Z', 'nvd_published_at': '2020-03-11T22:23:00Z'}
1.4.0
GHSA-2fmv-j5xj-4fmq
2023-08-15T22:33:28Z
2022-05-13T01:12:51Z
null
['CVE-2014-0215']
Moodle Reveals Student Information Meant To Be Anonymous
The blind-marking implementation in Moodle through 2.3.11, 2.4.x before 2.4.10, 2.5.x before 2.5.6, and 2.6.x before 2.6.3 allows remote authenticated users to de-anonymize student identities by (1) using a screen reader or (2) reading the HTML source.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.2'}}, {'package': {'ecosystem': 'Packagist'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0215'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=260363'}, {'type': 'WEB', 'url': 'http://openwall.com/lists/oss-security/2014/05/19/1'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-15T22:33:28Z', 'nvd_published_at': '2014-05-27T00:55:00Z'}
1.4.0
GHSA-wc67-4cg3-35wf
2023-07-20T22:18:01Z
2022-05-13T01:18:39Z
null
['CVE-2018-0946']
ChakraCore RCE Vulnerability
A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge, aka "Scripting Engine Memory Corruption Vulnerability." This affects Microsoft Edge, ChakraCore. This CVE ID is unique from CVE-2018-0945, CVE-2018-0951, CVE-2018-0953, CVE-2018-0954, CVE-2018-...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.ChakraCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-0946'}, {'type': 'WEB', 'url': 'https://github.com/chakra-core/ChakraCore/commit/bee1e247bf6acbc8c862c7fc1d597ce9cab7446e'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2018-0946'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-20T22:18:01Z', 'nvd_published_at': '2018-05-09T19:29:00Z'}
1.4.0
GHSA-jfgp-q2hg-w285
2023-08-21T18:37:50Z
2022-05-24T17:18:11Z
null
['CVE-2020-13226']
WSO2 API Manager vulnerable to SSRF
WSO2 API Manager 3.0.0 does not properly restrict outbound network access from a Publisher node, opening up the possibility of SSRF to this node's entire intranet.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wso2.am:am-parent'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13226'}, {'type': 'WEB', 'url': 'https://github.com/wso2/docs-apim/issues/816'}, {'type': 'WEB', 'url': 'https://github.com/wso2/product-apim/issues/7677'}, {'type': 'WEB', 'url': 'https://docs.wso2.com/display/Security/Security+Advisories'}, {'typ...
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T00:30:32Z', 'nvd_published_at': '2020-05-20T12:15:00Z'}
1.4.0
GHSA-7592-93rm-6gpx
2022-06-30T17:34:41Z
2022-05-13T01:01:02Z
null
['CVE-2018-1000193']
Injection in Jenkins
A improper neutralization of control sequences vulnerability exists in Jenkins 2.120 and older, LTS 2.107.2 and older in HudsonPrivateSecurityRealm.java that allows users to sign up using user names containing control characters that can then appear to have the same name as other users, and cannot be deleted via the UI...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.107.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.107.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-co...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000193'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/jenkins/commit/de7aaab441151fb1760855fec83681c6a8756a45'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://jenkins.io/security/advis...
{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-30T17:34:41Z', 'nvd_published_at': '2018-06-05T21:29:00Z'}
1.4.0
GHSA-8xgx-75qw-6268
2022-06-08T22:33:10Z
2022-05-01T18:45:58Z
null
['CVE-2007-6741']
Improper privilege management in pyftpdlib
The ftp_PORT function in FTPServer.py in pyftpdlib before 0.2.0 does not prevent TCP connections to privileged ports if the destination IP address matches the source IP address of the connection from the FTP client, which might allow remote authenticated users to conduct FTP bounce attacks via crafted FTP data, as demo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pyftpdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2007-6741'}, {'type': 'WEB', 'url': 'https://github.com/giampaolo/pyftpdlib/issues/11'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8xgx-75qw-6268'}, {'type': 'PACKAGE', 'url': 'https://github.com/giampaolo/pyftpdlib'}, {'type': 'WE...
{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-08T22:33:10Z', 'nvd_published_at': '2010-10-19T20:00:00Z'}
1.4.0
GHSA-jfmq-4g4m-99rh
2022-11-08T23:03:33Z
2022-05-13T01:42:51Z
null
['CVE-2017-12973']
Nimbus JOSE+JWT vulnerable to padding oracle attack
Nimbus JOSE+JWT before 4.39 proceeds improperly after detection of an invalid HMAC in authenticated AES-CBC decryption, which allows attackers to conduct a padding oracle attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.nimbusds:nimbus-jose-jwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.39'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-12973'}, {'type': 'WEB', 'url': 'https://bitbucket.org/connect2id/nimbus-jose-jwt/commits/6a29f10f723f406eb25555f55842c59a43a38912'}, {'type': 'WEB', 'url': 'https://bitbucket.org/connect2id/nimbus-jose-jwt/issues/223/aescbc-return-immediately-on-i...
{'cwe_ids': ['CWE-354'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T23:03:33Z', 'nvd_published_at': '2017-08-20T16:29:00Z'}
1.4.0
GHSA-jq6x-99hj-q636
2022-11-21T20:39:49Z
2022-11-21T20:39:49Z
null
['CVE-2022-41884']
Seg fault in `ndarray_tensor_bridge` due to zero and large inputs
### Impact If a numpy array is created with a shape such that one element is zero and the others sum to a large number, an error will be raised. E.g. the following raises an error: ```python np.ones((0, 2**31, 2**31)) ``` An example of a proof of concept: ```python import numpy as np import tensorflow as tf input_val ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jq6x-99hj-q636'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41884'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/2b56169c16e375c521a3bc8ea658811cc0793784'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-670'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:39:49Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-jfmc-3975-fv5f
2022-11-22T00:11:04Z
2022-11-15T12:00:19Z
null
['CVE-2022-43694']
Concrete CMS vulnerable to Reflected Cross-site Scripting via image manipulation library
Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to Reflected XSS in the image manipulation library due to un-sanitized output.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.3'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43694'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/913-release-n...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:11:04Z', 'nvd_published_at': '2022-11-14T19:15:00Z'}
1.4.0
GHSA-g9cp-9fw3-56cf
2022-11-22T19:14:12Z
2022-11-22T15:30:26Z
null
['CVE-2022-42097']
Cross-site Scripting in Backdrop CMS
Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via 'Comment.'s
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'backdrop/backdrop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.23.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42097'}, {'type': 'WEB', 'url': 'https://github.com/backdrop/backdrop/releases/tag/1.23.0'}, {'type': 'WEB', 'url': 'https://github.com/bypazs/CVE-2022-42097'}, {'type': 'WEB', 'url': 'https://grimthereaperteam.medium.com/cve-2022-42097-backdrop-xs...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:14:12Z', 'nvd_published_at': '2022-11-22T13:15:00Z'}
1.4.0
GHSA-vv3r-fxqp-vr3f
2022-11-30T19:21:18Z
2022-11-21T23:58:07Z
null
['CVE-2022-38147']
XSS via uploaded gpx file
A malicious content author could upload a GPX file with a Javascript payload. The payload could then be executed by luring a legitimate user to view the file in a browser with support for GPX files. GPX is an XML-based format used to store GPS data. By default, Silverstripe CMS will no longer allow GPX files to be upl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/assets'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.11.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38147'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/assets/CVE-2022-38147.yaml'}, {'type': 'WEB', 'url': 'https://www.sil...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:58:07Z', 'nvd_published_at': '2022-11-23T03:15:00Z'}
1.4.0
GHSA-xgq8-jq9w-77r5
2022-11-22T00:17:23Z
2022-11-15T19:00:52Z
null
['CVE-2022-40309']
Apache Archiva subject to arbitrary directory deletion by users.
Apache Archiva prior to 2.2.9 allows an authenticated user to delete arbitrary directories. Users with write permissions to a repository can delete arbitrary directories.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.archiva:archiva-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40309'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/archiva'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/1odl4p85r96n27k577jk6ftrp19xfc27'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/11/15/3'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:17:23Z', 'nvd_published_at': '2022-11-15T13:15:00Z'}
1.4.0
GHSA-5jph-wrq7-v9hf
2022-11-26T20:18:04Z
2022-11-23T06:30:24Z
null
['CVE-2022-4044']
Denial of service in Mattermost
A denial-of-service vulnerability in Mattermost allows an authenticated user to crash the server via multiple large autoresponder messages.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4044'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1680241'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}]
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T22:17:54Z', 'nvd_published_at': '2022-11-23T06:15:00Z'}
1.4.0
GHSA-ff9j-pwxg-q5p2
2022-11-08T14:49:05Z
2022-11-04T12:00:25Z
null
['CVE-2022-42743']
deep-parse-json vulnerable to Prototype Pollution
deep-parse-json version 1.0.2 allows an external attacker to edit or add new properties to an object. This is possible because the application does not correctly validate the incoming JSON keys, thus allowing the `__proto__` property to be edited.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'deep-parse-json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42743'}, {'type': 'WEB', 'url': 'https://github.com/sibu-github/deep-parse-json/issues/6'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/buuren/'}, {'type': 'PACKAGE', 'url': 'https://github.com/sibu-github/deep-parse-json'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T14:49:05Z', 'nvd_published_at': '2022-11-03T20:15:00Z'}
1.4.0
GHSA-8w5g-3wcv-9g2j
2022-11-22T00:10:10Z
2022-11-22T00:10:10Z
null
['CVE-2022-41880']
Tensorflow vulnerable to Out-of-Bounds Read
### Impact When the [`BaseCandidateSamplerOp`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/candidate_sampler_ops.cc) function receives a value in `true_classes` larger than `range_max`, a heap oob vuln occurs. ```python tf.raw_ops.ThreadUnsafeUnigramCandidateSampler( true_classes=[...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.1'}]}]}, {'package':...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8w5g-3wcv-9g2j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41880'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/b389f5c944cadfdfe599b3f1e4026e036f30d2d4'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:10:10Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-6x99-gv2v-q76v
2022-11-21T20:41:45Z
2022-11-21T20:41:45Z
null
['CVE-2022-41888']
FPE in `tf.image.generate_bounding_box_proposals`
### Impact When running on GPU, [`tf.image.generate_bounding_box_proposals`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/image/generate_box_proposals_op.cu.cc) receives a `scores` input that must be of rank 4 but is not checked. ```python import tensorflow as tf a = tf.constant(value=[...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6x99-gv2v-q76v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41888'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/cf35502463a88ca7185a99daa7031df60b3c1c98'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:41:45Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-wc6r-4ggc-79w5
2022-11-28T21:06:08Z
2022-11-21T23:59:47Z
null
['CVE-2022-37429']
Stored XSS using HTMLEditor
A malicious content author could add a JavaScript payload to the href attribute of a link by splitting a javascript URL with white space characters. An attacker must have access to the CMS to exploit this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.11.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37429'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2022-37429.yaml'}, {'type': 'WEB', 'url': 'https://www....
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:59:47Z', 'nvd_published_at': '2022-11-23T02:15:00Z'}
1.4.0
GHSA-g8jw-8vpv-pv5q
2022-11-23T17:38:30Z
2022-11-21T21:30:14Z
null
['CVE-2022-42096']
Cross-site Scripting in Backdrop CMS
Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via Post content. The account must have admin privileges.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'backdrop/backdrop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.23.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42096'}, {'type': 'WEB', 'url': 'https://github.com/backdrop/backdrop/releases/tag/1.23.0'}, {'type': 'WEB', 'url': 'https://github.com/bypazs/CVE-2022-42096'}, {'type': 'WEB', 'url': 'https://grimthereaperteam.medium.com/cve-2022-42096-backdrop-xs...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:02:09Z', 'nvd_published_at': '2022-11-21T21:15:00Z'}
1.4.0
GHSA-vc47-6rqg-c7f5
2023-01-26T21:12:34Z
2022-11-19T00:30:55Z
null
['CVE-2021-33621']
HTTP response splitting in CGI
Ruby gem cgi.rb prior to versions 0.3.5, 0.2.2 and 0.1.0.2 allow HTTP header injection. If a CGI application using the CGI library inserts untrusted input into the HTTP response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. This issu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'cgi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.3.5'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'cgi'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'t...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33621'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1204695'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/cgi/CVE-2021-33621.yml'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-ann...
{'cwe_ids': ['CWE-436'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-24T01:59:37Z', 'nvd_published_at': '2022-11-18T23:15:00Z'}
1.4.0
GHSA-fhw8-8j55-vwgq
2023-08-18T20:44:39Z
2022-11-16T12:00:18Z
null
['CVE-2022-45047']
Unsafe deserialization in Apache MINA SSHD
Class org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider in Apache MINA SSHD <= 2.9.1 uses Java deserialization to load a serialized java.security.PrivateKey. The class is one of several implementations that an implementor using Apache MINA SSHD can choose for loading the host keys of an SSH server. Unt...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sshd:sshd-common'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.sshd:sshd-core'}, 'ecosystem_specific': {'affect...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45047'}, {'type': 'WEB', 'url': 'https://github.com/apache/mina-sshd/commit/03238d51586f6b3c0bdbb1a23cf16799344d6c32'}, {'type': 'WEB', 'url': 'https://github.com/apache/mina-sshd/commit/10de190e7d3f9189deb76b8d08c72334a1fe2df0'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:46:32Z', 'nvd_published_at': '2022-11-16T09:15:00Z'}
1.4.0
GHSA-83w4-x5w9-hf4h
2022-11-21T22:33:41Z
2022-11-17T21:30:49Z
null
['CVE-2022-43183']
XXL-JOB vulnerable to Server-Side Request Forgery (SSRF)
XXL-Job before v2.3.1 contains a Server-Side Request Forgery (SSRF) via the component /admin/controller/JobLogController.java.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-job-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43183'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-job/issues/3002'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-job'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-job/releases/tag/2.3.1'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:33:41Z', 'nvd_published_at': '2022-11-17T21:15:00Z'}
1.4.0
GHSA-x9wp-gfrr-p5rp
2022-11-21T22:23:19Z
2022-11-16T12:00:23Z
null
['CVE-2022-45389']
Missing Authorization in Jenkins XP-Dev Plugin
A missing permission check in Jenkins XP-Dev Plugin 1.0 and earlier allows unauthenticated attackers to trigger builds of jobs corresponding to an attacker-specified repository.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.cloudbees.jenkins.plugins:xpdev'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45389'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xpdev-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2853'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:23:19Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-p5v9-g8w8-5q4v
2022-11-21T22:35:39Z
2022-11-21T22:35:39Z
null
['CVE-2022-41930']
Missing Authorization to enable or disable users in org.xwiki.platform:xwiki-platform-user-profile-ui
### Impact Any user (logged in or not) with access to the page XWiki.XWikiUserProfileSheet can enable or disable any user profile. This might allow to a disabled user to re-enable themselves, or to an attacker to disable any user of the wiki. ### Patches The problem has been patched in XWiki 13.10.7, 14.5RC1 and 14...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-user-profile-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.4'}, {'fixed': '13.10.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-user-profile-ui'}, 'ranges': [{'type': 'ECOSYSTEM'...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p5v9-g8w8-5q4v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41930'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/5be1cc0adf917bf10899c47723fa451e950271fa'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:35:39Z', 'nvd_published_at': '2022-11-23T19:15:00Z'}
1.4.0
GHSA-rp7f-fhm8-9hpf
2022-11-28T15:51:19Z
2022-11-22T15:30:26Z
null
['CVE-2022-33012']
Account Takeover Through Password Reset Poisoning
Microweber 1.2.15 was discovered to allow attackers to perform an account takeover via a host header injection attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33012'}, {'type': 'WEB', 'url': 'https://blog.jitendrapatro.me/cve-2022-33012-account-takeover-through-password-reset-poisoning/'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://github.com/s...
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:16:32Z', 'nvd_published_at': '2022-11-22T14:15:00Z'}
1.4.0
GHSA-wcjj-qm5v-j4pc
2022-12-15T16:57:17Z
2022-11-16T12:00:23Z
null
['CVE-2022-45384']
Jenkins Reverse Proxy Auth Plugin vulnerable due to plaintext storage of passwords
Jenkins Reverse Proxy Auth Plugin versions 1.7.3 and earlier stores the LDAP manager password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by attackers with access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:reverse-proxy-auth-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.3'}, {'fixed': '1.7.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45384'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/reverse-proxy-auth-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2094'}]
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:22:01Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-rmf2-pwfq-h75j
2022-11-29T17:55:59Z
2022-11-22T12:30:22Z
null
['CVE-2022-40189']
OS Command Injection in Apache Airflow
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Apache Airflow Pig Provider, Apache Airflow allows an attacker to control commands executed in the task execution context, without write access to DAG files. This issue affects Pig Provider versions prior to 4.0....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40189'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/27644'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/yxnfzfw2w9pj5s785k3rlyly4y44sd15'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:17:21Z', 'nvd_published_at': '2022-11-22T10:15:00Z'}
1.4.0
GHSA-24hp-84jp-8wgm
2022-12-15T21:15:05Z
2022-11-16T12:00:23Z
null
['CVE-2022-45398']
Cross-Site Request Forgery in Jenkins Cluster Statistics Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Cluster Statistics Plugin 0.4.6 and earlier allows attackers to delete recorded Jenkins Cluster Statistics.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.zeroturnaround:cluster-stats'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45398'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cluster-stats-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2938'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:25:59Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-gmpq-xrxj-xh8m
2023-02-07T04:09:29Z
2022-11-11T00:05:15Z
null
['CVE-2022-41892']
Arches vulnerable to execution of arbitrary SQL
### Impact With a carefully crafted web request, it's possible to execute certain unwanted sql statements against the database. Anyone running the impacted versions (<=6.1.1, 6.2.0, >=7.0.0, <=7.1.1) should upgrade as soon as possible. ### Patches The problem has been patched in the following versions: [6.1.2](https...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'arches'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.1.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.1.1'}}, {'package': {'ecosystem': 'PyPI', 'name': 'arches'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introd...
[{'type': 'WEB', 'url': 'https://github.com/archesproject/arches/security/advisories/GHSA-gmpq-xrxj-xh8m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41892'}, {'type': 'WEB', 'url': 'https://github.com/archesproject/arches/commit/7ed53e23a616edf3301d95814d9d64de5e3072a9'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-11T00:05:15Z', 'nvd_published_at': '2022-11-11T04:15:00Z'}
1.4.0
GHSA-q56r-mw39-944g
2022-11-22T00:12:39Z
2022-11-15T12:00:16Z
null
['CVE-2022-43690']
Concrete CMS vulnerable to Improper Authentication
Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 did not use strict comparison for the legacy_salt so that limited authentication bypass could occur if using this functionality. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.3'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43690'}, {'type': 'WEB', 'url': 'https://github.com/concretecms/concretecms/commit/a4dc73a4a47823373d4b4824534bb9b7d251f72c'}, {'type': 'WEB', 'url': 'https://github.com/concretecms/concretecms/commit/d5dd12c40efed326b26862391b7e1e6f414cdd55'}, {'t...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:12:39Z', 'nvd_published_at': '2022-11-14T23:15:00Z'}
1.4.0
GHSA-p88w-fhxw-xvcc
2022-11-28T15:50:31Z
2022-11-21T23:25:00Z
null
['CVE-2022-41936']
Exposure of Private Personal Information to an Unauthorized Actor in org.xwiki.platform:xwiki-platform-rest-server
### Impact The `modifications` rest endpoint does not filter out entries according to the user's rights. Therefore, information hidden from unauthorized users are exposed though the `modifications` rest endpoint (e.g., comments, page names...). ### Patches Users should upgrade to XWiki 14.6+, 14.4.3+, or13.10.8+. Ol...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rest-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.1'}, {'fixed': '13.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-rest-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p88w-fhxw-xvcc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41936'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/38dc1aa1a4435f24d58f5b8e4566cbcb0971f8ff'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-359'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:25:00Z', 'nvd_published_at': '2022-11-22T01:15:00Z'}
1.4.0
GHSA-562r-vg33-8x8h
2022-12-12T20:28:04Z
2022-11-23T22:17:25Z
null
['CVE-2022-41946']
TemporaryFolder on unix-like systems does not limit access to created files
**Vulnerability** `PreparedStatement.setText(int, InputStream)` and `PreparedStatemet.setBytea(int, InputStream)` will create a temporary file if the InputStream is larger than 51k Example of vulnerable code: ```java String s = "some very large string greater than 51200 bytes"; PreparedStatement.setInputStream(...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '42.2.0'}, {'fixed': '42.2.27'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '42.3.0'}, {'fixed...
[{'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-562r-vg33-8x8h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41946'}, {'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/commit/9008dc9aade6dbfe4efafcd6872ebc55f4699cf5'}, {'type': 'PACKAGE', 'url': 'htt...
{'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T22:17:25Z', 'nvd_published_at': '2022-11-23T20:15:00Z'}
1.4.0
GHSA-25mx-2mxm-6343
2022-11-03T18:14:05Z
2022-11-03T18:14:05Z
null
['CVE-2022-39382']
@keystone-6/core's NODE_ENV defaults to development with esbuild
### Impact `@keystone-6/core@3.0.0 || 3.0.1` users that use `NODE_ENV` in their own code (**not dependencies**) to trigger security-sensitive functionality in a production build are vulnerable to `NODE_ENV` being inlined to `"development"` for user code. If your dependencies use `NODE_ENV` to trigger particular behavi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@keystone-6/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/security/advisories/GHSA-25mx-2mxm-6343'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39382'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/keystone/pull/8031/'}, {'type': 'WEB', 'url': 'https://github.com/keystonejs/ke...
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T18:14:05Z', 'nvd_published_at': '2022-11-03T14:15:00Z'}
1.4.0
GHSA-xxcj-rhqg-m46g
2022-11-21T20:42:00Z
2022-11-21T20:42:00Z
null
['CVE-2022-41889']
Segfault via invalid attributes in `pywrap_tfe_src.cc`
### Impact If a list of quantized tensors is assigned to an attribute, the pywrap code fails to parse the tensor and returns a `nullptr`, which is not caught. An example can be seen in [`tf.compat.v1.extract_volume_patches`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/image/generate_box...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xxcj-rhqg-m46g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41889'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e9e95553e5411834d215e6770c81a83a3d0866ce'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:42:00Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-h95w-p3x6-wwj6
2022-11-06T02:47:48Z
2022-11-04T19:01:16Z
null
['CVE-2022-3721']
Froxlor vulnerable to Code Injection
Froxlor prior to version 0.10.39 is vulnerable to Code Injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.39'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3721'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/1182453c18a83309a3470b2775c148ede740806c'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a3c506f0-5f8a...
{'cwe_ids': ['CWE-79', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T20:54:01Z', 'nvd_published_at': '2022-11-04T13:15:00Z'}
1.4.0
GHSA-3fgr-xjr6-xqm8
2022-11-28T22:07:33Z
2022-11-28T22:07:33Z
null
[]
code injection in phpxmlrpc/phpxmlrpc
code injection in `Wrapper::buildClientWrapperCode` via manipulation of the `$client` argument. It was possible to force the client to access local files or connect to undesired urls instead of the intended target server's url.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpxmlrpc/phpxmlrpc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gggeek/phpxmlrpc/issues/80'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/phpxmlrpc/phpxmlrpc/2022-11-28-2.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/gggeek/phpxmlrpc'}, {'type': 'WEB', 'url': 'https://github.com/gggeek/...
{'cwe_ids': ['CWE-95'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-28T22:07:33Z', 'nvd_published_at': None}
1.4.0
GHSA-gr58-76rp-mmg4
2022-11-30T19:32:53Z
2022-11-24T18:30:26Z
null
['CVE-2022-2650']
wger vulnerable to brute force attempts
Improper Restriction of Excessive Authentication Attempts in GitHub repository wger-project/wger prior to 2.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'wger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2650'}, {'type': 'WEB', 'url': 'https://github.com/wger-project/wger/commit/5e3167e3a2dc95836fa2607fe201524c031a2c4c'}, {'type': 'PACKAGE', 'url': 'https://github.com/wger-project/wger'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f0d85efa-...
{'cwe_ids': ['CWE-307'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T23:53:06Z', 'nvd_published_at': '2022-11-24T17:15:00Z'}
1.4.0
GHSA-6c6p-h79f-g6p4
2022-11-09T22:07:01Z
2022-11-09T22:07:01Z
null
['CVE-2022-39388']
Istio may allow identity impersonation if user has localhost access
### Impact User can impersonate any workload identity within the service mesh if they have localhost access to the Istiod control plane. ### Patches 1.15.3 ### Workarounds No. If using 1.15.2 please upgrade to 1.15.3 or later. ### References None at this time. ### For more information If you have any questions or ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/istio/istio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0-beta.0'}, {'fixed': '1.15.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/istio/istio/security/advisories/GHSA-6c6p-h79f-g6p4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39388'}, {'type': 'WEB', 'url': 'https://github.com/istio/istio/commit/346260e5115e9fbc65ba8a559bc686e6ca046a32'}, {'type': 'WEB', 'url': 'https://git...
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-09T22:07:01Z', 'nvd_published_at': '2022-11-10T20:15:00Z'}
1.4.0
GHSA-rr8h-f97q-8p9c
2022-11-22T17:50:13Z
2022-11-22T00:00:07Z
null
['CVE-2022-38148']
Blind SQL Injection via GridFieldSortableHeader
Gridfield state is vulnerable to SQL injections. The vast majority of Gridfields in Silverstripe CMS are affected by this vulnerability. An attacker with CMS access could execute an arbitrary SQL statement by adding an SQL payload in some parts of the GridField state.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.11.0'}, {'fixe...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38148'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2022-38148.yaml'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2022-38148'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:00:07Z', 'nvd_published_at': '2022-11-21T16:15:00Z'}
1.4.0
GHSA-3xg8-cc8f-9wv2
2022-11-26T20:22:00Z
2022-11-19T21:30:26Z
null
['CVE-2022-4064']
Unsanitized input leading to code injection in Dalli
A vulnerability was found in Dalli. Affected is the function self.meta_set of the file lib/dalli/protocol/meta/request_formatter.rb of the component Meta Protocol Handler. The manipulation leads to injection. The exploit has been disclosed to the public and may be used. The name of the patch is 48d594dae55934476fec6178...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'dalli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4064'}, {'type': 'WEB', 'url': 'https://github.com/petergoldstein/dalli/issues/932'}, {'type': 'WEB', 'url': 'https://github.com/petergoldstein/dalli/pull/933'}, {'type': 'WEB', 'url': 'https://github.com/petergoldstein/dalli/commit/48d594dae559344...
{'cwe_ids': ['CWE-74'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:54:20Z', 'nvd_published_at': '2022-11-19T19:15:00Z'}
1.4.0
GHSA-43xg-8wmj-cw8h
2023-08-31T00:26:53Z
2022-11-01T19:00:29Z
null
['CVE-2022-31777']
Apache Spark vulnerable to Log Injection
A stored cross-site scripting (XSS) vulnerability in Apache Spark 3.2.1 and earlier, and 3.3.0, allows remote attackers to execute arbitrary JavaScript in the web browser of a user, by including a malicious payload into the logs which would be returned in logs rendered in the UI.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-core'}, 'ecosystem_specific': {'affe...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31777'}, {'type': 'WEB', 'url': 'https://github.com/apache/spark/commit/ad90195de56688ce0898691eb9d04297ab0871ad'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/spark'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tre...
{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T21:03:46Z', 'nvd_published_at': '2022-11-01T16:15:00Z'}
1.4.0
GHSA-w58w-79xv-6vcj
2022-11-21T20:39:20Z
2022-11-21T20:39:20Z
null
['CVE-2022-41883']
Out of bounds segmentation fault due to unequal op inputs in Tensorflow
### Impact [`tf.raw_ops.DynamicStitch`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/dynamic_stitch_op.cc) specifies input sizes when it is [registered](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/ops/data_flow_ops.cc). ```cpp REGISTER_OP("DynamicStitch") ....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.1'}]}], 'versions': ['2.10.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w58w-79xv-6vcj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41883'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f5381e0e10b5a61344109c1b7c174c68110f7629'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:39:20Z', 'nvd_published_at': '2022-11-18T21:15:00Z'}
1.4.0
GHSA-xvwp-h6jv-7472
2022-11-21T22:03:45Z
2022-11-21T22:03:45Z
null
['CVE-2022-41900']
FractionalMaxPool and FractionalAVGPool heap out-of-bounds acess
### Impact An input `pooling_ratio` that is smaller than 1 will trigger a heap OOB in [`tf.raw_ops.FractionalMaxPool`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/fractional_max_pool_op.cc) and [`tf.raw_ops.FractionalAvgPool`](https://github.com/tensorflow/tensorflow/blob/master/tensorf...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xvwp-h6jv-7472'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41900'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/216525144ee7c910296f5b05d214ca1327c9ce48'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:03:45Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-4p38-rc98-cr39
2022-12-02T22:20:32Z
2022-11-30T15:30:27Z
null
['CVE-2022-44136']
Zenario CMS is vulnerable to Remote Code Execution (RCE).
Zenario CMS 9.3.57186 is vulnerable to RCE.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.57473'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44136'}, {'type': 'WEB', 'url': 'https://github.com/TribalSystems/Zenario/commit/4f95a557af3c0b82e448a6ff8f4c167525972e4a'}, {'type': 'WEB', 'url': 'https://com0t.github.io/zenar.io/2022/10/18/Unauthent-RCE-Zenar.io~9.3.html'}, {'type': 'PACKAGE', ...
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:20:32Z', 'nvd_published_at': '2022-11-30T15:15:00Z'}
1.4.0
GHSA-96vh-4rfp-c42c
2022-12-02T22:21:13Z
2022-11-29T18:30:18Z
null
['CVE-2022-21126']
HTSJDK is vulnerable to exposure of resource(s) to the wrong sphere
The package com.github.samtools:htsjdk before 3.0.1 are vulnerable to Creation of Temporary File in Directory with Insecure Permissions due to the createTempDir() function in util/IOUtil.java not checking for the existence of the temporary directory before attempting to create it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.github.samtools:htsjdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21126'}, {'type': 'WEB', 'url': 'https://github.com/samtools/htsjdk/pull/1617'}, {'type': 'WEB', 'url': 'https://github.com/samtools/htsjdk/commit/4a4024a97ee3e87096df6ad9b22c8260bd527772'}, {'type': 'PACKAGE', 'url': 'https://github.com/samtools/h...
{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:21:13Z', 'nvd_published_at': '2022-11-29T17:15:00Z'}
1.4.0
GHSA-9pqq-h9qv-28fp
2022-12-15T21:06:25Z
2022-11-16T12:00:23Z
null
['CVE-2022-45388']
Jenkins Config Rotator Plugin vulnerable to path traversal
Jenkins Config Rotator Plugin 2.0.1 and earlier does not restrict a file name query parameter in an HTTP endpoint, allowing unauthenticated attackers to read arbitrary files with '.xml' extension on the Jenkins controller file system. Currently there is no known workaround and no fix available.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:config-rotator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45388'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/config-rotator-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2842'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:23:04Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}