schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-hffx-r282-w2g9 | 2022-11-21T23:50:32Z | 2022-11-15T12:00:16Z | null | ['CVE-2022-42123'] | Path Traversal in Liferay Portal | A Zip slip vulnerability in the Elasticsearch Connector in Liferay Portal 7.3.3 through 7.4.3.18, and Liferay DXP 7.3 before update 6, and 7.4 before update 19 allows attackers to create or overwrite existing files on the filesystem via the installation of a malicious Elasticsearch Sidecar plugin. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.3.3'}, {'fixed': '7.4.3.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42123'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17518'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42123'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:50:32Z', 'nvd_published_at': '2022-11-15T01:15:00Z'} |
1.4.0 | GHSA-xx6g-jj35-pxjv | 2022-11-16T00:02:05Z | 2022-11-16T00:02:05Z | null | ['CVE-2022-41905'] | Cross Site Scripting vulnerability in wsgidav when directory browsing is enabled | ### Impact
Implementations using this library with directory browsing enabled may be susceptible to [Cross Site Scripting (XSS)](https://owasp.org/www-community/attacks/xss/) attacks.
### Patches
Users can upgrade to v4.1.0
### Workarounds
Set `dir_browser.enable = False` in the configuration. For instance, when usin... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'wsgidav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0a1'}, {'fixed': '4.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mar10/wsgidav/security/advisories/GHSA-xx6g-jj35-pxjv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41905'}, {'type': 'WEB', 'url': 'https://github.com/mar10/wsgidav/commit/e9606ab0f42f4c1a6611bc3c52de299b0aba7726'}, {'type': 'PACKAGE', 'url': 'htt... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-16T00:02:05Z', 'nvd_published_at': '2022-11-11T21:15:00Z'} |
1.4.0 | GHSA-32vj-v39g-jh23 | 2022-11-02T21:50:11Z | 2022-11-01T12:00:37Z | null | ['CVE-2022-31690'] | spring-security-oauth2-client vulnerable to Privilege Escalation | Spring Security, versions 5.7 prior to 5.7.5, and 5.6 prior to 5.6.9, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can modify a request initiated by the Client (via the browser) to the Authorization Server which can lead to a privil... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-oauth2-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.7.0'}, {'fixed': '5.7.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-oauth2-client'}, 'ranges': [{'t... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31690'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-security-samples/blob/4638e1e428ee2ddab234199eb3b67b9c94dfa08b/servlet/spring-boot/java/oauth2/webclient/src/main/java/example/SecurityConfiguration.java#L48'}, {'type': 'WE... | {'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T17:27:45Z', 'nvd_published_at': '2022-10-31T20:15:00Z'} |
1.4.0 | GHSA-g9fm-r5mm-rf9f | 2022-11-21T22:03:54Z | 2022-11-21T22:03:54Z | null | ['CVE-2022-41901'] | `CHECK_EQ` fail via input in `SparseMatrixNNZ` | ### Impact
An input `sparse_matrix` that is not a matrix with a shape with rank 0 will trigger a `CHECK` fail in [`tf.raw_ops.SparseMatrixNNZ`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/sparse/sparse_matrix.h).
```python
import tensorflow as tf
tf.raw_ops.SparseMatrixNNZ(sparse_matri... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g9fm-r5mm-rf9f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41901'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f856d02e5322821aad155dad9b3acab1e9f5d693'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20', 'CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:03:54Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-r4gq-hv2r-mrf5 | 2022-11-21T23:57:23Z | 2022-11-20T06:30:16Z | null | ['CVE-2022-3516'] | Cross-site Scripting in librenms/librenms | Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.10.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3516'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/8e85698aa3aa4884c2f3d6c987542477eb64f07c'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/734bb5eb-715c-4b64-bd33-280300a63748'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:57:23Z', 'nvd_published_at': '2022-11-20T05:15:00Z'} |
1.4.0 | GHSA-p2jh-44qj-pf2v | 2022-11-10T12:38:57Z | 2022-11-10T12:38:57Z | null | ['CVE-2022-36077'] | Exfiltration of hashed SMB credentials on Windows via file:// redirect | ### Impact
When following a redirect, Electron delays a check for redirecting to file:// URLs from other schemes. The contents of the file is not available to the renderer following the redirect, but if the redirect target is a SMB URL such as `file://some.website.com/`, then in some cases, Windows will connect to that... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.3.7'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0-beta.1'}, {'fixed': '20.0.1'}]}]}, {'package': {'ecosy... | [{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-p2jh-44qj-pf2v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36077'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}] | {'cwe_ids': ['CWE-200', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T12:38:57Z', 'nvd_published_at': '2022-11-08T07:15:00Z'} |
1.4.0 | GHSA-4r6j-fwcx-94cf | 2022-11-10T20:09:27Z | 2022-11-10T12:01:17Z | null | ['CVE-2022-42965'] | snowflake-connector-python is vulnerable to Regular Expression Denial of Service (ReDoS) | An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the snowflake-connector-python PyPI package, when an attacker is able to supply arbitrary input to the get_file_transfer_type method. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'snowflake-connector-python'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42965'}, {'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-connector-python/pull/1327'}, {'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-connector-python/commit/b9d2fc789fae4db865dde3d2a1bd72c8a9eab091'}, {'type': 'P... | {'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T18:57:53Z', 'nvd_published_at': '2022-11-09T20:15:00Z'} |
1.4.0 | GHSA-f3gj-hvv4-f57v | 2022-12-15T16:36:21Z | 2022-11-16T12:00:23Z | null | ['CVE-2022-45395'] | XML External Entity Reference in Jenkins CCCC Plugin | Jenkins CCCC Plugin 0.6 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.thalesgroup.jenkins-ci.plugins:cccc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45395'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cccc-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2921'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:24:05Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-crh6-fp67-6883 | 2022-11-04T20:44:46Z | 2022-11-01T17:29:11Z | null | ['CVE-2022-39353'] | xmldom allows multiple root nodes in a DOM | ### Impact
xmldom parses XML that is not well-formed because it contains multiple top level elements, and adds all root nodes to the `childNodes` collection of the `Document`, without reporting any error or throwing.
This breaks the assumption that there is only a single root node in the tree, which led to https://nvd.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'xmldom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@xmldom/xmldom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.7'}]}]}, {'package': {'ecosyst... | [{'type': 'WEB', 'url': 'https://github.com/xmldom/xmldom/security/advisories/GHSA-crh6-fp67-6883'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39353'}, {'type': 'WEB', 'url': 'https://github.com/jindw/xmldom/issues/150'}, {'type': 'WEB', 'url': 'https://github.com/xmldom/xmldom/commit/52a70... | {'cwe_ids': ['CWE-1288', 'CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T17:29:11Z', 'nvd_published_at': '2022-11-02T17:15:00Z'} |
1.4.0 | GHSA-gjg7-qfvp-9hm4 | 2022-11-23T17:26:23Z | 2022-11-21T06:30:29Z | null | ['CVE-2022-4093'] | SQL injection in Dolibarr | SQL injection attacks can result in unauthorized access to sensitive data, such as passwords, credit card details, or personal user information. Many high-profile data breaches in recent years have been the result of SQL injection attacks, leading to reputational damage and regulatory fines. In some cases, an attacker ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.1'}, {'fixed': '16.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4093'}, {'type': 'WEB', 'url': 'https://github.com/dolibarr/dolibarr/commit/7c1eac9774bd1fed0b7b4594159f2ac2d12a4011'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/677ca8ee-ffbc-4b39-b294-2ce81bd56788'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:57:34Z', 'nvd_published_at': '2022-11-21T05:15:00Z'} |
1.4.0 | GHSA-hgp8-w8fj-r4cm | 2023-07-11T13:52:18Z | 2022-11-22T03:30:56Z | null | ['CVE-2022-4111'] | ToolJet is vulnerable to Denial of Service (DoS) | ToolJet/ToolJet placed no limit on the file size for user avatars. This could cause a denial of service if too many users upload large files. This is fixed in commit 01cd3f0464747973ec329e9fb1ea12743d3235cc in version 1.27.0.
`tooljet` is no longer listed on npmjs.com but was [listed on npmjs.com in the past](https://... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'tooljet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.27.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4111'}, {'type': 'WEB', 'url': 'https://github.com/ToolJet/ToolJet/pull/4103'}, {'type': 'WEB', 'url': 'https://github.com/tooljet/tooljet/commit/01cd3f0464747973ec329e9fb1ea12743d3235cc'}, {'type': 'PACKAGE', 'url': 'https://github.com/ToolJet/Too... | {'cwe_ids': ['CWE-1284', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:38:23Z', 'nvd_published_at': '2022-11-22T03:15:00Z'} |
1.4.0 | GHSA-w8fp-3gwq-gxpw | 2022-11-18T06:15:37Z | 2022-11-14T19:00:19Z | null | ['CVE-2022-43693'] | Concrete CMS vulnerable to Cross-site Request Forgery | Concrete CMS is vulnerable to CSRF due to the lack of "State" parameter for external Concrete authentication service for users of Concrete who use the "out of the box" core OAuth. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0RC1'}, {'fixed': '9.1.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43693'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/913-release-n... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-16T21:14:09Z', 'nvd_published_at': '2022-11-14T17:15:00Z'} |
1.4.0 | GHSA-wgqm-qp44-cg6x | 2022-11-21T23:46:02Z | 2022-11-15T12:00:16Z | null | ['CVE-2022-42128'] | Incorrect Default Permissions in Liferay Portal | The Hypermedia REST APIs module in Liferay Portal 7.4.1 through 7.4.3.4, and Liferay DXP 7.4 GA does not properly check permissions, which allows remote attackers to obtain a WikiNode object via the WikiNodeResource.getSiteWikiNodeByExternalReferenceCode API. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.1'}, {'fixed': '7.4.3.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.4.3.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42128'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17595'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42128'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:46:02Z', 'nvd_published_at': '2022-11-15T01:15:00Z'} |
1.4.0 | GHSA-9mf2-hpj4-rw3r | 2022-11-02T18:17:35Z | 2022-11-01T19:00:30Z | null | ['CVE-2022-3788'] | TablePress Plugin vulnerable to Cross-site Scripting | A cross-site scripting vulnerability was found in an unknown function of the component Table Import Handler. The manipulation of the argument Import data leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'tobiasbg/tablepress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0-RC1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3788'}, {'type': 'WEB', 'url': 'https://drive.google.com/file/d/10tk6wEh1hdkb2vVoqJqZJZsOtfxpniyY/view'}, {'type': 'WEB', 'url': 'https://drive.google.com/file/d/1iRUtJYUZB0Ho-2Aqyw7TCtFN9L96UDfs/view'}, {'type': 'PACKAGE', 'url': 'https://github.c... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T18:17:35Z', 'nvd_published_at': '2022-11-01T14:15:00Z'} |
1.4.0 | GHSA-7fxm-c848-89q8 | 2022-12-27T18:10:37Z | 2022-11-29T18:30:18Z | null | ['CVE-2022-25848'] | static-dev-server vulnerable to path traversal | A path traversal vulnerability affects all versions of package static-dev-server. This is because when paths from users to the root directory are joined, the assets for the path accessed are relative to that of the root directory. There is currently no known workaround or fix for this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'static-dev-server'}, 'versions': ['1.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25848'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/5550bcd0bdf92c1b56fbb20e141fe5bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/etoah/static-dev-server'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-STATICDEVS... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:21:45Z', 'nvd_published_at': '2022-11-29T17:15:00Z'} |
1.4.0 | GHSA-rcrx-fpjp-mfrw | 2022-11-02T18:10:47Z | 2022-11-02T18:10:47Z | null | ['CVE-2022-39381'] | Unchecked Return Value to NULL Pointer Dereference in PDFDocumentHandler.cpp | ### Impact
The package muhammara before 2.6.0; all versions of package hummus are vulnerable to Denial of Service (DoS) when supplied with a maliciously crafted PDF file to be appended to another.
### Patches
It has been patched in 2.6.0 for muhammara and not at all for hummus
### Workarounds
Do not process files fro... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'muhammara'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'hummus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.111'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/julianhille/MuhammaraJS/security/advisories/GHSA-rcrx-fpjp-mfrw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39381'}, {'type': 'WEB', 'url': 'https://github.com/galkahana/HummusJS/issues/293'}, {'type': 'WEB', 'url': 'https://github.com/julianhill... | {'cwe_ids': ['CWE-476', 'CWE-690'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T18:10:47Z', 'nvd_published_at': '2022-11-02T15:15:00Z'} |
1.4.0 | GHSA-8h83-chh2-fchp | 2022-11-10T23:58:32Z | 2022-11-10T23:58:32Z | null | [] | eZ Platform users with the Company admin role can assign any role to any user | Critical severity. Users with the Company admin role (introduced by the company account feature in v4) can assign any role to any user. This also applies to any other user that has the role / assign policy. Any subtree limitation in place does not have any effect.
The role / assign policy is typically only given to ad... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.26'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-kernel/security/advisories/GHSA-8h83-chh2-fchp'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-kernel/commit/2a7479958584a15ee046dfa886d6bfeb4ebfa2f6'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-20... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T23:58:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hf94-8mx5-2vvj | 2022-11-23T18:47:27Z | 2022-11-21T21:30:15Z | null | ['CVE-2022-4105'] | Cross-site Scripting in kiwitcms | A stored XSS in a kiwi Test Plan can run malicious javascript which could be chained with an HTML injection to perform a UI redressing attack (clickjacking) and an HTML injection which disables the use of the history page. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'kiwitcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4105'}, {'type': 'WEB', 'url': 'https://github.com/kiwitcms/kiwi/commit/a2b169ffdef1d7c1755bade8138578423b35011b'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/386417e9-0cd5-4d80-8137-b0fd5c30b8f8'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:02:21Z', 'nvd_published_at': '2022-11-21T20:15:00Z'} |
1.4.0 | GHSA-58rj-w2qf-qjg7 | 2022-11-30T19:23:50Z | 2022-11-23T03:30:22Z | null | ['CVE-2022-42095'] | Cross-site Scripting in Backdrop CMS | Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Page content. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'backdrop/backdrop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.23.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42095'}, {'type': 'WEB', 'url': 'https://backdropcms.org'}, {'type': 'WEB', 'url': 'https://github.com/backdrop/backdrop/releases/tag/1.23.0'}, {'type': 'WEB', 'url': 'https://github.com/bypazs/CVE-2022-42095'}, {'type': 'WEB', 'url': 'https://gith... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T22:17:36Z', 'nvd_published_at': '2022-11-23T02:15:00Z'} |
1.4.0 | GHSA-672p-m5jq-mrh8 | 2022-11-28T16:03:40Z | 2022-11-21T20:38:39Z | null | ['CVE-2022-36111'] | Insufficient Verification of Proofs generated by the immudb server in client SDK. | ### Impact
In certain scenario a malicious immudb server can provide a falsified proof that will be accepted by the client SDK signing a falsified transaction replacing the genuine one. This situation can not be triggered by a genuine immudb server and requires the client to perform a specific list of verified operati... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/codenotary/immudb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/codenotary/immudb/security/advisories/GHSA-672p-m5jq-mrh8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36111'}, {'type': 'WEB', 'url': 'https://github.com/codenotary/immudb/commit/7267d67e28be8f0257b71d734611a051593e8a81'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:38:39Z', 'nvd_published_at': '2022-11-23T18:15:00Z'} |
1.4.0 | GHSA-fppq-mj76-fpj2 | 2022-11-02T18:15:35Z | 2022-11-02T18:15:35Z | null | ['CVE-2022-39379'] | fluentd vulnerable to remote code execution due to insecure deserialization (in non-default configuration) | ### Impact
A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads.
Fluentd setups are only affected if the environment variable `FLUENT_OJ_OPTION_MODE` is explicitly set to `object`.
Please no... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'fluentd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.2'}, {'fixed': '1.15.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/fluent/fluentd/security/advisories/GHSA-fppq-mj76-fpj2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39379'}, {'type': 'WEB', 'url': 'https://github.com/fluent/fluentd/commit/48e5b85dab1b6d4c273090d538fc11b3f2fd8135'}, {'type': 'PACKAGE', 'url': 'h... | {'cwe_ids': ['CWE-502'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T18:15:35Z', 'nvd_published_at': '2022-11-02T13:15:00Z'} |
1.4.0 | GHSA-q4mp-jvh2-76fj | 2022-11-16T21:52:35Z | 2022-11-14T12:00:15Z | null | ['CVE-2022-45199'] | Pillow subject to DoS via SAMPLESPERPIXEL tag | Pillow starting with 9.2.0 and prior to 9.3.0 allows denial of service via SAMPLESPERPIXEL. A large value in the SAMPLESPERPIXEL tag could lead to a memory and runtime DOS in TiffImagePlugin.py when setting up the context for image decoding. This issue has been patched in version 9.3.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pillow'}, 'ecosystem_specific': {'affected_functions': ['PIL.TiffImagePlugin.MAX_SAMPLESPERPIXEL', 'PIL.TiffImagePlugin.TiffImageFile._setup']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.2.0'}, {'fixed': '9.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45199'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/6700'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/2444cddab2f83f28687c7c20871574acbb6dbcf3'}, {'type': 'WEB', 'url': 'https://bugs.gentoo.org... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-15T13:24:05Z', 'nvd_published_at': '2022-11-14T07:15:00Z'} |
1.4.0 | GHSA-g5cj-5h58-j93w | 2022-11-29T23:52:36Z | 2022-11-25T18:30:25Z | null | ['CVE-2022-45206'] | Jeecg-boot vulnerable to SQL Injection | Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/duplicate/check. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45206'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/4129'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/commit/f18ced524c9ec13e876bfb74785a1b112cc8b6bb'}, {'type': 'PACKAGE', 'url': 'https://github.co... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T23:52:36Z', 'nvd_published_at': '2022-11-25T17:15:00Z'} |
1.4.0 | GHSA-68m8-v89j-7j2p | 2022-11-30T19:22:54Z | 2022-11-21T12:30:17Z | null | ['CVE-2022-45146'] | Garbage collection issue in BC-FJA in Java 13 and later | An issue was discovered in the FIPS Java API of Bouncy Castle BC-FJA before 1.0.2.4. Changes to the JVM garbage collector in Java 13 and later trigger an issue in the BC-FJA FIPS modules where it is possible for temporary keys used by the module to be zeroed out while still in use by the module, resulting in errors or ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bc-fips'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45146'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/wiki/CVE-2022-45146'}, {'type': 'WEB', 'url': 'https://www.bouncycastle.org/latest_releases.html'}] | {'cwe_ids': ['CWE-416'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:01:39Z', 'nvd_published_at': '2022-11-21T10:15:00Z'} |
1.4.0 | GHSA-6cqj-6969-p57x | 2022-11-28T16:16:29Z | 2022-11-21T20:38:51Z | null | ['CVE-2022-39199'] | Lack of proper validation of server UUID can be used by the server to trick the client to accept invalid proofs | ### Impact
immudb client SDKs use server's UUID to distinguish between different server instance so that the client can connect to different immudb instances and keep the state for multiple servers. SDK does not validate this uuid and can accept any value reported by the server. A malicious server can change the repor... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/codenotary/immudb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/codenotary/immudb/security/advisories/GHSA-6cqj-6969-p57x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39199'}, {'type': 'WEB', 'url': 'https://github.com/codenotary/immudb/commit/cade04756ff3f0a3b9e8d24149062744574adf5d'}, {'type': 'PACKAGE', 'ur... | {'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:38:51Z', 'nvd_published_at': '2022-11-22T20:15:00Z'} |
1.4.0 | GHSA-rmcx-fg5w-x8j9 | 2022-12-03T04:09:52Z | 2022-11-28T21:30:21Z | null | ['CVE-2022-45921'] | FusionAuth vulnerable to directory traversal attack | FusionAuth before 1.41.3 allows a file outside of the application root to be viewed or retrieved using an HTTP request. To be specific, an attacker may be able to view or retrieve any file readable by the user running the FusionAuth process. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.fusionauth:fusionauth-java-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.37.0'}, {'fixed': '1.41.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45921'}, {'type': 'WEB', 'url': 'https://github.com/FusionAuth/fusionauth-issues/issues/1983'}, {'type': 'WEB', 'url': 'https://fusionauth.io/docs/v1/tech/release-notes'}, {'type': 'PACKAGE', 'url': 'https://github.com/FusionAuth/fusionauth-java-cl... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T21:16:58Z', 'nvd_published_at': '2022-11-28T21:15:00Z'} |
1.4.0 | GHSA-cm7f-hf2g-ghrp | 2022-12-05T18:28:09Z | 2022-11-25T18:30:25Z | null | ['CVE-2022-37721'] | PyroCMS vulnerable to stored Cross Site Scripting | PyroCMS 3.9 is vulnerable to a stored Cross Site Scripting (XSS) when a low privileged user, such as an author, injects a crafted html and javascript payload in a blog post, leading to full admin account takeover or privilege escalation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pyrocms/pyrocms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.9.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37721'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyrocms/pyrocms'}, {'type': 'WEB', 'url': 'https://labs.integrity.pt/advisories/cve-2022-37721/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T18:28:09Z', 'nvd_published_at': '2022-11-25T17:15:00Z'} |
1.4.0 | GHSA-3fjj-p79j-c9hh | 2022-11-28T16:17:34Z | 2022-11-21T22:28:11Z | null | ['CVE-2022-41919'] | Fastify: Incorrect Content-Type parsing can lead to CSRF attack | ### Impact
The attacker can use the incorrect `Content-Type` to bypass the `Pre-Flight` checking of `fetch`. `fetch()` requests with Content-Type’s [essence](https://mimesniff.spec.whatwg.org/#mime-type-essence) as "application/x-www-form-urlencoded", "multipart/form-data", or "text/plain", could potentially be used t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'fastify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'fastify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.29.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/fastify/fastify/security/advisories/GHSA-3fjj-p79j-c9hh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41919'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify/commit/62dde76f1f7aca76e38625fe8d983761f26e6fc9'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:28:11Z', 'nvd_published_at': '2022-11-22T20:15:00Z'} |
1.4.0 | GHSA-x45f-j34v-75xm | 2022-11-19T01:15:27Z | 2022-11-13T12:00:17Z | null | ['CVE-2022-3975'] | NukeView CMS vulnerable to Cross-site Scripting | NukeView CMS has been found to be vulnerable to Cross-site Scripting. Affected by this issue is the function filterAttr of the file vendor/vinades/nukeviet/Core/Request.php of the component Data URL Handler. The manipulation of the argument attrSubSet leads to cross site scripting. The attack may be launched remotely. ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'nukeviet/nukeviet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3975'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/commit/0b3197fad950bb3383e83039a8ee4c9509b3ce02'}, {'type': 'PACKAGE', 'url': 'https://github.com/nukeviet/nukeviet'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.213554'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-15T23:55:48Z', 'nvd_published_at': '2022-11-13T10:15:00Z'} |
1.4.0 | GHSA-gh7m-j673-wm97 | 2022-11-22T00:18:39Z | 2022-11-17T18:30:26Z | null | ['CVE-2022-43138'] | Dolibarr vulnerable to privilege escalation | Dolibarr Open Source ERP & CRM for Business before v14.0.1 allows attackers to escalate privileges via a crafted API. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43138'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/489cff46a37b04784d8e884af7fc2ad623bee17d'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits... | {'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:18:39Z', 'nvd_published_at': '2022-11-17T17:15:00Z'} |
1.4.0 | GHSA-58h5-h554-429q | 2022-11-10T21:42:09Z | 2022-11-10T21:42:09Z | null | [] | ezplatform-admin-ui vulnerable to Cross-Site Scripting (XSS) | It is possible to inject JavaScript XSS in the content type entries "name" and "short name". To exploit this, one must already have permission to edit content types, which limits it in many cases to people who are already administrators. However, please verify which users have this permission. The fix ensures any injec... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-admin-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.26'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui/security/advisories/GHSA-58h5-h554-429q'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui/commit/29e156a7bbecca5abd946c99546a261679587d29'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-s... | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T21:42:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wg2f-9rf7-48gm | 2022-12-16T14:39:48Z | 2022-11-16T12:00:23Z | null | ['CVE-2022-45390'] | Missing permission check in Jenkins loader.io Plugin allows enumerating credentials IDs | loader.io Plugin 1.0.1 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.
As of publication... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.loader:loaderio-jenkins-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45390'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/loaderio-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2857'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T14:39:48Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-9hqh-fmhg-vq2j | 2022-11-21T22:34:57Z | 2022-11-21T22:34:57Z | null | ['CVE-2022-41928'] | Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in AttachmentSelector.xml | ### Impact
Any user with the right to edit his personal page can follow one of the scenario below:
**Scenario 1**:
- Log in as a simple user with just edit rights on the user profile
- Go to the user's profile
- Upload an attachment in the attachment tab at the bottom of the page (any image is fine)
- Click on "rename... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-attachment-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0-milestone-1'}, {'fixed': '13.10.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-attachment-ui'}, 'ranges': [{'type': 'ECO... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9hqh-fmhg-vq2j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41928'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-1... | {'cwe_ids': ['CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:34:57Z', 'nvd_published_at': '2022-11-23T19:15:00Z'} |
1.4.0 | GHSA-vcvg-g8p2-3hqr | 2022-11-23T21:48:11Z | 2022-11-22T15:30:26Z | null | ['CVE-2022-42094'] | Cross-site Scripting in Backdrop CMS | Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the 'Card' content. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'backdrop/backdrop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.23.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42094'}, {'type': 'WEB', 'url': 'https://github.com/backdrop/backdrop/releases/tag/1.23.0'}, {'type': 'WEB', 'url': 'https://github.com/bypazs/CVE-2022-42094'}, {'type': 'WEB', 'url': 'https://grimthereaperteam.medium.com/cve-2022-42094-backdrop-xs... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:14:25Z', 'nvd_published_at': '2022-11-22T13:15:00Z'} |
1.4.0 | GHSA-h63r-9xxf-f2c7 | 2022-11-03T19:33:27Z | 2022-11-02T19:00:33Z | null | ['CVE-2022-43982'] | Apache Airflow Cross-site Scripting vulnerability | In Apache Airflow versions prior to 2.4.2, the "Trigger DAG with config" screen was susceptible to XSS attacks via the `origin` query argument. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43982'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/27143'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T18:13:18Z', 'nvd_published_at': '2022-11-02T12:15:00Z'} |
1.4.0 | GHSA-q48r-xg9h-78m8 | 2022-11-22T00:12:47Z | 2022-11-15T12:00:16Z | null | ['CVE-2022-43689'] | Concrete CMS vulnerable to XML External Entity | Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to XXE based DNS requests leading to IP disclosure. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.2'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43689'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/913-release-n... | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:12:47Z', 'nvd_published_at': '2022-11-14T23:15:00Z'} |
1.4.0 | GHSA-fp35-xrrr-3gph | 2022-11-02T21:45:12Z | 2022-11-01T19:00:29Z | null | ['CVE-2022-34662'] | Apache DolphinScheduler vulnerable to Path Traversal | When users add resources to the resource center with a relation path, this vulnerability will cause path traversal issues for logged-in users. Users should upgrade to version 3.0.0 to avoid this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34662'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dolphinscheduler'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/pbdzqf9ntxyvs4cr0x2dgk9zlf43btz8'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T21:04:38Z', 'nvd_published_at': '2022-11-01T16:15:00Z'} |
1.4.0 | GHSA-p5g9-rjcf-95vj | 2022-11-08T14:49:19Z | 2022-11-04T12:00:25Z | null | ['CVE-2022-41714'] | fastest-json-copy vulnerable to Prototype Pollution | fastest-json-copy version 1.0.1 allows an external attacker to edit or add new properties to an object. This is possible because the application does not correctly validate the incoming JSON keys, thus allowing the `__proto__` property to be edited. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'fastest-json-copy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41714'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/guetta/'}, {'type': 'WEB', 'url': 'https://github.com/streamich/fastest-json-copy'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T14:49:19Z', 'nvd_published_at': '2022-11-03T20:15:00Z'} |
1.4.0 | GHSA-h4wx-78p9-fwxw | 2022-12-15T21:12:06Z | 2022-11-16T12:00:23Z | null | ['CVE-2022-45396'] | XXE vulnerability on agents in Jenkins SourceMonitor Plugin | SourceMonitor Plugin 0.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to control XML input files for the 'Publish SourceMonitor results' post-build step to have agent processes parse a crafted file that uses external entities for extraction of s... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.thalesgroup.hudson.plugins:sourcemonitor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45396'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/sourcemonitor-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2927'}] | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:24:17Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-3gfj-fxx4-f22w | 2022-11-10T14:32:09Z | 2022-11-08T22:31:25Z | null | ['CVE-2022-39352'] | OpenFGA Authorization Bypass | ### Overview
During our internal security assessment, it was discovered that OpenFGA versions v0.2.4 and prior are vulnerable to authorization bypass under certain conditions.
### Am I Affected?
You are affected by this vulnerability if you are using `openfga/openfga` version v0.2.4 or prior, and have tuples where the... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/openfga/openfga'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.4'}}] | [{'type': 'WEB', 'url': 'https://github.com/openfga/openfga/security/advisories/GHSA-3gfj-fxx4-f22w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39352'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/commit/776e80505e8d184b2286acc8268d8d74f36a9984'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T22:31:25Z', 'nvd_published_at': '2022-11-08T08:15:00Z'} |
1.4.0 | GHSA-3vwm-fc87-mq6h | 2022-12-15T19:45:46Z | 2022-11-16T12:00:23Z | null | ['CVE-2022-45391'] | SSL/TLS certificate validation globally and unconditionally disabled by Jenkins NS-ND Integration Performance Publisher Plugin | NS-ND Integration Performance Publisher Plugin 4.8.0.143 and earlier globally and unconditionally disables SSL/TLS certificate and hostname validation for the entire Jenkins controller JVM.
NS-ND Integration Performance Publisher Plugin 4.8.0.146 no longer disables SSL/TLS certificate and hostname validation globally. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:cavisson-ns-nd-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.0.146'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45391'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2910%20(1)'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:23:33Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-7wg4-8m5p-hrfg | 2023-05-22T18:33:41Z | 2022-11-10T12:01:03Z | null | ['CVE-2022-3866'] | HashiCorp Nomad vulnerable to non-sensitive metadata exposure | HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.4.1 workload identity token can list non-sensitive metadata for paths under `nomad/` that belong to other jobs in the same namespace. Fixed in 1.4.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3866'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/commit/3b24f26603e2b116ba324101afa8a7e3a7a769a5'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-25-nomad-s-workload-identity-token-can-list-non-sensitive-metad... | {'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T23:51:44Z', 'nvd_published_at': '2022-11-10T06:15:00Z'} |
1.4.0 | GHSA-67pf-62xr-q35m | 2022-11-21T20:42:39Z | 2022-11-21T20:42:39Z | null | ['CVE-2022-41893'] | `CHECK_EQ` fail in `tf.raw_ops.TensorListResize` | ### Impact
If [`tf.raw_ops.TensorListResize`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/list_kernels.cc) is given a nonscalar value for input `size`, it results `CHECK` fail which can be used to trigger a denial of service attack.
```python
import numpy as np
import tensorflow as tf
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-67pf-62xr-q35m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41893'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/888e34b49009a4e734c27ab0c43b0b5102682c56'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:42:39Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-8v23-w4w5-w83c | 2022-11-26T20:03:11Z | 2022-11-23T15:30:21Z | null | ['CVE-2022-45149'] | Cross-Site Request Forgery in Moodle | A vulnerability was found in Moodle which exists due to insufficient validation of the HTTP request origin in course redirect URL. A user's CSRF token was unnecessarily included in the URL when being redirected to a course they have just restored. A remote attacker can trick the victim to visit a specially crafted web ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.11'}]}]},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45149'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2142772'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DHYIIAUXUBHMBEDYU7TYNZXEN2W2SA2/'}, {'ty... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T22:20:32Z', 'nvd_published_at': '2022-11-23T15:15:00Z'} |
1.4.0 | GHSA-rg94-84xj-7gq3 | 2023-08-31T00:37:17Z | 2022-11-15T12:00:15Z | null | ['CVE-2022-45402'] | Apache Airflow Contains Open Redirect | In Apache Airflow versions prior to 2.4.3, there was an open redirect in the webserver's `/login` endpoint. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45402'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/27576'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/nf4xrkoo6c81g6fdn4vj8k9x2686o9nh'}, {'type': '... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-18T16:10:53Z', 'nvd_published_at': '2022-11-15T09:15:00Z'} |
1.4.0 | GHSA-gq2j-cr96-gvqx | 2022-11-21T20:44:36Z | 2022-11-21T20:44:36Z | null | ['CVE-2022-41895'] | `MirrorPadGrad` heap out of bounds read | ### Impact
If [`MirrorPadGrad`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/image/mirror_pad_op.cc) is given outsize input `paddings`, TensorFlow will give a heap OOB error.
```python
import tensorflow as tf
tf.raw_ops.MirrorPadGrad(input=[1],
paddings=[[0x77f00000,0xa0000... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gq2j-cr96-gvqx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41895'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/717ca98d8c3bba348ff62281fdf38dcb5ea1ec92'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:44:36Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-r7qp-cfhv-p84w | 2022-12-08T00:47:24Z | 2022-11-21T23:55:41Z | null | ['CVE-2022-41940'] | Uncaught exception in engine.io | ### Impact
A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process.
```
events.js:292
throw er; // Unhandled 'error' event
^
Error: read ECONNRESET
at TCP.onStreamRead (internal/stream_base_commons.js:209:20)
Emitted 'error' event o... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'engine.io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'engine.io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '6.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/socketio/engine.io/security/advisories/GHSA-r7qp-cfhv-p84w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41940'}, {'type': 'WEB', 'url': 'https://github.com/socketio/engine.io/commit/425e833ab13373edf1dd5a0706f07100db14e3c6'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-248'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:55:41Z', 'nvd_published_at': '2022-11-22T01:15:00Z'} |
1.4.0 | GHSA-8847-xvjw-9g43 | 2022-12-15T21:13:45Z | 2022-11-16T12:00:23Z | null | ['CVE-2022-45397'] | XXE vulnerability on agents in Jenkins OSF Builder Suite : : XML Linter Plugin | OSF Builder Suite : : XML Linter 1.0.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to control XML files that get processed by the 'OSF Builder Suite : : XML Linter' build step to have agent processes parse a crafted file that uses external enti... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci:update-center2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45397'}, {'type': 'WEB', 'url': 'https://github.com/jenkins-infra/update-center2/pull/658'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2937'}, {'type': 'PACKAGE', 'url': ' https://github.com/jenkinsci/osf... | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:25:46Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-2gj2-vj98-j2qq | 2022-11-21T22:35:22Z | 2022-11-21T22:35:22Z | null | ['CVE-2022-41929'] | Missing Authorization in User#setDisabledStatus in org.xwiki.platform:xwiki-platform-oldcore | ### Impact
It's possible for a user with only Script rights to enable or disable a user: this operation should be only doable for users with admin rights.
### Patches
This problem has been patched in XWiki 13.10.7, 14.4.2 and 14.5RC1.
### Workarounds
There is no workaround other than upgrading the wiki, but note ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.7RC1'}, {'fixed': '13.10.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2gj2-vj98-j2qq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41929'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/0b732f2ef0224e2aaf10e2e1ef48dbd3fb6e10cd'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:35:22Z', 'nvd_published_at': '2022-11-23T19:15:00Z'} |
1.4.0 | GHSA-x93j-3hh3-6x23 | 2022-11-21T23:55:59Z | 2022-11-20T06:30:15Z | null | ['CVE-2022-4070'] | Insufficient Session Expiration in librenms/librenms | Insufficient Session Expiration in GitHub repository librenms/librenms prior to 22.10.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4070'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/ce8e5f3d056829bfa7a845f9dc2757e21e419ddc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/72d426bb-b56e-4534-88ba-0d11381b0775'}] | {'cwe_ids': ['CWE-613'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:55:59Z', 'nvd_published_at': '2022-11-20T05:15:00Z'} |
1.4.0 | GHSA-5j7g-cf6r-g2h7 | 2022-11-21T22:36:34Z | 2022-11-21T22:36:33Z | null | ['CVE-2022-41931'] | Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki-platform-icon-ui | ### Impact
Any user with view rights on commonly accessible documents including the icon picker macro can execute arbitrary Groovy, Python or Velocity code in XWiki due to improper neutralization of the macro parameters of the icon picker macro.
The URL `<server>/xwiki/bin/view/Main?sheet=CKEditor.HTMLConverter&langua... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-icon-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4-milestone-2'}, {'fixed': '13.10.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-icon-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'ev... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5j7g-cf6r-g2h7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41931'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/47eb8a5fba550f477944eb6da8ca91b87eaf1d01'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:36:34Z', 'nvd_published_at': '2022-11-23T20:15:00Z'} |
1.4.0 | GHSA-4x6g-3cmx-w76r | 2022-12-06T14:15:06Z | 2022-11-30T15:30:27Z | null | ['CVE-2022-22984'] | Snyk plugins vulnerable to Command Injection | The package snyk before 1.1064.0; the package snyk-mvn-plugin before 2.31.3; the package snyk-gradle-plugin before 3.24.5; the package @snyk/snyk-cocoapods-plugin before 2.5.3; the package snyk-sbt-plugin before 2.16.2; the package snyk-python-plugin before 1.24.2; the package snyk-docker-plugin before 5.6.5; the packa... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'snyk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1064.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'snyk-mvn-plugin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22984'}, {'type': 'WEB', 'url': 'https://github.com/snyk/cli/commit/80d97a93326406e09776156daf72e3caa03ae25a'}, {'type': 'WEB', 'url': 'https://github.com/snyk/snyk-cocoapods-plugin/commit/c73e049c5200772babde61c40aab57296bf91381'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T14:15:06Z', 'nvd_published_at': '2022-11-30T13:15:00Z'} |
1.4.0 | GHSA-5r3h-c3r7-9w4h | 2022-12-18T23:19:33Z | 2022-11-04T19:01:17Z | null | ['CVE-2022-33684'] | Apache Pulsar Disabled Certificate Validation for OAuth Client Credential Requests makes C++/Python Clients vulnerable to MITM attack | The Apache Pulsar C++ Client does not verify peer TLS certificates when making HTTPS calls for the OAuth2.0 Client Credential Flow, even when `tlsAllowInsecureConnection` is disabled via configuration. This vulnerability allows an attacker to perform a man in the middle attack and intercept and/or modify the GET reques... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pulsar-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'pulsar-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.4'}]}]}, {'package': {'eco... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33684'}, {'type': 'WEB', 'url': 'https://github.com/apache/pulsar/pull/16064'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/pulsar-client-cpp'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/df89b724-3201-47aa-b8cd-282e112a566f'}, {'... | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T14:41:17Z', 'nvd_published_at': '2022-11-04T12:15:00Z'} |
1.4.0 | GHSA-m5xf-x7q6-3rm7 | 2023-08-29T22:52:24Z | 2022-11-18T17:14:39Z | null | ['CVE-2022-39383'] | KubeVela VelaUX APIserver has SSRF vulnerability | ### Impact
Users using the VelaUX APIServer could be affected by this vulnerability.
When using Helm Chart as the component delivery method, the request address of the warehouse is not restricted, and there is a blind SSRF vulnerability.
This issue is patched in 1.5.9 and 1.6.2.
### References
Fix by: #5000
### Fo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/oam-dev/kubevela'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0-alpha.1'}, {'fixed': '1.6.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/oam-dev/kubevela'}, 'ecosystem_specific': ... | [{'type': 'WEB', 'url': 'https://github.com/kubevela/kubevela/security/advisories/GHSA-m5xf-x7q6-3rm7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39383'}, {'type': 'WEB', 'url': 'https://github.com/kubevela/kubevela/pull/5000'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubevela/kubev... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-18T17:14:39Z', 'nvd_published_at': '2022-11-16T20:15:00Z'} |
1.4.0 | GHSA-vj5r-mmp4-3hrx | 2022-12-15T20:44:46Z | 2022-11-16T12:00:22Z | null | ['CVE-2022-38666'] | SSL/TLS certificate validation unconditionally disabled by Jenkins NS-ND Integration Performance Publisher Plugin | Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.146 and earlier unconditionally disables SSL/TLS certificate and hostname validation for several features. Currently, there are no known workarounds or patches. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:cavisson-ns-nd-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.8.0.146'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38666'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin/releases'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2910%20(2)'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:19:30Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-99r3-xmmq-7q7g | 2022-11-10T23:59:24Z | 2022-11-10T23:59:24Z | null | [] | eZ Platform users with the Company admin role can assign any role to any user | Critical severity. Users with the Company admin role (introduced by the company account feature in v4) can assign any role to any user. This also applies to any other user that has the role / assign policy. Any subtree limitation in place does not have any effect.
The role / assign policy is typically only given to ad... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.5.0'}, {'fixed': '7.5.30'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-99r3-xmmq-7q7g'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/commit/957e67a08af2b3265753f9763943e8225ed779ab'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T23:59:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fvw2-2pf7-77vw | 2022-11-16T21:50:38Z | 2022-11-14T12:00:15Z | null | ['CVE-2022-27949'] | Apache Airflow subject to Exposure of Sensitive Information | A vulnerability in UI of Apache Airflow allows an attacker to view unmasked secrets in rendered template values for tasks which were not executed (for example when they were depending on past and previous instances of the task failed). This issue affects Apache Airflow prior to 2.3.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27949'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/22754'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/n38oc5obb48600fsvnbopxcs0jpbp65p'}, {'type': '... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-16T03:48:38Z', 'nvd_published_at': '2022-11-14T10:15:00Z'} |
1.4.0 | GHSA-8q72-6qq8-xv64 | 2022-11-01T18:11:07Z | 2022-11-01T18:11:07Z | null | ['CVE-2022-39369'] | phpCAS vulnerable to Service Hostname Discovery Exploitation | ### Impact
The phpCAS library uses HTTP headers to determine the service URL used to validate tickets. This allows an attacker to control the host header and use a valid ticket granted for any authorized service in the same SSO realm (CAS server) to authenticate to the service protected by phpCAS.
Depending on the se... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'apereo/phpcas'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/apereo/phpCAS/security/advisories/GHSA-8q72-6qq8-xv64'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39369'}, {'type': 'WEB', 'url': 'https://github.com/apereo/phpCAS/commit/b759361d904a2cb2a3bcee9411fc348cfde5d163'}, {'type': 'PACKAGE', 'url': 'htt... | {'cwe_ids': ['CWE-1287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T18:11:07Z', 'nvd_published_at': '2022-11-01T17:15:00Z'} |
1.4.0 | GHSA-f9fq-78ch-4wmj | 2022-11-03T19:33:34Z | 2022-11-02T19:00:32Z | null | ['CVE-2022-43985'] | Apache Airflow Open Redirect vulnerability | In Apache Airflow versions prior to 2.4.2, there was an open redirect in the webserver's `/confirm` endpoint. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43985'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/27143'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T18:12:26Z', 'nvd_published_at': '2022-11-02T12:15:00Z'} |
1.4.0 | GHSA-wqg7-mx6p-2rw3 | 2022-11-26T20:17:43Z | 2022-11-23T09:30:24Z | null | ['CVE-2022-45462'] | Command injection in Apache DolphinScheduler Alert Plugins | Alarm instance management has command injection when there is a specific command configured. It is only for logged-in users. We recommend you upgrade to version 2.0.6 or higher. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler-alert-plugins'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45462'}, {'type': 'WEB', 'url': 'https://github.com/apache/dolphinscheduler/pull/10744'}, {'type': 'WEB', 'url': 'https://github.com/apache/dolphinscheduler/pull/9834'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dolphinscheduler'}, {'ty... | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T22:19:42Z', 'nvd_published_at': '2022-11-23T09:15:00Z'} |
1.4.0 | GHSA-298r-5c48-7q2r | 2022-12-15T18:49:47Z | 2022-11-16T12:00:22Z | null | ['CVE-2022-45380'] | Jenkins JUnit Plugin subject to Cross-site Scripting via URL conversion | JUnit Plugin 1159.v0b_396e1e07dd and earlier converts HTTP(S) URLs in test report output to clickable links.
This is done in an unsafe manner, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
JUnit Plugin 1160.vf1f01a_a_ea_b_7f no longer converts ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:junit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1160.vf1f01a_a_ea_b_7f'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1159.v0b'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45380'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/junit-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2888'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:20:55Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-m74x-fxjh-3qh9 | 2022-11-30T21:22:44Z | 2022-11-19T00:30:55Z | null | ['CVE-2022-38871'] | Free5gc vulnerable to uncontrolled resource consumption | In Free5gc v3.0.5, the AMF breaks due to malformed NAS messages. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/free5gc/free5gc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.0.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38871'}, {'type': 'WEB', 'url': 'https://github.com/free5gc/free5gc/issues/198'}, {'type': 'PACKAGE', 'url': 'https://github.com/free5gc/free5gc'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T21:22:44Z', 'nvd_published_at': '2022-11-18T23:15:00Z'} |
1.4.0 | GHSA-mxvq-cv4x-p3jw | 2022-11-21T23:49:59Z | 2022-11-15T12:00:16Z | null | ['CVE-2022-42130'] | Incorrect Default Permissions in Liferay Portal | The Dynamic Data Mapping module in Liferay Portal 7.1.0 through 7.4.3.4, and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 19, 7.3 before update 4, and 7.4 GA does not properly check permission of form entries, which allows remote authenticated users to view and access all form entries. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.4.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42130'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17447'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42130'}] | {'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:49:59Z', 'nvd_published_at': '2022-11-15T02:15:00Z'} |
1.4.0 | GHSA-47fc-vmwq-366v | 2023-01-06T22:29:57Z | 2022-11-26T03:30:27Z | null | ['CVE-2022-45907'] | PyTorch vulnerable to arbitrary code execution | In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely. The fix for this issue is available in version 1.13.1. There is a release checker in [issue #89855](https://github.com/pytorch/pytorch/issues/89855). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'torch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.13.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45907'}, {'type': 'WEB', 'url': 'https://github.com/pytorch/pytorch/issues/88868'}, {'type': 'WEB', 'url': 'https://github.com/pytorch/pytorch/issues/89855'}, {'type': 'WEB', 'url': 'https://github.com/pytorch/pytorch/pull/89189'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:28:40Z', 'nvd_published_at': '2022-11-26T02:15:00Z'} |
1.4.0 | GHSA-prjq-f4q3-fvfr | 2023-08-30T00:09:03Z | 2022-11-15T19:05:07Z | null | ['CVE-2020-7731'] | github.com/russellhaering/gosaml2 is vulnerable to NULL Pointer Dereference | ### Impact
In versions prior to v0.7.0 it was possible for an attacker to supply an invalid assertion which would trigger a panic due to a nil-pointer dereference.
### Patches
The issue was patched in v0.7.0, released on March 2, 2022.
### Workarounds
Callers to `gosaml2` can use `recover()` to handle panics to mitig... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/russellhaering/gosaml2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/russellhaering/goxmldsig'}, 'ecosystem_specific'... | [{'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/security/advisories/GHSA-prjq-f4q3-fvfr'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/issues/59'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/goxmldsig/issues/48'}, {'type': 'ADVISORY', 'url': 'https://github.com/ad... | {'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-15T19:05:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cv9g-h8mm-xx5h | 2022-11-21T23:57:13Z | 2022-11-20T06:30:16Z | null | ['CVE-2022-3525'] | Deserialization of Untrusted Data in librenms/librenms | Deserialization of Untrusted Data in GitHub repository librenms/librenms prior to 22.10.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3525'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/ae3925b09ad3c5d0f7a9d5a26ae2f2f778834948'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ed048e8d-87af-440a-a91f-be1e65a40330'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:57:13Z', 'nvd_published_at': '2022-11-20T05:15:00Z'} |
1.4.0 | GHSA-vqp6-rc3h-83cp | 2022-11-21T22:34:00Z | 2022-11-21T22:34:00Z | null | ['CVE-2022-41924'] | Tailscale Windows daemon is vulnerable to RCE via CSRF | A vulnerability identified in the Tailscale Windows client allows a malicious website to reconfigure the Tailscale daemon `tailscaled`, which can then be used to remotely execute code.
**Affected platforms:** Windows
**Patched Tailscale client versions:** v1.32.3 or later, v1.33.257 or later (unstable)
### What happe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'tailscale.com'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.32.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tailscale/tailscale/security/advisories/GHSA-vqp6-rc3h-83cp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41924'}, {'type': 'WEB', 'url': 'https://emily.id.au/tailscale'}, {'type': 'PACKAGE', 'url': 'https://github.com/tailscale/tailscale'}, {'type... | {'cwe_ids': ['CWE-346', 'CWE-352'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:34:00Z', 'nvd_published_at': '2022-11-23T19:15:00Z'} |
1.4.0 | GHSA-27rc-728f-x5w2 | 2022-11-21T21:54:26Z | 2022-11-21T21:54:26Z | null | ['CVE-2022-41899'] | `CHECK` fail via inputs in `SdcaOptimizer` | ### Impact
Inputs `dense_features` or `example_state_data` not of rank 2 will trigger a `CHECK` fail in [`SdcaOptimizer`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/sdca_internal.cc).
```python
import tensorflow as tf
tf.raw_ops.SdcaOptimizer(
sparse_example_indices=4 * [tf.rando... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27rc-728f-x5w2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41899'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/80ff197d03db2a70c6a111f97dcdacad1b0babfa'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20', 'CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T21:54:26Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-cx84-43xc-3gm2 | 2022-11-21T23:50:16Z | 2022-11-15T12:00:16Z | null | ['CVE-2022-42131'] | Improper Certificate Validation in Liferay Portal | Certain Liferay products are affected by: Missing SSL Certificate Validation in the Dynamic Data Mapping module's REST data providers. This affects Liferay Portal 7.1.0 through 7.4.2 and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 17, and 7.3 before service pack 3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.4.3.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42131'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17377'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42131'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:50:16Z', 'nvd_published_at': '2022-11-15T02:15:00Z'} |
1.4.0 | GHSA-446q-xxg5-3vhh | 2022-11-10T23:57:04Z | 2022-11-10T23:57:04Z | null | [] | eZ Platform users with the Company admin role can assign any role to any user | Critical severity. Users with the Company admin role (introduced by the company account feature in v4) can assign any role to any user. This also applies to any other user that has the role / assign policy. Any subtree limitation in place does not have any effect.
The role / assign policy is typically only given to ad... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/repository-forms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.15'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ezsystems/repository-forms/security/advisories/GHSA-446q-xxg5-3vhh'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/repository-forms/commit/cac51487f8a10e48448399bedb45a519874f1006'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T23:57:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pp3f-xrw5-q5j4 | 2023-08-29T19:39:52Z | 2022-11-21T22:31:31Z | null | ['CVE-2022-41920'] | Lancet vulnerable to path traversal when unzipping files | ### Impact
_What kind of vulnerability is it? Who is impacted?_
ZipSlip issue when use fileutil package to unzip files.
### Patches
_Has the problem been patched? What versions should users upgrade to?_
It will fixed in v2.1.10, Please upgrade version to v2.1.10 or above.
Users who use v1.x.x should upgrade v1.3.4 o... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/duke-git/lancet/v2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/duke-git/lancet'}, 'ecosystem_specific': {'affe... | [{'type': 'WEB', 'url': 'https://github.com/duke-git/lancet/security/advisories/GHSA-pp3f-xrw5-q5j4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41920'}, {'type': 'WEB', 'url': 'https://github.com/duke-git/lancet/issues/62'}, {'type': 'WEB', 'url': 'https://github.com/duke-git/lancet/commit... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:31:31Z', 'nvd_published_at': '2022-11-17T18:15:00Z'} |
1.4.0 | GHSA-6rjv-xxgr-v57x | 2022-11-08T15:08:39Z | 2022-11-05T19:00:42Z | null | ['CVE-2022-3869'] | Froxlor vulnerable to code injection | Code Injection in GitHub repository froxlor/froxlor prior to version 0.10.38.2. There are currently no known workarounds, please upgrade to version 0.10.38.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.38.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3869'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/3f10a4adede9df83408d60ded78b51b812a763a8'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7de20f21-4a9... | {'cwe_ids': ['CWE-79', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-07T16:09:23Z', 'nvd_published_at': '2022-11-05T14:15:00Z'} |
1.4.0 | GHSA-cm43-f2pv-6v68 | 2022-11-28T21:06:45Z | 2022-11-22T12:30:22Z | null | ['CVE-2022-41131'] | OS Command Injection in Apache Airflow | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Apache Airflow Hive Provider, Apache Airflow allows an attacker to execute arbtrary commands in the task execution context, without write access to DAG files. This issue affects Hive Provider versions prior to 4.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41131'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/27647'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/wwo3qp0z8gv54yzn7hr04wy4n8gb0vhl'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:30:58Z', 'nvd_published_at': '2022-11-22T10:15:00Z'} |
1.4.0 | GHSA-r3qr-vwvg-43f7 | 2022-12-03T04:10:07Z | 2022-11-30T21:22:23Z | null | ['CVE-2022-41965'] | Authenticated OpenRedirect Vulnerability | **Description**
Prior to Opencast 12.5 Opencast's Paella authentication page could be used to redirect to an arbitrary URL for authenticated users.
**Impact**
The vulnerability allows attackers to redirect users to sites outside of your Opencast install, potentially facilitating phishing attacks or other security issu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/opencast/opencast/security/advisories/GHSA-r3qr-vwvg-43f7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41965'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/d2ce2321590f86b066a67e8c231cf68219aea017'}, {'type': 'PACKAGE', 'ur... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T21:22:23Z', 'nvd_published_at': '2022-11-28T21:15:00Z'} |
1.4.0 | GHSA-6pw3-8h9w-32gc | 2022-11-16T21:51:08Z | 2022-11-14T12:00:15Z | null | ['CVE-2022-40127'] | Apache Airflow vulnerable to OS Command Injection via example DAGs | A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who can trigger DAGs, to execute arbitrary commands via manually provided run_id parameter. This issue affects Apache Airflow versions prior to 2.4.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40127'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/25960'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/372e699c2d1e11f7087b5340454d0a0a6a56fbf5'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airf... | {'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-16T03:52:20Z', 'nvd_published_at': '2022-11-14T10:15:00Z'} |
1.4.0 | GHSA-97w9-gcc7-vr8g | 2023-07-19T19:58:50Z | 2022-11-16T12:00:20Z | null | ['CVE-2021-4240'] | Insufficient Entropy in PHPServerMon PRNG | A vulnerability, which was classified as problematic, was found in phpservermon. This affects the function `generatePasswordResetToken` of the file `src/psm/Service/User.php`. The manipulation leads to use of predictable algorithm in random number generator. The exploit has been disclosed to the public and may be used.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpservermon/phpservermon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4240'}, {'type': 'WEB', 'url': 'https://github.com/phpservermon/phpservermon/commit/3daa804d5f56c55b3ae13bfac368bb84ec632193'}, {'type': 'PACKAGE', 'url': 'https://github.com/phpservermon/phpservermon'}, {'type': 'WEB', 'url': 'https://huntr.dev/bo... | {'cwe_ids': ['CWE-1241', 'CWE-330', 'CWE-331'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T19:27:56Z', 'nvd_published_at': '2022-11-15T23:15:00Z'} |
1.4.0 | GHSA-wh6w-3828-g9qf | 2022-11-15T01:13:48Z | 2022-11-10T21:16:22Z | null | ['CVE-2022-39393'] | Wasmtime may have data leakage between instances in the pooling allocator | ### Impact
There is a bug in Wasmtime's implementation of it's pooling instance allocator where when a linear memory is reused for another instance the initial heap snapshot of the prior instance can be visible, erroneously to the next instance. The pooling instance allocator in Wasmtime works by preallocating virtual... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-wh6w-3828-g9qf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39393'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/commit/2614f2e9d2d36805ead8a8da0fa0c6e0d9e428a0'}, {'type'... | {'cwe_ids': ['CWE-212', 'CWE-226'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T21:16:22Z', 'nvd_published_at': '2022-11-10T20:15:00Z'} |
1.4.0 | GHSA-3p7g-wrgg-wq45 | 2022-11-10T21:35:49Z | 2022-11-10T21:35:49Z | null | [] | GraphQL queries can expose password hashes | ### Impact
Unauthenticated GraphQL queries for user accounts can expose password hashes of users that have created or modified content, typically but not necessarily limited to administrators and editors.
### Patches
Affected versions: Ibexa DXP v3.3.\*, v4.2.\*, eZ Platform v2.5.\*
Resolving versions: Ibexa DXP v3.3.... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'ibexa/graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.31'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'ibexa/graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.3'}]}]}, {'... | [{'type': 'WEB', 'url': 'https://github.com/ibexa/graphql/security/advisories/GHSA-3p7g-wrgg-wq45'}, {'type': 'WEB', 'url': 'https://github.com/ibexa/graphql/commit/5ae5fb4d1d292ddde8528e040ef8a7c8dd7f9c6d'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-009-critical-vulnerabilit... | {'cwe_ids': ['CWE-916'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T21:35:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8jh9-wqpf-q52c | 2022-11-23T15:49:51Z | 2022-11-23T15:49:51Z | null | [] | sweetalert2 v8.19.1 and above contains hidden functionality | `sweetalert2` versions 8.19.1 and up until 9.0.0 are vulnerable to hidden functionality that was introduced by the maintainer. The package outputs audio and/or video messages that do not pertain to the functionality of the package and is not included in versions below 8.19.1.
### Workaround
Use a version < 8.19.1 of t... | [] | [{'package': {'ecosystem': 'npm', 'name': 'sweetalert2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.19.1'}]}], 'database_specific': {'last_known_affected_version_range': '< 9.0.0'}}] | [{'type': 'PACKAGE', 'url': 'https://github.com/sweetalert2/sweetalert2'}, {'type': 'WEB', 'url': 'https://github.com/sweetalert2/sweetalert2/releases/tag/v11.4.9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/sweetalert2'}] | {'cwe_ids': ['CWE-912'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T15:49:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j43m-4pxc-hmqj | 2022-11-21T22:29:44Z | 2022-11-16T19:00:31Z | null | ['CVE-2022-44071'] | Cross-site Scripting in Zenario | Zenario CMS 9.3.57186 is is vulnerable to Cross Site Scripting (XSS) via profile. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.3.57186'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44071'}, {'type': 'WEB', 'url': 'https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/5'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:29:44Z', 'nvd_published_at': '2022-11-16T16:15:00Z'} |
1.4.0 | GHSA-9gh8-wp53-ccc6 | 2022-12-30T01:41:15Z | 2022-11-28T22:06:24Z | null | ['CVE-2022-41654'] | ghost vulnerable to unauthorized newsletter modification via improper access controls | ### Impact
On sites where members is enabled (this is the default) it is possible for members (unprivileged users) to make changes to newsletter settings. This gives unprivileged users the ability to view and change settings they were not intended to have access to. They are not able to escalate their privileges perma... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.22.7'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.46.0'}, {'fixed': '4.48.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-9gh8-wp53-ccc6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41654'}, {'type': 'WEB', 'url': 'https://forum.ghost.org/t/security-update-available-for-ghost-4-48-7-and-5-22-6/34475'}, {'type': 'PACKAGE', 'url'... | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-28T22:06:24Z', 'nvd_published_at': '2022-12-22T10:15:00Z'} |
1.4.0 | GHSA-vq39-q549-g786 | 2022-11-22T00:12:10Z | 2022-11-15T12:00:17Z | null | ['CVE-2022-43967'] | Concrete CMS vulnerable to Cross-site Scripting via multilingual report | Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to Reflected XSS in the multilingual report due to un-sanitized output. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.3'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43967'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/913-release-n... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:12:10Z', 'nvd_published_at': '2022-11-14T22:15:00Z'} |
1.4.0 | GHSA-8fvv-46hw-vpg3 | 2022-11-21T20:41:35Z | 2022-11-21T20:41:35Z | null | ['CVE-2022-41887'] | Overflow in `tf.keras.losses.poisson` | ### Impact
[`tf.keras.losses.poisson`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/python/keras/losses.py) receives a `y_pred` and `y_true` that are passed through `functor::mul` in [`BinaryOp`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/cwise_ops_common.h). If the ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.1'}]}]}, {'package': {'ecosyst... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8fvv-46hw-vpg3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41887'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c5b30379ba87cbe774b08ac50c1f6d36df4ebb7c'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-131'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:41:35Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-99g5-5643-xphp | 2022-11-15T19:57:01Z | 2022-11-10T19:01:05Z | null | ['CVE-2021-40289'] | mm-wiki is vulnerable to Cross-Site Scripting (XSS) | mm-wki v0.2.1 is vulnerable to Cross Site Scripting (XSS). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/phachon/mm-wiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40289'}, {'type': 'WEB', 'url': 'https://github.com/phachon/mm-wiki/issues/319'}, {'type': 'PACKAGE', 'url': 'https://github.com/phachon/mm-wiki'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T22:20:01Z', 'nvd_published_at': '2022-11-10T18:15:00Z'} |
1.4.0 | GHSA-v42f-hq78-8c5m | 2022-11-26T20:03:44Z | 2022-11-23T09:30:24Z | null | ['CVE-2022-4045'] | Denial of service in Mattermost | A denial-of-service vulnerability in the Mattermost allows an authenticated user to crash the server via multiple requests to one of the API endpoints which could fetch a large amount of data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4045'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}, {'type': 'PACKAGE', 'url': 'https://pkg.go.dev/github.com/mattermost/mattermost-server'}] | {'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T22:20:17Z', 'nvd_published_at': '2022-11-23T07:15:00Z'} |
1.4.0 | GHSA-wv7w-rj2x-556x | 2022-11-10T14:31:07Z | 2022-11-07T19:00:20Z | null | ['CVE-2022-37866'] | Apache Ivy vulnerable to path traversal | When Apache Ivy downloads artifacts from a repository it stores them in the local file system based on a user-supplied "pattern" that may include placeholders for artifacts coordinates like the organisation, module or version. If said coordinates contain "../" sequences - which are valid characters for Ivy coordinates ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ivy:ivy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37866'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/htxbr8oc464hxrgroftnz3my70whk93b'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDIFDL5WSBEKBUVKTABUFDDD25SB... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-07T21:54:25Z', 'nvd_published_at': '2022-11-07T14:15:00Z'} |
1.4.0 | GHSA-5h77-4245-pg5p | 2022-11-21T23:56:49Z | 2022-11-20T06:30:16Z | null | ['CVE-2022-3562'] | Cross-site Scripting in librenms/librenms | Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.10.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3562'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/43cb72549d90e338f902b359a83c23d3cb5a2645'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bb9f76db-1314-44ae-9ccc-2b69679aa657'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:56:49Z', 'nvd_published_at': '2022-11-20T05:15:00Z'} |
1.4.0 | GHSA-463w-hxfv-g9f6 | 2022-11-22T00:17:45Z | 2022-11-15T19:00:52Z | null | ['CVE-2022-40308'] | Apache Archiva vulnerable to Sensitive Information Disclosure via anonymous user | Apache Archiva prior to 2.2.9 may allow the anonymous user to read arbitrary files. If anonymous read enabled, it's possible to read the database file directly without logging in. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.archiva:archiva-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40308'}, {'type': 'WEB', 'url': 'https://archiva.apache.org/security.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/archiva'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/x01pnn0jjsw512cscxsbxzrjmz64n4cc'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-200', 'CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:17:45Z', 'nvd_published_at': '2022-11-15T13:15:00Z'} |
1.4.0 | GHSA-4wfh-48v4-3r84 | 2022-11-23T18:46:07Z | 2022-11-21T18:30:38Z | null | ['CVE-2022-45470'] | Cross-site Scripting in Apache Hama | Missing input validation in Apache Hama may cause information disclosure through path traversal and XSS. Since Apache Hama is EOL, we do not expect these issues to be fixed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hama:hama-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45470'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ztvoshd4kxvp5vlro52mpgpfxct4ft8l'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/11/21/1'}] | {'cwe_ids': ['CWE-20', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:01:56Z', 'nvd_published_at': '2022-11-21T16:15:00Z'} |
1.4.0 | GHSA-ggrh-grj3-vfvw | 2022-11-28T23:00:22Z | 2022-11-28T23:00:22Z | null | [] | Package discontinued because Bitly lowered the free quota | On November 17, 2022, an email was received from Bitly advising that the new link quota per free token is lowered to 50 per month (from its previous value of 1000 per month). As per the email, this change is effective on December 8, 2022.
The new quota is so low as to not be useful. For this reason, the maintenance of... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'bitlyshortener'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/impredicative/bitlyshortener/security/advisories/GHSA-ggrh-grj3-vfvw'}, {'type': 'PACKAGE', 'url': 'https://github.com/impredicative/bitlyshortener'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-28T23:00:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-925r-r6rp-2jj7 | 2022-11-16T21:44:44Z | 2022-11-11T19:00:31Z | null | ['CVE-2022-3952'] | ManyDesigns Portofino subject to creation of insecure temporary file | A vulnerability has been found in ManyDesigns Portofino 5.3.2. Affected by this vulnerability is the function createTempDir of the file WarFileLauncher.java. The manipulation leads to creation of temporary file in directory with insecure permissions. Upgrading to version 5.3.3 is able to address this issue. The name of... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.manydesigns:portofino'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3952'}, {'type': 'WEB', 'url': 'https://github.com/ManyDesigns/Portofino/pull/580'}, {'type': 'WEB', 'url': 'https://github.com/ManyDesigns/Portofino/commit/94653cb357806c9cf24d8d294e6afea33f8f0775'}, {'type': 'PACKAGE', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-377', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-16T00:00:50Z', 'nvd_published_at': '2022-11-11T14:15:00Z'} |
1.4.0 | GHSA-p72g-cgh9-ghjg | 2022-11-18T06:15:49Z | 2022-11-09T17:20:03Z | null | ['CVE-2022-39368'] | Failing DTLS handshakes may cause throttling to block processing of records | ### Impact
Failing handshakes didn't cleanup counters for throttling. In consequence the threshold may get reached and will not be released again. The results in permanently dropping records. The issues was reported for certificate based handshakes, but it can't be excluded, that this happens also for PSK based handsh... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.californium:scandium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.californium:scandium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'... | [{'type': 'WEB', 'url': 'https://github.com/eclipse-californium/californium/security/advisories/GHSA-p72g-cgh9-ghjg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39368'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-californium/californium/issues/2065'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-09T17:20:03Z', 'nvd_published_at': '2022-11-10T00:15:00Z'} |
1.4.0 | GHSA-236j-rfx5-wq38 | 2023-09-07T17:49:24Z | 2022-11-03T19:00:24Z | null | ['CVE-2021-37823'] | OpenCart SQL injection vulnerability | OpenCart 3.0.3.7 allows users to obtain database information or read server files through SQL injection in the background. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'opencart/opencart'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.3.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37823'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencart/opencart'}, {'type': 'WEB', 'url': 'https://medium.com/@nowczj/sql-injection-exists-in-the-background-of-opencart-d41b5c58e99e'}] | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:58:09Z', 'nvd_published_at': '2022-11-03T17:15:00Z'} |
1.4.0 | GHSA-54pp-c6pp-7fpx | 2022-11-21T20:40:55Z | 2022-11-21T20:40:55Z | null | ['CVE-2022-41886'] | Overflow in `ImageProjectiveTransformV2` | ### Impact
When [`tf.raw_ops.ImageProjectiveTransformV2`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/image/image_ops.cc) is given a large output shape, it overflows.
```python
import tensorflow as tf
interpolation = "BILINEAR"
fill_mode = "REFLECT"
images = tf.constant(0.184634328, sh... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-54pp-c6pp-7fpx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41886'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8faa6ea692985dbe6ce10e1a3168e0bd60a723ba'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-131'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:40:55Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-9fmc-5fq4-5jwh | 2022-11-10T23:51:03Z | 2022-11-10T12:01:03Z | null | ['CVE-2022-3867'] | HashiCorp Nomad vulnerable to Insufficient Session Expiration | HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.4.1 event stream subscribers using a token with TTL receive updates until token garbage is collected. Fixed in 1.4.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3867'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/commit/dd6a4634a9652197fe4182e830f9a737d0ae1216'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-26-nomad-s-event-stream-subscriber-using-acl-token-with-ttl-rec... | {'cwe_ids': ['CWE-613'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T23:51:03Z', 'nvd_published_at': '2022-11-10T06:15:00Z'} |
1.4.0 | GHSA-5m7g-pj8w-7593 | 2022-11-18T06:13:43Z | 2022-11-09T19:17:21Z | null | ['CVE-2022-39395'] | Vela Insecure Defaults | ### Impact
Some current default configurations for Vela allow exploitation and container breakouts.
#### Default Privileged Images
Running Vela plugins as privileged Docker containers allows a malicious user to easily break out of the container and gain access to the worker host operating system. On a fresh install o... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/go-vela/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/go-vela/worker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/go-vela/server/security/advisories/GHSA-5m7g-pj8w-7593'}, {'type': 'WEB', 'url': 'https://github.com/go-vela/ui/security/advisories/GHSA-xf39-98m2-889v'}, {'type': 'WEB', 'url': 'https://github.com/go-vela/worker/security/advisories/GHSA-2w78-ffv6-p46w'}, {'type': 'ADVISORY',... | {'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-09T19:17:21Z', 'nvd_published_at': '2022-11-10T18:15:00Z'} |
1.4.0 | GHSA-93vw-8fm5-p2jf | 2023-08-21T18:17:08Z | 2022-11-10T13:02:35Z | null | ['CVE-2022-41879'] | Parse Server is vulnerable to Prototype Pollution via Cloud Code Webhooks | ### Impact
A compromised Parse Server Cloud Code Webhook target endpoint allows an attacker to use prototype pollution to bypass the Parse Server `requestKeywordDenylist` option.
### Patches
Improved keyword detection.
### Workarounds
None.
### Collaborators
Mikhail Shcherbakov, Cristian-Alexandru Staicu and Mus... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.20'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges'... | [{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-93vw-8fm5-p2jf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41879'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/pull/8305'}, {'type': 'WEB', 'url': 'https://github.... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T13:02:35Z', 'nvd_published_at': '2022-11-10T21:15:00Z'} |
1.4.0 | GHSA-hrpp-h998-j3pp | 2023-01-18T23:00:03Z | 2022-11-27T00:30:50Z | null | ['CVE-2022-24999'] | qs vulnerable to Prototype Pollution | qs before 6.10.3 allows attackers to cause a Node process hang because an `__ proto__` key can be used. In many typical web framework use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as `a[__proto__]=b&a[__proto__]&a[le... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'qs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.10.0'}, {'fixed': '6.10.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'qs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.9.0'}, {'fixed': '6.9.7'}]}]}, {'package': {'ecosystem': 'npm', 'n... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24999'}, {'type': 'WEB', 'url': 'https://github.com/ljharb/qs/pull/428'}, {'type': 'WEB', 'url': 'https://github.com/ljharb/qs/commit/4310742efbd8c03f6495f07906b45213da0a32ec'}, {'type': 'WEB', 'url': 'https://github.com/ljharb/qs/commit/727ef5d346... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T14:32:46Z', 'nvd_published_at': '2022-11-26T22:15:00Z'} |
1.4.0 | GHSA-jj93-4jr5-x45h | 2022-11-03T19:33:42Z | 2022-11-02T19:00:31Z | null | ['CVE-2022-43670'] | Apache Sling App CMS vulnerable to Cross-site Scripting | A Cross-site Scripting vulnerability in Sling App CMS version 1.1.0 and prior may allow an authenticated remote attacker to perform a reflected cross site scripting (XSS) attack in the taxonomy management feature. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43670'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/sling-org-apache-sling-app-cms'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/o68l3l3crfxz107fr9dm74y8vg8kj2cs'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-s... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T18:12:03Z', 'nvd_published_at': '2022-11-02T13:15:00Z'} |
1.4.0 | GHSA-c7pc-pgf6-mfh5 | 2022-11-10T21:46:14Z | 2022-11-10T21:46:14Z | null | ['CVE-2022-41876'] | ezplatform-graphql GraphQL queries can expose password hashes | ### Impact
Unauthenticated GraphQL queries for user accounts can expose password hashes of users that have created or modified content, typically but not necessarily limited to administrators and editors.
### Patches
Resolving versions: Ibexa DXP v1.0.13, v2.3.12
### Workarounds
Remove the "passwordHash" entry from ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0-rc1'}, {'fixed': '1.0.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2... | [{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-graphql/security/advisories/GHSA-c7pc-pgf6-mfh5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41876'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-009-critical-vulnerabilities-in-graphq... | {'cwe_ids': ['CWE-200', 'CWE-922'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T21:46:14Z', 'nvd_published_at': '2022-11-10T21:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.