schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-hffx-r282-w2g9
2022-11-21T23:50:32Z
2022-11-15T12:00:16Z
null
['CVE-2022-42123']
Path Traversal in Liferay Portal
A Zip slip vulnerability in the Elasticsearch Connector in Liferay Portal 7.3.3 through 7.4.3.18, and Liferay DXP 7.3 before update 6, and 7.4 before update 19 allows attackers to create or overwrite existing files on the filesystem via the installation of a malicious Elasticsearch Sidecar plugin.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.3.3'}, {'fixed': '7.4.3.19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42123'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17518'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42123'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:50:32Z', 'nvd_published_at': '2022-11-15T01:15:00Z'}
1.4.0
GHSA-xx6g-jj35-pxjv
2022-11-16T00:02:05Z
2022-11-16T00:02:05Z
null
['CVE-2022-41905']
Cross Site Scripting vulnerability in wsgidav when directory browsing is enabled
### Impact Implementations using this library with directory browsing enabled may be susceptible to [Cross Site Scripting (XSS)](https://owasp.org/www-community/attacks/xss/) attacks. ### Patches Users can upgrade to v4.1.0 ### Workarounds Set `dir_browser.enable = False` in the configuration. For instance, when usin...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'wsgidav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0a1'}, {'fixed': '4.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mar10/wsgidav/security/advisories/GHSA-xx6g-jj35-pxjv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41905'}, {'type': 'WEB', 'url': 'https://github.com/mar10/wsgidav/commit/e9606ab0f42f4c1a6611bc3c52de299b0aba7726'}, {'type': 'PACKAGE', 'url': 'htt...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-16T00:02:05Z', 'nvd_published_at': '2022-11-11T21:15:00Z'}
1.4.0
GHSA-32vj-v39g-jh23
2022-11-02T21:50:11Z
2022-11-01T12:00:37Z
null
['CVE-2022-31690']
spring-security-oauth2-client vulnerable to Privilege Escalation
Spring Security, versions 5.7 prior to 5.7.5, and 5.6 prior to 5.6.9, and older unsupported versions could be susceptible to a privilege escalation under certain conditions. A malicious user or attacker can modify a request initiated by the Client (via the browser) to the Authorization Server which can lead to a privil...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-oauth2-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.7.0'}, {'fixed': '5.7.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-oauth2-client'}, 'ranges': [{'t...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31690'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-security-samples/blob/4638e1e428ee2ddab234199eb3b67b9c94dfa08b/servlet/spring-boot/java/oauth2/webclient/src/main/java/example/SecurityConfiguration.java#L48'}, {'type': 'WE...
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T17:27:45Z', 'nvd_published_at': '2022-10-31T20:15:00Z'}
1.4.0
GHSA-g9fm-r5mm-rf9f
2022-11-21T22:03:54Z
2022-11-21T22:03:54Z
null
['CVE-2022-41901']
`CHECK_EQ` fail via input in `SparseMatrixNNZ`
### Impact An input `sparse_matrix` that is not a matrix with a shape with rank 0 will trigger a `CHECK` fail in [`tf.raw_ops.SparseMatrixNNZ`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/sparse/sparse_matrix.h). ```python import tensorflow as tf tf.raw_ops.SparseMatrixNNZ(sparse_matri...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g9fm-r5mm-rf9f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41901'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f856d02e5322821aad155dad9b3acab1e9f5d693'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20', 'CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:03:54Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-r4gq-hv2r-mrf5
2022-11-21T23:57:23Z
2022-11-20T06:30:16Z
null
['CVE-2022-3516']
Cross-site Scripting in librenms/librenms
Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.10.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3516'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/8e85698aa3aa4884c2f3d6c987542477eb64f07c'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/734bb5eb-715c-4b64-bd33-280300a63748'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:57:23Z', 'nvd_published_at': '2022-11-20T05:15:00Z'}
1.4.0
GHSA-p2jh-44qj-pf2v
2022-11-10T12:38:57Z
2022-11-10T12:38:57Z
null
['CVE-2022-36077']
Exfiltration of hashed SMB credentials on Windows via file:// redirect
### Impact When following a redirect, Electron delays a check for redirecting to file:// URLs from other schemes. The contents of the file is not available to the renderer following the redirect, but if the redirect target is a SMB URL such as `file://some.website.com/`, then in some cases, Windows will connect to that...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.3.7'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '20.0.0-beta.1'}, {'fixed': '20.0.1'}]}]}, {'package': {'ecosy...
[{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-p2jh-44qj-pf2v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36077'}, {'type': 'PACKAGE', 'url': 'https://github.com/electron/electron'}]
{'cwe_ids': ['CWE-200', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T12:38:57Z', 'nvd_published_at': '2022-11-08T07:15:00Z'}
1.4.0
GHSA-4r6j-fwcx-94cf
2022-11-10T20:09:27Z
2022-11-10T12:01:17Z
null
['CVE-2022-42965']
snowflake-connector-python is vulnerable to Regular Expression Denial of Service (ReDoS)
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the snowflake-connector-python PyPI package, when an attacker is able to supply arbitrary input to the get_file_transfer_type method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'snowflake-connector-python'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42965'}, {'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-connector-python/pull/1327'}, {'type': 'WEB', 'url': 'https://github.com/snowflakedb/snowflake-connector-python/commit/b9d2fc789fae4db865dde3d2a1bd72c8a9eab091'}, {'type': 'P...
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T18:57:53Z', 'nvd_published_at': '2022-11-09T20:15:00Z'}
1.4.0
GHSA-f3gj-hvv4-f57v
2022-12-15T16:36:21Z
2022-11-16T12:00:23Z
null
['CVE-2022-45395']
XML External Entity Reference in Jenkins CCCC Plugin
Jenkins CCCC Plugin 0.6 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.thalesgroup.jenkins-ci.plugins:cccc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45395'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cccc-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2921'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:24:05Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-crh6-fp67-6883
2022-11-04T20:44:46Z
2022-11-01T17:29:11Z
null
['CVE-2022-39353']
xmldom allows multiple root nodes in a DOM
### Impact xmldom parses XML that is not well-formed because it contains multiple top level elements, and adds all root nodes to the `childNodes` collection of the `Document`, without reporting any error or throwing. This breaks the assumption that there is only a single root node in the tree, which led to https://nvd....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'xmldom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@xmldom/xmldom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.7'}]}]}, {'package': {'ecosyst...
[{'type': 'WEB', 'url': 'https://github.com/xmldom/xmldom/security/advisories/GHSA-crh6-fp67-6883'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39353'}, {'type': 'WEB', 'url': 'https://github.com/jindw/xmldom/issues/150'}, {'type': 'WEB', 'url': 'https://github.com/xmldom/xmldom/commit/52a70...
{'cwe_ids': ['CWE-1288', 'CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T17:29:11Z', 'nvd_published_at': '2022-11-02T17:15:00Z'}
1.4.0
GHSA-gjg7-qfvp-9hm4
2022-11-23T17:26:23Z
2022-11-21T06:30:29Z
null
['CVE-2022-4093']
SQL injection in Dolibarr
SQL injection attacks can result in unauthorized access to sensitive data, such as passwords, credit card details, or personal user information. Many high-profile data breaches in recent years have been the result of SQL injection attacks, leading to reputational damage and regulatory fines. In some cases, an attacker ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '16.0.1'}, {'fixed': '16.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4093'}, {'type': 'WEB', 'url': 'https://github.com/dolibarr/dolibarr/commit/7c1eac9774bd1fed0b7b4594159f2ac2d12a4011'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/677ca8ee-ffbc-4b39-b294-2ce81bd56788'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:57:34Z', 'nvd_published_at': '2022-11-21T05:15:00Z'}
1.4.0
GHSA-hgp8-w8fj-r4cm
2023-07-11T13:52:18Z
2022-11-22T03:30:56Z
null
['CVE-2022-4111']
ToolJet is vulnerable to Denial of Service (DoS)
ToolJet/ToolJet placed no limit on the file size for user avatars. This could cause a denial of service if too many users upload large files. This is fixed in commit 01cd3f0464747973ec329e9fb1ea12743d3235cc in version 1.27.0. `tooljet` is no longer listed on npmjs.com but was [listed on npmjs.com in the past](https://...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'tooljet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.27.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4111'}, {'type': 'WEB', 'url': 'https://github.com/ToolJet/ToolJet/pull/4103'}, {'type': 'WEB', 'url': 'https://github.com/tooljet/tooljet/commit/01cd3f0464747973ec329e9fb1ea12743d3235cc'}, {'type': 'PACKAGE', 'url': 'https://github.com/ToolJet/Too...
{'cwe_ids': ['CWE-1284', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:38:23Z', 'nvd_published_at': '2022-11-22T03:15:00Z'}
1.4.0
GHSA-w8fp-3gwq-gxpw
2022-11-18T06:15:37Z
2022-11-14T19:00:19Z
null
['CVE-2022-43693']
Concrete CMS vulnerable to Cross-site Request Forgery
Concrete CMS is vulnerable to CSRF due to the lack of "State" parameter for external Concrete authentication service for users of Concrete who use the "out of the box" core OAuth.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0RC1'}, {'fixed': '9.1....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43693'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/913-release-n...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-16T21:14:09Z', 'nvd_published_at': '2022-11-14T17:15:00Z'}
1.4.0
GHSA-wgqm-qp44-cg6x
2022-11-21T23:46:02Z
2022-11-15T12:00:16Z
null
['CVE-2022-42128']
Incorrect Default Permissions in Liferay Portal
The Hypermedia REST APIs module in Liferay Portal 7.4.1 through 7.4.3.4, and Liferay DXP 7.4 GA does not properly check permissions, which allows remote attackers to obtain a WikiNode object via the WikiNodeResource.getSiteWikiNodeByExternalReferenceCode API.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.1'}, {'fixed': '7.4.3.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.4.3.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42128'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17595'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42128'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:46:02Z', 'nvd_published_at': '2022-11-15T01:15:00Z'}
1.4.0
GHSA-9mf2-hpj4-rw3r
2022-11-02T18:17:35Z
2022-11-01T19:00:30Z
null
['CVE-2022-3788']
TablePress Plugin vulnerable to Cross-site Scripting
A cross-site scripting vulnerability was found in an unknown function of the component Table Import Handler. The manipulation of the argument Import data leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tobiasbg/tablepress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0-RC1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3788'}, {'type': 'WEB', 'url': 'https://drive.google.com/file/d/10tk6wEh1hdkb2vVoqJqZJZsOtfxpniyY/view'}, {'type': 'WEB', 'url': 'https://drive.google.com/file/d/1iRUtJYUZB0Ho-2Aqyw7TCtFN9L96UDfs/view'}, {'type': 'PACKAGE', 'url': 'https://github.c...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T18:17:35Z', 'nvd_published_at': '2022-11-01T14:15:00Z'}
1.4.0
GHSA-7fxm-c848-89q8
2022-12-27T18:10:37Z
2022-11-29T18:30:18Z
null
['CVE-2022-25848']
static-dev-server vulnerable to path traversal
A path traversal vulnerability affects all versions of package static-dev-server. This is because when paths from users to the root directory are joined, the assets for the path accessed are relative to that of the root directory. There is currently no known workaround or fix for this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'static-dev-server'}, 'versions': ['1.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25848'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/5550bcd0bdf92c1b56fbb20e141fe5bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/etoah/static-dev-server'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-STATICDEVS...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:21:45Z', 'nvd_published_at': '2022-11-29T17:15:00Z'}
1.4.0
GHSA-rcrx-fpjp-mfrw
2022-11-02T18:10:47Z
2022-11-02T18:10:47Z
null
['CVE-2022-39381']
Unchecked Return Value to NULL Pointer Dereference in PDFDocumentHandler.cpp
### Impact The package muhammara before 2.6.0; all versions of package hummus are vulnerable to Denial of Service (DoS) when supplied with a maliciously crafted PDF file to be appended to another. ### Patches It has been patched in 2.6.0 for muhammara and not at all for hummus ### Workarounds Do not process files fro...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'muhammara'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'hummus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.111'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/julianhille/MuhammaraJS/security/advisories/GHSA-rcrx-fpjp-mfrw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39381'}, {'type': 'WEB', 'url': 'https://github.com/galkahana/HummusJS/issues/293'}, {'type': 'WEB', 'url': 'https://github.com/julianhill...
{'cwe_ids': ['CWE-476', 'CWE-690'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T18:10:47Z', 'nvd_published_at': '2022-11-02T15:15:00Z'}
1.4.0
GHSA-8h83-chh2-fchp
2022-11-10T23:58:32Z
2022-11-10T23:58:32Z
null
[]
eZ Platform users with the Company admin role can assign any role to any user
Critical severity. Users with the Company admin role (introduced by the company account feature in v4) can assign any role to any user. This also applies to any other user that has the role / assign policy. Any subtree limitation in place does not have any effect. The role / assign policy is typically only given to ad...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.26'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-kernel/security/advisories/GHSA-8h83-chh2-fchp'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-kernel/commit/2a7479958584a15ee046dfa886d6bfeb4ebfa2f6'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-20...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T23:58:32Z', 'nvd_published_at': None}
1.4.0
GHSA-hf94-8mx5-2vvj
2022-11-23T18:47:27Z
2022-11-21T21:30:15Z
null
['CVE-2022-4105']
Cross-site Scripting in kiwitcms
A stored XSS in a kiwi Test Plan can run malicious javascript which could be chained with an HTML injection to perform a UI redressing attack (clickjacking) and an HTML injection which disables the use of the history page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'kiwitcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4105'}, {'type': 'WEB', 'url': 'https://github.com/kiwitcms/kiwi/commit/a2b169ffdef1d7c1755bade8138578423b35011b'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/386417e9-0cd5-4d80-8137-b0fd5c30b8f8'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:02:21Z', 'nvd_published_at': '2022-11-21T20:15:00Z'}
1.4.0
GHSA-58rj-w2qf-qjg7
2022-11-30T19:23:50Z
2022-11-23T03:30:22Z
null
['CVE-2022-42095']
Cross-site Scripting in Backdrop CMS
Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Page content.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'backdrop/backdrop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.23.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42095'}, {'type': 'WEB', 'url': 'https://backdropcms.org'}, {'type': 'WEB', 'url': 'https://github.com/backdrop/backdrop/releases/tag/1.23.0'}, {'type': 'WEB', 'url': 'https://github.com/bypazs/CVE-2022-42095'}, {'type': 'WEB', 'url': 'https://gith...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T22:17:36Z', 'nvd_published_at': '2022-11-23T02:15:00Z'}
1.4.0
GHSA-672p-m5jq-mrh8
2022-11-28T16:03:40Z
2022-11-21T20:38:39Z
null
['CVE-2022-36111']
Insufficient Verification of Proofs generated by the immudb server in client SDK.
### Impact In certain scenario a malicious immudb server can provide a falsified proof that will be accepted by the client SDK signing a falsified transaction replacing the genuine one. This situation can not be triggered by a genuine immudb server and requires the client to perform a specific list of verified operati...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/codenotary/immudb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/codenotary/immudb/security/advisories/GHSA-672p-m5jq-mrh8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36111'}, {'type': 'WEB', 'url': 'https://github.com/codenotary/immudb/commit/7267d67e28be8f0257b71d734611a051593e8a81'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:38:39Z', 'nvd_published_at': '2022-11-23T18:15:00Z'}
1.4.0
GHSA-fppq-mj76-fpj2
2022-11-02T18:15:35Z
2022-11-02T18:15:35Z
null
['CVE-2022-39379']
fluentd vulnerable to remote code execution due to insecure deserialization (in non-default configuration)
### Impact A remote code execution (RCE) vulnerability in non-default configurations of Fluentd allows unauthenticated attackers to execute arbitrary code via specially crafted JSON payloads. Fluentd setups are only affected if the environment variable `FLUENT_OJ_OPTION_MODE` is explicitly set to `object`. Please no...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'fluentd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.2'}, {'fixed': '1.15.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/fluent/fluentd/security/advisories/GHSA-fppq-mj76-fpj2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39379'}, {'type': 'WEB', 'url': 'https://github.com/fluent/fluentd/commit/48e5b85dab1b6d4c273090d538fc11b3f2fd8135'}, {'type': 'PACKAGE', 'url': 'h...
{'cwe_ids': ['CWE-502'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T18:15:35Z', 'nvd_published_at': '2022-11-02T13:15:00Z'}
1.4.0
GHSA-q4mp-jvh2-76fj
2022-11-16T21:52:35Z
2022-11-14T12:00:15Z
null
['CVE-2022-45199']
Pillow subject to DoS via SAMPLESPERPIXEL tag
Pillow starting with 9.2.0 and prior to 9.3.0 allows denial of service via SAMPLESPERPIXEL. A large value in the SAMPLESPERPIXEL tag could lead to a memory and runtime DOS in TiffImagePlugin.py when setting up the context for image decoding. This issue has been patched in version 9.3.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pillow'}, 'ecosystem_specific': {'affected_functions': ['PIL.TiffImagePlugin.MAX_SAMPLESPERPIXEL', 'PIL.TiffImagePlugin.TiffImageFile._setup']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.2.0'}, {'fixed': '9.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45199'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/6700'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/2444cddab2f83f28687c7c20871574acbb6dbcf3'}, {'type': 'WEB', 'url': 'https://bugs.gentoo.org...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-15T13:24:05Z', 'nvd_published_at': '2022-11-14T07:15:00Z'}
1.4.0
GHSA-g5cj-5h58-j93w
2022-11-29T23:52:36Z
2022-11-25T18:30:25Z
null
['CVE-2022-45206']
Jeecg-boot vulnerable to SQL Injection
Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/duplicate/check.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45206'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/4129'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/commit/f18ced524c9ec13e876bfb74785a1b112cc8b6bb'}, {'type': 'PACKAGE', 'url': 'https://github.co...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T23:52:36Z', 'nvd_published_at': '2022-11-25T17:15:00Z'}
1.4.0
GHSA-68m8-v89j-7j2p
2022-11-30T19:22:54Z
2022-11-21T12:30:17Z
null
['CVE-2022-45146']
Garbage collection issue in BC-FJA in Java 13 and later
An issue was discovered in the FIPS Java API of Bouncy Castle BC-FJA before 1.0.2.4. Changes to the JVM garbage collector in Java 13 and later trigger an issue in the BC-FJA FIPS modules where it is possible for temporary keys used by the module to be zeroed out while still in use by the module, resulting in errors or ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.bouncycastle:bc-fips'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45146'}, {'type': 'WEB', 'url': 'https://github.com/bcgit/bc-java/wiki/CVE-2022-45146'}, {'type': 'WEB', 'url': 'https://www.bouncycastle.org/latest_releases.html'}]
{'cwe_ids': ['CWE-416'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:01:39Z', 'nvd_published_at': '2022-11-21T10:15:00Z'}
1.4.0
GHSA-6cqj-6969-p57x
2022-11-28T16:16:29Z
2022-11-21T20:38:51Z
null
['CVE-2022-39199']
Lack of proper validation of server UUID can be used by the server to trick the client to accept invalid proofs
### Impact immudb client SDKs use server's UUID to distinguish between different server instance so that the client can connect to different immudb instances and keep the state for multiple servers. SDK does not validate this uuid and can accept any value reported by the server. A malicious server can change the repor...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/codenotary/immudb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/codenotary/immudb/security/advisories/GHSA-6cqj-6969-p57x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39199'}, {'type': 'WEB', 'url': 'https://github.com/codenotary/immudb/commit/cade04756ff3f0a3b9e8d24149062744574adf5d'}, {'type': 'PACKAGE', 'ur...
{'cwe_ids': ['CWE-345'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:38:51Z', 'nvd_published_at': '2022-11-22T20:15:00Z'}
1.4.0
GHSA-rmcx-fg5w-x8j9
2022-12-03T04:09:52Z
2022-11-28T21:30:21Z
null
['CVE-2022-45921']
FusionAuth vulnerable to directory traversal attack
FusionAuth before 1.41.3 allows a file outside of the application root to be viewed or retrieved using an HTTP request. To be specific, an attacker may be able to view or retrieve any file readable by the user running the FusionAuth process.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.fusionauth:fusionauth-java-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.37.0'}, {'fixed': '1.41.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45921'}, {'type': 'WEB', 'url': 'https://github.com/FusionAuth/fusionauth-issues/issues/1983'}, {'type': 'WEB', 'url': 'https://fusionauth.io/docs/v1/tech/release-notes'}, {'type': 'PACKAGE', 'url': 'https://github.com/FusionAuth/fusionauth-java-cl...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T21:16:58Z', 'nvd_published_at': '2022-11-28T21:15:00Z'}
1.4.0
GHSA-cm7f-hf2g-ghrp
2022-12-05T18:28:09Z
2022-11-25T18:30:25Z
null
['CVE-2022-37721']
PyroCMS vulnerable to stored Cross Site Scripting
PyroCMS 3.9 is vulnerable to a stored Cross Site Scripting (XSS) when a low privileged user, such as an author, injects a crafted html and javascript payload in a blog post, leading to full admin account takeover or privilege escalation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pyrocms/pyrocms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.9.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37721'}, {'type': 'PACKAGE', 'url': 'https://github.com/pyrocms/pyrocms'}, {'type': 'WEB', 'url': 'https://labs.integrity.pt/advisories/cve-2022-37721/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T18:28:09Z', 'nvd_published_at': '2022-11-25T17:15:00Z'}
1.4.0
GHSA-3fjj-p79j-c9hh
2022-11-28T16:17:34Z
2022-11-21T22:28:11Z
null
['CVE-2022-41919']
Fastify: Incorrect Content-Type parsing can lead to CSRF attack
### Impact The attacker can use the incorrect `Content-Type` to bypass the `Pre-Flight` checking of `fetch`. `fetch()` requests with Content-Type’s [essence](https://mimesniff.spec.whatwg.org/#mime-type-essence) as "application/x-www-form-urlencoded", "multipart/form-data", or "text/plain", could potentially be used t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'fastify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'fastify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.29.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/fastify/fastify/security/advisories/GHSA-3fjj-p79j-c9hh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41919'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify/commit/62dde76f1f7aca76e38625fe8d983761f26e6fc9'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:28:11Z', 'nvd_published_at': '2022-11-22T20:15:00Z'}
1.4.0
GHSA-x45f-j34v-75xm
2022-11-19T01:15:27Z
2022-11-13T12:00:17Z
null
['CVE-2022-3975']
NukeView CMS vulnerable to Cross-site Scripting
NukeView CMS has been found to be vulnerable to Cross-site Scripting. Affected by this issue is the function filterAttr of the file vendor/vinades/nukeviet/Core/Request.php of the component Data URL Handler. The manipulation of the argument attrSubSet leads to cross site scripting. The attack may be launched remotely. ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nukeviet/nukeviet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3975'}, {'type': 'WEB', 'url': 'https://github.com/nukeviet/nukeviet/commit/0b3197fad950bb3383e83039a8ee4c9509b3ce02'}, {'type': 'PACKAGE', 'url': 'https://github.com/nukeviet/nukeviet'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.213554'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-15T23:55:48Z', 'nvd_published_at': '2022-11-13T10:15:00Z'}
1.4.0
GHSA-gh7m-j673-wm97
2022-11-22T00:18:39Z
2022-11-17T18:30:26Z
null
['CVE-2022-43138']
Dolibarr vulnerable to privilege escalation
Dolibarr Open Source ERP & CRM for Business before v14.0.1 allows attackers to escalate privileges via a crafted API.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43138'}, {'type': 'WEB', 'url': 'https://github.com/Dolibarr/dolibarr/commit/489cff46a37b04784d8e884af7fc2ad623bee17d'}, {'type': 'PACKAGE', 'url': 'https://github.com/Dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits...
{'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:18:39Z', 'nvd_published_at': '2022-11-17T17:15:00Z'}
1.4.0
GHSA-58h5-h554-429q
2022-11-10T21:42:09Z
2022-11-10T21:42:09Z
null
[]
ezplatform-admin-ui vulnerable to Cross-Site Scripting (XSS)
It is possible to inject JavaScript XSS in the content type entries "name" and "short name". To exploit this, one must already have permission to edit content types, which limits it in many cases to people who are already administrators. However, please verify which users have this permission. The fix ensures any injec...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-admin-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.26'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui/security/advisories/GHSA-58h5-h554-429q'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui/commit/29e156a7bbecca5abd946c99546a261679587d29'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-s...
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T21:42:09Z', 'nvd_published_at': None}
1.4.0
GHSA-wg2f-9rf7-48gm
2022-12-16T14:39:48Z
2022-11-16T12:00:23Z
null
['CVE-2022-45390']
Missing permission check in Jenkins loader.io Plugin allows enumerating credentials IDs
loader.io Plugin 1.0.1 and earlier does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability. As of publication...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.loader:loaderio-jenkins-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45390'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/loaderio-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2857'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T14:39:48Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-9hqh-fmhg-vq2j
2022-11-21T22:34:57Z
2022-11-21T22:34:57Z
null
['CVE-2022-41928']
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in AttachmentSelector.xml
### Impact Any user with the right to edit his personal page can follow one of the scenario below: **Scenario 1**: - Log in as a simple user with just edit rights on the user profile - Go to the user's profile - Upload an attachment in the attachment tab at the bottom of the page (any image is fine) - Click on "rename...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-attachment-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0-milestone-1'}, {'fixed': '13.10.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-attachment-ui'}, 'ranges': [{'type': 'ECO...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9hqh-fmhg-vq2j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41928'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-1...
{'cwe_ids': ['CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:34:57Z', 'nvd_published_at': '2022-11-23T19:15:00Z'}
1.4.0
GHSA-vcvg-g8p2-3hqr
2022-11-23T21:48:11Z
2022-11-22T15:30:26Z
null
['CVE-2022-42094']
Cross-site Scripting in Backdrop CMS
Backdrop CMS version 1.23.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the 'Card' content.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'backdrop/backdrop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.23.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42094'}, {'type': 'WEB', 'url': 'https://github.com/backdrop/backdrop/releases/tag/1.23.0'}, {'type': 'WEB', 'url': 'https://github.com/bypazs/CVE-2022-42094'}, {'type': 'WEB', 'url': 'https://grimthereaperteam.medium.com/cve-2022-42094-backdrop-xs...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:14:25Z', 'nvd_published_at': '2022-11-22T13:15:00Z'}
1.4.0
GHSA-h63r-9xxf-f2c7
2022-11-03T19:33:27Z
2022-11-02T19:00:33Z
null
['CVE-2022-43982']
Apache Airflow Cross-site Scripting vulnerability
In Apache Airflow versions prior to 2.4.2, the "Trigger DAG with config" screen was susceptible to XSS attacks via the `origin` query argument.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43982'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/27143'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T18:13:18Z', 'nvd_published_at': '2022-11-02T12:15:00Z'}
1.4.0
GHSA-q48r-xg9h-78m8
2022-11-22T00:12:47Z
2022-11-15T12:00:16Z
null
['CVE-2022-43689']
Concrete CMS vulnerable to XML External Entity
Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to XXE based DNS requests leading to IP disclosure.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.2'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43689'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/913-release-n...
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:12:47Z', 'nvd_published_at': '2022-11-14T23:15:00Z'}
1.4.0
GHSA-fp35-xrrr-3gph
2022-11-02T21:45:12Z
2022-11-01T19:00:29Z
null
['CVE-2022-34662']
Apache DolphinScheduler vulnerable to Path Traversal
When users add resources to the resource center with a relation path, this vulnerability will cause path traversal issues for logged-in users. Users should upgrade to version 3.0.0 to avoid this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34662'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dolphinscheduler'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/pbdzqf9ntxyvs4cr0x2dgk9zlf43btz8'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T21:04:38Z', 'nvd_published_at': '2022-11-01T16:15:00Z'}
1.4.0
GHSA-p5g9-rjcf-95vj
2022-11-08T14:49:19Z
2022-11-04T12:00:25Z
null
['CVE-2022-41714']
fastest-json-copy vulnerable to Prototype Pollution
fastest-json-copy version 1.0.1 allows an external attacker to edit or add new properties to an object. This is possible because the application does not correctly validate the incoming JSON keys, thus allowing the `__proto__` property to be edited.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'fastest-json-copy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41714'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/guetta/'}, {'type': 'WEB', 'url': 'https://github.com/streamich/fastest-json-copy'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T14:49:19Z', 'nvd_published_at': '2022-11-03T20:15:00Z'}
1.4.0
GHSA-h4wx-78p9-fwxw
2022-12-15T21:12:06Z
2022-11-16T12:00:23Z
null
['CVE-2022-45396']
XXE vulnerability on agents in Jenkins SourceMonitor Plugin
SourceMonitor Plugin 0.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to control XML input files for the 'Publish SourceMonitor results' post-build step to have agent processes parse a crafted file that uses external entities for extraction of s...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.thalesgroup.hudson.plugins:sourcemonitor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45396'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/sourcemonitor-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2927'}]
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:24:17Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-3gfj-fxx4-f22w
2022-11-10T14:32:09Z
2022-11-08T22:31:25Z
null
['CVE-2022-39352']
OpenFGA Authorization Bypass
### Overview During our internal security assessment, it was discovered that OpenFGA versions v0.2.4 and prior are vulnerable to authorization bypass under certain conditions. ### Am I Affected? You are affected by this vulnerability if you are using `openfga/openfga` version v0.2.4 or prior, and have tuples where the...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/openfga/openfga'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.4'}}]
[{'type': 'WEB', 'url': 'https://github.com/openfga/openfga/security/advisories/GHSA-3gfj-fxx4-f22w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39352'}, {'type': 'WEB', 'url': 'https://github.com/openfga/openfga/commit/776e80505e8d184b2286acc8268d8d74f36a9984'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T22:31:25Z', 'nvd_published_at': '2022-11-08T08:15:00Z'}
1.4.0
GHSA-3vwm-fc87-mq6h
2022-12-15T19:45:46Z
2022-11-16T12:00:23Z
null
['CVE-2022-45391']
SSL/TLS certificate validation globally and unconditionally disabled by Jenkins NS-ND Integration Performance Publisher Plugin
NS-ND Integration Performance Publisher Plugin 4.8.0.143 and earlier globally and unconditionally disables SSL/TLS certificate and hostname validation for the entire Jenkins controller JVM. NS-ND Integration Performance Publisher Plugin 4.8.0.146 no longer disables SSL/TLS certificate and hostname validation globally.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:cavisson-ns-nd-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.0.146'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45391'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2910%20(1)'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:23:33Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-7wg4-8m5p-hrfg
2023-05-22T18:33:41Z
2022-11-10T12:01:03Z
null
['CVE-2022-3866']
HashiCorp Nomad vulnerable to non-sensitive metadata exposure
HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.4.1 workload identity token can list non-sensitive metadata for paths under `nomad/` that belong to other jobs in the same namespace. Fixed in 1.4.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3866'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/commit/3b24f26603e2b116ba324101afa8a7e3a7a769a5'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-25-nomad-s-workload-identity-token-can-list-non-sensitive-metad...
{'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T23:51:44Z', 'nvd_published_at': '2022-11-10T06:15:00Z'}
1.4.0
GHSA-67pf-62xr-q35m
2022-11-21T20:42:39Z
2022-11-21T20:42:39Z
null
['CVE-2022-41893']
`CHECK_EQ` fail in `tf.raw_ops.TensorListResize`
### Impact If [`tf.raw_ops.TensorListResize`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/list_kernels.cc) is given a nonscalar value for input `size`, it results `CHECK` fail which can be used to trigger a denial of service attack. ```python import numpy as np import tensorflow as tf ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-67pf-62xr-q35m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41893'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/888e34b49009a4e734c27ab0c43b0b5102682c56'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:42:39Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-8v23-w4w5-w83c
2022-11-26T20:03:11Z
2022-11-23T15:30:21Z
null
['CVE-2022-45149']
Cross-Site Request Forgery in Moodle
A vulnerability was found in Moodle which exists due to insufficient validation of the HTTP request origin in course redirect URL. A user's CSRF token was unnecessarily included in the URL when being redirected to a course they have just restored. A remote attacker can trick the victim to visit a specially crafted web ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9.0'}, {'fixed': '3.9.18'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.11'}]}]},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45149'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2142772'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DHYIIAUXUBHMBEDYU7TYNZXEN2W2SA2/'}, {'ty...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T22:20:32Z', 'nvd_published_at': '2022-11-23T15:15:00Z'}
1.4.0
GHSA-rg94-84xj-7gq3
2023-08-31T00:37:17Z
2022-11-15T12:00:15Z
null
['CVE-2022-45402']
Apache Airflow Contains Open Redirect
In Apache Airflow versions prior to 2.4.3, there was an open redirect in the webserver's `/login` endpoint.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45402'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/27576'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/nf4xrkoo6c81g6fdn4vj8k9x2686o9nh'}, {'type': '...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-18T16:10:53Z', 'nvd_published_at': '2022-11-15T09:15:00Z'}
1.4.0
GHSA-gq2j-cr96-gvqx
2022-11-21T20:44:36Z
2022-11-21T20:44:36Z
null
['CVE-2022-41895']
`MirrorPadGrad` heap out of bounds read
### Impact If [`MirrorPadGrad`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/image/mirror_pad_op.cc) is given outsize input `paddings`, TensorFlow will give a heap OOB error. ```python import tensorflow as tf tf.raw_ops.MirrorPadGrad(input=[1], paddings=[[0x77f00000,0xa0000...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gq2j-cr96-gvqx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41895'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/717ca98d8c3bba348ff62281fdf38dcb5ea1ec92'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:44:36Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-r7qp-cfhv-p84w
2022-12-08T00:47:24Z
2022-11-21T23:55:41Z
null
['CVE-2022-41940']
Uncaught exception in engine.io
### Impact A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process. ``` events.js:292 throw er; // Unhandled 'error' event ^ Error: read ECONNRESET at TCP.onStreamRead (internal/stream_base_commons.js:209:20) Emitted 'error' event o...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'engine.io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'engine.io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '6.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/socketio/engine.io/security/advisories/GHSA-r7qp-cfhv-p84w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41940'}, {'type': 'WEB', 'url': 'https://github.com/socketio/engine.io/commit/425e833ab13373edf1dd5a0706f07100db14e3c6'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-248'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:55:41Z', 'nvd_published_at': '2022-11-22T01:15:00Z'}
1.4.0
GHSA-8847-xvjw-9g43
2022-12-15T21:13:45Z
2022-11-16T12:00:23Z
null
['CVE-2022-45397']
XXE vulnerability on agents in Jenkins OSF Builder Suite : : XML Linter Plugin
OSF Builder Suite : : XML Linter 1.0.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to control XML files that get processed by the 'OSF Builder Suite : : XML Linter' build step to have agent processes parse a crafted file that uses external enti...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci:update-center2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45397'}, {'type': 'WEB', 'url': 'https://github.com/jenkins-infra/update-center2/pull/658'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2937'}, {'type': 'PACKAGE', 'url': ' https://github.com/jenkinsci/osf...
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:25:46Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-2gj2-vj98-j2qq
2022-11-21T22:35:22Z
2022-11-21T22:35:22Z
null
['CVE-2022-41929']
Missing Authorization in User#setDisabledStatus in org.xwiki.platform:xwiki-platform-oldcore
### Impact It's possible for a user with only Script rights to enable or disable a user: this operation should be only doable for users with admin rights. ### Patches This problem has been patched in XWiki 13.10.7, 14.4.2 and 14.5RC1. ### Workarounds There is no workaround other than upgrading the wiki, but note ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.7RC1'}, {'fixed': '13.10.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2gj2-vj98-j2qq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41929'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/0b732f2ef0224e2aaf10e2e1ef48dbd3fb6e10cd'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:35:22Z', 'nvd_published_at': '2022-11-23T19:15:00Z'}
1.4.0
GHSA-x93j-3hh3-6x23
2022-11-21T23:55:59Z
2022-11-20T06:30:15Z
null
['CVE-2022-4070']
Insufficient Session Expiration in librenms/librenms
Insufficient Session Expiration in GitHub repository librenms/librenms prior to 22.10.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4070'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/ce8e5f3d056829bfa7a845f9dc2757e21e419ddc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/72d426bb-b56e-4534-88ba-0d11381b0775'}]
{'cwe_ids': ['CWE-613'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:55:59Z', 'nvd_published_at': '2022-11-20T05:15:00Z'}
1.4.0
GHSA-5j7g-cf6r-g2h7
2022-11-21T22:36:34Z
2022-11-21T22:36:33Z
null
['CVE-2022-41931']
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki-platform-icon-ui
### Impact Any user with view rights on commonly accessible documents including the icon picker macro can execute arbitrary Groovy, Python or Velocity code in XWiki due to improper neutralization of the macro parameters of the icon picker macro. The URL `<server>/xwiki/bin/view/Main?sheet=CKEditor.HTMLConverter&langua...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-icon-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.4-milestone-2'}, {'fixed': '13.10.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-icon-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'ev...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-5j7g-cf6r-g2h7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41931'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/47eb8a5fba550f477944eb6da8ca91b87eaf1d01'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:36:34Z', 'nvd_published_at': '2022-11-23T20:15:00Z'}
1.4.0
GHSA-4x6g-3cmx-w76r
2022-12-06T14:15:06Z
2022-11-30T15:30:27Z
null
['CVE-2022-22984']
Snyk plugins vulnerable to Command Injection
The package snyk before 1.1064.0; the package snyk-mvn-plugin before 2.31.3; the package snyk-gradle-plugin before 3.24.5; the package @snyk/snyk-cocoapods-plugin before 2.5.3; the package snyk-sbt-plugin before 2.16.2; the package snyk-python-plugin before 1.24.2; the package snyk-docker-plugin before 5.6.5; the packa...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'snyk'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1064.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'snyk-mvn-plugin'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22984'}, {'type': 'WEB', 'url': 'https://github.com/snyk/cli/commit/80d97a93326406e09776156daf72e3caa03ae25a'}, {'type': 'WEB', 'url': 'https://github.com/snyk/snyk-cocoapods-plugin/commit/c73e049c5200772babde61c40aab57296bf91381'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T14:15:06Z', 'nvd_published_at': '2022-11-30T13:15:00Z'}
1.4.0
GHSA-5r3h-c3r7-9w4h
2022-12-18T23:19:33Z
2022-11-04T19:01:17Z
null
['CVE-2022-33684']
Apache Pulsar Disabled Certificate Validation for OAuth Client Credential Requests makes C++/Python Clients vulnerable to MITM attack
The Apache Pulsar C++ Client does not verify peer TLS certificates when making HTTPS calls for the OAuth2.0 Client Credential Flow, even when `tlsAllowInsecureConnection` is disabled via configuration. This vulnerability allows an attacker to perform a man in the middle attack and intercept and/or modify the GET reques...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pulsar-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'pulsar-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.4'}]}]}, {'package': {'eco...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33684'}, {'type': 'WEB', 'url': 'https://github.com/apache/pulsar/pull/16064'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/pulsar-client-cpp'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/df89b724-3201-47aa-b8cd-282e112a566f'}, {'...
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T14:41:17Z', 'nvd_published_at': '2022-11-04T12:15:00Z'}
1.4.0
GHSA-m5xf-x7q6-3rm7
2023-08-29T22:52:24Z
2022-11-18T17:14:39Z
null
['CVE-2022-39383']
KubeVela VelaUX APIserver has SSRF vulnerability
### Impact Users using the VelaUX APIServer could be affected by this vulnerability. When using Helm Chart as the component delivery method, the request address of the warehouse is not restricted, and there is a blind SSRF vulnerability. This issue is patched in 1.5.9 and 1.6.2. ### References Fix by: #5000 ### Fo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/oam-dev/kubevela'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0-alpha.1'}, {'fixed': '1.6.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/oam-dev/kubevela'}, 'ecosystem_specific': ...
[{'type': 'WEB', 'url': 'https://github.com/kubevela/kubevela/security/advisories/GHSA-m5xf-x7q6-3rm7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39383'}, {'type': 'WEB', 'url': 'https://github.com/kubevela/kubevela/pull/5000'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubevela/kubev...
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-18T17:14:39Z', 'nvd_published_at': '2022-11-16T20:15:00Z'}
1.4.0
GHSA-vj5r-mmp4-3hrx
2022-12-15T20:44:46Z
2022-11-16T12:00:22Z
null
['CVE-2022-38666']
SSL/TLS certificate validation unconditionally disabled by Jenkins NS-ND Integration Performance Publisher Plugin
Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.146 and earlier unconditionally disables SSL/TLS certificate and hostname validation for several features. Currently, there are no known workarounds or patches.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:cavisson-ns-nd-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.8.0.146'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38666'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin/releases'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2910%20(2)'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:19:30Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-99r3-xmmq-7q7g
2022-11-10T23:59:24Z
2022-11-10T23:59:24Z
null
[]
eZ Platform users with the Company admin role can assign any role to any user
Critical severity. Users with the Company admin role (introduced by the company account feature in v4) can assign any role to any user. This also applies to any other user that has the role / assign policy. Any subtree limitation in place does not have any effect. The role / assign policy is typically only given to ad...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.5.0'}, {'fixed': '7.5.30'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/security/advisories/GHSA-99r3-xmmq-7q7g'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezpublish-kernel/commit/957e67a08af2b3265753f9763943e8225ed779ab'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T23:59:24Z', 'nvd_published_at': None}
1.4.0
GHSA-fvw2-2pf7-77vw
2022-11-16T21:50:38Z
2022-11-14T12:00:15Z
null
['CVE-2022-27949']
Apache Airflow subject to Exposure of Sensitive Information
A vulnerability in UI of Apache Airflow allows an attacker to view unmasked secrets in rendered template values for tasks which were not executed (for example when they were depending on past and previous instances of the task failed). This issue affects Apache Airflow prior to 2.3.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27949'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/22754'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/n38oc5obb48600fsvnbopxcs0jpbp65p'}, {'type': '...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-16T03:48:38Z', 'nvd_published_at': '2022-11-14T10:15:00Z'}
1.4.0
GHSA-8q72-6qq8-xv64
2022-11-01T18:11:07Z
2022-11-01T18:11:07Z
null
['CVE-2022-39369']
phpCAS vulnerable to Service Hostname Discovery Exploitation
### Impact The phpCAS library uses HTTP headers to determine the service URL used to validate tickets. This allows an attacker to control the host header and use a valid ticket granted for any authorized service in the same SSO realm (CAS server) to authenticate to the service protected by phpCAS. Depending on the se...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'apereo/phpcas'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/apereo/phpCAS/security/advisories/GHSA-8q72-6qq8-xv64'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39369'}, {'type': 'WEB', 'url': 'https://github.com/apereo/phpCAS/commit/b759361d904a2cb2a3bcee9411fc348cfde5d163'}, {'type': 'PACKAGE', 'url': 'htt...
{'cwe_ids': ['CWE-1287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T18:11:07Z', 'nvd_published_at': '2022-11-01T17:15:00Z'}
1.4.0
GHSA-f9fq-78ch-4wmj
2022-11-03T19:33:34Z
2022-11-02T19:00:32Z
null
['CVE-2022-43985']
Apache Airflow Open Redirect vulnerability
In Apache Airflow versions prior to 2.4.2, there was an open redirect in the webserver's `/confirm` endpoint.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43985'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/27143'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T18:12:26Z', 'nvd_published_at': '2022-11-02T12:15:00Z'}
1.4.0
GHSA-wqg7-mx6p-2rw3
2022-11-26T20:17:43Z
2022-11-23T09:30:24Z
null
['CVE-2022-45462']
Command injection in Apache DolphinScheduler Alert Plugins
Alarm instance management has command injection when there is a specific command configured. It is only for logged-in users. We recommend you upgrade to version 2.0.6 or higher.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler-alert-plugins'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45462'}, {'type': 'WEB', 'url': 'https://github.com/apache/dolphinscheduler/pull/10744'}, {'type': 'WEB', 'url': 'https://github.com/apache/dolphinscheduler/pull/9834'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dolphinscheduler'}, {'ty...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T22:19:42Z', 'nvd_published_at': '2022-11-23T09:15:00Z'}
1.4.0
GHSA-298r-5c48-7q2r
2022-12-15T18:49:47Z
2022-11-16T12:00:22Z
null
['CVE-2022-45380']
Jenkins JUnit Plugin subject to Cross-site Scripting via URL conversion
JUnit Plugin 1159.v0b_396e1e07dd and earlier converts HTTP(S) URLs in test report output to clickable links. This is done in an unsafe manner, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. JUnit Plugin 1160.vf1f01a_a_ea_b_7f no longer converts ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:junit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1160.vf1f01a_a_ea_b_7f'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1159.v0b'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45380'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/junit-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2888'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:20:55Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-m74x-fxjh-3qh9
2022-11-30T21:22:44Z
2022-11-19T00:30:55Z
null
['CVE-2022-38871']
Free5gc vulnerable to uncontrolled resource consumption
In Free5gc v3.0.5, the AMF breaks due to malformed NAS messages.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/free5gc/free5gc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 3.0.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38871'}, {'type': 'WEB', 'url': 'https://github.com/free5gc/free5gc/issues/198'}, {'type': 'PACKAGE', 'url': 'https://github.com/free5gc/free5gc'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T21:22:44Z', 'nvd_published_at': '2022-11-18T23:15:00Z'}
1.4.0
GHSA-mxvq-cv4x-p3jw
2022-11-21T23:49:59Z
2022-11-15T12:00:16Z
null
['CVE-2022-42130']
Incorrect Default Permissions in Liferay Portal
The Dynamic Data Mapping module in Liferay Portal 7.1.0 through 7.4.3.4, and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 19, 7.3 before update 4, and 7.4 GA does not properly check permission of form entries, which allows remote authenticated users to view and access all form entries.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.4.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42130'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17447'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42130'}]
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:49:59Z', 'nvd_published_at': '2022-11-15T02:15:00Z'}
1.4.0
GHSA-47fc-vmwq-366v
2023-01-06T22:29:57Z
2022-11-26T03:30:27Z
null
['CVE-2022-45907']
PyTorch vulnerable to arbitrary code execution
In PyTorch before trunk/89695, torch.jit.annotations.parse_type_line can cause arbitrary code execution because eval is used unsafely. The fix for this issue is available in version 1.13.1. There is a release checker in [issue #89855](https://github.com/pytorch/pytorch/issues/89855).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'torch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.13.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45907'}, {'type': 'WEB', 'url': 'https://github.com/pytorch/pytorch/issues/88868'}, {'type': 'WEB', 'url': 'https://github.com/pytorch/pytorch/issues/89855'}, {'type': 'WEB', 'url': 'https://github.com/pytorch/pytorch/pull/89189'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:28:40Z', 'nvd_published_at': '2022-11-26T02:15:00Z'}
1.4.0
GHSA-prjq-f4q3-fvfr
2023-08-30T00:09:03Z
2022-11-15T19:05:07Z
null
['CVE-2020-7731']
github.com/russellhaering/gosaml2 is vulnerable to NULL Pointer Dereference
### Impact In versions prior to v0.7.0 it was possible for an attacker to supply an invalid assertion which would trigger a panic due to a nil-pointer dereference. ### Patches The issue was patched in v0.7.0, released on March 2, 2022. ### Workarounds Callers to `gosaml2` can use `recover()` to handle panics to mitig...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/russellhaering/gosaml2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/russellhaering/goxmldsig'}, 'ecosystem_specific'...
[{'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/security/advisories/GHSA-prjq-f4q3-fvfr'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/issues/59'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/goxmldsig/issues/48'}, {'type': 'ADVISORY', 'url': 'https://github.com/ad...
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-15T19:05:07Z', 'nvd_published_at': None}
1.4.0
GHSA-cv9g-h8mm-xx5h
2022-11-21T23:57:13Z
2022-11-20T06:30:16Z
null
['CVE-2022-3525']
Deserialization of Untrusted Data in librenms/librenms
Deserialization of Untrusted Data in GitHub repository librenms/librenms prior to 22.10.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3525'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/ae3925b09ad3c5d0f7a9d5a26ae2f2f778834948'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ed048e8d-87af-440a-a91f-be1e65a40330'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:57:13Z', 'nvd_published_at': '2022-11-20T05:15:00Z'}
1.4.0
GHSA-vqp6-rc3h-83cp
2022-11-21T22:34:00Z
2022-11-21T22:34:00Z
null
['CVE-2022-41924']
Tailscale Windows daemon is vulnerable to RCE via CSRF
A vulnerability identified in the Tailscale Windows client allows a malicious website to reconfigure the Tailscale daemon `tailscaled`, which can then be used to remotely execute code. **Affected platforms:** Windows **Patched Tailscale client versions:** v1.32.3 or later, v1.33.257 or later (unstable) ### What happe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'tailscale.com'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.32.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tailscale/tailscale/security/advisories/GHSA-vqp6-rc3h-83cp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41924'}, {'type': 'WEB', 'url': 'https://emily.id.au/tailscale'}, {'type': 'PACKAGE', 'url': 'https://github.com/tailscale/tailscale'}, {'type...
{'cwe_ids': ['CWE-346', 'CWE-352'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:34:00Z', 'nvd_published_at': '2022-11-23T19:15:00Z'}
1.4.0
GHSA-27rc-728f-x5w2
2022-11-21T21:54:26Z
2022-11-21T21:54:26Z
null
['CVE-2022-41899']
`CHECK` fail via inputs in `SdcaOptimizer`
### Impact Inputs `dense_features` or `example_state_data` not of rank 2 will trigger a `CHECK` fail in [`SdcaOptimizer`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/sdca_internal.cc). ```python import tensorflow as tf tf.raw_ops.SdcaOptimizer( sparse_example_indices=4 * [tf.rando...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-27rc-728f-x5w2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41899'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/80ff197d03db2a70c6a111f97dcdacad1b0babfa'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20', 'CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T21:54:26Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-cx84-43xc-3gm2
2022-11-21T23:50:16Z
2022-11-15T12:00:16Z
null
['CVE-2022-42131']
Improper Certificate Validation in Liferay Portal
Certain Liferay products are affected by: Missing SSL Certificate Validation in the Dynamic Data Mapping module's REST data providers. This affects Liferay Portal 7.1.0 through 7.4.2 and Liferay DXP 7.1 before fix pack 27, 7.2 before fix pack 17, and 7.3 before service pack 3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.4.3.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42131'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17377'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42131'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:50:16Z', 'nvd_published_at': '2022-11-15T02:15:00Z'}
1.4.0
GHSA-446q-xxg5-3vhh
2022-11-10T23:57:04Z
2022-11-10T23:57:04Z
null
[]
eZ Platform users with the Company admin role can assign any role to any user
Critical severity. Users with the Company admin role (introduced by the company account feature in v4) can assign any role to any user. This also applies to any other user that has the role / assign policy. Any subtree limitation in place does not have any effect. The role / assign policy is typically only given to ad...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/repository-forms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.15'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/repository-forms/security/advisories/GHSA-446q-xxg5-3vhh'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/repository-forms/commit/cac51487f8a10e48448399bedb45a519874f1006'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T23:57:04Z', 'nvd_published_at': None}
1.4.0
GHSA-pp3f-xrw5-q5j4
2023-08-29T19:39:52Z
2022-11-21T22:31:31Z
null
['CVE-2022-41920']
Lancet vulnerable to path traversal when unzipping files
### Impact _What kind of vulnerability is it? Who is impacted?_ ZipSlip issue when use fileutil package to unzip files. ### Patches _Has the problem been patched? What versions should users upgrade to?_ It will fixed in v2.1.10, Please upgrade version to v2.1.10 or above. Users who use v1.x.x should upgrade v1.3.4 o...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/duke-git/lancet/v2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/duke-git/lancet'}, 'ecosystem_specific': {'affe...
[{'type': 'WEB', 'url': 'https://github.com/duke-git/lancet/security/advisories/GHSA-pp3f-xrw5-q5j4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41920'}, {'type': 'WEB', 'url': 'https://github.com/duke-git/lancet/issues/62'}, {'type': 'WEB', 'url': 'https://github.com/duke-git/lancet/commit...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:31:31Z', 'nvd_published_at': '2022-11-17T18:15:00Z'}
1.4.0
GHSA-6rjv-xxgr-v57x
2022-11-08T15:08:39Z
2022-11-05T19:00:42Z
null
['CVE-2022-3869']
Froxlor vulnerable to code injection
Code Injection in GitHub repository froxlor/froxlor prior to version 0.10.38.2. There are currently no known workarounds, please upgrade to version 0.10.38.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.38.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3869'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/3f10a4adede9df83408d60ded78b51b812a763a8'}, {'type': 'PACKAGE', 'url': 'https://github.com/froxlor/froxlor/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7de20f21-4a9...
{'cwe_ids': ['CWE-79', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-07T16:09:23Z', 'nvd_published_at': '2022-11-05T14:15:00Z'}
1.4.0
GHSA-cm43-f2pv-6v68
2022-11-28T21:06:45Z
2022-11-22T12:30:22Z
null
['CVE-2022-41131']
OS Command Injection in Apache Airflow
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Apache Airflow Hive Provider, Apache Airflow allows an attacker to execute arbtrary commands in the task execution context, without write access to DAG files. This issue affects Hive Provider versions prior to 4....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-apache-hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41131'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/27647'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/wwo3qp0z8gv54yzn7hr04wy4n8gb0vhl'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T18:30:58Z', 'nvd_published_at': '2022-11-22T10:15:00Z'}
1.4.0
GHSA-r3qr-vwvg-43f7
2022-12-03T04:10:07Z
2022-11-30T21:22:23Z
null
['CVE-2022-41965']
Authenticated OpenRedirect Vulnerability
**Description** Prior to Opencast 12.5 Opencast's Paella authentication page could be used to redirect to an arbitrary URL for authenticated users. **Impact** The vulnerability allows attackers to redirect users to sites outside of your Opencast install, potentially facilitating phishing attacks or other security issu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opencastproject:opencast-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/opencast/opencast/security/advisories/GHSA-r3qr-vwvg-43f7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41965'}, {'type': 'WEB', 'url': 'https://github.com/opencast/opencast/commit/d2ce2321590f86b066a67e8c231cf68219aea017'}, {'type': 'PACKAGE', 'ur...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T21:22:23Z', 'nvd_published_at': '2022-11-28T21:15:00Z'}
1.4.0
GHSA-6pw3-8h9w-32gc
2022-11-16T21:51:08Z
2022-11-14T12:00:15Z
null
['CVE-2022-40127']
Apache Airflow vulnerable to OS Command Injection via example DAGs
A vulnerability in Example Dags of Apache Airflow allows an attacker with UI access who can trigger DAGs, to execute arbitrary commands via manually provided run_id parameter. This issue affects Apache Airflow versions prior to 2.4.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40127'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/25960'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/372e699c2d1e11f7087b5340454d0a0a6a56fbf5'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airf...
{'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-16T03:52:20Z', 'nvd_published_at': '2022-11-14T10:15:00Z'}
1.4.0
GHSA-97w9-gcc7-vr8g
2023-07-19T19:58:50Z
2022-11-16T12:00:20Z
null
['CVE-2021-4240']
Insufficient Entropy in PHPServerMon PRNG
A vulnerability, which was classified as problematic, was found in phpservermon. This affects the function `generatePasswordResetToken` of the file `src/psm/Service/User.php`. The manipulation leads to use of predictable algorithm in random number generator. The exploit has been disclosed to the public and may be used....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpservermon/phpservermon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4240'}, {'type': 'WEB', 'url': 'https://github.com/phpservermon/phpservermon/commit/3daa804d5f56c55b3ae13bfac368bb84ec632193'}, {'type': 'PACKAGE', 'url': 'https://github.com/phpservermon/phpservermon'}, {'type': 'WEB', 'url': 'https://huntr.dev/bo...
{'cwe_ids': ['CWE-1241', 'CWE-330', 'CWE-331'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T19:27:56Z', 'nvd_published_at': '2022-11-15T23:15:00Z'}
1.4.0
GHSA-wh6w-3828-g9qf
2022-11-15T01:13:48Z
2022-11-10T21:16:22Z
null
['CVE-2022-39393']
Wasmtime may have data leakage between instances in the pooling allocator
### Impact There is a bug in Wasmtime's implementation of it's pooling instance allocator where when a linear memory is reused for another instance the initial heap snapshot of the prior instance can be visible, erroneously to the next instance. The pooling instance allocator in Wasmtime works by preallocating virtual...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-wh6w-3828-g9qf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39393'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/commit/2614f2e9d2d36805ead8a8da0fa0c6e0d9e428a0'}, {'type'...
{'cwe_ids': ['CWE-212', 'CWE-226'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T21:16:22Z', 'nvd_published_at': '2022-11-10T20:15:00Z'}
1.4.0
GHSA-3p7g-wrgg-wq45
2022-11-10T21:35:49Z
2022-11-10T21:35:49Z
null
[]
GraphQL queries can expose password hashes
### Impact Unauthenticated GraphQL queries for user accounts can expose password hashes of users that have created or modified content, typically but not necessarily limited to administrators and editors. ### Patches Affected versions: Ibexa DXP v3.3.\*, v4.2.\*, eZ Platform v2.5.\* Resolving versions: Ibexa DXP v3.3....
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ibexa/graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.31'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'ibexa/graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.3'}]}]}, {'...
[{'type': 'WEB', 'url': 'https://github.com/ibexa/graphql/security/advisories/GHSA-3p7g-wrgg-wq45'}, {'type': 'WEB', 'url': 'https://github.com/ibexa/graphql/commit/5ae5fb4d1d292ddde8528e040ef8a7c8dd7f9c6d'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-009-critical-vulnerabilit...
{'cwe_ids': ['CWE-916'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T21:35:49Z', 'nvd_published_at': None}
1.4.0
GHSA-8jh9-wqpf-q52c
2022-11-23T15:49:51Z
2022-11-23T15:49:51Z
null
[]
sweetalert2 v8.19.1 and above contains hidden functionality
`sweetalert2` versions 8.19.1 and up until 9.0.0 are vulnerable to hidden functionality that was introduced by the maintainer. The package outputs audio and/or video messages that do not pertain to the functionality of the package and is not included in versions below 8.19.1. ### Workaround Use a version < 8.19.1 of t...
[]
[{'package': {'ecosystem': 'npm', 'name': 'sweetalert2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.19.1'}]}], 'database_specific': {'last_known_affected_version_range': '< 9.0.0'}}]
[{'type': 'PACKAGE', 'url': 'https://github.com/sweetalert2/sweetalert2'}, {'type': 'WEB', 'url': 'https://github.com/sweetalert2/sweetalert2/releases/tag/v11.4.9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/sweetalert2'}]
{'cwe_ids': ['CWE-912'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T15:49:51Z', 'nvd_published_at': None}
1.4.0
GHSA-j43m-4pxc-hmqj
2022-11-21T22:29:44Z
2022-11-16T19:00:31Z
null
['CVE-2022-44071']
Cross-site Scripting in Zenario
Zenario CMS 9.3.57186 is is vulnerable to Cross Site Scripting (XSS) via profile.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.3.57186'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44071'}, {'type': 'WEB', 'url': 'https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/5'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:29:44Z', 'nvd_published_at': '2022-11-16T16:15:00Z'}
1.4.0
GHSA-9gh8-wp53-ccc6
2022-12-30T01:41:15Z
2022-11-28T22:06:24Z
null
['CVE-2022-41654']
ghost vulnerable to unauthorized newsletter modification via improper access controls
### Impact On sites where members is enabled (this is the default) it is possible for members (unprivileged users) to make changes to newsletter settings. This gives unprivileged users the ability to view and change settings they were not intended to have access to. They are not able to escalate their privileges perma...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.22.7'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'ghost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.46.0'}, {'fixed': '4.48.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TryGhost/Ghost/security/advisories/GHSA-9gh8-wp53-ccc6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41654'}, {'type': 'WEB', 'url': 'https://forum.ghost.org/t/security-update-available-for-ghost-4-48-7-and-5-22-6/34475'}, {'type': 'PACKAGE', 'url'...
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-28T22:06:24Z', 'nvd_published_at': '2022-12-22T10:15:00Z'}
1.4.0
GHSA-vq39-q549-g786
2022-11-22T00:12:10Z
2022-11-15T12:00:17Z
null
['CVE-2022-43967']
Concrete CMS vulnerable to Cross-site Scripting via multilingual report
Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to Reflected XSS in the multilingual report due to un-sanitized output. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.3'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43967'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/913-release-n...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:12:10Z', 'nvd_published_at': '2022-11-14T22:15:00Z'}
1.4.0
GHSA-8fvv-46hw-vpg3
2022-11-21T20:41:35Z
2022-11-21T20:41:35Z
null
['CVE-2022-41887']
Overflow in `tf.keras.losses.poisson`
### Impact [`tf.keras.losses.poisson`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/python/keras/losses.py) receives a `y_pred` and `y_true` that are passed through `functor::mul` in [`BinaryOp`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/cwise_ops_common.h). If the ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.1'}]}]}, {'package': {'ecosyst...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8fvv-46hw-vpg3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41887'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c5b30379ba87cbe774b08ac50c1f6d36df4ebb7c'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-131'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:41:35Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-99g5-5643-xphp
2022-11-15T19:57:01Z
2022-11-10T19:01:05Z
null
['CVE-2021-40289']
mm-wiki is vulnerable to Cross-Site Scripting (XSS)
mm-wki v0.2.1 is vulnerable to Cross Site Scripting (XSS).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/phachon/mm-wiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40289'}, {'type': 'WEB', 'url': 'https://github.com/phachon/mm-wiki/issues/319'}, {'type': 'PACKAGE', 'url': 'https://github.com/phachon/mm-wiki'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T22:20:01Z', 'nvd_published_at': '2022-11-10T18:15:00Z'}
1.4.0
GHSA-v42f-hq78-8c5m
2022-11-26T20:03:44Z
2022-11-23T09:30:24Z
null
['CVE-2022-4045']
Denial of service in Mattermost
A denial-of-service vulnerability in the Mattermost allows an authenticated user to crash the server via multiple requests to one of the API endpoints which could fetch a large amount of data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4045'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}, {'type': 'PACKAGE', 'url': 'https://pkg.go.dev/github.com/mattermost/mattermost-server'}]
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T22:20:17Z', 'nvd_published_at': '2022-11-23T07:15:00Z'}
1.4.0
GHSA-wv7w-rj2x-556x
2022-11-10T14:31:07Z
2022-11-07T19:00:20Z
null
['CVE-2022-37866']
Apache Ivy vulnerable to path traversal
When Apache Ivy downloads artifacts from a repository it stores them in the local file system based on a user-supplied "pattern" that may include placeholders for artifacts coordinates like the organisation, module or version. If said coordinates contain "../" sequences - which are valid characters for Ivy coordinates ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ivy:ivy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37866'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/htxbr8oc464hxrgroftnz3my70whk93b'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDIFDL5WSBEKBUVKTABUFDDD25SB...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-07T21:54:25Z', 'nvd_published_at': '2022-11-07T14:15:00Z'}
1.4.0
GHSA-5h77-4245-pg5p
2022-11-21T23:56:49Z
2022-11-20T06:30:16Z
null
['CVE-2022-3562']
Cross-site Scripting in librenms/librenms
Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.10.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3562'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/43cb72549d90e338f902b359a83c23d3cb5a2645'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bb9f76db-1314-44ae-9ccc-2b69679aa657'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:56:49Z', 'nvd_published_at': '2022-11-20T05:15:00Z'}
1.4.0
GHSA-463w-hxfv-g9f6
2022-11-22T00:17:45Z
2022-11-15T19:00:52Z
null
['CVE-2022-40308']
Apache Archiva vulnerable to Sensitive Information Disclosure via anonymous user
Apache Archiva prior to 2.2.9 may allow the anonymous user to read arbitrary files. If anonymous read enabled, it's possible to read the database file directly without logging in.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.archiva:archiva-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40308'}, {'type': 'WEB', 'url': 'https://archiva.apache.org/security.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/archiva'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/x01pnn0jjsw512cscxsbxzrjmz64n4cc'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-200', 'CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:17:45Z', 'nvd_published_at': '2022-11-15T13:15:00Z'}
1.4.0
GHSA-4wfh-48v4-3r84
2022-11-23T18:46:07Z
2022-11-21T18:30:38Z
null
['CVE-2022-45470']
Cross-site Scripting in Apache Hama
Missing input validation in Apache Hama may cause information disclosure through path traversal and XSS. Since Apache Hama is EOL, we do not expect these issues to be fixed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hama:hama-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45470'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ztvoshd4kxvp5vlro52mpgpfxct4ft8l'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/11/21/1'}]
{'cwe_ids': ['CWE-20', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:01:56Z', 'nvd_published_at': '2022-11-21T16:15:00Z'}
1.4.0
GHSA-ggrh-grj3-vfvw
2022-11-28T23:00:22Z
2022-11-28T23:00:22Z
null
[]
Package discontinued because Bitly lowered the free quota
On November 17, 2022, an email was received from Bitly advising that the new link quota per free token is lowered to 50 per month (from its previous value of 1000 per month). As per the email, this change is effective on December 8, 2022. The new quota is so low as to not be useful. For this reason, the maintenance of...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'bitlyshortener'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/impredicative/bitlyshortener/security/advisories/GHSA-ggrh-grj3-vfvw'}, {'type': 'PACKAGE', 'url': 'https://github.com/impredicative/bitlyshortener'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-28T23:00:22Z', 'nvd_published_at': None}
1.4.0
GHSA-925r-r6rp-2jj7
2022-11-16T21:44:44Z
2022-11-11T19:00:31Z
null
['CVE-2022-3952']
ManyDesigns Portofino subject to creation of insecure temporary file
A vulnerability has been found in ManyDesigns Portofino 5.3.2. Affected by this vulnerability is the function createTempDir of the file WarFileLauncher.java. The manipulation leads to creation of temporary file in directory with insecure permissions. Upgrading to version 5.3.3 is able to address this issue. The name of...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.manydesigns:portofino'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3952'}, {'type': 'WEB', 'url': 'https://github.com/ManyDesigns/Portofino/pull/580'}, {'type': 'WEB', 'url': 'https://github.com/ManyDesigns/Portofino/commit/94653cb357806c9cf24d8d294e6afea33f8f0775'}, {'type': 'PACKAGE', 'url': 'https://github.com/...
{'cwe_ids': ['CWE-377', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-16T00:00:50Z', 'nvd_published_at': '2022-11-11T14:15:00Z'}
1.4.0
GHSA-p72g-cgh9-ghjg
2022-11-18T06:15:49Z
2022-11-09T17:20:03Z
null
['CVE-2022-39368']
Failing DTLS handshakes may cause throttling to block processing of records
### Impact Failing handshakes didn't cleanup counters for throttling. In consequence the threshold may get reached and will not be released again. The results in permanently dropping records. The issues was reported for certificate based handshakes, but it can't be excluded, that this happens also for PSK based handsh...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.californium:scandium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.californium:scandium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'...
[{'type': 'WEB', 'url': 'https://github.com/eclipse-californium/californium/security/advisories/GHSA-p72g-cgh9-ghjg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39368'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-californium/californium/issues/2065'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-09T17:20:03Z', 'nvd_published_at': '2022-11-10T00:15:00Z'}
1.4.0
GHSA-236j-rfx5-wq38
2023-09-07T17:49:24Z
2022-11-03T19:00:24Z
null
['CVE-2021-37823']
OpenCart SQL injection vulnerability
OpenCart 3.0.3.7 allows users to obtain database information or read server files through SQL injection in the background.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'opencart/opencart'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.3.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37823'}, {'type': 'PACKAGE', 'url': 'https://github.com/opencart/opencart'}, {'type': 'WEB', 'url': 'https://medium.com/@nowczj/sql-injection-exists-in-the-background-of-opencart-d41b5c58e99e'}]
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:58:09Z', 'nvd_published_at': '2022-11-03T17:15:00Z'}
1.4.0
GHSA-54pp-c6pp-7fpx
2022-11-21T20:40:55Z
2022-11-21T20:40:55Z
null
['CVE-2022-41886']
Overflow in `ImageProjectiveTransformV2`
### Impact When [`tf.raw_ops.ImageProjectiveTransformV2`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/image/image_ops.cc) is given a large output shape, it overflows. ```python import tensorflow as tf interpolation = "BILINEAR" fill_mode = "REFLECT" images = tf.constant(0.184634328, sh...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-54pp-c6pp-7fpx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41886'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8faa6ea692985dbe6ce10e1a3168e0bd60a723ba'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-131'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:40:55Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-9fmc-5fq4-5jwh
2022-11-10T23:51:03Z
2022-11-10T12:01:03Z
null
['CVE-2022-3867']
HashiCorp Nomad vulnerable to Insufficient Session Expiration
HashiCorp Nomad and Nomad Enterprise 1.4.0 up to 1.4.1 event stream subscribers using a token with TTL receive updates until token garbage is collected. Fixed in 1.4.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3867'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/commit/dd6a4634a9652197fe4182e830f9a737d0ae1216'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-26-nomad-s-event-stream-subscriber-using-acl-token-with-ttl-rec...
{'cwe_ids': ['CWE-613'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T23:51:03Z', 'nvd_published_at': '2022-11-10T06:15:00Z'}
1.4.0
GHSA-5m7g-pj8w-7593
2022-11-18T06:13:43Z
2022-11-09T19:17:21Z
null
['CVE-2022-39395']
Vela Insecure Defaults
### Impact Some current default configurations for Vela allow exploitation and container breakouts. #### Default Privileged Images Running Vela plugins as privileged Docker containers allows a malicious user to easily break out of the container and gain access to the worker host operating system. On a fresh install o...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/go-vela/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/go-vela/worker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/go-vela/server/security/advisories/GHSA-5m7g-pj8w-7593'}, {'type': 'WEB', 'url': 'https://github.com/go-vela/ui/security/advisories/GHSA-xf39-98m2-889v'}, {'type': 'WEB', 'url': 'https://github.com/go-vela/worker/security/advisories/GHSA-2w78-ffv6-p46w'}, {'type': 'ADVISORY',...
{'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-09T19:17:21Z', 'nvd_published_at': '2022-11-10T18:15:00Z'}
1.4.0
GHSA-93vw-8fm5-p2jf
2023-08-21T18:17:08Z
2022-11-10T13:02:35Z
null
['CVE-2022-41879']
Parse Server is vulnerable to Prototype Pollution via Cloud Code Webhooks
### Impact A compromised Parse Server Cloud Code Webhook target endpoint allows an attacker to use prototype pollution to bypass the Parse Server `requestKeywordDenylist` option. ### Patches Improved keyword detection. ### Workarounds None. ### Collaborators Mikhail Shcherbakov, Cristian-Alexandru Staicu and Mus...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.20'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges'...
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-93vw-8fm5-p2jf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41879'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/pull/8305'}, {'type': 'WEB', 'url': 'https://github....
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T13:02:35Z', 'nvd_published_at': '2022-11-10T21:15:00Z'}
1.4.0
GHSA-hrpp-h998-j3pp
2023-01-18T23:00:03Z
2022-11-27T00:30:50Z
null
['CVE-2022-24999']
qs vulnerable to Prototype Pollution
qs before 6.10.3 allows attackers to cause a Node process hang because an `__ proto__` key can be used. In many typical web framework use cases, an unauthenticated remote attacker can place the attack payload in the query string of the URL that is used to visit the application, such as `a[__proto__]=b&a[__proto__]&a[le...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'qs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.10.0'}, {'fixed': '6.10.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'qs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.9.0'}, {'fixed': '6.9.7'}]}]}, {'package': {'ecosystem': 'npm', 'n...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24999'}, {'type': 'WEB', 'url': 'https://github.com/ljharb/qs/pull/428'}, {'type': 'WEB', 'url': 'https://github.com/ljharb/qs/commit/4310742efbd8c03f6495f07906b45213da0a32ec'}, {'type': 'WEB', 'url': 'https://github.com/ljharb/qs/commit/727ef5d346...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T14:32:46Z', 'nvd_published_at': '2022-11-26T22:15:00Z'}
1.4.0
GHSA-jj93-4jr5-x45h
2022-11-03T19:33:42Z
2022-11-02T19:00:31Z
null
['CVE-2022-43670']
Apache Sling App CMS vulnerable to Cross-site Scripting
A Cross-site Scripting vulnerability in Sling App CMS version 1.1.0 and prior may allow an authenticated remote attacker to perform a reflected cross site scripting (XSS) attack in the taxonomy management feature.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.sling:org.apache.sling.cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43670'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/sling-org-apache-sling-app-cms'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/o68l3l3crfxz107fr9dm74y8vg8kj2cs'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-s...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T18:12:03Z', 'nvd_published_at': '2022-11-02T13:15:00Z'}
1.4.0
GHSA-c7pc-pgf6-mfh5
2022-11-10T21:46:14Z
2022-11-10T21:46:14Z
null
['CVE-2022-41876']
ezplatform-graphql GraphQL queries can expose password hashes
### Impact Unauthenticated GraphQL queries for user accounts can expose password hashes of users that have created or modified content, typically but not necessarily limited to administrators and editors. ### Patches Resolving versions: Ibexa DXP v1.0.13, v2.3.12 ### Workarounds Remove the "passwordHash" entry from ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0-rc1'}, {'fixed': '1.0.13'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2...
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-graphql/security/advisories/GHSA-c7pc-pgf6-mfh5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41876'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-009-critical-vulnerabilities-in-graphq...
{'cwe_ids': ['CWE-200', 'CWE-922'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T21:46:14Z', 'nvd_published_at': '2022-11-10T21:15:00Z'}