schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-4x5r-6v26-7j4v | 2022-11-21T22:36:49Z | 2022-11-21T22:36:49Z | null | ['CVE-2022-41932'] | Creation of new database tables through login form on PostgreSQL | ### Impact
It's possible to make XWiki create many new schemas and fill them with tables just by using a crafted user identifier in the login form.
### Patches
The problem has been patched in XWiki 13.10.8, 14.6RC1 and 14.4.2.
### Workarounds
The only workarounds for this are:
* use an authenticator which does int... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4x5r-6v26-7j4v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41932'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-1... | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:36:49Z', 'nvd_published_at': '2022-11-23T21:15:00Z'} |
1.4.0 | GHSA-r4jg-5v89-9v62 | 2022-11-09T22:35:46Z | 2022-11-08T20:48:49Z | 2022-11-09T22:35:46Z | ['CVE-2022-39390'] | Withdrawn: Octocat.js vulnerable to code injection | ## Withdrawn
This advisory has been withdrawn because it is a test.
## Original Description
### Impact
Users can include their own images for accessories via provided URLs. These URLs are not validated and can result in execution of injected code.
### Patches
This vulnerability was fixed in version 1.2 of octocat.j... | [] | [{'package': {'ecosystem': 'npm', 'name': 'octocat.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/octocademy/octocat.js/security/advisories/GHSA-r4jg-5v89-9v62'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39390'}, {'type': 'PACKAGE', 'url': 'https://github.com/octocademy/octocat.js'}] | {'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T20:48:49Z', 'nvd_published_at': '2022-11-09T01:15:00Z'} |
1.4.0 | GHSA-qccm-wmcq-pwr6 | 2022-12-01T22:12:32Z | 2022-11-21T22:34:22Z | null | ['CVE-2022-41925'] | Tailscale daemon is vulnerable to information disclosure via CSRF | A vulnerability identified in the Tailscale client allows a malicious website to access the peer API, which can then be used to access Tailscale environment variables.
**Affected platforms:** All
**Patched Tailscale client versions:** v1.32.3 or later, v1.33.257 or later (unstable)
### What happened?
In the Tailscale... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'tailscale.com/cmd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.32.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tailscale/tailscale/security/advisories/GHSA-qccm-wmcq-pwr6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41925'}, {'type': 'WEB', 'url': 'https://emily.id.au/tailscale'}, {'type': 'PACKAGE', 'url': 'https://github.com/tailscale/tailscale'}, {'type... | {'cwe_ids': ['CWE-200', 'CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:34:22Z', 'nvd_published_at': '2022-11-23T19:15:00Z'} |
1.4.0 | GHSA-q9wv-22m9-vhqh | 2023-02-28T16:52:02Z | 2022-11-08T17:33:26Z | null | ['CVE-2022-41874'] | Tauri Filesystem Scope can be Partially Bypassed | ### Impact
Due to incorrect escaping of special characters in paths selected via the file dialog and drag and drop functionality, it was possible to partially bypass the `fs` scope definition. It was not possible to traverse into arbitrary paths, as the issue was limited to neighboring files and sub folders of already... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'Tauri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.7'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'Tauri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/security/advisories/GHSA-q9wv-22m9-vhqh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41874'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/issues/5234'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/p... | {'cwe_ids': ['CWE-284'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T17:33:26Z', 'nvd_published_at': '2022-11-10T21:15:00Z'} |
1.4.0 | GHSA-9mfc-chwf-7whf | 2022-11-02T18:14:01Z | 2022-11-02T18:14:01Z | null | [] | ckb: Large dep group requires a lot of resources to process but the cost to commit the transaction is very low. | ### Impact
When a transaction contains a dep group with many cells, the resources required to process it are not linear to the transaction size nor spent script cycles.
### Patches
In 0.43.3, nodes drop the transactions relayed to them when they contain a dep group with more than 64 cells. They do not ban peers who... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.43.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-9mfc-chwf-7whf'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervosnetwork/ckb'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T18:14:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3ppm-fwhm-qqg6 | 2022-11-10T21:47:09Z | 2022-11-09T19:02:23Z | null | ['CVE-2022-43320'] | FeehiCMS is vulnerable to Cross-Site Scripting (XSS) | FeehiCMS v2.1.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the id parameter at /web/admin/index.php?r=log%2Fview-layer. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43320'}, {'type': 'WEB', 'url': 'https://github.com/liufee/feehicms/issues/4'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T21:47:09Z', 'nvd_published_at': '2022-11-09T14:15:00Z'} |
1.4.0 | GHSA-642h-mx8q-47p2 | 2022-11-21T23:47:59Z | 2022-11-15T12:00:16Z | null | ['CVE-2022-42126'] | Missing permissions check in Liferay Portal | The Asset Libraries module in Liferay Portal 7.3.5 through 7.4.3.28, and Liferay DXP 7.3 before update 8, and DXP 7.4 before update 29 does not properly check permissions of asset libraries, which allows remote authenticated users to view asset libraries via the UI. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.3.5'}, {'fixed': '7.4.3.48'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.4.3.28'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42126'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17593'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42126'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-280'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:47:59Z', 'nvd_published_at': '2022-11-15T01:15:00Z'} |
1.4.0 | GHSA-x2w2-5552-fjv6 | 2022-12-15T19:42:11Z | 2022-11-16T12:00:23Z | null | ['CVE-2022-45392'] | Plaintext Storage of a Password in Jenkins NS-ND Integration Performance Publisher Plugin | NS-ND Integration Performance Publisher Plugin 4.8.0.143 and earlier stores passwords unencrypted in job `config.xml` files on the Jenkins controller as part of its configuration.
These passwords can be viewed by attackers with Item/Extended Read permission or access to the Jenkins controller file system.
NS-ND Integ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:cavisson-ns-nd-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.0.146'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.8.0.143'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45392'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2912'}] | {'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:23:56Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-mq7h-5574-hw9f | 2022-11-21T22:34:35Z | 2022-11-21T22:34:35Z | null | ['CVE-2022-41927'] | Cross-Site Request Forgery (CSRF) allowing to delete or rename tags | ### Impact
It's possible with a simple request to perform deletion or renaming of tags without needing any confirmation, by using a CSRF attack.
### Patches
The problem has been patched in XWiki 13.10.7, 14.4.1 and 14.5RC1.
### Workarounds
It's possible to patch existing instances directly by editing the page Ma... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-tag-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2-milestone-2'}, {'fixed': '13.10.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-tag-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'even... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mq7h-5574-hw9f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41927'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/7fd4cda0590180c4d34f557597e9e10e263def9e'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:34:35Z', 'nvd_published_at': '2022-11-23T19:15:00Z'} |
1.4.0 | GHSA-g6jc-xrc3-4wwq | 2022-11-10T23:56:13Z | 2022-11-10T23:56:13Z | null | [] | Ibexa DXP users with the Company admin role can assign any role to any user | Critical severity. Users with the Company admin role (introduced by the company account feature in v4) can assign any role to any user. This also applies to any other user that has the role / assign policy. Any subtree limitation in place does not have any effect.
The role / assign policy is typically only given to ad... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'ibexa/admin-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ibexa/admin-ui/security/advisories/GHSA-g6jc-xrc3-4wwq'}, {'type': 'WEB', 'url': 'https://github.com/ibexa/admin-ui/commit/e34abb0cf4e463ef86a8bda907496a8dd9967807'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-009-critical-vulnerabil... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T23:56:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4j2x-v3mr-467m | 2022-11-30T21:21:37Z | 2022-11-25T18:30:25Z | null | ['CVE-2022-45207'] | Jeecg-boot vulnerable to SQL injection via updateNullByEmptyString | Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component updateNullByEmptyString. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45207'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/4127'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/commit/8632a835c23f558dfee3584d7658cc6a13ccec6f'}, {'type': 'WEB', 'url': 'https://github.com/je... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T21:21:37Z', 'nvd_published_at': '2022-11-25T17:15:00Z'} |
1.4.0 | GHSA-q6jp-gcww-8v2j | 2022-11-28T15:50:11Z | 2022-11-21T23:46:47Z | null | ['CVE-2022-41937'] | Missing Authorization in Filter Stream Converter Application of XWiki-platform | ### Impact
The application allow anyone with view access to modify any page of the wiki by importing a crafted XAR package.
### Patches
The problem has been patched in XWiki 14.6RC1, 14.6 and 13.10.8.
### Workarounds
The problem can be patched immediately by setting the right of the page Filter.WebHome and making ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-filter-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-filter-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-q6jp-gcww-8v2j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41937'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/fb49b4f289ee28e45cfada8e97e320cd3ed27113'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:46:47Z', 'nvd_published_at': '2022-11-22T01:15:00Z'} |
1.4.0 | GHSA-395x-wv32-44v5 | 2022-12-01T22:11:37Z | 2022-11-28T22:14:48Z | null | ['CVE-2022-39325'] | baserproject/basercms vulnerable to cross-site scripting (XSS) vulnerability | There is a cross-site scripting vulnerability on the management system of baserCMS.
This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users.
If you are eligible, please update to the new version as soon as possible.
### Target
baserCMS 4.7.1 and earlier ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.7.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-395x-wv32-44v5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39325'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/b6f8a54e90dee51317eddf517b776fe8b4cd3ef6'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-28T22:14:48Z', 'nvd_published_at': '2022-11-25T20:15:00Z'} |
1.4.0 | GHSA-pg98-6v7f-2xfv | 2022-11-23T15:44:52Z | 2022-11-23T15:44:52Z | null | [] | sweetalert2 v9.17.4 and above contains hidden functionality | `sweetalert2` versions 9.17.4 and up until 10.0.0 are vulnerable to hidden functionality that was introduced by the maintainer. The package outputs audio and/or video messages that do not pertain to the functionality of the package and is not included in versions 9.0.0 - 9.17.3.
### Workaround
Use a version 9.0.0 - 9.... | [] | [{'package': {'ecosystem': 'npm', 'name': 'sweetalert2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.17.4'}]}], 'database_specific': {'last_known_affected_version_range': '< 10.0.0'}}] | [{'type': 'PACKAGE', 'url': 'https://github.com/sweetalert2/sweetalert2/'}, {'type': 'WEB', 'url': 'https://github.com/sweetalert2/sweetalert2/releases/tag/v11.4.9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/sweetalert2'}] | {'cwe_ids': ['CWE-912'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T15:44:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-v87q-rpwp-qr7q | 2022-11-30T21:21:54Z | 2022-11-25T18:30:25Z | null | ['CVE-2022-45210'] | Jeecg-boot vulnerable to SQL Injection | Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/user/deleteRecycleBin. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45210'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/4125'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/commit/51e2227bfe54f5d67b09411ee9a336750164e73d'}, {'type': 'PACKAGE', 'url': 'https://github.co... | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T21:21:54Z', 'nvd_published_at': '2022-11-25T17:15:00Z'} |
1.4.0 | GHSA-4pcg-wr6c-h9cq | 2022-11-07T21:13:57Z | 2022-11-07T21:13:57Z | null | ['CVE-2022-39386'] | fastify/websocket vulnerable to uncaught exception via crash on malformed packet | ### Impact
Any application using @fastify/websocket could crash if a specific, malformed packet is sent.
All versions of fastify-websocket are also impacted. That module is deprecated, so it will not be patched.
### Patches
This has been patched in v7.1.1 (fastify v4) and v5.0.1 (fastify v3).
### Workarounds
No ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@fastify/websocket'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@fastify/websocket'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '7.1.1'}]}]}, {'pac... | [{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-websocket/security/advisories/GHSA-4pcg-wr6c-h9cq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39386'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-websocket/pull/228'}, {'type': 'WEB', 'url': 'https://github.com/fas... | {'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-07T21:13:57Z', 'nvd_published_at': '2022-11-08T22:15:00Z'} |
1.4.0 | GHSA-q3hq-hm5h-qrx3 | 2022-11-21T22:18:22Z | 2022-11-15T12:00:17Z | null | ['CVE-2022-43691'] | Concrete CMS vulnerable to Cleartext Transmission of Sensitive Information | Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 inadvertently disclose server-side sensitive information (secrets in environment variables and server information) when Debug Mode is left on in production. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.3'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43691'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/913-release-n... | {'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:18:22Z', 'nvd_published_at': '2022-11-14T23:15:00Z'} |
1.4.0 | GHSA-prm5-8g2m-24gg | 2022-11-09T00:04:54Z | 2022-11-08T17:29:16Z | null | ['CVE-2022-39396'] | Remote code execution via MongoDB BSON parser through prototype pollution | ### Impact
An attacker can use this prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser.
### Patches
Prevent prototype pollution in MongoDB database adapter.
### Workarounds
Disable remote code execution through the MongoDB BSON parser.
### Collaborators
Mikhail Shcherbak... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.18'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges'... | [{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-prm5-8g2m-24gg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39396'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/pull/8295'}, {'type': 'WEB', 'url': 'https://github.... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T17:29:16Z', 'nvd_published_at': '2022-11-10T01:15:00Z'} |
1.4.0 | GHSA-762h-vpvw-3rcx | 2022-11-21T20:40:42Z | 2022-11-21T20:40:42Z | null | ['CVE-2022-41885'] | Overflow in `FusedResizeAndPadConv2D` | ### Impact
When [`tf.raw_ops.FusedResizeAndPadConv2D`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/conv_ops_fused_image_transform.cc) is given a large tensor shape, it overflows.
```python
import tensorflow as tf
mode = "REFLECT"
strides = [1, 1, 1, 1]
padding = "SAME"
resize_align_cor... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-762h-vpvw-3rcx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41885'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/d66e1d568275e6a2947de97dca7a102a211e01ce'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-131'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:40:42Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-3wmg-28v9-8hf6 | 2022-11-10T14:31:18Z | 2022-11-09T19:02:23Z | null | ['CVE-2022-43120'] | Subrion CMS is vulnerable to Cross-Site Scripting (XSS) | A cross-site scripting (XSS) vulnerability in the /panel/fields/add component of Intelliants Subrion CMS version 4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Field default value text field. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43120'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/894'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-09T20:57:15Z', 'nvd_published_at': '2022-11-09T16:15:00Z'} |
1.4.0 | GHSA-f454-jm6x-56q6 | 2022-11-21T22:28:51Z | 2022-11-16T19:00:31Z | null | ['CVE-2022-44070'] | Cross-site Scripting in Zenario | Zenario CMS 9.3.57186 is vulnerable to Cross Site Scripting (XSS) via News articles. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.3.57186'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44070'}, {'type': 'WEB', 'url': 'https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/3'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:28:51Z', 'nvd_published_at': '2022-11-16T16:15:00Z'} |
1.4.0 | GHSA-m2vv-5vj5-2hm7 | 2022-11-22T00:14:54Z | 2022-11-14T12:00:15Z | null | ['CVE-2022-45198'] | Pillow vulnerable to Data Amplification attack. | Pillow before 9.2.0 performs Improper Handling of Highly Compressed GIF Data (Data Amplification). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45198'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/6402'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/6402/commits/c9f1b35e981075110a23487a8d4a6cbb59a588ea'}, {'type': 'WEB', 'url': 'https://gith... | {'cwe_ids': ['CWE-409'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:14:54Z', 'nvd_published_at': '2022-11-14T07:15:00Z'} |
1.4.0 | GHSA-2x8x-jmrp-phxw | 2022-12-12T20:48:37Z | 2022-11-30T21:18:34Z | null | ['CVE-2022-45442'] | Sinatra vulnerable to Reflected File Download attack | ### Description
An issue was discovered in Sinatra 2.0 before 2.2.3 and 3.0 before 3.0.4. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a response when the filename is derived from user-supplied input.
### References
* https://www.blackhat.com/docs/e... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'sinatra'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sinatra'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sinatra/sinatra/security/advisories/GHSA-2x8x-jmrp-phxw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45442'}, {'type': 'WEB', 'url': 'https://github.com/sinatra/sinatra/commit/ea8fc9495a350f7551b39e3025bfcd06f49f363b'}, {'type': 'ADVISORY', 'url':... | {'cwe_ids': ['CWE-494'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T21:18:34Z', 'nvd_published_at': '2022-11-28T21:15:00Z'} |
1.4.0 | GHSA-653v-rqx9-j85p | 2022-11-16T20:50:01Z | 2022-11-04T12:00:25Z | null | ['CVE-2022-41713'] | deep-object-diff vulnerable to Prototype Pollution | deep-object-diff before version 1.1.6 allows an external attacker to edit or add new properties to an object. This is possible because the application does not properly validate incoming JSON keys, thus allowing the `__proto__` property to be edited. This issue was fixed in version 1.1.9. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'deep-object-diff'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.6'}, {'fixed': '1.1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41713'}, {'type': 'WEB', 'url': 'https://github.com/mattphillips/deep-object-diff/issues/85'}, {'type': 'WEB', 'url': 'https://github.com/mattphillips/deep-object-diff/issues/85#issuecomment-1312450353'}, {'type': 'WEB', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T14:48:51Z', 'nvd_published_at': '2022-11-03T20:15:00Z'} |
1.4.0 | GHSA-cqvq-fvhr-v6hc | 2022-11-21T23:51:53Z | 2022-11-21T23:51:53Z | null | [] | `CHECK` failure in `SobolSample` via missing validation | ### Impact
Another instance of CVE-2022-35935, where `SobolSample` is vulnerable to a denial of service via assumed scalar inputs, was found and fixed.
```python
import tensorflow as tf
tf.raw_ops.SobolSample(dim=tf.constant([1,0]), num_results=tf.constant([1]), skip=tf.constant([1]))
```
### Patches
We have patched t... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cqvq-fvhr-v6hc'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:51:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jvc3-wjf6-7c6c | 2022-12-02T22:37:38Z | 2022-11-24T18:30:28Z | null | ['CVE-2022-26885'] | Apache Dolphin Scheduler has insufficiently protected credentials | When using tasks to read config files, there is a risk of database password disclosure. We recommend you upgrade to version 2.0.6 or higher. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26885'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dolphinscheduler'}, {'type': 'WEB', 'url': 'https://github.com/apache/dolphinscheduler/releases/tag/2.0.6'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/z7084r9cs2r26cszkkgj... | {'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:37:38Z', 'nvd_published_at': '2022-11-24T16:15:00Z'} |
1.4.0 | GHSA-3w3h-7xgx-grwc | 2023-02-08T16:18:19Z | 2022-11-21T20:39:05Z | null | ['CVE-2022-39397'] | Leak in Aliyun KeySecret | ### Impact
Users of this library will be affected when using this library, the incoming secret will be disclosed unintentionally.
### Patches
This have already been solved.
### Workarounds
No, It cannot be patched without upgrading
### References
No
### For more information
If you have any questions or comments abo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'aliyun-oss-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tu6ge/oss-rs/security/advisories/GHSA-3w3h-7xgx-grwc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39397'}, {'type': 'WEB', 'url': 'https://github.com/tu6ge/oss-rs/commit/e4553f7d74fce682d802f8fb073943387796df29'}, {'type': 'PACKAGE', 'url': 'https... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:39:05Z', 'nvd_published_at': '2022-11-22T21:15:00Z'} |
1.4.0 | GHSA-22wj-vf5f-wrvj | 2022-11-30T23:34:15Z | 2022-11-23T21:30:31Z | null | ['CVE-2022-45868'] | Password exposure in H2 Database | The web-based admin console in H2 Database Engine through 2.1.214 can be started via the CLI with the argument -webAdminPassword, which allows the user to specify the password in cleartext for the web admin console. Consequently, a local user (or an attacker that has obtained local access through some means) would be a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.h2database:h2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.220'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45868'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2database/pull/3833'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2database/commit/581ed18ff9d6b3761d851620ed88a3994a351a0d'}, {'type': 'PACKAGE', 'url': 'https://github.co... | {'cwe_ids': ['CWE-200', 'CWE-312'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T22:31:05Z', 'nvd_published_at': '2022-11-23T21:15:00Z'} |
1.4.0 | GHSA-jf2p-4gqj-849g | 2022-12-01T22:12:03Z | 2022-11-28T22:09:09Z | null | ['CVE-2022-41954'] | Temporary File Information Disclosure vulnerability in MPXJ | ### Impact
On Unix-like operating systems (not Windows or macos), MPXJ's use of `File.createTempFile(..)` results in temporary files being created with the permissions `-rw-r--r--`. This means that any other user on the system can read the contents of this file. When MPXJ is reading a type of schedule file which requir... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.sf.mpxj:mpxj'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.14.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'net.sf.mpxj'}, 'ecosystem_specific': {'affected_functions': ['']}, '... | [{'type': 'WEB', 'url': 'https://github.com/joniles/mpxj/security/advisories/GHSA-jf2p-4gqj-849g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41954'}, {'type': 'WEB', 'url': 'https://github.com/joniles/mpxj/commit/ae0af24345d79ad45705265d9927fe55e94a5721'}, {'type': 'PACKAGE', 'url': 'https... | {'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-28T22:09:09Z', 'nvd_published_at': '2022-11-25T19:15:00Z'} |
1.4.0 | GHSA-pp74-g2q5-j4jf | 2023-09-20T10:18:39Z | 2022-11-21T23:59:26Z | null | ['CVE-2022-37421'] | Silverstipe CMS Stored XSS in custom meta tags | A malicious content author could create a custom meta tag and execute an arbitrary JavaScript payload. This would require convincing a legitimate user to access a page and enter a custom keyboard shortcut.
This requires CMS access to exploit. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.11.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37421'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/cms/CVE-2022-37421.yaml'}, {'type': 'WEB', 'url': 'https://www.silver... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:59:26Z', 'nvd_published_at': '2022-11-23T03:15:00Z'} |
1.4.0 | GHSA-p55m-g4m3-qmrp | 2022-11-21T23:56:13Z | 2022-11-20T06:30:15Z | null | ['CVE-2022-4069'] | Cross-site Scripting in librenms/librenms | Cross-site Scripting (XSS) - Generic in GitHub repository librenms/librenms prior to 22.10.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4069'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/8383376f1355812e09ec0c2af67f6d46891b7ba7'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a9925d98-dac4-4c3c-835a-d93aeecfb2c5'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:56:13Z', 'nvd_published_at': '2022-11-20T05:15:00Z'} |
1.4.0 | GHSA-83g7-8fch-p37m | 2022-12-01T22:10:00Z | 2022-11-26T03:30:27Z | null | ['CVE-2022-45908'] | PaddlePaddle vulnerable to code injection via winstr | In PaddlePaddle before 2.4, paddle.audio.functional.get_window is vulnerable to code injection because it calls eval on a user-supplied winstr. This may lead to arbitrary code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'paddlepaddle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45908'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/commit/26c419ca386aeae3c461faf2b828d00b48e908eb'}, {'type': 'PACKAGE', 'url': 'https://github.com/PaddlePaddle/Paddle'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T21:19:52Z', 'nvd_published_at': '2022-11-26T02:15:00Z'} |
1.4.0 | GHSA-f3hw-3h74-wr98 | 2022-11-29T17:53:46Z | 2022-11-20T06:30:16Z | null | ['CVE-2022-4068'] | Cross-site Scripting in librenms/librenms | A user is able to enable their own account if it was disabled by an admin while the user still holds a valid session. Moreover, the username is not properly sanitized in the admin user overview. This enables an XSS attack that enables an attacker with a low privilege user to execute arbitrary JavaScript in the context ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4068'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/09a2977adb8bc4b1db116c725d661160c930d3a1'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/becfecc4-... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:56:23Z', 'nvd_published_at': '2022-11-20T05:15:00Z'} |
1.4.0 | GHSA-cvh4-cjc9-84qm | 2022-12-02T22:20:46Z | 2022-11-29T21:30:25Z | null | ['CVE-2022-3751'] | owncast is vulnerable to SQL Injection | SQL Injection in GitHub repository owncast/owncast prior to 0.0.13. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/owncast/owncast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3751'}, {'type': 'WEB', 'url': 'https://github.com/owncast/owncast/pull/2257'}, {'type': 'WEB', 'url': 'https://github.com/owncast/owncast/commit/23b6e5868d5501726c27a3fabbecf49000968591'}, {'type': 'PACKAGE', 'url': 'https://github.com/owncast/own... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:20:46Z', 'nvd_published_at': '2022-11-29T21:15:00Z'} |
1.4.0 | GHSA-98pf-gfh3-x3mp | 2022-11-10T16:02:51Z | 2022-11-10T16:02:51Z | null | [] | Read the Docs vulnerable to Cross-Site Scripting (XSS) | ### Impact
This vulnerability allowed a malicious user to serve arbitrary HTML files from the main application domain (readthedocs[.]org/readthedocs[.]com) by exploiting a vulnerability in the code that serves downloadable content from a project.
Exploiting this would have required the attacker to get a logged-in us... | [] | [{'package': {'ecosystem': 'npm', 'name': 'readthedocs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.8.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/readthedocs/readthedocs.org/security/advisories/GHSA-98pf-gfh3-x3mp'}, {'type': 'WEB', 'url': 'https://github.com/readthedocs/readthedocs.org/commit/b0ae626acd13882170ec5888e35f3ef2e48e6ff6'}, {'type': 'PACKAGE', 'url': 'https://github.com/readthedocs/readthedocs.org'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T16:02:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xgqr-5wqw-9fpv | 2022-11-04T20:44:39Z | 2022-11-03T19:00:26Z | null | ['CVE-2022-32287'] | Apache UIMA Path Traversal vulnerability | A relative path traversal vulnerability in a FileUtil class used by the PEAR management component of Apache UIMA allows an attacker to create files outside the designated target directory using carefully crafted ZIP entry names. This issue affects Apache UIMA Apache UIMA version 3.3.0 and prior versions. Note that PEAR... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.uima:uimaj-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32287'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/57vk0d79j94d0lk0vol8xn935yv1shdd'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/11/03/4'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T21:11:17Z', 'nvd_published_at': '2022-11-03T12:15:00Z'} |
1.4.0 | GHSA-hc82-w9v8-83pr | 2022-11-18T18:50:01Z | 2022-11-18T18:50:01Z | null | ['CVE-2022-39389'] | Witness Block Parsing DoS Vulnerability | ### Impact
All lnd nodes before version `v0.15.4` are vulnerable to a block parsing bug that can cause a node to enter a degraded state once encountered. In this degraded state, nodes can continue to make payments and forward HTLCs, and close out channels. Opening channels is prohibited, and also on chain transaction ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/lightningnetwork/lnd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.4-beta'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/lightningnetwork/lnd/security/advisories/GHSA-hc82-w9v8-83pr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39389'}, {'type': 'WEB', 'url': 'https://github.com/lightningnetwork/lnd/issues/7096'}, {'type': 'WEB', 'url': 'https://github.com/lightningn... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-18T18:50:01Z', 'nvd_published_at': '2022-11-17T22:15:00Z'} |
1.4.0 | GHSA-h246-cgh4-7475 | 2022-11-21T20:42:10Z | 2022-11-21T20:42:10Z | null | ['CVE-2022-41890'] | `CHECK` fail in `BCast` overflow | ### Impact
If [`BCast::ToShape`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/util/bcast.h) is given input larger than an `int32`, it will crash, despite being supposed to handle up to an `int64`. An example can be seen in [`tf.experimental.numpy.outer`](https://github.com/tensorflow/tensorflow/... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h246-cgh4-7475'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41890'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8310bf8dd188ff780e7fc53245058215a05bdbe5'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-704'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:42:10Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-3g9q-cmgv-g4p6 | 2022-12-15T18:54:00Z | 2022-11-16T12:00:22Z | null | ['CVE-2022-45381'] | Arbitrary file read vulnerability in Jenkins Pipeline Utility Steps Plugin | Pipeline Utility Steps Plugin implements a `readProperties` Pipeline step that supports interpolation of variables using the Apache Commons Configuration library.
Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of this library that enable ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-utility-steps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.13.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45381'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-utility-steps-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2949'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:21:17Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-2chg-86hq-7w38 | 2022-11-15T01:41:05Z | 2022-11-07T12:00:34Z | null | ['CVE-2022-44797'] | btcd mishandles witness size checking | btcd before 0.23.2, as used in Lightning Labs lnd before 0.15.2-beta and other Bitcoin-related products, mishandles witness size checking. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/btcsuite/btcd/wire'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/lightningnetwork/lnd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44797'}, {'type': 'WEB', 'url': 'https://github.com/lightningnetwork/lnd/issues/7002'}, {'type': 'WEB', 'url': 'https://github.com/btcsuite/btcd/pull/1896'}, {'type': 'WEB', 'url': 'https://github.com/btcsuite/btcd/pull/1896/commits/f523d4ccaa5f34a... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-07T16:15:55Z', 'nvd_published_at': '2022-11-07T04:15:00Z'} |
1.4.0 | GHSA-mcmr-49x3-4jqm | 2022-11-02T18:15:07Z | 2022-11-02T18:15:07Z | null | [] | ckb type_id script resume may randomly fail | ### Impact
https://github.com/nervosnetwork/ckb/blob/v0.101.2/script/src/verify.rs#L871-L879
TypeIdSystemScript resume handle is not correct when max_cycles is not enough, `ScriptError::ExceededMaximumCycles` will be raised directly ranther than suspend as expect, and also because script_group execution order is random... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.100.0'}, {'fixed': '0.102.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-mcmr-49x3-4jqm'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervosnetwork/ckb'}, {'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/blob/v0.101.2/script/src/verify.rs#L871-L879'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T18:15:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qq6h-5g6j-q3cm | 2022-11-23T15:33:20Z | 2022-11-23T15:26:43Z | null | [] | sweetalert2 v11.4.9 and above contains hidden functionality | `sweetalert2` versions 11.4.9 and above are vulnerable to hidden functionality that was introduced by the maintainer. The package outputs audio and/or video messages that do not pertain to the functionality of the package and is not included in versions 11.0.0 - 11.4.8.
### Workaround
Use a version 11.0.0 - 11.4.8 of ... | [] | [{'package': {'ecosystem': 'npm', 'name': 'sweetalert2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.4.9'}]}], 'database_specific': {'last_known_affected_version_range': '< 11.6.14'}}] | [{'type': 'PACKAGE', 'url': 'https://github.com/sweetalert2/sweetalert2/'}, {'type': 'WEB', 'url': 'https://github.com/sweetalert2/sweetalert2/releases/tag/v11.4.9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/sweetalert2'}] | {'cwe_ids': ['CWE-912'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T15:26:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r9xx-4cmv-856x | 2022-11-21T22:28:29Z | 2022-11-16T19:00:31Z | null | ['CVE-2022-44069'] | Cross-site Scripting in Zenario | Zenario CMS 9.3.57186 is vulnerable to Cross Site Scripting (XSS) via the Nest library module. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.3.57186'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44069'}, {'type': 'WEB', 'url': 'https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/4'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:28:29Z', 'nvd_published_at': '2022-11-16T16:15:00Z'} |
1.4.0 | GHSA-w37g-rhq8-7m4j | 2022-12-05T21:45:23Z | 2022-11-11T19:00:31Z | null | ['CVE-2022-41854'] | Snakeyaml vulnerable to Stack overflow leading to denial of service | Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.yaml:snakeyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.32'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41854'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/commits/e230a1758842beec93d28eddfde568c21774780a'}, {'type': 'WEB', 'url': 'https://bitbucket.org/sn... | {'cwe_ids': ['CWE-121', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:27:27Z', 'nvd_published_at': '2022-11-11T13:15:00Z'} |
1.4.0 | GHSA-g6x4-57hp-j4xm | 2022-11-21T23:49:44Z | 2022-11-15T12:00:16Z | null | ['CVE-2022-42129'] | Authorization Bypass in Liferay Portal | An Insecure direct object reference (IDOR) vulnerability in the Dynamic Data Mapping module in Liferay Portal 7.3.2 through 7.4.3.4, and Liferay DXP 7.3 before update 4, and 7.4 GA allows remote authenticated users to view and access form entries via the `formInstanceRecordId` parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.3.2'}, {'fixed': '7.4.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42129'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17448'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42129'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:49:44Z', 'nvd_published_at': '2022-11-15T02:15:00Z'} |
1.4.0 | GHSA-3qmc-2r76-4rqp | 2022-11-10T15:51:01Z | 2022-11-10T15:51:01Z | null | [] | Redwood is vulnerable to account takeover via dbAuth "forgot-password" | # Impact
_What kind of vulnerability is it? Who is impacted?_
This is an API vulnerability in Redwood's [dbAuth], specifically the dbAuth forgot password feature:
- only projects with the dbAuth "forgot password" feature are affected
- this vulnerability was introduced in v0.38.0
## User Accounts are Vulnerable to T... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': '@redwoodjs/api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.38.0'}, {'fixed': '2.2.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@redwoodjs/api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/redwoodjs/redwood/security/advisories/GHSA-3qmc-2r76-4rqp'}, {'type': 'WEB', 'url': 'https://github.com/redwoodjs/redwood/issues/6343'}, {'type': 'WEB', 'url': 'https://github.com/redwoodjs/redwood/pull/6778'}, {'type': 'PACKAGE', 'url': 'https://github.com/redwoodjs/redwood'... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T15:51:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fv42-mx39-6fpw | 2022-12-15T18:45:27Z | 2022-11-16T12:00:22Z | null | ['CVE-2022-45379'] | Whole-script approval in Jenkins Script Security Plugin vulnerable to SHA-1 collisions | Script Security Plugin 1189.vb_a_b_7c8fd5fde and earlier stores whole-script approvals as the [SHA-1 hash](https://en.wikipedia.org/wiki/SHA-1) of the approved script. SHA-1 no longer meets the security standards for producing a cryptographically secure message digest.
Script Security Plugin 1190.v65867a_a_47126 uses ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1190.v65867a_a_47126'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1189.vb'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45379'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/script-security-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2564'}] | {'cwe_ids': ['CWE-326', 'CWE-328'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:20:41Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-qqhf-xfhw-7884 | 2022-11-04T20:49:16Z | 2022-11-04T12:00:25Z | null | ['CVE-2022-41710'] | Markdownify has Files or Directories Accessible to External Parties | Markdownify version 1.4.1 allows an external attacker to remotely obtain arbitrary local files on any client that attempts to view a malicious markdown file through Markdownify. This is possible because the application does not have a CSP policy (or at least not strict enough) and/or does not properly validate the cont... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron-markdownify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41710'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/noisestorm/'}, {'type': 'PACKAGE', 'url': 'https://github.com/amitmerchant1990/electron-markdownify'}] | {'cwe_ids': ['CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T20:49:16Z', 'nvd_published_at': '2022-11-03T20:15:00Z'} |
1.4.0 | GHSA-j874-47xx-9xfg | 2022-12-16T14:35:51Z | 2022-11-16T12:00:23Z | null | ['CVE-2022-45394'] | Missing permission check in Jenkins Delete log Plugin | A missing permission check in Jenkins Delete log Plugin 1.0 and earlier allows attackers with Item/Read permission to delete build logs. As of publication of this advisory, there is no fix. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:delete-log-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45394'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/delete-log-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2920'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T14:35:51Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-q2hm-2h45-v5g3 | 2022-12-03T04:09:18Z | 2022-11-21T22:37:11Z | null | ['CVE-2022-41933'] | Plaintext storage of password after a reset in org.xwiki.platform:xwiki-platform-security-authentication-default | ### Impact
We discovered that when the reset a forgotten password feature of XWiki was used, the password was then stored in plain text in database. This only concerns XWiki 13.1RC1 and next versions.
Note that it only concerns the reset password feature available from the "Forgot your password" link in the login view... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-security-authentication-default'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.1RC1'}, {'fixed': '13.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-security-authentication-default... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-599v-w48h-rjrm'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-q2hm-2h45-v5g3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41933'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-312', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:37:11Z', 'nvd_published_at': '2022-11-23T21:15:00Z'} |
1.4.0 | GHSA-25gv-mvm7-5h3h | 2022-11-30T21:21:08Z | 2022-11-25T18:30:25Z | null | ['CVE-2022-45208'] | Jeecg-boot vulnerable to SQL injection via /sys/user/putRecycleBin | Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/user/putRecycleBin. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45208'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/4126'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/commit/51e2227bfe54f5d67b09411ee9a336750164e73d'}, {'type': 'PACKAGE', 'url': 'https://github.co... | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T21:21:08Z', 'nvd_published_at': '2022-11-25T17:15:00Z'} |
1.4.0 | GHSA-m7gv-v8xx-v47w | 2022-11-08T15:17:36Z | 2022-11-04T18:58:46Z | null | ['CVE-2022-39387'] | XWiki OIDC Authenticator vulnerable to bypassing OpenID login by providing a custom provider | ### Impact
Even if a wiki has an OpenID provider configured through its xwiki.properties, it is possible to provide a third party provider by providing its details through request parameters. One can then bypass the XWiki authentication altogether by specifying its own provider through the oidc.endpoint.* request para... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.contrib.oidc:oidc-authenticator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.29.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/xwiki-contrib/oidc/security/advisories/GHSA-m7gv-v8xx-v47w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39387'}, {'type': 'WEB', 'url': 'https://github.com/xwiki-contrib/oidc/commit/0247af1417925b9734ab106ad7cd934ee870ac89'}, {'type': 'PACKAGE', '... | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:58:46Z', 'nvd_published_at': '2022-11-04T19:15:00Z'} |
1.4.0 | GHSA-457r-cqc8-9vj9 | 2022-11-23T15:39:50Z | 2022-11-23T15:39:50Z | null | [] | sweetalert2 v10.16.10 and above contains hidden functionality | `sweetalert2` versions 10.16.10 and up until 11.0.0 are vulnerable to hidden functionality that was introduced by the maintainer. The package outputs audio and/or video messages that do not pertain to the functionality of the package and is not included in versions 10.0.0 - 10.16.9.
### Workaround
Use a version 10.0.0... | [] | [{'package': {'ecosystem': 'npm', 'name': 'sweetalert2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.16.10'}]}], 'database_specific': {'last_known_affected_version_range': '< 11.0.0'}}] | [{'type': 'PACKAGE', 'url': 'https://github.com/sweetalert2/sweetalert2/'}, {'type': 'WEB', 'url': 'https://github.com/sweetalert2/sweetalert2/releases/tag/v11.4.9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/sweetalert2'}] | {'cwe_ids': ['CWE-912'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T15:39:50Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xprv-wvh7-qqqx | 2023-08-21T18:16:54Z | 2022-11-09T20:47:27Z | null | ['CVE-2022-41878'] | Parse Server vulnerable to Prototype Pollution via Cloud Code Webhooks or Cloud Code Triggers | ### Impact
Keywords that are specified in the Parse Server option `requestKeywordDenylist` can be injected via Cloud Code Webhooks or Triggers. This will result in the keyword being saved to the database, bypassing the `requestKeywordDenylist` option.
### Patches
Improved keyword detection.
### Workarounds
Configu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.19'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges'... | [{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-xprv-wvh7-qqqx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41878'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/pull/8301'}, {'type': 'WEB', 'url': 'https://github.... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-09T20:47:27Z', 'nvd_published_at': '2022-11-10T23:15:00Z'} |
1.4.0 | GHSA-m2xp-jxfg-qq6g | 2023-02-02T16:59:55Z | 2022-11-22T03:30:56Z | null | ['CVE-2022-43685'] | CKAN contains Improper Authentication leading to account takeover | CKAN through 2.9.6 account takeovers by unauthenticated users when an existing user id is sent via an HTTP POST request. This allows a user to take over an existing account including superuser accounts. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ckan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43685'}, {'type': 'WEB', 'url': 'https://ckan.org/'}, {'type': 'WEB', 'url': 'https://ckan.org/blog/get-latest-patch-releases-your-ckan-site-october-2022'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckan/ckan'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T16:59:55Z', 'nvd_published_at': '2022-11-22T01:15:00Z'} |
1.4.0 | GHSA-6q49-35h6-rq2p | 2022-12-02T22:32:45Z | 2022-11-25T18:30:25Z | null | ['CVE-2022-43984'] | Browsershot version 3.57.3 vulnerable to improper input validation | Browsershot version 3.57.3 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate that the JS content imported from an external source passed to the Browsershot::html method does not contain URLs that use the file:// protocol. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'spatie/browsershot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.57.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43984'}, {'type': 'WEB', 'url': 'https://github.com/spatie/browsershot/commit/554c3e566fde8c47ad1ac9be47eaeb9a84c4dfe2'}, {'type': 'WEB', 'url': 'https://github.com/spatie/browsershot/commit/92cf16fc098211731f80d21687abeafbe2c457ad'}, {'type': 'WEB... | {'cwe_ids': ['CWE-20', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:32:45Z', 'nvd_published_at': '2022-11-25T17:15:00Z'} |
1.4.0 | GHSA-8r69-3cvp-wxc3 | 2022-11-02T18:18:50Z | 2022-11-02T18:18:10Z | null | [] | Batched HTTP requests may set incorrect `cache-control` response header | ### Impact
In Apollo Server 3 and 4, the `cache-control` HTTP response header may not reflect the cache policy that should apply to an HTTP request when that HTTP request contains multiple operations using HTTP batching. This could lead to data being inappropriately cached and shared.
Apollo Server allows clients to s... | [] | [{'package': {'ecosystem': 'npm', 'name': 'apollo-server-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.11.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@apollo/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/security/advisories/GHSA-8r69-3cvp-wxc3'}, {'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/commit/2a2d1e3b4bbb1f2802b09004444029bd1adb9c19'}, {'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/commit/69be2... | {'cwe_ids': ['CWE-524'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T18:18:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8g2p-5pqh-5jmc | 2023-01-30T23:02:28Z | 2022-11-08T23:00:22Z | null | ['CVE-2022-41064'] | .NET Information Disclosure Vulnerability | Microsoft is releasing this security advisory to provide information about a vulnerability in .NET, .NET Core and .NET Framework's System.Data.SqlClient and Microsoft.Data.SqlClient NuGet Packages.
A vulnerability exists in System.Data.SqlClient and Microsoft.Data.SqlClient libraries where a timeout occurring under hi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.Data.SqlClient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.3'}}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Data.SqlClient'}, 'ranges': [{'type... | [{'type': 'WEB', 'url': 'https://github.com/dotnet/corefx/security/advisories/GHSA-8g2p-5pqh-5jmc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41064'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/issues/78042'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/corefx'}, {... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T23:00:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3cxx-3f53-m92c | 2022-11-22T00:12:17Z | 2022-11-15T12:00:17Z | null | ['CVE-2022-43686'] | Concrete CMS vulnerable to Uncontrolled Resource Consumption leading to DoS | In Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2, the authTypeConcreteCookieMap table can be filled up causing a denial of service (high load). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ecosystem_specific': {'affected_fu... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43686'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/913-release-n... | {'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:12:17Z', 'nvd_published_at': '2022-11-14T22:15:00Z'} |
1.4.0 | GHSA-vrv9-3x3w-ffxw | 2022-11-03T19:32:24Z | 2022-11-01T12:00:36Z | null | ['CVE-2022-3783'] | node-red-dashboard vulnerable to Cross-site Scripting | node-red-dashboard contains a cross-site scripting vulnerability. This issue affects some unknown processing of the file `components/ui-component/ui-component-ctrl.js` of the component ui_text Format Handler. The attack may be initiated remotely. The issue is patched in version 3.2.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-red-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3783'}, {'type': 'WEB', 'url': 'https://github.com/node-red/node-red-dashboard/issues/772'}, {'type': 'WEB', 'url': 'https://github.com/node-red/node-red-dashboard/commit/9305d1a82f19b235dfad24a7d1dd4ed244db7743'}, {'type': 'PACKAGE', 'url': 'https... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T19:00:00Z', 'nvd_published_at': '2022-10-31T21:15:00Z'} |
1.4.0 | GHSA-6657-9743-4mc6 | 2022-12-06T18:52:07Z | 2022-11-30T12:30:20Z | null | ['CVE-2022-4231'] | Tribal Systems Zenario CMS vulnerable to Session Fixation | Tribal Systems Zenario CMS 9.3.57595 is vulnerable to session fixation. In Zenario CMS, the user session identifier (authentication token) is issued to the browser prior to authentication but is not changed after user logout and login again into the application when "Remember me" option active. Failing to issue a new s... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.3.57595'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4231'}, {'type': 'PACKAGE', 'url': 'https://github.com/TribalSystems/Zenario'}, {'type': 'WEB', 'url': 'https://github.com/lithonn/bug-report/tree/main/vendors/tribalsystems/zenario/session-fixation'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.... | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T18:31:41Z', 'nvd_published_at': '2022-11-30T12:15:00Z'} |
1.4.0 | GHSA-h8jm-2x53-xhp5 | 2022-11-02T21:46:40Z | 2022-11-01T17:45:21Z | null | ['CVE-2022-3786'] | X.509 Email Address Variable Length Buffer Overflow | A buffer overrun can be triggered in X.509 certificate verification,
specifically in name constraint checking. Note that this occurs after
certificate chain signature verification and requires either a CA to
have signed a malicious certificate or for an application to continue
certificate verification despite failure t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3786'}, {'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/pull/1452'}, {'type': 'WEB', 'url': 'https://github.com/alexcrichton/openssl-src-rs/commit/4a31c14f31e1a08c18893a37e304dd1dd4b7daa3'}, {'type': 'WEB', 'url': 'https://github.com... | {'cwe_ids': ['CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T17:45:21Z', 'nvd_published_at': '2022-11-01T18:15:00Z'} |
1.4.0 | GHSA-g389-rf5p-fg56 | 2022-12-02T22:37:15Z | 2022-11-25T18:30:25Z | null | ['CVE-2022-41705'] | Badaso vulnerable to Remote Code Execution (RCE) | Badaso version 2.6.3 allows an unauthenticated remote attacker to execute arbitrary code remotely on the server. This is possible because the application does not properly validate the data uploaded by users. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'badaso/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41705'}, {'type': 'WEB', 'url': 'https://github.com/uasoft-indonesia/badaso/issues/818'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/headhunterz/'}, {'type': 'PACKAGE', 'url': 'https://github.com/uasoft-indonesia/badaso'}, {'type':... | {'cwe_ids': ['CWE-434', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:37:15Z', 'nvd_published_at': '2022-11-25T18:15:00Z'} |
1.4.0 | GHSA-66jf-xm2m-7m8r | 2022-11-30T19:22:42Z | 2022-11-22T00:00:16Z | null | ['CVE-2022-38145'] | Stored XSS in Compare Mode | A malicious content author could add a Javascript payload to a page's meta description and get it executed in the versioned history compare view.
This vulnerability requires access to the CMS to be deployed. The attacker must then convince a privileged user to access the version history for that page. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/versioned-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.11.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38145'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/versioned-admin/CVE-2022-38145.yaml'}, {'type': 'WEB', 'url': 'https:... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:00:16Z', 'nvd_published_at': '2022-11-23T02:15:00Z'} |
1.4.0 | GHSA-6w8h-26xx-cf8q | 2022-11-21T22:37:27Z | 2022-11-21T22:37:27Z | null | ['CVE-2022-41934'] | Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in org.xwiki.platform:xwiki-platform-menu-ui | ### Impact
Any user with view rights on commonly accessible documents including the menu macro can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation due to improper escaping of the macro content and parameters of the menu macro.
The issue can be demonstrated by... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-menu-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-menu-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-6w8h-26xx-cf8q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41934'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/2fc20891e6c6b0ca05ee07e315e7f435e8919f8d'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-116', 'CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:37:27Z', 'nvd_published_at': '2022-11-23T20:15:00Z'} |
1.4.0 | GHSA-755v-r4x4-qf7m | 2022-11-29T23:55:23Z | 2022-11-29T23:55:23Z | null | [] | Stored Cross-Site Scripting (XSS) in Keycloak via groups dropdown | ### Summary
A Stored XSS vulnerability was reported in the Keycloak Security mailing list, affecting all the versions of Keycloak, including the latest release (16.0.1). The vulnerability allows a privileged attacker to execute malicious scripts in the admin console, abusing of the groups' dropdown functionality.
##... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-755v-r4x4-qf7m'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}] | {'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T23:55:23Z', 'nvd_published_at': None} |
1.4.0 | GHSA-264w-gw9g-fhgj | 2022-11-21T23:56:58Z | 2022-11-20T06:30:16Z | null | ['CVE-2022-3561'] | Cross-site Scripting in librenms/librenms | Cross-site Scripting (XSS) - Generic in GitHub repository librenms/librenms prior to 22.10.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3561'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/d86cbcd96d684e4de8dfa50b4490e4e02782d242'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7389e6eb-4bce-4b97-999d-d3b70d8cee34'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:56:58Z', 'nvd_published_at': '2022-11-20T05:15:00Z'} |
1.4.0 | GHSA-j923-26c2-qq9p | 2022-12-15T20:47:50Z | 2022-11-16T12:00:23Z | null | ['CVE-2022-45387'] | Jenkins BART Plugin vulnerable to cross-site scripting (XSS) | Jenkins BART Plugin 1.0.3 and earlier does not escape the parsed content of build logs before rendering it on the Jenkins UI, resulting in a stored cross-site scripting (XSS) vulnerability. Currently, there are no known workarounds or patches available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:bart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45387'}, {'type': 'WEB', 'url': 'https://github.com/jenkins-infra/update-center2/pull/658'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/bart-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/bart-plugin/blob/30d19e0ded858... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:22:43Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-g56w-cwg4-hxx9 | 2022-11-26T20:18:38Z | 2022-11-22T21:30:17Z | null | ['CVE-2022-4116'] | Code injection in quarkus dev ui config editor | A vulnerability was found in quarkus. This security flaw happens in Dev UI Config Editor which is vulnerable to drive-by localhost attacks leading to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-vertx-http-deployment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.14.0'}, {'fixed': '2.14.2.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-vertx-http-deployment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4116'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-4116'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2144748'}, {'type': 'PACKAGE', 'url': 'https://github.com/quarkusio/quarkus'}, {'type': 'WEB... | {'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T17:42:15Z', 'nvd_published_at': '2022-11-22T19:15:00Z'} |
1.4.0 | GHSA-8c2c-jxwj-jqgf | 2022-12-02T22:18:57Z | 2022-11-25T18:30:25Z | null | ['CVE-2022-41706'] | Browsershot does not validate URL protocols passed to Browsershot URL method | Browsershot version 3.57.2 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate the URL protocol passed to the Browsershot::url method. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'spatie/browsershot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.57.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41706'}, {'type': 'WEB', 'url': 'https://github.com/spatie/browsershot/commit/92cf16fc098211731f80d21687abeafbe2c457ad'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/eminem/'}, {'type': 'PACKAGE', 'url': 'https://github.com/spatie/b... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:18:57Z', 'nvd_published_at': '2022-11-25T18:15:00Z'} |
1.4.0 | GHSA-pcpm-vc4v-cmvx | 2022-11-10T23:56:45Z | 2022-11-10T23:56:45Z | null | [] | eZ Platform users with the Company admin role can assign any role to any user | Critical severity. Users with the Company admin role (introduced by the company account feature in v4) can assign any role to any user. This also applies to any other user that has the role / assign policy. Any subtree limitation in place does not have any effect.
The role / assign policy is typically only given to ad... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-admin-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.29'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-admin-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3... | [{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui/security/advisories/GHSA-pcpm-vc4v-cmvx'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui/commit/29e156a7bbecca5abd946c99546a261679587d29'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-s... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T23:56:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4wph-9vrm-6v3w | 2022-11-22T00:18:15Z | 2022-11-16T19:00:32Z | null | ['CVE-2022-4018'] | Rdiffweb vulnerable to Missing Authentication for Critical Function | Missing Authentication for Critical Function in GitHub repository ikus060/rdiffweb prior to 2.5.0a6. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0a6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4018'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/f2a32f2a9f3fb8be1a9432ac3d81d3aacdb13095'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5340c2f6-0252-40f6-8929-cca5d64958a5'}] | {'cwe_ids': ['CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:18:15Z', 'nvd_published_at': '2022-11-16T13:15:00Z'} |
1.4.0 | GHSA-5gwx-wf9g-r5mx | 2022-11-19T01:15:39Z | 2022-11-13T19:00:41Z | null | ['CVE-2022-3978'] | NodeBB vulnerable to Cross-Site Request Forgery | A vulnerability was found in NodeBB up to 2.5.7. This affects an unknown part of the file /register/abort. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 2.5.8 is able to address this issue. The name of the patch is 2f9d8c350e54543f608d3d4c8e1a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3978'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/issues/11017'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/2f9d8c350e54543f608d3d4c8e1a49bbb6cdea38'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/re... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-16T02:25:31Z', 'nvd_published_at': '2022-11-13T14:15:00Z'} |
1.4.0 | GHSA-mv77-9g28-cwg3 | 2022-11-21T22:09:30Z | 2022-11-21T22:09:30Z | null | ['CVE-2022-41908'] | `CHECK` fail via inputs in `PyFunc` | ### Impact
An input `token` that is not a UTF-8 bytestring will trigger a `CHECK` fail in [`tf.raw_ops.PyFunc`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/python/lib/core/py_func.cc).
```python
import tensorflow as tf
value = tf.constant(value=[1,2])
token = b'\xb0'
dataType = [tf.int32]
tf.raw_... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mv77-9g28-cwg3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41908'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/9f03a9d3bafe902c1e6beb105b2f24172f238645'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:09:30Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-9jc5-9wh5-mc36 | 2022-11-22T00:12:33Z | 2022-11-15T12:00:17Z | null | ['CVE-2022-43688'] | Concrete CMS vulnerable to Cross-site Scripting | Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to Stored Cross-Site Scripting (XSS) in icons since the Microsoft application tile color is not sanitized. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.3'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43688'}, {'type': 'WEB', 'url': 'https://github.com/concretecms/concretecms/pull/10999'}, {'type': 'WEB', 'url': 'https://github.com/concretecms/concretecms/commit/51f19b377a19c97a8b8f1d4d0f13724ed1c7c7a7'}, {'type': 'WEB', 'url': 'https://github.c... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:12:33Z', 'nvd_published_at': '2022-11-14T23:15:00Z'} |
1.4.0 | GHSA-82h9-v8vh-mfpq | 2022-11-30T21:11:25Z | 2022-11-25T18:30:25Z | null | ['CVE-2022-43983'] | Browsershot vulnerable to Cross-Site Scripting (XSS) | Browsershot version 3.57.2 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate that the HTML content passed to the Browsershot::html method does not contain URL's that use the file:// protocol. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'spatie/browsershot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.57.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43983'}, {'type': 'WEB', 'url': 'https://github.com/spatie/browsershot/commit/92cf16fc098211731f80d21687abeafbe2c457ad'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/khalid/'}, {'type': 'PACKAGE', 'url': 'https://github.com/spatie/b... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T21:11:25Z', 'nvd_published_at': '2022-11-25T17:15:00Z'} |
1.4.0 | GHSA-frp9-2v6r-gj97 | 2022-11-02T16:06:48Z | 2022-11-01T12:00:30Z | null | ['CVE-2022-25885'] | muhammara and hummus vulnerable to null pointer dereference on bad response object | The package muhammara before 2.6.0 and the package hummus before 1.0.111 are vulnerable to Denial of Service (DoS) when PDFStreamForResponse() is used with invalid data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'hummus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.111'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.110'}}, {'package': {'ecosystem': 'npm', 'name': 'muhammara'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25885'}, {'type': 'WEB', 'url': 'https://github.com/galkahana/HummusJS/issues/439'}, {'type': 'WEB', 'url': 'https://github.com/julianhille/MuhammaraJS/issues/188'}, {'type': 'WEB', 'url': 'https://github.com/galkahana/HummusJS/commit/a9bf2520ab5ab... | {'cwe_ids': ['CWE-690'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T21:55:25Z', 'nvd_published_at': '2022-11-01T05:15:00Z'} |
1.4.0 | GHSA-2p9h-ccw7-33gf | 2022-11-10T18:52:40Z | 2022-11-10T12:01:17Z | null | ['CVE-2022-42966'] | cleo is vulnerable to Regular Expression Denial of Service (ReDoS) | An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the cleo PyPI package, when an attacker is able to supply arbitrary input to the Table.set_rows method. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'cleo'}, 'ecosystem_specific': {'affected_functions': ['cleo.ui.table.Table._render_cell']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0a5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42966'}, {'type': 'WEB', 'url': 'https://github.com/python-poetry/cleo/pull/285'}, {'type': 'WEB', 'url': 'https://github.com/python-poetry/cleo/commit/b5b9a04d2caf58bf7cf94eb7ae4a1ebbe60ea455'}, {'type': 'PACKAGE', 'url': 'https://github.com/pytho... | {'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T18:52:40Z', 'nvd_published_at': '2022-11-09T20:15:00Z'} |
1.4.0 | GHSA-xf83-q765-xm6m | 2022-11-21T23:51:30Z | 2022-11-21T23:51:30Z | null | [] | `CHECK` fail in `TensorListScatter` and `TensorListScatterV2` in eager mode | ### Impact
Another instance of CVE-2022-35991, where `TensorListScatter` and `TensorListScatterV2` crash via non scalar inputs in`element_shape`, was found in eager mode and fixed.
```python
import tensorflow as tf
arg_0=tf.random.uniform(shape=(2, 2, 2), dtype=tf.float16, maxval=None)
arg_1=tf.random.uniform(shape=(2,... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xf83-q765-xm6m'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:51:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w8wg-62wf-62gm | 2022-11-21T22:26:10Z | 2022-11-16T12:00:23Z | null | ['CVE-2022-45399'] | Missing Authorization in Jenkins Cluster Statistics Plugin | A missing permission check in Jenkins Cluster Statistics Plugin 0.4.6 and earlier allows attackers to delete recorded Jenkins Cluster Statistics. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.zeroturnaround:cluster-stats'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45399'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2938'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:26:10Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-qw4w-vq8v-2wcv | 2022-11-30T19:22:35Z | 2022-11-21T23:59:38Z | null | ['CVE-2022-37430'] | Stored XSS using uppercase characters in HTMLEditor | A malicious content author could add a Javascript payload to the href attribute of a link. A similar issue was identified and fixed via CVE-2022-28803. However, the fix didn't account for the casing of the href attribute. An attacker must have access to the CMS to exploit this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.11.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37430'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2022-37430.yaml'}, {'type': 'WEB', 'url': 'https://www.... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:59:38Z', 'nvd_published_at': '2022-11-23T02:15:00Z'} |
1.4.0 | GHSA-7wqf-h36w-47mc | 2023-04-14T20:31:48Z | 2022-11-22T12:30:22Z | null | ['CVE-2022-38649'] | OS Command Injection in Apache Airflow | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Apache Airflow Pinot Provider, Apache Airflow allows an attacker to control commands executed in the task execution context, without write access to DAG files. This issue affects Apache Airflow Pinot Provider ver... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38649'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/27641'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/033o1gbc4ly6dpd2xf1o201v56fbl4dz'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:16:48Z', 'nvd_published_at': '2022-11-22T10:15:00Z'} |
1.4.0 | GHSA-f92p-f8r2-c87q | 2022-11-03T19:32:16Z | 2022-11-03T12:00:30Z | null | ['CVE-2020-36608'] | Tribal Systems Zenario CMS vulnerable to Cross-site Scripting | A vulnerability has been found in Tribal Systems Zenario CMS prior to version 8.5.51340. Affected by this issue is some unknown functionality of the file `admin_organizer.js` of the component `Error Log Module`. The manipulation leads to cross site scripting. The attack may be launched remotely. The issue is patched in... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.51340'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36608'}, {'type': 'WEB', 'url': 'https://github.com/TribalSystems/Zenario/commit/dfd0afacb26c3682a847bea7b49ea440b63f3baa'}, {'type': 'PACKAGE', 'url': 'https://github.com/TribalSystems/Zenario'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.21281... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T18:15:02Z', 'nvd_published_at': '2022-11-02T19:15:00Z'} |
1.4.0 | GHSA-rg6w-c352-p8pg | 2022-11-22T00:11:13Z | 2022-11-15T12:00:19Z | null | ['CVE-2022-43692'] | Concrete CMS vulnerable to Reflected Cross-site Scripting | Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to Reflected XSS - user can cause an administrator to trigger reflected XSS with a url if the targeted administrator is using an old browser that lacks XSS protection. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.3'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43692'}, {'type': 'WEB', 'url': 'https://github.com/concretecms/concretecms/pull/10996'}, {'type': 'WEB', 'url': 'https://github.com/concretecms/concretecms/commit/0bd65388e5a6d455d8b2469fc166f1b6fdf1abbb'}, {'type': 'WEB', 'url': 'https://github.c... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:11:13Z', 'nvd_published_at': '2022-11-14T19:15:00Z'} |
1.4.0 | GHSA-f2w8-jw48-fr7j | 2022-11-21T21:54:04Z | 2022-11-21T21:54:04Z | null | ['CVE-2022-41897'] | `FractionalMaxPoolGrad` Heap out of bounds read | ### Impact
If [`FractionMaxPoolGrad`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/fractional_max_pool_op.cc) is given outsize inputs `row_pooling_sequence` and `col_pooling_sequence`, TensorFlow will crash.
```python
import tensorflow as tf
tf.raw_ops.FractionMaxPoolGrad(
orig_input =... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f2w8-jw48-fr7j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41897'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/d71090c3e5ca325bdf4b02eb236cfb3ee823e927'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T21:54:04Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-g2qw-6vrr-v6pq | 2022-11-18T06:15:14Z | 2022-11-14T19:00:19Z | null | ['CVE-2022-45136'] | Apache Jena vulnerable to Deserialization of Untrusted Data | ** UNSUPPORTED WHEN ASSIGNED ** Apache Jena SDB 3.17.0 and earlier is vulnerable to a JDBC Deserialisation attack if the attacker is able to control the JDBC URL used or cause the underlying database server to return malicious data. The mySQL JDBC driver in particular is known to be vulnerable to this class of attack. ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jena:jena-sdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45136'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jena'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/mc77cdl5stgjtjoldk467gdf756qjt31'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/11/14/5'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-17T17:47:30Z', 'nvd_published_at': '2022-11-14T16:15:00Z'} |
1.4.0 | GHSA-79gx-3fm8-qxqq | 2022-12-02T22:35:31Z | 2022-11-25T18:30:25Z | null | ['CVE-2022-0698'] | Microweber vulnerable to cross-site scripting (XSS) | Microweber version 1.3.1 allows an unauthenticated user to perform an account takeover via an XSS on the 'select-file' parameter. There was a patch released in the development branch but is not yet committed to the main branch. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0698'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/garrix/'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:35:31Z', 'nvd_published_at': '2022-11-25T18:15:00Z'} |
1.4.0 | GHSA-394j-x37r-2q27 | 2022-11-10T23:54:04Z | 2022-11-10T23:54:04Z | null | [] | Ibexa DXP users with the Company admin role can assign any role to any user | Critical severity. Users with the Company admin role (introduced by the company account feature in v4) can assign any role to any user. This also applies to any other user that has the role / assign policy. Any subtree limitation in place does not have any effect.
The role / assign policy is typically only given to ad... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'ibexa/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ibexa/core/security/advisories/GHSA-394j-x37r-2q27'}, {'type': 'WEB', 'url': 'https://github.com/ibexa/core/commit/da3642c98d2c94607bb53ed2e42654eb92b42e17'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-009-critical-vulnerabilities-in... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T23:54:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4vrc-q7m6-vq7w | 2023-04-13T17:58:05Z | 2022-11-10T12:01:09Z | null | ['CVE-2022-44244'] | Lin CMS vulnerable to Improper Authentication | An authentication bypass in Lin-CMS v0.2.1 allows attackers to escalate privileges to Super Administrator. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Lin-CMS'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.github.talelin:lin-cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44244'}, {'type': 'WEB', 'url': 'https://gist.github.com/cai-niao98/58c97899695488bd73a73d56adf44c4c'}, {'type': 'PACKAGE', 'url': 'https://github.com/TaleLin/lin-cms-flask'}, {'type': 'WEB', 'url': 'https://github.com/cai-niao98/lin-cms/'}] | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:18:48Z', 'nvd_published_at': '2022-11-09T22:15:00Z'} |
1.4.0 | GHSA-59m9-p6cm-94q5 | 2022-11-03T18:10:52Z | 2022-11-03T18:10:52Z | null | ['CVE-2022-44543'] | TYPO3 Extension femanager vulnerable to Broken Access Control | The TYPO3 Extension femanager prior to versions 5.5.2, 6.3.3, and 7.0.1 is vulnerable to broken access control. The `usergroup.inList` validation can be bypassed resulting in new frontend users created by the extension may be members of groups that are restricted. The vulnerability is only exploitable if the field user... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'in2code/femanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'in2code/femanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.3'}]... | [{'type': 'WEB', 'url': 'https://github.com/in2code-de/femanager/commit/827edbc767b1cb6c0cb77d82e46b88fea3b22ad9'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/in2code/femanager/CVE-2022-44543.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/in2code-de/femanager'}, {'ty... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T18:10:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5x9h-p2gx-35mg | 2022-11-21T23:46:18Z | 2022-11-15T12:00:16Z | null | ['CVE-2022-42127'] | Incorrect Default Permissions in Liferay Portal | The Friendly Url module in Liferay Portal 7.4.3.5 through 7.4.3.36, and Liferay DXP 7.4 update 1 though 36 does not properly check user permissions, which allows remote attackers to obtain the history of all friendly URLs that was assigned to a page. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.3.5'}, {'fixed': '7.4.3.48'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.4.3.36'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42127'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17607'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42127'}] | {'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:46:18Z', 'nvd_published_at': '2022-11-15T01:15:00Z'} |
1.4.0 | GHSA-7x4w-j98p-854x | 2022-11-28T16:18:16Z | 2022-11-21T23:53:32Z | null | ['CVE-2022-41938'] | Cross site scripting vulnerability with discussion titles | Flarum's page title system allowed for page titles to be converted into HTML DOM nodes when pages were rendered. The change was made after `v1.5` and was not noticed.
This allowed an attacker to inject malicious HTML markup using a discussion title input, either by creating a new discussion or renaming one. The XSS at... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'flarum/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.6.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/flarum/framework/security/advisories/GHSA-7x4w-j98p-854x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41938'}, {'type': 'WEB', 'url': 'https://github.com/flarum/framework/commit/690de9ce0ffe7ac4d45b73e303f44340c3433138'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:53:32Z', 'nvd_published_at': '2022-11-19T01:15:00Z'} |
1.4.0 | GHSA-h6q3-vv32-2cq5 | 2022-11-21T20:44:24Z | 2022-11-21T20:44:24Z | null | ['CVE-2022-41894'] | Buffer overflow in `CONV_3D_TRANSPOSE` on TFLite | ### Impact
The reference kernel of the [`CONV_3D_TRANSPOSE`](https://github.com/tensorflow/tensorflow/blob/091e63f0ea33def7ecad661a5ac01dcafbafa90b/tensorflow/lite/kernels/internal/reference/conv3d_transpose.h#L121) TensorFlow Lite operator wrongly increments the data_ptr when adding the bias to the result.
Instead of... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6q3-vv32-2cq5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41894'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/72c0bdcb25305b0b36842d746cc61d72658d2941'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:44:24Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-gmf5-q34v-vwvp | 2023-07-07T18:50:36Z | 2022-11-16T19:00:31Z | null | ['CVE-2022-44073'] | Cross-site Scripting in Zenario | Zenario CMS 9.3.57186 is vulnerable to Cross Site Scripting (XSS) via svg, Users & Contacts. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.3.57186'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44073'}, {'type': 'WEB', 'url': 'https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/6'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:29:57Z', 'nvd_published_at': '2022-11-16T16:15:00Z'} |
1.4.0 | GHSA-j5wx-jvw3-j363 | 2022-11-04T18:28:58Z | 2022-11-02T19:00:32Z | null | ['CVE-2022-3827'] | Centreon vulnerable to SQL Injection | A SQL injection vulnerability in Centreon affects unknown code of the file formContactGroup.php of the component Contact Groups Form. The manipulation of the argument cg_id leads to sql injection. The attack can be initiated remotely. Version 22.10.0-beta1 contains a patch for this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.10.0-beta1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3827'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/pull/11869'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/commit/293b10628f7d9f83c6c82c78cf637cbe9b907369'}, {'type': 'PACKAGE', 'url': 'https://github.com/centre... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:28:58Z', 'nvd_published_at': '2022-11-02T13:15:00Z'} |
1.4.0 | GHSA-rc2q-x9mf-w3vf | 2023-05-09T17:53:32Z | 2022-11-19T21:30:25Z | null | ['CVE-2022-4065'] | TestNG is vulnerable to Path Traversal | ### Impact
Affected by this vulnerability is the function `testngXmlExistsInJar` of the file `testng-core/src/main/java/org/testng/JarFileUtils.java` of the component `XML File Parser`.
The manipulation leads to path traversal only for `.xml`, `.yaml` and `.yml` files by default. The attack implies running an unsafe ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.testng:testng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.13'}, {'fixed': '7.5.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.testng:testng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.6.0'}, {'fixed': '7.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4065'}, {'type': 'WEB', 'url': 'https://github.com/cbeust/testng/pull/1596'}, {'type': 'WEB', 'url': 'https://github.com/cbeust/testng/pull/2806'}, {'type': 'WEB', 'url': 'https://github.com/testng-team/testng/pull/2899'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:31:06Z', 'nvd_published_at': '2022-11-19T19:15:00Z'} |
1.4.0 | GHSA-cg88-rpvp-cjv5 | 2022-11-21T22:04:06Z | 2022-11-21T22:04:06Z | null | ['CVE-2022-41902'] | Out of bounds write in grappler in Tensorflow | ### Impact
The function [MakeGrapplerFunctionItem](https://https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/grappler/utils/functions.cc#L221) takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of-bounds me... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cg88-rpvp-cjv5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41902'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a65411a1d69edfb16b25907ffb8f73556ce36bb7'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:04:06Z', 'nvd_published_at': '2022-12-06T22:15:00Z'} |
1.4.0 | GHSA-45r6-j3cc-6mxx | 2023-08-08T11:29:39Z | 2022-11-22T12:30:22Z | null | ['CVE-2022-40954'] | OS Command Injection in Apache Airflow | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Apache Airflow Spark Provider, Apache Airflow allows an attacker to read arbtrary files in the task execution context, without write access to DAG files. This issue affects Spark Provider versions prior to 4.0.0.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40954'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/27646'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/0tmdlnmjs5t4gsx5fy73tb6zd3jztq45'}] | {'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:17:33Z', 'nvd_published_at': '2022-11-22T10:15:00Z'} |
1.4.0 | GHSA-44mr-8vmm-wjhg | 2022-11-15T01:15:47Z | 2022-11-10T21:09:02Z | null | ['CVE-2022-39392'] | Wasmtime out of bounds read/write with zero-memory-pages configuration | ### Impact
There is a bug in Wasmtime's implementation of its pooling instance allocator when the allocator is configured to give WebAssembly instances a maximum of zero pages of memory. In this configuration the virtual memory mapping for WebAssembly memories did not meet the compiler-required configuration requireme... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-44mr-8vmm-wjhg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39392'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/commit/e60c3742904ccbb3e26da201c9221c38a4981d72'}, {'type'... | {'cwe_ids': ['CWE-119', 'CWE-125', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T21:09:02Z', 'nvd_published_at': '2022-11-10T20:15:00Z'} |
1.4.0 | GHSA-vvxf-r4vm-2vm6 | 2022-11-23T18:47:52Z | 2022-11-21T23:59:56Z | null | ['CVE-2022-38462'] | Reflected XSS in querystring parameters | An attacker could inject a XSS payload in a Silverstripe CMS response by carefully crafting a return URL on a /dev/build or /Security/login request.
To exploit this vulnerability, an attacker would need to convince a user to follow a link with a malicious payload.
This will only affect projects configured to output P... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.11.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38462'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2022-38462.yaml'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2022-38462'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:59:56Z', 'nvd_published_at': '2022-11-22T13:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.