schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-4x5r-6v26-7j4v
2022-11-21T22:36:49Z
2022-11-21T22:36:49Z
null
['CVE-2022-41932']
Creation of new database tables through login form on PostgreSQL
### Impact It's possible to make XWiki create many new schemas and fill them with tables just by using a crafted user identifier in the login form. ### Patches The problem has been patched in XWiki 13.10.8, 14.6RC1 and 14.4.2. ### Workarounds The only workarounds for this are: * use an authenticator which does int...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-4x5r-6v26-7j4v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41932'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-1...
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:36:49Z', 'nvd_published_at': '2022-11-23T21:15:00Z'}
1.4.0
GHSA-r4jg-5v89-9v62
2022-11-09T22:35:46Z
2022-11-08T20:48:49Z
2022-11-09T22:35:46Z
['CVE-2022-39390']
Withdrawn: Octocat.js vulnerable to code injection
## Withdrawn This advisory has been withdrawn because it is a test. ## Original Description ### Impact Users can include their own images for accessories via provided URLs. These URLs are not validated and can result in execution of injected code. ### Patches This vulnerability was fixed in version 1.2 of octocat.j...
[]
[{'package': {'ecosystem': 'npm', 'name': 'octocat.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/octocademy/octocat.js/security/advisories/GHSA-r4jg-5v89-9v62'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39390'}, {'type': 'PACKAGE', 'url': 'https://github.com/octocademy/octocat.js'}]
{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T20:48:49Z', 'nvd_published_at': '2022-11-09T01:15:00Z'}
1.4.0
GHSA-qccm-wmcq-pwr6
2022-12-01T22:12:32Z
2022-11-21T22:34:22Z
null
['CVE-2022-41925']
Tailscale daemon is vulnerable to information disclosure via CSRF
A vulnerability identified in the Tailscale client allows a malicious website to access the peer API, which can then be used to access Tailscale environment variables. **Affected platforms:** All **Patched Tailscale client versions:** v1.32.3 or later, v1.33.257 or later (unstable) ### What happened? In the Tailscale...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'tailscale.com/cmd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.32.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tailscale/tailscale/security/advisories/GHSA-qccm-wmcq-pwr6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41925'}, {'type': 'WEB', 'url': 'https://emily.id.au/tailscale'}, {'type': 'PACKAGE', 'url': 'https://github.com/tailscale/tailscale'}, {'type...
{'cwe_ids': ['CWE-200', 'CWE-352'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:34:22Z', 'nvd_published_at': '2022-11-23T19:15:00Z'}
1.4.0
GHSA-q9wv-22m9-vhqh
2023-02-28T16:52:02Z
2022-11-08T17:33:26Z
null
['CVE-2022-41874']
Tauri Filesystem Scope can be Partially Bypassed
### Impact Due to incorrect escaping of special characters in paths selected via the file dialog and drag and drop functionality, it was possible to partially bypass the `fs` scope definition. It was not possible to traverse into arbitrary paths, as the issue was limited to neighboring files and sub folders of already...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'Tauri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.7'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'Tauri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/security/advisories/GHSA-q9wv-22m9-vhqh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41874'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/issues/5234'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/p...
{'cwe_ids': ['CWE-284'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T17:33:26Z', 'nvd_published_at': '2022-11-10T21:15:00Z'}
1.4.0
GHSA-9mfc-chwf-7whf
2022-11-02T18:14:01Z
2022-11-02T18:14:01Z
null
[]
ckb: Large dep group requires a lot of resources to process but the cost to commit the transaction is very low.
### Impact When a transaction contains a dep group with many cells, the resources required to process it are not linear to the transaction size nor spent script cycles. ### Patches In 0.43.3, nodes drop the transactions relayed to them when they contain a dep group with more than 64 cells. They do not ban peers who...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.43.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-9mfc-chwf-7whf'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervosnetwork/ckb'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T18:14:01Z', 'nvd_published_at': None}
1.4.0
GHSA-3ppm-fwhm-qqg6
2022-11-10T21:47:09Z
2022-11-09T19:02:23Z
null
['CVE-2022-43320']
FeehiCMS is vulnerable to Cross-Site Scripting (XSS)
FeehiCMS v2.1.1 was discovered to contain a reflected cross-site scripting (XSS) vulnerability via the id parameter at /web/admin/index.php?r=log%2Fview-layer.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43320'}, {'type': 'WEB', 'url': 'https://github.com/liufee/feehicms/issues/4'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T21:47:09Z', 'nvd_published_at': '2022-11-09T14:15:00Z'}
1.4.0
GHSA-642h-mx8q-47p2
2022-11-21T23:47:59Z
2022-11-15T12:00:16Z
null
['CVE-2022-42126']
Missing permissions check in Liferay Portal
The Asset Libraries module in Liferay Portal 7.3.5 through 7.4.3.28, and Liferay DXP 7.3 before update 8, and DXP 7.4 before update 29 does not properly check permissions of asset libraries, which allows remote authenticated users to view asset libraries via the UI.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.3.5'}, {'fixed': '7.4.3.48'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.4.3.28'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42126'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17593'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42126'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-280'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:47:59Z', 'nvd_published_at': '2022-11-15T01:15:00Z'}
1.4.0
GHSA-x2w2-5552-fjv6
2022-12-15T19:42:11Z
2022-11-16T12:00:23Z
null
['CVE-2022-45392']
Plaintext Storage of a Password in Jenkins NS-ND Integration Performance Publisher Plugin
NS-ND Integration Performance Publisher Plugin 4.8.0.143 and earlier stores passwords unencrypted in job `config.xml` files on the Jenkins controller as part of its configuration. These passwords can be viewed by attackers with Item/Extended Read permission or access to the Jenkins controller file system. NS-ND Integ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:cavisson-ns-nd-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.0.146'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.8.0.143'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45392'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2912'}]
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:23:56Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-mq7h-5574-hw9f
2022-11-21T22:34:35Z
2022-11-21T22:34:35Z
null
['CVE-2022-41927']
Cross-Site Request Forgery (CSRF) allowing to delete or rename tags
### Impact It's possible with a simple request to perform deletion or renaming of tags without needing any confirmation, by using a CSRF attack. ### Patches The problem has been patched in XWiki 13.10.7, 14.4.1 and 14.5RC1. ### Workarounds It's possible to patch existing instances directly by editing the page Ma...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-tag-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2-milestone-2'}, {'fixed': '13.10.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-tag-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'even...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mq7h-5574-hw9f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41927'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/7fd4cda0590180c4d34f557597e9e10e263def9e'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:34:35Z', 'nvd_published_at': '2022-11-23T19:15:00Z'}
1.4.0
GHSA-g6jc-xrc3-4wwq
2022-11-10T23:56:13Z
2022-11-10T23:56:13Z
null
[]
Ibexa DXP users with the Company admin role can assign any role to any user
Critical severity. Users with the Company admin role (introduced by the company account feature in v4) can assign any role to any user. This also applies to any other user that has the role / assign policy. Any subtree limitation in place does not have any effect. The role / assign policy is typically only given to ad...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ibexa/admin-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ibexa/admin-ui/security/advisories/GHSA-g6jc-xrc3-4wwq'}, {'type': 'WEB', 'url': 'https://github.com/ibexa/admin-ui/commit/e34abb0cf4e463ef86a8bda907496a8dd9967807'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-009-critical-vulnerabil...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T23:56:13Z', 'nvd_published_at': None}
1.4.0
GHSA-4j2x-v3mr-467m
2022-11-30T21:21:37Z
2022-11-25T18:30:25Z
null
['CVE-2022-45207']
Jeecg-boot vulnerable to SQL injection via updateNullByEmptyString
Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component updateNullByEmptyString.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45207'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/4127'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/commit/8632a835c23f558dfee3584d7658cc6a13ccec6f'}, {'type': 'WEB', 'url': 'https://github.com/je...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T21:21:37Z', 'nvd_published_at': '2022-11-25T17:15:00Z'}
1.4.0
GHSA-q6jp-gcww-8v2j
2022-11-28T15:50:11Z
2022-11-21T23:46:47Z
null
['CVE-2022-41937']
Missing Authorization in Filter Stream Converter Application of XWiki-platform
### Impact The application allow anyone with view access to modify any page of the wiki by importing a crafted XAR package. ### Patches The problem has been patched in XWiki 14.6RC1, 14.6 and 13.10.8. ### Workarounds The problem can be patched immediately by setting the right of the page Filter.WebHome and making ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-filter-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-filter-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-q6jp-gcww-8v2j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41937'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/fb49b4f289ee28e45cfada8e97e320cd3ed27113'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:46:47Z', 'nvd_published_at': '2022-11-22T01:15:00Z'}
1.4.0
GHSA-395x-wv32-44v5
2022-12-01T22:11:37Z
2022-11-28T22:14:48Z
null
['CVE-2022-39325']
baserproject/basercms vulnerable to cross-site scripting (XSS) vulnerability
There is a cross-site scripting vulnerability on the management system of baserCMS. This is a vulnerability that needs to be addressed when the management system is used by an unspecified number of users. If you are eligible, please update to the new version as soon as possible. ### Target baserCMS 4.7.1 and earlier ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'baserproject/basercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.7.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/security/advisories/GHSA-395x-wv32-44v5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39325'}, {'type': 'WEB', 'url': 'https://github.com/baserproject/basercms/commit/b6f8a54e90dee51317eddf517b776fe8b4cd3ef6'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-28T22:14:48Z', 'nvd_published_at': '2022-11-25T20:15:00Z'}
1.4.0
GHSA-pg98-6v7f-2xfv
2022-11-23T15:44:52Z
2022-11-23T15:44:52Z
null
[]
sweetalert2 v9.17.4 and above contains hidden functionality
`sweetalert2` versions 9.17.4 and up until 10.0.0 are vulnerable to hidden functionality that was introduced by the maintainer. The package outputs audio and/or video messages that do not pertain to the functionality of the package and is not included in versions 9.0.0 - 9.17.3. ### Workaround Use a version 9.0.0 - 9....
[]
[{'package': {'ecosystem': 'npm', 'name': 'sweetalert2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.17.4'}]}], 'database_specific': {'last_known_affected_version_range': '< 10.0.0'}}]
[{'type': 'PACKAGE', 'url': 'https://github.com/sweetalert2/sweetalert2/'}, {'type': 'WEB', 'url': 'https://github.com/sweetalert2/sweetalert2/releases/tag/v11.4.9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/sweetalert2'}]
{'cwe_ids': ['CWE-912'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T15:44:52Z', 'nvd_published_at': None}
1.4.0
GHSA-v87q-rpwp-qr7q
2022-11-30T21:21:54Z
2022-11-25T18:30:25Z
null
['CVE-2022-45210']
Jeecg-boot vulnerable to SQL Injection
Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/user/deleteRecycleBin.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45210'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/4125'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/commit/51e2227bfe54f5d67b09411ee9a336750164e73d'}, {'type': 'PACKAGE', 'url': 'https://github.co...
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T21:21:54Z', 'nvd_published_at': '2022-11-25T17:15:00Z'}
1.4.0
GHSA-4pcg-wr6c-h9cq
2022-11-07T21:13:57Z
2022-11-07T21:13:57Z
null
['CVE-2022-39386']
fastify/websocket vulnerable to uncaught exception via crash on malformed packet
### Impact Any application using @fastify/websocket could crash if a specific, malformed packet is sent. All versions of fastify-websocket are also impacted. That module is deprecated, so it will not be patched. ### Patches This has been patched in v7.1.1 (fastify v4) and v5.0.1 (fastify v3). ### Workarounds No ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@fastify/websocket'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@fastify/websocket'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '7.1.1'}]}]}, {'pac...
[{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-websocket/security/advisories/GHSA-4pcg-wr6c-h9cq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39386'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-websocket/pull/228'}, {'type': 'WEB', 'url': 'https://github.com/fas...
{'cwe_ids': ['CWE-248'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-07T21:13:57Z', 'nvd_published_at': '2022-11-08T22:15:00Z'}
1.4.0
GHSA-q3hq-hm5h-qrx3
2022-11-21T22:18:22Z
2022-11-15T12:00:17Z
null
['CVE-2022-43691']
Concrete CMS vulnerable to Cleartext Transmission of Sensitive Information
Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 inadvertently disclose server-side sensitive information (secrets in environment variables and server information) when Debug Mode is left on in production.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.3'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43691'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/913-release-n...
{'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:18:22Z', 'nvd_published_at': '2022-11-14T23:15:00Z'}
1.4.0
GHSA-prm5-8g2m-24gg
2022-11-09T00:04:54Z
2022-11-08T17:29:16Z
null
['CVE-2022-39396']
Remote code execution via MongoDB BSON parser through prototype pollution
### Impact An attacker can use this prototype pollution sink to trigger a remote code execution through the MongoDB BSON parser. ### Patches Prevent prototype pollution in MongoDB database adapter. ### Workarounds Disable remote code execution through the MongoDB BSON parser. ### Collaborators Mikhail Shcherbak...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.18'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges'...
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-prm5-8g2m-24gg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39396'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/pull/8295'}, {'type': 'WEB', 'url': 'https://github....
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T17:29:16Z', 'nvd_published_at': '2022-11-10T01:15:00Z'}
1.4.0
GHSA-762h-vpvw-3rcx
2022-11-21T20:40:42Z
2022-11-21T20:40:42Z
null
['CVE-2022-41885']
Overflow in `FusedResizeAndPadConv2D`
### Impact When [`tf.raw_ops.FusedResizeAndPadConv2D`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/conv_ops_fused_image_transform.cc) is given a large tensor shape, it overflows. ```python import tensorflow as tf mode = "REFLECT" strides = [1, 1, 1, 1] padding = "SAME" resize_align_cor...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-762h-vpvw-3rcx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41885'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/d66e1d568275e6a2947de97dca7a102a211e01ce'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-131'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:40:42Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-3wmg-28v9-8hf6
2022-11-10T14:31:18Z
2022-11-09T19:02:23Z
null
['CVE-2022-43120']
Subrion CMS is vulnerable to Cross-Site Scripting (XSS)
A cross-site scripting (XSS) vulnerability in the /panel/fields/add component of Intelliants Subrion CMS version 4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Field default value text field.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43120'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/894'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-09T20:57:15Z', 'nvd_published_at': '2022-11-09T16:15:00Z'}
1.4.0
GHSA-f454-jm6x-56q6
2022-11-21T22:28:51Z
2022-11-16T19:00:31Z
null
['CVE-2022-44070']
Cross-site Scripting in Zenario
Zenario CMS 9.3.57186 is vulnerable to Cross Site Scripting (XSS) via News articles.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.3.57186'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44070'}, {'type': 'WEB', 'url': 'https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/3'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:28:51Z', 'nvd_published_at': '2022-11-16T16:15:00Z'}
1.4.0
GHSA-m2vv-5vj5-2hm7
2022-11-22T00:14:54Z
2022-11-14T12:00:15Z
null
['CVE-2022-45198']
Pillow vulnerable to Data Amplification attack.
Pillow before 9.2.0 performs Improper Handling of Highly Compressed GIF Data (Data Amplification).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45198'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/6402'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/6402/commits/c9f1b35e981075110a23487a8d4a6cbb59a588ea'}, {'type': 'WEB', 'url': 'https://gith...
{'cwe_ids': ['CWE-409'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:14:54Z', 'nvd_published_at': '2022-11-14T07:15:00Z'}
1.4.0
GHSA-2x8x-jmrp-phxw
2022-12-12T20:48:37Z
2022-11-30T21:18:34Z
null
['CVE-2022-45442']
Sinatra vulnerable to Reflected File Download attack
### Description An issue was discovered in Sinatra 2.0 before 2.2.3 and 3.0 before 3.0.4. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a response when the filename is derived from user-supplied input. ### References * https://www.blackhat.com/docs/e...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'sinatra'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'sinatra'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sinatra/sinatra/security/advisories/GHSA-2x8x-jmrp-phxw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45442'}, {'type': 'WEB', 'url': 'https://github.com/sinatra/sinatra/commit/ea8fc9495a350f7551b39e3025bfcd06f49f363b'}, {'type': 'ADVISORY', 'url':...
{'cwe_ids': ['CWE-494'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T21:18:34Z', 'nvd_published_at': '2022-11-28T21:15:00Z'}
1.4.0
GHSA-653v-rqx9-j85p
2022-11-16T20:50:01Z
2022-11-04T12:00:25Z
null
['CVE-2022-41713']
deep-object-diff vulnerable to Prototype Pollution
deep-object-diff before version 1.1.6 allows an external attacker to edit or add new properties to an object. This is possible because the application does not properly validate incoming JSON keys, thus allowing the `__proto__` property to be edited. This issue was fixed in version 1.1.9.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'deep-object-diff'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.6'}, {'fixed': '1.1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41713'}, {'type': 'WEB', 'url': 'https://github.com/mattphillips/deep-object-diff/issues/85'}, {'type': 'WEB', 'url': 'https://github.com/mattphillips/deep-object-diff/issues/85#issuecomment-1312450353'}, {'type': 'WEB', 'url': 'https://github.com/...
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T14:48:51Z', 'nvd_published_at': '2022-11-03T20:15:00Z'}
1.4.0
GHSA-cqvq-fvhr-v6hc
2022-11-21T23:51:53Z
2022-11-21T23:51:53Z
null
[]
`CHECK` failure in `SobolSample` via missing validation
### Impact Another instance of CVE-2022-35935, where `SobolSample` is vulnerable to a denial of service via assumed scalar inputs, was found and fixed. ```python import tensorflow as tf tf.raw_ops.SobolSample(dim=tf.constant([1,0]), num_results=tf.constant([1]), skip=tf.constant([1])) ``` ### Patches We have patched t...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cqvq-fvhr-v6hc'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:51:53Z', 'nvd_published_at': None}
1.4.0
GHSA-jvc3-wjf6-7c6c
2022-12-02T22:37:38Z
2022-11-24T18:30:28Z
null
['CVE-2022-26885']
Apache Dolphin Scheduler has insufficiently protected credentials
When using tasks to read config files, there is a risk of database password disclosure. We recommend you upgrade to version 2.0.6 or higher.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26885'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dolphinscheduler'}, {'type': 'WEB', 'url': 'https://github.com/apache/dolphinscheduler/releases/tag/2.0.6'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/z7084r9cs2r26cszkkgj...
{'cwe_ids': ['CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:37:38Z', 'nvd_published_at': '2022-11-24T16:15:00Z'}
1.4.0
GHSA-3w3h-7xgx-grwc
2023-02-08T16:18:19Z
2022-11-21T20:39:05Z
null
['CVE-2022-39397']
Leak in Aliyun KeySecret
### Impact Users of this library will be affected when using this library, the incoming secret will be disclosed unintentionally. ### Patches This have already been solved. ### Workarounds No, It cannot be patched without upgrading ### References No ### For more information If you have any questions or comments abo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:P/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'aliyun-oss-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tu6ge/oss-rs/security/advisories/GHSA-3w3h-7xgx-grwc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39397'}, {'type': 'WEB', 'url': 'https://github.com/tu6ge/oss-rs/commit/e4553f7d74fce682d802f8fb073943387796df29'}, {'type': 'PACKAGE', 'url': 'https...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:39:05Z', 'nvd_published_at': '2022-11-22T21:15:00Z'}
1.4.0
GHSA-22wj-vf5f-wrvj
2022-11-30T23:34:15Z
2022-11-23T21:30:31Z
null
['CVE-2022-45868']
Password exposure in H2 Database
The web-based admin console in H2 Database Engine through 2.1.214 can be started via the CLI with the argument -webAdminPassword, which allows the user to specify the password in cleartext for the web admin console. Consequently, a local user (or an attacker that has obtained local access through some means) would be a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.h2database:h2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.220'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45868'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2database/pull/3833'}, {'type': 'WEB', 'url': 'https://github.com/h2database/h2database/commit/581ed18ff9d6b3761d851620ed88a3994a351a0d'}, {'type': 'PACKAGE', 'url': 'https://github.co...
{'cwe_ids': ['CWE-200', 'CWE-312'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T22:31:05Z', 'nvd_published_at': '2022-11-23T21:15:00Z'}
1.4.0
GHSA-jf2p-4gqj-849g
2022-12-01T22:12:03Z
2022-11-28T22:09:09Z
null
['CVE-2022-41954']
Temporary File Information Disclosure vulnerability in MPXJ
### Impact On Unix-like operating systems (not Windows or macos), MPXJ's use of `File.createTempFile(..)` results in temporary files being created with the permissions `-rw-r--r--`. This means that any other user on the system can read the contents of this file. When MPXJ is reading a type of schedule file which requir...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.sf.mpxj:mpxj'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.14.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'net.sf.mpxj'}, 'ecosystem_specific': {'affected_functions': ['']}, '...
[{'type': 'WEB', 'url': 'https://github.com/joniles/mpxj/security/advisories/GHSA-jf2p-4gqj-849g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41954'}, {'type': 'WEB', 'url': 'https://github.com/joniles/mpxj/commit/ae0af24345d79ad45705265d9927fe55e94a5721'}, {'type': 'PACKAGE', 'url': 'https...
{'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-28T22:09:09Z', 'nvd_published_at': '2022-11-25T19:15:00Z'}
1.4.0
GHSA-pp74-g2q5-j4jf
2023-09-20T10:18:39Z
2022-11-21T23:59:26Z
null
['CVE-2022-37421']
Silverstipe CMS Stored XSS in custom meta tags
A malicious content author could create a custom meta tag and execute an arbitrary JavaScript payload. This would require convincing a legitimate user to access a page and enter a custom keyboard shortcut. This requires CMS access to exploit.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.11.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37421'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/cms/CVE-2022-37421.yaml'}, {'type': 'WEB', 'url': 'https://www.silver...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:59:26Z', 'nvd_published_at': '2022-11-23T03:15:00Z'}
1.4.0
GHSA-p55m-g4m3-qmrp
2022-11-21T23:56:13Z
2022-11-20T06:30:15Z
null
['CVE-2022-4069']
Cross-site Scripting in librenms/librenms
Cross-site Scripting (XSS) - Generic in GitHub repository librenms/librenms prior to 22.10.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4069'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/8383376f1355812e09ec0c2af67f6d46891b7ba7'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a9925d98-dac4-4c3c-835a-d93aeecfb2c5'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:56:13Z', 'nvd_published_at': '2022-11-20T05:15:00Z'}
1.4.0
GHSA-83g7-8fch-p37m
2022-12-01T22:10:00Z
2022-11-26T03:30:27Z
null
['CVE-2022-45908']
PaddlePaddle vulnerable to code injection via winstr
In PaddlePaddle before 2.4, paddle.audio.functional.get_window is vulnerable to code injection because it calls eval on a user-supplied winstr. This may lead to arbitrary code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'paddlepaddle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45908'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle/Paddle/commit/26c419ca386aeae3c461faf2b828d00b48e908eb'}, {'type': 'PACKAGE', 'url': 'https://github.com/PaddlePaddle/Paddle'}, {'type': 'WEB', 'url': 'https://github.com/PaddlePaddle...
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T21:19:52Z', 'nvd_published_at': '2022-11-26T02:15:00Z'}
1.4.0
GHSA-f3hw-3h74-wr98
2022-11-29T17:53:46Z
2022-11-20T06:30:16Z
null
['CVE-2022-4068']
Cross-site Scripting in librenms/librenms
A user is able to enable their own account if it was disabled by an admin while the user still holds a valid session. Moreover, the username is not properly sanitized in the admin user overview. This enables an XSS attack that enables an attacker with a low privilege user to execute arbitrary JavaScript in the context ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4068'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/09a2977adb8bc4b1db116c725d661160c930d3a1'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/becfecc4-...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:56:23Z', 'nvd_published_at': '2022-11-20T05:15:00Z'}
1.4.0
GHSA-cvh4-cjc9-84qm
2022-12-02T22:20:46Z
2022-11-29T21:30:25Z
null
['CVE-2022-3751']
owncast is vulnerable to SQL Injection
SQL Injection in GitHub repository owncast/owncast prior to 0.0.13.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/owncast/owncast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3751'}, {'type': 'WEB', 'url': 'https://github.com/owncast/owncast/pull/2257'}, {'type': 'WEB', 'url': 'https://github.com/owncast/owncast/commit/23b6e5868d5501726c27a3fabbecf49000968591'}, {'type': 'PACKAGE', 'url': 'https://github.com/owncast/own...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:20:46Z', 'nvd_published_at': '2022-11-29T21:15:00Z'}
1.4.0
GHSA-98pf-gfh3-x3mp
2022-11-10T16:02:51Z
2022-11-10T16:02:51Z
null
[]
Read the Docs vulnerable to Cross-Site Scripting (XSS)
### Impact This vulnerability allowed a malicious user to serve arbitrary HTML files from the main application domain (readthedocs[.]org/readthedocs[.]com) by exploiting a vulnerability in the code that serves downloadable content from a project. Exploiting this would have required the attacker to get a logged-in us...
[]
[{'package': {'ecosystem': 'npm', 'name': 'readthedocs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.8.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/readthedocs/readthedocs.org/security/advisories/GHSA-98pf-gfh3-x3mp'}, {'type': 'WEB', 'url': 'https://github.com/readthedocs/readthedocs.org/commit/b0ae626acd13882170ec5888e35f3ef2e48e6ff6'}, {'type': 'PACKAGE', 'url': 'https://github.com/readthedocs/readthedocs.org'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T16:02:51Z', 'nvd_published_at': None}
1.4.0
GHSA-xgqr-5wqw-9fpv
2022-11-04T20:44:39Z
2022-11-03T19:00:26Z
null
['CVE-2022-32287']
Apache UIMA Path Traversal vulnerability
A relative path traversal vulnerability in a FileUtil class used by the PEAR management component of Apache UIMA allows an attacker to create files outside the designated target directory using carefully crafted ZIP entry names. This issue affects Apache UIMA Apache UIMA version 3.3.0 and prior versions. Note that PEAR...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.uima:uimaj-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32287'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/57vk0d79j94d0lk0vol8xn935yv1shdd'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/11/03/4'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T21:11:17Z', 'nvd_published_at': '2022-11-03T12:15:00Z'}
1.4.0
GHSA-hc82-w9v8-83pr
2022-11-18T18:50:01Z
2022-11-18T18:50:01Z
null
['CVE-2022-39389']
Witness Block Parsing DoS Vulnerability
### Impact All lnd nodes before version `v0.15.4` are vulnerable to a block parsing bug that can cause a node to enter a degraded state once encountered. In this degraded state, nodes can continue to make payments and forward HTLCs, and close out channels. Opening channels is prohibited, and also on chain transaction ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/lightningnetwork/lnd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.4-beta'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/lightningnetwork/lnd/security/advisories/GHSA-hc82-w9v8-83pr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39389'}, {'type': 'WEB', 'url': 'https://github.com/lightningnetwork/lnd/issues/7096'}, {'type': 'WEB', 'url': 'https://github.com/lightningn...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-18T18:50:01Z', 'nvd_published_at': '2022-11-17T22:15:00Z'}
1.4.0
GHSA-h246-cgh4-7475
2022-11-21T20:42:10Z
2022-11-21T20:42:10Z
null
['CVE-2022-41890']
`CHECK` fail in `BCast` overflow
### Impact If [`BCast::ToShape`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/util/bcast.h) is given input larger than an `int32`, it will crash, despite being supposed to handle up to an `int64`. An example can be seen in [`tf.experimental.numpy.outer`](https://github.com/tensorflow/tensorflow/...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h246-cgh4-7475'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41890'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8310bf8dd188ff780e7fc53245058215a05bdbe5'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-704'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:42:10Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-3g9q-cmgv-g4p6
2022-12-15T18:54:00Z
2022-11-16T12:00:22Z
null
['CVE-2022-45381']
Arbitrary file read vulnerability in Jenkins Pipeline Utility Steps Plugin
Pipeline Utility Steps Plugin implements a `readProperties` Pipeline step that supports interpolation of variables using the Apache Commons Configuration library. Pipeline Utility Steps Plugin 2.13.1 and earlier does not restrict the set of enabled prefix interpolators and bundles versions of this library that enable ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-utility-steps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.13.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45381'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-utility-steps-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2949'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:21:17Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-2chg-86hq-7w38
2022-11-15T01:41:05Z
2022-11-07T12:00:34Z
null
['CVE-2022-44797']
btcd mishandles witness size checking
btcd before 0.23.2, as used in Lightning Labs lnd before 0.15.2-beta and other Bitcoin-related products, mishandles witness size checking.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/btcsuite/btcd/wire'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/lightningnetwork/lnd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44797'}, {'type': 'WEB', 'url': 'https://github.com/lightningnetwork/lnd/issues/7002'}, {'type': 'WEB', 'url': 'https://github.com/btcsuite/btcd/pull/1896'}, {'type': 'WEB', 'url': 'https://github.com/btcsuite/btcd/pull/1896/commits/f523d4ccaa5f34a...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-07T16:15:55Z', 'nvd_published_at': '2022-11-07T04:15:00Z'}
1.4.0
GHSA-mcmr-49x3-4jqm
2022-11-02T18:15:07Z
2022-11-02T18:15:07Z
null
[]
ckb type_id script resume may randomly fail
### Impact https://github.com/nervosnetwork/ckb/blob/v0.101.2/script/src/verify.rs#L871-L879 TypeIdSystemScript resume handle is not correct when max_cycles is not enough, `ScriptError::ExceededMaximumCycles` will be raised directly ranther than suspend as expect, and also because script_group execution order is random...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.100.0'}, {'fixed': '0.102.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-mcmr-49x3-4jqm'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervosnetwork/ckb'}, {'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/blob/v0.101.2/script/src/verify.rs#L871-L879'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T18:15:07Z', 'nvd_published_at': None}
1.4.0
GHSA-qq6h-5g6j-q3cm
2022-11-23T15:33:20Z
2022-11-23T15:26:43Z
null
[]
sweetalert2 v11.4.9 and above contains hidden functionality
`sweetalert2` versions 11.4.9 and above are vulnerable to hidden functionality that was introduced by the maintainer. The package outputs audio and/or video messages that do not pertain to the functionality of the package and is not included in versions 11.0.0 - 11.4.8. ### Workaround Use a version 11.0.0 - 11.4.8 of ...
[]
[{'package': {'ecosystem': 'npm', 'name': 'sweetalert2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.4.9'}]}], 'database_specific': {'last_known_affected_version_range': '< 11.6.14'}}]
[{'type': 'PACKAGE', 'url': 'https://github.com/sweetalert2/sweetalert2/'}, {'type': 'WEB', 'url': 'https://github.com/sweetalert2/sweetalert2/releases/tag/v11.4.9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/sweetalert2'}]
{'cwe_ids': ['CWE-912'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T15:26:43Z', 'nvd_published_at': None}
1.4.0
GHSA-r9xx-4cmv-856x
2022-11-21T22:28:29Z
2022-11-16T19:00:31Z
null
['CVE-2022-44069']
Cross-site Scripting in Zenario
Zenario CMS 9.3.57186 is vulnerable to Cross Site Scripting (XSS) via the Nest library module.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.3.57186'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44069'}, {'type': 'WEB', 'url': 'https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/4'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:28:29Z', 'nvd_published_at': '2022-11-16T16:15:00Z'}
1.4.0
GHSA-w37g-rhq8-7m4j
2022-12-05T21:45:23Z
2022-11-11T19:00:31Z
null
['CVE-2022-41854']
Snakeyaml vulnerable to Stack overflow leading to denial of service
Those using Snakeyaml to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack overflow. This effect may support a denial of service attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.yaml:snakeyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.32'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41854'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/commits/e230a1758842beec93d28eddfde568c21774780a'}, {'type': 'WEB', 'url': 'https://bitbucket.org/sn...
{'cwe_ids': ['CWE-121', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:27:27Z', 'nvd_published_at': '2022-11-11T13:15:00Z'}
1.4.0
GHSA-g6x4-57hp-j4xm
2022-11-21T23:49:44Z
2022-11-15T12:00:16Z
null
['CVE-2022-42129']
Authorization Bypass in Liferay Portal
An Insecure direct object reference (IDOR) vulnerability in the Dynamic Data Mapping module in Liferay Portal 7.3.2 through 7.4.3.4, and Liferay DXP 7.3 before update 4, and 7.4 GA allows remote authenticated users to view and access form entries via the `formInstanceRecordId` parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.3.2'}, {'fixed': '7.4.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42129'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17448'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42129'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:49:44Z', 'nvd_published_at': '2022-11-15T02:15:00Z'}
1.4.0
GHSA-3qmc-2r76-4rqp
2022-11-10T15:51:01Z
2022-11-10T15:51:01Z
null
[]
Redwood is vulnerable to account takeover via dbAuth "forgot-password"
# Impact _What kind of vulnerability is it? Who is impacted?_ This is an API vulnerability in Redwood's [dbAuth], specifically the dbAuth forgot password feature: - only projects with the dbAuth "forgot password" feature are affected - this vulnerability was introduced in v0.38.0 ## User Accounts are Vulnerable to T...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': '@redwoodjs/api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.38.0'}, {'fixed': '2.2.5'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@redwoodjs/api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/redwoodjs/redwood/security/advisories/GHSA-3qmc-2r76-4rqp'}, {'type': 'WEB', 'url': 'https://github.com/redwoodjs/redwood/issues/6343'}, {'type': 'WEB', 'url': 'https://github.com/redwoodjs/redwood/pull/6778'}, {'type': 'PACKAGE', 'url': 'https://github.com/redwoodjs/redwood'...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T15:51:01Z', 'nvd_published_at': None}
1.4.0
GHSA-fv42-mx39-6fpw
2022-12-15T18:45:27Z
2022-11-16T12:00:22Z
null
['CVE-2022-45379']
Whole-script approval in Jenkins Script Security Plugin vulnerable to SHA-1 collisions
Script Security Plugin 1189.vb_a_b_7c8fd5fde and earlier stores whole-script approvals as the [SHA-1 hash](https://en.wikipedia.org/wiki/SHA-1) of the approved script. SHA-1 no longer meets the security standards for producing a cryptographically secure message digest. Script Security Plugin 1190.v65867a_a_47126 uses ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:script-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1190.v65867a_a_47126'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1189.vb'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45379'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/script-security-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2564'}]
{'cwe_ids': ['CWE-326', 'CWE-328'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:20:41Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-qqhf-xfhw-7884
2022-11-04T20:49:16Z
2022-11-04T12:00:25Z
null
['CVE-2022-41710']
Markdownify has Files or Directories Accessible to External Parties
Markdownify version 1.4.1 allows an external attacker to remotely obtain arbitrary local files on any client that attempts to view a malicious markdown file through Markdownify. This is possible because the application does not have a CSP policy (or at least not strict enough) and/or does not properly validate the cont...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'electron-markdownify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41710'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/noisestorm/'}, {'type': 'PACKAGE', 'url': 'https://github.com/amitmerchant1990/electron-markdownify'}]
{'cwe_ids': ['CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T20:49:16Z', 'nvd_published_at': '2022-11-03T20:15:00Z'}
1.4.0
GHSA-j874-47xx-9xfg
2022-12-16T14:35:51Z
2022-11-16T12:00:23Z
null
['CVE-2022-45394']
Missing permission check in Jenkins Delete log Plugin
A missing permission check in Jenkins Delete log Plugin 1.0 and earlier allows attackers with Item/Read permission to delete build logs. As of publication of this advisory, there is no fix.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:delete-log-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45394'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/delete-log-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2920'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T14:35:51Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-q2hm-2h45-v5g3
2022-12-03T04:09:18Z
2022-11-21T22:37:11Z
null
['CVE-2022-41933']
Plaintext storage of password after a reset in org.xwiki.platform:xwiki-platform-security-authentication-default
### Impact We discovered that when the reset a forgotten password feature of XWiki was used, the password was then stored in plain text in database. This only concerns XWiki 13.1RC1 and next versions. Note that it only concerns the reset password feature available from the "Forgot your password" link in the login view...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-security-authentication-default'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.1RC1'}, {'fixed': '13.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-security-authentication-default...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-599v-w48h-rjrm'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-q2hm-2h45-v5g3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41933'}, {'type': 'WEB', 'url': 'h...
{'cwe_ids': ['CWE-312', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:37:11Z', 'nvd_published_at': '2022-11-23T21:15:00Z'}
1.4.0
GHSA-25gv-mvm7-5h3h
2022-11-30T21:21:08Z
2022-11-25T18:30:25Z
null
['CVE-2022-45208']
Jeecg-boot vulnerable to SQL injection via /sys/user/putRecycleBin
Jeecg-boot v3.4.3 was discovered to contain a SQL injection vulnerability via the component /sys/user/putRecycleBin.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45208'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/4126'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/commit/51e2227bfe54f5d67b09411ee9a336750164e73d'}, {'type': 'PACKAGE', 'url': 'https://github.co...
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T21:21:08Z', 'nvd_published_at': '2022-11-25T17:15:00Z'}
1.4.0
GHSA-m7gv-v8xx-v47w
2022-11-08T15:17:36Z
2022-11-04T18:58:46Z
null
['CVE-2022-39387']
XWiki OIDC Authenticator vulnerable to bypassing OpenID login by providing a custom provider
### Impact Even if a wiki has an OpenID provider configured through its xwiki.properties, it is possible to provide a third party provider by providing its details through request parameters. One can then bypass the XWiki authentication altogether by specifying its own provider through the oidc.endpoint.* request para...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.contrib.oidc:oidc-authenticator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.29.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki-contrib/oidc/security/advisories/GHSA-m7gv-v8xx-v47w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39387'}, {'type': 'WEB', 'url': 'https://github.com/xwiki-contrib/oidc/commit/0247af1417925b9734ab106ad7cd934ee870ac89'}, {'type': 'PACKAGE', '...
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:58:46Z', 'nvd_published_at': '2022-11-04T19:15:00Z'}
1.4.0
GHSA-457r-cqc8-9vj9
2022-11-23T15:39:50Z
2022-11-23T15:39:50Z
null
[]
sweetalert2 v10.16.10 and above contains hidden functionality
`sweetalert2` versions 10.16.10 and up until 11.0.0 are vulnerable to hidden functionality that was introduced by the maintainer. The package outputs audio and/or video messages that do not pertain to the functionality of the package and is not included in versions 10.0.0 - 10.16.9. ### Workaround Use a version 10.0.0...
[]
[{'package': {'ecosystem': 'npm', 'name': 'sweetalert2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.16.10'}]}], 'database_specific': {'last_known_affected_version_range': '< 11.0.0'}}]
[{'type': 'PACKAGE', 'url': 'https://github.com/sweetalert2/sweetalert2/'}, {'type': 'WEB', 'url': 'https://github.com/sweetalert2/sweetalert2/releases/tag/v11.4.9'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/sweetalert2'}]
{'cwe_ids': ['CWE-912'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T15:39:50Z', 'nvd_published_at': None}
1.4.0
GHSA-xprv-wvh7-qqqx
2023-08-21T18:16:54Z
2022-11-09T20:47:27Z
null
['CVE-2022-41878']
Parse Server vulnerable to Prototype Pollution via Cloud Code Webhooks or Cloud Code Triggers
### Impact Keywords that are specified in the Parse Server option `requestKeywordDenylist` can be injected via Cloud Code Webhooks or Triggers. This will result in the keyword being saved to the database, bypassing the `requestKeywordDenylist` option. ### Patches Improved keyword detection. ### Workarounds Configu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.19'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges'...
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-xprv-wvh7-qqqx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41878'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/pull/8301'}, {'type': 'WEB', 'url': 'https://github....
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-09T20:47:27Z', 'nvd_published_at': '2022-11-10T23:15:00Z'}
1.4.0
GHSA-m2xp-jxfg-qq6g
2023-02-02T16:59:55Z
2022-11-22T03:30:56Z
null
['CVE-2022-43685']
CKAN contains Improper Authentication leading to account takeover
CKAN through 2.9.6 account takeovers by unauthenticated users when an existing user id is sent via an HTTP POST request. This allows a user to take over an existing account including superuser accounts.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ckan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43685'}, {'type': 'WEB', 'url': 'https://ckan.org/'}, {'type': 'WEB', 'url': 'https://ckan.org/blog/get-latest-patch-releases-your-ckan-site-october-2022'}, {'type': 'PACKAGE', 'url': 'https://github.com/ckan/ckan'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-02T16:59:55Z', 'nvd_published_at': '2022-11-22T01:15:00Z'}
1.4.0
GHSA-6q49-35h6-rq2p
2022-12-02T22:32:45Z
2022-11-25T18:30:25Z
null
['CVE-2022-43984']
Browsershot version 3.57.3 vulnerable to improper input validation
Browsershot version 3.57.3 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate that the JS content imported from an external source passed to the Browsershot::html method does not contain URLs that use the file:// protocol.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'spatie/browsershot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.57.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43984'}, {'type': 'WEB', 'url': 'https://github.com/spatie/browsershot/commit/554c3e566fde8c47ad1ac9be47eaeb9a84c4dfe2'}, {'type': 'WEB', 'url': 'https://github.com/spatie/browsershot/commit/92cf16fc098211731f80d21687abeafbe2c457ad'}, {'type': 'WEB...
{'cwe_ids': ['CWE-20', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:32:45Z', 'nvd_published_at': '2022-11-25T17:15:00Z'}
1.4.0
GHSA-8r69-3cvp-wxc3
2022-11-02T18:18:50Z
2022-11-02T18:18:10Z
null
[]
Batched HTTP requests may set incorrect `cache-control` response header
### Impact In Apollo Server 3 and 4, the `cache-control` HTTP response header may not reflect the cache policy that should apply to an HTTP request when that HTTP request contains multiple operations using HTTP batching. This could lead to data being inappropriately cached and shared. Apollo Server allows clients to s...
[]
[{'package': {'ecosystem': 'npm', 'name': 'apollo-server-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.11.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@apollo/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/security/advisories/GHSA-8r69-3cvp-wxc3'}, {'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/commit/2a2d1e3b4bbb1f2802b09004444029bd1adb9c19'}, {'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/commit/69be2...
{'cwe_ids': ['CWE-524'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T18:18:10Z', 'nvd_published_at': None}
1.4.0
GHSA-8g2p-5pqh-5jmc
2023-01-30T23:02:28Z
2022-11-08T23:00:22Z
null
['CVE-2022-41064']
.NET Information Disclosure Vulnerability
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET, .NET Core and .NET Framework's System.Data.SqlClient and Microsoft.Data.SqlClient NuGet Packages. A vulnerability exists in System.Data.SqlClient and Microsoft.Data.SqlClient libraries where a timeout occurring under hi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.Data.SqlClient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.1.3'}}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Data.SqlClient'}, 'ranges': [{'type...
[{'type': 'WEB', 'url': 'https://github.com/dotnet/corefx/security/advisories/GHSA-8g2p-5pqh-5jmc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41064'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/runtime/issues/78042'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/corefx'}, {...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T23:00:22Z', 'nvd_published_at': None}
1.4.0
GHSA-3cxx-3f53-m92c
2022-11-22T00:12:17Z
2022-11-15T12:00:17Z
null
['CVE-2022-43686']
Concrete CMS vulnerable to Uncontrolled Resource Consumption leading to DoS
In Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2, the authTypeConcreteCookieMap table can be filled up causing a denial of service (high load).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ecosystem_specific': {'affected_fu...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43686'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/913-release-n...
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:12:17Z', 'nvd_published_at': '2022-11-14T22:15:00Z'}
1.4.0
GHSA-vrv9-3x3w-ffxw
2022-11-03T19:32:24Z
2022-11-01T12:00:36Z
null
['CVE-2022-3783']
node-red-dashboard vulnerable to Cross-site Scripting
node-red-dashboard contains a cross-site scripting vulnerability. This issue affects some unknown processing of the file `components/ui-component/ui-component-ctrl.js` of the component ui_text Format Handler. The attack may be initiated remotely. The issue is patched in version 3.2.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-red-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3783'}, {'type': 'WEB', 'url': 'https://github.com/node-red/node-red-dashboard/issues/772'}, {'type': 'WEB', 'url': 'https://github.com/node-red/node-red-dashboard/commit/9305d1a82f19b235dfad24a7d1dd4ed244db7743'}, {'type': 'PACKAGE', 'url': 'https...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T19:00:00Z', 'nvd_published_at': '2022-10-31T21:15:00Z'}
1.4.0
GHSA-6657-9743-4mc6
2022-12-06T18:52:07Z
2022-11-30T12:30:20Z
null
['CVE-2022-4231']
Tribal Systems Zenario CMS vulnerable to Session Fixation
Tribal Systems Zenario CMS 9.3.57595 is vulnerable to session fixation. In Zenario CMS, the user session identifier (authentication token) is issued to the browser prior to authentication but is not changed after user logout and login again into the application when "Remember me" option active. Failing to issue a new s...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.3.57595'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4231'}, {'type': 'PACKAGE', 'url': 'https://github.com/TribalSystems/Zenario'}, {'type': 'WEB', 'url': 'https://github.com/lithonn/bug-report/tree/main/vendors/tribalsystems/zenario/session-fixation'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id....
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T18:31:41Z', 'nvd_published_at': '2022-11-30T12:15:00Z'}
1.4.0
GHSA-h8jm-2x53-xhp5
2022-11-02T21:46:40Z
2022-11-01T17:45:21Z
null
['CVE-2022-3786']
X.509 Email Address Variable Length Buffer Overflow
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3786'}, {'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/pull/1452'}, {'type': 'WEB', 'url': 'https://github.com/alexcrichton/openssl-src-rs/commit/4a31c14f31e1a08c18893a37e304dd1dd4b7daa3'}, {'type': 'WEB', 'url': 'https://github.com...
{'cwe_ids': ['CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T17:45:21Z', 'nvd_published_at': '2022-11-01T18:15:00Z'}
1.4.0
GHSA-g389-rf5p-fg56
2022-12-02T22:37:15Z
2022-11-25T18:30:25Z
null
['CVE-2022-41705']
Badaso vulnerable to Remote Code Execution (RCE)
Badaso version 2.6.3 allows an unauthenticated remote attacker to execute arbitrary code remotely on the server. This is possible because the application does not properly validate the data uploaded by users.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'badaso/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41705'}, {'type': 'WEB', 'url': 'https://github.com/uasoft-indonesia/badaso/issues/818'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/headhunterz/'}, {'type': 'PACKAGE', 'url': 'https://github.com/uasoft-indonesia/badaso'}, {'type':...
{'cwe_ids': ['CWE-434', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:37:15Z', 'nvd_published_at': '2022-11-25T18:15:00Z'}
1.4.0
GHSA-66jf-xm2m-7m8r
2022-11-30T19:22:42Z
2022-11-22T00:00:16Z
null
['CVE-2022-38145']
Stored XSS in Compare Mode
A malicious content author could add a Javascript payload to a page's meta description and get it executed in the versioned history compare view. This vulnerability requires access to the CMS to be deployed. The attacker must then convince a privileged user to access the version history for that page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/versioned-admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.11.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38145'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/versioned-admin/CVE-2022-38145.yaml'}, {'type': 'WEB', 'url': 'https:...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:00:16Z', 'nvd_published_at': '2022-11-23T02:15:00Z'}
1.4.0
GHSA-6w8h-26xx-cf8q
2022-11-21T22:37:27Z
2022-11-21T22:37:27Z
null
['CVE-2022-41934']
Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in org.xwiki.platform:xwiki-platform-menu-ui
### Impact Any user with view rights on commonly accessible documents including the menu macro can execute arbitrary Groovy, Python or Velocity code in XWiki leading to full access to the XWiki installation due to improper escaping of the macro content and parameters of the menu macro. The issue can be demonstrated by...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-menu-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-menu-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-6w8h-26xx-cf8q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41934'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/2fc20891e6c6b0ca05ee07e315e7f435e8919f8d'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-116', 'CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:37:27Z', 'nvd_published_at': '2022-11-23T20:15:00Z'}
1.4.0
GHSA-755v-r4x4-qf7m
2022-11-29T23:55:23Z
2022-11-29T23:55:23Z
null
[]
Stored Cross-Site Scripting (XSS) in Keycloak via groups dropdown
### Summary A Stored XSS vulnerability was reported in the Keycloak Security mailing list, affecting all the versions of Keycloak, including the latest release (16.0.1). The vulnerability allows a privileged attacker to execute malicious scripts in the admin console, abusing of the groups' dropdown functionality. ##...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-755v-r4x4-qf7m'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
{'cwe_ids': ['CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T23:55:23Z', 'nvd_published_at': None}
1.4.0
GHSA-264w-gw9g-fhgj
2022-11-21T23:56:58Z
2022-11-20T06:30:16Z
null
['CVE-2022-3561']
Cross-site Scripting in librenms/librenms
Cross-site Scripting (XSS) - Generic in GitHub repository librenms/librenms prior to 22.10.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3561'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/d86cbcd96d684e4de8dfa50b4490e4e02782d242'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7389e6eb-4bce-4b97-999d-d3b70d8cee34'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:56:58Z', 'nvd_published_at': '2022-11-20T05:15:00Z'}
1.4.0
GHSA-j923-26c2-qq9p
2022-12-15T20:47:50Z
2022-11-16T12:00:23Z
null
['CVE-2022-45387']
Jenkins BART Plugin vulnerable to cross-site scripting (XSS)
Jenkins BART Plugin 1.0.3 and earlier does not escape the parsed content of build logs before rendering it on the Jenkins UI, resulting in a stored cross-site scripting (XSS) vulnerability. Currently, there are no known workarounds or patches available.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:bart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45387'}, {'type': 'WEB', 'url': 'https://github.com/jenkins-infra/update-center2/pull/658'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/bart-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/bart-plugin/blob/30d19e0ded858...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:22:43Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-g56w-cwg4-hxx9
2022-11-26T20:18:38Z
2022-11-22T21:30:17Z
null
['CVE-2022-4116']
Code injection in quarkus dev ui config editor
A vulnerability was found in quarkus. This security flaw happens in Dev UI Config Editor which is vulnerable to drive-by localhost attacks leading to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-vertx-http-deployment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.14.0'}, {'fixed': '2.14.2.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-vertx-http-deployment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4116'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-4116'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2144748'}, {'type': 'PACKAGE', 'url': 'https://github.com/quarkusio/quarkus'}, {'type': 'WEB...
{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-23T17:42:15Z', 'nvd_published_at': '2022-11-22T19:15:00Z'}
1.4.0
GHSA-8c2c-jxwj-jqgf
2022-12-02T22:18:57Z
2022-11-25T18:30:25Z
null
['CVE-2022-41706']
Browsershot does not validate URL protocols passed to Browsershot URL method
Browsershot version 3.57.2 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate the URL protocol passed to the Browsershot::url method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'spatie/browsershot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.57.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41706'}, {'type': 'WEB', 'url': 'https://github.com/spatie/browsershot/commit/92cf16fc098211731f80d21687abeafbe2c457ad'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/eminem/'}, {'type': 'PACKAGE', 'url': 'https://github.com/spatie/b...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:18:57Z', 'nvd_published_at': '2022-11-25T18:15:00Z'}
1.4.0
GHSA-pcpm-vc4v-cmvx
2022-11-10T23:56:45Z
2022-11-10T23:56:45Z
null
[]
eZ Platform users with the Company admin role can assign any role to any user
Critical severity. Users with the Company admin role (introduced by the company account feature in v4) can assign any role to any user. This also applies to any other user that has the role / assign policy. Any subtree limitation in place does not have any effect. The role / assign policy is typically only given to ad...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-admin-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.29'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-admin-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3...
[{'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui/security/advisories/GHSA-pcpm-vc4v-cmvx'}, {'type': 'WEB', 'url': 'https://github.com/ezsystems/ezplatform-admin-ui/commit/29e156a7bbecca5abd946c99546a261679587d29'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-s...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T23:56:45Z', 'nvd_published_at': None}
1.4.0
GHSA-4wph-9vrm-6v3w
2022-11-22T00:18:15Z
2022-11-16T19:00:32Z
null
['CVE-2022-4018']
Rdiffweb vulnerable to Missing Authentication for Critical Function
Missing Authentication for Critical Function in GitHub repository ikus060/rdiffweb prior to 2.5.0a6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0a6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4018'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/f2a32f2a9f3fb8be1a9432ac3d81d3aacdb13095'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5340c2f6-0252-40f6-8929-cca5d64958a5'}]
{'cwe_ids': ['CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:18:15Z', 'nvd_published_at': '2022-11-16T13:15:00Z'}
1.4.0
GHSA-5gwx-wf9g-r5mx
2022-11-19T01:15:39Z
2022-11-13T19:00:41Z
null
['CVE-2022-3978']
NodeBB vulnerable to Cross-Site Request Forgery
A vulnerability was found in NodeBB up to 2.5.7. This affects an unknown part of the file /register/abort. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. Upgrading to version 2.5.8 is able to address this issue. The name of the patch is 2f9d8c350e54543f608d3d4c8e1a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3978'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/issues/11017'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/2f9d8c350e54543f608d3d4c8e1a49bbb6cdea38'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/re...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-16T02:25:31Z', 'nvd_published_at': '2022-11-13T14:15:00Z'}
1.4.0
GHSA-mv77-9g28-cwg3
2022-11-21T22:09:30Z
2022-11-21T22:09:30Z
null
['CVE-2022-41908']
`CHECK` fail via inputs in `PyFunc`
### Impact An input `token` that is not a UTF-8 bytestring will trigger a `CHECK` fail in [`tf.raw_ops.PyFunc`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/python/lib/core/py_func.cc). ```python import tensorflow as tf value = tf.constant(value=[1,2]) token = b'\xb0' dataType = [tf.int32] tf.raw_...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mv77-9g28-cwg3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41908'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/9f03a9d3bafe902c1e6beb105b2f24172f238645'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:09:30Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-9jc5-9wh5-mc36
2022-11-22T00:12:33Z
2022-11-15T12:00:17Z
null
['CVE-2022-43688']
Concrete CMS vulnerable to Cross-site Scripting
Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to Stored Cross-Site Scripting (XSS) in icons since the Microsoft application tile color is not sanitized. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.3'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43688'}, {'type': 'WEB', 'url': 'https://github.com/concretecms/concretecms/pull/10999'}, {'type': 'WEB', 'url': 'https://github.com/concretecms/concretecms/commit/51f19b377a19c97a8b8f1d4d0f13724ed1c7c7a7'}, {'type': 'WEB', 'url': 'https://github.c...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:12:33Z', 'nvd_published_at': '2022-11-14T23:15:00Z'}
1.4.0
GHSA-82h9-v8vh-mfpq
2022-11-30T21:11:25Z
2022-11-25T18:30:25Z
null
['CVE-2022-43983']
Browsershot vulnerable to Cross-Site Scripting (XSS)
Browsershot version 3.57.2 allows an external attacker to remotely obtain arbitrary local files. This is possible because the application does not validate that the HTML content passed to the Browsershot::html method does not contain URL's that use the file:// protocol.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'spatie/browsershot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.57.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43983'}, {'type': 'WEB', 'url': 'https://github.com/spatie/browsershot/commit/92cf16fc098211731f80d21687abeafbe2c457ad'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/khalid/'}, {'type': 'PACKAGE', 'url': 'https://github.com/spatie/b...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T21:11:25Z', 'nvd_published_at': '2022-11-25T17:15:00Z'}
1.4.0
GHSA-frp9-2v6r-gj97
2022-11-02T16:06:48Z
2022-11-01T12:00:30Z
null
['CVE-2022-25885']
muhammara and hummus vulnerable to null pointer dereference on bad response object
The package muhammara before 2.6.0 and the package hummus before 1.0.111 are vulnerable to Denial of Service (DoS) when PDFStreamForResponse() is used with invalid data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'hummus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.111'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.110'}}, {'package': {'ecosystem': 'npm', 'name': 'muhammara'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25885'}, {'type': 'WEB', 'url': 'https://github.com/galkahana/HummusJS/issues/439'}, {'type': 'WEB', 'url': 'https://github.com/julianhille/MuhammaraJS/issues/188'}, {'type': 'WEB', 'url': 'https://github.com/galkahana/HummusJS/commit/a9bf2520ab5ab...
{'cwe_ids': ['CWE-690'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T21:55:25Z', 'nvd_published_at': '2022-11-01T05:15:00Z'}
1.4.0
GHSA-2p9h-ccw7-33gf
2022-11-10T18:52:40Z
2022-11-10T12:01:17Z
null
['CVE-2022-42966']
cleo is vulnerable to Regular Expression Denial of Service (ReDoS)
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the cleo PyPI package, when an attacker is able to supply arbitrary input to the Table.set_rows method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'cleo'}, 'ecosystem_specific': {'affected_functions': ['cleo.ui.table.Table._render_cell']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0a5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42966'}, {'type': 'WEB', 'url': 'https://github.com/python-poetry/cleo/pull/285'}, {'type': 'WEB', 'url': 'https://github.com/python-poetry/cleo/commit/b5b9a04d2caf58bf7cf94eb7ae4a1ebbe60ea455'}, {'type': 'PACKAGE', 'url': 'https://github.com/pytho...
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T18:52:40Z', 'nvd_published_at': '2022-11-09T20:15:00Z'}
1.4.0
GHSA-xf83-q765-xm6m
2022-11-21T23:51:30Z
2022-11-21T23:51:30Z
null
[]
`CHECK` fail in `TensorListScatter` and `TensorListScatterV2` in eager mode
### Impact Another instance of CVE-2022-35991, where `TensorListScatter` and `TensorListScatterV2` crash via non scalar inputs in`element_shape`, was found in eager mode and fixed. ```python import tensorflow as tf arg_0=tf.random.uniform(shape=(2, 2, 2), dtype=tf.float16, maxval=None) arg_1=tf.random.uniform(shape=(2,...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-xf83-q765-xm6m'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:51:30Z', 'nvd_published_at': None}
1.4.0
GHSA-w8wg-62wf-62gm
2022-11-21T22:26:10Z
2022-11-16T12:00:23Z
null
['CVE-2022-45399']
Missing Authorization in Jenkins Cluster Statistics Plugin
A missing permission check in Jenkins Cluster Statistics Plugin 0.4.6 and earlier allows attackers to delete recorded Jenkins Cluster Statistics.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.zeroturnaround:cluster-stats'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45399'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2938'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:26:10Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-qw4w-vq8v-2wcv
2022-11-30T19:22:35Z
2022-11-21T23:59:38Z
null
['CVE-2022-37430']
Stored XSS using uppercase characters in HTMLEditor
A malicious content author could add a Javascript payload to the href attribute of a link. A similar issue was identified and fixed via CVE-2022-28803. However, the fix didn't account for the casing of the href attribute. An attacker must have access to the CMS to exploit this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.11.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37430'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2022-37430.yaml'}, {'type': 'WEB', 'url': 'https://www....
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:59:38Z', 'nvd_published_at': '2022-11-23T02:15:00Z'}
1.4.0
GHSA-7wqf-h36w-47mc
2023-04-14T20:31:48Z
2022-11-22T12:30:22Z
null
['CVE-2022-38649']
OS Command Injection in Apache Airflow
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Apache Airflow Pinot Provider, Apache Airflow allows an attacker to control commands executed in the task execution context, without write access to DAG files. This issue affects Apache Airflow Pinot Provider ver...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38649'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/27641'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/033o1gbc4ly6dpd2xf1o201v56fbl4dz'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:16:48Z', 'nvd_published_at': '2022-11-22T10:15:00Z'}
1.4.0
GHSA-f92p-f8r2-c87q
2022-11-03T19:32:16Z
2022-11-03T12:00:30Z
null
['CVE-2020-36608']
Tribal Systems Zenario CMS vulnerable to Cross-site Scripting
A vulnerability has been found in Tribal Systems Zenario CMS prior to version 8.5.51340. Affected by this issue is some unknown functionality of the file `admin_organizer.js` of the component `Error Log Module`. The manipulation leads to cross site scripting. The attack may be launched remotely. The issue is patched in...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.51340'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36608'}, {'type': 'WEB', 'url': 'https://github.com/TribalSystems/Zenario/commit/dfd0afacb26c3682a847bea7b49ea440b63f3baa'}, {'type': 'PACKAGE', 'url': 'https://github.com/TribalSystems/Zenario'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.21281...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T18:15:02Z', 'nvd_published_at': '2022-11-02T19:15:00Z'}
1.4.0
GHSA-rg6w-c352-p8pg
2022-11-22T00:11:13Z
2022-11-15T12:00:19Z
null
['CVE-2022-43692']
Concrete CMS vulnerable to Reflected Cross-site Scripting
Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to Reflected XSS - user can cause an administrator to trigger reflected XSS with a url if the targeted administrator is using an old browser that lacks XSS protection. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.3'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43692'}, {'type': 'WEB', 'url': 'https://github.com/concretecms/concretecms/pull/10996'}, {'type': 'WEB', 'url': 'https://github.com/concretecms/concretecms/commit/0bd65388e5a6d455d8b2469fc166f1b6fdf1abbb'}, {'type': 'WEB', 'url': 'https://github.c...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:11:13Z', 'nvd_published_at': '2022-11-14T19:15:00Z'}
1.4.0
GHSA-f2w8-jw48-fr7j
2022-11-21T21:54:04Z
2022-11-21T21:54:04Z
null
['CVE-2022-41897']
`FractionalMaxPoolGrad` Heap out of bounds read
### Impact If [`FractionMaxPoolGrad`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/fractional_max_pool_op.cc) is given outsize inputs `row_pooling_sequence` and `col_pooling_sequence`, TensorFlow will crash. ```python import tensorflow as tf tf.raw_ops.FractionMaxPoolGrad( orig_input =...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f2w8-jw48-fr7j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41897'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/d71090c3e5ca325bdf4b02eb236cfb3ee823e927'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T21:54:04Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-g2qw-6vrr-v6pq
2022-11-18T06:15:14Z
2022-11-14T19:00:19Z
null
['CVE-2022-45136']
Apache Jena vulnerable to Deserialization of Untrusted Data
** UNSUPPORTED WHEN ASSIGNED ** Apache Jena SDB 3.17.0 and earlier is vulnerable to a JDBC Deserialisation attack if the attacker is able to control the JDBC URL used or cause the underlying database server to return malicious data. The mySQL JDBC driver in particular is known to be vulnerable to this class of attack. ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jena:jena-sdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45136'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jena'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/mc77cdl5stgjtjoldk467gdf756qjt31'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/11/14/5'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-17T17:47:30Z', 'nvd_published_at': '2022-11-14T16:15:00Z'}
1.4.0
GHSA-79gx-3fm8-qxqq
2022-12-02T22:35:31Z
2022-11-25T18:30:25Z
null
['CVE-2022-0698']
Microweber vulnerable to cross-site scripting (XSS)
Microweber version 1.3.1 allows an unauthenticated user to perform an account takeover via an XSS on the 'select-file' parameter. There was a patch released in the development branch but is not yet committed to the main branch.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0698'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/garrix/'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:35:31Z', 'nvd_published_at': '2022-11-25T18:15:00Z'}
1.4.0
GHSA-394j-x37r-2q27
2022-11-10T23:54:04Z
2022-11-10T23:54:04Z
null
[]
Ibexa DXP users with the Company admin role can assign any role to any user
Critical severity. Users with the Company admin role (introduced by the company account feature in v4) can assign any role to any user. This also applies to any other user that has the role / assign policy. Any subtree limitation in place does not have any effect. The role / assign policy is typically only given to ad...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ibexa/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ibexa/core/security/advisories/GHSA-394j-x37r-2q27'}, {'type': 'WEB', 'url': 'https://github.com/ibexa/core/commit/da3642c98d2c94607bb53ed2e42654eb92b42e17'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-009-critical-vulnerabilities-in...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T23:54:04Z', 'nvd_published_at': None}
1.4.0
GHSA-4vrc-q7m6-vq7w
2023-04-13T17:58:05Z
2022-11-10T12:01:09Z
null
['CVE-2022-44244']
Lin CMS vulnerable to Improper Authentication
An authentication bypass in Lin-CMS v0.2.1 allows attackers to escalate privileges to Super Administrator.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Lin-CMS'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.github.talelin:lin-cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44244'}, {'type': 'WEB', 'url': 'https://gist.github.com/cai-niao98/58c97899695488bd73a73d56adf44c4c'}, {'type': 'PACKAGE', 'url': 'https://github.com/TaleLin/lin-cms-flask'}, {'type': 'WEB', 'url': 'https://github.com/cai-niao98/lin-cms/'}]
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:18:48Z', 'nvd_published_at': '2022-11-09T22:15:00Z'}
1.4.0
GHSA-59m9-p6cm-94q5
2022-11-03T18:10:52Z
2022-11-03T18:10:52Z
null
['CVE-2022-44543']
TYPO3 Extension femanager vulnerable to Broken Access Control
The TYPO3 Extension femanager prior to versions 5.5.2, 6.3.3, and 7.0.1 is vulnerable to broken access control. The `usergroup.inList` validation can be bypassed resulting in new frontend users created by the extension may be members of groups that are restricted. The vulnerability is only exploitable if the field user...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'in2code/femanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'in2code/femanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.3.3'}]...
[{'type': 'WEB', 'url': 'https://github.com/in2code-de/femanager/commit/827edbc767b1cb6c0cb77d82e46b88fea3b22ad9'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/in2code/femanager/CVE-2022-44543.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/in2code-de/femanager'}, {'ty...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T18:10:52Z', 'nvd_published_at': None}
1.4.0
GHSA-5x9h-p2gx-35mg
2022-11-21T23:46:18Z
2022-11-15T12:00:16Z
null
['CVE-2022-42127']
Incorrect Default Permissions in Liferay Portal
The Friendly Url module in Liferay Portal 7.4.3.5 through 7.4.3.36, and Liferay DXP 7.4 update 1 though 36 does not properly check user permissions, which allows remote attackers to obtain the history of all friendly URLs that was assigned to a page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.3.5'}, {'fixed': '7.4.3.48'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.4.3.36'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42127'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17607'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42127'}]
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:46:18Z', 'nvd_published_at': '2022-11-15T01:15:00Z'}
1.4.0
GHSA-7x4w-j98p-854x
2022-11-28T16:18:16Z
2022-11-21T23:53:32Z
null
['CVE-2022-41938']
Cross site scripting vulnerability with discussion titles
Flarum's page title system allowed for page titles to be converted into HTML DOM nodes when pages were rendered. The change was made after `v1.5` and was not noticed. This allowed an attacker to inject malicious HTML markup using a discussion title input, either by creating a new discussion or renaming one. The XSS at...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'flarum/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.6.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/flarum/framework/security/advisories/GHSA-7x4w-j98p-854x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41938'}, {'type': 'WEB', 'url': 'https://github.com/flarum/framework/commit/690de9ce0ffe7ac4d45b73e303f44340c3433138'}, {'type': 'WEB', 'url': 'h...
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:53:32Z', 'nvd_published_at': '2022-11-19T01:15:00Z'}
1.4.0
GHSA-h6q3-vv32-2cq5
2022-11-21T20:44:24Z
2022-11-21T20:44:24Z
null
['CVE-2022-41894']
Buffer overflow in `CONV_3D_TRANSPOSE` on TFLite
### Impact The reference kernel of the [`CONV_3D_TRANSPOSE`](https://github.com/tensorflow/tensorflow/blob/091e63f0ea33def7ecad661a5ac01dcafbafa90b/tensorflow/lite/kernels/internal/reference/conv3d_transpose.h#L121) TensorFlow Lite operator wrongly increments the data_ptr when adding the bias to the result. Instead of...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6q3-vv32-2cq5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41894'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/72c0bdcb25305b0b36842d746cc61d72658d2941'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-120'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:44:24Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-gmf5-q34v-vwvp
2023-07-07T18:50:36Z
2022-11-16T19:00:31Z
null
['CVE-2022-44073']
Cross-site Scripting in Zenario
Zenario CMS 9.3.57186 is vulnerable to Cross Site Scripting (XSS) via svg, Users & Contacts.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.3.57186'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44073'}, {'type': 'WEB', 'url': 'https://github.com/hieuminhnv/Zenario-CMS-last-version/issues/6'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:29:57Z', 'nvd_published_at': '2022-11-16T16:15:00Z'}
1.4.0
GHSA-j5wx-jvw3-j363
2022-11-04T18:28:58Z
2022-11-02T19:00:32Z
null
['CVE-2022-3827']
Centreon vulnerable to SQL Injection
A SQL injection vulnerability in Centreon affects unknown code of the file formContactGroup.php of the component Contact Groups Form. The manipulation of the argument cg_id leads to sql injection. The attack can be initiated remotely. Version 22.10.0-beta1 contains a patch for this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.10.0-beta1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3827'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/pull/11869'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/commit/293b10628f7d9f83c6c82c78cf637cbe9b907369'}, {'type': 'PACKAGE', 'url': 'https://github.com/centre...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T18:28:58Z', 'nvd_published_at': '2022-11-02T13:15:00Z'}
1.4.0
GHSA-rc2q-x9mf-w3vf
2023-05-09T17:53:32Z
2022-11-19T21:30:25Z
null
['CVE-2022-4065']
TestNG is vulnerable to Path Traversal
### Impact Affected by this vulnerability is the function `testngXmlExistsInJar` of the file `testng-core/src/main/java/org/testng/JarFileUtils.java` of the component `XML File Parser`. The manipulation leads to path traversal only for `.xml`, `.yaml` and `.yml` files by default. The attack implies running an unsafe ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.testng:testng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.13'}, {'fixed': '7.5.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.testng:testng'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.6.0'}, {'fixed': '7.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4065'}, {'type': 'WEB', 'url': 'https://github.com/cbeust/testng/pull/1596'}, {'type': 'WEB', 'url': 'https://github.com/cbeust/testng/pull/2806'}, {'type': 'WEB', 'url': 'https://github.com/testng-team/testng/pull/2899'}, {'type': 'WEB', 'url': 'h...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:31:06Z', 'nvd_published_at': '2022-11-19T19:15:00Z'}
1.4.0
GHSA-cg88-rpvp-cjv5
2022-11-21T22:04:06Z
2022-11-21T22:04:06Z
null
['CVE-2022-41902']
Out of bounds write in grappler in Tensorflow
### Impact The function [MakeGrapplerFunctionItem](https://https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/grappler/utils/functions.cc#L221) takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of-bounds me...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cg88-rpvp-cjv5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41902'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a65411a1d69edfb16b25907ffb8f73556ce36bb7'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:04:06Z', 'nvd_published_at': '2022-12-06T22:15:00Z'}
1.4.0
GHSA-45r6-j3cc-6mxx
2023-08-08T11:29:39Z
2022-11-22T12:30:22Z
null
['CVE-2022-40954']
OS Command Injection in Apache Airflow
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in Apache Airflow Spark Provider, Apache Airflow allows an attacker to read arbtrary files in the task execution context, without write access to DAG files. This issue affects Spark Provider versions prior to 4.0.0....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40954'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/27646'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/0tmdlnmjs5t4gsx5fy73tb6zd3jztq45'}]
{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T19:17:33Z', 'nvd_published_at': '2022-11-22T10:15:00Z'}
1.4.0
GHSA-44mr-8vmm-wjhg
2022-11-15T01:15:47Z
2022-11-10T21:09:02Z
null
['CVE-2022-39392']
Wasmtime out of bounds read/write with zero-memory-pages configuration
### Impact There is a bug in Wasmtime's implementation of its pooling instance allocator when the allocator is configured to give WebAssembly instances a maximum of zero pages of memory. In this configuration the virtual memory mapping for WebAssembly memories did not meet the compiler-required configuration requireme...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-44mr-8vmm-wjhg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39392'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/commit/e60c3742904ccbb3e26da201c9221c38a4981d72'}, {'type'...
{'cwe_ids': ['CWE-119', 'CWE-125', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T21:09:02Z', 'nvd_published_at': '2022-11-10T20:15:00Z'}
1.4.0
GHSA-vvxf-r4vm-2vm6
2022-11-23T18:47:52Z
2022-11-21T23:59:56Z
null
['CVE-2022-38462']
Reflected XSS in querystring parameters
An attacker could inject a XSS payload in a Silverstripe CMS response by carefully crafting a return URL on a /dev/build or /Security/login request. To exploit this vulnerability, an attacker would need to convince a user to follow a link with a malicious payload. This will only affect projects configured to output P...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.11.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38462'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/CVE-2022-38462.yaml'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2022-38462'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:59:56Z', 'nvd_published_at': '2022-11-22T13:15:00Z'}