schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-gpv5-rp6w-58r8 | 2022-11-22T00:13:44Z | 2022-11-22T00:13:44Z | null | [] | Remote code execution vulnerability in dependency System.Drawing.Common | ### Impact
The core Akka module depended on an old System.Configuration.ConfigurationManager version 4.7.0 which transitively depends on System.Common.Drawing v4.7.0. The System.Common.Drawing v4.7.0 is affected by a remote code execution vulnerability https://github.com/advisories/GHSA-ghhp-997w-qr28.
The real-world... | [] | [{'package': {'ecosystem': 'NuGet', 'name': 'Akka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.46'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Akka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0-alpha1'}, {'fixed': '1.5.0-alpha3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/akkadotnet/akka.net/security/advisories/GHSA-gpv5-rp6w-58r8'}, {'type': 'PACKAGE', 'url': 'https://github.com/akkadotnet/akka.net'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:13:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-995f-9x5r-2rcj | 2022-11-28T23:33:19Z | 2022-11-25T03:30:19Z | null | ['CVE-2022-4135'] | Heap buffer overflow in GPU | Heap buffer overflow in GPU in Google Chrome prior to 107.0.5304.121 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.0.0'}, {'fixed': '19.1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4135'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/36444'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/36447'}, {'type': 'WEB', 'url': 'https://chromereleases.googleblog.com/2022/11/stable-channel-updat... | {'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-28T23:33:19Z', 'nvd_published_at': '2022-11-25T01:15:00Z'} |
1.4.0 | GHSA-7fxj-fr3v-r9gj | 2022-11-24T01:13:44Z | 2022-11-04T19:01:17Z | null | ['CVE-2022-3023'] | TiDB vulnerable to Use of Externally-Controlled Format String | TiDB server (importer CLI tool) prior to version 6.4.0 & 6.1.3 is vulnerable to data source name injection. The database name for generating and inserting data into a database does not properly sanitize user input which can lead to arbitrary file reads." | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/pingcap/tidb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.1.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pingcap/tidb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'last_affected':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3023'}, {'type': 'WEB', 'url': 'https://github.com/pingcap/tidb/commit/d0376379d615cc8f263a0b17c031ce403c8dcbfb'}, {'type': 'WEB', 'url': 'https://advisory.dw1.io/45'}, {'type': 'PACKAGE', 'url': 'https://github.com/pingcap/tidb'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-134'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T20:48:44Z', 'nvd_published_at': '2022-11-04T12:15:00Z'} |
1.4.0 | GHSA-5m39-wx2q-mxg3 | 2022-11-08T21:56:43Z | 2022-11-08T21:42:06Z | null | [] | Invalid use of `mem::uninitialized` causes `use-of-uninitialized-value` | The compression and decompression function used `mem:uninitialized` to create an array of uninitialized values, to later write values into it. This later leads to reads from uninitialized memory.
The flaw was corrected in commit b633bf265e41c60dfce3be7eac4e4dd5e18d06cf by using a heap-allocated `Vec` and removing out ... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'lzf'}, 'ecosystem_specific': {'affected_functions': ['lzf::compress', 'lzf::decompress']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/badboy/lzf-rs/issues/9'}, {'type': 'WEB', 'url': 'https://github.com/badboy/lzf-rs/commit/b633bf265e41c60dfce3be7eac4e4dd5e18d06cf'}, {'type': 'PACKAGE', 'url': 'https://github.com/badboy/lzf-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0067.html'... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T21:42:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-39hc-v87j-747x | 2022-11-02T18:11:56Z | 2022-11-02T18:11:56Z | null | [] | Vulnerable OpenSSL included in cryptography wheels | pyca/cryptography's wheels include a statically linked copy of OpenSSL. The versions of OpenSSL included in cryptography 37.0.0-38.0.3 are vulnerable to a number of security issues. More details about the vulnerabilities themselves can be found in https://www.openssl.org/news/secadv/20221101.txt.
If you are building c... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '37.0.0'}, {'fixed': '38.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/security/advisories/GHSA-39hc-v87j-747x'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/382e759bcded5773330eeed748c86b213ec618c5'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/cf2ada625d1188d6cd46396f301b98095da... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T18:11:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jrvr-gmqv-hgrh | 2022-11-10T14:31:35Z | 2022-11-09T19:02:23Z | null | ['CVE-2022-43121'] | Subrion CMS is vulnerable to Cross-Site Scripting (XSS) | A cross-site scripting (XSS) vulnerability in the CMS Field Add page of Intelliants Subrion CMS in version 4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the tooltip text field. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43121'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/895'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-09T20:57:11Z', 'nvd_published_at': '2022-11-09T16:15:00Z'} |
1.4.0 | GHSA-hq7g-wwwp-q46h | 2022-11-21T21:54:18Z | 2022-11-21T21:54:18Z | null | ['CVE-2022-41898'] | `CHECK` fail via inputs in `SparseFillEmptyRowsGrad` | ### Impact
If [`SparseFillEmptyRowsGrad`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/sparse_fill_empty_rows_op_gpu.cu.cc) is given empty inputs, TensorFlow will crash.
```python
import tensorflow as tf
tf.raw_ops.SparseFillEmptyRowsGrad(
reverse_index_map=[], grad_values=[], name=... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hq7g-wwwp-q46h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41898'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/af4a6a3c8b95022c351edae94560acc61253a1b8'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T21:54:18Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-97xg-phpr-rg8q | 2022-11-08T15:08:59Z | 2022-11-07T19:00:22Z | null | ['CVE-2022-42920'] | Apache Commons BCEL vulnerable to out-of-bounds write | Apache Commons BCEL has a number of APIs that would normally only allow changing specific class characteristics. However, due to an out-of-bounds writing issue, these APIs can be used to produce arbitrary bytecode. This could be abused in applications that pass attacker-controllable data to those APIs, giving the attac... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.bcel:bcel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42920'}, {'type': 'WEB', 'url': 'https://github.com/apache/commons-bcel/pull/147'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-bcel'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/BCEL-363'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-07T21:05:28Z', 'nvd_published_at': '2022-11-07T13:15:00Z'} |
1.4.0 | GHSA-p22x-g9px-3945 | 2022-12-20T15:48:56Z | 2022-11-01T12:00:30Z | null | ['CVE-2022-42252'] | Apache Tomcat may reject request containing invalid Content-Length header | If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling at... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.83'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-M1'}, {'fixed':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42252'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/zzcxzvqfdqn515zfs3dxb7n8gty589sq'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-37'}] | {'cwe_ids': ['CWE-20', 'CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T18:37:42Z', 'nvd_published_at': '2022-11-01T09:15:00Z'} |
1.4.0 | GHSA-frqp-wp83-qggv | 2022-11-21T22:17:52Z | 2022-11-21T22:17:52Z | null | ['CVE-2022-41910'] | Heap overflow in `QuantizeAndDequantizeV2` | ### Impact
The function [MakeGrapplerFunctionItem](https://https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/grappler/utils/functions.cc#L221) takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of-bounds me... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-frqp-wp83-qggv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41910'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a65411a1d69edfb16b25907ffb8f73556ce36bb7'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:17:52Z', 'nvd_published_at': '2022-12-06T22:15:00Z'} |
1.4.0 | GHSA-cjp8-vv38-p3g2 | 2023-06-27T22:20:22Z | 2022-11-16T12:00:18Z | null | ['CVE-2022-4014'] | Cross-Site Request Forgery in feehi/feehicms | FeehiCMS vulnerable to Cross-Site Request Forgery. Affected by this issue is some unknown functionality of the component Post My Comment Tab. The manipulation leads to cross-site request forgery. The attack may be launched remotely. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'feehi/feehicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4014'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/feehicms'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.213788'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:52:50Z', 'nvd_published_at': '2022-11-16T08:15:00Z'} |
1.4.0 | GHSA-4598-wcg8-x56g | 2022-12-15T20:46:48Z | 2022-11-16T12:00:23Z | null | ['CVE-2022-45386'] | XML External Entity Reference in Jenkins Violations Plugin | Violations Plugin 0.7.11 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers to control XML input files for the 'Report Violations' post-build step to have agent processes parse a crafted file that uses external entities for extraction of secrets from the J... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:violations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45386'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/violations-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-766'}] | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:22:34Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-7fw6-6mfj-g3q2 | 2022-11-02T18:14:30Z | 2022-11-02T18:14:30Z | null | [] | ckb: Transaction header_deps validation issue (network forking) | ### Impact
fn `HeaderChecker#check_valid` skipped main chain checking after this PR: https://github.com/nervosnetwork/ckb/pull/1646/files#diff-c4e017b67c1b3005ca0c446a9b0879571aa36a858b1f7ddd1b9328a884e3214bR171-R176
It will cause network forking if one transaction is using a forked block header which is not exists in... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.101.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.101.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-7fw6-6mfj-g3q2'}, {'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/pull/1646/files#diff-c4e017b67c1b3005ca0c446a9b0879571aa36a858b1f7ddd1b9328a884e3214bR171-R176'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervosnet... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T18:14:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g8hp-rc67-jf96 | 2022-11-21T23:49:10Z | 2022-11-15T12:00:16Z | null | ['CVE-2022-42125'] | Path Traversal in Liferay Portal | Zip slip vulnerability in FileUtil.unzip in Liferay Portal 7.4.3.5 through 7.4.3.35 and Liferay DXP 7.4 update 1 through update 34 allows attackers to create or overwrite existing files on the filesystem via the deployment of a malicious plugin/module. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.3.5'}, {'fixed': '7.4.3.48'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.4.3.35'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42125'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17517'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42125'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:49:10Z', 'nvd_published_at': '2022-11-15T01:15:00Z'} |
1.4.0 | GHSA-w573-4hg7-7wgq | 2023-03-31T16:05:14Z | 2022-11-28T15:30:24Z | null | ['CVE-2022-38900'] | decode-uri-component vulnerable to Denial of Service (DoS) | decode-uri-component 0.2.0 is vulnerable to Improper Input Validation resulting in DoS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'decode-uri-component'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38900'}, {'type': 'WEB', 'url': 'https://github.com/SamVerschueren/decode-uri-component/issues/5'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/query-string/issues/345'}, {'type': 'WEB', 'url': 'https://github.com/SamVerschueren/decode-... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-28T23:35:59Z', 'nvd_published_at': '2022-11-28T13:15:00Z'} |
1.4.0 | GHSA-8rwr-x37p-mx23 | 2022-11-07T21:28:54Z | 2022-11-01T17:45:59Z | null | ['CVE-2022-3602'] | X.509 Email Address 4-byte Buffer Overflow | A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs
after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to
continue certificate verification despite failur... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3602'}, {'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/pull/1452'}, {'type': 'WEB', 'url': 'https://github.com/alexcrichton/openssl-src-rs/commit/4a31c14f31e1a08c18893a37e304dd1dd4b7daa3'}, {'type': 'WEB', 'url': 'https://github.com... | {'cwe_ids': ['CWE-120', 'CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T17:45:59Z', 'nvd_published_at': '2022-11-01T18:15:00Z'} |
1.4.0 | GHSA-jr77-8gx4-h5qh | 2022-11-16T00:04:13Z | 2022-11-11T12:00:33Z | null | ['CVE-2022-41719'] | MessagePack for Golang subject to DoS via Unmarshal panic | Unmarshal can panic on some inputs, possibly allowing for denial of service attacks. This issue has been patched in version 2.1.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/shamaton/msgpack/v2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41719'}, {'type': 'WEB', 'url': 'https://github.com/shamaton/msgpack/issues/31'}, {'type': 'WEB', 'url': 'https://github.com/shamaton/msgpack/pull/32'}, {'type': 'PACKAGE', 'url': 'https://github.com/shamaton/msgpack'}, {'type': 'WEB', 'url': 'http... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-16T00:04:13Z', 'nvd_published_at': '2022-11-10T20:15:00Z'} |
1.4.0 | GHSA-94rr-4jr5-9h2p | 2022-11-08T20:22:08Z | 2022-11-07T12:00:33Z | null | ['CVE-2022-37865'] | Apache Ivy does not verify target path when extracting the archive | With Apache Ivy 2.4.0 an optional packaging attribute has been introduced that allows artifacts to be unpacked on the fly if they used
pack200 or zip packaging.
For artifacts using the "zip", "jar" or "war" packaging Ivy prior to version 2.5.1 doesn't verify the target path when extracting the archive. An archive cont... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ivy:ivy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37865'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/gqvvv7qsm2dfjg6xzsw1s2h08tbr0sdy'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDIFDL5WSBEKBUVKTABUFDDD25SB... | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-07T16:11:25Z', 'nvd_published_at': '2022-11-07T11:15:00Z'} |
1.4.0 | GHSA-rc39-g977-687w | 2022-11-10T21:27:55Z | 2022-11-10T21:27:55Z | null | ['CVE-2022-36022'] | Use of unclaimed s3 bucket in tests and examples | ### Impact
People who use some older NLP examples that reference the old S3 bucket.
### Patches
The problem has been patched. Upgrade to snapshots for now. A release will be published later to address this due to the vulnerability mostly being examples and 1 class in the actual code base.
### Workarounds
Download a ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.deeplearning4j:platform-tests'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0-M2.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.deeplearning4j:dl4j-examples'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced... | [{'type': 'WEB', 'url': 'https://github.com/deeplearning4j/deeplearning4j/security/advisories/GHSA-rc39-g977-687w'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/deeplearning4j/security/advisories/GHSA-rc39-g977-687w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36022'}, {'type': 'PACK... | {'cwe_ids': ['CWE-330', 'CWE-344'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T21:27:55Z', 'nvd_published_at': '2022-11-10T18:15:00Z'} |
1.4.0 | GHSA-mmmh-wcxm-2wr4 | 2022-11-02T21:50:03Z | 2022-11-01T12:00:37Z | null | ['CVE-2022-31692'] | Spring Security authorization rules can be bypassed via forward or include dispatcher types | Spring Security, versions 5.7 prior to 5.7.5 and 5.6 prior to 5.6.9 could be susceptible to authorization rules bypass via forward or include dispatcher types. Specifically, an application is vulnerable when all of the following are true: The application expects that Spring Security applies security to forward and incl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.7.0'}, {'fixed': '5.7.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM',... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31692'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-security'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221215-0010/'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-31692'... | {'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T19:00:59Z', 'nvd_published_at': '2022-10-31T20:15:00Z'} |
1.4.0 | GHSA-8782-xgh5-r7mv | 2022-11-22T00:12:03Z | 2022-11-15T12:00:17Z | null | ['CVE-2022-43968'] | Concrete CMS vulnerable to Reflected Cross-Site Scripting via dashboard icons | Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to Reflected XSS in the dashboard icons due to un-sanitized output. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.3'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43968'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/913-release-n... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:12:03Z', 'nvd_published_at': '2022-11-14T22:15:00Z'} |
1.4.0 | GHSA-rmg2-f698-wq35 | 2022-11-21T21:53:52Z | 2022-11-21T21:53:52Z | null | ['CVE-2022-41896'] | `tf.raw_ops.Mfcc` crashes | ### Impact
If [`ThreadUnsafeUnigramCandidateSampler`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/image/mirror_pad_op.cc) is given input `filterbank_channel_count` greater than the allowed max size, TensorFlow will crash.
```python
import tensorflow as tf
tf.raw_ops.Mfcc(
spectrogr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rmg2-f698-wq35'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41896'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/39ec7eaf1428e90c37787e5b3fbd68ebd3c48860'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-1284', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T21:53:52Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-v535-pc6r-77qh | 2022-12-15T19:26:44Z | 2022-11-16T12:00:23Z | null | ['CVE-2022-45385'] | Lack of authentication mechanism for webhook in CloudBees Docker Hub/Registry Notification Plugin | CloudBees Docker Hub/Registry Notification Plugin provides several webhook endpoints that can be used to trigger builds when Docker images used by a job have been rebuilt.
In CloudBees Docker Hub/Registry Notification Plugin 2.6.2 and earlier, these endpoints can be accessed without authentication.
This allows unauth... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dockerhub-notification'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45385'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dockerhub-notification-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2843'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:22:24Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-94qm-99qc-qwqj | 2022-11-18T16:02:29Z | 2022-11-15T12:00:17Z | null | ['CVE-2022-3362'] | rdiffweb vulnerable to Insufficient Session Expiration | Insufficient Session Expiration in GitHub repository ikus060/rdiffweb prior to 2.5.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3362'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/6efb995bc32c8a8e9ad755eb813dec991dffb2b8'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ca428c31-85... | {'cwe_ids': ['CWE-613'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-18T16:02:29Z', 'nvd_published_at': '2022-11-14T21:15:00Z'} |
1.4.0 | GHSA-vjj4-qwcm-552h | 2022-11-21T23:49:32Z | 2022-11-15T12:00:16Z | null | ['CVE-2022-42124'] | Inefficient Regular Expression Complexity in Liferay Portal | ReDoS vulnerability in LayoutPageTemplateEntryUpgradeProcess in Liferay Portal 7.3.2 through 7.4.3.4 and Liferay DXP 7.2 fix pack 9 through fix pack 18, 7.3 before update 4, and DXP 7.4 GA allows remote attackers to consume an excessive amount of server resources via a crafted payload injected into the 'name' field of ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.3.2'}, {'fixed': '7.4.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42124'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17435'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17535'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_p... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:49:32Z', 'nvd_published_at': '2022-11-15T01:15:00Z'} |
1.4.0 | GHSA-chcg-gh9p-96c5 | 2022-12-15T21:17:20Z | 2022-11-16T12:00:23Z | null | ['CVE-2022-45401'] | Jenkins Associated Files Plugin vulnerable to cross-site scripting (XSS) | Jenkins Associated Files Plugin 0.2.1 and earlier does not escape names of associated files, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Currently, there are no known workarounds or patches. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:associated-files-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45401'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/associated-files-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2947'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:26:35Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-m53v-5x5x-5m2p | 2022-11-22T00:12:25Z | 2022-11-15T12:00:17Z | null | ['CVE-2022-43687'] | Concrete CMS vulnerable to Session Fixation | Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 does not issue a new session ID upon successful OAuth authentication. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.3'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43687'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/913-release-n... | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:12:25Z', 'nvd_published_at': '2022-11-14T23:15:00Z'} |
1.4.0 | GHSA-66vq-54fq-6jvv | 2022-11-21T20:42:18Z | 2022-11-21T20:42:18Z | null | ['CVE-2022-41891'] | Segfault in `tf.raw_ops.TensorListConcat` | ### Impact
If [`tf.raw_ops.TensorListConcat`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/list_kernels.h) is given `element_shape=[]`, it results segmentation fault which can be used to trigger a denial of service attack.
```python
import tensorflow as tf
tf.raw_ops.TensorListConcat(
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-66vq-54fq-6jvv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41891'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/fc33f3dc4c14051a83eec6535b608abe1d355fde'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:42:18Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-9cx2-hj6m-fv58 | 2023-09-20T10:17:35Z | 2022-11-21T23:58:20Z | null | ['CVE-2022-38724'] | Silverstripe XSS in shortcodes | A malicious content author could add arbitrary attributes to HTML editor shortcodes which could be used to inject a JavaScript payload on the front end of the site. The shortcode providers that ship with Silverstripe CMS have been reviewed and attribute whitelists have been implemented where appropriate to negate this ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/assets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.11.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ecosystem_specific': {'affe... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38724'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/assets/CVE-2022-38724.yaml'}, {'type': 'WEB', 'url': 'https://github.... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:58:20Z', 'nvd_published_at': '2022-11-23T00:15:00Z'} |
1.4.0 | GHSA-44xv-v98g-v79f | 2022-11-22T17:50:25Z | 2022-11-21T23:57:46Z | null | ['CVE-2022-38146'] | URL XSS vulnerability due to outdated jquery in CMS | Silverstripe silverstripe/framework through 4.11 allows XSS (issue 2 of 3). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.11.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38146'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/admin/CVE-2022-38146.yaml'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2022-38146'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:57:46Z', 'nvd_published_at': '2022-11-21T16:15:00Z'} |
1.4.0 | GHSA-hw4f-g7wh-xp52 | 2022-12-15T21:09:27Z | 2022-11-16T12:00:23Z | null | ['CVE-2022-45393'] | Cross-Site Request Forgery in Jenkins Delete log Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Delete log Plugin 1.0 and earlier allows attackers to delete build logs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:delete-log-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45393'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/delete-log-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2920'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:23:45Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-22vc-5pgw-644q | 2022-12-02T22:27:39Z | 2022-11-27T03:30:25Z | null | ['CVE-2022-45933'] | KubeView vulnerable to full cluster takeover due to improper authentication | KubeView through 0.1.31 allows attackers to obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication, and retrieves certificate files that can be used for authentication as kube-admin. NOTE: the vendor's position is that KubeView was a "fun side project and a learning exerci... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/benc-uk/kubeview'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.31'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45933'}, {'type': 'WEB', 'url': 'https://github.com/benc-uk/kubeview/issues/95'}, {'type': 'PACKAGE', 'url': 'https://github.com/benc-uk/kubeview'}] | {'cwe_ids': ['CWE-287', 'CWE-306'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:27:39Z', 'nvd_published_at': '2022-11-27T03:15:00Z'} |
1.4.0 | GHSA-j2jp-wvqg-wc2g | 2022-12-01T22:13:04Z | 2022-11-29T23:55:54Z | null | ['CVE-2022-41912'] | crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication | ### Impact
The crewjam/saml go library is vulnerable to an authentication bypass when processing SAML responses containing multiple Assertion elements.
### Patches
This issue has been corrected in version 0.4.9.
### Credit
This issue was reported by Felix Wilhelm from Google Project Zero.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/crewjam/saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/crewjam/saml/security/advisories/GHSA-j2jp-wvqg-wc2g'}, {'type': 'WEB', 'url': 'https://github.com/prometheus/exporter-toolkit/security/advisories/GHSA-7rg2-cxvp-9p7p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41912'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T23:55:54Z', 'nvd_published_at': '2022-11-28T15:15:00Z'} |
1.4.0 | GHSA-h8hf-hxx6-5g6v | 2022-12-15T18:55:46Z | 2022-11-16T12:00:22Z | null | ['CVE-2022-45382'] | Cross-site Scripting in Jenkins Naginator Plugin | Naginator Plugin 1.18.1 and earlier does not escape display names of source builds in builds that were triggered via Retry action.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to edit build display names.
Naginator Plugin 1.18.2 escapes display names of source builds... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:naginator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.18.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45382'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/naginator-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2946'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:21:26Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-368v-7v32-52fx | 2022-11-21T22:04:27Z | 2022-11-21T22:04:27Z | null | ['CVE-2022-41907'] | Overflow in `ResizeNearestNeighborGrad` | ### Impact
When [`tf.raw_ops.ResizeNearestNeighborGrad`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/image/resize_nearest_neighbor_op.cc) is given a large `size` input, it overflows.
```
import tensorflow as tf
align_corners = True
half_pixel_centers = False
grads = tf.constant(1, shap... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-368v-7v32-52fx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41907'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/00c821af032ba9e5f5fa3fe14690c8d28a657624'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-131'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:04:27Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-gw2g-hhc9-wgjh | 2022-11-21T23:53:03Z | 2022-11-16T12:00:20Z | null | ['CVE-2022-3920'] | Missing Authorization in HashiCorp Consul | HashiCorp Consul and Consul Enterprise 1.13.0 up to 1.13.3 do not filter cluster filtering's imported nodes and services for HTTP or RPC endpoints used by the UI. Fixed in 1.14.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.14.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3920'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/706866fa0016b0aa302679f9c648859050d19b2e'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-28-consul-cluster-peering-leaks-imported-nodes-services-inform... | {'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:53:03Z', 'nvd_published_at': '2022-11-16T00:15:00Z'} |
1.4.0 | GHSA-5jqp-885w-xj32 | 2023-08-31T00:33:18Z | 2022-11-10T12:01:17Z | null | ['CVE-2022-42964'] | pymatgen is vulnerable to Regular Expression Denial of Service (ReDoS) | An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the pymatgen PyPI package, when an attacker is able to supply arbitrary input to the `GaussianInput.from_string` method. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pymatgen'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2022.9.21'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42964'}, {'type': 'WEB', 'url': 'https://github.com/materialsproject/pymatgen/issues/2755'}, {'type': 'PACKAGE', 'url': 'https://github.com/materialsproject/pymatgen'}, {'type': 'WEB', 'url': 'https://research.jfrog.com/vulnerabilities/pymatgen-red... | {'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T18:55:00Z', 'nvd_published_at': '2022-11-09T20:15:00Z'} |
1.4.0 | GHSA-442f-wcwq-fpcf | 2022-11-21T22:32:04Z | 2022-11-21T22:32:04Z | null | ['CVE-2022-41922'] | Prevent RCE when deserializing untrusted user input | ### Impact
Affected versions of `yiisoft/yii` are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input.
### Patches
Upgrade `yiisoft/yii` to version 1.1.27 or higher.
### For more information
See the following links for more details:
- [Git commit](https://github.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yiisoft/yii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.27'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/yiisoft/yii/security/advisories/GHSA-442f-wcwq-fpcf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41922'}, {'type': 'WEB', 'url': 'https://github.com/yiisoft/yii/commit/ed67b7cc57216557c5c595c6650cdd2d3aa41c52'}, {'type': 'PACKAGE', 'url': 'https:/... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:32:04Z', 'nvd_published_at': '2022-11-23T18:15:00Z'} |
1.4.0 | GHSA-ffwf-47x2-jpr8 | 2022-11-17T20:15:22Z | 2022-11-13T12:00:17Z | null | ['CVE-2022-3971'] | Matrix-appservice-irc vulnerable to sql injection via roomIds argument | A vulnerability was found in matrix-appservice-irc up to 0.35.1. This vulnerability affects the file src/datastore/postgres/PgDataStore.ts. The manipulation of the argument roomIds leads to sql injection. Upgrading to version 0.36.0 is able to address this issue. The name of the patch is 179313a37f06b298150edba3e2b0e5a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'matrix-appservice-irc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.36.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3971'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/pull/1619'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/commit/179313a37f06b298150edba3e2b0e5a73c1415e7'}, {'type': 'PACKAGE', 'url... | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-15T23:59:15Z', 'nvd_published_at': '2022-11-13T10:15:00Z'} |
1.4.0 | GHSA-rjx6-v474-2ch9 | 2022-11-21T22:17:43Z | 2022-11-21T22:17:43Z | null | ['CVE-2022-41909'] | Segfault in `CompositeTensorVariantToComponents` | ### Impact
An input `encoded` that is not a valid `CompositeTensorVariant` tensor will trigger a segfault in [`tf.raw_ops.CompositeTensorVariantToComponents`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/python/lib/core/py_func.cc).
```python
import tensorflow as tf
encode = tf.raw_ops.EmptyTensorL... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjx6-v474-2ch9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41909'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/660ce5a89eb6766834bdc303d2ab3902aef99d3d'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-20', 'CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:17:43Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-fjhh-67wv-7gr4 | 2022-11-03T18:42:42Z | 2022-11-03T18:42:42Z | null | ['CVE-2019-19040'] | Reflected Cross site scripting (XSS) in kairosdb | KairosDB through 1.2.2 has XSS in view.html because of showErrorMessage in js/graph.js, as demonstrated by view.html?q= with a '"sampling":{"value":"<script>' substring. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.kairosdb:kairosdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19040'}, {'type': 'WEB', 'url': 'https://github.com/kairosdb/kairosdb/issues/569'}, {'type': 'WEB', 'url': 'https://github.com/kairosdb/kairosdb/pull/593'}, {'type': 'WEB', 'url': 'https://github.com/kairosdb/kairosdb/milestone/10?closed=1'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T18:42:42Z', 'nvd_published_at': '2019-11-17T21:15:00Z'} |
1.4.0 | GHSA-hc4j-7mqg-cxjj | 2023-07-07T21:05:46Z | 2022-11-16T12:00:20Z | null | ['CVE-2021-4241'] | PHPServerMon PRNG has Insufficient Entropy | A vulnerability, which was classified as problematic, was found in phpservermon. Affected is the function `setUserLoggedIn` of the file `src/psm/Service/User.php`. The manipulation leads to use of predictable algorithm in random number generator. The exploit has been disclosed to the public and may be used. The name of... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpservermon/phpservermon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4241'}, {'type': 'WEB', 'url': 'https://github.com/phpservermon/phpservermon/commit/bb10a5f3c68527c58073258cb12446782d223bc3'}, {'type': 'PACKAGE', 'url': 'https://github.com/phpservermon/phpservermon'}, {'type': 'WEB', 'url': 'https://huntr.dev/bo... | {'cwe_ids': ['CWE-1241', 'CWE-330', 'CWE-331'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T21:05:46Z', 'nvd_published_at': '2022-11-15T23:15:00Z'} |
1.4.0 | GHSA-7644-cxp8-h23r | 2022-11-10T23:52:31Z | 2022-11-10T23:52:31Z | null | [] | ibexa/admin-ui vulnerable to Cross-site Scripting in content type name/shortname | Critical severity. It is possible to inject JavaScript XSS in the content type entries "name" and "short name". To exploit this, one must already have permission to edit content types, which limits it in many cases to people who are already administrators. However, please verify which users have this permission. The fi... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'ibexa/admin-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ibexa/admin-ui/security/advisories/GHSA-7644-cxp8-h23r'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-009-critical-vulnerabilities-in-graphql-role-assignment-ct-editing-and-drafts-tooltips'}, {'type': 'PACKAGE', 'url': 'https://github... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T23:52:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8538-25v4-25pg | 2022-12-15T21:16:20Z | 2022-11-16T12:00:23Z | null | ['CVE-2022-45400'] | XXE vulnerability in Jenkins JAPEX Plugin | JAPEX Plugin 1.7 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to control XML input files for the 'Record Japex test report' post-build step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenki... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:japex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45400'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/japex-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2941'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:26:29Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-789v-h9hw-38pg | 2022-11-18T16:11:22Z | 2022-11-14T19:00:19Z | null | ['CVE-2022-45378'] | Apache SOAP contains unauthenticated RPCRouterServlet | ** UNSUPPORTED WHEN ASSIGNED ** In the default configuration of Apache SOAP, an RPCRouterServlet is available without authentication. This gives an attacker the possibility to invoke methods on the classpath that meet certain criteria. Depending on what classes are available on the classpath this might even lead to arb... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'soap:soap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45378'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/g4l64s283njhnph2otx7q4gs2j952d31'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/11/14/4'}] | {'cwe_ids': ['CWE-287', 'CWE-306', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-18T16:11:22Z', 'nvd_published_at': '2022-11-14T14:15:00Z'} |
1.4.0 | GHSA-w2j3-pq63-339w | 2022-12-15T19:25:05Z | 2022-11-16T12:00:22Z | null | ['CVE-2022-45383'] | Incorrect permission checks in Jenkins Support Core Plugin | Support Core Plugin defines the permission Support/DownloadBundle that allows users without Overall/Administer permission to create and download support bundles containing a limited set of diagnostic information.
Support Core Plugin 1206.v14049fa_b_d860 and earlier does not correctly perform permission checks in sever... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:support-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1206.1208.v9b_7a_1d48db_0f'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1206.v14049fa'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45383'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/support-core-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2804'}] | {'cwe_ids': ['CWE-276', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:21:38Z', 'nvd_published_at': '2022-11-15T20:15:00Z'} |
1.4.0 | GHSA-qch4-jmf8-xvp7 | 2022-11-21T23:56:32Z | 2022-11-20T06:30:16Z | null | ['CVE-2022-4067'] | Cross-site Scripting in librenms/librenms | Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.10.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4067'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/8e85698aa3aa4884c2f3d6c987542477eb64f07c'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3ca7023e-d95c-423f-9e9a-222a67a8ee72'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:56:32Z', 'nvd_published_at': '2022-11-20T05:15:00Z'} |
1.4.0 | GHSA-pf36-r9c6-h97j | 2022-11-21T22:18:11Z | 2022-11-21T22:18:11Z | null | ['CVE-2022-41911'] | Invalid char to bool conversion when printing a tensor | ### Impact
When [printing a tensor](https://github.com/tensorflow/tensorflow/blob/807cae8a807960fd7ac2313cde73a11fc15e7942/tensorflow/core/framework/tensor.cc#L1200-L1227), we get it's data as a `const char*` array (since that's the underlying storage) and then we typecast it to the element type. However, conversions f... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosy... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pf36-r9c6-h97j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41911'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1be743703279782a357adbf9b77dcb994fe8b508'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-704'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:18:11Z', 'nvd_published_at': '2022-11-18T22:15:00Z'} |
1.4.0 | GHSA-9cv5-4wqv-9w94 | 2022-11-02T16:01:26Z | 2022-11-01T12:00:30Z | null | ['CVE-2022-25892'] | muhammara and hummus vulnerable to denial of service by NULL pointer dereference | ### Impact
The package muhammara before 2.6.1, from 3.0.0 and before 3.1.1; all versions of package hummus are vulnerable to Denial of Service (DoS) when supplied with a maliciously crafted PDF file to be parsed.
### Patches
It has been patched in 3.1.1 and has been backported to 2.6.1
Hummus has a patch in 1.0.111.
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'muhammara'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'muhammara'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}, {'package': {'ecosystem': '... | [{'type': 'WEB', 'url': 'https://github.com/julianhille/MuhammaraJS/security/advisories/GHSA-f64j-4x74-p42m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25892'}, {'type': 'WEB', 'url': 'https://github.com/galkahana/HummusJS/issues/463'}, {'type': 'WEB', 'url': 'https://github.com/julianhill... | {'cwe_ids': ['CWE-690'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T21:54:15Z', 'nvd_published_at': '2022-11-01T05:15:00Z'} |
1.4.0 | GHSA-p2x4-6ghr-6vmq | 2022-11-21T22:37:47Z | 2022-11-21T22:37:47Z | null | ['CVE-2022-41935'] | Exposure of Sensitive Information to an Unauthorized Actor in org.xwiki.platform:xwiki-platform-livetable-ui | ### Impact
User without the right to view documents can deduce their existence by repeated Livetable queries.
#### Reproduction steps
1. Restrict "view" access to `Sandbox.TestPage3` by setting an explicit view right for admins
1. As a user who is not an admin, open `<server>/bin/get/XWiki/LiveTableResults?outputSyn... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livetable-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.10.11'}, {'fixed': '13.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livetable-ui'}, 'ranges': [{'type': 'ECOSYSTEM', ... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p2x4-6ghr-6vmq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41935'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/1450b6e3c69ac7df25e5a2571186d1f43402facd#diff-5a739e5865b1f1a... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:37:47Z', 'nvd_published_at': '2022-11-23T20:15:00Z'} |
1.4.0 | GHSA-vp35-85q5-9f25 | 2022-11-11T00:03:31Z | 2022-11-11T00:03:31Z | null | [] | Container build can leak any path on the host into the container | ### Description
Moby is the open source Linux container runtime and set of components used to build a variety of downstream container runtimes, including Docker CE, Mirantis Container Runtime (formerly Docker EE), and Docker Desktop. Moby allows for building container images using a set of build instructions (usually ... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/moby/moby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.10.20'}]}], 'database_specific': {'last_known_affected_version_range': '<= 20.10.19'}}] | [{'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-vp35-85q5-9f25'}, {'type': 'WEB', 'url': 'https://github.blog/2022-10-17-git-security-vulnerabilities-announced/'}, {'type': 'PACKAGE', 'url': 'https://github.com/moby/moby'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/releases/tag... | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-11T00:03:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cg3h-rc9q-g8v9 | 2022-02-14T22:35:24Z | 2022-02-09T00:00:30Z | null | ['CVE-2022-0509'] | Cross-site Scripting in pimcore | pimcore version 10.3.0 and prior is vulnerable to cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0509'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/6ccb5c12fc1be065ebce9c89c4677ee939b88597'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/26cdf86c-8edc... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T21:17:42Z', 'nvd_published_at': '2022-02-08T12:15:00Z'} |
1.4.0 | GHSA-997c-fj8j-rq5h | 2021-05-12T17:42:53Z | 2022-02-15T01:57:18Z | null | ['CVE-2014-9357'] | Arbitrary Code Execution | Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9357'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker/compare/aef842e7dfb534aba22c3c911de525ce9ac12b72...313a1b7620910e47d888f8b0a6a5eb06ad9c1ff2'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/blob/master/CHANGELOG.md#133-2014-1... | {'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T17:42:53Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ch68-7cf4-35vr | 2022-02-07T21:57:38Z | 2022-02-07T21:57:38Z | null | ['CVE-2022-23600'] | Limited ability to spoof SAML authentication with missing audience verification in Fleet | ### Impact
This impacts deployments using SAML SSO in two specific cases:
1. A malicious or compromised Service Provider (SP) could reuse the SAML response to log into Fleet as a user -- only if the user has an account with the same email in Fleet, _and_ the user signs into the malicious SP via SAML SSO from the same... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/fleetdm/fleet/v4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/fleetdm/fleet/security/advisories/GHSA-ch68-7cf4-35vr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23600'}, {'type': 'WEB', 'url': 'https://github.com/fleetdm/fleet/commit/35d5a7b285f15ddd47486fa656e8b1acf3d48374'}, {'type': 'PACKAGE', 'url': 'htt... | {'cwe_ids': ['CWE-284', 'CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T17:19:00Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-h2x7-2ff6-v32p | 2023-08-30T18:02:56Z | 2022-02-11T23:39:57Z | null | [] | gobase subject to Incorrect routing of some HTTP requests when using httpauth due to a race condition | ### Impact
Incorrect routing of some HTTP requests when using httpauth due to a race condition
### Patches
Upgrade to version 0.7.2 for fix
### Workarounds
None
### For more information
If you have any questions or comments about this advisory:
* Email us at [nbosscher@blue-giraffe.ca](mailto:nbosscher@blue-giraffe.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ntbosscher/gobase'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ntbosscher/gobase/security/advisories/GHSA-h2x7-2ff6-v32p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2583'}, {'type': 'WEB', 'url': 'https://github.com/ntbosscher/gobase/commit/a8d40bce9c429d324122d18c446924dab809e812'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-362'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T22:08:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c3j8-q5x6-2855 | 2023-07-12T00:19:39Z | 2022-02-10T00:00:32Z | null | ['CVE-2021-45919'] | Studio 42 elFinder allows stored XSS | Studio 42 elFinder through 2.1.31 allows XSS via an SVG document. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'studio-42/elfinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.31'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45919'}, {'type': 'WEB', 'url': 'https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/from-stored-xss-to-rce-using-beef-and-elfinder-cve-2021-45919/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T00:19:39Z', 'nvd_published_at': '2022-02-08T23:15:00Z'} |
1.4.0 | GHSA-q85f-69q7-55h2 | 2022-02-11T20:47:00Z | 2022-02-09T23:26:50Z | null | ['CVE-2022-23573'] | Uninitialized variable access in Tensorflow | ### Impact
The [implementation of `AssignOp`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/assign_op.h#L30-L143) can result in copying unitialized data to a new tensor. This later results in undefined behavior.
The implementation has a check that the le... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q85f-69q7-55h2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23573'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ef1d027be116f25e25bb94a60da491c2cf55bd0b'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T19:03:53Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-2x7h-96h5-rq84 | 2022-02-08T19:44:44Z | 2022-02-01T16:22:57Z | null | ['CVE-2021-32841'] | Path Traversal in SharpZipLib | SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.3.0 and prior to version 1.3.3, a check was added if the destination file is under destination directory. However, it is not enforced that `destDir` ends with slash. If the `destDir` is not slash terminated like `/home/user/dir` it is po... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'SharpZipLib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32841'}, {'type': 'WEB', 'url': 'https://github.com/icsharpcode/SharpZipLib/commit/5c3b293de5d65b108e7f2cd0ea8f81c1b8273f78'}, {'type': 'PACKAGE', 'url': 'https://github.com/icsharpcode/SharpZipLib'}, {'type': 'WEB', 'url': 'https://github.com/icsh... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-01T16:21:00Z', 'nvd_published_at': '2022-01-26T22:15:00Z'} |
1.4.0 | GHSA-qh73-qc3p-rjv2 | 2022-02-23T22:11:16Z | 2022-02-11T18:57:53Z | null | ['CVE-2021-23597'] | Uncaught Exception in fastify-multipart | ### Impact
This is a bypass of CVE-2020-8136 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8136).
By providing a `name=constructor` property it is still possible to crash the application.
The original fix only checks for the key `__proto__` (https://github.com/fastify/fastify-multipart/pull/116).
All users... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'fastify-multipart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-multipart/security/advisories/GHSA-qh73-qc3p-rjv2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23597'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-multipart/pull/116'}, {'type': 'WEB', 'url': 'https://github.com/fas... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-11T18:57:53Z', 'nvd_published_at': '2022-02-11T17:15:00Z'} |
1.4.0 | GHSA-24x4-6qmh-88qg | 2022-02-11T20:36:58Z | 2022-02-09T23:57:42Z | null | ['CVE-2022-23584'] | Use after free in `DecodePng` kernel | ### Impact
A malicious user can cause a use after free behavior when [decoding PNG images](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L339-L346):
```cc
if (/* ... error conditions ... */) {
png::CommonFreeDecode(&decode);
O... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-24x4-6qmh-88qg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23584'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T19:37:12Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-95rw-fx8r-36v6 | 2023-09-05T13:54:21Z | 2022-02-04T00:00:33Z | null | ['CVE-2022-22818'] | Cross-site Scripting in Django | The `{% debug %}` template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.27'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'ty... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22818'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/01422046065d2b51f8f613409cad2c81b39487e5'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/1a1e8278c46418bde24c86a65443b0674bae65e2'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T16:10:27Z', 'nvd_published_at': '2022-02-03T02:15:00Z'} |
1.4.0 | GHSA-65xw-pcqw-hjrh | 2022-03-07T13:36:31Z | 2022-02-26T00:00:45Z | null | ['CVE-2021-45229'] | Cross site scripting in apache airflow | It was discovered that the "Trigger DAG with config" screen was susceptible to XSS attacks via the `origin` query argument. This issue affects Apache Airflow versions 2.2.3 and below. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45229'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/phx76cgtmhwwdy780rvwhobx8qoy4bnk'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:31:29Z', 'nvd_published_at': '2022-02-25T09:15:00Z'} |
1.4.0 | GHSA-gv2h-gf8m-r68j | 2022-02-15T00:19:57Z | 2022-02-15T00:19:57Z | null | ['CVE-2020-26294'] | Exposure of server configuration in github.com/go-vela/server | ### Impact
_What kind of vulnerability is it? Who is impacted?_
* The ability to expose configuration set in the [Vela server](https://github.com/go-vela/server) via [pipeline template functionality](https://go-vela.github.io/docs/templates/overview/).
* It impacts all users of Vela.
Sample of template exposing serv... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/go-vela/compiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/go-vela/compiler/security/advisories/GHSA-gv2h-gf8m-r68j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26294'}, {'type': 'WEB', 'url': 'https://github.com/go-vela/compiler/commit/f1ace5f8a05c95c4d02264556e38a959ee2d9bda'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-200', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T17:58:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x8xx-x82q-42q3 | 2023-08-08T20:08:33Z | 2022-02-19T00:01:25Z | null | ['CVE-2022-25336'] | Exposure of Resource to Wrong Sphere in ezsystems/ezplatform-kernel | When image files are uploaded, they are made accessible under a name similar to the original file name. There are two issues with this. Both require access to uploading images in order to exploit them, this limits the impact. The first issue is that certain injection attacks can be possible, since not all possible atta... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25336'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-001-image-filenames-sanitization'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezplatform-kernel'}] | {'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-04T21:37:29Z', 'nvd_published_at': '2022-02-18T18:15:00Z'} |
1.4.0 | GHSA-p435-w4xm-jj8x | 2022-02-11T16:12:07Z | 2022-02-06T00:01:07Z | null | ['CVE-2021-36151'] | Hadoop token in temp file visible to all users in Apache Gobblin | In Apache Gobblin, the Hadoop token is written to a temp file that is visible to all local users on Unix-like systems. This affects versions <= 0.15.0. Users should update to version 0.16.0 which addresses this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.gobblin:gobblin-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36151'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/3cdkyxdd6xk05lsvr3l66dsnvhwyo1t0'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T23:07:14Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-gr23-g276-xc73 | 2022-02-16T22:54:59Z | 2022-02-11T00:00:58Z | null | ['CVE-2021-22954'] | Cross Site Request Forgery in concrete5/concrete5 | A cross-site request forgery vulnerability exists in Concrete CMS <v9 that could allow an attacker to make requests on behalf of other users. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22954'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/90-release-notes'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:54:59Z', 'nvd_published_at': '2022-02-09T23:15:00Z'} |
1.4.0 | GHSA-vm37-j55j-8655 | 2022-03-28T15:23:37Z | 2022-02-12T00:00:49Z | null | ['CVE-2022-0557'] | OS Command Injection in Microweber | Microweber is a content management system with drag and drop. Prior to version 1.2.11, Microweber is vulnerable to OS Command Injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0557'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/0a7e5f1d81de884861ca677ee1aaac31f188d632'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T19:17:10Z', 'nvd_published_at': '2022-02-11T09:15:00Z'} |
1.4.0 | GHSA-9fp7-4fjm-q3mf | 2022-01-31T19:46:10Z | 2022-02-01T00:51:01Z | null | ['CVE-2021-23760'] | Prototype Pollution in keyget | The package keyget from 0.0.0 are vulnerable to Prototype Pollution via the methods set, push, and at which could allow an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix to [CVE-2020-28272](https://security.snyk.io/vuln/SNYK-JS-KE... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'keyget'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23760'}, {'type': 'PACKAGE', 'url': 'https://github.com/rumkin/keyget'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-KEYGET-1048048'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-KEYGET-2342624'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T19:46:10Z', 'nvd_published_at': '2022-01-28T22:15:00Z'} |
1.4.0 | GHSA-f9pg-g9xw-r5g2 | 2022-02-25T20:56:36Z | 2022-02-17T00:00:25Z | null | ['CVE-2022-22881'] | SQL Injection in Jeecg-boot | Jeecg-boot v3.0 was discovered to contain a SQL injection vulnerability via the code parameter in /sys/user/queryUserComponentData. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22881'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/3348'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T20:56:36Z', 'nvd_published_at': '2022-02-16T22:15:00Z'} |
1.4.0 | GHSA-gj85-pvp5-mvf9 | 2022-02-14T22:30:43Z | 2022-02-06T00:00:54Z | null | ['CVE-2022-0501'] | Cross-site Scripting in Beanstalk console | Beanstalk console prior to version 1.7.12 is vulnerable to cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'ptrofimov/beanstalk_console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0501'}, {'type': 'WEB', 'url': 'https://github.com/ptrofimov/beanstalk_console/commit/e351c8260ec1d3718d9e475ee57c7e12c47f19da'}, {'type': 'PACKAGE', 'url': 'https://github.com/ptrofimov/beanstalk_console'}, {'type': 'WEB', 'url': 'https://huntr.de... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-08T17:01:18Z', 'nvd_published_at': '2022-02-05T16:15:00Z'} |
1.4.0 | GHSA-4fh8-pm7g-pmxq | 2021-04-22T21:44:53Z | 2022-02-10T20:28:06Z | null | ['CVE-2018-11764'] | Authentication bypass in Apache Hadoop | Web endpoint authentication check is broken in Apache Hadoop 3.0.0-alpha4, 3.0.0-beta1, and 3.0.0. Authenticated users may impersonate any user even if no proxy user is configured. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-alpha4'}, {'fixed': '3.0.1'}]}], 'versions': ['3.0.0-alpha4']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'e... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11764'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r790ad0a049cde713b93589ecfd4dd2766fda0fc6807eedb6cf69f5c1%40%3Cgeneral.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201103-0003/'}] | {'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T21:44:53Z', 'nvd_published_at': '2020-10-21T19:15:00Z'} |
1.4.0 | GHSA-93p5-8fqw-wjx3 | 2021-05-12T21:17:36Z | 2022-02-15T01:57:18Z | null | ['CVE-2021-25834'] | Authentication bypass by capture-replay in github.com/cosmos/ethermint | Cosmos Network Ethermint <= v0.4.0 is affected by a transaction replay vulnerability in the EVM module. If the victim sends a very large nonce transaction, the attacker can replay the transaction through the application. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cosmos/ethermint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cosmos/ethermint/rpc/namespaces/eth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25834'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/ethermint/issues/686'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/ethermint/commit/d7bdbd7488644f0aaeee5cdcdc119c863f199f72'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/ethe... | {'cwe_ids': ['CWE-287', 'CWE-294'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:17:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8mfc-v7wv-p62g | 2021-04-08T20:35:01Z | 2022-02-09T22:43:37Z | null | ['CVE-2020-8131'] | Path Traversal in Yarn | Arbitrary filesystem write vulnerability in Yarn 1.21.1 and earlier allows attackers to write to any path on the filesystem and potentially lead to arbitrary code execution by forcing the user to install a malicious package. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'yarn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.21.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8131'}, {'type': 'WEB', 'url': 'https://github.com/yarnpkg/yarn/pull/7831'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/730239'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:35:01Z', 'nvd_published_at': '2020-02-24T15:15:00Z'} |
1.4.0 | GHSA-j229-2h63-rvh9 | 2021-04-01T22:16:07Z | 2022-02-09T00:59:32Z | null | ['CVE-2020-1718'] | Improper Authentication for Keycloak | A flaw was found in the reset credential flow in all Keycloak versions before 8.0.0. This flaw allows an attacker to gain unauthorized access to the application. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1718'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1718'}] | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T22:16:07Z', 'nvd_published_at': '2020-05-12T21:15:00Z'} |
1.4.0 | GHSA-m6cj-93v6-cvr5 | 2022-08-11T17:02:55Z | 2022-02-01T00:47:23Z | null | ['CVE-2022-23596'] | Junrar vulnerable to infinite loop via extracting carefully crafted RAR archive | ### Impact
A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users.
### Patches
The problem is partially patched in 7.4.1
### Workarounds
None
### References
h... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.github.junrar:junrar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.4.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/junrar/junrar/security/advisories/GHSA-m6cj-93v6-cvr5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23596'}, {'type': 'WEB', 'url': 'https://github.com/junrar/junrar/issues/73'}, {'type': 'WEB', 'url': 'https://github.com/junrar/junrar/commit/7b16b... | {'cwe_ids': ['CWE-400', 'CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T21:24:36Z', 'nvd_published_at': '2022-02-01T12:15:00Z'} |
1.4.0 | GHSA-2vxm-vp4c-fjfw | 2022-02-09T01:01:22Z | 2022-02-09T01:01:22Z | null | ['CVE-2020-17516'] | Authentication Bypass in Apache Cassandra | Apache Cassandra versions 2.1.0 to 2.1.22, 2.2.0 to 2.2.19, 3.0.0 to 3.0.23, and 3.11.0 to 3.11.9, when using 'dc' or 'rack' internode_encryption setting, allows both encrypted and unencrypted internode connections. A misconfigured node or a malicious user can use the unencrypted connection despite not being in the sam... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cassandra:cassandra-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '3.0.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cassandra:cassandra-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17516'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r81243a412a37a22211754936a13856af07cc68a93d728c52807486e9@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcb16f36cafa184dd159e... | {'cwe_ids': ['CWE-290'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T22:58:25Z', 'nvd_published_at': '2021-02-03T17:15:00Z'} |
1.4.0 | GHSA-5x29-3hr9-6wpw | 2023-08-29T21:08:37Z | 2022-02-11T23:18:09Z | null | ['CVE-2020-8918'] | TPM 1.2 key authorization values vulnerable to TPM transport eavesdropper in go-tpm | ### Impact
TPM 2.0 users are unaffected by this issue.
An adversary eavesdropping on the TPM 1.2 transport path can calculate `usageAuth` for a key created with CreateWrapKey, even though this value is encrypted as part of the TPM 1.2 command protocol.
The TPM 1.2 CreateWrapKey command accepts two secrets: `usageAuth... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/google/go-tpm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/google/go-tpm/security/advisories/GHSA-5x29-3hr9-6wpw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8918'}, {'type': 'WEB', 'url': 'https://github.com/google/go-tpm/pull/195'}, {'type': 'WEB', 'url': 'https://github.com/google/go-tpm/commit/d7806cc... | {'cwe_ids': ['CWE-665'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T18:32:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j9cf-pr2x-5273 | 2022-02-24T18:17:34Z | 2022-02-09T22:33:31Z | null | ['CVE-2019-10793'] | Prototype Pollution in dot-object | dot-object before 2.1.3 is vulnerable to Prototype Pollution. The set function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'dot-object'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10793'}, {'type': 'WEB', 'url': 'https://github.com/rhalff/dot-object/commit/f76cff5fe6d01d30ce110d8f454db2e5bd28a7de'}, {'type': 'PACKAGE', 'url': 'https://github.com/rhalff/dot-object'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOTOBJ... | {'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T20:36:20Z', 'nvd_published_at': '2020-02-18T16:15:00Z'} |
1.4.0 | GHSA-mpq4-rjj8-fjph | 2022-03-07T13:42:34Z | 2022-02-26T00:00:44Z | null | ['CVE-2022-25326'] | Uncontrolled Resource Consumption in github.com/google/fscrypt | fscrypt through v0.3.2 creates a world-writable directory by default when setting up a filesystem, allowing unprivileged users to exhaust filesystem space. We recommend upgrading to fscrypt 0.3.3 or above and adjusting the permissions on existing fscrypt metadata directories where applicable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/google/fscrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25326'}, {'type': 'WEB', 'url': 'https://github.com/google/fscrypt/pull/346'}, {'type': 'WEB', 'url': 'https://github.com/google/fscrypt/commit/91aa3ebf42032ca783c41f9ec25d885875f66ddb'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/fscryp... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:25:48Z', 'nvd_published_at': '2022-02-25T11:15:00Z'} |
1.4.0 | GHSA-gc58-v8h3-x2gr | 2022-02-09T23:01:49Z | 2022-02-09T23:01:49Z | null | ['CVE-2020-8022'] | Incorrect Default Permissions in Apache Tomcat | A Incorrect Default Permissions vulnerability in the packaging of tomcat on SUSE Enterprise Storage 5, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Ent... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.53'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.3... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8022'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1172405'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r393d4f431683e99c839b4aed68f720b8583bca6c35cd84adccaa02be@%3Cjava-dev.axis.apache.org%3E'}, {'type': '... | {'cwe_ids': ['CWE-276'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T19:23:48Z', 'nvd_published_at': '2020-06-29T09:15:00Z'} |
1.4.0 | GHSA-m22m-h4rf-pwq3 | 2022-02-08T19:45:29Z | 2022-02-01T16:22:50Z | null | ['CVE-2021-32840'] | Path Traversal in SharpZipLib | SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Prior to version 1.3.3, a TAR file entry `../evil.txt` may be extracted in the parent directory of `destFolder`. This leads to arbitrary file write that may lead to code execution. The vulnerability was patched in version 1.3.3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'SharpZipLib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32840'}, {'type': 'WEB', 'url': 'https://github.com/icsharpcode/SharpZipLib/commit/a0e96de70b5264f4c919b09253b1522bc7a221cc'}, {'type': 'PACKAGE', 'url': 'https://github.com/icsharpcode/SharpZipLib'}, {'type': 'WEB', 'url': 'https://github.com/icsh... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-01T16:20:32Z', 'nvd_published_at': '2022-01-26T21:15:00Z'} |
1.4.0 | GHSA-h3hw-g4hm-7gr4 | 2021-04-06T19:46:49Z | 2022-02-09T22:18:13Z | null | ['CVE-2020-23262'] | SQL injection without credentials in ming-soft MCMS | An issue was discovered in ming-soft MCMS v5.0, where a malicious user can exploit SQL injection without logging in through /mcms/view.do. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23262'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/45'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T19:46:49Z', 'nvd_published_at': '2021-01-26T18:15:00Z'} |
1.4.0 | GHSA-38m9-3vg4-rwvp | 2022-02-23T19:43:59Z | 2022-02-20T00:00:32Z | null | ['CVE-2022-0678'] | Cross-site Scripting in microweber | microweber prior to version 1.2.11 is vulnerable to cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0678'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/2b8fa5aac31e51e2aca83c7ef5d1281ba2e755f8'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T19:43:59Z', 'nvd_published_at': '2022-02-19T11:15:00Z'} |
1.4.0 | GHSA-vj3j-8m6x-mjq6 | 2022-12-01T22:29:35Z | 2022-02-16T00:01:20Z | null | ['CVE-2022-25199'] | Missing permission check in Jenkins SCP publisher Plugin | SCP publisher Plugin 1.8 and earlier does not perform a permission check in a method implementing form validation.
This allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified username and password.
Additionally, this form validation method does not requir... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:scp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25199'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/scp-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2323'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:29:35Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-35fg-hjcr-j65f | 2022-02-09T21:51:19Z | 2022-02-09T21:51:19Z | null | ['CVE-2022-23619'] | Information exposure in xwiki-platform | ### Impact
It's possible to guess if a user has an account on the wiki by using the "Forgot your password" form, even if the wiki is closed to guest users.
### Patches
The problem has been patched on XWiki 12.10.9, 13.4.1 and 13.6RC1.
### Workarounds
There's no easy workaround other than applying the upgrade.
### Re... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.5RC1'}, {'fixed': '13.6RC1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 13.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwi... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-35fg-hjcr-j65f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23619'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/d8a3cce48e0ac1a0f4a3cea7a19747382d9c9494'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-200', 'CWE-640'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T21:51:19Z', 'nvd_published_at': '2022-02-09T21:15:00Z'} |
1.4.0 | GHSA-6cw3-g6wv-c2xv | 2022-02-08T17:34:50Z | 2022-02-04T00:00:26Z | null | ['CVE-2022-23833'] | Infinite Loop in Django | An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.27'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'ty... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23833'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/c477b761804984c932704554ad35f78a2e230c6a'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/d16133568ef9c9b42cb7a08bdf9ff3feec2e5468'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T16:30:27Z', 'nvd_published_at': '2022-02-03T02:15:00Z'} |
1.4.0 | GHSA-qgrq-cx4c-2rmm | 2022-06-24T01:24:56Z | 2022-02-15T01:39:27Z | null | ['CVE-2020-1748'] | Incorrect Authorization in WildFly Elytron | A flaw was found in all supported versions before wildfly-elytron-1.6.8.Final-redhat-00001, where the WildFlySecurityManager checks were bypassed when using custom security managers, resulting in an improper authorization. This flaw leads to information exposure by unauthenticated access to secure resources. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.security:wildfly-elytron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1748'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1807707'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201001-0005/'}] | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T01:24:56Z', 'nvd_published_at': '2020-09-16T16:15:00Z'} |
1.4.0 | GHSA-9p8q-j6q5-mjw8 | 2022-02-25T15:29:16Z | 2022-02-15T00:02:45Z | null | ['CVE-2022-24988'] | Buffer Overflow in galois_2p8 | In galois_2p8 before 0.1.2, PrimitivePolynomialField::new has an off-by-one buffer overflow for a vector. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'galois_2p8'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24988'}, {'type': 'PACKAGE', 'url': 'https://github.com/djsweet/galois_2p8'}, {'type': 'WEB', 'url': 'https://github.com/djsweet/galois_2p8/blob/master/CHANGELOG.md'}] | {'cwe_ids': ['CWE-120', 'CWE-193'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T15:29:16Z', 'nvd_published_at': '2022-02-14T20:15:00Z'} |
1.4.0 | GHSA-98p5-x8x4-c9m5 | 2022-02-11T15:08:14Z | 2022-02-09T23:52:51Z | null | ['CVE-2022-23559'] | Integer overflow in TFLite | ### Impact
An attacker can craft a TFLite model that would cause an integer overflow [in embedding lookup operations](https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/embedding_lookup_sparse.cc#L179-L189):
```cc
int embedding_size = 1;
int lookup_size ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-98p5-x8x4-c9m5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23559'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1de49725a5fc4e48f1a3b902ec3599ee99283043'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:34:01Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-wq3v-3grq-6f86 | 2021-04-13T18:25:38Z | 2022-02-09T23:07:55Z | null | ['CVE-2020-25802'] | Improper Control of Dynamically-Managed Code Resources in Crafter CMS Crafter Studio | Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via Groovy scripting. This issue affects: Crafter Software Crafter CMS 3.0 versions prior to 3.0.27; 3.1 versions prior to 3.1.7. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.27'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1'}, {'fixe... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25802'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2020080101'}] | {'cwe_ids': ['CWE-913'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T18:25:38Z', 'nvd_published_at': '2020-10-06T14:15:00Z'} |
1.4.0 | GHSA-q42q-523g-3fwv | 2021-04-13T16:52:23Z | 2022-02-09T23:06:40Z | null | ['CVE-2020-7780'] | Cross-Site Request Forgery | This affects the package com.softwaremill.akka-http-session:core_2.13 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.12 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.11 before 0.5.11. For older versions, endpoints protected by randomTokenCsrfProtection could be bypassed with... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.softwaremill.akka-http-session:core_2.13'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.softwaremill.akka-http-session:core_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7780'}, {'type': 'WEB', 'url': 'https://github.com/softwaremill/akka-http-session/issues/74'}, {'type': 'WEB', 'url': 'https://github.com/softwaremill/akka-http-session/issues/77'}, {'type': 'WEB', 'url': 'https://github.com/softwaremill/akka-http-... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T16:52:23Z', 'nvd_published_at': '2020-11-27T17:15:00Z'} |
1.4.0 | GHSA-v98j-7crc-wvrj | 2022-02-09T22:03:57Z | 2022-02-09T22:03:57Z | null | ['CVE-2020-17523'] | Authentication bypass in Apache Shiro | Apache Shiro before 1.7.1, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-spring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17523'}, {'type': 'WEB', 'url': 'https://github.com/apache/shiro/pull/263'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SHIRO-797'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b93ddf97e2c4cda779d22fab30539bdec... | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T21:20:26Z', 'nvd_published_at': '2021-02-03T17:15:00Z'} |
1.4.0 | GHSA-4jwp-vfvf-657p | 2023-06-20T14:22:16Z | 2022-02-10T23:30:20Z | null | ['CVE-2019-2391'] | Deserialization of Untrusted Data in bson | Incorrect parsing of certain JSON input may result in js-bson not correctly serializing BSON. This may cause unexpected application behaviour including data disclosure. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'bson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-2391'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongodb/js-bson'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/js-bson/releases/tag/v1.1.4'}] | {'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T17:19:18Z', 'nvd_published_at': '2020-03-31T14:15:00Z'} |
1.4.0 | GHSA-4p92-fv6v-fhfj | 2022-03-09T20:43:44Z | 2022-02-27T00:00:15Z | null | ['CVE-2022-0723'] | Cross-site Scripting in microweber | Microweber prior to 1.2.11 is vulnerable to reflected cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0723'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:56:50Z', 'nvd_published_at': '2022-02-26T11:15:00Z'} |
1.4.0 | GHSA-hf6f-jq25-8gq9 | 2023-09-15T18:13:45Z | 2022-02-15T01:57:18Z | null | ['CVE-2018-18926'] | Gitea Remote Code Execution (RCE) | Gitea before 1.5.4 allows remote code execution because it does not properly validate session IDs. This is related to session ID handling in the go-macaron/session code for Macaron. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18926'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/issues/5140'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/5177'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/commit/aeb5655c25053bdcd7eee94ea37df8... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T18:25:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vp4x-94ff-2cmv | 2021-05-19T20:44:31Z | 2022-02-10T22:29:03Z | null | ['CVE-2020-23263'] | Cross-site scripting in forkcms | Persistent Cross-site scripting vulnerability on Fork CMS version 5.8.2 allows remote attackers to inject arbitrary Javascript code via the "navigation_title" parameter and the "title" parameter in /private/en/pages/add. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23263'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/pull/3093'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T20:44:31Z', 'nvd_published_at': '2021-05-06T22:15:00Z'} |
1.4.0 | GHSA-gfh2-7jg5-653p | 2021-05-20T16:29:42Z | 2022-02-15T01:57:18Z | null | ['CVE-2016-8579'] | Denial of Service in docker2aci | docker2aci <= 0.12.3 has an infinite loop when handling local images with cyclic dependency chain. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/appc/docker2aci'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8579'}, {'type': 'WEB', 'url': 'https://github.com/appc/docker2aci/issues/203'}, {'type': 'WEB', 'url': 'https://github.com/appc/docker2aci/pull/204/commits/54331ec7020e102935c31096f336d31f6400064f'}, {'type': 'WEB', 'url': 'https://github.com/appc... | {'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:29:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wcv5-vrvr-3rx2 | 2022-02-03T23:13:13Z | 2022-02-09T23:34:06Z | null | [] | Integer Overflow or Wraparound in TensorFlow | ### Impact
The Grappler component of TensorFlow is vulnerable to a denial of service via `CHECK`-failure (assertion failure) in [constant folding](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L963-L1035):
```cc
for (con... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wcv5-vrvr-3rx2'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/be7b286d40bc68cb0b56f702186cc48... | {'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T23:13:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7ph6-5cmq-xgjq | 2022-05-19T22:09:24Z | 2022-02-09T21:53:29Z | null | ['CVE-2022-23620'] | Path traversal in xwiki-platform-skin-skinx | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. AbstractSxExportURLFactoryActionHandler#processSx does not escape anything from SSX document reference when serializing it on filesystem, so it's easy to mess up the HTML export process with reference elements conta... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-skin-skinx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2-rc-1'}, {'fixed': '13.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7ph6-5cmq-xgjq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23620'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/ab778254fb8f71c774e1c1239368c44fe3b6bba5'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-116', 'CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T21:53:29Z', 'nvd_published_at': '2022-02-09T22:15:00Z'} |
1.4.0 | GHSA-rgjg-66cx-5x9m | 2021-05-20T21:09:16Z | 2022-02-15T01:57:18Z | null | ['CVE-2018-15727'] | Authentication Bypass | Grafana before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana/pkg/api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana/pkg/api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'f... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15727'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/commit/7baecf0d0deae0d865e45cf03e082bc0db3f28c3'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/commit/df83bf10a225811927644bdf6265fa80bdea9137'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:09:16Z', 'nvd_published_at': None} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.