schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-gpv5-rp6w-58r8
2022-11-22T00:13:44Z
2022-11-22T00:13:44Z
null
[]
Remote code execution vulnerability in dependency System.Drawing.Common
### Impact The core Akka module depended on an old System.Configuration.ConfigurationManager version 4.7.0 which transitively depends on System.Common.Drawing v4.7.0. The System.Common.Drawing v4.7.0 is affected by a remote code execution vulnerability https://github.com/advisories/GHSA-ghhp-997w-qr28. The real-world...
[]
[{'package': {'ecosystem': 'NuGet', 'name': 'Akka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.46'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Akka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0-alpha1'}, {'fixed': '1.5.0-alpha3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/akkadotnet/akka.net/security/advisories/GHSA-gpv5-rp6w-58r8'}, {'type': 'PACKAGE', 'url': 'https://github.com/akkadotnet/akka.net'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:13:44Z', 'nvd_published_at': None}
1.4.0
GHSA-995f-9x5r-2rcj
2022-11-28T23:33:19Z
2022-11-25T03:30:19Z
null
['CVE-2022-4135']
Heap buffer overflow in GPU
Heap buffer overflow in GPU in Google Chrome prior to 107.0.5304.121 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '19.0.0'}, {'fixed': '19.1.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4135'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/36444'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/36447'}, {'type': 'WEB', 'url': 'https://chromereleases.googleblog.com/2022/11/stable-channel-updat...
{'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-28T23:33:19Z', 'nvd_published_at': '2022-11-25T01:15:00Z'}
1.4.0
GHSA-7fxj-fr3v-r9gj
2022-11-24T01:13:44Z
2022-11-04T19:01:17Z
null
['CVE-2022-3023']
TiDB vulnerable to Use of Externally-Controlled Format String
TiDB server (importer CLI tool) prior to version 6.4.0 & 6.1.3 is vulnerable to data source name injection. The database name for generating and inserting data into a database does not properly sanitize user input which can lead to arbitrary file reads."
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pingcap/tidb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.1.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/pingcap/tidb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2.0'}, {'last_affected':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3023'}, {'type': 'WEB', 'url': 'https://github.com/pingcap/tidb/commit/d0376379d615cc8f263a0b17c031ce403c8dcbfb'}, {'type': 'WEB', 'url': 'https://advisory.dw1.io/45'}, {'type': 'PACKAGE', 'url': 'https://github.com/pingcap/tidb'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-134'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-04T20:48:44Z', 'nvd_published_at': '2022-11-04T12:15:00Z'}
1.4.0
GHSA-5m39-wx2q-mxg3
2022-11-08T21:56:43Z
2022-11-08T21:42:06Z
null
[]
Invalid use of `mem::uninitialized` causes `use-of-uninitialized-value`
The compression and decompression function used `mem:uninitialized` to create an array of uninitialized values, to later write values into it. This later leads to reads from uninitialized memory. The flaw was corrected in commit b633bf265e41c60dfce3be7eac4e4dd5e18d06cf by using a heap-allocated `Vec` and removing out ...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'lzf'}, 'ecosystem_specific': {'affected_functions': ['lzf::compress', 'lzf::decompress']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/badboy/lzf-rs/issues/9'}, {'type': 'WEB', 'url': 'https://github.com/badboy/lzf-rs/commit/b633bf265e41c60dfce3be7eac4e4dd5e18d06cf'}, {'type': 'PACKAGE', 'url': 'https://github.com/badboy/lzf-rs'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0067.html'...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-08T21:42:06Z', 'nvd_published_at': None}
1.4.0
GHSA-39hc-v87j-747x
2022-11-02T18:11:56Z
2022-11-02T18:11:56Z
null
[]
Vulnerable OpenSSL included in cryptography wheels
pyca/cryptography's wheels include a statically linked copy of OpenSSL. The versions of OpenSSL included in cryptography 37.0.0-38.0.3 are vulnerable to a number of security issues. More details about the vulnerabilities themselves can be found in https://www.openssl.org/news/secadv/20221101.txt. If you are building c...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'cryptography'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '37.0.0'}, {'fixed': '38.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/security/advisories/GHSA-39hc-v87j-747x'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/382e759bcded5773330eeed748c86b213ec618c5'}, {'type': 'WEB', 'url': 'https://github.com/pyca/cryptography/commit/cf2ada625d1188d6cd46396f301b98095da...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T18:11:56Z', 'nvd_published_at': None}
1.4.0
GHSA-jrvr-gmqv-hgrh
2022-11-10T14:31:35Z
2022-11-09T19:02:23Z
null
['CVE-2022-43121']
Subrion CMS is vulnerable to Cross-Site Scripting (XSS)
A cross-site scripting (XSS) vulnerability in the CMS Field Add page of Intelliants Subrion CMS in version 4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the tooltip text field.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43121'}, {'type': 'WEB', 'url': 'https://github.com/intelliants/subrion/issues/895'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-09T20:57:11Z', 'nvd_published_at': '2022-11-09T16:15:00Z'}
1.4.0
GHSA-hq7g-wwwp-q46h
2022-11-21T21:54:18Z
2022-11-21T21:54:18Z
null
['CVE-2022-41898']
`CHECK` fail via inputs in `SparseFillEmptyRowsGrad`
### Impact If [`SparseFillEmptyRowsGrad`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/sparse_fill_empty_rows_op_gpu.cu.cc) is given empty inputs, TensorFlow will crash. ```python import tensorflow as tf tf.raw_ops.SparseFillEmptyRowsGrad( reverse_index_map=[], grad_values=[], name=...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-hq7g-wwwp-q46h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41898'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/af4a6a3c8b95022c351edae94560acc61253a1b8'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T21:54:18Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-97xg-phpr-rg8q
2022-11-08T15:08:59Z
2022-11-07T19:00:22Z
null
['CVE-2022-42920']
Apache Commons BCEL vulnerable to out-of-bounds write
Apache Commons BCEL has a number of APIs that would normally only allow changing specific class characteristics. However, due to an out-of-bounds writing issue, these APIs can be used to produce arbitrary bytecode. This could be abused in applications that pass attacker-controllable data to those APIs, giving the attac...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.bcel:bcel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42920'}, {'type': 'WEB', 'url': 'https://github.com/apache/commons-bcel/pull/147'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-bcel'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/BCEL-363'}, {'type': 'WEB', 'url...
{'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-07T21:05:28Z', 'nvd_published_at': '2022-11-07T13:15:00Z'}
1.4.0
GHSA-p22x-g9px-3945
2022-12-20T15:48:56Z
2022-11-01T12:00:30Z
null
['CVE-2022-42252']
Apache Tomcat may reject request containing invalid Content-Length header
If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling at...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.83'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-M1'}, {'fixed':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42252'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/zzcxzvqfdqn515zfs3dxb7n8gty589sq'}, {'type': 'WEB', 'url': 'https://security.gentoo.org/glsa/202305-37'}]
{'cwe_ids': ['CWE-20', 'CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T18:37:42Z', 'nvd_published_at': '2022-11-01T09:15:00Z'}
1.4.0
GHSA-frqp-wp83-qggv
2022-11-21T22:17:52Z
2022-11-21T22:17:52Z
null
['CVE-2022-41910']
Heap overflow in `QuantizeAndDequantizeV2`
### Impact The function [MakeGrapplerFunctionItem](https://https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/grappler/utils/functions.cc#L221) takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of-bounds me...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-frqp-wp83-qggv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41910'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a65411a1d69edfb16b25907ffb8f73556ce36bb7'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:17:52Z', 'nvd_published_at': '2022-12-06T22:15:00Z'}
1.4.0
GHSA-cjp8-vv38-p3g2
2023-06-27T22:20:22Z
2022-11-16T12:00:18Z
null
['CVE-2022-4014']
Cross-Site Request Forgery in feehi/feehicms
FeehiCMS vulnerable to Cross-Site Request Forgery. Affected by this issue is some unknown functionality of the component Post My Comment Tab. The manipulation leads to cross-site request forgery. The attack may be launched remotely.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/feehicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4014'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/feehicms'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.213788'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:52:50Z', 'nvd_published_at': '2022-11-16T08:15:00Z'}
1.4.0
GHSA-4598-wcg8-x56g
2022-12-15T20:46:48Z
2022-11-16T12:00:23Z
null
['CVE-2022-45386']
XML External Entity Reference in Jenkins Violations Plugin
Violations Plugin 0.7.11 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers to control XML input files for the 'Report Violations' post-build step to have agent processes parse a crafted file that uses external entities for extraction of secrets from the J...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:violations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45386'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/violations-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-766'}]
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:22:34Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-7fw6-6mfj-g3q2
2022-11-02T18:14:30Z
2022-11-02T18:14:30Z
null
[]
ckb: Transaction header_deps validation issue (network forking)
### Impact fn `HeaderChecker#check_valid` skipped main chain checking after this PR: https://github.com/nervosnetwork/ckb/pull/1646/files#diff-c4e017b67c1b3005ca0c446a9b0879571aa36a858b1f7ddd1b9328a884e3214bR171-R176 It will cause network forking if one transaction is using a forked block header which is not exists in...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'ckb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.101.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.101.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/security/advisories/GHSA-7fw6-6mfj-g3q2'}, {'type': 'WEB', 'url': 'https://github.com/nervosnetwork/ckb/pull/1646/files#diff-c4e017b67c1b3005ca0c446a9b0879571aa36a858b1f7ddd1b9328a884e3214bR171-R176'}, {'type': 'PACKAGE', 'url': 'https://github.com/nervosnet...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-02T18:14:30Z', 'nvd_published_at': None}
1.4.0
GHSA-g8hp-rc67-jf96
2022-11-21T23:49:10Z
2022-11-15T12:00:16Z
null
['CVE-2022-42125']
Path Traversal in Liferay Portal
Zip slip vulnerability in FileUtil.unzip in Liferay Portal 7.4.3.5 through 7.4.3.35 and Liferay DXP 7.4 update 1 through update 34 allows attackers to create or overwrite existing files on the filesystem via the deployment of a malicious plugin/module.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.4.3.5'}, {'fixed': '7.4.3.48'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.4.3.35'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42125'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17517'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-42125'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:49:10Z', 'nvd_published_at': '2022-11-15T01:15:00Z'}
1.4.0
GHSA-w573-4hg7-7wgq
2023-03-31T16:05:14Z
2022-11-28T15:30:24Z
null
['CVE-2022-38900']
decode-uri-component vulnerable to Denial of Service (DoS)
decode-uri-component 0.2.0 is vulnerable to Improper Input Validation resulting in DoS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'decode-uri-component'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38900'}, {'type': 'WEB', 'url': 'https://github.com/SamVerschueren/decode-uri-component/issues/5'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/query-string/issues/345'}, {'type': 'WEB', 'url': 'https://github.com/SamVerschueren/decode-...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-28T23:35:59Z', 'nvd_published_at': '2022-11-28T13:15:00Z'}
1.4.0
GHSA-8rwr-x37p-mx23
2022-11-07T21:28:54Z
2022-11-01T17:45:59Z
null
['CVE-2022-3602']
X.509 Email Address 4-byte Buffer Overflow
A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed the malicious certificate or for the application to continue certificate verification despite failur...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3602'}, {'type': 'WEB', 'url': 'https://github.com/rustsec/advisory-db/pull/1452'}, {'type': 'WEB', 'url': 'https://github.com/alexcrichton/openssl-src-rs/commit/4a31c14f31e1a08c18893a37e304dd1dd4b7daa3'}, {'type': 'WEB', 'url': 'https://github.com...
{'cwe_ids': ['CWE-120', 'CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T17:45:59Z', 'nvd_published_at': '2022-11-01T18:15:00Z'}
1.4.0
GHSA-jr77-8gx4-h5qh
2022-11-16T00:04:13Z
2022-11-11T12:00:33Z
null
['CVE-2022-41719']
MessagePack for Golang subject to DoS via Unmarshal panic
Unmarshal can panic on some inputs, possibly allowing for denial of service attacks. This issue has been patched in version 2.1.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/shamaton/msgpack/v2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41719'}, {'type': 'WEB', 'url': 'https://github.com/shamaton/msgpack/issues/31'}, {'type': 'WEB', 'url': 'https://github.com/shamaton/msgpack/pull/32'}, {'type': 'PACKAGE', 'url': 'https://github.com/shamaton/msgpack'}, {'type': 'WEB', 'url': 'http...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-16T00:04:13Z', 'nvd_published_at': '2022-11-10T20:15:00Z'}
1.4.0
GHSA-94rr-4jr5-9h2p
2022-11-08T20:22:08Z
2022-11-07T12:00:33Z
null
['CVE-2022-37865']
Apache Ivy does not verify target path when extracting the archive
With Apache Ivy 2.4.0 an optional packaging attribute has been introduced that allows artifacts to be unpacked on the fly if they used pack200 or zip packaging. For artifacts using the "zip", "jar" or "war" packaging Ivy prior to version 2.5.1 doesn't verify the target path when extracting the archive. An archive cont...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.ivy:ivy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37865'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/gqvvv7qsm2dfjg6xzsw1s2h08tbr0sdy'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YDIFDL5WSBEKBUVKTABUFDDD25SB...
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-07T16:11:25Z', 'nvd_published_at': '2022-11-07T11:15:00Z'}
1.4.0
GHSA-rc39-g977-687w
2022-11-10T21:27:55Z
2022-11-10T21:27:55Z
null
['CVE-2022-36022']
Use of unclaimed s3 bucket in tests and examples
### Impact People who use some older NLP examples that reference the old S3 bucket. ### Patches The problem has been patched. Upgrade to snapshots for now. A release will be published later to address this due to the vulnerability mostly being examples and 1 class in the actual code base. ### Workarounds Download a ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.deeplearning4j:platform-tests'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0-M2.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.deeplearning4j:dl4j-examples'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced...
[{'type': 'WEB', 'url': 'https://github.com/deeplearning4j/deeplearning4j/security/advisories/GHSA-rc39-g977-687w'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/deeplearning4j/security/advisories/GHSA-rc39-g977-687w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36022'}, {'type': 'PACK...
{'cwe_ids': ['CWE-330', 'CWE-344'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T21:27:55Z', 'nvd_published_at': '2022-11-10T18:15:00Z'}
1.4.0
GHSA-mmmh-wcxm-2wr4
2022-11-02T21:50:03Z
2022-11-01T12:00:37Z
null
['CVE-2022-31692']
Spring Security authorization rules can be bypassed via forward or include dispatcher types
Spring Security, versions 5.7 prior to 5.7.5 and 5.6 prior to 5.6.9 could be susceptible to authorization rules bypass via forward or include dispatcher types. Specifically, an application is vulnerable when all of the following are true: The application expects that Spring Security applies security to forward and incl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.7.0'}, {'fixed': '5.7.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.security:spring-security-core'}, 'ranges': [{'type': 'ECOSYSTEM',...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31692'}, {'type': 'PACKAGE', 'url': 'https://github.com/spring-projects/spring-security'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221215-0010/'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-31692'...
{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T19:00:59Z', 'nvd_published_at': '2022-10-31T20:15:00Z'}
1.4.0
GHSA-8782-xgh5-r7mv
2022-11-22T00:12:03Z
2022-11-15T12:00:17Z
null
['CVE-2022-43968']
Concrete CMS vulnerable to Reflected Cross-Site Scripting via dashboard icons
Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to Reflected XSS in the dashboard icons due to un-sanitized output. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.3'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43968'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/913-release-n...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:12:03Z', 'nvd_published_at': '2022-11-14T22:15:00Z'}
1.4.0
GHSA-rmg2-f698-wq35
2022-11-21T21:53:52Z
2022-11-21T21:53:52Z
null
['CVE-2022-41896']
`tf.raw_ops.Mfcc` crashes
### Impact If [`ThreadUnsafeUnigramCandidateSampler`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/image/mirror_pad_op.cc) is given input `filterbank_channel_count` greater than the allowed max size, TensorFlow will crash. ```python import tensorflow as tf tf.raw_ops.Mfcc( spectrogr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rmg2-f698-wq35'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41896'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/39ec7eaf1428e90c37787e5b3fbd68ebd3c48860'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-1284', 'CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T21:53:52Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-v535-pc6r-77qh
2022-12-15T19:26:44Z
2022-11-16T12:00:23Z
null
['CVE-2022-45385']
Lack of authentication mechanism for webhook in CloudBees Docker Hub/Registry Notification Plugin
CloudBees Docker Hub/Registry Notification Plugin provides several webhook endpoints that can be used to trigger builds when Docker images used by a job have been rebuilt. In CloudBees Docker Hub/Registry Notification Plugin 2.6.2 and earlier, these endpoints can be accessed without authentication. This allows unauth...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dockerhub-notification'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.6.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45385'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dockerhub-notification-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2843'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:22:24Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-94qm-99qc-qwqj
2022-11-18T16:02:29Z
2022-11-15T12:00:17Z
null
['CVE-2022-3362']
rdiffweb vulnerable to Insufficient Session Expiration
Insufficient Session Expiration in GitHub repository ikus060/rdiffweb prior to 2.5.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3362'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/6efb995bc32c8a8e9ad755eb813dec991dffb2b8'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ca428c31-85...
{'cwe_ids': ['CWE-613'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-18T16:02:29Z', 'nvd_published_at': '2022-11-14T21:15:00Z'}
1.4.0
GHSA-vjj4-qwcm-552h
2022-11-21T23:49:32Z
2022-11-15T12:00:16Z
null
['CVE-2022-42124']
Inefficient Regular Expression Complexity in Liferay Portal
ReDoS vulnerability in LayoutPageTemplateEntryUpgradeProcess in Liferay Portal 7.3.2 through 7.4.3.4 and Liferay DXP 7.2 fix pack 9 through fix pack 18, 7.3 before update 4, and DXP 7.4 GA allows remote attackers to consume an excessive amount of server resources via a crafted payload injected into the 'name' field of ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.3.2'}, {'fixed': '7.4.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42124'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17435'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17535'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_p...
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:49:32Z', 'nvd_published_at': '2022-11-15T01:15:00Z'}
1.4.0
GHSA-chcg-gh9p-96c5
2022-12-15T21:17:20Z
2022-11-16T12:00:23Z
null
['CVE-2022-45401']
Jenkins Associated Files Plugin vulnerable to cross-site scripting (XSS)
Jenkins Associated Files Plugin 0.2.1 and earlier does not escape names of associated files, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. Currently, there are no known workarounds or patches.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:associated-files-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45401'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/associated-files-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2947'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:26:35Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-m53v-5x5x-5m2p
2022-11-22T00:12:25Z
2022-11-15T12:00:17Z
null
['CVE-2022-43687']
Concrete CMS vulnerable to Session Fixation
Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 does not issue a new session ID upon successful OAuth authentication. Remediate by updating to Concrete CMS 9.1.3+ or 8.5.10+.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.1.3'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43687'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/8510-release-notes'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/913-release-n...
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:12:25Z', 'nvd_published_at': '2022-11-14T23:15:00Z'}
1.4.0
GHSA-66vq-54fq-6jvv
2022-11-21T20:42:18Z
2022-11-21T20:42:18Z
null
['CVE-2022-41891']
Segfault in `tf.raw_ops.TensorListConcat`
### Impact If [`tf.raw_ops.TensorListConcat`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/list_kernels.h) is given `element_shape=[]`, it results segmentation fault which can be used to trigger a denial of service attack. ```python import tensorflow as tf tf.raw_ops.TensorListConcat( ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-66vq-54fq-6jvv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41891'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/fc33f3dc4c14051a83eec6535b608abe1d355fde'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T20:42:18Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-9cx2-hj6m-fv58
2023-09-20T10:17:35Z
2022-11-21T23:58:20Z
null
['CVE-2022-38724']
Silverstripe XSS in shortcodes
A malicious content author could add arbitrary attributes to HTML editor shortcodes which could be used to inject a JavaScript payload on the front end of the site. The shortcode providers that ship with Silverstripe CMS have been reviewed and attribute whitelists have been implemented where appropriate to negate this ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/assets'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.11.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ecosystem_specific': {'affe...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38724'}, {'type': 'WEB', 'url': 'https://forum.silverstripe.org/c/releases'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/assets/CVE-2022-38724.yaml'}, {'type': 'WEB', 'url': 'https://github....
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:58:20Z', 'nvd_published_at': '2022-11-23T00:15:00Z'}
1.4.0
GHSA-44xv-v98g-v79f
2022-11-22T17:50:25Z
2022-11-21T23:57:46Z
null
['CVE-2022-38146']
URL XSS vulnerability due to outdated jquery in CMS
Silverstripe silverstripe/framework through 4.11 allows XSS (issue 2 of 3).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/admin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.11.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38146'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/admin/CVE-2022-38146.yaml'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/CVE-2022-38146'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:57:46Z', 'nvd_published_at': '2022-11-21T16:15:00Z'}
1.4.0
GHSA-hw4f-g7wh-xp52
2022-12-15T21:09:27Z
2022-11-16T12:00:23Z
null
['CVE-2022-45393']
Cross-Site Request Forgery in Jenkins Delete log Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Delete log Plugin 1.0 and earlier allows attackers to delete build logs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:delete-log-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45393'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/delete-log-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2920'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:23:45Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-22vc-5pgw-644q
2022-12-02T22:27:39Z
2022-11-27T03:30:25Z
null
['CVE-2022-45933']
KubeView vulnerable to full cluster takeover due to improper authentication
KubeView through 0.1.31 allows attackers to obtain control of a Kubernetes cluster because api/scrape/kube-system does not require authentication, and retrieves certificate files that can be used for authentication as kube-admin. NOTE: the vendor's position is that KubeView was a "fun side project and a learning exerci...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/benc-uk/kubeview'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.31'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45933'}, {'type': 'WEB', 'url': 'https://github.com/benc-uk/kubeview/issues/95'}, {'type': 'PACKAGE', 'url': 'https://github.com/benc-uk/kubeview'}]
{'cwe_ids': ['CWE-287', 'CWE-306'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:27:39Z', 'nvd_published_at': '2022-11-27T03:15:00Z'}
1.4.0
GHSA-j2jp-wvqg-wc2g
2022-12-01T22:13:04Z
2022-11-29T23:55:54Z
null
['CVE-2022-41912']
crewjam/saml vulnerable to signature bypass via multiple Assertion elements due to improper authentication
### Impact The crewjam/saml go library is vulnerable to an authentication bypass when processing SAML responses containing multiple Assertion elements. ### Patches This issue has been corrected in version 0.4.9. ### Credit This issue was reported by Felix Wilhelm from Google Project Zero.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/crewjam/saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/crewjam/saml/security/advisories/GHSA-j2jp-wvqg-wc2g'}, {'type': 'WEB', 'url': 'https://github.com/prometheus/exporter-toolkit/security/advisories/GHSA-7rg2-cxvp-9p7p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41912'}, {'type': 'WEB', 'url': 'ht...
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T23:55:54Z', 'nvd_published_at': '2022-11-28T15:15:00Z'}
1.4.0
GHSA-h8hf-hxx6-5g6v
2022-12-15T18:55:46Z
2022-11-16T12:00:22Z
null
['CVE-2022-45382']
Cross-site Scripting in Jenkins Naginator Plugin
Naginator Plugin 1.18.1 and earlier does not escape display names of source builds in builds that were triggered via Retry action. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to edit build display names. Naginator Plugin 1.18.2 escapes display names of source builds...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:naginator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.18.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45382'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/naginator-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2946'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:21:26Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-368v-7v32-52fx
2022-11-21T22:04:27Z
2022-11-21T22:04:27Z
null
['CVE-2022-41907']
Overflow in `ResizeNearestNeighborGrad`
### Impact When [`tf.raw_ops.ResizeNearestNeighborGrad`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/kernels/image/resize_nearest_neighbor_op.cc) is given a large `size` input, it overflows. ``` import tensorflow as tf align_corners = True half_pixel_centers = False grads = tf.constant(1, shap...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-368v-7v32-52fx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41907'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/00c821af032ba9e5f5fa3fe14690c8d28a657624'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-131'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:04:27Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-gw2g-hhc9-wgjh
2022-11-21T23:53:03Z
2022-11-16T12:00:20Z
null
['CVE-2022-3920']
Missing Authorization in HashiCorp Consul
HashiCorp Consul and Consul Enterprise 1.13.0 up to 1.13.3 do not filter cluster filtering's imported nodes and services for HTTP or RPC endpoints used by the UI. Fixed in 1.14.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.14.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3920'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/706866fa0016b0aa302679f9c648859050d19b2e'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-28-consul-cluster-peering-leaks-imported-nodes-services-inform...
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:53:03Z', 'nvd_published_at': '2022-11-16T00:15:00Z'}
1.4.0
GHSA-5jqp-885w-xj32
2023-08-31T00:33:18Z
2022-11-10T12:01:17Z
null
['CVE-2022-42964']
pymatgen is vulnerable to Regular Expression Denial of Service (ReDoS)
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the pymatgen PyPI package, when an attacker is able to supply arbitrary input to the `GaussianInput.from_string` method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pymatgen'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2022.9.21'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-42964'}, {'type': 'WEB', 'url': 'https://github.com/materialsproject/pymatgen/issues/2755'}, {'type': 'PACKAGE', 'url': 'https://github.com/materialsproject/pymatgen'}, {'type': 'WEB', 'url': 'https://research.jfrog.com/vulnerabilities/pymatgen-red...
{'cwe_ids': ['CWE-1333'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T18:55:00Z', 'nvd_published_at': '2022-11-09T20:15:00Z'}
1.4.0
GHSA-442f-wcwq-fpcf
2022-11-21T22:32:04Z
2022-11-21T22:32:04Z
null
['CVE-2022-41922']
Prevent RCE when deserializing untrusted user input
### Impact Affected versions of `yiisoft/yii` are vulnerable to Remote Code Execution (RCE) if the application calls `unserialize()` on arbitrary user input. ### Patches Upgrade `yiisoft/yii` to version 1.1.27 or higher. ### For more information See the following links for more details: - [Git commit](https://github....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yiisoft/yii'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.27'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/yiisoft/yii/security/advisories/GHSA-442f-wcwq-fpcf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41922'}, {'type': 'WEB', 'url': 'https://github.com/yiisoft/yii/commit/ed67b7cc57216557c5c595c6650cdd2d3aa41c52'}, {'type': 'PACKAGE', 'url': 'https:/...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:32:04Z', 'nvd_published_at': '2022-11-23T18:15:00Z'}
1.4.0
GHSA-ffwf-47x2-jpr8
2022-11-17T20:15:22Z
2022-11-13T12:00:17Z
null
['CVE-2022-3971']
Matrix-appservice-irc vulnerable to sql injection via roomIds argument
A vulnerability was found in matrix-appservice-irc up to 0.35.1. This vulnerability affects the file src/datastore/postgres/PgDataStore.ts. The manipulation of the argument roomIds leads to sql injection. Upgrading to version 0.36.0 is able to address this issue. The name of the patch is 179313a37f06b298150edba3e2b0e5a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'matrix-appservice-irc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.36.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3971'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/pull/1619'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/commit/179313a37f06b298150edba3e2b0e5a73c1415e7'}, {'type': 'PACKAGE', 'url...
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-15T23:59:15Z', 'nvd_published_at': '2022-11-13T10:15:00Z'}
1.4.0
GHSA-rjx6-v474-2ch9
2022-11-21T22:17:43Z
2022-11-21T22:17:43Z
null
['CVE-2022-41909']
Segfault in `CompositeTensorVariantToComponents`
### Impact An input `encoded` that is not a valid `CompositeTensorVariant` tensor will trigger a segfault in [`tf.raw_ops.CompositeTensorVariantToComponents`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/python/lib/core/py_func.cc). ```python import tensorflow as tf encode = tf.raw_ops.EmptyTensorL...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rjx6-v474-2ch9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41909'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/660ce5a89eb6766834bdc303d2ab3902aef99d3d'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-20', 'CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:17:43Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-fjhh-67wv-7gr4
2022-11-03T18:42:42Z
2022-11-03T18:42:42Z
null
['CVE-2019-19040']
Reflected Cross site scripting (XSS) in kairosdb
KairosDB through 1.2.2 has XSS in view.html because of showErrorMessage in js/graph.js, as demonstrated by view.html?q= with a '"sampling":{"value":"<script>' substring.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.kairosdb:kairosdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19040'}, {'type': 'WEB', 'url': 'https://github.com/kairosdb/kairosdb/issues/569'}, {'type': 'WEB', 'url': 'https://github.com/kairosdb/kairosdb/pull/593'}, {'type': 'WEB', 'url': 'https://github.com/kairosdb/kairosdb/milestone/10?closed=1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-03T18:42:42Z', 'nvd_published_at': '2019-11-17T21:15:00Z'}
1.4.0
GHSA-hc4j-7mqg-cxjj
2023-07-07T21:05:46Z
2022-11-16T12:00:20Z
null
['CVE-2021-4241']
PHPServerMon PRNG has Insufficient Entropy
A vulnerability, which was classified as problematic, was found in phpservermon. Affected is the function `setUserLoggedIn` of the file `src/psm/Service/User.php`. The manipulation leads to use of predictable algorithm in random number generator. The exploit has been disclosed to the public and may be used. The name of...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpservermon/phpservermon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4241'}, {'type': 'WEB', 'url': 'https://github.com/phpservermon/phpservermon/commit/bb10a5f3c68527c58073258cb12446782d223bc3'}, {'type': 'PACKAGE', 'url': 'https://github.com/phpservermon/phpservermon'}, {'type': 'WEB', 'url': 'https://huntr.dev/bo...
{'cwe_ids': ['CWE-1241', 'CWE-330', 'CWE-331'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T21:05:46Z', 'nvd_published_at': '2022-11-15T23:15:00Z'}
1.4.0
GHSA-7644-cxp8-h23r
2022-11-10T23:52:31Z
2022-11-10T23:52:31Z
null
[]
ibexa/admin-ui vulnerable to Cross-site Scripting in content type name/shortname
Critical severity. It is possible to inject JavaScript XSS in the content type entries "name" and "short name". To exploit this, one must already have permission to edit content types, which limits it in many cases to people who are already administrators. However, please verify which users have this permission. The fi...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'ibexa/admin-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ibexa/admin-ui/security/advisories/GHSA-7644-cxp8-h23r'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-009-critical-vulnerabilities-in-graphql-role-assignment-ct-editing-and-drafts-tooltips'}, {'type': 'PACKAGE', 'url': 'https://github...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-10T23:52:31Z', 'nvd_published_at': None}
1.4.0
GHSA-8538-25v4-25pg
2022-12-15T21:16:20Z
2022-11-16T12:00:23Z
null
['CVE-2022-45400']
XXE vulnerability in Jenkins JAPEX Plugin
JAPEX Plugin 1.7 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to control XML input files for the 'Record Japex test report' post-build step to have Jenkins parse a crafted file that uses external entities for extraction of secrets from the Jenki...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:japex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45400'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/japex-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2941'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:26:29Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-789v-h9hw-38pg
2022-11-18T16:11:22Z
2022-11-14T19:00:19Z
null
['CVE-2022-45378']
Apache SOAP contains unauthenticated RPCRouterServlet
** UNSUPPORTED WHEN ASSIGNED ** In the default configuration of Apache SOAP, an RPCRouterServlet is available without authentication. This gives an attacker the possibility to invoke methods on the classpath that meet certain criteria. Depending on what classes are available on the classpath this might even lead to arb...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'soap:soap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45378'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/g4l64s283njhnph2otx7q4gs2j952d31'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/11/14/4'}]
{'cwe_ids': ['CWE-287', 'CWE-306', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-11-18T16:11:22Z', 'nvd_published_at': '2022-11-14T14:15:00Z'}
1.4.0
GHSA-w2j3-pq63-339w
2022-12-15T19:25:05Z
2022-11-16T12:00:22Z
null
['CVE-2022-45383']
Incorrect permission checks in Jenkins Support Core Plugin
Support Core Plugin defines the permission Support/DownloadBundle that allows users without Overall/Administer permission to create and download support bundles containing a limited set of diagnostic information. Support Core Plugin 1206.v14049fa_b_d860 and earlier does not correctly perform permission checks in sever...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:support-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1206.1208.v9b_7a_1d48db_0f'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1206.v14049fa'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-45383'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/support-core-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-11-15/#SECURITY-2804'}]
{'cwe_ids': ['CWE-276', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:21:38Z', 'nvd_published_at': '2022-11-15T20:15:00Z'}
1.4.0
GHSA-qch4-jmf8-xvp7
2022-11-21T23:56:32Z
2022-11-20T06:30:16Z
null
['CVE-2022-4067']
Cross-site Scripting in librenms/librenms
Cross-site Scripting (XSS) - Stored in GitHub repository librenms/librenms prior to 22.10.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4067'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/8e85698aa3aa4884c2f3d6c987542477eb64f07c'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3ca7023e-d95c-423f-9e9a-222a67a8ee72'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T23:56:32Z', 'nvd_published_at': '2022-11-20T05:15:00Z'}
1.4.0
GHSA-pf36-r9c6-h97j
2022-11-21T22:18:11Z
2022-11-21T22:18:11Z
null
['CVE-2022-41911']
Invalid char to bool conversion when printing a tensor
### Impact When [printing a tensor](https://github.com/tensorflow/tensorflow/blob/807cae8a807960fd7ac2313cde73a11fc15e7942/tensorflow/core/framework/tensor.cc#L1200-L1227), we get it's data as a `const char*` array (since that's the underlying storage) and then we typecast it to the element type. However, conversions f...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.3'}]}]}, {'package': {'ecosy...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pf36-r9c6-h97j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41911'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1be743703279782a357adbf9b77dcb994fe8b508'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-704'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:18:11Z', 'nvd_published_at': '2022-11-18T22:15:00Z'}
1.4.0
GHSA-9cv5-4wqv-9w94
2022-11-02T16:01:26Z
2022-11-01T12:00:30Z
null
['CVE-2022-25892']
muhammara and hummus vulnerable to denial of service by NULL pointer dereference
### Impact The package muhammara before 2.6.1, from 3.0.0 and before 3.1.1; all versions of package hummus are vulnerable to Denial of Service (DoS) when supplied with a maliciously crafted PDF file to be parsed. ### Patches It has been patched in 3.1.1 and has been backported to 2.6.1 Hummus has a patch in 1.0.111. ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'muhammara'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'muhammara'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.1'}]}]}, {'package': {'ecosystem': '...
[{'type': 'WEB', 'url': 'https://github.com/julianhille/MuhammaraJS/security/advisories/GHSA-f64j-4x74-p42m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25892'}, {'type': 'WEB', 'url': 'https://github.com/galkahana/HummusJS/issues/463'}, {'type': 'WEB', 'url': 'https://github.com/julianhill...
{'cwe_ids': ['CWE-690'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-01T21:54:15Z', 'nvd_published_at': '2022-11-01T05:15:00Z'}
1.4.0
GHSA-p2x4-6ghr-6vmq
2022-11-21T22:37:47Z
2022-11-21T22:37:47Z
null
['CVE-2022-41935']
Exposure of Sensitive Information to an Unauthorized Actor in org.xwiki.platform:xwiki-platform-livetable-ui
### Impact User without the right to view documents can deduce their existence by repeated Livetable queries. #### Reproduction steps 1. Restrict "view" access to `Sandbox.TestPage3` by setting an explicit view right for admins 1. As a user who is not an admin, open `<server>/bin/get/XWiki/LiveTableResults?outputSyn...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livetable-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.10.11'}, {'fixed': '13.10.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-livetable-ui'}, 'ranges': [{'type': 'ECOSYSTEM', ...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-p2x4-6ghr-6vmq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41935'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/1450b6e3c69ac7df25e5a2571186d1f43402facd#diff-5a739e5865b1f1a...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-21T22:37:47Z', 'nvd_published_at': '2022-11-23T20:15:00Z'}
1.4.0
GHSA-vp35-85q5-9f25
2022-11-11T00:03:31Z
2022-11-11T00:03:31Z
null
[]
Container build can leak any path on the host into the container
### Description Moby is the open source Linux container runtime and set of components used to build a variety of downstream container runtimes, including Docker CE, Mirantis Container Runtime (formerly Docker EE), and Docker Desktop. Moby allows for building container images using a set of build instructions (usually ...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/moby/moby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.10.20'}]}], 'database_specific': {'last_known_affected_version_range': '<= 20.10.19'}}]
[{'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-vp35-85q5-9f25'}, {'type': 'WEB', 'url': 'https://github.blog/2022-10-17-git-security-vulnerabilities-announced/'}, {'type': 'PACKAGE', 'url': 'https://github.com/moby/moby'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/releases/tag...
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-11T00:03:31Z', 'nvd_published_at': None}
1.4.0
GHSA-cg3h-rc9q-g8v9
2022-02-14T22:35:24Z
2022-02-09T00:00:30Z
null
['CVE-2022-0509']
Cross-site Scripting in pimcore
pimcore version 10.3.0 and prior is vulnerable to cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0509'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/6ccb5c12fc1be065ebce9c89c4677ee939b88597'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/26cdf86c-8edc...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T21:17:42Z', 'nvd_published_at': '2022-02-08T12:15:00Z'}
1.4.0
GHSA-997c-fj8j-rq5h
2021-05-12T17:42:53Z
2022-02-15T01:57:18Z
null
['CVE-2014-9357']
Arbitrary Code Execution
Docker 1.3.2 allows remote attackers to execute arbitrary code with root privileges via a crafted (1) image or (2) build in a Dockerfile in an LZMA (.xz) archive, related to the chroot for archive extraction.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9357'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker/compare/aef842e7dfb534aba22c3c911de525ce9ac12b72...313a1b7620910e47d888f8b0a6a5eb06ad9c1ff2'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/blob/master/CHANGELOG.md#133-2014-1...
{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T17:42:53Z', 'nvd_published_at': None}
1.4.0
GHSA-ch68-7cf4-35vr
2022-02-07T21:57:38Z
2022-02-07T21:57:38Z
null
['CVE-2022-23600']
Limited ability to spoof SAML authentication with missing audience verification in Fleet
### Impact This impacts deployments using SAML SSO in two specific cases: 1. A malicious or compromised Service Provider (SP) could reuse the SAML response to log into Fleet as a user -- only if the user has an account with the same email in Fleet, _and_ the user signs into the malicious SP via SAML SSO from the same...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/fleetdm/fleet/v4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/fleetdm/fleet/security/advisories/GHSA-ch68-7cf4-35vr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23600'}, {'type': 'WEB', 'url': 'https://github.com/fleetdm/fleet/commit/35d5a7b285f15ddd47486fa656e8b1acf3d48374'}, {'type': 'PACKAGE', 'url': 'htt...
{'cwe_ids': ['CWE-284', 'CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T17:19:00Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-h2x7-2ff6-v32p
2023-08-30T18:02:56Z
2022-02-11T23:39:57Z
null
[]
gobase subject to Incorrect routing of some HTTP requests when using httpauth due to a race condition
### Impact Incorrect routing of some HTTP requests when using httpauth due to a race condition ### Patches Upgrade to version 0.7.2 for fix ### Workarounds None ### For more information If you have any questions or comments about this advisory: * Email us at [nbosscher@blue-giraffe.ca](mailto:nbosscher@blue-giraffe....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ntbosscher/gobase'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ntbosscher/gobase/security/advisories/GHSA-h2x7-2ff6-v32p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2583'}, {'type': 'WEB', 'url': 'https://github.com/ntbosscher/gobase/commit/a8d40bce9c429d324122d18c446924dab809e812'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-362'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T22:08:26Z', 'nvd_published_at': None}
1.4.0
GHSA-c3j8-q5x6-2855
2023-07-12T00:19:39Z
2022-02-10T00:00:32Z
null
['CVE-2021-45919']
Studio 42 elFinder allows stored XSS
Studio 42 elFinder through 2.1.31 allows XSS via an SVG document.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'studio-42/elfinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.31'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45919'}, {'type': 'WEB', 'url': 'https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/from-stored-xss-to-rce-using-beef-and-elfinder-cve-2021-45919/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T00:19:39Z', 'nvd_published_at': '2022-02-08T23:15:00Z'}
1.4.0
GHSA-q85f-69q7-55h2
2022-02-11T20:47:00Z
2022-02-09T23:26:50Z
null
['CVE-2022-23573']
Uninitialized variable access in Tensorflow
### Impact The [implementation of `AssignOp`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/assign_op.h#L30-L143) can result in copying unitialized data to a new tensor. This later results in undefined behavior. The implementation has a check that the le...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q85f-69q7-55h2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23573'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ef1d027be116f25e25bb94a60da491c2cf55bd0b'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-908'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T19:03:53Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-2x7h-96h5-rq84
2022-02-08T19:44:44Z
2022-02-01T16:22:57Z
null
['CVE-2021-32841']
Path Traversal in SharpZipLib
SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.3.0 and prior to version 1.3.3, a check was added if the destination file is under destination directory. However, it is not enforced that `destDir` ends with slash. If the `destDir` is not slash terminated like `/home/user/dir` it is po...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'SharpZipLib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32841'}, {'type': 'WEB', 'url': 'https://github.com/icsharpcode/SharpZipLib/commit/5c3b293de5d65b108e7f2cd0ea8f81c1b8273f78'}, {'type': 'PACKAGE', 'url': 'https://github.com/icsharpcode/SharpZipLib'}, {'type': 'WEB', 'url': 'https://github.com/icsh...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-01T16:21:00Z', 'nvd_published_at': '2022-01-26T22:15:00Z'}
1.4.0
GHSA-qh73-qc3p-rjv2
2022-02-23T22:11:16Z
2022-02-11T18:57:53Z
null
['CVE-2021-23597']
Uncaught Exception in fastify-multipart
### Impact This is a bypass of CVE-2020-8136 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-8136). By providing a `name=constructor` property it is still possible to crash the application. The original fix only checks for the key `__proto__` (https://github.com/fastify/fastify-multipart/pull/116). All users...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'fastify-multipart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-multipart/security/advisories/GHSA-qh73-qc3p-rjv2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23597'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-multipart/pull/116'}, {'type': 'WEB', 'url': 'https://github.com/fas...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-11T18:57:53Z', 'nvd_published_at': '2022-02-11T17:15:00Z'}
1.4.0
GHSA-24x4-6qmh-88qg
2022-02-11T20:36:58Z
2022-02-09T23:57:42Z
null
['CVE-2022-23584']
Use after free in `DecodePng` kernel
### Impact A malicious user can cause a use after free behavior when [decoding PNG images](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L339-L346): ```cc if (/* ... error conditions ... */) { png::CommonFreeDecode(&decode); O...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-24x4-6qmh-88qg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23584'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e746adbfcfee15e9cfdb391ff746c765b99bdf9b'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T19:37:12Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-95rw-fx8r-36v6
2023-09-05T13:54:21Z
2022-02-04T00:00:33Z
null
['CVE-2022-22818']
Cross-site Scripting in Django
The `{% debug %}` template tag in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2 does not properly encode the current context. This may lead to XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.27'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'ty...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22818'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/01422046065d2b51f8f613409cad2c81b39487e5'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/1a1e8278c46418bde24c86a65443b0674bae65e2'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T16:10:27Z', 'nvd_published_at': '2022-02-03T02:15:00Z'}
1.4.0
GHSA-65xw-pcqw-hjrh
2022-03-07T13:36:31Z
2022-02-26T00:00:45Z
null
['CVE-2021-45229']
Cross site scripting in apache airflow
It was discovered that the "Trigger DAG with config" screen was susceptible to XSS attacks via the `origin` query argument. This issue affects Apache Airflow versions 2.2.3 and below.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45229'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/phx76cgtmhwwdy780rvwhobx8qoy4bnk'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:31:29Z', 'nvd_published_at': '2022-02-25T09:15:00Z'}
1.4.0
GHSA-gv2h-gf8m-r68j
2022-02-15T00:19:57Z
2022-02-15T00:19:57Z
null
['CVE-2020-26294']
Exposure of server configuration in github.com/go-vela/server
### Impact _What kind of vulnerability is it? Who is impacted?_ * The ability to expose configuration set in the [Vela server](https://github.com/go-vela/server) via [pipeline template functionality](https://go-vela.github.io/docs/templates/overview/). * It impacts all users of Vela. Sample of template exposing serv...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/go-vela/compiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/go-vela/compiler/security/advisories/GHSA-gv2h-gf8m-r68j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26294'}, {'type': 'WEB', 'url': 'https://github.com/go-vela/compiler/commit/f1ace5f8a05c95c4d02264556e38a959ee2d9bda'}, {'type': 'WEB', 'url': 'h...
{'cwe_ids': ['CWE-200', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T17:58:10Z', 'nvd_published_at': None}
1.4.0
GHSA-x8xx-x82q-42q3
2023-08-08T20:08:33Z
2022-02-19T00:01:25Z
null
['CVE-2022-25336']
Exposure of Resource to Wrong Sphere in ezsystems/ezplatform-kernel
When image files are uploaded, they are made accessible under a name similar to the original file name. There are two issues with this. Both require access to uploading images in order to exploit them, this limits the impact. The first issue is that certain injection attacks can be possible, since not all possible atta...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezplatform-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25336'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-001-image-filenames-sanitization'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezplatform-kernel'}]
{'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-04T21:37:29Z', 'nvd_published_at': '2022-02-18T18:15:00Z'}
1.4.0
GHSA-p435-w4xm-jj8x
2022-02-11T16:12:07Z
2022-02-06T00:01:07Z
null
['CVE-2021-36151']
Hadoop token in temp file visible to all users in Apache Gobblin
In Apache Gobblin, the Hadoop token is written to a temp file that is visible to all local users on Unix-like systems. This affects versions <= 0.15.0. Users should update to version 0.16.0 which addresses this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.gobblin:gobblin-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36151'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/3cdkyxdd6xk05lsvr3l66dsnvhwyo1t0'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T23:07:14Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-gr23-g276-xc73
2022-02-16T22:54:59Z
2022-02-11T00:00:58Z
null
['CVE-2021-22954']
Cross Site Request Forgery in concrete5/concrete5
A cross-site request forgery vulnerability exists in Concrete CMS <v9 that could allow an attacker to make requests on behalf of other users.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22954'}, {'type': 'WEB', 'url': 'https://documentation.concretecms.org/developers/introduction/version-history/90-release-notes'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:54:59Z', 'nvd_published_at': '2022-02-09T23:15:00Z'}
1.4.0
GHSA-vm37-j55j-8655
2022-03-28T15:23:37Z
2022-02-12T00:00:49Z
null
['CVE-2022-0557']
OS Command Injection in Microweber
Microweber is a content management system with drag and drop. Prior to version 1.2.11, Microweber is vulnerable to OS Command Injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0557'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/0a7e5f1d81de884861ca677ee1aaac31f188d632'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T19:17:10Z', 'nvd_published_at': '2022-02-11T09:15:00Z'}
1.4.0
GHSA-9fp7-4fjm-q3mf
2022-01-31T19:46:10Z
2022-02-01T00:51:01Z
null
['CVE-2021-23760']
Prototype Pollution in keyget
The package keyget from 0.0.0 are vulnerable to Prototype Pollution via the methods set, push, and at which could allow an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix to [CVE-2020-28272](https://security.snyk.io/vuln/SNYK-JS-KE...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'keyget'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23760'}, {'type': 'PACKAGE', 'url': 'https://github.com/rumkin/keyget'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-KEYGET-1048048'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-KEYGET-2342624'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T19:46:10Z', 'nvd_published_at': '2022-01-28T22:15:00Z'}
1.4.0
GHSA-f9pg-g9xw-r5g2
2022-02-25T20:56:36Z
2022-02-17T00:00:25Z
null
['CVE-2022-22881']
SQL Injection in Jeecg-boot
Jeecg-boot v3.0 was discovered to contain a SQL injection vulnerability via the code parameter in /sys/user/queryUserComponentData.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22881'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/3348'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T20:56:36Z', 'nvd_published_at': '2022-02-16T22:15:00Z'}
1.4.0
GHSA-gj85-pvp5-mvf9
2022-02-14T22:30:43Z
2022-02-06T00:00:54Z
null
['CVE-2022-0501']
Cross-site Scripting in Beanstalk console
Beanstalk console prior to version 1.7.12 is vulnerable to cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'ptrofimov/beanstalk_console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0501'}, {'type': 'WEB', 'url': 'https://github.com/ptrofimov/beanstalk_console/commit/e351c8260ec1d3718d9e475ee57c7e12c47f19da'}, {'type': 'PACKAGE', 'url': 'https://github.com/ptrofimov/beanstalk_console'}, {'type': 'WEB', 'url': 'https://huntr.de...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-08T17:01:18Z', 'nvd_published_at': '2022-02-05T16:15:00Z'}
1.4.0
GHSA-4fh8-pm7g-pmxq
2021-04-22T21:44:53Z
2022-02-10T20:28:06Z
null
['CVE-2018-11764']
Authentication bypass in Apache Hadoop
Web endpoint authentication check is broken in Apache Hadoop 3.0.0-alpha4, 3.0.0-beta1, and 3.0.0. Authenticated users may impersonate any user even if no proxy user is configured.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-alpha4'}, {'fixed': '3.0.1'}]}], 'versions': ['3.0.0-alpha4']}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'e...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11764'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r790ad0a049cde713b93589ecfd4dd2766fda0fc6807eedb6cf69f5c1%40%3Cgeneral.hadoop.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201103-0003/'}]
{'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T21:44:53Z', 'nvd_published_at': '2020-10-21T19:15:00Z'}
1.4.0
GHSA-93p5-8fqw-wjx3
2021-05-12T21:17:36Z
2022-02-15T01:57:18Z
null
['CVE-2021-25834']
Authentication bypass by capture-replay in github.com/cosmos/ethermint
Cosmos Network Ethermint <= v0.4.0 is affected by a transaction replay vulnerability in the EVM module. If the victim sends a very large nonce transaction, the attacker can replay the transaction through the application.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cosmos/ethermint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cosmos/ethermint/rpc/namespaces/eth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25834'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/ethermint/issues/686'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/ethermint/commit/d7bdbd7488644f0aaeee5cdcdc119c863f199f72'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/ethe...
{'cwe_ids': ['CWE-287', 'CWE-294'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:17:36Z', 'nvd_published_at': None}
1.4.0
GHSA-8mfc-v7wv-p62g
2021-04-08T20:35:01Z
2022-02-09T22:43:37Z
null
['CVE-2020-8131']
Path Traversal in Yarn
Arbitrary filesystem write vulnerability in Yarn 1.21.1 and earlier allows attackers to write to any path on the filesystem and potentially lead to arbitrary code execution by forcing the user to install a malicious package.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'yarn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.21.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8131'}, {'type': 'WEB', 'url': 'https://github.com/yarnpkg/yarn/pull/7831'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/730239'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:35:01Z', 'nvd_published_at': '2020-02-24T15:15:00Z'}
1.4.0
GHSA-j229-2h63-rvh9
2021-04-01T22:16:07Z
2022-02-09T00:59:32Z
null
['CVE-2020-1718']
Improper Authentication for Keycloak
A flaw was found in the reset credential flow in all Keycloak versions before 8.0.0. This flaw allows an attacker to gain unauthorized access to the application.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1718'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1718'}]
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T22:16:07Z', 'nvd_published_at': '2020-05-12T21:15:00Z'}
1.4.0
GHSA-m6cj-93v6-cvr5
2022-08-11T17:02:55Z
2022-02-01T00:47:23Z
null
['CVE-2022-23596']
Junrar vulnerable to infinite loop via extracting carefully crafted RAR archive
### Impact A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users. ### Patches The problem is partially patched in 7.4.1 ### Workarounds None ### References h...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.github.junrar:junrar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.4.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/junrar/junrar/security/advisories/GHSA-m6cj-93v6-cvr5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23596'}, {'type': 'WEB', 'url': 'https://github.com/junrar/junrar/issues/73'}, {'type': 'WEB', 'url': 'https://github.com/junrar/junrar/commit/7b16b...
{'cwe_ids': ['CWE-400', 'CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T21:24:36Z', 'nvd_published_at': '2022-02-01T12:15:00Z'}
1.4.0
GHSA-2vxm-vp4c-fjfw
2022-02-09T01:01:22Z
2022-02-09T01:01:22Z
null
['CVE-2020-17516']
Authentication Bypass in Apache Cassandra
Apache Cassandra versions 2.1.0 to 2.1.22, 2.2.0 to 2.2.19, 3.0.0 to 3.0.23, and 3.11.0 to 3.11.9, when using 'dc' or 'rack' internode_encryption setting, allows both encrypted and unencrypted internode connections. A misconfigured node or a malicious user can use the unencrypted connection despite not being in the sam...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cassandra:cassandra-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '3.0.24'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cassandra:cassandra-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17516'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r81243a412a37a22211754936a13856af07cc68a93d728c52807486e9@%3Ccommits.cassandra.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rcb16f36cafa184dd159e...
{'cwe_ids': ['CWE-290'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T22:58:25Z', 'nvd_published_at': '2021-02-03T17:15:00Z'}
1.4.0
GHSA-5x29-3hr9-6wpw
2023-08-29T21:08:37Z
2022-02-11T23:18:09Z
null
['CVE-2020-8918']
TPM 1.2 key authorization values vulnerable to TPM transport eavesdropper in go-tpm
### Impact TPM 2.0 users are unaffected by this issue. An adversary eavesdropping on the TPM 1.2 transport path can calculate `usageAuth` for a key created with CreateWrapKey, even though this value is encrypted as part of the TPM 1.2 command protocol. The TPM 1.2 CreateWrapKey command accepts two secrets: `usageAuth...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/google/go-tpm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/google/go-tpm/security/advisories/GHSA-5x29-3hr9-6wpw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8918'}, {'type': 'WEB', 'url': 'https://github.com/google/go-tpm/pull/195'}, {'type': 'WEB', 'url': 'https://github.com/google/go-tpm/commit/d7806cc...
{'cwe_ids': ['CWE-665'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T18:32:13Z', 'nvd_published_at': None}
1.4.0
GHSA-j9cf-pr2x-5273
2022-02-24T18:17:34Z
2022-02-09T22:33:31Z
null
['CVE-2019-10793']
Prototype Pollution in dot-object
dot-object before 2.1.3 is vulnerable to Prototype Pollution. The set function could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'dot-object'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10793'}, {'type': 'WEB', 'url': 'https://github.com/rhalff/dot-object/commit/f76cff5fe6d01d30ce110d8f454db2e5bd28a7de'}, {'type': 'PACKAGE', 'url': 'https://github.com/rhalff/dot-object'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DOTOBJ...
{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T20:36:20Z', 'nvd_published_at': '2020-02-18T16:15:00Z'}
1.4.0
GHSA-mpq4-rjj8-fjph
2022-03-07T13:42:34Z
2022-02-26T00:00:44Z
null
['CVE-2022-25326']
Uncontrolled Resource Consumption in github.com/google/fscrypt
fscrypt through v0.3.2 creates a world-writable directory by default when setting up a filesystem, allowing unprivileged users to exhaust filesystem space. We recommend upgrading to fscrypt 0.3.3 or above and adjusting the permissions on existing fscrypt metadata directories where applicable.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/google/fscrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25326'}, {'type': 'WEB', 'url': 'https://github.com/google/fscrypt/pull/346'}, {'type': 'WEB', 'url': 'https://github.com/google/fscrypt/commit/91aa3ebf42032ca783c41f9ec25d885875f66ddb'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/fscryp...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:25:48Z', 'nvd_published_at': '2022-02-25T11:15:00Z'}
1.4.0
GHSA-gc58-v8h3-x2gr
2022-02-09T23:01:49Z
2022-02-09T23:01:49Z
null
['CVE-2020-8022']
Incorrect Default Permissions in Apache Tomcat
A Incorrect Default Permissions vulnerability in the packaging of tomcat on SUSE Enterprise Storage 5, SUSE Linux Enterprise Server 12-SP2-BCL, SUSE Linux Enterprise Server 12-SP2-LTSS, SUSE Linux Enterprise Server 12-SP3-BCL, SUSE Linux Enterprise Server 12-SP3-LTSS, SUSE Linux Enterprise Server 12-SP4, SUSE Linux Ent...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.53'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.0.3...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8022'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1172405'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r393d4f431683e99c839b4aed68f720b8583bca6c35cd84adccaa02be@%3Cjava-dev.axis.apache.org%3E'}, {'type': '...
{'cwe_ids': ['CWE-276'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T19:23:48Z', 'nvd_published_at': '2020-06-29T09:15:00Z'}
1.4.0
GHSA-m22m-h4rf-pwq3
2022-02-08T19:45:29Z
2022-02-01T16:22:50Z
null
['CVE-2021-32840']
Path Traversal in SharpZipLib
SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Prior to version 1.3.3, a TAR file entry `../evil.txt` may be extracted in the parent directory of `destFolder`. This leads to arbitrary file write that may lead to code execution. The vulnerability was patched in version 1.3.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'SharpZipLib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32840'}, {'type': 'WEB', 'url': 'https://github.com/icsharpcode/SharpZipLib/commit/a0e96de70b5264f4c919b09253b1522bc7a221cc'}, {'type': 'PACKAGE', 'url': 'https://github.com/icsharpcode/SharpZipLib'}, {'type': 'WEB', 'url': 'https://github.com/icsh...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-01T16:20:32Z', 'nvd_published_at': '2022-01-26T21:15:00Z'}
1.4.0
GHSA-h3hw-g4hm-7gr4
2021-04-06T19:46:49Z
2022-02-09T22:18:13Z
null
['CVE-2020-23262']
SQL injection without credentials in ming-soft MCMS
An issue was discovered in ming-soft MCMS v5.0, where a malicious user can exploit SQL injection without logging in through /mcms/view.do.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23262'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/45'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T19:46:49Z', 'nvd_published_at': '2021-01-26T18:15:00Z'}
1.4.0
GHSA-38m9-3vg4-rwvp
2022-02-23T19:43:59Z
2022-02-20T00:00:32Z
null
['CVE-2022-0678']
Cross-site Scripting in microweber
microweber prior to version 1.2.11 is vulnerable to cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0678'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/2b8fa5aac31e51e2aca83c7ef5d1281ba2e755f8'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T19:43:59Z', 'nvd_published_at': '2022-02-19T11:15:00Z'}
1.4.0
GHSA-vj3j-8m6x-mjq6
2022-12-01T22:29:35Z
2022-02-16T00:01:20Z
null
['CVE-2022-25199']
Missing permission check in Jenkins SCP publisher Plugin
SCP publisher Plugin 1.8 and earlier does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified username and password. Additionally, this form validation method does not requir...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:scp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25199'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/scp-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2323'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:29:35Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-35fg-hjcr-j65f
2022-02-09T21:51:19Z
2022-02-09T21:51:19Z
null
['CVE-2022-23619']
Information exposure in xwiki-platform
### Impact It's possible to guess if a user has an account on the wiki by using the "Forgot your password" form, even if the wiki is closed to guest users. ### Patches The problem has been patched on XWiki 12.10.9, 13.4.1 and 13.6RC1. ### Workarounds There's no easy workaround other than applying the upgrade. ### Re...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.5RC1'}, {'fixed': '13.6RC1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 13.5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwi...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-35fg-hjcr-j65f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23619'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/d8a3cce48e0ac1a0f4a3cea7a19747382d9c9494'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-200', 'CWE-640'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T21:51:19Z', 'nvd_published_at': '2022-02-09T21:15:00Z'}
1.4.0
GHSA-6cw3-g6wv-c2xv
2022-02-08T17:34:50Z
2022-02-04T00:00:26Z
null
['CVE-2022-23833']
Infinite Loop in Django
An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.27'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'ty...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23833'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/c477b761804984c932704554ad35f78a2e230c6a'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/d16133568ef9c9b42cb7a08bdf9ff3feec2e5468'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T16:30:27Z', 'nvd_published_at': '2022-02-03T02:15:00Z'}
1.4.0
GHSA-qgrq-cx4c-2rmm
2022-06-24T01:24:56Z
2022-02-15T01:39:27Z
null
['CVE-2020-1748']
Incorrect Authorization in WildFly Elytron
A flaw was found in all supported versions before wildfly-elytron-1.6.8.Final-redhat-00001, where the WildFlySecurityManager checks were bypassed when using custom security managers, resulting in an improper authorization. This flaw leads to information exposure by unauthenticated access to secure resources.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.security:wildfly-elytron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.6.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1748'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1807707'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201001-0005/'}]
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T01:24:56Z', 'nvd_published_at': '2020-09-16T16:15:00Z'}
1.4.0
GHSA-9p8q-j6q5-mjw8
2022-02-25T15:29:16Z
2022-02-15T00:02:45Z
null
['CVE-2022-24988']
Buffer Overflow in galois_2p8
In galois_2p8 before 0.1.2, PrimitivePolynomialField::new has an off-by-one buffer overflow for a vector.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'galois_2p8'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24988'}, {'type': 'PACKAGE', 'url': 'https://github.com/djsweet/galois_2p8'}, {'type': 'WEB', 'url': 'https://github.com/djsweet/galois_2p8/blob/master/CHANGELOG.md'}]
{'cwe_ids': ['CWE-120', 'CWE-193'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T15:29:16Z', 'nvd_published_at': '2022-02-14T20:15:00Z'}
1.4.0
GHSA-98p5-x8x4-c9m5
2022-02-11T15:08:14Z
2022-02-09T23:52:51Z
null
['CVE-2022-23559']
Integer overflow in TFLite
### Impact An attacker can craft a TFLite model that would cause an integer overflow [in embedding lookup operations](https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/embedding_lookup_sparse.cc#L179-L189): ```cc int embedding_size = 1; int lookup_size ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-98p5-x8x4-c9m5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23559'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1de49725a5fc4e48f1a3b902ec3599ee99283043'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:34:01Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-wq3v-3grq-6f86
2021-04-13T18:25:38Z
2022-02-09T23:07:55Z
null
['CVE-2020-25802']
Improper Control of Dynamically-Managed Code Resources in Crafter CMS Crafter Studio
Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via Groovy scripting. This issue affects: Crafter Software Crafter CMS 3.0 versions prior to 3.0.27; 3.1 versions prior to 3.1.7.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.27'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1'}, {'fixe...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25802'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2020080101'}]
{'cwe_ids': ['CWE-913'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T18:25:38Z', 'nvd_published_at': '2020-10-06T14:15:00Z'}
1.4.0
GHSA-q42q-523g-3fwv
2021-04-13T16:52:23Z
2022-02-09T23:06:40Z
null
['CVE-2020-7780']
Cross-Site Request Forgery
This affects the package com.softwaremill.akka-http-session:core_2.13 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.12 before 0.5.11; the package com.softwaremill.akka-http-session:core_2.11 before 0.5.11. For older versions, endpoints protected by randomTokenCsrfProtection could be bypassed with...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.softwaremill.akka-http-session:core_2.13'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.softwaremill.akka-http-session:core_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7780'}, {'type': 'WEB', 'url': 'https://github.com/softwaremill/akka-http-session/issues/74'}, {'type': 'WEB', 'url': 'https://github.com/softwaremill/akka-http-session/issues/77'}, {'type': 'WEB', 'url': 'https://github.com/softwaremill/akka-http-...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T16:52:23Z', 'nvd_published_at': '2020-11-27T17:15:00Z'}
1.4.0
GHSA-v98j-7crc-wvrj
2022-02-09T22:03:57Z
2022-02-09T22:03:57Z
null
['CVE-2020-17523']
Authentication bypass in Apache Shiro
Apache Shiro before 1.7.1, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.shiro:shiro-spring'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17523'}, {'type': 'WEB', 'url': 'https://github.com/apache/shiro/pull/263'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/SHIRO-797'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b93ddf97e2c4cda779d22fab30539bdec...
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T21:20:26Z', 'nvd_published_at': '2021-02-03T17:15:00Z'}
1.4.0
GHSA-4jwp-vfvf-657p
2023-06-20T14:22:16Z
2022-02-10T23:30:20Z
null
['CVE-2019-2391']
Deserialization of Untrusted Data in bson
Incorrect parsing of certain JSON input may result in js-bson not correctly serializing BSON. This may cause unexpected application behaviour including data disclosure.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'bson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-2391'}, {'type': 'PACKAGE', 'url': 'https://github.com/mongodb/js-bson'}, {'type': 'WEB', 'url': 'https://github.com/mongodb/js-bson/releases/tag/v1.1.4'}]
{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T17:19:18Z', 'nvd_published_at': '2020-03-31T14:15:00Z'}
1.4.0
GHSA-4p92-fv6v-fhfj
2022-03-09T20:43:44Z
2022-02-27T00:00:15Z
null
['CVE-2022-0723']
Cross-site Scripting in microweber
Microweber prior to 1.2.11 is vulnerable to reflected cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0723'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/15e519a86e4b24526abaf9e6dc81cb1af86843a5'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:56:50Z', 'nvd_published_at': '2022-02-26T11:15:00Z'}
1.4.0
GHSA-hf6f-jq25-8gq9
2023-09-15T18:13:45Z
2022-02-15T01:57:18Z
null
['CVE-2018-18926']
Gitea Remote Code Execution (RCE)
Gitea before 1.5.4 allows remote code execution because it does not properly validate session IDs. This is related to session ID handling in the go-macaron/session code for Macaron.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18926'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/issues/5140'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/5177'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/commit/aeb5655c25053bdcd7eee94ea37df8...
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T18:25:03Z', 'nvd_published_at': None}
1.4.0
GHSA-vp4x-94ff-2cmv
2021-05-19T20:44:31Z
2022-02-10T22:29:03Z
null
['CVE-2020-23263']
Cross-site scripting in forkcms
Persistent Cross-site scripting vulnerability on Fork CMS version 5.8.2 allows remote attackers to inject arbitrary Javascript code via the "navigation_title" parameter and the "title" parameter in /private/en/pages/add.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23263'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/pull/3093'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T20:44:31Z', 'nvd_published_at': '2021-05-06T22:15:00Z'}
1.4.0
GHSA-gfh2-7jg5-653p
2021-05-20T16:29:42Z
2022-02-15T01:57:18Z
null
['CVE-2016-8579']
Denial of Service in docker2aci
docker2aci <= 0.12.3 has an infinite loop when handling local images with cyclic dependency chain.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/appc/docker2aci'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-8579'}, {'type': 'WEB', 'url': 'https://github.com/appc/docker2aci/issues/203'}, {'type': 'WEB', 'url': 'https://github.com/appc/docker2aci/pull/204/commits/54331ec7020e102935c31096f336d31f6400064f'}, {'type': 'WEB', 'url': 'https://github.com/appc...
{'cwe_ids': ['CWE-835'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:29:42Z', 'nvd_published_at': None}
1.4.0
GHSA-wcv5-vrvr-3rx2
2022-02-03T23:13:13Z
2022-02-09T23:34:06Z
null
[]
Integer Overflow or Wraparound in TensorFlow
### Impact The Grappler component of TensorFlow is vulnerable to a denial of service via `CHECK`-failure (assertion failure) in [constant folding](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L963-L1035): ```cc for (con...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-prcg-wp5q-rv7p'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wcv5-vrvr-3rx2'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/be7b286d40bc68cb0b56f702186cc48...
{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T23:13:13Z', 'nvd_published_at': None}
1.4.0
GHSA-7ph6-5cmq-xgjq
2022-05-19T22:09:24Z
2022-02-09T21:53:29Z
null
['CVE-2022-23620']
Path traversal in xwiki-platform-skin-skinx
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. AbstractSxExportURLFactoryActionHandler#processSx does not escape anything from SSX document reference when serializing it on filesystem, so it's easy to mess up the HTML export process with reference elements conta...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-skin-skinx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.2-rc-1'}, {'fixed': '13.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-7ph6-5cmq-xgjq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23620'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/ab778254fb8f71c774e1c1239368c44fe3b6bba5'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-116', 'CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T21:53:29Z', 'nvd_published_at': '2022-02-09T22:15:00Z'}
1.4.0
GHSA-rgjg-66cx-5x9m
2021-05-20T21:09:16Z
2022-02-15T01:57:18Z
null
['CVE-2018-15727']
Authentication Bypass
Grafana before 4.6.4 and 5.x before 5.2.3 allows authentication bypass because an attacker can generate a valid "remember me" cookie knowing only a username of an LDAP or OAuth user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana/pkg/api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.6.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana/pkg/api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'f...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15727'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/commit/7baecf0d0deae0d865e45cf03e082bc0db3f28c3'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/commit/df83bf10a225811927644bdf6265fa80bdea9137'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:09:16Z', 'nvd_published_at': None}