schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-fq6p-6334-8gr4 | 2022-02-11T20:36:39Z | 2022-02-09T23:26:08Z | null | ['CVE-2022-23585'] | Memory leak in decoding PNG images | ### Impact
When [decoding PNG images](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L322-L416) TensorFlow can produce a memory leak if the image is invalid.
After calling `png::CommonInitDecode(..., &decode)`, the `decode` value c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fq6p-6334-8gr4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23585'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-401'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T19:09:09Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-mxh3-2699-98g9 | 2022-02-14T22:35:03Z | 2022-02-09T00:00:28Z | null | ['CVE-2022-0510'] | Cross-site Scripting pimcore | pimcore version 10.3.0 and prior is vulnerable to cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.3.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0510'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/b5a9ad65e5a4dde1916f02019f8686ad835681ce'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bb3525d5-ded... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T20:38:21Z', 'nvd_published_at': '2022-02-08T15:15:00Z'} |
1.4.0 | GHSA-rw98-5846-pqhx | 2022-02-24T13:56:27Z | 2022-02-16T00:01:45Z | null | ['CVE-2022-0597'] | Open redirect in microweber | Open Redirect in Packagist microweber/microweber prior to 1.2.11. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0597'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/acfc6a581d1ea86096d1b0ecd8a0eec927c0e9b2'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:49:26Z', 'nvd_published_at': '2022-02-15T14:15:00Z'} |
1.4.0 | GHSA-jrg3-qq99-35g7 | 2022-04-26T17:59:29Z | 2022-02-10T23:03:26Z | null | ['CVE-2018-21234'] | Deserialization of Untrusted Data in Jodd | Jodd before 5.0.4 performs Deserialization of Untrusted JSON Data when setClassMetadataName is set. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jodd:jodd-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-21234'}, {'type': 'WEB', 'url': 'https://github.com/oblac/jodd/issues/628'}, {'type': 'WEB', 'url': 'https://github.com/oblac/jodd/commit/9bffc3913aeb8472c11bb543243004b4b4376f16'}, {'type': 'PACKAGE', 'url': 'https://github.com/oblac/jodd'}, {'typ... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-14T21:24:02Z', 'nvd_published_at': '2020-05-21T23:15:00Z'} |
1.4.0 | GHSA-p5pg-wm9q-8v6r | 2022-03-07T19:34:44Z | 2022-02-25T00:01:05Z | null | ['CVE-2022-24613'] | Improper Handling of Exceptional Conditions inn metadata-extractor | metadata-extractor up to 2.16.0 can throw various uncaught exceptions while parsing a specially crafted JPEG file, which could result in an application crash. This could be used to mount a denial of service attack against services that use metadata-extractor library. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.drewnoakes:metadata-extractor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.18.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24613'}, {'type': 'WEB', 'url': 'https://github.com/drewnoakes/metadata-extractor/issues/561'}, {'type': 'PACKAGE', 'url': 'https://github.com/drewnoakes/metadata-extractor'}] | {'cwe_ids': ['CWE-755'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T19:34:44Z', 'nvd_published_at': '2022-02-24T15:15:00Z'} |
1.4.0 | GHSA-2467-h365-j7hm | 2021-04-14T18:01:06Z | 2022-02-10T00:31:31Z | null | ['CVE-2020-13941'] | Improper Input Validation in Apache Solr | Reported in SOLR-14515 (private) and fixed in SOLR-14561 (public), released in Solr version 8.6.0. The Replication handler (https://lucene.apache.org/solr/guide/8_6/index-replication.html#http-api-commands-for-the-replicationhandler) allows commands backup, restore and deleteBackup. Each of these take a location parame... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13941'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbcd9dff009ed19ffcc2b0978... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T18:01:06Z', 'nvd_published_at': '2020-08-17T13:15:00Z'} |
1.4.0 | GHSA-9cwv-cppx-mqjm | 2022-02-25T15:39:14Z | 2022-02-23T21:17:25Z | null | ['CVE-2022-23652'] | Improper Authentication in Capsule Proxy | ### Impact
Using a malicious `Connection` header, an attacker with a proper authentication mechanism could start a privilege escalation towards the Kubernetes API Server, being able to exploit the `cluster-admin` Role bound to `capsule-proxy`.
### Patches
Patch has been merged in the v0.2.1 release.
### Workarounds... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/clastix/capsule-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/clastix/capsule-proxy/security/advisories/GHSA-9cwv-cppx-mqjm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23652'}, {'type': 'WEB', 'url': 'https://github.com/clastix/capsule-proxy/issues/188'}, {'type': 'WEB', 'url': 'https://github.com/clastix/c... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T21:17:25Z', 'nvd_published_at': '2022-02-22T20:15:00Z'} |
1.4.0 | GHSA-fgv8-vj5c-2ppq | 2023-02-24T17:01:49Z | 2022-02-22T15:38:08Z | null | ['CVE-2019-16884'] | Incorrect Authorization in runc | runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/runc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc8.0.20190930145003-cad42f6e0932'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/selinux'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16884'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/issues/2128'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/pull/2129'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/pull/2130'}, {'type': ... | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T15:38:08Z', 'nvd_published_at': '2019-09-25T18:15:00Z'} |
1.4.0 | GHSA-f268-65qc-98vg | 2022-02-09T23:03:53Z | 2022-02-09T23:03:53Z | null | ['CVE-2020-13943'] | Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat | If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - in... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-coyote'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.0-M8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.0-M7'}}, {'package':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13943'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/1bbc650cbc3f08d85a1ec6d803c47ae53a84f3bb'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/55911430df13f8c9998fbdee1f9716994d2db59b'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T18:12:07Z', 'nvd_published_at': '2020-10-12T14:15:00Z'} |
1.4.0 | GHSA-j346-h5wc-rw2m | 2022-02-09T23:19:26Z | 2022-02-09T23:19:26Z | null | ['CVE-2018-11802'] | Incorrect Authorization in Apache Solr | In Apache Solr, the cluster can be partitioned into multiple collections and only a subset of nodes actually host any given collection. However, if a node receives a request for a collection it does not host, it proxies the request to a relevant node and serves the request. Solr bypasses all authorization settings for ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.7.0'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11802'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2019/04/24/1'}] | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T18:11:26Z', 'nvd_published_at': '2020-04-01T22:15:00Z'} |
1.4.0 | GHSA-765h-qjxv-5f44 | 2021-05-19T21:17:59Z | 2022-02-10T23:51:42Z | null | ['CVE-2021-23383'] | Prototype Pollution in handlebars | The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ecosystem_specific': {'affected_functions': ['handlebars.compile']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23383'}, {'type': 'WEB', 'url': 'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210618-0007/'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T21:17:59Z', 'nvd_published_at': '2021-05-04T09:15:00Z'} |
1.4.0 | GHSA-xgrx-xpv2-6vp4 | 2021-04-05T23:04:50Z | 2022-02-09T22:15:00Z | null | ['CVE-2020-13920'] | Improper Authentication in Apache ActiveMQ | Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.15.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13920'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3... | {'cwe_ids': ['CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T23:04:50Z', 'nvd_published_at': '2020-09-10T19:15:00Z'} |
1.4.0 | GHSA-xp4x-j9vh-c3wf | 2021-04-19T16:43:07Z | 2022-02-10T20:20:31Z | null | ['CVE-2019-15609'] | OS Command Injection and Command Injection in kill-port-process | The kill-port-process package version < 2.2.0 is vulnerable to a Command Injection vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'kill-port-process'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15609'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/661959'}] | {'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T16:43:07Z', 'nvd_published_at': '2020-02-28T20:15:00Z'} |
1.4.0 | GHSA-ph62-8768-r87v | 2022-03-03T22:04:31Z | 2022-02-25T00:01:04Z | null | ['CVE-2022-25098'] | Arbitrary file delete in ectouch/ectouch | ECTouch v2 suffers from arbitrary file deletion due to insufficient filtering of the filename parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'ectouch/ectouch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25098'}, {'type': 'WEB', 'url': 'https://github.com/dota-st/Vulnerability/blob/master/ECTouchV2.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/ectouch/ectouch'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T22:04:31Z', 'nvd_published_at': '2022-02-24T15:15:00Z'} |
1.4.0 | GHSA-j3mj-fhpq-qqjj | 2022-02-11T20:48:16Z | 2022-02-09T23:28:57Z | null | ['CVE-2022-23571'] | Reachable Assertion in Tensorflow | ### Impact
When decoding a tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments, if the tensors have an invalid `dtype` and 0 elements or an invalid shape. This allows attackers to cause denial of services in TensorFlow processes.
##... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j3mj-fhpq-qqjj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23571'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/5b491cd5e41ad63735161cec9c2a568172c8b6a3'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T18:55:27Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-p5gm-fgfx-hr7h | 2021-05-04T21:47:51Z | 2022-02-10T20:55:10Z | null | ['CVE-2020-24164'] | Gadget chain attack in Nippy | A deserialization flaw is present in Taoensso Nippy before 2.14.2. In some circumstances, it is possible for an attacker to create a malicious payload that, when deserialized, will allow arbitrary code to be executed. This occurs because there is automatic use of the Java Serializable interface. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.taoensso:nippy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24164'}, {'type': 'WEB', 'url': 'https://github.com/ptaoussanis/nippy/issues/130'}, {'type': 'WEB', 'url': 'https://github.com/ptaoussanis/nippy/commit/61fb009fdde2994140f2da2e495ba8af3a873eb2'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T21:47:51Z', 'nvd_published_at': '2020-09-11T06:15:00Z'} |
1.4.0 | GHSA-x4qx-4fjv-hmw6 | 2022-02-11T16:22:50Z | 2022-02-09T23:45:09Z | null | ['CVE-2022-21738'] | Integer overflow leading to crash in Tensorflow | ### Impact
The [implementation of `SparseCountSparseOutput`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273) can be made to crash a TensorFlow process by an integer overflow whose result is then used in a memory allocation:
```pyth... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x4qx-4fjv-hmw6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21738'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:03:36Z', 'nvd_published_at': '2022-02-03T14:15:00Z'} |
1.4.0 | GHSA-227w-wv4j-67h4 | 2022-02-09T22:30:30Z | 2022-02-09T22:30:30Z | null | [] | Class Loading Vulnerability in Artemis | ### Impact
This affects all Artemis users who test Java assignments. **Ares is not required.**
Students code that gets automatically tested can run arbitrary code in the container,
or arbitrary code on the machine of an assessor in case of manual correction.
### Patches
The problem cannot be resolved easily in Ares it... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'de.tum.in.ase:artemis-java-test-sandbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ls1intum/Ares/security/advisories/GHSA-227w-wv4j-67h4'}, {'type': 'WEB', 'url': 'https://github.com/ls1intum/Ares/issues/15'}, {'type': 'PACKAGE', 'url': 'https://github.com/ls1intum/Ares'}, {'type': 'WEB', 'url': 'https://github.com/ls1intum/Ares/releases/tag/1.8.0'}] | {'cwe_ids': ['CWE-501', 'CWE-653'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T22:30:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gj26-g5qf-jrh7 | 2022-02-24T13:06:10Z | 2022-02-16T00:01:51Z | null | ['CVE-2022-0589'] | Cross-site Scripting in librenms | Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.1.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0589'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/4c9d4eefd8064a0285f9718ef38f5617d7f9d6fa'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d943d95c-... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:52:19Z', 'nvd_published_at': '2022-02-15T09:15:00Z'} |
1.4.0 | GHSA-h236-g5gh-vq6c | 2022-10-31T15:55:40Z | 2022-02-10T23:32:51Z | null | ['CVE-2019-19935'] | DOM-based cross-site scripting in Froala Editor | Froala WYSIWYG HTML Editor is a lightweight WYSIWYG HTML Editor written in JavaScript that enables rich text editing capabilities for web applications. A DOM-based cross-site scripting (XSS) vulnerability exists in versions before 3.2.3 because HTML code in the editor is not correctly sanitized when inserted into the D... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'froala-editor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19935'}, {'type': 'WEB', 'url': 'https://blog.compass-security.com/2020/07/yet-another-froala-0-day-xss/'}, {'type': 'WEB', 'url': 'https://compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2020-004_DOM_XSS_in_Froala_WYSIWYG_HTML_Edito... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T17:34:13Z', 'nvd_published_at': '2020-07-07T16:15:00Z'} |
1.4.0 | GHSA-m358-g4rp-533r | 2022-02-07T21:15:30Z | 2022-02-01T00:49:39Z | null | ['CVE-2022-24124'] | SQL Injection in Casdoor | The query API in Casdoor before 1.13.1 has a SQL injection vulnerability related to the field and value parameters, as demonstrated by api/get-organizations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/casdoor/casdoor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24124'}, {'type': 'WEB', 'url': 'https://github.com/casdoor/casdoor/issues/439'}, {'type': 'WEB', 'url': 'https://github.com/casdoor/casdoor/pull/442'}, {'type': 'WEB', 'url': 'https://github.com/casdoor/casdoor/commit/5ec0c7a89005819960d8fe07f5ddd... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T22:12:48Z', 'nvd_published_at': '2022-01-29T23:15:00Z'} |
1.4.0 | GHSA-8j36-q8x7-pm6q | 2021-04-13T18:32:29Z | 2022-02-09T23:14:11Z | null | ['CVE-2020-7778'] | OS Command Injection in systeminformation | This affects the package systeminformation before 4.30.2. The attacker can overwrite the properties and functions of an object, which can lead to executing OS commands. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'systeminformation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.30.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7778'}, {'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/commit/11103a447ab9550c25f1fbec7e6d903720b3fea8%23diff-970ae648187190f86bafc8f193b7538200eba164fad0674428b6487582c089cc'}, {'type': 'WEB', 'url': 'https://github.co... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T18:32:29Z', 'nvd_published_at': '2020-11-26T11:15:00Z'} |
1.4.0 | GHSA-c566-2grg-mjwg | 2021-04-09T21:34:37Z | 2022-02-09T22:50:50Z | null | ['CVE-2020-17531'] | Serialization vulnerability in Apache Tapestry | A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to deserialize the "sp" parameter even before invoking the page's validate method, leading to deserialization without authentication. Apache Tapestry 4 reached end of life in 2008 and no update to address this issue will b... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '5.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17531'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r700a6aa234dbff0555d4187bdc8274d7e4c0afbf35b9a3457f09ee76%40%3Cusers.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r700a6aa234dbff0555d41... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T21:34:37Z', 'nvd_published_at': '2020-12-08T13:15:00Z'} |
1.4.0 | GHSA-44gg-pmqr-4669 | 2021-05-20T16:28:01Z | 2022-02-15T01:57:18Z | null | ['CVE-2014-6408'] | Access Restriction Bypass in Docker | Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image. | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-6408'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker/commit/c9379eb3fbbc484c056f5a5e49d8d0b755a29c45'}, {'type': 'WEB', 'url': 'https://docs.docker.com/v1.3/release-notes/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/piper... | {'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:28:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j667-c2hm-f2wp | 2021-08-31T20:55:03Z | 2022-02-09T21:59:39Z | null | ['CVE-2020-14332'] | Insertion of Sensitive Information into Log File and Improper Output Neutralization for Logs in ansible | A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.14'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14332'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/71033'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14332'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-117', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T23:18:09Z', 'nvd_published_at': '2020-09-11T18:15:00Z'} |
1.4.0 | GHSA-332q-7ff2-57h2 | 2022-02-24T18:21:34Z | 2022-02-09T22:34:01Z | null | ['CVE-2019-10795'] | Prototype Pollution in undefsafe | undefsafe before 2.0.3 is vulnerable to Prototype Pollution. The 'a' function could be tricked into adding or modifying properties of Object.prototype using a `__proto__` payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'undefsafe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10795'}, {'type': 'WEB', 'url': 'https://github.com/remy/undefsafe/commit/f272681b3a50e2c4cbb6a8533795e1453382c822'}, {'type': 'PACKAGE', 'url': 'https://github.com/remy/undefsafe'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-UNDEFSAFE-54... | {'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T21:18:46Z', 'nvd_published_at': '2020-02-18T16:15:00Z'} |
1.4.0 | GHSA-m7jv-hq7h-mq7c | 2022-02-08T22:05:17Z | 2022-02-08T22:05:17Z | null | ['CVE-2020-13935'] | Infinite Loop in Apache Tomcat | The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.0-M6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.0-M5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13935'}, {'type': 'WEB', 'url': 'https://kc.mcafee.com/corporate/index?page=content&id=SB10332'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50@%3Cusers.tomcat.apache.org%3E'}... | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T18:44:47Z', 'nvd_published_at': '2020-07-14T15:15:00Z'} |
1.4.0 | GHSA-wfjw-w6pv-8p7f | 2022-02-08T17:36:38Z | 2022-02-01T00:47:53Z | null | ['CVE-2022-21659'] | Observable Response Discrepancy in Flask-AppBuilder | ### Impact
User enumeration in database authentication in Flask-AppBuilder < 3.4.4. Allows for a non authenticated user to enumerate existing accounts by timing the response time from the server when you are logging in.
### Patches
Upgrade to 3.4.4
### Workarounds
### References
### For more information
If you hav... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Flask-AppBuilder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-wfjw-w6pv-8p7f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21659'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/pull/1775'}, {'type': 'PACKAGE', 'url': 'https://github.co... | {'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T20:19:12Z', 'nvd_published_at': '2022-01-31T21:15:00Z'} |
1.4.0 | GHSA-v3f7-j968-4h5f | 2022-02-11T17:05:08Z | 2022-02-10T00:15:07Z | null | ['CVE-2022-21725'] | Division by zero in Tensorflow | ### Impact
The [estimator for the cost of some convolution operations](https://github.com/tensorflow/tensorflow/blob/ffa202a17ab7a4a10182b746d230ea66f021fe16/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L189-L198) can be made to execute a division by 0:
```python
import tensorflow as tf
@tf.function
def... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v3f7-j968-4h5f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21725'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3218043d6d3a019756607643cf65574fbfef5d7a'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T18:05:56Z', 'nvd_published_at': '2022-02-03T13:15:00Z'} |
1.4.0 | GHSA-cx3w-xqmc-84g5 | 2022-04-20T16:24:41Z | 2022-02-15T00:30:37Z | null | ['CVE-2021-21237'] | Git LFS can execute a Git binary from the current directory on Windows | ### Impact
On Windows, if Git LFS operates on a malicious repository with a git.bat or git.exe file in the current directory, that program would be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems.
This is the result of an incomplete fix for CVE-2020-27955.
This issue occ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/git-lfs/git-lfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/git-lfs/git-lfs/security/advisories/GHSA-cx3w-xqmc-84g5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21237'}, {'type': 'WEB', 'url': 'https://github.com/git-lfs/git-lfs/commit/fc664697ed2c2081ee9633010de0a7f9debea72a'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-426', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T17:37:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x92v-xv3x-9v29 | 2022-12-01T22:14:51Z | 2022-02-16T00:01:15Z | null | ['CVE-2022-25207'] | CSRF vulnerability in Jenkins Chef Sinatra Plugin allow XXE | Chef Sinatra Plugin 1.20 and earlier does not perform a permission check in a method implementing form validation.
This allows attackers with Overall/Read permission to have Jenkins send an HTTP request to an attacker-controlled URL and have it parse the response as XML.
As the plugin does not configure its XML parse... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sinatra-chef-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25207'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/sinatra-chef-builder-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1377'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:14:51Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-77gp-3h4r-6428 | 2022-02-11T20:46:42Z | 2022-02-09T23:25:40Z | null | ['CVE-2022-23574'] | Out of bounds read and write in Tensorflow | ### Impact
There is a typo in TensorFlow's [`SpecializeType`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/full_type_util.cc#L81-L102) which results in heap OOB read/write:
```cc
for (int i = 0; i < op_def.output_arg_size(); i++) {
// ...
for (int... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-77gp-3h4r-6428'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23574'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/0657c83d08845cc434175934c642299de2c0f042'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T19:12:26Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-3hq6-rmv7-39vh | 2022-02-10T23:45:28Z | 2022-02-10T23:45:28Z | null | ['CVE-2020-7625'] | Injection in op-browser | op-browser through 1.0.9 is vulnerable to Command Injection. It allows execution of arbitrary commands via the url function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'op-browser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7625'}, {'type': 'WEB', 'url': 'https://github.com/hiproxy/open-browser/pull/3'}, {'type': 'WEB', 'url': 'https://github.com/hiproxy/open-browser/pull/4'}, {'type': 'WEB', 'url': 'https://github.com/hiproxy/open-browser/blob/master/lib/index.js#L75... | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:58:34Z', 'nvd_published_at': '2020-04-02T22:15:00Z'} |
1.4.0 | GHSA-3p9j-442x-hjp7 | 2022-02-23T19:27:39Z | 2022-02-20T00:00:31Z | null | ['CVE-2022-0689'] | Business Logic Errors in microweber | microweber prior to 1.2.11 allows multiple uses of a single-use coupon. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0689'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/c3c25ae6c421bb4a65df9e0035edcc2f75594a04'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T19:27:39Z', 'nvd_published_at': '2022-02-19T16:15:00Z'} |
1.4.0 | GHSA-xjqr-g762-pxwp | 2022-08-11T16:50:15Z | 2022-02-15T01:57:18Z | null | ['CVE-2021-20206'] | containernetworking/cni improper limitation of path name | An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/containernetworking/cni'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containernetworking/cni/pkg/invoke'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20206'}, {'type': 'WEB', 'url': 'https://github.com/containernetworking/cni/pull/808'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1919391'}, {'type': 'PACKAGE', 'url': 'https://github.com/containernetworking/cni'}, {'type'... | {'cwe_ids': ['CWE-20', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:07:06Z', 'nvd_published_at': '2021-03-26T22:15:00Z'} |
1.4.0 | GHSA-mgjw-2wrp-r535 | 2022-02-09T21:32:10Z | 2022-02-09T21:32:10Z | null | ['CVE-2022-23616'] | Remote code execution in xwiki-platform | ### Impact
It's possible for an unprivileged user to perform a remote code execution by injecting a groovy script in her own profile and by calling the Reset password feature since the feature is performing a save of the user profile with programming rights in the impacted versions of XWiki.
### Patches
The problem ha... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-administration-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1-milestone-1'}, {'fixed': '13.1RC1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 13.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mgjw-2wrp-r535'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23616'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/407caeba05c181bd4835e1dd12e431fa15ff728b#diff-c51a3675b6e312a... | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T21:32:10Z', 'nvd_published_at': '2022-02-09T21:15:00Z'} |
1.4.0 | GHSA-vp9j-rghq-8jhh | 2021-04-05T13:49:09Z | 2022-02-09T21:59:42Z | null | ['CVE-2020-10744'] | Exposure of Resource to Wrong Sphere and Insecure Temporary File in Ansible | An incomplete fix was found for the fix of the flaw CVE-2020-1733 ansible insecure temporary directory when running become_user from become directive. The provided fix is insufficient to prevent the race condition on systems using ACLs and FUSE filesystems. Ansible Engine 2.7.18, 2.8.12, and 2.9.9 as well as previous v... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.9.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10744'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10744'}] | {'cwe_ids': ['CWE-362', 'CWE-377', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T13:49:09Z', 'nvd_published_at': '2020-05-15T14:15:00Z'} |
1.4.0 | GHSA-88g8-f5mf-f5rj | 2022-02-11T16:20:03Z | 2022-02-05T00:00:31Z | null | ['CVE-2021-46320'] | Improper Initialization in OpenZeppelin | In OpenZeppelin <=v4.4.0, initializer functions that are invoked separate from contract creation (the most prominent example being minimal proxies) may be reentered if they make an untrusted non-view external call. Once an initializer has finished running it can never be re-executed. However, an exception put in place ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9c22-pwxw-p6hx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46320'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3006'}, {'type': 'PACKAGE', 'url'... | {'cwe_ids': ['CWE-665'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-11T16:20:03Z', 'nvd_published_at': '2022-02-04T12:15:00Z'} |
1.4.0 | GHSA-mmjr-5q74-p3m4 | 2022-02-25T15:35:08Z | 2022-02-12T00:00:47Z | null | ['CVE-2020-13670'] | Exposure of Resource to Wrong Sphere in Drupal Core | Information Disclosure vulnerability in file module of Drupal Core allows an attacker to gain access to the file metadata of a permanent private file that they do not have access to by guessing the ID of the file. This issue affects: Drupal Core 8.8.x versions prior to 8.8.10; 8.9.x versions prior to 8.9.6; 9.0.x versi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.8.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.9.0'}, {'fixed': '8.9.6'}]}]}, {'pack... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13670'}, {'type': 'PACKAGE', 'url': 'https://github.com/drupal/core'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2020-011'}] | {'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T15:35:08Z', 'nvd_published_at': '2022-02-11T16:15:00Z'} |
1.4.0 | GHSA-8xxm-h73r-ghfj | 2023-07-13T19:05:16Z | 2022-02-07T22:37:45Z | null | ['CVE-2022-23623'] | Validation bypass in frourio | ## 日本語
### 影響
v0.26.0以前のfrourioを使用している、かつvalidators/を利用している場合、ネストされたバリデータがリクエストのボディーとクエリに対して正しく働かないケースがあります。また、リクエストに対してバリデーションが効かなくなる入力があります。
### パッチ
frourioをv0.26.0かそれ以降のバージョンにアップデートをお願いします。frourio を使用したプロジェクトには `class-transformer` と `reflect-metadata` の依存への追加も必要となります。
### ワークアラウンド
controller側で自分でclass-transformer... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'frourio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.26.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/frouriojs/frourio/security/advisories/GHSA-8xxm-h73r-ghfj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23623'}, {'type': 'WEB', 'url': 'https://github.com/frouriojs/frourio/commit/7c19ac5363305b81b1c6b5232620228763d427af'}, {'type': 'PACKAGE', 'ur... | {'cwe_ids': ['CWE-1321', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T22:37:45Z', 'nvd_published_at': '2022-02-07T23:15:00Z'} |
1.4.0 | GHSA-xx8c-m748-xr4j | 2023-02-03T20:43:08Z | 2022-02-15T01:57:18Z | null | ['CVE-2016-1905'] | Access Restriction Bypass in kubernetes | The API server in Kubernetes does not properly check admission control, which allows remote authenticated users to access additional resources via a crafted patched object. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes/pkg/apiserver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0-alpha.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.0-alpha.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1905'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/19479'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/commit/9e6912384a5bc714f2a780b870944a8cee264a22'}, {'type': 'WEB', 'url': 'https://access.redh... | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T20:51:03Z', 'nvd_published_at': '2016-02-03T18:59:00Z'} |
1.4.0 | GHSA-63qx-x74g-jcr7 | 2022-02-07T19:06:18Z | 2022-02-07T19:06:18Z | null | ['CVE-2022-24348'] | Path traversal and dereference of symlinks in Argo CD | ### Impact
All versions of Argo CD are vulnerable to a path traversal bug that allows to pass arbitrary values files to be consumed by Helm charts.
Additionally, it is possible to craft special Helm chart packages containing value files that are actually symbolic links, pointing to arbitrary files outside the reposi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '... | [{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-63qx-x74g-jcr7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24348'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/78c2084f0febd159039ff785ddc2bd4ba1cecf88'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-200', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T22:53:47Z', 'nvd_published_at': '2022-02-04T21:15:00Z'} |
1.4.0 | GHSA-3h2h-xqr2-2jp7 | 2021-04-05T22:56:52Z | 2022-02-09T22:14:01Z | null | ['CVE-2020-13932'] | Cross-site Scripting (XSS) in Apache ActiveMQ Artemis | In Apache ActiveMQ Artemis 2.5.0 to 2.13.0, a specially crafted MQTT packet which has an XSS payload as client-id or topic name can exploit this vulnerability. The XSS payload is being injected into the admin console's browser. The XSS payload is triggered in the diagram plugin; queue node and the info section. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:apache-artemis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.14.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13932'}, {'type': 'WEB', 'url': 'https://activemq.apache.org/security-advisories.data/CVE-2020-13932-announcement.txt'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7fcedcc89e5f296b174d6b8c1438c607c30d809c04292e5732d6e4eb@%3Cusers... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T22:56:52Z', 'nvd_published_at': '2020-07-20T22:15:00Z'} |
1.4.0 | GHSA-2575-pghm-6qqx | 2023-09-18T20:18:54Z | 2022-02-15T01:57:18Z | null | ['CVE-2019-11244'] | Kubernetes Unsafe Cacheing | In Kubernetes v1.8.x-v1.14.x, schema info is cached by kubectl in the location specified by `--cache-dir` (defaulting to `$HOME/.kube/http-cache`), written with world-writeable permissions (`rw-rw-rw-`). If `--cache-dir` is specified and pointed at a different location accessible to other users/groups, the written file... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'k8s.io/client-go'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.12.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11244'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/76676'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/77874'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/77874/com... | {'cwe_ids': ['CWE-524', 'CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T17:22:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-77cr-6gr8-7rr9 | 2021-05-12T21:58:02Z | 2022-02-15T01:57:18Z | null | ['CVE-2020-27195'] | Use After Free in HashiCorp Nomad | HashiCorp Nomad and Nomad Enterprise version 0.9.0 up to 0.12.5 client file sandbox feature can be subverted using either the template or artifact stanzas. Fixed in 0.12.6, 0.11.5, and 0.10.6 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad/client/allocrunner/taskrunner/template'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.10.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad/client/allocrunner/taskrunner/template'}, 'rang... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27195'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/issues/9129'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/pull/9139'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/blob/master/CHANGELOG.md#0126-octo... | {'cwe_ids': ['CWE-416'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:58:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-34jx-wx69-9x8v | 2023-09-18T19:40:25Z | 2022-02-15T01:57:18Z | null | ['CVE-2019-1002101'] | Symlink Attack in kubectl cp | The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, '... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1002101'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/75037'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/commit/47063891dd782835170f500a83f37cc98c3c1013'}, {'type': 'WEB', 'url': 'https://access.red... | {'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T21:58:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p5ch-w78f-xh44 | 2021-04-22T22:45:24Z | 2022-02-10T20:34:24Z | null | ['CVE-2019-20903'] | Cross-site scripting in @atlaskit/editor-core | The hyperlinks functionality in atlaskit/editor-core in before version 113.1.5 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in link targets. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@atlaskit/editor-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 113.1.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20903'}, {'type': 'WEB', 'url': 'https://atlaskit.atlassian.com/packages/editor/editor-core/changelog/113.1.5'}, {'type': 'WEB', 'url': 'https://bitbucket.org/atlassian/atlaskit-mk-2/commits/ca88f616e4'}, {'type': 'WEB', 'url': 'https://confluence.... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T22:45:24Z', 'nvd_published_at': '2020-10-01T02:15:00Z'} |
1.4.0 | GHSA-wc4x-4gm2-74j8 | 2023-09-27T11:18:14Z | 2022-02-10T20:51:04Z | null | ['CVE-2019-10091'] | Apache Geode SSL endpoint verification vulnerability | When TLS is enabled with ssl-endpoint-identification-enabled set to true, Apache Geode fails to perform hostname verification of the entries in the certificate SAN during the SSL handshake. This could compromise intra-cluster communication using a man-in-the-middle attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10091'}, {'type': 'WEB', 'url': 'https://github.com/apache/geode/pull/3849'}, {'type': 'WEB', 'url': 'https://github.com/apache/geode/commit/e57028fd62a2f5980ea6c9a7ab89ada06c828634'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/dis... | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T21:28:10Z', 'nvd_published_at': '2020-03-16T14:15:00Z'} |
1.4.0 | GHSA-6445-fm66-fvq2 | 2022-02-11T17:05:20Z | 2022-02-09T23:39:11Z | null | ['CVE-2022-23568'] | Integer overflows in Tensorflow | ### Impact
The [implementation of `AddManySparseToTensorsMap`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_tensors_map_ops.cc) is vulnerable to an integer overflow which results in a `CHECK`-fail when building new `TensorShape` objects (so, an a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6445-fm66-fvq2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23568'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a68f68061e263a88321c104a6c911fe5598050a8'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T21:12:07Z', 'nvd_published_at': '2022-02-03T12:15:00Z'} |
1.4.0 | GHSA-jc35-q369-45pv | 2022-02-08T22:01:20Z | 2022-02-09T22:51:56Z | null | ['CVE-2020-17530'] | Remote code execution in Apache Struts | Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.26'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17530'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-061'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210115-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021... | {'cwe_ids': ['CWE-917', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T21:42:05Z', 'nvd_published_at': '2020-12-11T02:15:00Z'} |
1.4.0 | GHSA-mqgv-67vx-g4m5 | 2023-09-05T22:43:18Z | 2022-02-09T22:45:52Z | null | ['CVE-2020-28442'] | Prototype Pollution in js-data | All versions of package js-data prior to 3.0.10 are vulnerable to Prototype Pollution via the `deepFillIn` function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'js-data'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28442'}, {'type': 'WEB', 'url': 'https://github.com/js-data/js-data/pull/574'}, {'type': 'WEB', 'url': 'https://github.com/js-data/js-data/commit/2d9eed5d3e9710d7e7fecc6f6437c39fe73a4097'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSDAT... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T21:12:54Z', 'nvd_published_at': '2020-12-15T08:15:00Z'} |
1.4.0 | GHSA-579h-mv94-g4gp | 2021-05-20T20:40:04Z | 2022-02-15T01:57:18Z | null | ['CVE-2018-1002105'] | Privilege Escalation in Kubernetes | In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connec... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fi... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002105'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/71411'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/commit/2257c1ecbe3c0cf71dd50b82752ae189c94ec905'}, {'type': 'WEB', 'url': 'https://access.r... | {'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:40:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mjvc-j6rv-9xj8 | 2022-02-24T21:47:33Z | 2022-02-24T00:00:54Z | null | ['CVE-2022-0721'] | Insertion of Sensitive Information Into Debugging Code in Microweber | Microweber prior to 1.3 may expose sensitive information about a server and a user when running the server in debug mode. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0721'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/b12e1a490c79460bff019f34b2e17112249b16ec'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a... | {'cwe_ids': ['CWE-215'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T21:47:33Z', 'nvd_published_at': '2022-02-23T11:15:00Z'} |
1.4.0 | GHSA-cmx4-p4v5-hmr5 | 2022-02-08T22:03:08Z | 2022-02-09T00:46:46Z | null | ['CVE-2019-17566'] | Server-side request forgery (SSRF) in Apache Batik | Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17566'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/bc6078ca949039e2076cd08b4cb169c84c1179b1'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/xmlgraphics-batik'}, {'type': 'WEB', 'url': 'https://issues.apache... | {'cwe_ids': ['CWE-20', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T20:43:02Z', 'nvd_published_at': '2020-11-12T18:15:00Z'} |
1.4.0 | GHSA-wgx7-jwwm-cgjv | 2021-06-15T18:10:01Z | 2022-02-10T23:05:20Z | null | ['CVE-2020-9480'] | Improper Authentication in Apache Spark | In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared ke... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-parent_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9480'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r03ad9fe7c07d6039fba9f2152d345274473cb0af3d8a4794a6645f4b@%3Cuser.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra0e62a18ad080c4ce6df5e0202a2... | {'cwe_ids': ['CWE-287', 'CWE-306'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T21:39:30Z', 'nvd_published_at': '2020-06-23T22:15:00Z'} |
1.4.0 | GHSA-fr6q-jv7j-35g3 | 2022-02-07T19:12:42Z | 2022-02-02T00:01:46Z | null | ['CVE-2022-0401'] | Path Traversal in w-zip | Path Traversal in NPM w-zip prior to 1.0.12. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'w-zip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0401'}, {'type': 'WEB', 'url': 'https://github.com/yuda-lyu/w-zip/commit/d7039d034e02fa358e6656565157cedf5fa83288'}, {'type': 'PACKAGE', 'url': 'https://github.com/yuda-lyu/w-zip'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d93259aa-ad03-4... | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:50:03Z', 'nvd_published_at': '2022-02-01T13:15:00Z'} |
1.4.0 | GHSA-3qpg-33wr-533j | 2022-04-20T19:13:59Z | 2022-02-12T00:00:37Z | null | ['CVE-2021-46365'] | Improper Restriction of XML External Entity Reference in Magnolia CMS | An issue in the Export function of Magnolia v6.2.3 and below allows attackers to execute arbitrary code via a crafted XLF file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'info.magnolia:magnolia-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46365'}, {'type': 'WEB', 'url': 'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory'}, {'type': 'WEB', 'url': 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46365... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:44:02Z', 'nvd_published_at': '2022-02-11T21:15:00Z'} |
1.4.0 | GHSA-c7f6-4vx5-4263 | 2021-05-03T17:25:30Z | 2022-02-10T20:46:21Z | null | ['CVE-2020-15839'] | Unrestricted Upload of File with Dangerous Type in Liferay Portal and Liferay DXP | Liferay Portal before 7.3.3, and Liferay DXP 7.1 before fix pack 18 and 7.2 before fix pack 6, does not restrict the size of a multipart/form-data POST action, which allows remote authenticated users to conduct denial-of-service attacks by uploading large files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.dxp.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.10.fp18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.1.10.fp17'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:r... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15839'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17029'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17055'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities'}, {'type... | {'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T17:25:30Z', 'nvd_published_at': '2020-09-22T18:15:00Z'} |
1.4.0 | GHSA-rgp5-m2pq-3fmg | 2022-02-23T19:28:54Z | 2022-02-20T00:00:31Z | null | ['CVE-2022-0690'] | Cross-site Scripting in microweber | microweber prior to version 1.2.11 is vulnerable to cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0690'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/f7f5d41ba1a08ceed37c00d5f70a3f48b272e9f2'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T19:28:54Z', 'nvd_published_at': '2022-02-19T17:15:00Z'} |
1.4.0 | GHSA-hgjh-723h-mx2j | 2022-03-03T19:19:03Z | 2022-02-21T00:00:21Z | null | ['CVE-2022-0686'] | Authorization Bypass Through User-Controlled Key in url-parse | url-parse prior to version 1.5.8 is vulnerable to Authorization Bypass Through User-Controlled Key. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'url-parse'}, 'ecosystem_specific': {'affected_functions': ['url-parse.Url']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0686'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/url-parse/commit/d5c64791ef496ca5459ae7f2176a31ea53b127e5'}, {'type': 'PACKAGE', 'url': 'https://github.com/unshiftio/url-parse'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/55fd0... | {'cwe_ids': ['CWE-639'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T21:26:48Z', 'nvd_published_at': '2022-02-20T13:15:00Z'} |
1.4.0 | GHSA-9gwq-6cwj-47h3 | 2022-02-11T15:08:44Z | 2022-02-09T23:52:24Z | null | ['CVE-2022-23558'] | Integer overflow in TFLite array creation | ### Impact
An attacker can craft a TFLite model that would cause an integer overflow [in `TfLiteIntArrayCreate`](https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L53-L60):
```cc
TfLiteIntArray* TfLiteIntArrayCreate(int size) {
int alloc_size = TfLiteI... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9gwq-6cwj-47h3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23558'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:30:33Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-jpj4-5xwp-cv23 | 2021-04-08T21:00:19Z | 2022-02-09T22:44:54Z | null | ['CVE-2020-11974'] | Remote code execution in DolphinScheduler | In DolphinScheduler 1.2.0 and 1.2.1, with mysql connectorj a remote code execution vulnerability exists when choosing mysql as database. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11974'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0de5e3d5516467c9429a8d4356eca17ccf156337345ac6b104748acb@%3Ccommits.dolphinscheduler.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33452d7b99a29... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T21:00:19Z', 'nvd_published_at': '2020-12-18T21:15:00Z'} |
1.4.0 | GHSA-8ffc-79xg-29w8 | 2022-08-11T19:20:55Z | 2022-02-12T00:00:48Z | null | ['CVE-2021-44521'] | Apache Cassandra vulnerable to Code Injection due to unsafe configuration | When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cassandra:cassandra-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.26'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cassandra:cassandra-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44521'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/cassandra'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CASSANDRA-17352'}, {'type': 'WEB', 'url': 'https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-u... | {'cwe_ids': ['CWE-732', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T16:10:04Z', 'nvd_published_at': '2022-02-11T13:15:00Z'} |
1.4.0 | GHSA-r8rm-4hfj-2x87 | 2021-04-22T16:58:02Z | 2022-02-10T20:23:28Z | null | ['CVE-2020-26882'] | Data Amplification in Play Framework | In Play Framework 2.6.0 through 2.8.2, data amplification can occur when an application accepts multipart/form-data JSON input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.3'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26882'}, {'type': 'WEB', 'url': 'https://github.com/playframework/playframework/pull/10495'}, {'type': 'WEB', 'url': 'https://www.playframework.com/security/vulnerability/CVE-2020-26882-JsonParseDataAmplification'}] | {'cwe_ids': ['CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T16:58:02Z', 'nvd_published_at': '2020-11-06T14:15:00Z'} |
1.4.0 | GHSA-88cc-g835-76rp | 2022-02-10T00:30:07Z | 2022-02-10T00:30:07Z | null | ['CVE-2020-13692'] | Improper Restriction of XML External Entity Reference | PostgreSQL JDBC Driver (aka PgJDBC) before 42.2.13 allows XXE. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '42.2.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13692'}, {'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/commit/14b62aca4764d496813f55a43d050b017e01eb65'}, {'type': 'WEB', 'url': 'https://jdbc.postgresql.org/documentation/changelog.html#version_42.2.13'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T21:31:45Z', 'nvd_published_at': '2020-06-04T16:15:00Z'} |
1.4.0 | GHSA-j57w-3c39-gpp5 | 2022-02-25T15:23:16Z | 2022-02-17T00:00:35Z | null | ['CVE-2022-0611'] | Improper Privilege Management in Snipe-IT | An unprivileged user of Snipe-IT prior to version 5.3.11 can create maintenance for an asset. Version 5.3.11 contains a patch for this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0611'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/321be4733d3997fc738f0118e1b9af5905f95439'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7b7447fc-f1b0-4... | {'cwe_ids': ['CWE-269', 'CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T15:23:16Z', 'nvd_published_at': '2022-02-16T00:15:00Z'} |
1.4.0 | GHSA-4v6p-cxf9-98rf | 2022-03-07T19:35:30Z | 2022-02-25T00:01:05Z | null | ['CVE-2022-24614'] | Allocation of Resources Without Limits or Throttling in metadata-extractor | When reading a specially crafted JPEG file, metadata-extractor up to 2.16.0 can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use metadata-extractor library. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.drewnoakes:metadata-extractor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24614'}, {'type': 'WEB', 'url': 'https://github.com/drewnoakes/metadata-extractor/issues/561'}, {'type': 'PACKAGE', 'url': 'https://github.com/drewnoakes/metadata-extractor'}] | {'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T19:35:30Z', 'nvd_published_at': '2022-02-24T15:15:00Z'} |
1.4.0 | GHSA-p7w9-8mxw-p3g7 | 2022-03-01T18:36:44Z | 2022-02-17T00:00:26Z | null | ['CVE-2022-22885'] | Improper Certificate Validation in Hutool | Hutool v5.7.18's HttpRequest was discovered to ignore all TLS/SSL certificate validation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22885'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/issues/2042'}, {'type': 'WEB', 'url': 'https://apidoc.gitee.com/dromara/hutool/cn/hutool/http/ssl/DefaultSSLInfo.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/dromara/hutoo... | {'cwe_ids': ['CWE-295'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-17T23:30:58Z', 'nvd_published_at': '2022-02-16T22:15:00Z'} |
1.4.0 | GHSA-fqx8-v33p-4qcc | 2022-03-09T23:27:04Z | 2022-02-14T22:54:18Z | null | ['CVE-2022-23638'] | Cross-site Scripting in enshrined/svg-sanitize | ### Impact
SVG sanitizer library before version `0.15.0` did not remove HTML elements wrapped in a CDATA section. As a result, SVG content embedded in HTML (fetched as `text/html`) was susceptible to cross-site scripting. Plain SVG files (fetched as `image/svg+xml`) were not affected.
### Patches
This issue is fixed i... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'enshrined/svg-sanitize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/darylldoyle/svg-sanitizer/security/advisories/GHSA-fqx8-v33p-4qcc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23638'}, {'type': 'WEB', 'url': 'https://github.com/darylldoyle/svg-sanitizer/issues/71'}, {'type': 'WEB', 'url': 'https://github.com/da... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:54:18Z', 'nvd_published_at': '2022-02-14T21:15:00Z'} |
1.4.0 | GHSA-5hfv-mg5x-mv32 | 2023-05-31T17:26:33Z | 2022-02-16T00:01:33Z | null | ['CVE-2022-25178'] | Improper Limitation of a Pathname to a Restricted Directory in Jenkins Pipeline: Shared Groovy Libraries Plugin | Jenkins Pipeline: Shared Groovy Libraries Plugin does not restrict the names of resources passed to the libraryResource step, allowing attackers able to configure Pipelines permission to read arbitrary files on the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps-global-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.22'}, {'fixed': '561.va_ce0de3c2d69'}]}], 'database_specific': {'last_known_affected_version_range': '<= 552.vd9cc05b8a2e1'}}, {'package': {'ecosystem': '... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25178'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/workflow-cps-global-lib-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:46:58Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-2hjr-fg6c-v2h6 | 2021-03-29T22:59:44Z | 2022-02-09T00:33:56Z | null | ['CVE-2020-12668'] | Unauthorized access to Class instance in Jinjava | Jinjava before 2.5.4 allow access to arbitrary classes by calling Java methods on objects passed into a Jinjava context. This could allow for abuse of the application class loader, including Arbitrary File Disclosure. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.hubspot.jinjava:jinjava'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12668'}, {'type': 'WEB', 'url': 'https://github.com/HubSpot/jinjava/pull/426/commits/5dfa5b87318744a4d020b66d5f7747acc36b213b'}, {'type': 'WEB', 'url': 'https://github.com/HubSpot/jinjava/pull/435/commits/1b9aaa4b420c58b4a301cf4b7d26207f1c8d1165'},... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:59:44Z', 'nvd_published_at': '2021-02-19T23:15:00Z'} |
1.4.0 | GHSA-vc3x-gx6c-g99f | 2023-02-07T22:07:35Z | 2022-02-15T01:57:18Z | null | ['CVE-2018-18206'] | Denial of Service in Bytom | In the client in Bytom before 1.0.6, checkTopicRegister in p2p/discover/net.go does not prevent negative idx values, leading to a crash. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/bytom/bytom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18206'}, {'type': 'WEB', 'url': 'https://github.com/Bytom/bytom/pull/1307'}, {'type': 'WEB', 'url': 'https://github.com/Bytom/bytom/commit/1ac3c8ac4f2b1e1df9675228290bda6b9586ba42'}, {'type': 'PACKAGE', 'url': 'https://github.com/Bytom/bytom'}, {'t... | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T18:55:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fmfv-x8mp-5767 | 2022-03-01T21:17:52Z | 2022-02-18T00:00:37Z | null | ['CVE-2022-25271'] | Improper input validation in Drupal core | Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '9.2.13'}]}]}, {'pack... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25271'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-ann... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:12:06Z', 'nvd_published_at': '2022-02-16T23:15:00Z'} |
1.4.0 | GHSA-g8jj-899q-8x3j | 2021-05-13T19:52:04Z | 2022-02-10T23:04:13Z | null | ['CVE-2020-13973'] | Cross-site scripting in json-sanitizer | OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls a substring of the input JSON, and controls another substring adjacent to a SCRIPT element in which the output is embedded as JavaScript, may be able to confuse the HTML parser as to where the SCRIPT element ends, and cause non-script content to be ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.mikesamuel:json-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13973'}, {'type': 'WEB', 'url': 'https://github.com/OWASP/json-sanitizer/pull/20'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T19:52:04Z', 'nvd_published_at': '2020-06-09T04:15:00Z'} |
1.4.0 | GHSA-h9v8-rm3m-5h5f | 2021-07-28T22:39:13Z | 2022-02-10T23:47:47Z | null | ['CVE-2020-7630'] | OS Command Injection in git-add-remote | git-add-remote through 1.0.0 is vulnerable to Command Injection. It allows execution of arbitrary commands via the name argument. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'git-add-remote'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7630'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/git-add-remote/blob/master/index.js#L21,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GITADDREMOTE-564269'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T18:22:19Z', 'nvd_published_at': '2020-04-02T22:15:00Z'} |
1.4.0 | GHSA-fhfh-6cjg-57rg | 2022-12-02T20:00:03Z | 2022-02-16T00:01:25Z | null | ['CVE-2022-25192'] | Jenkins Snow Commander Plugin 2.0 vulnerable to Cross-Site Request Forgery | A cross-site request forgery (CSRF) vulnerability in Jenkins Snow Commander Plugin 2.0 and earlier allows attackers to connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:embotics-vcommander'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25192'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/snowsoftware-commander-plugin/commit/4fb4e68e8e7be3168721a06ad08b263252c276f1'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/snowsoftware-commander-plugin'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:16:40Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-38w8-h222-wrpp | 2022-12-01T22:12:02Z | 2022-02-16T00:01:14Z | null | ['CVE-2022-25209'] | Improper Restriction of XML External Entity Reference in Jenkins Chef Sinatra | Chef Sinatra Plugin 1.20 and earlier does not perform a permission check in a method implementing form validation.
As the plugin does not configure its XML parser to prevent XML external entity (XXE) attacks, attackers can have Jenkins parse a crafted XML response that uses external entities for extraction of secrets ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sinatra-chef-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25209'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1377'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:45:12Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-rcwj-2hj2-vmjj | 2022-02-09T00:23:06Z | 2022-02-09T00:23:06Z | null | ['CVE-2020-9482'] | Insufficient Session Expiration in Apache NiFi Registry | If NiFi Registry 0.1.0 to 0.5.0 uses an authentication mechanism other than PKI, when the user clicks Log Out, NiFi Registry invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi.registry:nifi-registry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'fixed': '0.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.5.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9482'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi-registry/pull/277/files/9f7f1c1b1095e3facdaa986435fa94eff78627dd'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi-registry/commit/2881e29dce3a179f3e56069b82ef8cbb7bd8d85c'}, {'... | {'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T18:36:05Z', 'nvd_published_at': '2020-04-28T19:15:00Z'} |
1.4.0 | GHSA-53m6-44rc-h2q5 | 2022-03-08T18:23:38Z | 2022-02-24T13:09:30Z | null | ['CVE-2022-23655'] | Missing server signature validation in OctoberCMS | ### Impact
This advisory affects authors of plugins and themes listed on the October CMS marketplace where an end-user will inadvertently expose authors to potential financial loss by entering their private license key into a compromised server.
It has been disclosed that a project fork of October CMS v1.0 is using a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.475'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-53m6-44rc-h2q5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23655'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/e3b455ad587282f0fbcb7763c6d9c3d000ca1e6a'}, {'type': 'PACKAGE', '... | {'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T13:09:30Z', 'nvd_published_at': '2022-02-24T00:15:00Z'} |
1.4.0 | GHSA-hj8g-cw8x-2c6m | 2022-02-24T21:51:08Z | 2022-02-24T00:00:53Z | null | ['CVE-2022-0719'] | Cross-site Scripting in Microweber | Microweber prior to version 1.3 is vulnerable to reflected cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0719'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/a5925f74d39775771d4c37c8d4c1acbb762fda0a'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T21:51:08Z', 'nvd_published_at': '2022-02-23T11:15:00Z'} |
1.4.0 | GHSA-g7v2-2qxx-wjrw | 2021-05-20T16:33:03Z | 2022-02-15T01:18:02Z | null | ['CVE-2015-3627'] | Symlink Attack in Libcontainer and Docker Engine | Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image. | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3627'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker/commit/d5ebb60bddbabea0439213501f4f6ed494b23cba'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ'}, {'type'... | {'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:33:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m4hg-5p2m-fm5m | 2022-02-23T22:13:17Z | 2022-02-12T00:00:37Z | null | ['CVE-2021-46361'] | Arbitrary code execution in Magnolia CMS | An issue in the Freemark Filter of Magnolia CMS v6.2.11 and below allows attackers to bypass security restrictions and execute arbitrary code via a crafted FreeMarker payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'info.magnolia:magnolia-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46361'}, {'type': 'WEB', 'url': 'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.12.html#_security_advisory'}, {'type': 'WEB', 'url': 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-4636... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:43:02Z', 'nvd_published_at': '2022-02-11T21:15:00Z'} |
1.4.0 | GHSA-vjg4-v33c-ggc4 | 2022-02-09T18:29:45Z | 2022-02-09T18:29:45Z | null | ['CVE-2022-21730'] | Out of bounds read in Tensorflow | ### Impact
The [implementation of `FractionalAvgPoolGrad`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_avg_pool_op.cc#L209-L360) does not consider cases where the input tensors are invalid allowing an attacker to read from outside of bounds ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vjg4-v33c-ggc4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21730'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/002408c3696b173863228223d535f9de72a101a9'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T18:36:19Z', 'nvd_published_at': '2022-02-03T11:15:00Z'} |
1.4.0 | GHSA-m4jx-6526-vvhm | 2021-05-12T20:38:22Z | 2022-02-15T01:57:18Z | null | ['CVE-2020-28466'] | Denial of service in github.com/nats-io/nats-server/server | This affects all versions of package github.com/nats-io/nats-server/server. Untrusted accounts are able to crash the server using configs that represent a service export/import cycles. Disclaimer from the maintainers - Running a NATS service which is exposed to untrusted users presents a heightened risk. Any remote exe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server/v2/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28466'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/pull/1731'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/pull/1731/commits/2e3c22672936f4980d343fb1d328b38919e74796'}, {'type': 'WEB', 'url': 'https://snyk.i... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T20:38:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qc84-gqf4-9926 | 2022-08-11T21:55:33Z | 2022-02-16T22:36:21Z | null | ['CVE-2022-23639'] | crossbeam-utils Race Condition vulnerability | ### Impact
The affected version of this crate incorrectly assumed that the alignment of `{i,u}64` was always the same as `Atomic{I,U}64`.
However, the alignment of `{i,u}64` on a 32-bit target can be smaller than `Atomic{I,U}64`.
This can cause the following problems:
- Unaligned memory accesses
- Data race
Crate... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'crossbeam-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-qc84-gqf4-9926'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23639'}, {'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/pull/781'}, {'type': 'PACKAGE', 'url': 'https://github.com/cross... | {'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:36:21Z', 'nvd_published_at': '2022-02-15T19:15:00Z'} |
1.4.0 | GHSA-c6fh-56w7-fvjw | 2022-02-09T18:29:13Z | 2022-02-09T18:29:13Z | null | ['CVE-2022-21727'] | Integer overflow in Tensorflow | ### Impact
The [implementation of shape inference for `Dequantize`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L3001-L3034) is vulnerable to an integer overflow weakness:
```python
import tensorflow as tf
input = tf.constant([1,1],dtype=tf.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c6fh-56w7-fvjw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21727'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/b64638ec5ccaa77b7c1eb90958e3d85ce381f91b'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T18:12:51Z', 'nvd_published_at': '2022-02-03T11:15:00Z'} |
1.4.0 | GHSA-6m4r-m3gc-h4r5 | 2021-07-28T22:39:48Z | 2022-02-10T23:48:06Z | null | ['CVE-2020-7629'] | OS Command Injection in install-package | install-package through 0.4.0 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'install-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7629'}, {'type': 'WEB', 'url': 'https://github.com/1000ch/install-package/blob/master/index.js#L82,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-INSTALLPACKAGE-564267'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T18:31:42Z', 'nvd_published_at': '2020-04-02T22:15:00Z'} |
1.4.0 | GHSA-43jf-985q-588j | 2022-02-11T20:31:29Z | 2022-02-09T23:27:08Z | null | ['CVE-2022-23586'] | Multiple `CHECK`-fails in `function.cc` in TensowFlow | ### Impact
A malicious user can cause a denial of service by altering a `SavedModel` such that [assertions in `function.cc`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/function.cc) would be falsified and crash the Python interpreter.
### Patches
We h... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-43jf-985q-588j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23586'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3d89911481ba6ebe8c88c1c0b595412121e6c645'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T19:03:45Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-98j8-c9q4-r38g | 2022-02-11T17:04:38Z | 2022-02-10T00:20:51Z | null | ['CVE-2022-21733'] | Memory exhaustion in Tensorflow | ### Impact
The [implementation of `StringNGrams`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/string_ngrams_op.cc#L29-L161) can be used to trigger a denial of service attack by causing an OOM condition after an integer overflow:
```python
import tenso... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-98j8-c9q4-r38g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21733'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-190', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T19:23:04Z', 'nvd_published_at': '2022-02-03T12:15:00Z'} |
1.4.0 | GHSA-52rg-hpwq-qp56 | 2021-04-01T21:20:47Z | 2022-02-09T00:56:51Z | null | ['CVE-2020-10758'] | Allocation of Resources Without Limits or Throttling in Keycloak | A vulnerability was found in Keycloak before 11.0.1 where DoS attack is possible by sending twenty requests simultaneously to the specified keycloak server, all with a Content-Length header value that exceeds the actual byte count of the request body. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10758'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/bee4ca89897766c4b68856eafe14f1a3dad34251'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1843849'}] | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T21:20:47Z', 'nvd_published_at': '2020-09-16T16:15:00Z'} |
1.4.0 | GHSA-2pmw-cvc7-frvh | 2022-03-01T22:02:53Z | 2022-02-18T00:00:34Z | null | ['CVE-2021-44868'] | SQL injection in MCMS | A problem was found in ming-soft MCMS v5.1. There is a sql injection vulnerability in /ms/cms/content/list.do | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44868'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/58'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:36:49Z', 'nvd_published_at': '2022-02-17T16:15:00Z'} |
1.4.0 | GHSA-c597-f74m-jgc2 | 2021-04-01T21:57:32Z | 2022-02-09T00:56:26Z | null | ['CVE-2020-1758'] | Improper Certificate Validation and Improper Validation of Certificate with Host Mismatch in Keycloak | A flaw was found in Keycloak in versions before 10.0.0, where it does not perform the TLS hostname verification while sending emails using the SMTP server. This flaw allows an attacker to perform a man-in-the-middle (MITM) attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1758'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1758'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/KEYCLOAK-13285'}] | {'cwe_ids': ['CWE-295', 'CWE-297'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T21:57:32Z', 'nvd_published_at': '2020-05-15T19:15:00Z'} |
1.4.0 | GHSA-xwv6-v7qx-f5jc | 2022-03-04T21:37:26Z | 2022-02-19T00:01:25Z | null | ['CVE-2022-25337'] | Code injection in ezsystems/ezpublish-kernel | When image files are uploaded, they are made accessible under a name similar to the original file name. There are two issues with this. Both require access to uploading images in order to exploit them, this limits the impact. The first issue is that certain injection attacks can be possible, since not all possible atta... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.5.0'}, {'fixed': '7.5.26'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25337'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-001-image-filenames-sanitization'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezpublish-kernel'}] | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-04T21:37:26Z', 'nvd_published_at': '2022-02-18T18:15:00Z'} |
1.4.0 | GHSA-hj93-5fg3-3chr | 2022-08-18T19:07:23Z | 2022-02-25T00:01:01Z | null | ['CVE-2022-24687'] | HashiCorp Consul Ingress Gateway Panic Can Shutdown Servers | HashiCorp Consul and Consul Enterprise 1.8.0 through 1.9.14, 1.10.7, and 1.11.2 has Uncontrolled Resource Consumption. Clusters with at least one ingress gateway configured may allow a user with `service:write` permission to register a specifically-defined service that can cause the Consul server to panic and shutdown.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.9.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.14'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24687'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-05-consul-ingress-gateway-panic-can-shutdown-servers/'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/c... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:07:23Z', 'nvd_published_at': '2022-02-24T16:15:00Z'} |
1.4.0 | GHSA-74mg-6xqx-2vrq | 2021-04-06T22:54:20Z | 2022-02-09T22:27:01Z | null | ['CVE-2020-11995'] | Deserialization exploitation in Apache Dubbo | A deserialization vulnerability existed in dubbo 2.7.5 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protool, during Hessian2 deserializing the HashMap object, some functions in the classes stored in HashMap will be exe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11995'}, {'type': 'WEB', 'url': 'https://github.com/apache/dubbo/commit/d2e9baf380108950c48e0ab700ccdbf11dd753ab'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b2df4ef479209dc4ced457b3d58a887763b60b9354c3dc148b2eb5b%40%3Cdev.dubb... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T22:54:20Z', 'nvd_published_at': '2021-01-11T10:15:00Z'} |
1.4.0 | GHSA-qq97-vm5h-rrhg | 2023-02-09T15:29:32Z | 2022-02-08T18:53:56Z | null | [] | OCI Manifest Type Confusion Issue | ### Impact
Systems that rely on digest equivalence for image attestations may be vulnerable to type confusion.
### Patches
Upgrade to at least `v2.8.0-beta.1` if you are running `v2.x` release. If you use the code from the `main` branch, update at least to the commit after [b59a6f827947f9e0e67df0cfb571046de4733586]... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/distribution'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/distribution/distribution/security/advisories/GHSA-qq97-vm5h-rrhg'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/image-spec/pull/411'}, {'type': 'WEB', 'url': 'https://github.com/distribution/distribution/commit/b59a6f827947f9e0e67df0cfb571046de4733586'}, {'type... | {'cwe_ids': ['CWE-843'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-02-08T18:53:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8w94-cf6g-c8mg | 2021-10-05T16:31:02Z | 2022-02-15T01:57:18Z | null | ['CVE-2014-5277'] | Man-in-the-Middle (MitM) | Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-5277'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker/commit/8caacb18f8019dfda30d79c327397e5f5783c068'}, {'type': 'PACKAGE', 'url': 'https://github.com/docker/docker'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/dock... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T21:41:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fmj2-7wx8-qj4v | 2022-01-06T19:58:58Z | 2022-02-09T00:45:56Z | null | ['CVE-2020-11988'] | Server-side request forgery (SSRF) in Apache XmlGraphics Commons | Apache XmlGraphics Commons 2.4 is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:xmlgraphics-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11988'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-commons/commit/57393912eb87b994c7fed39ddf30fb778a275183'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/xmlgraphics-commons/'}, {'type': 'WEB', 'url': 'https://issues.a... | {'cwe_ids': ['CWE-20', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T20:37:35Z', 'nvd_published_at': '2021-02-24T18:15:00Z'} |
1.4.0 | GHSA-785x-qw4v-6872 | 2021-08-31T20:54:42Z | 2022-02-09T22:00:08Z | null | ['CVE-2020-14330'] | Improper Output Neutralization and Improper Encoding or Escaping of Output for Logs in ansible | An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest thr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14330'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/68400'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WE... | {'cwe_ids': ['CWE-116', 'CWE-117', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T16:14:01Z', 'nvd_published_at': '2020-09-11T18:15:00Z'} |
1.4.0 | GHSA-f7c7-j99h-c22f | 2022-06-21T20:09:56Z | 2022-02-08T00:00:56Z | null | ['CVE-2021-41496'] | Buffer Copy without Checking Size of Input in NumPy | Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy < 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'numpy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.18.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41496'}, {'type': 'WEB', 'url': 'https://github.com/numpy/numpy/issues/19000'}, {'type': 'PACKAGE', 'url': 'https://github.com/numpy/numpy'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}] | {'cwe_ids': ['CWE-120'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:09:56Z', 'nvd_published_at': '2021-12-17T20:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.