schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-fq6p-6334-8gr4
2022-02-11T20:36:39Z
2022-02-09T23:26:08Z
null
['CVE-2022-23585']
Memory leak in decoding PNG images
### Impact When [decoding PNG images](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/image/decode_image_op.cc#L322-L416) TensorFlow can produce a memory leak if the image is invalid. After calling `png::CommonInitDecode(..., &decode)`, the `decode` value c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fq6p-6334-8gr4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23585'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ab51e5b813573dc9f51efa335aebcf2994125ee9'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-401'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T19:09:09Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-mxh3-2699-98g9
2022-02-14T22:35:03Z
2022-02-09T00:00:28Z
null
['CVE-2022-0510']
Cross-site Scripting pimcore
pimcore version 10.3.0 and prior is vulnerable to cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.3.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0510'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/b5a9ad65e5a4dde1916f02019f8686ad835681ce'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/bb3525d5-ded...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T20:38:21Z', 'nvd_published_at': '2022-02-08T15:15:00Z'}
1.4.0
GHSA-rw98-5846-pqhx
2022-02-24T13:56:27Z
2022-02-16T00:01:45Z
null
['CVE-2022-0597']
Open redirect in microweber
Open Redirect in Packagist microweber/microweber prior to 1.2.11.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0597'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/acfc6a581d1ea86096d1b0ecd8a0eec927c0e9b2'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:49:26Z', 'nvd_published_at': '2022-02-15T14:15:00Z'}
1.4.0
GHSA-jrg3-qq99-35g7
2022-04-26T17:59:29Z
2022-02-10T23:03:26Z
null
['CVE-2018-21234']
Deserialization of Untrusted Data in Jodd
Jodd before 5.0.4 performs Deserialization of Untrusted JSON Data when setClassMetadataName is set.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jodd:jodd-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-21234'}, {'type': 'WEB', 'url': 'https://github.com/oblac/jodd/issues/628'}, {'type': 'WEB', 'url': 'https://github.com/oblac/jodd/commit/9bffc3913aeb8472c11bb543243004b4b4376f16'}, {'type': 'PACKAGE', 'url': 'https://github.com/oblac/jodd'}, {'typ...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-14T21:24:02Z', 'nvd_published_at': '2020-05-21T23:15:00Z'}
1.4.0
GHSA-p5pg-wm9q-8v6r
2022-03-07T19:34:44Z
2022-02-25T00:01:05Z
null
['CVE-2022-24613']
Improper Handling of Exceptional Conditions inn metadata-extractor
metadata-extractor up to 2.16.0 can throw various uncaught exceptions while parsing a specially crafted JPEG file, which could result in an application crash. This could be used to mount a denial of service attack against services that use metadata-extractor library.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.drewnoakes:metadata-extractor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.18.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24613'}, {'type': 'WEB', 'url': 'https://github.com/drewnoakes/metadata-extractor/issues/561'}, {'type': 'PACKAGE', 'url': 'https://github.com/drewnoakes/metadata-extractor'}]
{'cwe_ids': ['CWE-755'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T19:34:44Z', 'nvd_published_at': '2022-02-24T15:15:00Z'}
1.4.0
GHSA-2467-h365-j7hm
2021-04-14T18:01:06Z
2022-02-10T00:31:31Z
null
['CVE-2020-13941']
Improper Input Validation in Apache Solr
Reported in SOLR-14515 (private) and fixed in SOLR-14561 (public), released in Solr version 8.6.0. The Replication handler (https://lucene.apache.org/solr/guide/8_6/index-replication.html#http-api-commands-for-the-replicationhandler) allows commands backup, restore and deleteBackup. Each of these take a location parame...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13941'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1d4a247329a8478073163567bbc8c8cb6b49c6bfc2bf58153a857af1@%3Ccommits.druid.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbcd9dff009ed19ffcc2b0978...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T18:01:06Z', 'nvd_published_at': '2020-08-17T13:15:00Z'}
1.4.0
GHSA-9cwv-cppx-mqjm
2022-02-25T15:39:14Z
2022-02-23T21:17:25Z
null
['CVE-2022-23652']
Improper Authentication in Capsule Proxy
### Impact Using a malicious `Connection` header, an attacker with a proper authentication mechanism could start a privilege escalation towards the Kubernetes API Server, being able to exploit the `cluster-admin` Role bound to `capsule-proxy`. ### Patches Patch has been merged in the v0.2.1 release. ### Workarounds...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/clastix/capsule-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/clastix/capsule-proxy/security/advisories/GHSA-9cwv-cppx-mqjm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23652'}, {'type': 'WEB', 'url': 'https://github.com/clastix/capsule-proxy/issues/188'}, {'type': 'WEB', 'url': 'https://github.com/clastix/c...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T21:17:25Z', 'nvd_published_at': '2022-02-22T20:15:00Z'}
1.4.0
GHSA-fgv8-vj5c-2ppq
2023-02-24T17:01:49Z
2022-02-22T15:38:08Z
null
['CVE-2019-16884']
Incorrect Authorization in runc
runc through 1.0.0-rc8, as used in Docker through 19.03.2-ce and other products, allows AppArmor restriction bypass because libcontainer/rootfs_linux.go incorrectly checks mount targets, and thus a malicious Docker image can mount over a /proc directory.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/runc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0-rc8.0.20190930145003-cad42f6e0932'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/selinux'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16884'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/issues/2128'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/pull/2129'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/runc/pull/2130'}, {'type': ...
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T15:38:08Z', 'nvd_published_at': '2019-09-25T18:15:00Z'}
1.4.0
GHSA-f268-65qc-98vg
2022-02-09T23:03:53Z
2022-02-09T23:03:53Z
null
['CVE-2020-13943']
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat
If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - in...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-coyote'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.0-M8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.0-M7'}}, {'package':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13943'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/1bbc650cbc3f08d85a1ec6d803c47ae53a84f3bb'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/55911430df13f8c9998fbdee1f9716994d2db59b'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T18:12:07Z', 'nvd_published_at': '2020-10-12T14:15:00Z'}
1.4.0
GHSA-j346-h5wc-rw2m
2022-02-09T23:19:26Z
2022-02-09T23:19:26Z
null
['CVE-2018-11802']
Incorrect Authorization in Apache Solr
In Apache Solr, the cluster can be partitioned into multiple collections and only a subset of nodes actually host any given collection. However, if a node receives a request for a collection it does not host, it proxies the request to a relevant node and serves the request. Solr bypasses all authorization settings for ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.7.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.7.0'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-11802'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2019/04/24/1'}]
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T18:11:26Z', 'nvd_published_at': '2020-04-01T22:15:00Z'}
1.4.0
GHSA-765h-qjxv-5f44
2021-05-19T21:17:59Z
2022-02-10T23:51:42Z
null
['CVE-2021-23383']
Prototype Pollution in handlebars
The package handlebars before 4.7.7 are vulnerable to Prototype Pollution when selecting certain compiling options to compile templates coming from an untrusted source.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ecosystem_specific': {'affected_functions': ['handlebars.compile']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23383'}, {'type': 'WEB', 'url': 'https://github.com/handlebars-lang/handlebars.js/commit/f0589701698268578199be25285b2ebea1c1e427'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210618-0007/'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T21:17:59Z', 'nvd_published_at': '2021-05-04T09:15:00Z'}
1.4.0
GHSA-xgrx-xpv2-6vp4
2021-04-05T23:04:50Z
2022-02-09T22:15:00Z
null
['CVE-2020-13920']
Improper Authentication in Apache ActiveMQ
Apache ActiveMQ uses LocateRegistry.createRegistry() to create the JMX RMI registry and binds the server to the "jmxrmi" entry. It is possible to connect to the registry without authentication and call the rebind method to rebind jmxrmi to something else. If an attacker creates another server to proxy the original, and...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.15.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13920'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3...
{'cwe_ids': ['CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T23:04:50Z', 'nvd_published_at': '2020-09-10T19:15:00Z'}
1.4.0
GHSA-xp4x-j9vh-c3wf
2021-04-19T16:43:07Z
2022-02-10T20:20:31Z
null
['CVE-2019-15609']
OS Command Injection and Command Injection in kill-port-process
The kill-port-process package version &lt; 2.2.0 is vulnerable to a Command Injection vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'kill-port-process'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15609'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/661959'}]
{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T16:43:07Z', 'nvd_published_at': '2020-02-28T20:15:00Z'}
1.4.0
GHSA-ph62-8768-r87v
2022-03-03T22:04:31Z
2022-02-25T00:01:04Z
null
['CVE-2022-25098']
Arbitrary file delete in ectouch/ectouch
ECTouch v2 suffers from arbitrary file deletion due to insufficient filtering of the filename parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'ectouch/ectouch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25098'}, {'type': 'WEB', 'url': 'https://github.com/dota-st/Vulnerability/blob/master/ECTouchV2.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/ectouch/ectouch'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T22:04:31Z', 'nvd_published_at': '2022-02-24T15:15:00Z'}
1.4.0
GHSA-j3mj-fhpq-qqjj
2022-02-11T20:48:16Z
2022-02-09T23:28:57Z
null
['CVE-2022-23571']
Reachable Assertion in Tensorflow
### Impact When decoding a tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments, if the tensors have an invalid `dtype` and 0 elements or an invalid shape. This allows attackers to cause denial of services in TensorFlow processes. ##...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j3mj-fhpq-qqjj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23571'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/5b491cd5e41ad63735161cec9c2a568172c8b6a3'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T18:55:27Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-p5gm-fgfx-hr7h
2021-05-04T21:47:51Z
2022-02-10T20:55:10Z
null
['CVE-2020-24164']
Gadget chain attack in Nippy
A deserialization flaw is present in Taoensso Nippy before 2.14.2. In some circumstances, it is possible for an attacker to create a malicious payload that, when deserialized, will allow arbitrary code to be executed. This occurs because there is automatic use of the Java Serializable interface.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.taoensso:nippy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.14.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24164'}, {'type': 'WEB', 'url': 'https://github.com/ptaoussanis/nippy/issues/130'}, {'type': 'WEB', 'url': 'https://github.com/ptaoussanis/nippy/commit/61fb009fdde2994140f2da2e495ba8af3a873eb2'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T21:47:51Z', 'nvd_published_at': '2020-09-11T06:15:00Z'}
1.4.0
GHSA-x4qx-4fjv-hmw6
2022-02-11T16:22:50Z
2022-02-09T23:45:09Z
null
['CVE-2022-21738']
Integer overflow leading to crash in Tensorflow
### Impact The [implementation of `SparseCountSparseOutput`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273) can be made to crash a TensorFlow process by an integer overflow whose result is then used in a memory allocation: ```pyth...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x4qx-4fjv-hmw6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21738'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/6f4d3e8139ec724dbbcb40505891c81dd1052c4a'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:03:36Z', 'nvd_published_at': '2022-02-03T14:15:00Z'}
1.4.0
GHSA-227w-wv4j-67h4
2022-02-09T22:30:30Z
2022-02-09T22:30:30Z
null
[]
Class Loading Vulnerability in Artemis
### Impact This affects all Artemis users who test Java assignments. **Ares is not required.** Students code that gets automatically tested can run arbitrary code in the container, or arbitrary code on the machine of an assessor in case of manual correction. ### Patches The problem cannot be resolved easily in Ares it...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'de.tum.in.ase:artemis-java-test-sandbox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ls1intum/Ares/security/advisories/GHSA-227w-wv4j-67h4'}, {'type': 'WEB', 'url': 'https://github.com/ls1intum/Ares/issues/15'}, {'type': 'PACKAGE', 'url': 'https://github.com/ls1intum/Ares'}, {'type': 'WEB', 'url': 'https://github.com/ls1intum/Ares/releases/tag/1.8.0'}]
{'cwe_ids': ['CWE-501', 'CWE-653'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T22:30:30Z', 'nvd_published_at': None}
1.4.0
GHSA-gj26-g5qf-jrh7
2022-02-24T13:06:10Z
2022-02-16T00:01:51Z
null
['CVE-2022-0589']
Cross-site Scripting in librenms
Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.1.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0589'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/4c9d4eefd8064a0285f9718ef38f5617d7f9d6fa'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d943d95c-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:52:19Z', 'nvd_published_at': '2022-02-15T09:15:00Z'}
1.4.0
GHSA-h236-g5gh-vq6c
2022-10-31T15:55:40Z
2022-02-10T23:32:51Z
null
['CVE-2019-19935']
DOM-based cross-site scripting in Froala Editor
Froala WYSIWYG HTML Editor is a lightweight WYSIWYG HTML Editor written in JavaScript that enables rich text editing capabilities for web applications. A DOM-based cross-site scripting (XSS) vulnerability exists in versions before 3.2.3 because HTML code in the editor is not correctly sanitized when inserted into the D...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'froala-editor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19935'}, {'type': 'WEB', 'url': 'https://blog.compass-security.com/2020/07/yet-another-froala-0-day-xss/'}, {'type': 'WEB', 'url': 'https://compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2020-004_DOM_XSS_in_Froala_WYSIWYG_HTML_Edito...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T17:34:13Z', 'nvd_published_at': '2020-07-07T16:15:00Z'}
1.4.0
GHSA-m358-g4rp-533r
2022-02-07T21:15:30Z
2022-02-01T00:49:39Z
null
['CVE-2022-24124']
SQL Injection in Casdoor
The query API in Casdoor before 1.13.1 has a SQL injection vulnerability related to the field and value parameters, as demonstrated by api/get-organizations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/casdoor/casdoor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24124'}, {'type': 'WEB', 'url': 'https://github.com/casdoor/casdoor/issues/439'}, {'type': 'WEB', 'url': 'https://github.com/casdoor/casdoor/pull/442'}, {'type': 'WEB', 'url': 'https://github.com/casdoor/casdoor/commit/5ec0c7a89005819960d8fe07f5ddd...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T22:12:48Z', 'nvd_published_at': '2022-01-29T23:15:00Z'}
1.4.0
GHSA-8j36-q8x7-pm6q
2021-04-13T18:32:29Z
2022-02-09T23:14:11Z
null
['CVE-2020-7778']
OS Command Injection in systeminformation
This affects the package systeminformation before 4.30.2. The attacker can overwrite the properties and functions of an object, which can lead to executing OS commands.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'systeminformation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.30.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7778'}, {'type': 'WEB', 'url': 'https://github.com/sebhildebrandt/systeminformation/commit/11103a447ab9550c25f1fbec7e6d903720b3fea8%23diff-970ae648187190f86bafc8f193b7538200eba164fad0674428b6487582c089cc'}, {'type': 'WEB', 'url': 'https://github.co...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T18:32:29Z', 'nvd_published_at': '2020-11-26T11:15:00Z'}
1.4.0
GHSA-c566-2grg-mjwg
2021-04-09T21:34:37Z
2022-02-09T22:50:50Z
null
['CVE-2020-17531']
Serialization vulnerability in Apache Tapestry
A Java Serialization vulnerability was found in Apache Tapestry 4. Apache Tapestry 4 will attempt to deserialize the "sp" parameter even before invoking the page's validate method, leading to deserialization without authentication. Apache Tapestry 4 reached end of life in 2008 and no update to address this issue will b...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '5.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17531'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r700a6aa234dbff0555d4187bdc8274d7e4c0afbf35b9a3457f09ee76%40%3Cusers.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r700a6aa234dbff0555d41...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T21:34:37Z', 'nvd_published_at': '2020-12-08T13:15:00Z'}
1.4.0
GHSA-44gg-pmqr-4669
2021-05-20T16:28:01Z
2022-02-15T01:57:18Z
null
['CVE-2014-6408']
Access Restriction Bypass in Docker
Docker 1.3.0 through 1.3.1 allows remote attackers to modify the default run profile of image containers and possibly bypass the container by applying unspecified security options to an image.
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-6408'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker/commit/c9379eb3fbbc484c056f5a5e49d8d0b755a29c45'}, {'type': 'WEB', 'url': 'https://docs.docker.com/v1.3/release-notes/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/piper...
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:28:01Z', 'nvd_published_at': None}
1.4.0
GHSA-j667-c2hm-f2wp
2021-08-31T20:55:03Z
2022-02-09T21:59:39Z
null
['CVE-2020-14332']
Insertion of Sensitive Information into Log File and Improper Output Neutralization for Logs in ansible
A flaw was found in the Ansible Engine when using module_args. Tasks executed with check mode (--check-mode) do not properly neutralize sensitive data exposed in the event data. This flaw allows unauthorized users to read this data. The highest threat from this vulnerability is to confidentiality.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.14'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0'}, {'fixed': '2.9.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14332'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/71033'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14332'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-117', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T23:18:09Z', 'nvd_published_at': '2020-09-11T18:15:00Z'}
1.4.0
GHSA-332q-7ff2-57h2
2022-02-24T18:21:34Z
2022-02-09T22:34:01Z
null
['CVE-2019-10795']
Prototype Pollution in undefsafe
undefsafe before 2.0.3 is vulnerable to Prototype Pollution. The 'a' function could be tricked into adding or modifying properties of Object.prototype using a `__proto__` payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'undefsafe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10795'}, {'type': 'WEB', 'url': 'https://github.com/remy/undefsafe/commit/f272681b3a50e2c4cbb6a8533795e1453382c822'}, {'type': 'PACKAGE', 'url': 'https://github.com/remy/undefsafe'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-UNDEFSAFE-54...
{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T21:18:46Z', 'nvd_published_at': '2020-02-18T16:15:00Z'}
1.4.0
GHSA-m7jv-hq7h-mq7c
2022-02-08T22:05:17Z
2022-02-08T22:05:17Z
null
['CVE-2020-13935']
Infinite Loop in Apache Tomcat
The payload length in a WebSocket frame was not correctly validated in Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M1 to 9.0.36, 8.5.0 to 8.5.56 and 7.0.27 to 7.0.104. Invalid payload lengths could trigger an infinite loop. Multiple requests with invalid payload lengths could lead to a denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.0-M6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.0-M5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13935'}, {'type': 'WEB', 'url': 'https://kc.mcafee.com/corporate/index?page=content&id=SB10332'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4e5d3c09f4dd2923191e972408b40fb8b42dbff0bc7904d44b651e50@%3Cusers.tomcat.apache.org%3E'}...
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T18:44:47Z', 'nvd_published_at': '2020-07-14T15:15:00Z'}
1.4.0
GHSA-wfjw-w6pv-8p7f
2022-02-08T17:36:38Z
2022-02-01T00:47:53Z
null
['CVE-2022-21659']
Observable Response Discrepancy in Flask-AppBuilder
### Impact User enumeration in database authentication in Flask-AppBuilder < 3.4.4. Allows for a non authenticated user to enumerate existing accounts by timing the response time from the server when you are logging in. ### Patches Upgrade to 3.4.4 ### Workarounds ### References ### For more information If you hav...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-AppBuilder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-wfjw-w6pv-8p7f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21659'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/pull/1775'}, {'type': 'PACKAGE', 'url': 'https://github.co...
{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T20:19:12Z', 'nvd_published_at': '2022-01-31T21:15:00Z'}
1.4.0
GHSA-v3f7-j968-4h5f
2022-02-11T17:05:08Z
2022-02-10T00:15:07Z
null
['CVE-2022-21725']
Division by zero in Tensorflow
### Impact The [estimator for the cost of some convolution operations](https://github.com/tensorflow/tensorflow/blob/ffa202a17ab7a4a10182b746d230ea66f021fe16/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L189-L198) can be made to execute a division by 0: ```python import tensorflow as tf @tf.function def...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v3f7-j968-4h5f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21725'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3218043d6d3a019756607643cf65574fbfef5d7a'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T18:05:56Z', 'nvd_published_at': '2022-02-03T13:15:00Z'}
1.4.0
GHSA-cx3w-xqmc-84g5
2022-04-20T16:24:41Z
2022-02-15T00:30:37Z
null
['CVE-2021-21237']
Git LFS can execute a Git binary from the current directory on Windows
### Impact On Windows, if Git LFS operates on a malicious repository with a git.bat or git.exe file in the current directory, that program would be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. This is the result of an incomplete fix for CVE-2020-27955. This issue occ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/git-lfs/git-lfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/git-lfs/git-lfs/security/advisories/GHSA-cx3w-xqmc-84g5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21237'}, {'type': 'WEB', 'url': 'https://github.com/git-lfs/git-lfs/commit/fc664697ed2c2081ee9633010de0a7f9debea72a'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-426', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T17:37:52Z', 'nvd_published_at': None}
1.4.0
GHSA-x92v-xv3x-9v29
2022-12-01T22:14:51Z
2022-02-16T00:01:15Z
null
['CVE-2022-25207']
CSRF vulnerability in Jenkins Chef Sinatra Plugin allow XXE
Chef Sinatra Plugin 1.20 and earlier does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read permission to have Jenkins send an HTTP request to an attacker-controlled URL and have it parse the response as XML. As the plugin does not configure its XML parse...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sinatra-chef-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25207'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/sinatra-chef-builder-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1377'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:14:51Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-77gp-3h4r-6428
2022-02-11T20:46:42Z
2022-02-09T23:25:40Z
null
['CVE-2022-23574']
Out of bounds read and write in Tensorflow
### Impact There is a typo in TensorFlow's [`SpecializeType`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/full_type_util.cc#L81-L102) which results in heap OOB read/write: ```cc for (int i = 0; i < op_def.output_arg_size(); i++) { // ... for (int...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-77gp-3h4r-6428'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23574'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/0657c83d08845cc434175934c642299de2c0f042'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T19:12:26Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-3hq6-rmv7-39vh
2022-02-10T23:45:28Z
2022-02-10T23:45:28Z
null
['CVE-2020-7625']
Injection in op-browser
op-browser through 1.0.9 is vulnerable to Command Injection. It allows execution of arbitrary commands via the url function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'op-browser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7625'}, {'type': 'WEB', 'url': 'https://github.com/hiproxy/open-browser/pull/3'}, {'type': 'WEB', 'url': 'https://github.com/hiproxy/open-browser/pull/4'}, {'type': 'WEB', 'url': 'https://github.com/hiproxy/open-browser/blob/master/lib/index.js#L75...
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:58:34Z', 'nvd_published_at': '2020-04-02T22:15:00Z'}
1.4.0
GHSA-3p9j-442x-hjp7
2022-02-23T19:27:39Z
2022-02-20T00:00:31Z
null
['CVE-2022-0689']
Business Logic Errors in microweber
microweber prior to 1.2.11 allows multiple uses of a single-use coupon.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0689'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/c3c25ae6c421bb4a65df9e0035edcc2f75594a04'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T19:27:39Z', 'nvd_published_at': '2022-02-19T16:15:00Z'}
1.4.0
GHSA-xjqr-g762-pxwp
2022-08-11T16:50:15Z
2022-02-15T01:57:18Z
null
['CVE-2021-20206']
containernetworking/cni improper limitation of path name
An improper limitation of path name flaw was found in containernetworking/cni in versions before 0.8.1. When specifying the plugin to load in the 'type' field in the network configuration, it is possible to use special elements such as "../" separators to reference binaries elsewhere on the system. This flaw allows an ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/containernetworking/cni'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containernetworking/cni/pkg/invoke'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20206'}, {'type': 'WEB', 'url': 'https://github.com/containernetworking/cni/pull/808'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1919391'}, {'type': 'PACKAGE', 'url': 'https://github.com/containernetworking/cni'}, {'type'...
{'cwe_ids': ['CWE-20', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:07:06Z', 'nvd_published_at': '2021-03-26T22:15:00Z'}
1.4.0
GHSA-mgjw-2wrp-r535
2022-02-09T21:32:10Z
2022-02-09T21:32:10Z
null
['CVE-2022-23616']
Remote code execution in xwiki-platform
### Impact It's possible for an unprivileged user to perform a remote code execution by injecting a groovy script in her own profile and by calling the Reset password feature since the feature is performing a save of the user profile with programming rights in the impacted versions of XWiki. ### Patches The problem ha...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-administration-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1-milestone-1'}, {'fixed': '13.1RC1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 13.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mgjw-2wrp-r535'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23616'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/407caeba05c181bd4835e1dd12e431fa15ff728b#diff-c51a3675b6e312a...
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T21:32:10Z', 'nvd_published_at': '2022-02-09T21:15:00Z'}
1.4.0
GHSA-vp9j-rghq-8jhh
2021-04-05T13:49:09Z
2022-02-09T21:59:42Z
null
['CVE-2020-10744']
Exposure of Resource to Wrong Sphere and Insecure Temporary File in Ansible
An incomplete fix was found for the fix of the flaw CVE-2020-1733 ansible insecure temporary directory when running become_user from become directive. The provided fix is insufficient to prevent the race condition on systems using ACLs and FUSE filesystems. Ansible Engine 2.7.18, 2.8.12, and 2.9.9 as well as previous v...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.9.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10744'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10744'}]
{'cwe_ids': ['CWE-362', 'CWE-377', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T13:49:09Z', 'nvd_published_at': '2020-05-15T14:15:00Z'}
1.4.0
GHSA-88g8-f5mf-f5rj
2022-02-11T16:20:03Z
2022-02-05T00:00:31Z
null
['CVE-2021-46320']
Improper Initialization in OpenZeppelin
In OpenZeppelin <=v4.4.0, initializer functions that are invoked separate from contract creation (the most prominent example being minimal proxies) may be reentered if they make an untrusted non-view external call. Once an initializer has finished running it can never be re-executed. However, an exception put in place ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9c22-pwxw-p6hx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46320'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3006'}, {'type': 'PACKAGE', 'url'...
{'cwe_ids': ['CWE-665'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-11T16:20:03Z', 'nvd_published_at': '2022-02-04T12:15:00Z'}
1.4.0
GHSA-mmjr-5q74-p3m4
2022-02-25T15:35:08Z
2022-02-12T00:00:47Z
null
['CVE-2020-13670']
Exposure of Resource to Wrong Sphere in Drupal Core
Information Disclosure vulnerability in file module of Drupal Core allows an attacker to gain access to the file metadata of a permanent private file that they do not have access to by guessing the ID of the file. This issue affects: Drupal Core 8.8.x versions prior to 8.8.10; 8.9.x versions prior to 8.9.6; 9.0.x versi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.8.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.9.0'}, {'fixed': '8.9.6'}]}]}, {'pack...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13670'}, {'type': 'PACKAGE', 'url': 'https://github.com/drupal/core'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2020-011'}]
{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T15:35:08Z', 'nvd_published_at': '2022-02-11T16:15:00Z'}
1.4.0
GHSA-8xxm-h73r-ghfj
2023-07-13T19:05:16Z
2022-02-07T22:37:45Z
null
['CVE-2022-23623']
Validation bypass in frourio
## 日本語 ### 影響 v0.26.0以前のfrourioを使用している、かつvalidators/を利用している場合、ネストされたバリデータがリクエストのボディーとクエリに対して正しく働かないケースがあります。また、リクエストに対してバリデーションが効かなくなる入力があります。 ### パッチ frourioをv0.26.0かそれ以降のバージョンにアップデートをお願いします。frourio を使用したプロジェクトには `class-transformer` と `reflect-metadata` の依存への追加も必要となります。 ### ワークアラウンド controller側で自分でclass-transformer...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'frourio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.26.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/frouriojs/frourio/security/advisories/GHSA-8xxm-h73r-ghfj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23623'}, {'type': 'WEB', 'url': 'https://github.com/frouriojs/frourio/commit/7c19ac5363305b81b1c6b5232620228763d427af'}, {'type': 'PACKAGE', 'ur...
{'cwe_ids': ['CWE-1321', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T22:37:45Z', 'nvd_published_at': '2022-02-07T23:15:00Z'}
1.4.0
GHSA-xx8c-m748-xr4j
2023-02-03T20:43:08Z
2022-02-15T01:57:18Z
null
['CVE-2016-1905']
Access Restriction Bypass in kubernetes
The API server in Kubernetes does not properly check admission control, which allows remote authenticated users to access additional resources via a crafted patched object.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes/pkg/apiserver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0-alpha.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.0-alpha.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-1905'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/19479'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/commit/9e6912384a5bc714f2a780b870944a8cee264a22'}, {'type': 'WEB', 'url': 'https://access.redh...
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T20:51:03Z', 'nvd_published_at': '2016-02-03T18:59:00Z'}
1.4.0
GHSA-63qx-x74g-jcr7
2022-02-07T19:06:18Z
2022-02-07T19:06:18Z
null
['CVE-2022-24348']
Path traversal and dereference of symlinks in Argo CD
### Impact All versions of Argo CD are vulnerable to a path traversal bug that allows to pass arbitrary values files to be consumed by Helm charts. Additionally, it is possible to craft special Helm chart packages containing value files that are actually symbolic links, pointing to arbitrary files outside the reposi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '...
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-63qx-x74g-jcr7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24348'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/78c2084f0febd159039ff785ddc2bd4ba1cecf88'}, {'type': 'WEB', 'url': 'h...
{'cwe_ids': ['CWE-200', 'CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T22:53:47Z', 'nvd_published_at': '2022-02-04T21:15:00Z'}
1.4.0
GHSA-3h2h-xqr2-2jp7
2021-04-05T22:56:52Z
2022-02-09T22:14:01Z
null
['CVE-2020-13932']
Cross-site Scripting (XSS) in Apache ActiveMQ Artemis
In Apache ActiveMQ Artemis 2.5.0 to 2.13.0, a specially crafted MQTT packet which has an XSS payload as client-id or topic name can exploit this vulnerability. The XSS payload is being injected into the admin console's browser. The XSS payload is triggered in the diagram plugin; queue node and the info section.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:apache-artemis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.14.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13932'}, {'type': 'WEB', 'url': 'https://activemq.apache.org/security-advisories.data/CVE-2020-13932-announcement.txt'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7fcedcc89e5f296b174d6b8c1438c607c30d809c04292e5732d6e4eb@%3Cusers...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T22:56:52Z', 'nvd_published_at': '2020-07-20T22:15:00Z'}
1.4.0
GHSA-2575-pghm-6qqx
2023-09-18T20:18:54Z
2022-02-15T01:57:18Z
null
['CVE-2019-11244']
Kubernetes Unsafe Cacheing
In Kubernetes v1.8.x-v1.14.x, schema info is cached by kubectl in the location specified by `--cache-dir` (defaulting to `$HOME/.kube/http-cache`), written with world-writeable permissions (`rw-rw-rw-`). If `--cache-dir` is specified and pointed at a different location accessible to other users/groups, the written file...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/client-go'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.12.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11244'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/76676'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/77874'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/77874/com...
{'cwe_ids': ['CWE-524', 'CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T17:22:21Z', 'nvd_published_at': None}
1.4.0
GHSA-77cr-6gr8-7rr9
2021-05-12T21:58:02Z
2022-02-15T01:57:18Z
null
['CVE-2020-27195']
Use After Free in HashiCorp Nomad
HashiCorp Nomad and Nomad Enterprise version 0.9.0 up to 0.12.5 client file sandbox feature can be subverted using either the template or artifact stanzas. Fixed in 0.12.6, 0.11.5, and 0.10.6
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad/client/allocrunner/taskrunner/template'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.10.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad/client/allocrunner/taskrunner/template'}, 'rang...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27195'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/issues/9129'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/pull/9139'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/blob/master/CHANGELOG.md#0126-octo...
{'cwe_ids': ['CWE-416'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:58:02Z', 'nvd_published_at': None}
1.4.0
GHSA-34jx-wx69-9x8v
2023-09-18T19:40:25Z
2022-02-15T01:57:18Z
null
['CVE-2019-1002101']
Symlink Attack in kubectl cp
The kubectl cp command allows copying files between containers and the user machine. To copy files from a container, Kubernetes creates a tar inside the container, copies it over the network, and kubectl unpacks it on the user’s machine. If the tar binary in the container is malicious, it could run any code and output ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, '...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-1002101'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/75037'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/commit/47063891dd782835170f500a83f37cc98c3c1013'}, {'type': 'WEB', 'url': 'https://access.red...
{'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T21:58:27Z', 'nvd_published_at': None}
1.4.0
GHSA-p5ch-w78f-xh44
2021-04-22T22:45:24Z
2022-02-10T20:34:24Z
null
['CVE-2019-20903']
Cross-site scripting in @atlaskit/editor-core
The hyperlinks functionality in atlaskit/editor-core in before version 113.1.5 allows remote attackers to inject arbitrary HTML or JavaScript via a Cross-Site Scripting (XSS) vulnerability in link targets.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@atlaskit/editor-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 113.1.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20903'}, {'type': 'WEB', 'url': 'https://atlaskit.atlassian.com/packages/editor/editor-core/changelog/113.1.5'}, {'type': 'WEB', 'url': 'https://bitbucket.org/atlassian/atlaskit-mk-2/commits/ca88f616e4'}, {'type': 'WEB', 'url': 'https://confluence....
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T22:45:24Z', 'nvd_published_at': '2020-10-01T02:15:00Z'}
1.4.0
GHSA-wc4x-4gm2-74j8
2023-09-27T11:18:14Z
2022-02-10T20:51:04Z
null
['CVE-2019-10091']
Apache Geode SSL endpoint verification vulnerability
When TLS is enabled with ssl-endpoint-identification-enabled set to true, Apache Geode fails to perform hostname verification of the entries in the certificate SAN during the SSL handshake. This could compromise intra-cluster communication using a man-in-the-middle attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10091'}, {'type': 'WEB', 'url': 'https://github.com/apache/geode/pull/3849'}, {'type': 'WEB', 'url': 'https://github.com/apache/geode/commit/e57028fd62a2f5980ea6c9a7ab89ada06c828634'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/dis...
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T21:28:10Z', 'nvd_published_at': '2020-03-16T14:15:00Z'}
1.4.0
GHSA-6445-fm66-fvq2
2022-02-11T17:05:20Z
2022-02-09T23:39:11Z
null
['CVE-2022-23568']
Integer overflows in Tensorflow
### Impact The [implementation of `AddManySparseToTensorsMap`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_tensors_map_ops.cc) is vulnerable to an integer overflow which results in a `CHECK`-fail when building new `TensorShape` objects (so, an a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6445-fm66-fvq2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23568'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a68f68061e263a88321c104a6c911fe5598050a8'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T21:12:07Z', 'nvd_published_at': '2022-02-03T12:15:00Z'}
1.4.0
GHSA-jc35-q369-45pv
2022-02-08T22:01:20Z
2022-02-09T22:51:56Z
null
['CVE-2020-17530']
Remote code execution in Apache Struts
Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.struts:struts2-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.5.26'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17530'}, {'type': 'WEB', 'url': 'https://cwiki.apache.org/confluence/display/WW/S2-061'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210115-0005/'}, {'type': 'WEB', 'url': 'https://www.oracle.com//security-alerts/cpujul2021...
{'cwe_ids': ['CWE-917', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T21:42:05Z', 'nvd_published_at': '2020-12-11T02:15:00Z'}
1.4.0
GHSA-mqgv-67vx-g4m5
2023-09-05T22:43:18Z
2022-02-09T22:45:52Z
null
['CVE-2020-28442']
Prototype Pollution in js-data
All versions of package js-data prior to 3.0.10 are vulnerable to Prototype Pollution via the `deepFillIn` function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'js-data'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28442'}, {'type': 'WEB', 'url': 'https://github.com/js-data/js-data/pull/574'}, {'type': 'WEB', 'url': 'https://github.com/js-data/js-data/commit/2d9eed5d3e9710d7e7fecc6f6437c39fe73a4097'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSDAT...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T21:12:54Z', 'nvd_published_at': '2020-12-15T08:15:00Z'}
1.4.0
GHSA-579h-mv94-g4gp
2021-05-20T20:40:04Z
2022-02-15T01:57:18Z
null
['CVE-2018-1002105']
Privilege Escalation in Kubernetes
In all Kubernetes versions prior to v1.10.11, v1.11.5, and v1.12.3, incorrect handling of error responses to proxied upgrade requests in the kube-apiserver allowed specially crafted requests to establish a connection through the Kubernetes API server to backend servers, then send arbitrary requests over the same connec...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fi...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002105'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/71411'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/commit/2257c1ecbe3c0cf71dd50b82752ae189c94ec905'}, {'type': 'WEB', 'url': 'https://access.r...
{'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:40:04Z', 'nvd_published_at': None}
1.4.0
GHSA-mjvc-j6rv-9xj8
2022-02-24T21:47:33Z
2022-02-24T00:00:54Z
null
['CVE-2022-0721']
Insertion of Sensitive Information Into Debugging Code in Microweber
Microweber prior to 1.3 may expose sensitive information about a server and a user when running the server in debug mode.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0721'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/b12e1a490c79460bff019f34b2e17112249b16ec'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a...
{'cwe_ids': ['CWE-215'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T21:47:33Z', 'nvd_published_at': '2022-02-23T11:15:00Z'}
1.4.0
GHSA-cmx4-p4v5-hmr5
2022-02-08T22:03:08Z
2022-02-09T00:46:46Z
null
['CVE-2019-17566']
Server-side request forgery (SSRF) in Apache Batik
Apache Batik is vulnerable to server-side request forgery, caused by improper input validation by the "xlink:href" attributes. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17566'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/bc6078ca949039e2076cd08b4cb169c84c1179b1'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/xmlgraphics-batik'}, {'type': 'WEB', 'url': 'https://issues.apache...
{'cwe_ids': ['CWE-20', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T20:43:02Z', 'nvd_published_at': '2020-11-12T18:15:00Z'}
1.4.0
GHSA-wgx7-jwwm-cgjv
2021-06-15T18:10:01Z
2022-02-10T23:05:20Z
null
['CVE-2020-9480']
Improper Authentication in Apache Spark
In Apache Spark 2.4.5 and earlier, a standalone resource manager's master may be configured to require authentication (spark.authenticate) via a shared secret. When enabled, however, a specially-crafted RPC to the master can succeed in starting an application's resources on the Spark cluster, even without the shared ke...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-parent_2.11'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9480'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r03ad9fe7c07d6039fba9f2152d345274473cb0af3d8a4794a6645f4b@%3Cuser.spark.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra0e62a18ad080c4ce6df5e0202a2...
{'cwe_ids': ['CWE-287', 'CWE-306'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T21:39:30Z', 'nvd_published_at': '2020-06-23T22:15:00Z'}
1.4.0
GHSA-fr6q-jv7j-35g3
2022-02-07T19:12:42Z
2022-02-02T00:01:46Z
null
['CVE-2022-0401']
Path Traversal in w-zip
Path Traversal in NPM w-zip prior to 1.0.12.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'w-zip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0401'}, {'type': 'WEB', 'url': 'https://github.com/yuda-lyu/w-zip/commit/d7039d034e02fa358e6656565157cedf5fa83288'}, {'type': 'PACKAGE', 'url': 'https://github.com/yuda-lyu/w-zip'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d93259aa-ad03-4...
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:50:03Z', 'nvd_published_at': '2022-02-01T13:15:00Z'}
1.4.0
GHSA-3qpg-33wr-533j
2022-04-20T19:13:59Z
2022-02-12T00:00:37Z
null
['CVE-2021-46365']
Improper Restriction of XML External Entity Reference in Magnolia CMS
An issue in the Export function of Magnolia v6.2.3 and below allows attackers to execute arbitrary code via a crafted XLF file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'info.magnolia:magnolia-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46365'}, {'type': 'WEB', 'url': 'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory'}, {'type': 'WEB', 'url': 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46365...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:44:02Z', 'nvd_published_at': '2022-02-11T21:15:00Z'}
1.4.0
GHSA-c7f6-4vx5-4263
2021-05-03T17:25:30Z
2022-02-10T20:46:21Z
null
['CVE-2020-15839']
Unrestricted Upload of File with Dangerous Type in Liferay Portal and Liferay DXP
Liferay Portal before 7.3.3, and Liferay DXP 7.1 before fix pack 18 and 7.2 before fix pack 6, does not restrict the size of a multipart/form-data POST action, which allows remote authenticated users to conduct denial-of-service attacks by uploading large files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.dxp.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.10.fp18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.1.10.fp17'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:r...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15839'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17029'}, {'type': 'WEB', 'url': 'https://issues.liferay.com/browse/LPE-17055'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities'}, {'type...
{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T17:25:30Z', 'nvd_published_at': '2020-09-22T18:15:00Z'}
1.4.0
GHSA-rgp5-m2pq-3fmg
2022-02-23T19:28:54Z
2022-02-20T00:00:31Z
null
['CVE-2022-0690']
Cross-site Scripting in microweber
microweber prior to version 1.2.11 is vulnerable to cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0690'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/f7f5d41ba1a08ceed37c00d5f70a3f48b272e9f2'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T19:28:54Z', 'nvd_published_at': '2022-02-19T17:15:00Z'}
1.4.0
GHSA-hgjh-723h-mx2j
2022-03-03T19:19:03Z
2022-02-21T00:00:21Z
null
['CVE-2022-0686']
Authorization Bypass Through User-Controlled Key in url-parse
url-parse prior to version 1.5.8 is vulnerable to Authorization Bypass Through User-Controlled Key.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'url-parse'}, 'ecosystem_specific': {'affected_functions': ['url-parse.Url']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0686'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/url-parse/commit/d5c64791ef496ca5459ae7f2176a31ea53b127e5'}, {'type': 'PACKAGE', 'url': 'https://github.com/unshiftio/url-parse'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/55fd0...
{'cwe_ids': ['CWE-639'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T21:26:48Z', 'nvd_published_at': '2022-02-20T13:15:00Z'}
1.4.0
GHSA-9gwq-6cwj-47h3
2022-02-11T15:08:44Z
2022-02-09T23:52:24Z
null
['CVE-2022-23558']
Integer overflow in TFLite array creation
### Impact An attacker can craft a TFLite model that would cause an integer overflow [in `TfLiteIntArrayCreate`](https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/c/common.c#L53-L60): ```cc TfLiteIntArray* TfLiteIntArrayCreate(int size) { int alloc_size = TfLiteI...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9gwq-6cwj-47h3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23558'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a1e1511dde36b3f8aa27a6ec630838e7ea40e091'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:30:33Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-jpj4-5xwp-cv23
2021-04-08T21:00:19Z
2022-02-09T22:44:54Z
null
['CVE-2020-11974']
Remote code execution in DolphinScheduler
In DolphinScheduler 1.2.0 and 1.2.1, with mysql connectorj a remote code execution vulnerability exists when choosing mysql as database.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11974'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0de5e3d5516467c9429a8d4356eca17ccf156337345ac6b104748acb@%3Ccommits.dolphinscheduler.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r33452d7b99a29...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T21:00:19Z', 'nvd_published_at': '2020-12-18T21:15:00Z'}
1.4.0
GHSA-8ffc-79xg-29w8
2022-08-11T19:20:55Z
2022-02-12T00:00:48Z
null
['CVE-2021-44521']
Apache Cassandra vulnerable to Code Injection due to unsafe configuration
When running Apache Cassandra with the following configuration: enable_user_defined_functions: true enable_scripted_user_defined_functions: true enable_user_defined_functions_threads: false it is possible for an attacker to execute arbitrary code on the host. The attacker would need to have enough permissions to create...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cassandra:cassandra-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.26'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cassandra:cassandra-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44521'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/cassandra'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/CASSANDRA-17352'}, {'type': 'WEB', 'url': 'https://jfrog.com/blog/cve-2021-44521-exploiting-apache-cassandra-u...
{'cwe_ids': ['CWE-732', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T16:10:04Z', 'nvd_published_at': '2022-02-11T13:15:00Z'}
1.4.0
GHSA-r8rm-4hfj-2x87
2021-04-22T16:58:02Z
2022-02-10T20:23:28Z
null
['CVE-2020-26882']
Data Amplification in Play Framework
In Play Framework 2.6.0 through 2.8.2, data amplification can occur when an application accepts multipart/form-data JSON input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.3'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26882'}, {'type': 'WEB', 'url': 'https://github.com/playframework/playframework/pull/10495'}, {'type': 'WEB', 'url': 'https://www.playframework.com/security/vulnerability/CVE-2020-26882-JsonParseDataAmplification'}]
{'cwe_ids': ['CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T16:58:02Z', 'nvd_published_at': '2020-11-06T14:15:00Z'}
1.4.0
GHSA-88cc-g835-76rp
2022-02-10T00:30:07Z
2022-02-10T00:30:07Z
null
['CVE-2020-13692']
Improper Restriction of XML External Entity Reference
PostgreSQL JDBC Driver (aka PgJDBC) before 42.2.13 allows XXE.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '42.2.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13692'}, {'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/commit/14b62aca4764d496813f55a43d050b017e01eb65'}, {'type': 'WEB', 'url': 'https://jdbc.postgresql.org/documentation/changelog.html#version_42.2.13'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T21:31:45Z', 'nvd_published_at': '2020-06-04T16:15:00Z'}
1.4.0
GHSA-j57w-3c39-gpp5
2022-02-25T15:23:16Z
2022-02-17T00:00:35Z
null
['CVE-2022-0611']
Improper Privilege Management in Snipe-IT
An unprivileged user of Snipe-IT prior to version 5.3.11 can create maintenance for an asset. Version 5.3.11 contains a patch for this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0611'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/321be4733d3997fc738f0118e1b9af5905f95439'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7b7447fc-f1b0-4...
{'cwe_ids': ['CWE-269', 'CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T15:23:16Z', 'nvd_published_at': '2022-02-16T00:15:00Z'}
1.4.0
GHSA-4v6p-cxf9-98rf
2022-03-07T19:35:30Z
2022-02-25T00:01:05Z
null
['CVE-2022-24614']
Allocation of Resources Without Limits or Throttling in metadata-extractor
When reading a specially crafted JPEG file, metadata-extractor up to 2.16.0 can be made to allocate large amounts of memory that finally leads to an out-of-memory error even for very small inputs. This could be used to mount a denial of service attack against services that use metadata-extractor library.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.drewnoakes:metadata-extractor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24614'}, {'type': 'WEB', 'url': 'https://github.com/drewnoakes/metadata-extractor/issues/561'}, {'type': 'PACKAGE', 'url': 'https://github.com/drewnoakes/metadata-extractor'}]
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T19:35:30Z', 'nvd_published_at': '2022-02-24T15:15:00Z'}
1.4.0
GHSA-p7w9-8mxw-p3g7
2022-03-01T18:36:44Z
2022-02-17T00:00:26Z
null
['CVE-2022-22885']
Improper Certificate Validation in Hutool
Hutool v5.7.18's HttpRequest was discovered to ignore all TLS/SSL certificate validation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22885'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/issues/2042'}, {'type': 'WEB', 'url': 'https://apidoc.gitee.com/dromara/hutool/cn/hutool/http/ssl/DefaultSSLInfo.html'}, {'type': 'PACKAGE', 'url': 'https://github.com/dromara/hutoo...
{'cwe_ids': ['CWE-295'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-17T23:30:58Z', 'nvd_published_at': '2022-02-16T22:15:00Z'}
1.4.0
GHSA-fqx8-v33p-4qcc
2022-03-09T23:27:04Z
2022-02-14T22:54:18Z
null
['CVE-2022-23638']
Cross-site Scripting in enshrined/svg-sanitize
### Impact SVG sanitizer library before version `0.15.0` did not remove HTML elements wrapped in a CDATA section. As a result, SVG content embedded in HTML (fetched as `text/html`) was susceptible to cross-site scripting. Plain SVG files (fetched as `image/svg+xml`) were not affected. ### Patches This issue is fixed i...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'enshrined/svg-sanitize'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/darylldoyle/svg-sanitizer/security/advisories/GHSA-fqx8-v33p-4qcc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23638'}, {'type': 'WEB', 'url': 'https://github.com/darylldoyle/svg-sanitizer/issues/71'}, {'type': 'WEB', 'url': 'https://github.com/da...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:54:18Z', 'nvd_published_at': '2022-02-14T21:15:00Z'}
1.4.0
GHSA-5hfv-mg5x-mv32
2023-05-31T17:26:33Z
2022-02-16T00:01:33Z
null
['CVE-2022-25178']
Improper Limitation of a Pathname to a Restricted Directory in Jenkins Pipeline: Shared Groovy Libraries Plugin
Jenkins Pipeline: Shared Groovy Libraries Plugin does not restrict the names of resources passed to the libraryResource step, allowing attackers able to configure Pipelines permission to read arbitrary files on the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps-global-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.22'}, {'fixed': '561.va_ce0de3c2d69'}]}], 'database_specific': {'last_known_affected_version_range': '<= 552.vd9cc05b8a2e1'}}, {'package': {'ecosystem': '...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25178'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/workflow-cps-global-lib-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:46:58Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-2hjr-fg6c-v2h6
2021-03-29T22:59:44Z
2022-02-09T00:33:56Z
null
['CVE-2020-12668']
Unauthorized access to Class instance in Jinjava
Jinjava before 2.5.4 allow access to arbitrary classes by calling Java methods on objects passed into a Jinjava context. This could allow for abuse of the application class loader, including Arbitrary File Disclosure.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.hubspot.jinjava:jinjava'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12668'}, {'type': 'WEB', 'url': 'https://github.com/HubSpot/jinjava/pull/426/commits/5dfa5b87318744a4d020b66d5f7747acc36b213b'}, {'type': 'WEB', 'url': 'https://github.com/HubSpot/jinjava/pull/435/commits/1b9aaa4b420c58b4a301cf4b7d26207f1c8d1165'},...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T22:59:44Z', 'nvd_published_at': '2021-02-19T23:15:00Z'}
1.4.0
GHSA-vc3x-gx6c-g99f
2023-02-07T22:07:35Z
2022-02-15T01:57:18Z
null
['CVE-2018-18206']
Denial of Service in Bytom
In the client in Bytom before 1.0.6, checkTopicRegister in p2p/discover/net.go does not prevent negative idx values, leading to a crash.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/bytom/bytom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-18206'}, {'type': 'WEB', 'url': 'https://github.com/Bytom/bytom/pull/1307'}, {'type': 'WEB', 'url': 'https://github.com/Bytom/bytom/commit/1ac3c8ac4f2b1e1df9675228290bda6b9586ba42'}, {'type': 'PACKAGE', 'url': 'https://github.com/Bytom/bytom'}, {'t...
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T18:55:02Z', 'nvd_published_at': None}
1.4.0
GHSA-fmfv-x8mp-5767
2022-03-01T21:17:52Z
2022-02-18T00:00:37Z
null
['CVE-2022-25271']
Improper input validation in Drupal core
Drupal core's form API has a vulnerability where certain contributed or custom modules' forms may be vulnerable to improper input validation. This could allow an attacker to inject disallowed values or overwrite data. Affected forms are uncommon, but in certain cases an attacker could alter critical or sensitive data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '9.2.13'}]}]}, {'pack...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25271'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HVKIOWSXL2RF2ULNAP7PHESYCFSZIJE3/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-ann...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:12:06Z', 'nvd_published_at': '2022-02-16T23:15:00Z'}
1.4.0
GHSA-g8jj-899q-8x3j
2021-05-13T19:52:04Z
2022-02-10T23:04:13Z
null
['CVE-2020-13973']
Cross-site scripting in json-sanitizer
OWASP json-sanitizer before 1.2.1 allows XSS. An attacker who controls a substring of the input JSON, and controls another substring adjacent to a SCRIPT element in which the output is embedded as JavaScript, may be able to confuse the HTML parser as to where the SCRIPT element ends, and cause non-script content to be ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.mikesamuel:json-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13973'}, {'type': 'WEB', 'url': 'https://github.com/OWASP/json-sanitizer/pull/20'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T19:52:04Z', 'nvd_published_at': '2020-06-09T04:15:00Z'}
1.4.0
GHSA-h9v8-rm3m-5h5f
2021-07-28T22:39:13Z
2022-02-10T23:47:47Z
null
['CVE-2020-7630']
OS Command Injection in git-add-remote
git-add-remote through 1.0.0 is vulnerable to Command Injection. It allows execution of arbitrary commands via the name argument.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'git-add-remote'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7630'}, {'type': 'WEB', 'url': 'https://github.com/jonschlinkert/git-add-remote/blob/master/index.js#L21,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GITADDREMOTE-564269'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T18:22:19Z', 'nvd_published_at': '2020-04-02T22:15:00Z'}
1.4.0
GHSA-fhfh-6cjg-57rg
2022-12-02T20:00:03Z
2022-02-16T00:01:25Z
null
['CVE-2022-25192']
Jenkins Snow Commander Plugin 2.0 vulnerable to Cross-Site Request Forgery
A cross-site request forgery (CSRF) vulnerability in Jenkins Snow Commander Plugin 2.0 and earlier allows attackers to connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:embotics-vcommander'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25192'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/snowsoftware-commander-plugin/commit/4fb4e68e8e7be3168721a06ad08b263252c276f1'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/snowsoftware-commander-plugin'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:16:40Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-38w8-h222-wrpp
2022-12-01T22:12:02Z
2022-02-16T00:01:14Z
null
['CVE-2022-25209']
Improper Restriction of XML External Entity Reference in Jenkins Chef Sinatra
Chef Sinatra Plugin 1.20 and earlier does not perform a permission check in a method implementing form validation. As the plugin does not configure its XML parser to prevent XML external entity (XXE) attacks, attackers can have Jenkins parse a crafted XML response that uses external entities for extraction of secrets ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sinatra-chef-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25209'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1377'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:45:12Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-rcwj-2hj2-vmjj
2022-02-09T00:23:06Z
2022-02-09T00:23:06Z
null
['CVE-2020-9482']
Insufficient Session Expiration in Apache NiFi Registry
If NiFi Registry 0.1.0 to 0.5.0 uses an authentication mechanism other than PKI, when the user clicks Log Out, NiFi Registry invalidates the authentication token on the client side but not on the server side. This permits the user's client-side token to be used for up to 12 hours after logging out to make API requests ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nifi.registry:nifi-registry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'fixed': '0.7.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.5.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9482'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi-registry/pull/277/files/9f7f1c1b1095e3facdaa986435fa94eff78627dd'}, {'type': 'WEB', 'url': 'https://github.com/apache/nifi-registry/commit/2881e29dce3a179f3e56069b82ef8cbb7bd8d85c'}, {'...
{'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-29T18:36:05Z', 'nvd_published_at': '2020-04-28T19:15:00Z'}
1.4.0
GHSA-53m6-44rc-h2q5
2022-03-08T18:23:38Z
2022-02-24T13:09:30Z
null
['CVE-2022-23655']
Missing server signature validation in OctoberCMS
### Impact This advisory affects authors of plugins and themes listed on the October CMS marketplace where an end-user will inadvertently expose authors to potential financial loss by entering their private license key into a compromised server. It has been disclosed that a project fork of October CMS v1.0 is using a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.475'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-53m6-44rc-h2q5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23655'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/e3b455ad587282f0fbcb7763c6d9c3d000ca1e6a'}, {'type': 'PACKAGE', '...
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T13:09:30Z', 'nvd_published_at': '2022-02-24T00:15:00Z'}
1.4.0
GHSA-hj8g-cw8x-2c6m
2022-02-24T21:51:08Z
2022-02-24T00:00:53Z
null
['CVE-2022-0719']
Cross-site Scripting in Microweber
Microweber prior to version 1.3 is vulnerable to reflected cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0719'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/a5925f74d39775771d4c37c8d4c1acbb762fda0a'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T21:51:08Z', 'nvd_published_at': '2022-02-23T11:15:00Z'}
1.4.0
GHSA-g7v2-2qxx-wjrw
2021-05-20T16:33:03Z
2022-02-15T01:18:02Z
null
['CVE-2015-3627']
Symlink Attack in Libcontainer and Docker Engine
Libcontainer and Docker Engine before 1.6.1 opens the file-descriptor passed to the pid-1 process before performing the chroot, which allows local users to gain privileges via a symlink attack in an image.
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3627'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker/commit/d5ebb60bddbabea0439213501f4f6ed494b23cba'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ'}, {'type'...
{'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:33:03Z', 'nvd_published_at': None}
1.4.0
GHSA-m4hg-5p2m-fm5m
2022-02-23T22:13:17Z
2022-02-12T00:00:37Z
null
['CVE-2021-46361']
Arbitrary code execution in Magnolia CMS
An issue in the Freemark Filter of Magnolia CMS v6.2.11 and below allows attackers to bypass security restrictions and execute arbitrary code via a crafted FreeMarker payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'info.magnolia:magnolia-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46361'}, {'type': 'WEB', 'url': 'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.12.html#_security_advisory'}, {'type': 'WEB', 'url': 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-4636...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:43:02Z', 'nvd_published_at': '2022-02-11T21:15:00Z'}
1.4.0
GHSA-vjg4-v33c-ggc4
2022-02-09T18:29:45Z
2022-02-09T18:29:45Z
null
['CVE-2022-21730']
Out of bounds read in Tensorflow
### Impact The [implementation of `FractionalAvgPoolGrad`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_avg_pool_op.cc#L209-L360) does not consider cases where the input tensors are invalid allowing an attacker to read from outside of bounds ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vjg4-v33c-ggc4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21730'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/002408c3696b173863228223d535f9de72a101a9'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T18:36:19Z', 'nvd_published_at': '2022-02-03T11:15:00Z'}
1.4.0
GHSA-m4jx-6526-vvhm
2021-05-12T20:38:22Z
2022-02-15T01:57:18Z
null
['CVE-2020-28466']
Denial of service in github.com/nats-io/nats-server/server
This affects all versions of package github.com/nats-io/nats-server/server. Untrusted accounts are able to crash the server using configs that represent a service export/import cycles. Disclaimer from the maintainers - Running a NATS service which is exposed to untrusted users presents a heightened risk. Any remote exe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server/v2/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28466'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/pull/1731'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/pull/1731/commits/2e3c22672936f4980d343fb1d328b38919e74796'}, {'type': 'WEB', 'url': 'https://snyk.i...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T20:38:22Z', 'nvd_published_at': None}
1.4.0
GHSA-qc84-gqf4-9926
2022-08-11T21:55:33Z
2022-02-16T22:36:21Z
null
['CVE-2022-23639']
crossbeam-utils Race Condition vulnerability
### Impact The affected version of this crate incorrectly assumed that the alignment of `{i,u}64` was always the same as `Atomic{I,U}64`. However, the alignment of `{i,u}64` on a 32-bit target can be smaller than `Atomic{I,U}64`. This can cause the following problems: - Unaligned memory accesses - Data race Crate...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'crossbeam-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-qc84-gqf4-9926'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23639'}, {'type': 'WEB', 'url': 'https://github.com/crossbeam-rs/crossbeam/pull/781'}, {'type': 'PACKAGE', 'url': 'https://github.com/cross...
{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:36:21Z', 'nvd_published_at': '2022-02-15T19:15:00Z'}
1.4.0
GHSA-c6fh-56w7-fvjw
2022-02-09T18:29:13Z
2022-02-09T18:29:13Z
null
['CVE-2022-21727']
Integer overflow in Tensorflow
### Impact The [implementation of shape inference for `Dequantize`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L3001-L3034) is vulnerable to an integer overflow weakness: ```python import tensorflow as tf input = tf.constant([1,1],dtype=tf....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c6fh-56w7-fvjw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21727'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/b64638ec5ccaa77b7c1eb90958e3d85ce381f91b'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T18:12:51Z', 'nvd_published_at': '2022-02-03T11:15:00Z'}
1.4.0
GHSA-6m4r-m3gc-h4r5
2021-07-28T22:39:48Z
2022-02-10T23:48:06Z
null
['CVE-2020-7629']
OS Command Injection in install-package
install-package through 0.4.0 is vulnerable to Command Injection. It allows execution of arbitrary commands via the options argument.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'install-package'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7629'}, {'type': 'WEB', 'url': 'https://github.com/1000ch/install-package/blob/master/index.js#L82,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-INSTALLPACKAGE-564267'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T18:31:42Z', 'nvd_published_at': '2020-04-02T22:15:00Z'}
1.4.0
GHSA-43jf-985q-588j
2022-02-11T20:31:29Z
2022-02-09T23:27:08Z
null
['CVE-2022-23586']
Multiple `CHECK`-fails in `function.cc` in TensowFlow
### Impact A malicious user can cause a denial of service by altering a `SavedModel` such that [assertions in `function.cc`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/function.cc) would be falsified and crash the Python interpreter. ### Patches We h...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-43jf-985q-588j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23586'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3d89911481ba6ebe8c88c1c0b595412121e6c645'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T19:03:45Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-98j8-c9q4-r38g
2022-02-11T17:04:38Z
2022-02-10T00:20:51Z
null
['CVE-2022-21733']
Memory exhaustion in Tensorflow
### Impact The [implementation of `StringNGrams`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/string_ngrams_op.cc#L29-L161) can be used to trigger a denial of service attack by causing an OOM condition after an integer overflow: ```python import tenso...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-98j8-c9q4-r38g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21733'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f68fdab93fb7f4ddb4eb438c8fe052753c9413e8'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-190', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T19:23:04Z', 'nvd_published_at': '2022-02-03T12:15:00Z'}
1.4.0
GHSA-52rg-hpwq-qp56
2021-04-01T21:20:47Z
2022-02-09T00:56:51Z
null
['CVE-2020-10758']
Allocation of Resources Without Limits or Throttling in Keycloak
A vulnerability was found in Keycloak before 11.0.1 where DoS attack is possible by sending twenty requests simultaneously to the specified keycloak server, all with a Content-Length header value that exceeds the actual byte count of the request body.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10758'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/bee4ca89897766c4b68856eafe14f1a3dad34251'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1843849'}]
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T21:20:47Z', 'nvd_published_at': '2020-09-16T16:15:00Z'}
1.4.0
GHSA-2pmw-cvc7-frvh
2022-03-01T22:02:53Z
2022-02-18T00:00:34Z
null
['CVE-2021-44868']
SQL injection in MCMS
A problem was found in ming-soft MCMS v5.1. There is a sql injection vulnerability in /ms/cms/content/list.do
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44868'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/58'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:36:49Z', 'nvd_published_at': '2022-02-17T16:15:00Z'}
1.4.0
GHSA-c597-f74m-jgc2
2021-04-01T21:57:32Z
2022-02-09T00:56:26Z
null
['CVE-2020-1758']
Improper Certificate Validation and Improper Validation of Certificate with Host Mismatch in Keycloak
A flaw was found in Keycloak in versions before 10.0.0, where it does not perform the TLS hostname verification while sending emails using the SMTP server. This flaw allows an attacker to perform a man-in-the-middle (MITM) attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1758'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1758'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/KEYCLOAK-13285'}]
{'cwe_ids': ['CWE-295', 'CWE-297'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T21:57:32Z', 'nvd_published_at': '2020-05-15T19:15:00Z'}
1.4.0
GHSA-xwv6-v7qx-f5jc
2022-03-04T21:37:26Z
2022-02-19T00:01:25Z
null
['CVE-2022-25337']
Code injection in ezsystems/ezpublish-kernel
When image files are uploaded, they are made accessible under a name similar to the original file name. There are two issues with this. Both require access to uploading images in order to exploit them, this limits the impact. The first issue is that certain injection attacks can be possible, since not all possible atta...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'ezsystems/ezpublish-kernel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.5.0'}, {'fixed': '7.5.26'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25337'}, {'type': 'WEB', 'url': 'https://developers.ibexa.co/security-advisories/ibexa-sa-2022-001-image-filenames-sanitization'}, {'type': 'PACKAGE', 'url': 'https://github.com/ezsystems/ezpublish-kernel'}]
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-04T21:37:26Z', 'nvd_published_at': '2022-02-18T18:15:00Z'}
1.4.0
GHSA-hj93-5fg3-3chr
2022-08-18T19:07:23Z
2022-02-25T00:01:01Z
null
['CVE-2022-24687']
HashiCorp Consul Ingress Gateway Panic Can Shutdown Servers
HashiCorp Consul and Consul Enterprise 1.8.0 through 1.9.14, 1.10.7, and 1.11.2 has Uncontrolled Resource Consumption. Clusters with at least one ingress gateway configured may allow a user with `service:write` permission to register a specifically-defined service that can cause the Consul server to panic and shutdown....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '1.9.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.14'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24687'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-05-consul-ingress-gateway-panic-can-shutdown-servers/'}, {'type': 'PACKAGE', 'url': 'https://github.com/hashicorp/c...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:07:23Z', 'nvd_published_at': '2022-02-24T16:15:00Z'}
1.4.0
GHSA-74mg-6xqx-2vrq
2021-04-06T22:54:20Z
2022-02-09T22:27:01Z
null
['CVE-2020-11995']
Deserialization exploitation in Apache Dubbo
A deserialization vulnerability existed in dubbo 2.7.5 and its earlier versions, which could lead to malicious code execution. Most Dubbo users use Hessian2 as the default serialization/deserialization protool, during Hessian2 deserializing the HashMap object, some functions in the classes stored in HashMap will be exe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11995'}, {'type': 'WEB', 'url': 'https://github.com/apache/dubbo/commit/d2e9baf380108950c48e0ab700ccdbf11dd753ab'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r5b2df4ef479209dc4ced457b3d58a887763b60b9354c3dc148b2eb5b%40%3Cdev.dubb...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T22:54:20Z', 'nvd_published_at': '2021-01-11T10:15:00Z'}
1.4.0
GHSA-qq97-vm5h-rrhg
2023-02-09T15:29:32Z
2022-02-08T18:53:56Z
null
[]
OCI Manifest Type Confusion Issue
### Impact Systems that rely on digest equivalence for image attestations may be vulnerable to type confusion. ### Patches Upgrade to at least `v2.8.0-beta.1` if you are running `v2.x` release. If you use the code from the `main` branch, update at least to the commit after [b59a6f827947f9e0e67df0cfb571046de4733586]...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/distribution'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/distribution/distribution/security/advisories/GHSA-qq97-vm5h-rrhg'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/image-spec/pull/411'}, {'type': 'WEB', 'url': 'https://github.com/distribution/distribution/commit/b59a6f827947f9e0e67df0cfb571046de4733586'}, {'type...
{'cwe_ids': ['CWE-843'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-02-08T18:53:56Z', 'nvd_published_at': None}
1.4.0
GHSA-8w94-cf6g-c8mg
2021-10-05T16:31:02Z
2022-02-15T01:57:18Z
null
['CVE-2014-5277']
Man-in-the-Middle (MitM)
Docker before 1.3.1 and docker-py before 0.5.3 fall back to HTTP when the HTTPS connection to the registry fails, which allows man-in-the-middle attackers to conduct downgrade attacks and obtain authentication and image data by leveraging a network position between the client and the registry to block HTTPS traffic.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-5277'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker/commit/8caacb18f8019dfda30d79c327397e5f5783c068'}, {'type': 'PACKAGE', 'url': 'https://github.com/docker/docker'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!topic/dock...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T21:41:48Z', 'nvd_published_at': None}
1.4.0
GHSA-fmj2-7wx8-qj4v
2022-01-06T19:58:58Z
2022-02-09T00:45:56Z
null
['CVE-2020-11988']
Server-side request forgery (SSRF) in Apache XmlGraphics Commons
Apache XmlGraphics Commons 2.4 is vulnerable to server-side request forgery, caused by improper input validation by the XMPParser. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:xmlgraphics-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11988'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-commons/commit/57393912eb87b994c7fed39ddf30fb778a275183'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/xmlgraphics-commons/'}, {'type': 'WEB', 'url': 'https://issues.a...
{'cwe_ids': ['CWE-20', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T20:37:35Z', 'nvd_published_at': '2021-02-24T18:15:00Z'}
1.4.0
GHSA-785x-qw4v-6872
2021-08-31T20:54:42Z
2022-02-09T22:00:08Z
null
['CVE-2020-14330']
Improper Output Neutralization and Improper Encoding or Escaping of Output for Logs in ansible
An Improper Output Neutralization for Logs flaw was found in Ansible when using the uri module, where sensitive data is exposed to content and json output. This flaw allows an attacker to access the logs or outputs of performed tasks to read keys used in playbooks from other users within the uri module. The highest thr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14330'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/68400'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14330'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WE...
{'cwe_ids': ['CWE-116', 'CWE-117', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T16:14:01Z', 'nvd_published_at': '2020-09-11T18:15:00Z'}
1.4.0
GHSA-f7c7-j99h-c22f
2022-06-21T20:09:56Z
2022-02-08T00:00:56Z
null
['CVE-2021-41496']
Buffer Copy without Checking Size of Input in NumPy
Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy < 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'numpy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.18.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41496'}, {'type': 'WEB', 'url': 'https://github.com/numpy/numpy/issues/19000'}, {'type': 'PACKAGE', 'url': 'https://github.com/numpy/numpy'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'}]
{'cwe_ids': ['CWE-120'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:09:56Z', 'nvd_published_at': '2021-12-17T20:15:00Z'}