schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-vhm6-gw82-6f8j | 2022-03-08T18:06:06Z | 2022-02-28T00:00:34Z | null | ['CVE-2022-0772'] | Cross site scripting in LibreNMS | LibreNMS prior to version 22.2.2 is vulnerable to cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0772'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/703745d0ed3948623153117d761ce48514e2f281'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/faae29bd-... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:02:41Z', 'nvd_published_at': '2022-02-27T22:15:00Z'} |
1.4.0 | GHSA-34wx-x2w9-vqm3 | 2022-11-29T23:30:39Z | 2022-02-10T00:00:30Z | null | ['CVE-2022-0538'] | DoS vulnerability in bundled XStream library in Jenkins Core | Jenkins 2.333 and earlier, LTS 2.319.2 and earlier is affected by the XStream library’s vulnerability [CVE-2021-43859](https://x-stream.github.io/CVE-2021-43859.html). This library is used by Jenkins to serialize and deserialize various XML files, like global and job `config.xml`, `build.xml`, and numerous others.
Thi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.320'}, {'fixed': '2.334'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0538'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-09/#SECURITY-2602'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/02/09/1'}] | {'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:50:31Z', 'nvd_published_at': '2022-02-09T14:15:00Z'} |
1.4.0 | GHSA-q234-x887-9rxh | 2023-05-30T19:35:37Z | 2022-02-16T00:01:35Z | null | ['CVE-2022-25177'] | Improper Link Resolution Before File Access in Jenkins Pipeline: Shared Groovy Libraries Plugin | Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier follows symbolic links to locations outside of the expected Pipeline library when reading files using the libraryResource step, allowing attackers able to configure Pipelines to read arbitrary files on the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps-global-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.22'}, {'fixed': '561.va_ce0de3c2d69'}]}], 'database_specific': {'last_known_affected_version_range': '<= 552.vd9cc05b8a2e1'}}, {'package': {'ecosystem': '... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25177'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/workflow-cps-global-lib-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613'}] | {'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:46:46Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-742w-89gc-8m9c | 2022-02-11T23:27:39Z | 2022-02-11T23:27:39Z | null | ['CVE-2020-15157'] | containerd v1.2.x can be coerced into leaking credentials during image pull | ## Impact
If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the defa... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.14'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-742w-89gc-8m9c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15157'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/1ead8d9deb3b175bf40413b8c47b3d19c2262726'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T17:51:17Z', 'nvd_published_at': '2020-10-16T17:15:00Z'} |
1.4.0 | GHSA-23h5-8ph6-7rfc | 2022-12-01T23:05:05Z | 2022-02-16T00:01:27Z | null | ['CVE-2022-25188'] | Path traversal vulnerability in Jenkins Fortify Plugin | Fortify Plugin 20.2.34 and earlier does not sanitize the `appName` and `appVersion` parameters of its Pipeline steps, which are used to write to files inside build directories.
This allows attackers with Item/Configure permission to write or overwrite `.xml` files on the Jenkins controller file system with content not... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:fortify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.2.35'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25188'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/fortify-plugin/commit/ba3030cb63bb86b6bb13342664e0e319f2fee374'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/fortify-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.i... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T23:05:05Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-c58c-w527-h77p | 2022-02-23T22:11:56Z | 2022-02-12T00:00:48Z | null | ['CVE-2022-24289'] | Deserialization of untrusted data in Apache Cayenne | Hessian serialization is a network protocol that supports object-based transmission. Apache Cayenne's optional Remote Object Persistence (ROP) feature is a web services-based technology that provides object persistence and query functionality to 'remote' applications. In Apache Cayenne 4.1 and earlier, running on non-c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cayenne:cayenne-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24289'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/zthjy83t3o66x7xcbygn2vg3yjvlc9vc'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/02/11/1'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:48:21Z', 'nvd_published_at': '2022-02-11T13:15:00Z'} |
1.4.0 | GHSA-jrpg-35hw-m4p9 | 2022-02-14T23:01:26Z | 2022-02-09T00:00:29Z | null | ['CVE-2021-45327'] | Capture-replay in Gitea | Gitea is a project to help users set up a self-hosted Git service. Gitea before 1.11.2 is affected by Trusting HTTP Permission Methods on the Server Side when referencing the vulnerable admin or user API. This could allow a remote malicious user to execute arbitrary code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/go-gitea/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45327'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/10462'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/10465'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/10582'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-294'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T23:01:26Z', 'nvd_published_at': '2022-02-08T15:15:00Z'} |
1.4.0 | GHSA-gc7q-7vg3-h8gf | 2022-12-01T22:21:32Z | 2022-02-16T00:01:19Z | null | ['CVE-2022-25202'] | Stored Cross-site Scripting vulnerability in Jenkins Promoted Builds (Simple) Plugin | Jenkins Promoted Builds (Simple) Plugin 1.9 and earlier does not escape the name of custom promotion levels, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:promoted-builds-simple'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25202'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/promoted-builds-simple-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2334'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:21:32Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-jp55-vvmf-63mv | 2022-02-09T21:42:47Z | 2022-02-09T21:42:47Z | null | ['CVE-2022-23618'] | URL Redirection to Untrusted Site ('Open Redirect') | ### Impact
There's no protection against URL redirection to untrusted site, in particular some well known parameters (xredirect) can be used to perform such redirections.
### Patches
The problem has been patched in XWiki 12.10.7 and XWiki 13.3RC1.
### Workarounds
There's no known workaround for this issue.
### Refe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.10.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jp55-vvmf-63mv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23618'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/5251c02080466bf9fb55288f04a37671108f8096'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T21:42:47Z', 'nvd_published_at': '2022-02-09T21:15:00Z'} |
1.4.0 | GHSA-5pcf-vxm3-frph | 2022-12-01T22:24:53Z | 2022-02-16T00:01:20Z | null | ['CVE-2022-25200'] | CSRF vulnerability in Jenkins Checkmarx Plugin allow capturing credentials | Checkmarx Plugin 2022.1.2 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Additi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.checkmarx.jenkins:checkmarx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25200'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/checkmarx-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/checkmarx-plugin/releases/tag/Release_2022.1.3'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/adv... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:24:53Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-pf59-j7c2-rh6x | 2023-03-16T17:41:25Z | 2022-02-15T01:57:18Z | null | ['CVE-2020-13597'] | Exposure of Sensitive Information to an Unauthorized Actor and Insertion of Sensitive Information Into Sent Data in Calico | Clusters using Calico (version 3.14.0 and below), Calico Enterprise (version 2.8.2 and below), may be vulnerable to information disclosure if IPv6 is enabled but unused. A compromised pod with sufficient privilege is able to reconfigure the node’s IPv6 interface due to the node accepting route advertisement by default,... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/projectcalico/calico'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13597'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/91507'}, {'type': 'WEB', 'url': 'https://github.com/containernetworking/plugins/pull/484/'}, {'type': 'WEB', 'url': 'https://github.com/containernetworking/plugins/com... | {'cwe_ids': ['CWE-200', 'CWE-201'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-14T16:27:14Z', 'nvd_published_at': '2020-06-03T17:15:00Z'} |
1.4.0 | GHSA-8vq6-5f66-hp3r | 2022-03-07T13:41:24Z | 2022-02-26T00:00:44Z | null | ['CVE-2022-0746'] | Logic error in dolibarr/dolibarr | In dolibarr/dolibarr prior to 16.0 any low privileged users could update their login name which should only be updated by admin. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0746'}, {'type': 'WEB', 'url': 'https://github.com/dolibarr/dolibarr/commit/4973019630d51ad76b7c1a4141ec7a33053a7d21'}, {'type': 'PACKAGE', 'url': 'https://github.com/dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b812ea22-... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:41:50Z', 'nvd_published_at': '2022-02-25T09:15:00Z'} |
1.4.0 | GHSA-wc9w-wvq2-ffm9 | 2021-05-14T16:27:02Z | 2022-02-15T01:57:18Z | null | ['CVE-2020-13379'] | Server Side Request Forgery in Grafana | The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue that allows remote code execution. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N/E:F/RL:O/RC:C'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana/pkg/api/avatar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.1'}, {'fixed': '6.7.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana/pkg/api/avatar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduc... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13379'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/commit/ba953be95f0302c2ea80d23f1e5f2c1847365192'}, {'type': 'WEB', 'url': 'https://community.grafana.com/t/grafana-7-0-2-and-6-7-4-security-update/31408'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-14T16:27:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gf7x-2j2x-7f73 | 2022-02-09T21:41:46Z | 2022-02-09T21:41:46Z | null | ['CVE-2022-23617'] | Missing authorization in xwiki-platform | ### Impact
Any user with edit right can copy the content of a page it does not have access to by using it as template of a new page.
### Patches
It has been patched in XWiki 13.2CR1 and 12.10.6
### Workarounds
There is no workaround beside patching.
### References
https://jira.xwiki.org/browse/XWIKI-18430
### F... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gf7x-2j2x-7f73'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23617'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/30c52b01559b8ef5ed1035dac7c34aaf805764d5'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T21:41:46Z', 'nvd_published_at': '2022-02-09T21:15:00Z'} |
1.4.0 | GHSA-627q-g293-49q7 | 2022-02-11T20:38:56Z | 2022-02-07T22:01:24Z | null | ['CVE-2022-23580'] | Abort caused by allocating a vector that is too large in Tensorflow | ### Impact
During shape inference, TensorFlow can [allocate a large vector](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L788-L790) based on a value from a tensor controlled by the user:
```cc
const auto num_dims = Value(shape_dim... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-627q-g293-49q7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23580'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1361fb7e29449629e1df94d44e0427ebec8c83c7'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-1284', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T20:00:51Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-59x4-67mh-px54 | 2022-03-01T18:36:13Z | 2022-02-18T00:00:36Z | null | ['CVE-2022-24953'] | Crypt_GPG does not prevent additional options in GPG calls | The Crypt_GPG extension before 1.6.7 for PHP does not prevent additional options in GPG calls, which presents a risk for certain environments and GPG versions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pear/crypt_gpg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24953'}, {'type': 'WEB', 'url': 'https://github.com/pear/Crypt_GPG/commit/29c0fbe96d0d4063ecd5c9a4644cb65a7fb7cc4e'}, {'type': 'WEB', 'url': 'https://github.com/pear/Crypt_GPG/commit/74c8f989cefbe0887274b461dc56197e121bfd04'}, {'type': 'PACKAGE', '... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T18:14:03Z', 'nvd_published_at': '2022-02-17T05:15:00Z'} |
1.4.0 | GHSA-wxj7-97fp-j53j | 2022-02-07T21:20:28Z | 2022-02-01T00:46:01Z | null | ['CVE-2021-23484'] | Exposure of Resource to Wrong Sphere in Zip-Local | The package zip-local before 0.3.5 are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) which can lead to an extraction of a crafted file outside the intended extraction directory. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'zip-local'}, 'ecosystem_specific': {'affected_functions': ['zip-local.unzip', 'zip-local.sync.unzip']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23484'}, {'type': 'WEB', 'url': 'https://github.com/Mostafa-Samir/zip-local/commit/6bb9b59733df379ac168aa705790bd8339b4bf9b'}, {'type': 'WEB', 'url': 'https://github.com/Mostafa-Samir/zip-local/commit/949446a95a660c0752b1db0c654f0fd619ae6085'}, {'t... | {'cwe_ids': ['CWE-29', 'CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T19:55:36Z', 'nvd_published_at': '2022-01-28T22:15:00Z'} |
1.4.0 | GHSA-m6q5-wv4x-fv6h | 2022-02-25T15:33:47Z | 2022-02-12T00:00:47Z | null | ['CVE-2020-13668'] | Cross-site Scripting in Drupal Core | Access Bypass vulnerability in Drupal Core allows for an attacker to leverage the way that HTML is rendered for affected forms in order to exploit the vulnerability. This issue affects: Drupal Core 8.8.x versions prior to 8.8.10; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.8.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.9.0'}, {'fixed': '8.9.6'}]}]}, {'pack... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13668'}, {'type': 'WEB', 'url': 'https://github.com/drupal/core/commit/3184fa4b2f3b65b44884b5e858cdc7794d34b4c8'}, {'type': 'WEB', 'url': 'https://github.com/drupal/core/commit/58330ba58d1ac6f1a0a549e8dbde8a3e094bf4fb'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T15:33:47Z', 'nvd_published_at': '2022-02-11T16:15:00Z'} |
1.4.0 | GHSA-73q4-j324-2qcc | 2022-03-01T22:04:09Z | 2022-02-18T00:00:36Z | null | ['CVE-2022-25270'] | Incorrect authorization in Drupal core | The Quick Edit module does not properly check entity access in some circumstances. This could result in users with the "access in-place editing" permission viewing some content they are are not authorized to access. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '9.2.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25270'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-004'}] | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:39:06Z', 'nvd_published_at': '2022-02-17T00:15:00Z'} |
1.4.0 | GHSA-rqff-837h-mm52 | 2022-02-24T14:00:06Z | 2022-02-15T00:02:46Z | null | ['CVE-2022-0512'] | Authorization bypass in url-parse | Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'url-parse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0512'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40'}, {'type': 'PACKAGE', 'url': 'https://github.com/unshiftio/url-parse'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6d1bc... | {'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:37:39Z', 'nvd_published_at': '2022-02-14T16:15:00Z'} |
1.4.0 | GHSA-mrq8-53r4-3j5m | 2022-01-27T20:15:58Z | 2022-02-10T22:35:39Z | null | ['CVE-2018-20301'] | Permissive parameters and privilege escalation | An issue was discovered in Steve Pallen Coherence before 0.5.2 that is similar to a Mass Assignment vulnerability. In particular, "registration" endpoints (e.g., creating, editing, updating) allow users to update any coherence_fields data. For example, users can automatically confirm their accounts by sending the confi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Hex', 'name': 'coherence'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20301'}, {'type': 'WEB', 'url': 'https://github.com/smpallen99/coherence/issues/270'}, {'type': 'PACKAGE', 'url': 'https://github.com/smpallen99/coherence'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-27T20:15:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fq56-c7rj-j3j9 | 2022-12-01T22:13:28Z | 2022-02-16T00:01:15Z | null | ['CVE-2022-25208'] | Missing permission checks in Jenkins Chef Sinatra Plugin allow XXE | Chef Sinatra Plugin 1.20 and earlier does not perform a permission check in a method implementing form validation.
This allows attackers with Overall/Read permission to have Jenkins send an HTTP request to an attacker-controlled URL and have it parse the response as XML.
As the plugin does not configure its XML parse... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sinatra-chef-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25208'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/sinatra-chef-builder-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1377'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss... | {'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:13:28Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-57q7-rxqq-7vgp | 2021-05-18T21:39:10Z | 2022-02-15T01:57:18Z | null | [] | On Windows, `git-sizer` might run a `git` executable within the repository being analyzed | ### Impact
On Windows, if `git-sizer` is run against a non-bare repository, and that repository has an executable called `git.exe`, `git.bat`, etc., then that executable might be run by `git-sizer` rather than the system `git` executable. An attacker could try to use social engineering to get a victim to run `git-sizer... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/github/git-sizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/github/git-sizer/security/advisories/GHSA-57q7-rxqq-7vgp'}, {'type': 'WEB', 'url': 'https://github.com/github/git-sizer/commit/38400d6ddd79325e956b00ff584cfcc8dd96d536'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:39:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6x3j-x9rp-whxp | 2022-03-02T20:59:35Z | 2022-02-20T00:00:32Z | null | ['CVE-2022-0409'] | Unrestricted Upload of File with Dangerous Type in showdoc | showdoc prior to 2.10.2 is vulnerable to Unrestricted Upload of File with Dangerous Type. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0409'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/7383d7a3c1b0807b6f397ba7df415a0ce7ccc436'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c25bfad1-2611... | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T19:31:46Z', 'nvd_published_at': '2022-02-19T05:15:00Z'} |
1.4.0 | GHSA-5qgp-p5jc-w2rm | 2021-05-20T21:03:55Z | 2022-02-15T00:41:12Z | null | ['CVE-2014-6407'] | Arbitrary Code Execution in Docker | Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-6407'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker/commit/3ac6394b8082d4700483d52fbfe54914be537d9e'}, {'type': 'WEB', 'url': 'https://docs.docker.com/v1.3/release-notes/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/piper... | {'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:03:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x832-r2rj-4g5p | 2023-07-11T00:15:22Z | 2022-02-20T00:00:32Z | null | ['CVE-2022-24980'] | SSRF in Kitodo.Presentation | An issue was discovered in the Kitodo.Presentation (aka dlf) extension before 2.3.2, 3.x before 3.2.3, and 3.3.x before 3.3.4 for TYPO3. A missing access check in an eID script allows an unauthenticated user to submit arbitrary URLs to this component. This results in SSRF, allowing attackers to view the content of any ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'kitodo/presentation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'kitodo/presentation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.3'}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24980'}, {'type': 'WEB', 'url': 'https://github.com/kitodo/kitodo-presentation/commit/059be3f82b08c60cbb798986cd3ff22dbf60a5e4'}, {'type': 'WEB', 'url': 'https://github.com/kitodo/kitodo-presentation/commit/4a20621afc30778ba3b045be5110353cf4fd4fd4'... | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T00:15:22Z', 'nvd_published_at': '2022-02-19T04:15:00Z'} |
1.4.0 | GHSA-f68h-hfqp-8rmv | 2021-04-13T17:36:09Z | 2022-02-09T23:08:03Z | null | ['CVE-2017-15684'] | Path Traversal in Crafter CMS Crafter Studio | Crafter CMS Crafter Studio 3.0.1 has a directory traversal vulnerability which allows unauthenticated attackers to view files from the operating system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15684'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.0/security/advisory.html'}, {'type': 'WEB', 'url': 'http://crafter.com'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T17:36:09Z', 'nvd_published_at': '2020-11-27T18:15:00Z'} |
1.4.0 | GHSA-2cjf-w7c4-fhf6 | 2022-02-11T15:04:27Z | 2022-02-10T00:00:30Z | null | ['CVE-2022-0539'] | Cross-site Scripting in Beanstalk console | Beanstalk console (ptrofimov/beanstalk_console) prior to 1.7.14 is vulnerable to cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'ptrofimov/beanstalk_console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0539'}, {'type': 'WEB', 'url': 'https://github.com/ptrofimov/beanstalk_console/commit/5aea5f912f6e6d19dedb1fdfc25a29a2e1fc1694'}, {'type': 'PACKAGE', 'url': 'https://github.com/ptrofimov/beanstalk_console'}, {'type': 'WEB', 'url': 'https://huntr.de... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-11T15:04:27Z', 'nvd_published_at': '2022-02-09T14:15:00Z'} |
1.4.0 | GHSA-8rcj-c8pj-v3m3 | 2022-02-11T15:07:06Z | 2022-02-09T23:55:28Z | null | ['CVE-2022-23564'] | Reachable Assertion in Tensorflow | ### Impact
When decoding a resource handle tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments. This allows attackers to cause denial of services in TensorFlow processes.
### Patches
We have patched the issue in GitHub commit [14fea... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8rcj-c8pj-v3m3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23564'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/14fea662350e7c26eb5fe1be2ac31704e5682ee6'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T21:00:20Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-jh6m-3pqw-242h | 2022-08-12T20:52:13Z | 2022-02-09T00:56:04Z | null | ['CVE-2020-14359'] | Keycloak Gatekeeper vulnerable to bypass on using lower case HTTP headers | A vulnerability was found in all versions of the deprecated package Keycloak Gatekeeper, where on using lower case HTTP headers (via cURL) we can bypass our Gatekeeper. Lower case headers are also accepted by some webservers (e.g. Jetty). This means there is no protection when we put a Gatekeeper in front of a Jetty se... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/keycloak/keycloak-gatekeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14359'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/issues/12934'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1868591'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak-gatekeeper'}, {'ty... | {'cwe_ids': ['CWE-305'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T16:13:00Z', 'nvd_published_at': '2021-02-23T13:15:00Z'} |
1.4.0 | GHSA-7q5g-gph2-4rc6 | 2021-04-07T18:02:24Z | 2022-02-09T22:29:52Z | null | ['CVE-2020-17518'] | Upload of file to arbitrary path in Apache Flink | Apache Flink 1.5.1 introduced a REST handler that allows you to write an uploaded file to an arbitrary location on the local file system, through a maliciously modified HTTP HEADER. The files can be written to any location accessible by Flink 1.5.1. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink inst... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.flink:flink-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.1'}, {'fixed': '1.11.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17518'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0b000dc028616d33cb9aa388eb45d516b789cab0024dad94bc06588a@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a... | {'cwe_ids': ['CWE-22', 'CWE-23'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T18:02:24Z', 'nvd_published_at': '2021-01-05T12:15:00Z'} |
1.4.0 | GHSA-6m85-wvcr-pgw3 | 2022-12-03T03:44:36Z | 2022-02-10T20:33:49Z | null | ['CVE-2020-7737'] | Prototype Pollution in safetydance | All versions of package safetydance are vulnerable to Prototype Pollution via the set function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'safetydance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7737'}, {'type': 'PACKAGE', 'url': 'https://github.com/gramakri/safetydance'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SAFETYDANCE-598687'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/safetydance'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T22:33:20Z', 'nvd_published_at': '2020-10-02T10:15:00Z'} |
1.4.0 | GHSA-mmj4-777p-fpq9 | 2023-07-13T19:05:32Z | 2022-02-07T22:38:37Z | null | ['CVE-2022-23624'] | Validation bypass in frourio-express | ## 日本語
### 影響
v0.26.0以前のfrourioを使用している、かつvalidators/を利用している場合、ネストされたバリデータがリクエストのボディーとクエリに対して正しく働かないケースがあります。また、リクエストに対してバリデーションが効かなくなる入力があります。
### パッチ
frourioをv0.26.0かそれ以降のバージョンにアップデートをお願いします。frourio を使用したプロジェクトには `class-transformer` と `reflect-metadata` の依存への追加も必要となります。
### ワークアラウンド
controller側で自分でclass-transformer... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'frourio-express'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.26.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/frouriojs/frourio-express/security/advisories/GHSA-mmj4-777p-fpq9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23624'}, {'type': 'WEB', 'url': 'https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2'}, {'type'... | {'cwe_ids': ['CWE-1321', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T22:38:37Z', 'nvd_published_at': '2022-02-07T23:15:00Z'} |
1.4.0 | GHSA-c32g-2mgr-cfq7 | 2022-02-07T20:59:22Z | 2022-02-02T00:01:45Z | null | ['CVE-2022-24197'] | Out-of-bounds Write in iText | iText v7.1.17 was discovered to contain a stack-based buffer overflow via the component ByteBuffer.append, which allows attackers to cause a Denial of Service (DoS) via a crafted PDF file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.itextpdf:itext7-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.1.17'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24197'}, {'type': 'WEB', 'url': 'https://github.com/itext/itext7/pull/78'}, {'type': 'WEB', 'url': 'https://github.com/itext/itext7/pull/78#issuecomment-1089282165'}, {'type': 'PACKAGE', 'url': 'https://github.com/itext/itext7'}, {'type': 'WEB', 'u... | {'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T20:59:22Z', 'nvd_published_at': '2022-02-01T20:15:00Z'} |
1.4.0 | GHSA-4v5p-v5h9-6xjx | 2022-02-11T15:06:53Z | 2022-02-09T23:49:01Z | null | ['CVE-2022-23565'] | `CHECK`-failures in Tensorflow | ### Impact
An attacker can trigger denial of service via assertion failure by altering a `SavedModel` on disk such that `AttrDef`s of some operation are duplicated.
### Patches
We have patched the issue in GitHub commit [c2b31ff2d3151acb230edc3f5b1832d2c713a9e0](https://github.com/tensorflow/tensorflow/commit/c2b31ff2... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4v5p-v5h9-6xjx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23565'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c2b31ff2d3151acb230edc3f5b1832d2c713a9e0'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:24:46Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-pw2r-vq6v-hr8c | 2022-02-14T22:27:56Z | 2022-02-10T00:00:31Z | null | ['CVE-2022-0536'] | Exposure of Sensitive Information to an Unauthorized Actor in follow-redirects | Exposure of Sensitive Information to an Unauthorized Actor in NPM follow-redirects prior to 1.14.8. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'follow-redirects'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0536'}, {'type': 'WEB', 'url': 'https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445'}, {'type': 'PACKAGE', 'url': 'https://github.com/follow-redirects/follow-redirects'}, {'type': 'WEB', 'url': 'http... | {'cwe_ids': ['CWE-200', 'CWE-212'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-11T21:18:03Z', 'nvd_published_at': '2022-02-09T11:15:00Z'} |
1.4.0 | GHSA-6jp6-9rf9-gc66 | 2022-03-09T21:03:03Z | 2022-02-25T22:18:50Z | null | ['CVE-2022-24710'] | Cross-site Scripting in Weblate | ### Impact
Due to improper neutralization, it was possible to perform cross-site scripting via crafted user and language names.
### Patches
The issues were fixed in the 4.11 release. The following commits are addressing it:
* f6753a1a1c63fade6ad418fbda827c6750ab0bda
* 9e19a8414337692cc90da2a91c9af5420f2952f1
* 22d57... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Weblate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/security/advisories/GHSA-6jp6-9rf9-gc66'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24710'}, {'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/commit/22d577b1f1e88665a88b4569380148030e0f8389'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T22:18:50Z', 'nvd_published_at': '2022-02-25T21:15:00Z'} |
1.4.0 | GHSA-f246-xrrj-g8j6 | 2023-09-05T22:52:01Z | 2022-02-10T20:19:47Z | null | ['CVE-2020-7773'] | Cross-site Scripting in markdown-it-highlightjs | This affects the package markdown-it-highlightjs before 3.3.1. It is possible insert malicious JavaScript as a value of lang in the markdown-it-highlightjs Inline code highlighting feature.
```js
const markdownItHighlightjs = require("markdown-it-highlightjs");
const md = require('markdown-it');
const reuslt_xss = m... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'markdown-it-highlightjs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7773'}, {'type': 'WEB', 'url': 'https://github.com/valeriangalliat/markdown-it-highlightjs/pull/14'}, {'type': 'WEB', 'url': 'https://github.com/valeriangalliat/markdown-it-highlightjs/blob/v3.3.0/index.js%23L52'}, {'type': 'WEB', 'url': 'https://s... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-15T21:12:47Z', 'nvd_published_at': '2020-11-16T12:15:00Z'} |
1.4.0 | GHSA-vh5c-jqfg-mhrh | 2022-02-11T21:08:09Z | 2022-02-10T22:42:46Z | null | ['CVE-2021-32732'] | Cross-Site Request Forgery in xwiki-platform | ### Impact
It's possible to know if a user has or not an account in a wiki related to an email address, and which username(s) is actually tight to that email by forging a request to the Forgot username page. Note that since this page does not have a CSRF check it's quite easy to perform a lot of those requests.
### Pa... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-administration-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-administration-ui'}, 'ranges': [{'type': 'ECOSYSTEM... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vh5c-jqfg-mhrh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32732'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/69548c0320cbd772540cf4668743e69f879812cf'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T16:35:35Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-vqj2-4v8m-8vrq | 2022-02-24T21:42:26Z | 2022-02-24T00:00:54Z | null | ['CVE-2022-0736'] | Insecure Temporary File in mlflow | mlflow prior to 1.23.1 contains an insecure temporary file. The insecure function `tempfile.mktemp()` is deprecated and `mkstemp()` should be used instead. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mlflow'}, 'ecosystem_specific': {'affected_functions': ['mlflow.utils.file_utils.make_tarfile', 'mlflow.projects.docker._create_docker_build_ctx']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0736'}, {'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/commit/61984e6843d2e59235d82a580c529920cd8f3711'}, {'type': 'PACKAGE', 'url': 'https://github.com/mlflow/mlflow'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e5384764-c583-4de... | {'cwe_ids': ['CWE-377', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T21:42:26Z', 'nvd_published_at': '2022-02-23T09:15:00Z'} |
1.4.0 | GHSA-64q9-f38h-9mwx | 2022-12-01T22:18:12Z | 2022-02-16T00:01:18Z | null | ['CVE-2022-25204'] | Protection Mechanism Failure in Jenkins Doktor Plugin | Jenkins Doktor Plugin 0.4.1 and earlier implements functionality that allows agent processes to render files on the controller as Markdown or Asciidoc, and error messages allow attackers able to control agent processes to determine whether a file with a given name exists. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'by.dev.madhead.doktor:doktor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25204'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/doktor-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2548'}] | {'cwe_ids': ['CWE-693'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T17:31:28Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-f2jw-pr2c-9x96 | 2022-05-04T03:05:58Z | 2022-02-10T23:41:49Z | null | ['CVE-2021-29369'] | Code injection in @rkesters/gnuplot | @rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The gnuplot package prior to version 0.1.0 for Node.js allows code execution via shell metacharacters in Gnuplot commands. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@rkesters/gnuplot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29369'}, {'type': 'WEB', 'url': 'https://github.com/rkesters/gnuplot/commit/23671d4d3d28570fb19a936a6328bfac742410de'}, {'type': 'PACKAGE', 'url': 'https://www.npmjs.com/package/@rkesters/gnuplot'}] | {'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T21:39:05Z', 'nvd_published_at': '2021-05-03T12:15:00Z'} |
1.4.0 | GHSA-389p-fchr-q2mg | 2022-02-25T17:59:00Z | 2022-02-15T00:02:47Z | null | ['CVE-2022-24977'] | Path Traversal in ImpressCMS | ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24977'}, {'type': 'WEB', 'url': 'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261'}, {'type': 'PACKAGE', 'url': 'https://github.com/ImpressCMS/impresscms'}, {'type': 'WEB', 'url': 'https://github.com/ImpressC... | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T17:59:00Z', 'nvd_published_at': '2022-02-14T12:15:00Z'} |
1.4.0 | GHSA-3whx-qrj5-hh2h | 2022-02-11T17:07:14Z | 2022-02-02T00:01:52Z | null | ['CVE-2021-41571'] | Improper Input Validation in Apache Pulsar | In Apache Pulsar it is possible to access data from BookKeeper that does not belong to the topics accessible by the authenticated user. The Admin API get-message-by-id requires the user to input a topic and a ledger id. The ledger id is a pointer to the data, and it is supposed to be a valid it for the topic. Authorisa... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41571'}, {'type': 'WEB', 'url': 'https://github.com/apache/pulsar/issues/11814'}, {'type': 'WEB', 'url': 'https://github.com/apache/pulsar/pull/11852'}, {'type': 'WEB', 'url': 'https://github.com/apache/pulsar/pull/11912'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-20', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T17:38:32Z', 'nvd_published_at': '2022-02-01T13:15:00Z'} |
1.4.0 | GHSA-xrjf-phvv-r4vr | 2022-03-09T20:26:21Z | 2022-02-27T00:00:15Z | null | ['CVE-2022-0764'] | Command injection in strapi | When creating a strapi app using npxcreate-strapi-app, we can inject arbitrary commands through the template cli argument as per the code in this particular [link](https://github.com/strapi/strapi/blob/master/packages/generators/app/lib/utils/fetch-npm-template.js#L13), this happens due to improper sanitization of user... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0764'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/issues/12879'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strap... | {'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:42:15Z', 'nvd_published_at': '2022-02-26T15:15:00Z'} |
1.4.0 | GHSA-6cm4-gm85-972c | 2022-03-08T18:48:57Z | 2022-02-20T00:00:35Z | null | ['CVE-2021-45082'] | Command Injection in Cobbler | An issue was discovered in Cobbler through 3.3.0. In the templar.py file, the function check_for_invalid_imports can allow Cheetah code to import Python modules via the "#from MODULE import" substring. (Only lines beginning with #import are blocked.) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45082'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/pull/2945'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1193678'}, {'type': 'PACKAGE', 'url': 'https://github.com/cobbler/cobbler'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-08T18:48:57Z', 'nvd_published_at': '2022-02-19T00:15:00Z'} |
1.4.0 | GHSA-9m95-8hx6-7p9v | 2022-03-15T21:39:42Z | 2022-02-15T01:17:37Z | null | ['CVE-2021-29136'] | Improper input validation in umoci | ### Impact
umoci 0.4.6 and earlier can be tricked into modifying host files by
creating a malicious layer that has a symlink with the name "." (or
"/"). Because umoci deletes inodes if they change types, this results in
the rootfs directory being replaced with an attacker-controlled symlink.
Subsequent image layers wi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/umoci'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/opencontainers/umoci/security/advisories/GHSA-9m95-8hx6-7p9v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29136'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/umoci/commit/d9efc31daf2206f7d3fdb839863cf7a576a2eb57'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:13:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f5pg-7wfw-84q9 | 2023-02-07T21:27:07Z | 2022-02-11T23:26:26Z | null | ['CVE-2020-8911'] | CBC padding oracle issue in AWS S3 Crypto SDK for golang | ### Summary
The golang AWS S3 Crypto SDK is impacted by an issue that can result in loss of confidentiality and message forgery. The attack requires write access to the bucket in question, and that the attacker has access to an endpoint that reveals decryption failures (without revealing the plaintext) and that when e... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/aws/aws-sdk-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.34.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/google/security-research/security/advisories/GHSA-f5pg-7wfw-84q9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8911'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-go/pull/3403'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-go/... | {'cwe_ids': ['CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T17:57:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3c7p-vv5r-cmr5 | 2023-02-08T23:51:18Z | 2022-02-10T00:31:27Z | null | ['CVE-2020-13957'] | Incorrect Authorization in Apache Solr | Apache Solr versions 6.6.0 to 6.6.6, 7.0.0 to 7.7.3 and 8.0.0 to 8.6.2 prevents some features considered dangerous (which could be used for remote code execution) to be configured in a ConfigSet that's uploaded via API without authentication/authorization. The checks in place to prevent such features can be circumvente... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.6.0'}, {'fixed': '8.6.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13957'}, {'type': 'WEB', 'url': 'https://github.com/apache/solr/commit/e001c2221812a0ba9e9378855040ce72f93eced4'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r13a728994c60be5b5a7049282b5c926dac1fc6a9a0b2362f6adfa573@%3Cissues.luce... | {'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T17:55:51Z', 'nvd_published_at': '2020-10-13T19:15:00Z'} |
1.4.0 | GHSA-6jv7-28mv-qp9c | 2022-05-04T20:59:04Z | 2022-02-16T00:01:23Z | null | ['CVE-2022-25195'] | Missing permission check in Jenkins autonomiq Plugin | A missing permission check in Jenkins autonomiq Plugin 1.15 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:autonomiq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25195'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/autonomiq-plugin'}, {'type': 'WEB', 'url': 'https://www.jenki... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T20:59:04Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-r3gq-wxqf-q4gh | 2022-02-14T23:01:49Z | 2022-02-10T00:00:32Z | null | ['CVE-2021-45329'] | Cross-site Scripting in Gitea | Cross Site Scripting (XSS) vulnerability exists in Gitea before 1.5.1 via the repository settings inside the external wiki/issue tracker URL field. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/go-gitea/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45329'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/4710'}, {'type': 'WEB', 'url': 'https://blog.gitea.io/2018/09/gitea-1.5.1-is-released/'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-gitea/gitea'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T23:01:49Z', 'nvd_published_at': '2022-02-08T23:15:00Z'} |
1.4.0 | GHSA-r992-xph6-h7x2 | 2022-02-23T21:57:38Z | 2022-02-12T00:00:48Z | null | ['CVE-2022-0560'] | Open redirect in microweber | microweber prior to 1.2.11 is vulnerable to open redirect. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0560'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/72d4b12cc487f56a859a8570ada4efb77b4b8c63'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:49:46Z', 'nvd_published_at': '2022-02-11T13:15:00Z'} |
1.4.0 | GHSA-wc4g-r73w-x8mm | 2022-02-07T22:08:14Z | 2022-02-09T23:54:51Z | null | ['CVE-2022-23563'] | Insecure temporary file in Tensorflow | ### Impact
In multiple places, TensorFlow uses `tempfile.mktemp` to create temporary files. While this is acceptable in testing, in utilities and libraries it is dangerous as a different process can create the file between the check for the filename in `mktemp` and the actual creation of the file by a subsequent operat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wc4g-r73w-x8mm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23563'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}] | {'cwe_ids': ['CWE-367', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:56:43Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-ghww-cv4v-hmxx | 2022-02-22T17:24:42Z | 2022-02-18T00:00:34Z | null | ['CVE-2022-0638'] | Cross-Site Request Forgery microweber | microweber prior to version 1.2.11 is vulnerable to Cross-Site Request Forgery (CSRF). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0638'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/756096da1260f29ff6f4532234d93d8e41dd5aa8'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/9... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T17:24:42Z', 'nvd_published_at': '2022-02-17T17:15:00Z'} |
1.4.0 | GHSA-q47x-6mqq-4w92 | 2023-09-15T18:05:00Z | 2022-02-15T01:57:18Z | null | ['CVE-2019-11228'] | Gitea Improper Input Validation | repo/setting.go in Gitea before 1.7.6 and 1.8.x before 1.8-RC3 does not validate the `form.MirrorAddress` before calling `SaveAddress`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/go-gitea/gitea/models'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11228'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/6593'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/6595'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/releases/tag/v1.7.6'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T18:07:46Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fq86-3f29-px2c | 2022-02-11T20:38:43Z | 2022-02-07T22:01:14Z | null | ['CVE-2022-23581'] | `CHECK`-failures during Grappler's `IsSimplifiableReshape` in Tensorflow | ### Impact
The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that [`IsSimplifiableReshape`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1687-L1742) would trigge... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fq86-3f29-px2c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23581'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1fb27733f943295d874417630edd3b38b34ce082'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T19:54:48Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-ffm7-7r8g-77xm | 2023-09-26T10:43:36Z | 2022-02-10T22:38:50Z | null | ['CVE-2020-1954'] | Apache CXF JMX Integration is vulnerable to a MITM attack | Apache CXF has the ability to integrate with JMX by registering an `InstrumentationManager` extension with the CXF bus. If the `createMBServerConnectorFactory` property of the default `InstrumentationManagerImpl` is not disabled, then it is vulnerable to a man-in-the-middle (MITM) style attack. An attacker on the same ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-rt-management'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-rt-management'}, 'ecosystem_specif... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1954'}, {'type': 'WEB', 'url': 'https://github.com/apache/cxf/commit/1cf4fed546904a4a2560f53a2a2391d834b4026c'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.a... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T18:12:21Z', 'nvd_published_at': '2020-04-01T21:15:00Z'} |
1.4.0 | GHSA-9q3g-m353-cp4p | 2023-02-07T22:14:30Z | 2022-02-15T01:57:18Z | null | ['CVE-2017-11480'] | Denial of Service in Packetbeat | Packetbeat versions prior to 5.6.4 and 6.0.0 are affected by a denial of service flaw in the PostgreSQL protocol handler. If Packetbeat is listening for PostgreSQL traffic and a user is able to send arbitrary network traffic to the monitored port, the attacker could prevent Packetbeat from properly logging other Postgr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/elastic/beats'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/elastic/beats'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0-alpha1'}, {'fixed': '6.0.0... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11480'}, {'type': 'WEB', 'url': 'https://github.com/elastic/beats/pull/5457'}, {'type': 'WEB', 'url': 'https://github.com/elastic/beats/pull/5479'}, {'type': 'WEB', 'url': 'https://github.com/elastic/beats/pull/5480'}, {'type': 'WEB', 'url': 'https... | {'cwe_ids': ['CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:35:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4cpg-3vgw-4877 | 2022-07-21T16:20:00Z | 2022-02-18T00:00:33Z | null | ['CVE-2022-22912'] | Prototype pollution in Plist before 3.0.5 can cause denial of service | Prototype pollution vulnerability via `.parse()` in Plist allows attackers to cause a Denial of Service (DoS) and may lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'plist'}, 'ecosystem_specific': {'affected_functions': ['plist.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22912'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/plist.js/issues/114'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/plist.js/pull/118'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/plist.js/commit/96e2303d059e6b... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T15:34:44Z', 'nvd_published_at': '2022-02-17T19:15:00Z'} |
1.4.0 | GHSA-72wf-hwcq-65h9 | 2022-02-11T16:20:19Z | 2022-02-05T00:00:31Z | null | ['CVE-2021-46398'] | Cross-Site Request Forgery in Filebrowser | A Cross-Site Request Forgery (CSRF) vulnerability exists in Filebrowser < 2.18.0 that allows attackers to create a backdoor user with admin privilege and get access to the filesystem via a malicious HTML webpage that is sent to the victim. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/filebrowser/filebrowser/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.18.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46398'}, {'type': 'WEB', 'url': 'https://github.com/filebrowser/filebrowser/issues/1621'}, {'type': 'WEB', 'url': 'https://github.com/filebrowser/filebrowser/commit/74b7cd8e81840537a8206317344f118093153e8d'}, {'type': 'WEB', 'url': 'https://febin0x... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-08T18:32:54Z', 'nvd_published_at': '2022-02-04T16:15:00Z'} |
1.4.0 | GHSA-g37q-26qx-8v2m | 2022-02-10T20:36:45Z | 2022-02-10T20:36:45Z | null | ['CVE-2020-13951'] | Denial of service in Apache OpenMeetings | Attackers can use public NetTest web service of Apache OpenMeetings 4.0.0-5.0.0 to organize denial of service attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '5.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13951'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe59... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T23:12:25Z', 'nvd_published_at': '2020-09-30T18:15:00Z'} |
1.4.0 | GHSA-pwr6-p3fh-grc2 | 2022-03-30T21:10:14Z | 2022-02-12T00:00:37Z | null | ['CVE-2021-46364'] | Deserialization of Untrusted Data in Magnolia CMS | A vulnerability in the Snake YAML parser of Magnolia CMS v6.2.3 and below allows attackers to execute arbitrary code via a crafted YAML file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'info.magnolia:magnolia-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46364'}, {'type': 'WEB', 'url': 'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory'}, {'type': 'WEB', 'url': 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46364... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:44:01Z', 'nvd_published_at': '2022-02-11T21:15:00Z'} |
1.4.0 | GHSA-vq36-27g6-p492 | 2022-02-11T19:56:31Z | 2022-02-09T23:31:48Z | null | ['CVE-2022-23592'] | Out of bounds read in Tensorflow | ### Impact
TensorFlow's [type inference](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/graph/graph.cc#L223-L229) can cause a heap OOB read as the bounds checking is done in a `DCHECK` (which is a no-op during production):
```cc
if (node_t.type_id() != TFT_UNSET)... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0-rc0'}, {'fixed': '2.8.0'}]}], 'versions': ['2.8.0-rc0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0-rc0'}, {'fi... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vq36-27g6-p492'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23592'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T18:17:17Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-rc3x-jf5g-xvc5 | 2022-03-09T21:08:20Z | 2022-02-26T00:00:38Z | null | ['CVE-2021-23495'] | Open redirect in karma | Karma before 6.3.16 is vulnerable to Open Redirect due to missing validation of the return_url query parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'karma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23495'}, {'type': 'WEB', 'url': 'https://github.com/karma-runner/karma/commit/ff7edbb2ffbcdd69761bece86b7dc1ef0740508d'}, {'type': 'PACKAGE', 'url': 'https://github.com/karma-runner/karma'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-OR... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:17:53Z', 'nvd_published_at': '2022-02-25T20:15:00Z'} |
1.4.0 | GHSA-2hpg-vwqj-6h6w | 2021-04-22T21:41:07Z | 2022-02-10T20:25:56Z | null | ['CVE-2020-13937'] | Authentication bypass in Apache Kylin | Apache Kylin 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 3.0.0-alpha, 3.0.0-alpha2, 3.0.0-beta, 3.0.0, 3.0.1, 3.0.2, 3.1.0, 4.0.0-alpha has one restful api which exposed Kylin's configuration information without any authentication, so it ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-alpha'}, {'fixed': '4.0.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13937'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc592e0dcee5a2615f1d9522af30ef1822c1f863d5e05e7da9d1e57f4%40%3Cuser.kylin.apache.org%3E'}] | {'cwe_ids': ['CWE-922'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T21:41:07Z', 'nvd_published_at': '2020-10-19T21:15:00Z'} |
1.4.0 | GHSA-9jq9-c2cv-pcrj | 2022-02-11T21:08:41Z | 2022-02-10T22:42:48Z | null | ['CVE-2021-43841'] | Cross-site Scripting by SVG upload in xwiki-platform | ### Impact
When using default XWiki configuration, it's possible for an attacker to upload an SVG containing a script executed when executing the download action on the file.
### Patches
This problem has been patched so that the default configuration doesn't allow to display the SVG files in the browser.
### Workaro... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9jq9-c2cv-pcrj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43841'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/5853d492b3a274db0d94d560e2a5ea988a271c62'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T16:42:20Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-rvfc-g8j5-9ccf | 2021-04-01T16:29:50Z | 2022-02-09T00:59:06Z | null | ['CVE-2020-1717'] | Generation of Error Message Containing Sensitive Information in keybloack | A flaw was found in Keycloak 7.0.1. A logged in user can do an account email enumeration attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '7.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1717'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1796281'}, {'type': 'WEB', 'url': 'https://issues.jboss.org/browse/KEYCLOAK-12014'}] | {'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T16:29:50Z', 'nvd_published_at': '2021-02-11T18:15:00Z'} |
1.4.0 | GHSA-8674-26jc-wh98 | 2022-02-09T22:56:32Z | 2022-02-09T22:56:32Z | null | ['CVE-2020-25711'] | Improper Access Control in infinispan-server-runtime | A flaw was found in infinispan 10 REST API, where authorization permissions are not checked while performing some server management operations. When authz is enabled, any user with authentication can perform operations like shutting down the server without the ADMIN role. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.infinispan:infinispan-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.6.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.0.5.Final'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25711'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1897618'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0023/'}] | {'cwe_ids': ['CWE-269', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T22:40:14Z', 'nvd_published_at': '2020-12-03T17:15:00Z'} |
1.4.0 | GHSA-m658-p24x-p74r | 2023-08-30T18:47:54Z | 2022-02-12T00:00:36Z | null | ['CVE-2022-24968'] | TLS certificate validation error in mellium.im/xmpp | In Mellium mellium.im/xmpp through 0.21.0, an attacker capable of spoofing DNS TXT records can redirect a WebSocket connection request to a server under their control without causing TLS certificate verification to fail. This occurs because the wrong host name is selected during this verification. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'mellium.im/xmpp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.21.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24968'}, {'type': 'WEB', 'url': 'https://github.com/mellium/xmpp/pull/260'}, {'type': 'WEB', 'url': 'https://github.com/mellium/xmpp/commit/0d92aa486da69b71f2f4a30e62aa722c711b98ac'}, {'type': 'WEB', 'url': 'https://mellium.im/cve/cve-2022-24968/'}... | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:38:04Z', 'nvd_published_at': '2022-02-11T22:15:00Z'} |
1.4.0 | GHSA-vjw7-6gfq-6wf5 | 2021-04-22T22:08:15Z | 2022-02-10T20:28:57Z | null | ['CVE-2019-17640'] | Path Traversal in Eclipse Vert | In Eclipse Vert.x 3.4.x up to 3.9.4, 4.0.0-milestone1, 4.0.0-milestone2, 4.0.0-milestone3, 4.0.0-milestone4, 4.0.0-milestone5, 4.0.0.Beta1, 4.0.0.Beta2, and 4.0.0.Beta3, StaticHandler doesn't correctly processes back slashes on Windows Operating systems, allowing, escape the webroot folder to the current working direct... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.vertx:vertx-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.9.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17640'}, {'type': 'WEB', 'url': 'https://github.com/vert-x3/vertx-web/commit/b12f7c4c6576a8adc3f683b2899de4b0e7d099e4'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=567416'}, {'type': 'WEB', 'url': 'https://lists.apache.or... | {'cwe_ids': ['CWE-22', 'CWE-23'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T22:08:15Z', 'nvd_published_at': '2020-10-15T21:15:00Z'} |
1.4.0 | GHSA-6q8r-5pm6-v2q8 | 2022-12-01T23:01:50Z | 2022-02-16T00:01:27Z | null | ['CVE-2022-25189'] | Stored Cross-site Scripting vulnerability in Jenkins Custom Checkbox Parameter Plugin | Jenkins Custom Checkbox Parameter Plugin 1.1 and earlier does not escape parameter names of custom checkbox parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:custom-checkbox-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25189'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/custom-checkbox-parameter-plugin/commit/f859f0aebb94974f72591fb01ef41b05675d9f11'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/custom-checkbox-parameter-plugin'}, {'type': ... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T23:01:50Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-c5hm-xc74-pqrg | 2021-07-28T21:54:19Z | 2022-02-10T23:37:22Z | null | ['CVE-2020-7623'] | OS Command Injection in jscover | jscover through 1.0.0 is vulnerable to Command Injection. It allows execution of arbitrary command via the source argument. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'jscover'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7623'}, {'type': 'WEB', 'url': 'https://github.com/node-modules/jscover/blob/master/lib/jscover.js#L59,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSCOVER-564250'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T15:08:07Z', 'nvd_published_at': '2020-04-02T21:15:00Z'} |
1.4.0 | GHSA-vvw4-rfwf-p6hx | 2022-02-08T22:02:28Z | 2022-02-09T22:58:06Z | null | ['CVE-2020-17527'] | Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat | While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-coyote'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.0-M10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-coyote'}, 'ecosys... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17527'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/d56293f816d6dc9e2b47107f208fa9e95db58c65'}, {'type': 'WEB', 'url': 'https://bz.apache.org/bugzilla/show_bug.cgi?id=64830'}, {'type': 'WEB', 'url': 'https://lists.apache.org/th... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T16:06:44Z', 'nvd_published_at': '2020-12-03T19:15:00Z'} |
1.4.0 | GHSA-372f-jc47-7gr5 | 2022-12-01T23:00:11Z | 2022-02-16T00:01:26Z | null | ['CVE-2022-25190'] | Missing permission check in Jenkins Conjur Secrets Plugin allows enumerating credentials IDs | Conjur Secrets Plugin 1.0.11 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.conjur.jenkins:conjur-credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25190'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/conjur-credentials-plugin/commit/eda06cde26cdf2d40ae4e2f4d2709e8174489068'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/conjur-credentials-plugin'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T23:00:11Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-3mqv-8gxg-pfm4 | 2022-07-21T15:35:27Z | 2022-02-09T22:37:28Z | null | ['CVE-2020-35774'] | TwitterServer Cross-site Scripting via /histograms endpoint | server/handler/HistogramQueryHandler.scala in Twitter TwitterServer (aka twitter-server) before 20.12.0, in some configurations, allows XSS via the /histograms endpoint. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.twitter:twitter-server_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.12.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35774'}, {'type': 'WEB', 'url': 'https://github.com/twitter/twitter-server/commit/e0aeb87e89a6e6c711214ee2de0dd9f6e5f9cb6c'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2020-4287'}, {'type': 'PACKAGE', 'url': 'https://github... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:16:49Z', 'nvd_published_at': '2020-12-29T18:15:00Z'} |
1.4.0 | GHSA-6g5f-f5pm-mjrg | 2023-09-14T19:31:06Z | 2022-02-15T01:57:18Z | null | ['CVE-2019-12243'] | Istio may not check inbound TCP connections against istio-policy | Istio 1.1.x through 1.1.6 has Incorrect Access Control. When `disablePolicyChecks` is set to `false`, inbound TCP connections do not generate Check requests to istio-policy and external authorization is not applied.
This behavior is a result of a change to `istio/pilot/pkg/networking/plugin/mixer/mixer.go` in 1.1.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N/E:H/RL:O/RC:C'}] | [{'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12243'}, {'type': 'WEB', 'url': 'https://github.com/istio/istio/issues/13868'}, {'type': 'WEB', 'url': 'https://github.com/istio/istio/pull/13893/commits/91faba277439dab798185730d1624bd53e37bb06'}, {'type': 'WEB', 'url': 'https://istio.io/blog/2019... | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T15:53:48Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vh2r-x97c-2vpr | 2022-02-25T21:43:52Z | 2022-02-17T00:00:26Z | null | ['CVE-2022-22880'] | SQL Injection in Jeecg-boot | Jeecg-boot v3.0 was discovered to contain a SQL injection vulnerability via the code parameter in /jeecg-boot/sys/user/queryUserByDepId. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22880'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/3347'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T21:43:52Z', 'nvd_published_at': '2022-02-16T22:15:00Z'} |
1.4.0 | GHSA-m5wp-p3gj-7q5g | 2022-12-01T22:16:41Z | 2022-02-16T00:01:16Z | null | ['CVE-2022-25206'] | Missing Authorization in Jenkins dbCharts Plugin | A missing check in Jenkins dbCharts Plugin 0.5.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified database via JDBC using attacker-specified credentials. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dbCharts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25206'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dbCharts-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2177'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T17:37:00Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-jjvm-3mfq-7gc7 | 2022-02-14T22:33:59Z | 2022-02-09T00:00:31Z | null | ['CVE-2022-0506'] | Cross-site Scripting in microweber | microweber version 1.2.10 and prior is vulnerable to cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0506'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/05d55f2befb1b25375ca5371875ff535d6cc5f70'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T22:25:48Z', 'nvd_published_at': '2022-02-08T09:15:00Z'} |
1.4.0 | GHSA-xp5j-wj4h-2jq9 | 2021-04-14T18:49:17Z | 2022-02-10T00:30:54Z | null | ['CVE-2020-13942'] | Injection and Improper Input Validation in Apache Unomi | It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint. This was partially fixed in 1.5.1 but a new attack vector was found. In Apache Unomi version 1.5.2 scripts are now completely filtered from the input. It is highly recommended to upgrade to the latest available version of th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.unomi:unomi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13942'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2020-4284'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r08a4057ff7196b8880117edaa4b6207cbd36ed692d8dd1f5a56b4d0f@%3Cannounce.apache.org%3E'}, {'type': 'W... | {'cwe_ids': ['CWE-20', 'CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T18:49:17Z', 'nvd_published_at': '2020-11-24T18:15:00Z'} |
1.4.0 | GHSA-fg2v-w576-w4v3 | 2022-02-08T21:24:12Z | 2022-02-10T22:46:22Z | null | ['CVE-2021-31684'] | Out of bounds read in json-smart | A vulnerability was discovered in the indexOf function of JSONParserByteArray in JSON Smart versions prior to 1.3.3 and 2.4.5 which causes a denial of service (DOS) via a crafted web request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.minidev:json-smart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'net.minidev:json-smart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.4'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31684'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v1/issues/10'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v2/issues/67'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v1/pull/11'}, {'type'... | {'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T20:27:42Z', 'nvd_published_at': '2021-06-01T20:15:00Z'} |
1.4.0 | GHSA-wmj9-xh24-j4gx | 2022-02-23T21:58:38Z | 2022-02-11T00:00:47Z | null | ['CVE-2022-0558'] | Cross-site Scripting in microweber | microweber prior to version 1.2.11 is vulnerable to cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0558'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/14a1bb971bcb8b5456c2bf0020c3018907a2704d'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-11T17:36:12Z', 'nvd_published_at': '2022-02-10T10:15:00Z'} |
1.4.0 | GHSA-87v6-crgm-2gfj | 2022-02-11T16:23:18Z | 2022-02-10T00:21:32Z | null | ['CVE-2022-21735'] | Division by zero in Tensorflow | ### Impact
The [implementation of `FractionalMaxPool`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_max_pool_op.cc#L36-L192) can be made to crash a TensorFlow process via a division by 0:
```python
import tensorflow as tf
import numpy as np
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-87v6-crgm-2gfj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21735'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ba4e8ac4dc2991e350d5cc407f8598c8d4ee70fb'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T19:51:55Z', 'nvd_published_at': '2022-02-03T13:15:00Z'} |
1.4.0 | GHSA-877x-32pm-p28x | 2021-05-13T19:28:33Z | 2022-02-15T01:57:18Z | null | ['CVE-2020-2026'] | Link Following in Kata Runtime | A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects Kata Containers 1.11 versi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kata-containers/runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kata-containers/runtime'}, 'r... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2026'}, {'type': 'WEB', 'url': 'https://github.com/kata-containers/runtime/issues/2712'}, {'type': 'WEB', 'url': 'https://github.com/kata-containers/runtime/pull/2713'}, {'type': 'WEB', 'url': 'https://github.com/kata-containers/runtime/releases/ta... | {'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T19:28:33Z', 'nvd_published_at': '2020-06-10T18:15:00Z'} |
1.4.0 | GHSA-45w3-v3g4-54pm | 2022-09-12T20:44:49Z | 2022-02-11T19:11:36Z | null | [] | Chrono has potential segfault issue in SPIFFE authenticator | ### Impact
Several vulnerabilities have been reported in the `time` and `chrono` crates related to handling of calls to `localtime_r`. You can follow some of the discussions [here](https://github.com/chronotope/chrono/issues/602) and [here](https://github.com/time-rs/time/issues/293), and the associated CVE [here](http... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'parsec-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/parallaxsecond/parsec/security/advisories/GHSA-45w3-v3g4-54pm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26235'}, {'type': 'WEB', 'url': 'https://github.com/chronotope/chrono/issues/602'}, {'type': 'WEB', 'url': 'https://github.com/parallaxsecon... | {'cwe_ids': ['CWE-476'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-02-11T19:11:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8wrg-m8vm-5fvj | 2021-05-20T22:25:09Z | 2022-02-15T01:57:18Z | null | ['CVE-2021-21403'] | Authentication Bypass by Primary Weakness in github.com/kongchuanhujiao/server | ### Impact
Authentication Bypass by Primary Weakness (CWE-305)
Commit:
https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1
ALL Users is impacted.
### Patches
Yes, PLEASE UPGRADE TO v1.3.21-beta.d0ffc0a6 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kongchuanhujiao/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.21'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/kongchuanhujiao/server/security/advisories/GHSA-8wrg-m8vm-5fvj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21403'}, {'type': 'WEB', 'url': 'https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1'}] | {'cwe_ids': ['CWE-287', 'CWE-305'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T22:25:09Z', 'nvd_published_at': '2021-03-26T18:15:00Z'} |
1.4.0 | GHSA-gf2j-f278-xh4v | 2022-02-11T16:11:40Z | 2022-02-09T23:47:57Z | null | ['CVE-2022-23557'] | Division by zero in TFLite | ### Impact
An attacker can craft a TFLite model that would trigger a division by zero in [`BiasAndClamp` implementation](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/internal/common.h#L75):
```cc
inline void BiasAndClamp(float clamp_min, float clamp_ma... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf2j-f278-xh4v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23557'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8c6f391a2282684a25cbfec7687bd5d35261a209'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:21:15Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-x3rq-r3cm-5vc4 | 2023-08-25T22:06:38Z | 2022-02-09T00:00:27Z | null | ['CVE-2022-0524'] | Publify Business Logic Errors | Publify (formerly known as Typo) prior to version 9.2.7 is vulnerable to business logic errors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0524'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/pull/1044'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/16fceecadbe80ab0ef846b62a12dc7bfff10b8c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/pub... | {'cwe_ids': ['CWE-841'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T18:33:00Z', 'nvd_published_at': '2022-02-08T22:15:00Z'} |
1.4.0 | GHSA-76wf-9vgp-pj7w | 2023-02-07T21:24:00Z | 2022-02-11T23:26:12Z | null | [] | Unencrypted md5 plaintext hash in metadata in AWS S3 Crypto SDK for golang | ### Summary
The golang AWS S3 Crypto SDK was impacted by an issue that can result in loss of confidentiality. An attacker with read access to an encrypted S3 bucket was able to recover the plaintext without accessing the encryption key.
### Risk/Severity
The vulnerability poses insider risks/privilege escalation ris... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/aws/aws-sdk-go/service/s3/s3crypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.34.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/aws/aws-sdk-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fi... | [{'type': 'WEB', 'url': 'https://github.com/google/security-research/security/advisories/GHSA-76wf-9vgp-pj7w'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-go/commit/35fa6ddf45c061e0f08d3a3b5119f8f4da38f6d1'}, {'type': 'PACKAGE', 'url': 'https://github.com/aws/aws-sdk-go'}, {'type': 'WEB', 'url': 'https://pk... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T18:00:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m2c7-42rf-c62f | 2022-02-14T19:58:19Z | 2022-02-01T00:00:44Z | null | ['CVE-2021-44255'] | Unrestricted Upload of File with Dangerous Type in motionEye | motionEye <= 0.42.1 and motioneEyeOS <= 20200606 allow a remote attacker to upload a configuration backup file containing a malicious python pickle file. This is possible when an installation is accessible over the Internet and uses no or poor authentication credentials.
The GitHub repositories for motionEye and motio... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'motioneye'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.42.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44255'}, {'type': 'WEB', 'url': 'https://github.com/ccrisan/motioneyeos/issues/2843'}, {'type': 'PACKAGE', 'url': 'https://github.com/ccrisan/motioneye'}, {'type': 'WEB', 'url': 'https://www.pizzapower.me/2021/10/09/self-hosted-security-part-1-moti... | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T19:58:19Z', 'nvd_published_at': '2022-01-31T12:15:00Z'} |
1.4.0 | GHSA-856q-xv3c-7f2f | 2022-02-25T15:38:52Z | 2022-02-23T14:59:08Z | null | ['CVE-2022-23635'] | Unauthenticated control plane denial of service attack in Istio | ### Impact
The Istio control plane, `istiod`, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted message which results in the control plane crashing. This endpoint is served over TLS port 15012, but does not require any authentication from the attacker.
For simple... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.1'}]}], 'versions': ['1.13.0']}, {'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1... | [{'type': 'WEB', 'url': 'https://github.com/istio/istio/security/advisories/GHSA-856q-xv3c-7f2f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23635'}, {'type': 'WEB', 'url': 'https://github.com/istio/istio/commit/5f3b5ed958ae75156f8656fe7b3794f78e94db84'}, {'type': 'PACKAGE', 'url': 'https:/... | {'cwe_ids': ['CWE-1284', 'CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T14:59:08Z', 'nvd_published_at': '2022-02-22T22:15:00Z'} |
1.4.0 | GHSA-3cqr-58rm-57f8 | 2021-04-22T23:38:32Z | 2022-02-10T20:38:19Z | null | ['CVE-2019-20920'] | Arbitrary Code Execution in Handlebars | Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim's br... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ecosystem_specific': {'affected_functions': ['handlebars.helpers.lookup']}, 'ranges': [{'type': 'ECOSYSTEM', 'events'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20920'}, {'type': 'WEB', 'url': 'https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-534478'}, {'type': 'WEB', 'url': 'https://www.npmjs... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T23:38:32Z', 'nvd_published_at': '2020-09-30T18:15:00Z'} |
1.4.0 | GHSA-h5rh-w6vm-9ghc | 2022-05-26T20:42:01Z | 2022-02-15T01:57:18Z | null | ['CVE-2021-27358'] | Denial of service in Grafana | The snapshot feature in Grafana before 7.4.2 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:R'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana/pkg/middleware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.7.3'}, {'fixed': '7.4.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27358'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/pull/31263'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/blob/master/CHANGELO... | {'cwe_ids': ['CWE-306', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-14T17:47:34Z', 'nvd_published_at': '2021-03-18T20:15:00Z'} |
1.4.0 | GHSA-39qv-prmh-x37f | 2022-02-11T16:16:33Z | 2022-02-05T00:00:26Z | null | ['CVE-2021-23497'] | Prototype Pollution in @strikeentco/set | This affects the package @strikeentco/set before 1.0.2. It allows an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-1038821 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@strikeentco/set'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23497'}, {'type': 'WEB', 'url': 'https://github.com/strikeentco/set/commit/b2f942c'}, {'type': 'PACKAGE', 'url': 'https://github.com/strikeentco/set/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-1038821'}, {'type'... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T17:19:41Z', 'nvd_published_at': '2022-02-04T20:15:00Z'} |
1.4.0 | GHSA-p8p6-rcp6-4mrm | 2021-04-22T16:54:42Z | 2022-02-10T20:23:01Z | null | ['CVE-2020-26883'] | Uncontrolled Recursion in Play Framework | In Play Framework 2.6.0 through 2.8.2, stack consumption can occur because of unbounded recursion during parsing of crafted JSON documents. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.3'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26883'}, {'type': 'WEB', 'url': 'https://github.com/playframework/playframework/pull/10495'}, {'type': 'WEB', 'url': 'https://www.playframework.com/security/vulnerability/CVE-2020-26883-JsonParseUncontrolledRecursion'}] | {'cwe_ids': ['CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T16:54:42Z', 'nvd_published_at': '2020-11-06T14:15:00Z'} |
1.4.0 | GHSA-5mv2-rx3q-4w2v | 2022-02-11T19:16:32Z | 2022-02-10T22:21:48Z | null | ['CVE-2022-23614'] | Code injection in Twig | # Description
When in a sandbox mode, the `arrow` parameter of the `sort` filter must be a closure to avoid attackers being able to run arbitrary PHP functions.
# Resolution
We now disallow calling non Closure in the `sort` filter like we already did for some other filters.
# Credits
We would like to thank Marlon ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'twig/twig'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.14.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'twig/twig'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/twigphp/Twig/security/advisories/GHSA-5mv2-rx3q-4w2v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23614'}, {'type': 'WEB', 'url': 'https://github.com/twigphp/Twig/commit/22b9dc3c03ee66d7e21d9ed2ca76052b134cb9e9'}, {'type': 'WEB', 'url': 'https://g... | {'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T16:43:09Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-rpj6-2q8r-98f8 | 2022-12-21T01:30:07Z | 2022-02-10T20:29:39Z | null | ['CVE-2020-2287'] | Request logging bypass in Jenkins Audit Trail Plugin | Audit Trail Plugin logs requests whose URL path matches an admin-configured regular expression.\n\nA discrepancy between the behavior of the plugin and the Stapler web framework in parsing URL paths allows attackers to craft URLs that would bypass request logging in Audit Trail Plugin 3.6 and earlier. This only applies... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:audit-trail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2287'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/audit-trail-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1815'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/... | {'cwe_ids': ['CWE-435'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T22:16:34Z', 'nvd_published_at': '2020-10-08T13:15:00Z'} |
1.4.0 | GHSA-gpgx-whwh-r297 | 2023-06-19T16:50:23Z | 2022-02-11T00:00:46Z | 2023-06-19T16:50:23Z | [] | Duplicate advisory: swift-nio-http2 vulnerable to denial of service via ALTSVC or ORIGIN frames | ## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-pgfx-g6rc-8cjv. This link is maintained to preserve external references.
## Original Description
A program using swift-nio-http2 is vulnerable to a denial of service attack caused by a network peer sending ALTSVC or ORIGIN frame... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-nio-http2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.19.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-http2/security/advisories/GHSA-pgfx-g6rc-8cjv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24668'}, {'type': 'PACKAGE', 'url': 'https://github.com/apple/swift-nio-http2'}] | {'cwe_ids': ['CWE-241'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T16:50:23Z', 'nvd_published_at': '2022-02-09T23:15:00Z'} |
1.4.0 | GHSA-j33j-fg2g-mcv2 | 2023-09-14T12:06:06Z | 2022-02-10T22:27:58Z | null | ['CVE-2020-15400'] | Cross-Site Request Forgery in CakePHP | CakePHP before 4.0.6 and 3.10.3 mishandles CSRF token generation. This might be remotely exploitable in conjunction with XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ecosystem_specific': {'affected_functio... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15400'}, {'type': 'WEB', 'url': 'https://bakery.cakephp.org/2020/04/18/cakephp_406_released.html'}, {'type': 'WEB', 'url': 'https://bakery.cakephp.org/2022/05/08/cakephp_3103_released.html'}] | {'cwe_ids': ['CWE-352', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T21:28:56Z', 'nvd_published_at': '2020-06-30T12:15:00Z'} |
1.4.0 | GHSA-hxmr-5gv9-6p8v | 2022-02-24T13:06:37Z | 2022-02-15T00:02:47Z | null | ['CVE-2022-0575'] | Cross-site Scripting in librenms | Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.2.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0575'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/13951f51-... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:42:17Z', 'nvd_published_at': '2022-02-14T12:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.