schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-vhm6-gw82-6f8j
2022-03-08T18:06:06Z
2022-02-28T00:00:34Z
null
['CVE-2022-0772']
Cross site scripting in LibreNMS
LibreNMS prior to version 22.2.2 is vulnerable to cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0772'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/703745d0ed3948623153117d761ce48514e2f281'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/faae29bd-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:02:41Z', 'nvd_published_at': '2022-02-27T22:15:00Z'}
1.4.0
GHSA-34wx-x2w9-vqm3
2022-11-29T23:30:39Z
2022-02-10T00:00:30Z
null
['CVE-2022-0538']
DoS vulnerability in bundled XStream library in Jenkins Core
Jenkins 2.333 and earlier, LTS 2.319.2 and earlier is affected by the XStream library’s vulnerability [CVE-2021-43859](https://x-stream.github.io/CVE-2021-43859.html). This library is used by Jenkins to serialize and deserialize various XML files, like global and job `config.xml`, `build.xml`, and numerous others. Thi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.320'}, {'fixed': '2.334'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0538'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-09/#SECURITY-2602'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/02/09/1'}]
{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:50:31Z', 'nvd_published_at': '2022-02-09T14:15:00Z'}
1.4.0
GHSA-q234-x887-9rxh
2023-05-30T19:35:37Z
2022-02-16T00:01:35Z
null
['CVE-2022-25177']
Improper Link Resolution Before File Access in Jenkins Pipeline: Shared Groovy Libraries Plugin
Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier follows symbolic links to locations outside of the expected Pipeline library when reading files using the libraryResource step, allowing attackers able to configure Pipelines to read arbitrary files on the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps-global-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.22'}, {'fixed': '561.va_ce0de3c2d69'}]}], 'database_specific': {'last_known_affected_version_range': '<= 552.vd9cc05b8a2e1'}}, {'package': {'ecosystem': '...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25177'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/workflow-cps-global-lib-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613'}]
{'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:46:46Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-742w-89gc-8m9c
2022-02-11T23:27:39Z
2022-02-11T23:27:39Z
null
['CVE-2020-15157']
containerd v1.2.x can be coerced into leaking credentials during image pull
## Impact If a container image manifest in the OCI Image format or Docker Image V2 Schema 2 format includes a URL for the location of a specific image layer (otherwise known as a “foreign layer”), the default containerd resolver will follow that URL to attempt to download it. In v1.2.x but not 1.3.0 or later, the defa...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.14'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-742w-89gc-8m9c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15157'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/1ead8d9deb3b175bf40413b8c47b3d19c2262726'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T17:51:17Z', 'nvd_published_at': '2020-10-16T17:15:00Z'}
1.4.0
GHSA-23h5-8ph6-7rfc
2022-12-01T23:05:05Z
2022-02-16T00:01:27Z
null
['CVE-2022-25188']
Path traversal vulnerability in Jenkins Fortify Plugin
Fortify Plugin 20.2.34 and earlier does not sanitize the `appName` and `appVersion` parameters of its Pipeline steps, which are used to write to files inside build directories. This allows attackers with Item/Configure permission to write or overwrite `.xml` files on the Jenkins controller file system with content not...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:fortify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.2.35'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25188'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/fortify-plugin/commit/ba3030cb63bb86b6bb13342664e0e319f2fee374'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/fortify-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.i...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T23:05:05Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-c58c-w527-h77p
2022-02-23T22:11:56Z
2022-02-12T00:00:48Z
null
['CVE-2022-24289']
Deserialization of untrusted data in Apache Cayenne
Hessian serialization is a network protocol that supports object-based transmission. Apache Cayenne's optional Remote Object Persistence (ROP) feature is a web services-based technology that provides object persistence and query functionality to 'remote' applications. In Apache Cayenne 4.1 and earlier, running on non-c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cayenne:cayenne-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24289'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/zthjy83t3o66x7xcbygn2vg3yjvlc9vc'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/02/11/1'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:48:21Z', 'nvd_published_at': '2022-02-11T13:15:00Z'}
1.4.0
GHSA-jrpg-35hw-m4p9
2022-02-14T23:01:26Z
2022-02-09T00:00:29Z
null
['CVE-2021-45327']
Capture-replay in Gitea
Gitea is a project to help users set up a self-hosted Git service. Gitea before 1.11.2 is affected by Trusting HTTP Permission Methods on the Server Side when referencing the vulnerable admin or user API. This could allow a remote malicious user to execute arbitrary code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/go-gitea/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45327'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/10462'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/10465'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/10582'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-294'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T23:01:26Z', 'nvd_published_at': '2022-02-08T15:15:00Z'}
1.4.0
GHSA-gc7q-7vg3-h8gf
2022-12-01T22:21:32Z
2022-02-16T00:01:19Z
null
['CVE-2022-25202']
Stored Cross-site Scripting vulnerability in Jenkins Promoted Builds (Simple) Plugin
Jenkins Promoted Builds (Simple) Plugin 1.9 and earlier does not escape the name of custom promotion levels, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:promoted-builds-simple'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25202'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/promoted-builds-simple-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2334'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:21:32Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-jp55-vvmf-63mv
2022-02-09T21:42:47Z
2022-02-09T21:42:47Z
null
['CVE-2022-23618']
URL Redirection to Untrusted Site ('Open Redirect')
### Impact There's no protection against URL redirection to untrusted site, in particular some well known parameters (xredirect) can be used to perform such redirections. ### Patches The problem has been patched in XWiki 12.10.7 and XWiki 13.3RC1. ### Workarounds There's no known workaround for this issue. ### Refe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.10.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jp55-vvmf-63mv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23618'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/5251c02080466bf9fb55288f04a37671108f8096'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T21:42:47Z', 'nvd_published_at': '2022-02-09T21:15:00Z'}
1.4.0
GHSA-5pcf-vxm3-frph
2022-12-01T22:24:53Z
2022-02-16T00:01:20Z
null
['CVE-2022-25200']
CSRF vulnerability in Jenkins Checkmarx Plugin allow capturing credentials
Checkmarx Plugin 2022.1.2 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Additi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.checkmarx.jenkins:checkmarx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25200'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/checkmarx-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/checkmarx-plugin/releases/tag/Release_2022.1.3'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/adv...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:24:53Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-pf59-j7c2-rh6x
2023-03-16T17:41:25Z
2022-02-15T01:57:18Z
null
['CVE-2020-13597']
Exposure of Sensitive Information to an Unauthorized Actor and Insertion of Sensitive Information Into Sent Data in Calico
Clusters using Calico (version 3.14.0 and below), Calico Enterprise (version 2.8.2 and below), may be vulnerable to information disclosure if IPv6 is enabled but unused. A compromised pod with sufficient privilege is able to reconfigure the node’s IPv6 interface due to the node accepting route advertisement by default,...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/projectcalico/calico'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13597'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/91507'}, {'type': 'WEB', 'url': 'https://github.com/containernetworking/plugins/pull/484/'}, {'type': 'WEB', 'url': 'https://github.com/containernetworking/plugins/com...
{'cwe_ids': ['CWE-200', 'CWE-201'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-14T16:27:14Z', 'nvd_published_at': '2020-06-03T17:15:00Z'}
1.4.0
GHSA-8vq6-5f66-hp3r
2022-03-07T13:41:24Z
2022-02-26T00:00:44Z
null
['CVE-2022-0746']
Logic error in dolibarr/dolibarr
In dolibarr/dolibarr prior to 16.0 any low privileged users could update their login name which should only be updated by admin.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0746'}, {'type': 'WEB', 'url': 'https://github.com/dolibarr/dolibarr/commit/4973019630d51ad76b7c1a4141ec7a33053a7d21'}, {'type': 'PACKAGE', 'url': 'https://github.com/dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b812ea22-...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:41:50Z', 'nvd_published_at': '2022-02-25T09:15:00Z'}
1.4.0
GHSA-wc9w-wvq2-ffm9
2021-05-14T16:27:02Z
2022-02-15T01:57:18Z
null
['CVE-2020-13379']
Server Side Request Forgery in Grafana
The avatar feature in Grafana 3.0.1 through 7.0.1 has an SSRF Incorrect Access Control issue that allows remote code execution. This vulnerability allows any unauthenticated user/client to make Grafana send HTTP requests to any URL and return its result to the user/client. This can be used to gain information about the...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N/E:F/RL:O/RC:C'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana/pkg/api/avatar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.1'}, {'fixed': '6.7.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana/pkg/api/avatar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduc...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13379'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/commit/ba953be95f0302c2ea80d23f1e5f2c1847365192'}, {'type': 'WEB', 'url': 'https://community.grafana.com/t/grafana-7-0-2-and-6-7-4-security-update/31408'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-14T16:27:02Z', 'nvd_published_at': None}
1.4.0
GHSA-gf7x-2j2x-7f73
2022-02-09T21:41:46Z
2022-02-09T21:41:46Z
null
['CVE-2022-23617']
Missing authorization in xwiki-platform
### Impact Any user with edit right can copy the content of a page it does not have access to by using it as template of a new page. ### Patches It has been patched in XWiki 13.2CR1 and 12.10.6 ### Workarounds There is no workaround beside patching. ### References https://jira.xwiki.org/browse/XWIKI-18430 ### F...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gf7x-2j2x-7f73'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23617'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/30c52b01559b8ef5ed1035dac7c34aaf805764d5'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T21:41:46Z', 'nvd_published_at': '2022-02-09T21:15:00Z'}
1.4.0
GHSA-627q-g293-49q7
2022-02-11T20:38:56Z
2022-02-07T22:01:24Z
null
['CVE-2022-23580']
Abort caused by allocating a vector that is too large in Tensorflow
### Impact During shape inference, TensorFlow can [allocate a large vector](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L788-L790) based on a value from a tensor controlled by the user: ```cc const auto num_dims = Value(shape_dim...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-627q-g293-49q7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23580'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1361fb7e29449629e1df94d44e0427ebec8c83c7'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-1284', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T20:00:51Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-59x4-67mh-px54
2022-03-01T18:36:13Z
2022-02-18T00:00:36Z
null
['CVE-2022-24953']
Crypt_GPG does not prevent additional options in GPG calls
The Crypt_GPG extension before 1.6.7 for PHP does not prevent additional options in GPG calls, which presents a risk for certain environments and GPG versions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pear/crypt_gpg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24953'}, {'type': 'WEB', 'url': 'https://github.com/pear/Crypt_GPG/commit/29c0fbe96d0d4063ecd5c9a4644cb65a7fb7cc4e'}, {'type': 'WEB', 'url': 'https://github.com/pear/Crypt_GPG/commit/74c8f989cefbe0887274b461dc56197e121bfd04'}, {'type': 'PACKAGE', '...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T18:14:03Z', 'nvd_published_at': '2022-02-17T05:15:00Z'}
1.4.0
GHSA-wxj7-97fp-j53j
2022-02-07T21:20:28Z
2022-02-01T00:46:01Z
null
['CVE-2021-23484']
Exposure of Resource to Wrong Sphere in Zip-Local
The package zip-local before 0.3.5 are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) which can lead to an extraction of a crafted file outside the intended extraction directory.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'zip-local'}, 'ecosystem_specific': {'affected_functions': ['zip-local.unzip', 'zip-local.sync.unzip']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23484'}, {'type': 'WEB', 'url': 'https://github.com/Mostafa-Samir/zip-local/commit/6bb9b59733df379ac168aa705790bd8339b4bf9b'}, {'type': 'WEB', 'url': 'https://github.com/Mostafa-Samir/zip-local/commit/949446a95a660c0752b1db0c654f0fd619ae6085'}, {'t...
{'cwe_ids': ['CWE-29', 'CWE-668'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T19:55:36Z', 'nvd_published_at': '2022-01-28T22:15:00Z'}
1.4.0
GHSA-m6q5-wv4x-fv6h
2022-02-25T15:33:47Z
2022-02-12T00:00:47Z
null
['CVE-2020-13668']
Cross-site Scripting in Drupal Core
Access Bypass vulnerability in Drupal Core allows for an attacker to leverage the way that HTML is rendered for affected forms in order to exploit the vulnerability. This issue affects: Drupal Core 8.8.x versions prior to 8.8.10; 8.9.x versions prior to 8.9.6; 9.0.x versions prior to 9.0.6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.8.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.9.0'}, {'fixed': '8.9.6'}]}]}, {'pack...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13668'}, {'type': 'WEB', 'url': 'https://github.com/drupal/core/commit/3184fa4b2f3b65b44884b5e858cdc7794d34b4c8'}, {'type': 'WEB', 'url': 'https://github.com/drupal/core/commit/58330ba58d1ac6f1a0a549e8dbde8a3e094bf4fb'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T15:33:47Z', 'nvd_published_at': '2022-02-11T16:15:00Z'}
1.4.0
GHSA-73q4-j324-2qcc
2022-03-01T22:04:09Z
2022-02-18T00:00:36Z
null
['CVE-2022-25270']
Incorrect authorization in Drupal core
The Quick Edit module does not properly check entity access in some circumstances. This could result in users with the "access in-place editing" permission viewing some content they are are not authorized to access. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.3.0'}, {'fixed': '9.3.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '9.2.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25270'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2022-004'}]
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:39:06Z', 'nvd_published_at': '2022-02-17T00:15:00Z'}
1.4.0
GHSA-rqff-837h-mm52
2022-02-24T14:00:06Z
2022-02-15T00:02:46Z
null
['CVE-2022-0512']
Authorization bypass in url-parse
Authorization Bypass Through User-Controlled Key in NPM url-parse prior to 1.5.6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'url-parse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0512'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/url-parse/commit/9be7ee88afd2bb04e4d5a1a8da9a389ac13f8c40'}, {'type': 'PACKAGE', 'url': 'https://github.com/unshiftio/url-parse'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6d1bc...
{'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:37:39Z', 'nvd_published_at': '2022-02-14T16:15:00Z'}
1.4.0
GHSA-mrq8-53r4-3j5m
2022-01-27T20:15:58Z
2022-02-10T22:35:39Z
null
['CVE-2018-20301']
Permissive parameters and privilege escalation
An issue was discovered in Steve Pallen Coherence before 0.5.2 that is similar to a Mass Assignment vulnerability. In particular, "registration" endpoints (e.g., creating, editing, updating) allow users to update any coherence_fields data. For example, users can automatically confirm their accounts by sending the confi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Hex', 'name': 'coherence'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-20301'}, {'type': 'WEB', 'url': 'https://github.com/smpallen99/coherence/issues/270'}, {'type': 'PACKAGE', 'url': 'https://github.com/smpallen99/coherence'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-27T20:15:58Z', 'nvd_published_at': None}
1.4.0
GHSA-fq56-c7rj-j3j9
2022-12-01T22:13:28Z
2022-02-16T00:01:15Z
null
['CVE-2022-25208']
Missing permission checks in Jenkins Chef Sinatra Plugin allow XXE
Chef Sinatra Plugin 1.20 and earlier does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read permission to have Jenkins send an HTTP request to an attacker-controlled URL and have it parse the response as XML. As the plugin does not configure its XML parse...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:sinatra-chef-builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25208'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/sinatra-chef-builder-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1377'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss...
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:13:28Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-57q7-rxqq-7vgp
2021-05-18T21:39:10Z
2022-02-15T01:57:18Z
null
[]
On Windows, `git-sizer` might run a `git` executable within the repository being analyzed
### Impact On Windows, if `git-sizer` is run against a non-bare repository, and that repository has an executable called `git.exe`, `git.bat`, etc., then that executable might be run by `git-sizer` rather than the system `git` executable. An attacker could try to use social engineering to get a victim to run `git-sizer...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/github/git-sizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/github/git-sizer/security/advisories/GHSA-57q7-rxqq-7vgp'}, {'type': 'WEB', 'url': 'https://github.com/github/git-sizer/commit/38400d6ddd79325e956b00ff584cfcc8dd96d536'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:39:10Z', 'nvd_published_at': None}
1.4.0
GHSA-6x3j-x9rp-whxp
2022-03-02T20:59:35Z
2022-02-20T00:00:32Z
null
['CVE-2022-0409']
Unrestricted Upload of File with Dangerous Type in showdoc
showdoc prior to 2.10.2 is vulnerable to Unrestricted Upload of File with Dangerous Type.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0409'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/7383d7a3c1b0807b6f397ba7df415a0ce7ccc436'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c25bfad1-2611...
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T19:31:46Z', 'nvd_published_at': '2022-02-19T05:15:00Z'}
1.4.0
GHSA-5qgp-p5jc-w2rm
2021-05-20T21:03:55Z
2022-02-15T00:41:12Z
null
['CVE-2014-6407']
Arbitrary Code Execution in Docker
Docker before 1.3.2 allows remote attackers to write to arbitrary files and execute arbitrary code via a (1) symlink or (2) hard link attack in an image archive in a (a) pull or (b) load operation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-6407'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker/commit/3ac6394b8082d4700483d52fbfe54914be537d9e'}, {'type': 'WEB', 'url': 'https://docs.docker.com/v1.3/release-notes/'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/piper...
{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:03:55Z', 'nvd_published_at': None}
1.4.0
GHSA-x832-r2rj-4g5p
2023-07-11T00:15:22Z
2022-02-20T00:00:32Z
null
['CVE-2022-24980']
SSRF in Kitodo.Presentation
An issue was discovered in the Kitodo.Presentation (aka dlf) extension before 2.3.2, 3.x before 3.2.3, and 3.3.x before 3.3.4 for TYPO3. A missing access check in an eID script allows an unauthenticated user to submit arbitrary URLs to this component. This results in SSRF, allowing attackers to view the content of any ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'kitodo/presentation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'kitodo/presentation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.3'}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24980'}, {'type': 'WEB', 'url': 'https://github.com/kitodo/kitodo-presentation/commit/059be3f82b08c60cbb798986cd3ff22dbf60a5e4'}, {'type': 'WEB', 'url': 'https://github.com/kitodo/kitodo-presentation/commit/4a20621afc30778ba3b045be5110353cf4fd4fd4'...
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T00:15:22Z', 'nvd_published_at': '2022-02-19T04:15:00Z'}
1.4.0
GHSA-f68h-hfqp-8rmv
2021-04-13T17:36:09Z
2022-02-09T23:08:03Z
null
['CVE-2017-15684']
Path Traversal in Crafter CMS Crafter Studio
Crafter CMS Crafter Studio 3.0.1 has a directory traversal vulnerability which allows unauthenticated attackers to view files from the operating system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15684'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.0/security/advisory.html'}, {'type': 'WEB', 'url': 'http://crafter.com'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T17:36:09Z', 'nvd_published_at': '2020-11-27T18:15:00Z'}
1.4.0
GHSA-2cjf-w7c4-fhf6
2022-02-11T15:04:27Z
2022-02-10T00:00:30Z
null
['CVE-2022-0539']
Cross-site Scripting in Beanstalk console
Beanstalk console (ptrofimov/beanstalk_console) prior to 1.7.14 is vulnerable to cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'ptrofimov/beanstalk_console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0539'}, {'type': 'WEB', 'url': 'https://github.com/ptrofimov/beanstalk_console/commit/5aea5f912f6e6d19dedb1fdfc25a29a2e1fc1694'}, {'type': 'PACKAGE', 'url': 'https://github.com/ptrofimov/beanstalk_console'}, {'type': 'WEB', 'url': 'https://huntr.de...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-11T15:04:27Z', 'nvd_published_at': '2022-02-09T14:15:00Z'}
1.4.0
GHSA-8rcj-c8pj-v3m3
2022-02-11T15:07:06Z
2022-02-09T23:55:28Z
null
['CVE-2022-23564']
Reachable Assertion in Tensorflow
### Impact When decoding a resource handle tensor from protobuf, a TensorFlow process can encounter cases where a `CHECK` assertion is invalidated based on user controlled arguments. This allows attackers to cause denial of services in TensorFlow processes. ### Patches We have patched the issue in GitHub commit [14fea...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8rcj-c8pj-v3m3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23564'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/14fea662350e7c26eb5fe1be2ac31704e5682ee6'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T21:00:20Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-jh6m-3pqw-242h
2022-08-12T20:52:13Z
2022-02-09T00:56:04Z
null
['CVE-2020-14359']
Keycloak Gatekeeper vulnerable to bypass on using lower case HTTP headers
A vulnerability was found in all versions of the deprecated package Keycloak Gatekeeper, where on using lower case HTTP headers (via cURL) we can bypass our Gatekeeper. Lower case headers are also accepted by some webservers (e.g. Jetty). This means there is no protection when we put a Gatekeeper in front of a Jetty se...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/keycloak/keycloak-gatekeeper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14359'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/issues/12934'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1868591'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak-gatekeeper'}, {'ty...
{'cwe_ids': ['CWE-305'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T16:13:00Z', 'nvd_published_at': '2021-02-23T13:15:00Z'}
1.4.0
GHSA-7q5g-gph2-4rc6
2021-04-07T18:02:24Z
2022-02-09T22:29:52Z
null
['CVE-2020-17518']
Upload of file to arbitrary path in Apache Flink
Apache Flink 1.5.1 introduced a REST handler that allows you to write an uploaded file to an arbitrary location on the local file system, through a maliciously modified HTTP HEADER. The files can be written to any location accessible by Flink 1.5.1. All users should upgrade to Flink 1.11.3 or 1.12.0 if their Flink inst...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.flink:flink-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.1'}, {'fixed': '1.11.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17518'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0b000dc028616d33cb9aa388eb45d516b789cab0024dad94bc06588a@%3Cissues.flink.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a...
{'cwe_ids': ['CWE-22', 'CWE-23'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T18:02:24Z', 'nvd_published_at': '2021-01-05T12:15:00Z'}
1.4.0
GHSA-6m85-wvcr-pgw3
2022-12-03T03:44:36Z
2022-02-10T20:33:49Z
null
['CVE-2020-7737']
Prototype Pollution in safetydance
All versions of package safetydance are vulnerable to Prototype Pollution via the set function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'safetydance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7737'}, {'type': 'PACKAGE', 'url': 'https://github.com/gramakri/safetydance'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-SAFETYDANCE-598687'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/safetydance'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T22:33:20Z', 'nvd_published_at': '2020-10-02T10:15:00Z'}
1.4.0
GHSA-mmj4-777p-fpq9
2023-07-13T19:05:32Z
2022-02-07T22:38:37Z
null
['CVE-2022-23624']
Validation bypass in frourio-express
## 日本語 ### 影響 v0.26.0以前のfrourioを使用している、かつvalidators/を利用している場合、ネストされたバリデータがリクエストのボディーとクエリに対して正しく働かないケースがあります。また、リクエストに対してバリデーションが効かなくなる入力があります。 ### パッチ frourioをv0.26.0かそれ以降のバージョンにアップデートをお願いします。frourio を使用したプロジェクトには `class-transformer` と `reflect-metadata` の依存への追加も必要となります。 ### ワークアラウンド controller側で自分でclass-transformer...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'frourio-express'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.26.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/frouriojs/frourio-express/security/advisories/GHSA-mmj4-777p-fpq9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23624'}, {'type': 'WEB', 'url': 'https://github.com/frouriojs/frourio-express/commit/73ded5c6f9f1c126c0cb2d05c0505e9e4db142d2'}, {'type'...
{'cwe_ids': ['CWE-1321', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T22:38:37Z', 'nvd_published_at': '2022-02-07T23:15:00Z'}
1.4.0
GHSA-c32g-2mgr-cfq7
2022-02-07T20:59:22Z
2022-02-02T00:01:45Z
null
['CVE-2022-24197']
Out-of-bounds Write in iText
iText v7.1.17 was discovered to contain a stack-based buffer overflow via the component ByteBuffer.append, which allows attackers to cause a Denial of Service (DoS) via a crafted PDF file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.itextpdf:itext7-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.1.17'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24197'}, {'type': 'WEB', 'url': 'https://github.com/itext/itext7/pull/78'}, {'type': 'WEB', 'url': 'https://github.com/itext/itext7/pull/78#issuecomment-1089282165'}, {'type': 'PACKAGE', 'url': 'https://github.com/itext/itext7'}, {'type': 'WEB', 'u...
{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T20:59:22Z', 'nvd_published_at': '2022-02-01T20:15:00Z'}
1.4.0
GHSA-4v5p-v5h9-6xjx
2022-02-11T15:06:53Z
2022-02-09T23:49:01Z
null
['CVE-2022-23565']
`CHECK`-failures in Tensorflow
### Impact An attacker can trigger denial of service via assertion failure by altering a `SavedModel` on disk such that `AttrDef`s of some operation are duplicated. ### Patches We have patched the issue in GitHub commit [c2b31ff2d3151acb230edc3f5b1832d2c713a9e0](https://github.com/tensorflow/tensorflow/commit/c2b31ff2...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4v5p-v5h9-6xjx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23565'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c2b31ff2d3151acb230edc3f5b1832d2c713a9e0'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:24:46Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-pw2r-vq6v-hr8c
2022-02-14T22:27:56Z
2022-02-10T00:00:31Z
null
['CVE-2022-0536']
Exposure of Sensitive Information to an Unauthorized Actor in follow-redirects
Exposure of Sensitive Information to an Unauthorized Actor in NPM follow-redirects prior to 1.14.8.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'follow-redirects'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0536'}, {'type': 'WEB', 'url': 'https://github.com/follow-redirects/follow-redirects/commit/62e546a99c07c3ee5e4e0718c84a6ca127c5c445'}, {'type': 'PACKAGE', 'url': 'https://github.com/follow-redirects/follow-redirects'}, {'type': 'WEB', 'url': 'http...
{'cwe_ids': ['CWE-200', 'CWE-212'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-11T21:18:03Z', 'nvd_published_at': '2022-02-09T11:15:00Z'}
1.4.0
GHSA-6jp6-9rf9-gc66
2022-03-09T21:03:03Z
2022-02-25T22:18:50Z
null
['CVE-2022-24710']
Cross-site Scripting in Weblate
### Impact Due to improper neutralization, it was possible to perform cross-site scripting via crafted user and language names. ### Patches The issues were fixed in the 4.11 release. The following commits are addressing it: * f6753a1a1c63fade6ad418fbda827c6750ab0bda * 9e19a8414337692cc90da2a91c9af5420f2952f1 * 22d57...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Weblate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/security/advisories/GHSA-6jp6-9rf9-gc66'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24710'}, {'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/commit/22d577b1f1e88665a88b4569380148030e0f8389'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T22:18:50Z', 'nvd_published_at': '2022-02-25T21:15:00Z'}
1.4.0
GHSA-f246-xrrj-g8j6
2023-09-05T22:52:01Z
2022-02-10T20:19:47Z
null
['CVE-2020-7773']
Cross-site Scripting in markdown-it-highlightjs
This affects the package markdown-it-highlightjs before 3.3.1. It is possible insert malicious JavaScript as a value of lang in the markdown-it-highlightjs Inline code highlighting feature. ```js const markdownItHighlightjs = require("markdown-it-highlightjs"); const md = require('markdown-it'); const reuslt_xss = m...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'markdown-it-highlightjs'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7773'}, {'type': 'WEB', 'url': 'https://github.com/valeriangalliat/markdown-it-highlightjs/pull/14'}, {'type': 'WEB', 'url': 'https://github.com/valeriangalliat/markdown-it-highlightjs/blob/v3.3.0/index.js%23L52'}, {'type': 'WEB', 'url': 'https://s...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-15T21:12:47Z', 'nvd_published_at': '2020-11-16T12:15:00Z'}
1.4.0
GHSA-vh5c-jqfg-mhrh
2022-02-11T21:08:09Z
2022-02-10T22:42:46Z
null
['CVE-2021-32732']
Cross-Site Request Forgery in xwiki-platform
### Impact It's possible to know if a user has or not an account in a wiki related to an email address, and which username(s) is actually tight to that email by forging a request to the Forgot username page. Note that since this page does not have a CSRF check it's quite easy to perform a lot of those requests. ### Pa...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-administration-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-administration-ui'}, 'ranges': [{'type': 'ECOSYSTEM...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-vh5c-jqfg-mhrh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32732'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/69548c0320cbd772540cf4668743e69f879812cf'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T16:35:35Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-vqj2-4v8m-8vrq
2022-02-24T21:42:26Z
2022-02-24T00:00:54Z
null
['CVE-2022-0736']
Insecure Temporary File in mlflow
mlflow prior to 1.23.1 contains an insecure temporary file. The insecure function `tempfile.mktemp()` is deprecated and `mkstemp()` should be used instead.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mlflow'}, 'ecosystem_specific': {'affected_functions': ['mlflow.utils.file_utils.make_tarfile', 'mlflow.projects.docker._create_docker_build_ctx']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0736'}, {'type': 'WEB', 'url': 'https://github.com/mlflow/mlflow/commit/61984e6843d2e59235d82a580c529920cd8f3711'}, {'type': 'PACKAGE', 'url': 'https://github.com/mlflow/mlflow'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e5384764-c583-4de...
{'cwe_ids': ['CWE-377', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T21:42:26Z', 'nvd_published_at': '2022-02-23T09:15:00Z'}
1.4.0
GHSA-64q9-f38h-9mwx
2022-12-01T22:18:12Z
2022-02-16T00:01:18Z
null
['CVE-2022-25204']
Protection Mechanism Failure in Jenkins Doktor Plugin
Jenkins Doktor Plugin 0.4.1 and earlier implements functionality that allows agent processes to render files on the controller as Markdown or Asciidoc, and error messages allow attackers able to control agent processes to determine whether a file with a given name exists.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'by.dev.madhead.doktor:doktor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25204'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/doktor-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2548'}]
{'cwe_ids': ['CWE-693'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T17:31:28Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-f2jw-pr2c-9x96
2022-05-04T03:05:58Z
2022-02-10T23:41:49Z
null
['CVE-2021-29369']
Code injection in @rkesters/gnuplot
@rkesters/gnuplot is an easy to use node module to draw charts using gnuplot and ps2pdf. The gnuplot package prior to version 0.1.0 for Node.js allows code execution via shell metacharacters in Gnuplot commands.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@rkesters/gnuplot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29369'}, {'type': 'WEB', 'url': 'https://github.com/rkesters/gnuplot/commit/23671d4d3d28570fb19a936a6328bfac742410de'}, {'type': 'PACKAGE', 'url': 'https://www.npmjs.com/package/@rkesters/gnuplot'}]
{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T21:39:05Z', 'nvd_published_at': '2021-05-03T12:15:00Z'}
1.4.0
GHSA-389p-fchr-q2mg
2022-02-25T17:59:00Z
2022-02-15T00:02:47Z
null
['CVE-2022-24977']
Path Traversal in ImpressCMS
ImpressCMS before 1.4.2 allows unauthenticated remote code execution via ...../// directory traversal in origName or imageName, leading to unsafe interaction with the CKEditor processImage.php script. The payload may be placed in PHP_SESSION_UPLOAD_PROGRESS when the PHP installation supports upload_progress.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24977'}, {'type': 'WEB', 'url': 'https://github.com/ImpressCMS/impresscms/commit/a66d7bb499faafab803e24833606028fa0ba4261'}, {'type': 'PACKAGE', 'url': 'https://github.com/ImpressCMS/impresscms'}, {'type': 'WEB', 'url': 'https://github.com/ImpressC...
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T17:59:00Z', 'nvd_published_at': '2022-02-14T12:15:00Z'}
1.4.0
GHSA-3whx-qrj5-hh2h
2022-02-11T17:07:14Z
2022-02-02T00:01:52Z
null
['CVE-2021-41571']
Improper Input Validation in Apache Pulsar
In Apache Pulsar it is possible to access data from BookKeeper that does not belong to the topics accessible by the authenticated user. The Admin API get-message-by-id requires the user to input a topic and a ledger id. The ledger id is a pointer to the data, and it is supposed to be a valid it for the topic. Authorisa...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41571'}, {'type': 'WEB', 'url': 'https://github.com/apache/pulsar/issues/11814'}, {'type': 'WEB', 'url': 'https://github.com/apache/pulsar/pull/11852'}, {'type': 'WEB', 'url': 'https://github.com/apache/pulsar/pull/11912'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-20', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T17:38:32Z', 'nvd_published_at': '2022-02-01T13:15:00Z'}
1.4.0
GHSA-xrjf-phvv-r4vr
2022-03-09T20:26:21Z
2022-02-27T00:00:15Z
null
['CVE-2022-0764']
Command injection in strapi
When creating a strapi app using npxcreate-strapi-app, we can inject arbitrary commands through the template cli argument as per the code in this particular [link](https://github.com/strapi/strapi/blob/master/packages/generators/app/lib/utils/fetch-npm-template.js#L13), this happens due to improper sanitization of user...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0764'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/issues/12879'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/commit/2a3f5e988be6a2c7dae5ac22b9e86d579b462f4c'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strap...
{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:42:15Z', 'nvd_published_at': '2022-02-26T15:15:00Z'}
1.4.0
GHSA-6cm4-gm85-972c
2022-03-08T18:48:57Z
2022-02-20T00:00:35Z
null
['CVE-2021-45082']
Command Injection in Cobbler
An issue was discovered in Cobbler through 3.3.0. In the templar.py file, the function check_for_invalid_imports can allow Cheetah code to import Python modules via the "#from MODULE import" substring. (Only lines beginning with #import are blocked.)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45082'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/pull/2945'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1193678'}, {'type': 'PACKAGE', 'url': 'https://github.com/cobbler/cobbler'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-08T18:48:57Z', 'nvd_published_at': '2022-02-19T00:15:00Z'}
1.4.0
GHSA-9m95-8hx6-7p9v
2022-03-15T21:39:42Z
2022-02-15T01:17:37Z
null
['CVE-2021-29136']
Improper input validation in umoci
### Impact umoci 0.4.6 and earlier can be tricked into modifying host files by creating a malicious layer that has a symlink with the name "." (or "/"). Because umoci deletes inodes if they change types, this results in the rootfs directory being replaced with an attacker-controlled symlink. Subsequent image layers wi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/opencontainers/umoci'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/opencontainers/umoci/security/advisories/GHSA-9m95-8hx6-7p9v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29136'}, {'type': 'WEB', 'url': 'https://github.com/opencontainers/umoci/commit/d9efc31daf2206f7d3fdb839863cf7a576a2eb57'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:13:37Z', 'nvd_published_at': None}
1.4.0
GHSA-f5pg-7wfw-84q9
2023-02-07T21:27:07Z
2022-02-11T23:26:26Z
null
['CVE-2020-8911']
CBC padding oracle issue in AWS S3 Crypto SDK for golang
### Summary The golang AWS S3 Crypto SDK is impacted by an issue that can result in loss of confidentiality and message forgery. The attack requires write access to the bucket in question, and that the attacker has access to an endpoint that reveals decryption failures (without revealing the plaintext) and that when e...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/aws/aws-sdk-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.34.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/google/security-research/security/advisories/GHSA-f5pg-7wfw-84q9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8911'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-go/pull/3403'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-go/...
{'cwe_ids': ['CWE-327'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T17:57:15Z', 'nvd_published_at': None}
1.4.0
GHSA-3c7p-vv5r-cmr5
2023-02-08T23:51:18Z
2022-02-10T00:31:27Z
null
['CVE-2020-13957']
Incorrect Authorization in Apache Solr
Apache Solr versions 6.6.0 to 6.6.6, 7.0.0 to 7.7.3 and 8.0.0 to 8.6.2 prevents some features considered dangerous (which could be used for remote code execution) to be configured in a ConfigSet that's uploaded via API without authentication/authorization. The checks in place to prevent such features can be circumvente...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.solr:solr-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.6.0'}, {'fixed': '8.6.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13957'}, {'type': 'WEB', 'url': 'https://github.com/apache/solr/commit/e001c2221812a0ba9e9378855040ce72f93eced4'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r13a728994c60be5b5a7049282b5c926dac1fc6a9a0b2362f6adfa573@%3Cissues.luce...
{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T17:55:51Z', 'nvd_published_at': '2020-10-13T19:15:00Z'}
1.4.0
GHSA-6jv7-28mv-qp9c
2022-05-04T20:59:04Z
2022-02-16T00:01:23Z
null
['CVE-2022-25195']
Missing permission check in Jenkins autonomiq Plugin
A missing permission check in Jenkins autonomiq Plugin 1.15 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:autonomiq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25195'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/autonomiq-plugin'}, {'type': 'WEB', 'url': 'https://www.jenki...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T20:59:04Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-r3gq-wxqf-q4gh
2022-02-14T23:01:49Z
2022-02-10T00:00:32Z
null
['CVE-2021-45329']
Cross-site Scripting in Gitea
Cross Site Scripting (XSS) vulnerability exists in Gitea before 1.5.1 via the repository settings inside the external wiki/issue tracker URL field.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/go-gitea/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45329'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/4710'}, {'type': 'WEB', 'url': 'https://blog.gitea.io/2018/09/gitea-1.5.1-is-released/'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-gitea/gitea'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T23:01:49Z', 'nvd_published_at': '2022-02-08T23:15:00Z'}
1.4.0
GHSA-r992-xph6-h7x2
2022-02-23T21:57:38Z
2022-02-12T00:00:48Z
null
['CVE-2022-0560']
Open redirect in microweber
microweber prior to 1.2.11 is vulnerable to open redirect.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0560'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/72d4b12cc487f56a859a8570ada4efb77b4b8c63'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:49:46Z', 'nvd_published_at': '2022-02-11T13:15:00Z'}
1.4.0
GHSA-wc4g-r73w-x8mm
2022-02-07T22:08:14Z
2022-02-09T23:54:51Z
null
['CVE-2022-23563']
Insecure temporary file in Tensorflow
### Impact In multiple places, TensorFlow uses `tempfile.mktemp` to create temporary files. While this is acceptable in testing, in utilities and libraries it is dangerous as a different process can create the file between the check for the filename in `mktemp` and the actual creation of the file by a subsequent operat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wc4g-r73w-x8mm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23563'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}]
{'cwe_ids': ['CWE-367', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:56:43Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-ghww-cv4v-hmxx
2022-02-22T17:24:42Z
2022-02-18T00:00:34Z
null
['CVE-2022-0638']
Cross-Site Request Forgery microweber
microweber prior to version 1.2.11 is vulnerable to Cross-Site Request Forgery (CSRF).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0638'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/756096da1260f29ff6f4532234d93d8e41dd5aa8'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/9...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T17:24:42Z', 'nvd_published_at': '2022-02-17T17:15:00Z'}
1.4.0
GHSA-q47x-6mqq-4w92
2023-09-15T18:05:00Z
2022-02-15T01:57:18Z
null
['CVE-2019-11228']
Gitea Improper Input Validation
repo/setting.go in Gitea before 1.7.6 and 1.8.x before 1.8-RC3 does not validate the `form.MirrorAddress` before calling `SaveAddress`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/go-gitea/gitea/models'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11228'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/6593'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/6595'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/releases/tag/v1.7.6'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T18:07:46Z', 'nvd_published_at': None}
1.4.0
GHSA-fq86-3f29-px2c
2022-02-11T20:38:43Z
2022-02-07T22:01:14Z
null
['CVE-2022-23581']
`CHECK`-failures during Grappler's `IsSimplifiableReshape` in Tensorflow
### Impact The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that [`IsSimplifiableReshape`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L1687-L1742) would trigge...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fq86-3f29-px2c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23581'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1fb27733f943295d874417630edd3b38b34ce082'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T19:54:48Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-ffm7-7r8g-77xm
2023-09-26T10:43:36Z
2022-02-10T22:38:50Z
null
['CVE-2020-1954']
Apache CXF JMX Integration is vulnerable to a MITM attack
Apache CXF has the ability to integrate with JMX by registering an `InstrumentationManager` extension with the CXF bus. If the `createMBServerConnectorFactory` property of the default `InstrumentationManagerImpl` is not disabled, then it is vulnerable to a man-in-the-middle (MITM) style attack. An attacker on the same ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-rt-management'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.13'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.cxf:cxf-rt-management'}, 'ecosystem_specif...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1954'}, {'type': 'WEB', 'url': 'https://github.com/apache/cxf/commit/1cf4fed546904a4a2560f53a2a2391d834b4026c'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd49aabd984ed540c8ff7916d4d79405f3fa311d2fdbcf9ed307839a6@%3Ccommits.cxf.a...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T18:12:21Z', 'nvd_published_at': '2020-04-01T21:15:00Z'}
1.4.0
GHSA-9q3g-m353-cp4p
2023-02-07T22:14:30Z
2022-02-15T01:57:18Z
null
['CVE-2017-11480']
Denial of Service in Packetbeat
Packetbeat versions prior to 5.6.4 and 6.0.0 are affected by a denial of service flaw in the PostgreSQL protocol handler. If Packetbeat is listening for PostgreSQL traffic and a user is able to send arbitrary network traffic to the monitored port, the attacker could prevent Packetbeat from properly logging other Postgr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/elastic/beats'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.6.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/elastic/beats'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0-alpha1'}, {'fixed': '6.0.0...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-11480'}, {'type': 'WEB', 'url': 'https://github.com/elastic/beats/pull/5457'}, {'type': 'WEB', 'url': 'https://github.com/elastic/beats/pull/5479'}, {'type': 'WEB', 'url': 'https://github.com/elastic/beats/pull/5480'}, {'type': 'WEB', 'url': 'https...
{'cwe_ids': ['CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:35:34Z', 'nvd_published_at': None}
1.4.0
GHSA-4cpg-3vgw-4877
2022-07-21T16:20:00Z
2022-02-18T00:00:33Z
null
['CVE-2022-22912']
Prototype pollution in Plist before 3.0.5 can cause denial of service
Prototype pollution vulnerability via `.parse()` in Plist allows attackers to cause a Denial of Service (DoS) and may lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'plist'}, 'ecosystem_specific': {'affected_functions': ['plist.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22912'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/plist.js/issues/114'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/plist.js/pull/118'}, {'type': 'WEB', 'url': 'https://github.com/TooTallNate/plist.js/commit/96e2303d059e6b...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T15:34:44Z', 'nvd_published_at': '2022-02-17T19:15:00Z'}
1.4.0
GHSA-72wf-hwcq-65h9
2022-02-11T16:20:19Z
2022-02-05T00:00:31Z
null
['CVE-2021-46398']
Cross-Site Request Forgery in Filebrowser
A Cross-Site Request Forgery (CSRF) vulnerability exists in Filebrowser < 2.18.0 that allows attackers to create a backdoor user with admin privilege and get access to the filesystem via a malicious HTML webpage that is sent to the victim.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/filebrowser/filebrowser/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.18.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46398'}, {'type': 'WEB', 'url': 'https://github.com/filebrowser/filebrowser/issues/1621'}, {'type': 'WEB', 'url': 'https://github.com/filebrowser/filebrowser/commit/74b7cd8e81840537a8206317344f118093153e8d'}, {'type': 'WEB', 'url': 'https://febin0x...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-08T18:32:54Z', 'nvd_published_at': '2022-02-04T16:15:00Z'}
1.4.0
GHSA-g37q-26qx-8v2m
2022-02-10T20:36:45Z
2022-02-10T20:36:45Z
null
['CVE-2020-13951']
Denial of service in Apache OpenMeetings
Attackers can use public NetTest web service of Apache OpenMeetings 4.0.0-5.0.0 to organize denial of service attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.openmeetings:openmeetings-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '5.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13951'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r1125f3044a0946d1e7e6f125a6170b58d413ebd4a95157e4608041c7@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe59...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T23:12:25Z', 'nvd_published_at': '2020-09-30T18:15:00Z'}
1.4.0
GHSA-pwr6-p3fh-grc2
2022-03-30T21:10:14Z
2022-02-12T00:00:37Z
null
['CVE-2021-46364']
Deserialization of Untrusted Data in Magnolia CMS
A vulnerability in the Snake YAML parser of Magnolia CMS v6.2.3 and below allows attackers to execute arbitrary code via a crafted YAML file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'info.magnolia:magnolia-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46364'}, {'type': 'WEB', 'url': 'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory'}, {'type': 'WEB', 'url': 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46364...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:44:01Z', 'nvd_published_at': '2022-02-11T21:15:00Z'}
1.4.0
GHSA-vq36-27g6-p492
2022-02-11T19:56:31Z
2022-02-09T23:31:48Z
null
['CVE-2022-23592']
Out of bounds read in Tensorflow
### Impact TensorFlow's [type inference](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/graph/graph.cc#L223-L229) can cause a heap OOB read as the bounds checking is done in a `DCHECK` (which is a no-op during production): ```cc if (node_t.type_id() != TFT_UNSET)...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0-rc0'}, {'fixed': '2.8.0'}]}], 'versions': ['2.8.0-rc0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0-rc0'}, {'fi...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vq36-27g6-p492'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23592'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c99d98cd189839dcf51aee94e7437b54b31f8abd'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T18:17:17Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-rc3x-jf5g-xvc5
2022-03-09T21:08:20Z
2022-02-26T00:00:38Z
null
['CVE-2021-23495']
Open redirect in karma
Karma before 6.3.16 is vulnerable to Open Redirect due to missing validation of the return_url query parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'karma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23495'}, {'type': 'WEB', 'url': 'https://github.com/karma-runner/karma/commit/ff7edbb2ffbcdd69761bece86b7dc1ef0740508d'}, {'type': 'PACKAGE', 'url': 'https://github.com/karma-runner/karma'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-OR...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:17:53Z', 'nvd_published_at': '2022-02-25T20:15:00Z'}
1.4.0
GHSA-2hpg-vwqj-6h6w
2021-04-22T21:41:07Z
2022-02-10T20:25:56Z
null
['CVE-2020-13937']
Authentication bypass in Apache Kylin
Apache Kylin 2.0.0, 2.1.0, 2.2.0, 2.3.0, 2.3.1, 2.3.2, 2.4.0, 2.4.1, 2.5.0, 2.5.1, 2.5.2, 2.6.0, 2.6.1, 2.6.2, 2.6.3, 2.6.4, 2.6.5, 2.6.6, 3.0.0-alpha, 3.0.0-alpha2, 3.0.0-beta, 3.0.0, 3.0.1, 3.0.2, 3.1.0, 4.0.0-alpha has one restful api which exposed Kylin's configuration information without any authentication, so it ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kylin:kylin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-alpha'}, {'fixed': '4.0....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13937'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rc592e0dcee5a2615f1d9522af30ef1822c1f863d5e05e7da9d1e57f4%40%3Cuser.kylin.apache.org%3E'}]
{'cwe_ids': ['CWE-922'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T21:41:07Z', 'nvd_published_at': '2020-10-19T21:15:00Z'}
1.4.0
GHSA-9jq9-c2cv-pcrj
2022-02-11T21:08:41Z
2022-02-10T22:42:48Z
null
['CVE-2021-43841']
Cross-site Scripting by SVG upload in xwiki-platform
### Impact When using default XWiki configuration, it's possible for an attacker to upload an SVG containing a script executed when executing the download action on the file. ### Patches This problem has been patched so that the default configuration doesn't allow to display the SVG files in the browser. ### Workaro...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9jq9-c2cv-pcrj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43841'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/5853d492b3a274db0d94d560e2a5ea988a271c62'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T16:42:20Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-rvfc-g8j5-9ccf
2021-04-01T16:29:50Z
2022-02-09T00:59:06Z
null
['CVE-2020-1717']
Generation of Error Message Containing Sensitive Information in keybloack
A flaw was found in Keycloak 7.0.1. A logged in user can do an account email enumeration attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '7.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1717'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1796281'}, {'type': 'WEB', 'url': 'https://issues.jboss.org/browse/KEYCLOAK-12014'}]
{'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T16:29:50Z', 'nvd_published_at': '2021-02-11T18:15:00Z'}
1.4.0
GHSA-8674-26jc-wh98
2022-02-09T22:56:32Z
2022-02-09T22:56:32Z
null
['CVE-2020-25711']
Improper Access Control in infinispan-server-runtime
A flaw was found in infinispan 10 REST API, where authorization permissions are not checked while performing some server management operations. When authz is enabled, any user with authentication can perform operations like shutting down the server without the ADMIN role.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.infinispan:infinispan-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.6.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.0.5.Final'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25711'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1897618'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220210-0023/'}]
{'cwe_ids': ['CWE-269', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T22:40:14Z', 'nvd_published_at': '2020-12-03T17:15:00Z'}
1.4.0
GHSA-m658-p24x-p74r
2023-08-30T18:47:54Z
2022-02-12T00:00:36Z
null
['CVE-2022-24968']
TLS certificate validation error in mellium.im/xmpp
In Mellium mellium.im/xmpp through 0.21.0, an attacker capable of spoofing DNS TXT records can redirect a WebSocket connection request to a server under their control without causing TLS certificate verification to fail. This occurs because the wrong host name is selected during this verification.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'mellium.im/xmpp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.21.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24968'}, {'type': 'WEB', 'url': 'https://github.com/mellium/xmpp/pull/260'}, {'type': 'WEB', 'url': 'https://github.com/mellium/xmpp/commit/0d92aa486da69b71f2f4a30e62aa722c711b98ac'}, {'type': 'WEB', 'url': 'https://mellium.im/cve/cve-2022-24968/'}...
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:38:04Z', 'nvd_published_at': '2022-02-11T22:15:00Z'}
1.4.0
GHSA-vjw7-6gfq-6wf5
2021-04-22T22:08:15Z
2022-02-10T20:28:57Z
null
['CVE-2019-17640']
Path Traversal in Eclipse Vert
In Eclipse Vert.x 3.4.x up to 3.9.4, 4.0.0-milestone1, 4.0.0-milestone2, 4.0.0-milestone3, 4.0.0-milestone4, 4.0.0-milestone5, 4.0.0.Beta1, 4.0.0.Beta2, and 4.0.0.Beta3, StaticHandler doesn't correctly processes back slashes on Windows Operating systems, allowing, escape the webroot folder to the current working direct...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.vertx:vertx-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.9.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-17640'}, {'type': 'WEB', 'url': 'https://github.com/vert-x3/vertx-web/commit/b12f7c4c6576a8adc3f683b2899de4b0e7d099e4'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=567416'}, {'type': 'WEB', 'url': 'https://lists.apache.or...
{'cwe_ids': ['CWE-22', 'CWE-23'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T22:08:15Z', 'nvd_published_at': '2020-10-15T21:15:00Z'}
1.4.0
GHSA-6q8r-5pm6-v2q8
2022-12-01T23:01:50Z
2022-02-16T00:01:27Z
null
['CVE-2022-25189']
Stored Cross-site Scripting vulnerability in Jenkins Custom Checkbox Parameter Plugin
Jenkins Custom Checkbox Parameter Plugin 1.1 and earlier does not escape parameter names of custom checkbox parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:custom-checkbox-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25189'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/custom-checkbox-parameter-plugin/commit/f859f0aebb94974f72591fb01ef41b05675d9f11'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/custom-checkbox-parameter-plugin'}, {'type': ...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T23:01:50Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-c5hm-xc74-pqrg
2021-07-28T21:54:19Z
2022-02-10T23:37:22Z
null
['CVE-2020-7623']
OS Command Injection in jscover
jscover through 1.0.0 is vulnerable to Command Injection. It allows execution of arbitrary command via the source argument.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'jscover'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7623'}, {'type': 'WEB', 'url': 'https://github.com/node-modules/jscover/blob/master/lib/jscover.js#L59,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-JSCOVER-564250'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T15:08:07Z', 'nvd_published_at': '2020-04-02T21:15:00Z'}
1.4.0
GHSA-vvw4-rfwf-p6hx
2022-02-08T22:02:28Z
2022-02-09T22:58:06Z
null
['CVE-2020-17527']
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat
While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-coyote'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.0-M10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat-coyote'}, 'ecosys...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17527'}, {'type': 'WEB', 'url': 'https://github.com/apache/tomcat/commit/d56293f816d6dc9e2b47107f208fa9e95db58c65'}, {'type': 'WEB', 'url': 'https://bz.apache.org/bugzilla/show_bug.cgi?id=64830'}, {'type': 'WEB', 'url': 'https://lists.apache.org/th...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T16:06:44Z', 'nvd_published_at': '2020-12-03T19:15:00Z'}
1.4.0
GHSA-372f-jc47-7gr5
2022-12-01T23:00:11Z
2022-02-16T00:01:26Z
null
['CVE-2022-25190']
Missing permission check in Jenkins Conjur Secrets Plugin allows enumerating credentials IDs
Conjur Secrets Plugin 1.0.11 and earlier does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.conjur.jenkins:conjur-credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25190'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/conjur-credentials-plugin/commit/eda06cde26cdf2d40ae4e2f4d2709e8174489068'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/conjur-credentials-plugin'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T23:00:11Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-3mqv-8gxg-pfm4
2022-07-21T15:35:27Z
2022-02-09T22:37:28Z
null
['CVE-2020-35774']
TwitterServer Cross-site Scripting via /histograms endpoint
server/handler/HistogramQueryHandler.scala in Twitter TwitterServer (aka twitter-server) before 20.12.0, in some configurations, allows XSS via the /histograms endpoint.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.twitter:twitter-server_2.12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.12.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35774'}, {'type': 'WEB', 'url': 'https://github.com/twitter/twitter-server/commit/e0aeb87e89a6e6c711214ee2de0dd9f6e5f9cb6c'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2020-4287'}, {'type': 'PACKAGE', 'url': 'https://github...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:16:49Z', 'nvd_published_at': '2020-12-29T18:15:00Z'}
1.4.0
GHSA-6g5f-f5pm-mjrg
2023-09-14T19:31:06Z
2022-02-15T01:57:18Z
null
['CVE-2019-12243']
Istio may not check inbound TCP connections against istio-policy
Istio 1.1.x through 1.1.6 has Incorrect Access Control. When `disablePolicyChecks` is set to `false`, inbound TCP connections do not generate Check requests to istio-policy and external authorization is not applied. This behavior is a result of a change to `istio/pilot/pkg/networking/plugin/mixer/mixer.go` in 1.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N/E:H/RL:O/RC:C'}]
[{'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12243'}, {'type': 'WEB', 'url': 'https://github.com/istio/istio/issues/13868'}, {'type': 'WEB', 'url': 'https://github.com/istio/istio/pull/13893/commits/91faba277439dab798185730d1624bd53e37bb06'}, {'type': 'WEB', 'url': 'https://istio.io/blog/2019...
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T15:53:48Z', 'nvd_published_at': None}
1.4.0
GHSA-vh2r-x97c-2vpr
2022-02-25T21:43:52Z
2022-02-17T00:00:26Z
null
['CVE-2022-22880']
SQL Injection in Jeecg-boot
Jeecg-boot v3.0 was discovered to contain a SQL injection vulnerability via the code parameter in /jeecg-boot/sys/user/queryUserByDepId.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22880'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/3347'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T21:43:52Z', 'nvd_published_at': '2022-02-16T22:15:00Z'}
1.4.0
GHSA-m5wp-p3gj-7q5g
2022-12-01T22:16:41Z
2022-02-16T00:01:16Z
null
['CVE-2022-25206']
Missing Authorization in Jenkins dbCharts Plugin
A missing check in Jenkins dbCharts Plugin 0.5.2 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified database via JDBC using attacker-specified credentials.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dbCharts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25206'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dbCharts-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2177'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T17:37:00Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-jjvm-3mfq-7gc7
2022-02-14T22:33:59Z
2022-02-09T00:00:31Z
null
['CVE-2022-0506']
Cross-site Scripting in microweber
microweber version 1.2.10 and prior is vulnerable to cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0506'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/05d55f2befb1b25375ca5371875ff535d6cc5f70'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T22:25:48Z', 'nvd_published_at': '2022-02-08T09:15:00Z'}
1.4.0
GHSA-xp5j-wj4h-2jq9
2021-04-14T18:49:17Z
2022-02-10T00:30:54Z
null
['CVE-2020-13942']
Injection and Improper Input Validation in Apache Unomi
It is possible to inject malicious OGNL or MVEL scripts into the /context.json public endpoint. This was partially fixed in 1.5.1 but a new attack vector was found. In Apache Unomi version 1.5.2 scripts are now completely filtered from the input. It is highly recommended to upgrade to the latest available version of th...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.unomi:unomi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13942'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2020-4284'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r08a4057ff7196b8880117edaa4b6207cbd36ed692d8dd1f5a56b4d0f@%3Cannounce.apache.org%3E'}, {'type': 'W...
{'cwe_ids': ['CWE-20', 'CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T18:49:17Z', 'nvd_published_at': '2020-11-24T18:15:00Z'}
1.4.0
GHSA-fg2v-w576-w4v3
2022-02-08T21:24:12Z
2022-02-10T22:46:22Z
null
['CVE-2021-31684']
Out of bounds read in json-smart
A vulnerability was discovered in the indexOf function of JSONParserByteArray in JSON Smart versions prior to 1.3.3 and 2.4.5 which causes a denial of service (DOS) via a crafted web request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.minidev:json-smart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.3.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'net.minidev:json-smart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.4.4'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-31684'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v1/issues/10'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v2/issues/67'}, {'type': 'WEB', 'url': 'https://github.com/netplex/json-smart-v1/pull/11'}, {'type'...
{'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T20:27:42Z', 'nvd_published_at': '2021-06-01T20:15:00Z'}
1.4.0
GHSA-wmj9-xh24-j4gx
2022-02-23T21:58:38Z
2022-02-11T00:00:47Z
null
['CVE-2022-0558']
Cross-site Scripting in microweber
microweber prior to version 1.2.11 is vulnerable to cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0558'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/14a1bb971bcb8b5456c2bf0020c3018907a2704d'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-11T17:36:12Z', 'nvd_published_at': '2022-02-10T10:15:00Z'}
1.4.0
GHSA-87v6-crgm-2gfj
2022-02-11T16:23:18Z
2022-02-10T00:21:32Z
null
['CVE-2022-21735']
Division by zero in Tensorflow
### Impact The [implementation of `FractionalMaxPool`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/fractional_max_pool_op.cc#L36-L192) can be made to crash a TensorFlow process via a division by 0: ```python import tensorflow as tf import numpy as np ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-87v6-crgm-2gfj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21735'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ba4e8ac4dc2991e350d5cc407f8598c8d4ee70fb'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T19:51:55Z', 'nvd_published_at': '2022-02-03T13:15:00Z'}
1.4.0
GHSA-877x-32pm-p28x
2021-05-13T19:28:33Z
2022-02-15T01:57:18Z
null
['CVE-2020-2026']
Link Following in Kata Runtime
A malicious guest compromised before a container creation (e.g. a malicious guest image or a guest running multiple containers) can trick the kata runtime into mounting the untrusted container filesystem on any host path, potentially allowing for code execution on the host. This issue affects Kata Containers 1.11 versi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kata-containers/runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kata-containers/runtime'}, 'r...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2026'}, {'type': 'WEB', 'url': 'https://github.com/kata-containers/runtime/issues/2712'}, {'type': 'WEB', 'url': 'https://github.com/kata-containers/runtime/pull/2713'}, {'type': 'WEB', 'url': 'https://github.com/kata-containers/runtime/releases/ta...
{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T19:28:33Z', 'nvd_published_at': '2020-06-10T18:15:00Z'}
1.4.0
GHSA-45w3-v3g4-54pm
2022-09-12T20:44:49Z
2022-02-11T19:11:36Z
null
[]
Chrono has potential segfault issue in SPIFFE authenticator
### Impact Several vulnerabilities have been reported in the `time` and `chrono` crates related to handling of calls to `localtime_r`. You can follow some of the discussions [here](https://github.com/chronotope/chrono/issues/602) and [here](https://github.com/time-rs/time/issues/293), and the associated CVE [here](http...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'parsec-service'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/parallaxsecond/parsec/security/advisories/GHSA-45w3-v3g4-54pm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26235'}, {'type': 'WEB', 'url': 'https://github.com/chronotope/chrono/issues/602'}, {'type': 'WEB', 'url': 'https://github.com/parallaxsecon...
{'cwe_ids': ['CWE-476'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-02-11T19:11:36Z', 'nvd_published_at': None}
1.4.0
GHSA-8wrg-m8vm-5fvj
2021-05-20T22:25:09Z
2022-02-15T01:57:18Z
null
['CVE-2021-21403']
Authentication Bypass by Primary Weakness in github.com/kongchuanhujiao/server
### Impact Authentication Bypass by Primary Weakness (CWE-305) Commit: https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1 ALL Users is impacted. ### Patches Yes, PLEASE UPGRADE TO v1.3.21-beta.d0ffc0a6
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kongchuanhujiao/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.21'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/kongchuanhujiao/server/security/advisories/GHSA-8wrg-m8vm-5fvj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21403'}, {'type': 'WEB', 'url': 'https://github.com/kongchuanhujiao/server/commit/9a125624f219e496bdf4b07b404816d5a309bdc1'}]
{'cwe_ids': ['CWE-287', 'CWE-305'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T22:25:09Z', 'nvd_published_at': '2021-03-26T18:15:00Z'}
1.4.0
GHSA-gf2j-f278-xh4v
2022-02-11T16:11:40Z
2022-02-09T23:47:57Z
null
['CVE-2022-23557']
Division by zero in TFLite
### Impact An attacker can craft a TFLite model that would trigger a division by zero in [`BiasAndClamp` implementation](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/internal/common.h#L75): ```cc inline void BiasAndClamp(float clamp_min, float clamp_ma...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gf2j-f278-xh4v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23557'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8c6f391a2282684a25cbfec7687bd5d35261a209'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:21:15Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-x3rq-r3cm-5vc4
2023-08-25T22:06:38Z
2022-02-09T00:00:27Z
null
['CVE-2022-0524']
Publify Business Logic Errors
Publify (formerly known as Typo) prior to version 9.2.7 is vulnerable to business logic errors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'publify_core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0524'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/pull/1044'}, {'type': 'WEB', 'url': 'https://github.com/publify/publify/commit/16fceecadbe80ab0ef846b62a12dc7bfff10b8c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/publify/pub...
{'cwe_ids': ['CWE-841'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T18:33:00Z', 'nvd_published_at': '2022-02-08T22:15:00Z'}
1.4.0
GHSA-76wf-9vgp-pj7w
2023-02-07T21:24:00Z
2022-02-11T23:26:12Z
null
[]
Unencrypted md5 plaintext hash in metadata in AWS S3 Crypto SDK for golang
### Summary The golang AWS S3 Crypto SDK was impacted by an issue that can result in loss of confidentiality. An attacker with read access to an encrypted S3 bucket was able to recover the plaintext without accessing the encryption key. ### Risk/Severity The vulnerability poses insider risks/privilege escalation ris...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/aws/aws-sdk-go/service/s3/s3crypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.34.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/aws/aws-sdk-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fi...
[{'type': 'WEB', 'url': 'https://github.com/google/security-research/security/advisories/GHSA-76wf-9vgp-pj7w'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-go/commit/35fa6ddf45c061e0f08d3a3b5119f8f4da38f6d1'}, {'type': 'PACKAGE', 'url': 'https://github.com/aws/aws-sdk-go'}, {'type': 'WEB', 'url': 'https://pk...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T18:00:34Z', 'nvd_published_at': None}
1.4.0
GHSA-m2c7-42rf-c62f
2022-02-14T19:58:19Z
2022-02-01T00:00:44Z
null
['CVE-2021-44255']
Unrestricted Upload of File with Dangerous Type in motionEye
motionEye <= 0.42.1 and motioneEyeOS <= 20200606 allow a remote attacker to upload a configuration backup file containing a malicious python pickle file. This is possible when an installation is accessible over the Internet and uses no or poor authentication credentials. The GitHub repositories for motionEye and motio...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'motioneye'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.42.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44255'}, {'type': 'WEB', 'url': 'https://github.com/ccrisan/motioneyeos/issues/2843'}, {'type': 'PACKAGE', 'url': 'https://github.com/ccrisan/motioneye'}, {'type': 'WEB', 'url': 'https://www.pizzapower.me/2021/10/09/self-hosted-security-part-1-moti...
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T19:58:19Z', 'nvd_published_at': '2022-01-31T12:15:00Z'}
1.4.0
GHSA-856q-xv3c-7f2f
2022-02-25T15:38:52Z
2022-02-23T14:59:08Z
null
['CVE-2022-23635']
Unauthenticated control plane denial of service attack in Istio
### Impact The Istio control plane, `istiod`, is vulnerable to a request processing error, allowing a malicious attacker that sends a specially crafted message which results in the control plane crashing. This endpoint is served over TLS port 15012, but does not require any authentication from the attacker. For simple...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed': '1.13.1'}]}], 'versions': ['1.13.0']}, {'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1...
[{'type': 'WEB', 'url': 'https://github.com/istio/istio/security/advisories/GHSA-856q-xv3c-7f2f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23635'}, {'type': 'WEB', 'url': 'https://github.com/istio/istio/commit/5f3b5ed958ae75156f8656fe7b3794f78e94db84'}, {'type': 'PACKAGE', 'url': 'https:/...
{'cwe_ids': ['CWE-1284', 'CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T14:59:08Z', 'nvd_published_at': '2022-02-22T22:15:00Z'}
1.4.0
GHSA-3cqr-58rm-57f8
2021-04-22T23:38:32Z
2022-02-10T20:38:19Z
null
['CVE-2019-20920']
Arbitrary Code Execution in Handlebars
Handlebars before 3.0.8 and 4.x before 4.5.3 is vulnerable to Arbitrary Code Execution. The lookup helper fails to properly validate templates, allowing attackers to submit templates that execute arbitrary JavaScript. This can be used to run arbitrary code on a server processing Handlebars templates or in a victim's br...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ecosystem_specific': {'affected_functions': ['handlebars.helpers.lookup']}, 'ranges': [{'type': 'ECOSYSTEM', 'events'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20920'}, {'type': 'WEB', 'url': 'https://github.com/handlebars-lang/handlebars.js/commit/d54137810a49939fd2ad01a91a34e182ece4528e'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-534478'}, {'type': 'WEB', 'url': 'https://www.npmjs...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T23:38:32Z', 'nvd_published_at': '2020-09-30T18:15:00Z'}
1.4.0
GHSA-h5rh-w6vm-9ghc
2022-05-26T20:42:01Z
2022-02-15T01:57:18Z
null
['CVE-2021-27358']
Denial of service in Grafana
The snapshot feature in Grafana before 7.4.2 can allow an unauthenticated remote attackers to trigger a Denial of Service via a remote API call if a commonly used configuration is set.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H/E:U/RL:O/RC:R'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/grafana/grafana/pkg/middleware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.7.3'}, {'fixed': '7.4.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-27358'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/pull/31263'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/blob/master/CHANGELOG.md'}, {'type': 'WEB', 'url': 'https://github.com/grafana/grafana/blob/master/CHANGELO...
{'cwe_ids': ['CWE-306', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-14T17:47:34Z', 'nvd_published_at': '2021-03-18T20:15:00Z'}
1.4.0
GHSA-39qv-prmh-x37f
2022-02-11T16:16:33Z
2022-02-05T00:00:26Z
null
['CVE-2021-23497']
Prototype Pollution in @strikeentco/set
This affects the package @strikeentco/set before 1.0.2. It allows an attacker to cause a denial of service and may lead to remote code execution. **Note:** This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-1038821
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@strikeentco/set'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23497'}, {'type': 'WEB', 'url': 'https://github.com/strikeentco/set/commit/b2f942c'}, {'type': 'PACKAGE', 'url': 'https://github.com/strikeentco/set/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-STRIKEENTCOSET-1038821'}, {'type'...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T17:19:41Z', 'nvd_published_at': '2022-02-04T20:15:00Z'}
1.4.0
GHSA-p8p6-rcp6-4mrm
2021-04-22T16:54:42Z
2022-02-10T20:23:01Z
null
['CVE-2020-26883']
Uncontrolled Recursion in Play Framework
In Play Framework 2.6.0 through 2.8.2, stack consumption can occur because of unbounded recursion during parsing of crafted JSON documents.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.3'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26883'}, {'type': 'WEB', 'url': 'https://github.com/playframework/playframework/pull/10495'}, {'type': 'WEB', 'url': 'https://www.playframework.com/security/vulnerability/CVE-2020-26883-JsonParseUncontrolledRecursion'}]
{'cwe_ids': ['CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T16:54:42Z', 'nvd_published_at': '2020-11-06T14:15:00Z'}
1.4.0
GHSA-5mv2-rx3q-4w2v
2022-02-11T19:16:32Z
2022-02-10T22:21:48Z
null
['CVE-2022-23614']
Code injection in Twig
# Description When in a sandbox mode, the `arrow` parameter of the `sort` filter must be a closure to avoid attackers being able to run arbitrary PHP functions. # Resolution We now disallow calling non Closure in the `sort` filter like we already did for some other filters. # Credits We would like to thank Marlon ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'twig/twig'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.14.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'twig/twig'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.3.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/twigphp/Twig/security/advisories/GHSA-5mv2-rx3q-4w2v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23614'}, {'type': 'WEB', 'url': 'https://github.com/twigphp/Twig/commit/22b9dc3c03ee66d7e21d9ed2ca76052b134cb9e9'}, {'type': 'WEB', 'url': 'https://g...
{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T16:43:09Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-rpj6-2q8r-98f8
2022-12-21T01:30:07Z
2022-02-10T20:29:39Z
null
['CVE-2020-2287']
Request logging bypass in Jenkins Audit Trail Plugin
Audit Trail Plugin logs requests whose URL path matches an admin-configured regular expression.\n\nA discrepancy between the behavior of the plugin and the Stapler web framework in parsing URL paths allows attackers to craft URLs that would bypass request logging in Audit Trail Plugin 3.6 and earlier. This only applies...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:audit-trail'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2287'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/audit-trail-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2020-10-08/#SECURITY-1815'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/...
{'cwe_ids': ['CWE-435'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T22:16:34Z', 'nvd_published_at': '2020-10-08T13:15:00Z'}
1.4.0
GHSA-gpgx-whwh-r297
2023-06-19T16:50:23Z
2022-02-11T00:00:46Z
2023-06-19T16:50:23Z
[]
Duplicate advisory: swift-nio-http2 vulnerable to denial of service via ALTSVC or ORIGIN frames
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-pgfx-g6rc-8cjv. This link is maintained to preserve external references. ## Original Description A program using swift-nio-http2 is vulnerable to a denial of service attack caused by a network peer sending ALTSVC or ORIGIN frame...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-nio-http2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.19.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-http2/security/advisories/GHSA-pgfx-g6rc-8cjv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24668'}, {'type': 'PACKAGE', 'url': 'https://github.com/apple/swift-nio-http2'}]
{'cwe_ids': ['CWE-241'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T16:50:23Z', 'nvd_published_at': '2022-02-09T23:15:00Z'}
1.4.0
GHSA-j33j-fg2g-mcv2
2023-09-14T12:06:06Z
2022-02-10T22:27:58Z
null
['CVE-2020-15400']
Cross-Site Request Forgery in CakePHP
CakePHP before 4.0.6 and 3.10.3 mishandles CSRF token generation. This might be remotely exploitable in conjunction with XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'cakephp/cakephp'}, 'ecosystem_specific': {'affected_functio...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15400'}, {'type': 'WEB', 'url': 'https://bakery.cakephp.org/2020/04/18/cakephp_406_released.html'}, {'type': 'WEB', 'url': 'https://bakery.cakephp.org/2022/05/08/cakephp_3103_released.html'}]
{'cwe_ids': ['CWE-352', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T21:28:56Z', 'nvd_published_at': '2020-06-30T12:15:00Z'}
1.4.0
GHSA-hxmr-5gv9-6p8v
2022-02-24T13:06:37Z
2022-02-15T00:02:47Z
null
['CVE-2022-0575']
Cross-site Scripting in librenms
Cross-site Scripting (XSS) - Stored in Packagist librenms/librenms prior to 22.2.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0575'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/4f86915866703e2fcd1e34b3fc1181ec2ad78e54'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/13951f51-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:42:17Z', 'nvd_published_at': '2022-02-14T12:15:00Z'}