schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-wqfh-9m4g-7x6x
2021-06-15T19:11:50Z
2022-02-09T22:14:58Z
null
['CVE-2020-11998']
Remote code execution in Apache ActiveMQ
A regression has been introduced in the commit preventing JMX re-bind. By passing an empty environment map to RMIConnectorServer, instead of the map that contains the authentication credentials, it leaves ActiveMQ open to the following attack - A remote client could create a javax.management.loading.MLet MBean and use ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.15.12'}, {'fixed': '5.15.13'}]}], 'versions': ['5.15.12']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11998'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3...
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T23:02:39Z', 'nvd_published_at': '2020-09-10T19:15:00Z'}
1.4.0
GHSA-f768-8pvq-mm6r
2023-06-30T20:07:03Z
2022-02-01T22:01:47Z
null
['CVE-2022-0414']
Dolibarr vulnerable to Improper Validation of Specified Quantity in Input
Dolibarr 14.0.5 and prior versions are vulnerable to Improper Validation of Specified Quantity in Input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 14.0.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0414'}, {'type': 'WEB', 'url': 'https://github.com/dolibarr/dolibarr/commit/37fb02ee760cfff18c795ba468da1ba1c53f4684'}, {'type': 'PACKAGE', 'url': 'https://github.com/dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/76f3b405-...
{'cwe_ids': ['CWE-1284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-01T15:33:18Z', 'nvd_published_at': '2022-01-31T11:15:00Z'}
1.4.0
GHSA-rpx7-33j2-xx9x
2022-01-07T22:34:36Z
2022-02-15T01:57:18Z
null
[]
Arbitrary file deletion in NeMo ASR webapp
### Description NVIDIA NeMo contains a vulnerability in ASR WebApp, where Relative Path Traversal (CWE-23) may lead to deletion of any directory through the "../" structure when admin privileges are available. CVSS Score = 2.0 https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'nemo_toolkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/NVIDIA/NeMo/security/advisories/GHSA-rpx7-33j2-xx9x'}, {'type': 'WEB', 'url': 'https://github.com/NVIDIA/NeMo/commit/f7e4ed7e4f7f2fa43765a38c2fafa1b6d1ebd7c0'}, {'type': 'PACKAGE', 'url': 'https://github.com/NVIDIA/NeMo'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T22:34:36Z', 'nvd_published_at': None}
1.4.0
GHSA-qj5r-f9mv-rffh
2022-02-11T16:23:32Z
2022-02-09T23:38:56Z
null
['CVE-2022-23569']
`CHECK`-fails when building invalid tensor shapes in Tensorflow
### Impact Multiple operations in TensorFlow can be used to trigger a denial of service via `CHECK`-fails (i.e., assertion failures). This is similar to [TFSA-2021-198](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md) (CVE-2021-41197) and has similar fixes. ### Patch...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qj5r-f9mv-rffh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23569'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tenso...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T21:16:06Z', 'nvd_published_at': '2022-02-03T13:15:00Z'}
1.4.0
GHSA-4cxw-hq44-r344
2022-03-03T19:17:50Z
2022-02-24T00:00:52Z
null
['CVE-2021-4070']
Off-by-one Error in v2fly/v2ray-core
v2fly/v2ray-core prior to 4.44.0 is vulnerable to an off-by-one error. Indexing operations on arrays, slices, or strings should use an index at most one less than the length. If the index is checked for being less than or equal to the length (`<=`), instead of less than the length (`<`), the index could be out of bound...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/v2fly/v2ray-core/v4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.44.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/v2fly/v2ray-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_spec...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4070'}, {'type': 'WEB', 'url': 'https://github.com/v2fly/v2ray-core/commit/c1af2bfd7aa59a4482aa7f6ec4b9208c1d350b5c'}, {'type': 'PACKAGE', 'url': 'https://github.com/v2fly/v2ray-core'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8da19456-4d...
{'cwe_ids': ['CWE-193'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T20:44:31Z', 'nvd_published_at': '2022-02-23T20:15:00Z'}
1.4.0
GHSA-q62h-jw38-24vh
2022-04-11T19:15:59Z
2022-02-25T00:01:04Z
null
['CVE-2022-24615']
Uncaught Exception in zip4j
zip4j up to 2.9.1 can throw various uncaught exceptions while parsing a specially crafted ZIP file, which could result in an application crash. This could be used to mount a denial of service attack against services that use zip4j library.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.lingala.zip4j:zip4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24615'}, {'type': 'WEB', 'url': 'https://github.com/srikanth-lingala/zip4j/issues/377'}, {'type': 'WEB', 'url': 'https://github.com/srikanth-lingala/zip4j/issues/418'}, {'type': 'PACKAGE', 'url': 'https://github.com/srikanth-lingala/zip4j'}]
{'cwe_ids': ['CWE-248', 'CWE-755'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T20:36:17Z', 'nvd_published_at': '2022-02-24T15:15:00Z'}
1.4.0
GHSA-x5f3-qmwj-4f84
2021-05-12T21:11:09Z
2022-02-15T01:57:18Z
null
['CVE-2021-25835']
Authentication bypass by capture-replay in github.com/cosmos/ethermint
Cosmos Network Ethermint <= v0.4.0 is affected by a cross-chain transaction replay vulnerability in the EVM module. Since ethermint uses the same chainIDEpoch and signature schemes with ethereum for compatibility, a verified signature in ethereum is still valid in ethermint with the same msg content and chainIDEpoch, w...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cosmos/ethermint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cosmos/ethermint/rpc/namespaces/eth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25835'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/ethermint/issues/687'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/ethermint/pull/692'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/ethermint/releases/tag/v0.4.1'}]
{'cwe_ids': ['CWE-294', 'CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:11:09Z', 'nvd_published_at': None}
1.4.0
GHSA-f7qw-5fgj-247x
2022-01-31T19:08:58Z
2022-02-01T00:48:35Z
null
[]
Cross-site Scripting and Open Redirect in plone.app.contenttypes
### Impact Plone is vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscreen page in a cache, for example in Varnish. The technique is known as cache poisoning. Any later visitor can get redirected when clicking on a link on this page. Us...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'plone.app.contenttypes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/plone/Products.ATContentTypes/security/advisories/GHSA-g4c2-ghfg-g5rh'}, {'type': 'WEB', 'url': 'https://github.com/plone/plone.app.contenttypes/security/advisories/GHSA-f7qw-5fgj-247x'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/plone.app.contenttypes'}]
{'cwe_ids': ['CWE-601', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T19:07:49Z', 'nvd_published_at': None}
1.4.0
GHSA-g6w6-r76c-28j7
2023-08-08T20:44:45Z
2022-02-08T17:23:16Z
null
['CVE-2022-24450']
Incorrect Authorization in NATS nats-server
(This advisory is canonically <https://advisories.nats.io/CVE/CVE-2022-24450.txt>) ## Problem Description NATS nats-server through 2022-02-04 has Incorrect Access Control, with unchecked ability for clients to authorize into any account, because of a coding error in a long-extant experimental feature. A client craft...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server/v2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-streaming-server'}, 'ecosystem_...
[{'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/security/advisories/GHSA-g6w6-r76c-28j7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24450'}, {'type': 'WEB', 'url': 'https://advisories.nats.io/CVE/CVE-2022-24450.txt'}, {'type': 'PACKAGE', 'url': 'https://github.com/nats-io/n...
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-08T17:23:16Z', 'nvd_published_at': '2022-02-08T02:15:00Z'}
1.4.0
GHSA-gx6h-936c-vrrr
2022-02-09T23:25:44Z
2022-02-09T23:25:44Z
null
['CVE-2022-23622']
Cross site scripting in registration template in xwiki-platform
### Impact We found a possible XSS vector in the `registerinline.vm` template related to the `xredirect` hidden field. This template is only used in the following conditions: - the wiki must be open to registration for anyone - the wiki must be closed to view for Guest users (more specifically the XWiki.Registrat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.1'}, {'fixed': '12.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', ...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gx6h-936c-vrrr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23622'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/053d957d53f2a543d158f3ab651e390d2728e0b9'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T23:25:44Z', 'nvd_published_at': '2022-02-09T22:15:00Z'}
1.4.0
GHSA-pj84-qjm3-77mg
2022-07-21T16:18:43Z
2022-02-16T00:01:36Z
null
['CVE-2022-25175']
Jenkins Pipeline: Multibranch Plugin vulnerable to OS Command Injection
Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier uses distinct checkout directories per SCM for the readTrusted step, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-multibranch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '707.v71c3f0a_6ccdb'}]}], 'database_specific': {'last_known_affected_version_range': '<= 706.vd43c65dec013'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25175'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2463'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:46:22Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-82hx-w2r5-c2wq
2023-09-20T22:42:48Z
2022-02-15T01:57:18Z
null
['CVE-2020-8552']
Kubernetes API Server DoS Via API Requests
The Kubernetes API server component in Kubernetes versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via successful API requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/apiserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/apiserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'r...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8552'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/89378'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/87669'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/commit/5978856c...
{'cwe_ids': ['CWE-400', 'CWE-770', 'CWE-789'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T21:48:16Z', 'nvd_published_at': '2020-03-27T15:15:00Z'}
1.4.0
GHSA-394c-5j6w-4xmx
2022-09-14T20:38:16Z
2022-02-09T22:46:53Z
null
['CVE-2020-7793']
ua-parser-js Regular Expression Denial of Service vulnerability
The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ua-parser-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.23'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7793'}, {'type': 'WEB', 'url': 'https://github.com/faisalman/ua-parser-js/commit/6d1f26df051ba681463ef109d36c9cf0f7e32b18'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf'}, {'type': 'WEB', 'url': 'https://s...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T21:32:22Z', 'nvd_published_at': '2020-12-11T14:15:00Z'}
1.4.0
GHSA-v6wh-2wvh-c8x5
2023-09-11T23:10:32Z
2022-02-09T23:15:46Z
null
['CVE-2020-7779']
Regular Expression Denial of Service in djvalidator
All versions of package djvalidator are vulnerable to Regular Expression Denial of Service (ReDoS) by sending crafted invalid emails - for example, `--@------------------------------------------------------------------------------------------------------------------------!`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'djvalidator'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7779'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DJVALIDATOR-1018709'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T18:54:11Z', 'nvd_published_at': '2020-11-26T11:15:00Z'}
1.4.0
GHSA-8459-6rc9-8vf8
2022-02-14T22:52:15Z
2022-02-14T22:52:15Z
null
[]
Path traversal in github.com/cloudflare/cfrpki/cmd/octorpki
### Impact In the case that a malicious TAL file is parsed pointing to a repository that provides a malicious ROA file which octorpki downloads, it is possible to bypass the current directory traversal mitigation to allow writing outside of the current directory. ### Patches No patch release has been made
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki/cmd/octorpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-8459-6rc9-8vf8'}]
{'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:52:15Z', 'nvd_published_at': None}
1.4.0
GHSA-p225-pc2x-4jpm
2021-04-01T19:38:17Z
2022-02-09T00:58:52Z
null
['CVE-2020-1725']
Incorrect Authorization in keycloak
A flaw was found in keycloak before version 13.0.0. In some scenarios a user still has access to a resource after changing the role mappings in Keycloak and after expiration of the previous access token.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1725'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1765129'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/KEYCLOAK-16550'}]
{'cwe_ids': ['CWE-668', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T19:38:17Z', 'nvd_published_at': '2021-01-28T20:15:00Z'}
1.4.0
GHSA-5hr6-vc97-qxxh
2021-04-13T17:51:27Z
2022-02-09T23:08:01Z
null
['CVE-2017-15685']
XML Injection in Crafter CMS Crafter Studio 3.0.1
Crafter CMS Crafter Studio 3.0.1 is affected by: XML External Entity (XXE). An unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15685'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.0/security/advisory.html'}, {'type': 'WEB', 'url': 'http://crafter.com'}]
{'cwe_ids': ['CWE-91'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T17:51:27Z', 'nvd_published_at': '2020-11-27T18:15:00Z'}
1.4.0
GHSA-h87q-g2wp-47pj
2022-02-15T01:51:57Z
2022-02-09T22:41:19Z
null
[]
Signatures are mistakenly recognized to be valid in jsrsasign
In the jsrsasign package through 10.1.13 for Node.js, some invalid RSA PKCS#1 v1.5 signatures are mistakenly recognized to be valid. NOTE: there is no known practical attack.
[]
[{'package': {'ecosystem': 'npm', 'name': 'jsrsasign'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30246'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/issues/478'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/releases/tag/10.1.13'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/releases/tag/10.2.0'}, {'ty...
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:09:58Z', 'nvd_published_at': None}
1.4.0
GHSA-6vc5-v7hw-h5h2
2021-05-10T22:34:11Z
2022-02-10T22:26:10Z
null
['CVE-2020-15721']
Cross-site Scripting in RosarioSIS
RosarioSIS through 6.8-beta allows modules/Custom/NotifyParents.php XSS because of the href attributes for AddStudents.php and User.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15721'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/c4a694860b50c4aa5c67d6568f7d0613fef1a30d'}, {'type': 'WEB', 'u...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-10T22:34:11Z', 'nvd_published_at': '2020-07-14T15:15:00Z'}
1.4.0
GHSA-3756-hwhv-qw58
2022-03-04T21:38:43Z
2022-02-25T00:01:08Z
null
['CVE-2021-44566']
Cross site scripting in francoisjacquet/rosariosis
A Cross Site Scripting vulnerability exists RosarioSIS before 4.3 via the SanitizeMarkDown function in ProgramFunctions/MarkDownHTML.fnc.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44566'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES_V3_4.md#changes-in-43'}, {'type': 'WEB', 'url': 'https://gitlab.com/fr...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T20:47:42Z', 'nvd_published_at': '2022-02-24T15:15:00Z'}
1.4.0
GHSA-c6rq-rjc2-86v2
2021-05-12T20:23:29Z
2022-02-10T23:33:39Z
null
['CVE-2017-18869']
Time-of-check Time-of-use (TOCTOU) Race Condition in chownr
A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'chownr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18869'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/chownr/issues/14'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/chownr/commit/36a93e3f0a220062c47b237cf6ab6d5f55cd79c9'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/chownr/comm...
{'cwe_ids': ['CWE-367'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T20:23:29Z', 'nvd_published_at': '2020-06-15T15:15:00Z'}
1.4.0
GHSA-c582-c96p-r5cq
2022-02-11T17:05:42Z
2022-02-10T00:20:29Z
null
['CVE-2022-21732']
Memory exhaustion in Tensorflow
### Impact The [implementation of `ThreadPoolHandle`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/experimental/threadpool_dataset_op.cc#L79-L135) can be used to trigger a denial of service attack by allocating too much memory: ```python import te...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c582-c96p-r5cq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21732'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e3749a6d5d1e8d11806d4a2e9cc3123d1a90b75e'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T19:13:50Z', 'nvd_published_at': '2022-02-03T12:15:00Z'}
1.4.0
GHSA-hfmf-q69j-6m5p
2023-09-15T20:18:29Z
2022-02-10T00:00:22Z
null
['CVE-2021-45331']
Reuse of one time passwords allowed in Gitea
An Authentication Bypass vulnerability exists in Gitea before 1.5.0, which could let a malicious user gain privileges. If captured, the TOTP code for the 2FA can be submitted correctly more than once.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45331'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/3878'}, {'type': 'WEB', 'url': 'https://blog.gitea.io/2018/08/gitea-1.5.0-is-released/'}]
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-08T00:01:19Z', 'nvd_published_at': '2022-02-09T18:15:00Z'}
1.4.0
GHSA-j4f2-536g-r55m
2022-08-12T21:04:49Z
2022-02-09T22:29:04Z
null
['CVE-2020-36048']
Resource exhaustion in engine.io
Engine.IO before 4.0.0 and 3.6.0 allows attackers to cause a denial of service (resource consumption) via a POST request to the long polling transport.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'engine.io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36048'}, {'type': 'WEB', 'url': 'https://github.com/socketio/engine.io/commit/734f9d1268840722c41219e69eb58318e0b2ac6b'}, {'type': 'WEB', 'url': 'https://blog.caller.xyz/socketio-engineio-dos/'}, {'type': 'WEB', 'url': 'https://github.com/bcaller/k...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T22:58:33Z', 'nvd_published_at': '2021-01-08T00:15:00Z'}
1.4.0
GHSA-8h8p-x289-vvqr
2022-02-14T21:42:51Z
2022-02-09T00:00:29Z
null
['CVE-2021-45325']
Gitea displaying raw OpenID error in UI
Gitea is a project to help users set up a self-hosted Git service. Server Side Request Forgery (SSRF) vulnerability exists in Gitea before 1.7.0 using the OpenID URL. Gitea can leak sensitive information about the local network through the error provided by the UI.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/go-gitea/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45325'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/issues/4973'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/5705'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/5712'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T19:58:31Z', 'nvd_published_at': '2022-02-08T15:15:00Z'}
1.4.0
GHSA-vg27-hr3v-3cqv
2023-02-28T16:49:36Z
2022-02-16T23:02:09Z
null
['CVE-2022-0637']
open redirect in pollbot
(From https://bugzilla.mozilla.org/show_bug.cgi?id=1753838) Summary: There was an open redirection vulnerability in the path of: https://pollbot.services.mozilla.com/ and https://pollbot.stage.mozaws.net/ Description: An attacker can redirect anyone to malicious sites. Steps To Reproduce: Type in this URL: https:/...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pollbot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mozilla/PollBot/security/advisories/GHSA-vg27-hr3v-3cqv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0637'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/PollBot/pull/360'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/PollBot/commit/e...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T23:02:09Z', 'nvd_published_at': '2023-02-16T22:15:00Z'}
1.4.0
GHSA-5545-2q6w-2gh6
2022-08-10T22:18:31Z
2022-02-08T00:00:56Z
null
['CVE-2021-41495']
NumPy NULL Pointer Dereference
Null Pointer Dereference vulnerability exists in numpy.sort in NumPy &lt and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating sort arrays.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'numpy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.18.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41495'}, {'type': 'WEB', 'url': 'https://github.com/numpy/numpy/issues/19038'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5545-2q6w-2gh6'}, {'type': 'PACKAGE', 'url': 'https://github.com/numpy/numpy'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:10:22Z', 'nvd_published_at': '2021-12-17T20:15:00Z'}
1.4.0
GHSA-43q8-3fv7-pr5x
2022-02-03T23:10:42Z
2022-02-09T23:37:55Z
null
[]
Improper Validation of Integrity Check Value in TensorFlow
### Impact The implementation of [`tf.sparse.split`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_split_op.cc#L26-L102) does not fully validate the input arguments. Hence, a malicious user can trigger a denial of service via a segfault or a heap O...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-43q8-3fv7-pr5x'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pgcq-h79j-2f69'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/pull/53695'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-354'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T23:10:42Z', 'nvd_published_at': None}
1.4.0
GHSA-gpch-h32j-gx6x
2021-07-08T14:31:41Z
2022-02-10T20:24:17Z
null
['CVE-2020-5404']
Insufficiently Protected Credentials in Reactor Netty
The HttpClient from Reactor Netty, versions 0.9.x prior to 0.9.5, and versions 0.8.x prior to 0.8.16, may be used incorrectly, leading to a credentials leak during a redirect to a different domain. In order for this to happen, the HttpClient must have been explicitly configured to follow redirects.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.projectreactor.netty:reactor-netty-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.9.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.projectreactor.netty:reactor-netty-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5404'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2020-5404'}]
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T20:23:58Z', 'nvd_published_at': '2020-03-03T18:15:00Z'}
1.4.0
GHSA-hjxc-462x-x77j
2023-09-08T23:56:07Z
2022-02-09T22:49:38Z
null
['CVE-2019-15608']
TOCTOU Race Condition in Yarn
The package integrity validation in yarn < 1.19.0 contains a TOCTOU vulnerability where the hash is computed before writing a package to cache. It's not computed again when reading from the cache. This may lead to a cache pollution attack. This issue is fixed in 1.19.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'yarn'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15608'}, {'type': 'WEB', 'url': 'https://github.com/yarnpkg/yarn/commit/0474b8c66a8ea298f5e4dedc67b2de464297ad1c'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/703138'}, {'type': 'WEB', 'url': 'https://github.com/yarnpkg/yarn/blob/master/...
{'cwe_ids': ['CWE-367'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T22:21:40Z', 'nvd_published_at': '2020-03-15T18:15:00Z'}
1.4.0
GHSA-g5v4-5x39-vwhx
2022-10-25T20:26:42Z
2022-02-15T00:32:04Z
null
['CVE-2021-21272']
Zip slip directory exploit in github.com/deislabs/oras
### Impact The directory support (#55) allows the downloaded gzipped tarballs to be automatically extracted to the user-specified directory where the tarball can have symbolic links and hard links. A well-crafted tarball or tarballs allow malicious artifact providers linking, writing, or overwriting specific files on ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/deislabs/oras'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/deislabs/oras/security/advisories/GHSA-g5v4-5x39-vwhx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21272'}, {'type': 'WEB', 'url': 'https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e'}, {'type': 'PACKAGE', 'url': 'htt...
{'cwe_ids': ['CWE-22', 'CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T14:42:50Z', 'nvd_published_at': '2021-01-25T19:15:00Z'}
1.4.0
GHSA-jw3v-5ch2-wfmm
2023-07-13T22:11:44Z
2022-02-15T01:38:27Z
null
['CVE-2020-25640']
Wildfly logs plaintext passwords
A flaw was discovered in WildFly before 21.0.0.Final where, Resource adapter logs plain text JMS password at warning level on connection error, inserting sensitive information in the log file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.0.0.Final'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25640'}, {'type': 'WEB', 'url': 'https://github.com/amqphub/amqp-10-resource-adapter/issues/13'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1881637'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201...
{'cwe_ids': ['CWE-209', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T22:11:44Z', 'nvd_published_at': '2020-11-24T19:15:00Z'}
1.4.0
GHSA-2pj6-5hqc-w5x9
2022-12-01T22:06:24Z
2022-02-16T00:01:12Z
null
['CVE-2022-25212']
CSRF vulnerability in Jenkins SWAMP Plugin allows capturing credentials
WAMP Plugin 1.2.6 and earlier does not perform a permission check in a method implementing form validation.\ This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. Add...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.continuousassurance.swamp.jenkins:swamp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25212'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/swamp-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1988'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:06:24Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-44cg-qcpr-fwjh
2022-03-04T21:38:29Z
2022-02-25T00:01:07Z
null
['CVE-2021-44565']
Cross site scripting in francoisjacquet/rosariosis
A Cross Site Scripting (XSS) vulnerabilty exits in RosarioSIS before 7.6.1 via the xss_clean function in classes/Security.php, which allows remote malicious users to inject arbitrary JaveScript of HTML.An example of affected components are all Markdown input fields.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44565'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md#changes-in-761'}, {'type': 'WEB', 'url': 'https://gitlab.com/franco...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T20:47:39Z', 'nvd_published_at': '2022-02-24T15:15:00Z'}
1.4.0
GHSA-hrxv-694f-22g3
2022-03-02T21:57:30Z
2022-02-19T00:01:28Z
null
['CVE-2022-0672']
Exposure of Sensitive Information to an Unauthorized Actor in LemMinX
A flaw was found in LemMinX in versions prior to 0.19.0. Insecure redirect could allow unauthorized access to sensitive information locally if LemMinX is run under a privileged user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.lemminx:lemminx-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.19.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0672'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/lemminx/pull/1174'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/lemminx/commit/076b88052c2a63f60a98ef4b45e3e38c217b70ae'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/lem...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T21:58:23Z', 'nvd_published_at': '2022-02-18T18:15:00Z'}
1.4.0
GHSA-rww7-2gpw-fv6j
2022-02-11T20:48:05Z
2022-02-09T23:28:29Z
null
['CVE-2022-23572']
Crash when type cannot be specialized in Tensorflow
### Impact Under certain scenarios, TensorFlow can fail to specialize a type during [shape inference](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L168-L174): ```cc void InferenceContext::PreInputInit( const OpDef& op_def, const...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rww7-2gpw-fv6j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23572'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/cb164786dc891ea11d3a900e90367c339305dc7b'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617', 'CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T18:58:49Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-36h2-95gj-w488
2022-02-14T23:00:49Z
2022-02-09T00:00:28Z
null
['CVE-2021-45328']
Open redirect in Gitea
Gitea before 1.4.3 is affected by URL Redirection to Untrusted Site ('Open Redirect') via internal URLs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/go-gitea/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45328'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/issues/4332'}, {'type': 'WEB', 'url': 'https://blog.gitea.io/2018/06/release-of-1.4.3/'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-gitea/gitea'}]
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T23:00:49Z', 'nvd_published_at': '2022-02-08T16:15:00Z'}
1.4.0
GHSA-h2fg-54x9-5qhq
2023-02-17T22:18:36Z
2022-02-11T23:43:13Z
null
['CVE-2020-26521']
Nil dereference in NATS JWT, DoS of nats-server
## Problem Description The NATS account system has an Operator trusted by the servers, which signs Accounts, and each Account can then create and sign Users within their account. The Operator should be able to safely issue Accounts to other entities which it does not fully trust. A malicious Account could create and...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/jwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.9'}]}...
[{'type': 'WEB', 'url': 'https://github.com/nats-io/jwt/security/advisories/GHSA-h2fg-54x9-5qhq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26521'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/jwt/pull/107'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/commit/9ff8...
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:32:02Z', 'nvd_published_at': '2020-11-06T08:15:00Z'}
1.4.0
GHSA-88xq-w8cq-xfg7
2022-02-16T22:35:03Z
2022-02-16T22:35:03Z
null
['CVE-2022-23636']
Invalid drop of partially-initialized instances in the pooling instance allocator for modules with defined `externref` globals
### Impact There exists a bug in the pooling instance allocator in Wasmtime's runtime where a failure to instantiate an instance for a module that defines an `externref` global will result in an invalid drop of a `VMExternRef` via an uninitialized pointer. As instance slots may be reused between consecutive instantia...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.34.0'}, {'fixed': '0.34.1'}]}], 'versions': ['0.34.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.33...
[{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-88xq-w8cq-xfg7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23636'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/commit/886ecc562040bef61faf19438c22285c2d62403a'}, {'type'...
{'cwe_ids': ['CWE-824'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:35:03Z', 'nvd_published_at': '2022-02-16T22:15:00Z'}
1.4.0
GHSA-j8jp-9x42-4pj5
2022-03-11T19:40:15Z
2022-02-27T00:00:14Z
null
['CVE-2022-26149']
Unrestricted Upload of File with Dangerous Type in MODX Revolution
MODX Revolution through 2.8.3-pl allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Uploadable File Types setting can be changed by an administrator.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'modx/revolution'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8.3-pl'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26149'}, {'type': 'PACKAGE', 'url': 'https://github.com/modxcms/revolution'}, {'type': 'WEB', 'url': 'https://github.com/sartlabs/0days/blob/main/Modx/Exploit.txt'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171488/MODX-Revolutio...
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T19:40:15Z', 'nvd_published_at': '2022-02-26T21:15:00Z'}
1.4.0
GHSA-6pw2-5hjv-9pf7
2022-02-24T13:46:56Z
2022-02-12T00:00:38Z
null
['CVE-2021-23555']
Sandbox bypass in vm2
The package vm2 before 3.9.6 are vulnerable to Sandbox Bypass via direct access to host error objects generated by node internals during generation of a stacktraces, which can lead to execution of arbitrary code on the host machine.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'vm2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23555'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/commit/532120d5cdec7da8225fc6242e154ebabc63fe4d'}, {'type': 'PACKAGE', 'url': 'https://github.com/patriksimek/vm2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-VM2-230990...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:46:08Z', 'nvd_published_at': '2022-02-11T20:15:00Z'}
1.4.0
GHSA-2m53-83f3-562j
2022-01-27T23:11:40Z
2022-02-01T00:44:35Z
null
[]
Prototype pollution in min-dash < 3.8.1
### Impact The `set` method is vulnerable to prototype pollution with specially crafted inputs. ```javascript // insert the following into poc.js and run node poc,js (after installing the package) let parser = require("min-dash"); parser.set({}, [["__proto__"], "polluted"], "success"); console.log(polluted); ``` #...
[]
[{'package': {'ecosystem': 'npm', 'name': 'min-dash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/bpmn-io/min-dash/security/advisories/GHSA-2m53-83f3-562j'}, {'type': 'PACKAGE', 'url': 'https://github.com/bpmn-io/min-dash'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-27T23:11:40Z', 'nvd_published_at': None}
1.4.0
GHSA-m6mm-q862-j366
2023-09-25T11:16:54Z
2022-02-09T00:56:14Z
null
['CVE-2020-1714']
Improper Input Validation in Keycloak
A flaw was found in Keycloak before version 11.0.0, where the code base contains usages of ObjectInputStream without type checks. This flaw allows an attacker to inject arbitrarily serialized Java Objects, which would then get deserialized in a privileged context and potentially lead to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-common'}, 'ecosystem_specific': {'aff...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1714'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/pull/7053'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/33863ba16117844930a38ebde57a25258f5b80fd'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/sh...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T22:02:39Z', 'nvd_published_at': '2020-05-13T19:15:00Z'}
1.4.0
GHSA-fhpf-pp6p-55qc
2022-02-09T18:28:16Z
2022-02-01T00:43:38Z
null
['CVE-2022-23607']
Unsafe handling of user-specified cookies in treq
### Impact Treq's request methods (`treq.get`, `treq.post`, `HTTPClient.request`, `HTTPClient.get`, etc.) accept cookies as a dictionary, for example: ```py treq.get('https://example.com/', cookies={'session': '1234'}) ``` Such cookies are not bound to a single domain, and are therefore sent to *every* domain ("supe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'treq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/twisted/treq/security/advisories/GHSA-fhpf-pp6p-55qc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23607'}, {'type': 'WEB', 'url': 'https://github.com/twisted/treq/commit/1da6022cc880bbcff59321abe02bf8498b89efb2'}, {'type': 'PACKAGE', 'url': 'https...
{'cwe_ids': ['CWE-200', 'CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T22:05:38Z', 'nvd_published_at': '2022-02-01T11:15:00Z'}
1.4.0
GHSA-vfp4-xx6m-7vf6
2021-05-13T20:25:19Z
2022-02-15T01:57:18Z
null
['CVE-2020-7010']
Cryptographic Issues in ECK
Elastic Cloud on Kubernetes (ECK) versions prior to 1.1.0 generate passwords using a weak random number generator. If an attacker is able to determine when the current Elastic Stack cluster was deployed they may be able to more easily brute force the Elasticsearch credentials generated by ECK.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/elastic/cloud-on-k8s'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7010'}, {'type': 'WEB', 'url': 'https://www.elastic.co/community/security/'}]
{'cwe_ids': ['CWE-335'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T20:25:19Z', 'nvd_published_at': None}
1.4.0
GHSA-3wwj-wh2w-g4xp
2022-02-23T15:04:54Z
2022-02-19T00:01:35Z
null
['CVE-2022-0666']
CRLF Injection in microweber
CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0666'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7...
{'cwe_ids': ['CWE-93'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T15:04:54Z', 'nvd_published_at': '2022-02-18T15:15:00Z'}
1.4.0
GHSA-6m26-25q2-cq46
2022-03-09T20:36:46Z
2022-02-27T00:00:15Z
null
['CVE-2022-0763']
Cross-site Scripting in microweber
Microweber Cross-site Scripting (XSS) - Stored XSS vulnerability on admin page up to version 1.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0763'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/c897d0dc159849763a813184d9b75b966c6360bf'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:57:12Z', 'nvd_published_at': '2022-02-26T10:15:00Z'}
1.4.0
GHSA-6566-9526-52v6
2022-02-10T20:48:47Z
2022-02-10T20:48:47Z
null
['CVE-2020-10591']
Exposure of Sensitive Information to an Unauthorized Actor in Concord
An issue was discovered in Walmart Labs Concord before 1.44.0. CORS Access-Control-Allow-Origin headers have a potentially unsafe dependency on Origin headers, and are not configurable. This allows remote attackers to discover host information, nodes, API metadata, and references to usernames via api/v1/apikey.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.walmartlabs.concord.docker:concord-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.44.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10591'}, {'type': 'WEB', 'url': 'https://github.com/walmartlabs/concord/issues/22'}, {'type': 'WEB', 'url': 'https://github.com/walmartlabs/concord/compare/1.43.0...1.44.0'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T20:59:37Z', 'nvd_published_at': '2020-03-15T21:15:00Z'}
1.4.0
GHSA-fx5c-h9f6-rv7c
2022-02-11T20:01:09Z
2022-02-09T23:28:07Z
null
['CVE-2022-23588']
`CHECK`-fails due to attempting to build a reference tensor
### Impact A malicious user can cause a denial of service by altering a `SavedModel` such that [Grappler optimizer would attempt to build a tensor using a reference `dtype`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L13...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fx5c-h9f6-rv7c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23588'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/6b5adc0877de832b2a7c189532dbbbc64622eeb6'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T18:59:59Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-23hm-7w47-xw72
2022-02-09T18:28:54Z
2022-02-09T18:28:54Z
null
['CVE-2022-21726']
Out of bounds read in Tensorflow
### Impact The [implementation of `Dequantize`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/dequantize_op.cc#L92-L153) does not fully validate the value of `axis` and can result in heap OOB accesses: ```python import tensorflow as tf @tf.function def...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-23hm-7w47-xw72'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21726'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/23968a8bf65b009120c43b5ebcceaf52dbc9e943'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T18:08:22Z', 'nvd_published_at': '2022-02-03T11:15:00Z'}
1.4.0
GHSA-qrrc-ww9x-r43g
2023-03-02T20:00:40Z
2022-02-15T01:57:18Z
null
['CVE-2020-13401']
Improper Input Validation in Docker Engine
An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker-ce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.03.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13401'}, {'type': 'WEB', 'url': 'https://docs.docker.com/engine/release-notes/'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker-ce/releases/tag/v19.03.11'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-an...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-14T16:27:26Z', 'nvd_published_at': '2020-06-02T14:15:00Z'}
1.4.0
GHSA-qmmc-jppf-32wv
2021-05-20T21:02:14Z
2022-02-15T00:41:14Z
null
['CVE-2014-9358']
Directory Traversal in Docker
Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications."
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9358'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2014-9358'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#%...
{'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:02:14Z', 'nvd_published_at': None}
1.4.0
GHSA-6978-vg2j-cc9q
2021-10-20T17:38:18Z
2022-02-15T01:57:18Z
null
['CVE-2020-2023']
Improper Privilege Management and Execution with Unnecessary Privileges in Kata Containers
Kata Containers doesn't restrict containers from accessing the guest's root filesystem device. Malicious containers can exploit this to gain code execution on the guest and masquerade as the kata-agent. This issue affects Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kata-containers/agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kata-containers/agent'}, 'range...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2023'}, {'type': 'WEB', 'url': 'https://github.com/kata-containers/agent/issues/791'}, {'type': 'WEB', 'url': 'https://github.com/kata-containers/runtime/issues/2488'}, {'type': 'WEB', 'url': 'https://github.com/kata-containers/agent/pull/792'}, {'...
{'cwe_ids': ['CWE-250', 'CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T19:41:22Z', 'nvd_published_at': '2020-06-10T18:15:00Z'}
1.4.0
GHSA-6gmv-pjp9-p8w8
2022-02-09T18:29:24Z
2022-02-09T18:29:24Z
null
['CVE-2022-21728']
Out of bounds read in Tensorflow
### Impact The [implementation of shape inference for `ReverseSequence`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L1636-L1671) does not fully validate the value of `batch_dim` and can result in a heap OOB read: ```python import tensorflow ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6gmv-pjp9-p8w8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21728'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/37c01fb5e25c3d80213060460196406c43d31995'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T18:29:10Z', 'nvd_published_at': '2022-02-03T11:15:00Z'}
1.4.0
GHSA-g44j-7vp3-68cv
2021-05-19T22:08:41Z
2022-02-15T01:57:18Z
null
['CVE-2015-3629']
Arbitrary File Write in Libcontainer
Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3629'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker/commit/d5ebb60bddbabea0439213501f4f6ed494b23cba'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ'}, {'type'...
{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:08:41Z', 'nvd_published_at': None}
1.4.0
GHSA-g9mp-8g3h-3c5c
2023-08-29T20:07:14Z
2022-02-15T01:57:18Z
null
[]
flynn/noise has improper nonce handling yielding potential state DoS
The Go package `github.com/flynn/noise`, a [Noise Protocol](https://noiseprotocol.org/) implementation, has two bugs in nonce handling in versions prior to v1.0.0. ### Issue 1: Potential nonce overflow If 2<sup>64</sup> (~18.4 quintillion) or more messages are encrypted with `Encrypt` after handshaking, the nonce cou...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/flynn/noise'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/flynn/noise/security/advisories/GHSA-g9mp-8g3h-3c5c'}, {'type': 'WEB', 'url': 'https://github.com/flynn/noise/pull/44'}, {'type': 'PACKAGE', 'url': 'https://github.com/flynn/noise'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0425'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:46:19Z', 'nvd_published_at': None}
1.4.0
GHSA-ppfm-rj6p-38q6
2022-02-24T12:14:14Z
2022-02-16T00:01:53Z
null
['CVE-2022-0587']
Improper Authorization in librenms
Improper Authorization in Packagist librenms/librenms prior to 22.2.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0587'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0c7c9ecd-...
{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:51:55Z', 'nvd_published_at': '2022-02-15T08:15:00Z'}
1.4.0
GHSA-w3wf-cfx3-6gcx
2022-02-11T23:59:14Z
2022-02-11T23:59:14Z
null
['CVE-2020-26276']
SAML authentication vulnerability due to stdlib XML parsing
### Impact Due to issues in Go's standard library XML parsing, a valid SAML response may be mutated by an attacker to modify the trusted document. This can result in allowing unverified logins from a SAML IdP. Users that configure Fleet with SSO login may be vulnerable to this issue. ### Patches This issue is patched...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/fleetdm/fleet/v4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/fleetdm/fleet/security/advisories/GHSA-w3wf-cfx3-6gcx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26276'}, {'type': 'WEB', 'url': 'https://github.com/fleetdm/fleet/commit/57812a532e5f749c8e18c6f6a652eca65c083607'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-290'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T20:46:21Z', 'nvd_published_at': '2020-12-17T20:15:00Z'}
1.4.0
GHSA-7p79-6x2v-5h88
2022-02-25T14:54:31Z
2022-02-16T22:57:57Z
null
[]
Server crash if running Python 3.10 w/ Sanic 20.12
**!!! ONLY APPLIES TO VERSIONS PRIOR TO Sanic v20.12 WHEN USING Python 3.10 !!!** Sanic v20.12 officially supports Python versions 3.6, 3.7, 3.8, and 3.9. However, if you accidentally run it with version 3.10 (**which is not supported by Sanic 20.12**), your server is prone to crashing on an incoming web request. ###...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'sanic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.7'}, {'fixed': '20.12.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sanic-org/sanic/security/advisories/GHSA-7p79-6x2v-5h88'}, {'type': 'PACKAGE', 'url': 'https://github.com/sanic-org/sanic'}, {'type': 'WEB', 'url': 'https://github.com/sanic-org/sanic/releases/tag/v20.12.6'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:57:57Z', 'nvd_published_at': None}
1.4.0
GHSA-j586-cj67-vg4p
2022-02-23T19:23:39Z
2022-02-12T00:00:47Z
null
['CVE-2020-13674']
Cross-Site Request Forgery in Drupal core
The QuickEdit module does not properly validate access to routes, which could allow cross-site request forgery under some circumstances and lead to possible data integrity issues. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed. Removing the "access in-place editing"...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.9.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.1.0'}, {'fixed': '9.1.13'}]}]}, {'pac...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13674'}, {'type': 'WEB', 'url': 'https://github.com/drupal/core/commit/20cd85db8198c63101bd050ea973b13f2f3edef6'}, {'type': 'WEB', 'url': 'https://github.com/drupal/core/commit/6359b3ea5aacf85399285c522c6d787a218c897c'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T19:23:39Z', 'nvd_published_at': '2022-02-11T16:15:00Z'}
1.4.0
GHSA-3v7g-4pg3-7r6j
2022-03-07T13:39:11Z
2022-02-26T00:00:44Z
null
['CVE-2022-24288']
OS Command injection in Apache Airflow
In Apache Airflow, prior to version 2.2.4, some example DAGs did not properly sanitize user-provided params, making them susceptible to OS Command Injection from the web UI.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24288'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/dbw5ozcmr0h0lhs0yjph7xdc64oht23t'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:33:11Z', 'nvd_published_at': '2022-02-25T09:15:00Z'}
1.4.0
GHSA-8jj7-5vxc-pg2q
2022-02-11T20:31:17Z
2022-02-09T23:27:49Z
null
['CVE-2022-23587']
Integer overflow in TensorFlow
### Impact Under certain scenarios, Grappler component of TensorFlow is vulnerable to an integer overflow during [cost estimation for crop and resize](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L2621-L2689). Since the ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8jj7-5vxc-pg2q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23587'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/0aaaae6eca5a7175a193696383f582f53adab23f'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T19:01:18Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-j3ch-vjph-8q6v
2022-03-01T22:31:11Z
2022-02-21T00:00:19Z
null
['CVE-2022-23848']
Command injection in Alluxio
In Alluxio before 2.7.3, the logserver does not validate the input stream. NOTE: this is not the same as the CVE-2021-44228 Log4j vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.alluxio:alluxio-core-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23848'}, {'type': 'WEB', 'url': 'https://www.alluxio.io/download/releases/alluxio-2-7-3-release/'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:11:15Z', 'nvd_published_at': '2022-02-20T19:15:00Z'}
1.4.0
GHSA-5875-p652-2ppm
2023-08-03T17:34:37Z
2022-02-27T00:00:16Z
null
['CVE-2022-0762']
Exposure of Resource to Wrong Sphere in microweber
Exposure of Resource to Wrong Sphere in microweber prior to 1.3 allows users to add deleted products to a cart and buy it.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0762'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/76361264d9fdfff38a1af79c63141455cc4d36e3'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1...
{'cwe_ids': ['CWE-668', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:09:05Z', 'nvd_published_at': '2022-02-26T10:15:00Z'}
1.4.0
GHSA-4m7p-55jm-3vwv
2023-05-25T13:20:35Z
2022-02-16T00:01:37Z
null
['CVE-2022-25173']
Improper Neutralization of Special Elements used in an OS Command in Jenkins Pipeline: Groovy Plugin
Jenkins Pipeline: Groovy Plugin prior to 2656.vf7a_e7b_75a_457, 2.94.1, and 2.92.1 uses the same checkout directories for distinct SCMs when reading the script file (typically Jenkinsfile) for Pipelines, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2646.v6ed3b5b01ff1'}, {'fixed': '2656.vf7a'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps'}, 'ranges': [{'type': 'ECOS...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25173'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/3615f493b8a36ff15735fb9d79c9dc9e0d542695/2022/25xxx/CVE-2022-25173.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2463'}, {'t...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:48:23Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-53hp-jpwq-2jgq
2022-02-09T23:01:22Z
2022-02-09T23:01:22Z
null
['CVE-2020-11996']
Uncontrolled Resource Consumption in Apache Tomcat
A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.0-M5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.0-M4'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11996'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2529016c311ce9485e6f173446d469600fdfbb94dccadfcd9dfdac79@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3ea96d8f36dd404acce83df8a...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T19:42:18Z', 'nvd_published_at': '2020-06-26T17:15:00Z'}
1.4.0
GHSA-5m8f-v3gw-h94w
2022-07-27T21:24:40Z
2022-02-16T00:01:28Z
null
['CVE-2022-25187']
Support Core Plugin before 2.79.1 stores sensitive data in plain text
Jenkins Support Core Plugin 2.79 and earlier does not redact some sensitive information in the support bundle. Support Core Plugin 2.79.1 adds a list of keywords whose associated values are redacted.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:support-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.79.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25187'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/support-core-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2186'}]
{'cwe_ids': ['CWE-212', 'CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T21:24:40Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-f8vc-wfc8-hxqh
2021-10-18T14:37:38Z
2022-02-09T22:17:38Z
null
['CVE-2020-9492']
Improper Privilege Management in Apache Hadoop
In Apache Hadoop 3.2.0 to 3.2.1, 3.0.0-alpha1 to 3.1.3, and 2.0.0-alpha to 2.10.0, WebHDFS client might send SPNEGO authorization header to remote URL without proper verification.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9492'}, {'type': 'WEB', 'url': 'https://github.com/apache/hadoop/commit/ca65409836d2949e9a9408d40bec0177b414cd5d'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hadoop'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a534f...
{'cwe_ids': ['CWE-269', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T18:29:12Z', 'nvd_published_at': '2021-01-26T18:16:00Z'}
1.4.0
GHSA-9r5x-fjv3-q6h4
2022-07-13T18:57:29Z
2022-02-15T01:57:18Z
null
['CVE-2021-3127']
Incorrect Access Control in github.com/nats-io/jwt and github.com/nats-io/nats-server/v2
NATS Server 2.x before 2.2.0 and JWT library before 2.0.1 have Incorrect Access Control because Import Token bindings are mishandled.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/jwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server/v2/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3127'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/jwt/pull/149/commits/a826c77dc9d2671c961b75ceefdb439c41029866'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/commit/423b79440c80c863de9f4e20548504e6c5d5e403'}, {'type': '...
{'cwe_ids': ['CWE-284', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T20:34:10Z', 'nvd_published_at': '2021-03-16T20:15:00Z'}
1.4.0
GHSA-pr38-qpxm-g88x
2023-09-25T10:37:03Z
2022-02-06T00:00:55Z
null
['CVE-2022-23913']
Apache ActiveMQ Artemis Uncontrolled Resource Consumption (DoS)
In Apache ActiveMQ Artemis prior to 2.20.0 or 2.19.1, an attacker could partially disrupt availability (DoS) through uncontrolled resource consumption of memory.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:artemis-core-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.19.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23913'}, {'type': 'WEB', 'url': 'https://github.com/github/codeql-java-CVE-coverage/issues/1061'}, {'type': 'WEB', 'url': 'https://github.com/apache/activemq-artemis/pull/3862'}, {'type': 'WEB', 'url': 'https://github.com/apache/activemq-artemis/pu...
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-08T17:52:10Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-x4rg-4545-4w7w
2021-11-03T14:59:45Z
2022-02-15T01:57:18Z
null
['CVE-2019-3564']
Improper Input Validation and Excessive Iteration in Go Facebook Thrift
Go Facebook Thrift servers would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2019.03.04.0...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/facebook/fbthrift'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.31.1-0.20190225164308-c461c1bd1a3e'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3564'}, {'type': 'WEB', 'url': 'https://github.com/facebook/fbthrift/commit/c461c1bd1a3e130b181aa9c854da3030cd4b5156'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/fbthrift'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html...
{'cwe_ids': ['CWE-20', 'CWE-755', 'CWE-834'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T15:32:10Z', 'nvd_published_at': '2019-05-06T16:29:00Z'}
1.4.0
GHSA-hhh6-cm2m-3fhc
2022-02-07T20:59:04Z
2022-02-02T00:01:45Z
null
['CVE-2022-24196']
Allocation of Resources Without Limits or Throttling in iText
iText v7.1.17 was discovered to contain an out-of-memory error via the component readStreamBytesRaw, which allows attackers to cause a Denial of Service (DoS) via a crafted PDF file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.itextpdf:itext7-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.1.17'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24196'}, {'type': 'WEB', 'url': 'https://github.com/itext/itext7/pull/78'}, {'type': 'WEB', 'url': 'https://github.com/itext/itext7/pull/78#issuecomment-1089279222'}, {'type': 'PACKAGE', 'url': 'https://github.com/itext/itext7'}, {'type': 'WEB', 'u...
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T20:59:04Z', 'nvd_published_at': '2022-02-01T20:15:00Z'}
1.4.0
GHSA-32m2-9f76-4gv8
2022-02-11T20:51:39Z
2022-02-06T00:01:01Z
null
['CVE-2022-0227']
Business Logic Errors in SilverStripe Framework
SilverStripe Framework prior to version 4.10.1 is vulnerable to business logic errors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0227'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/commit/cbf2987a616e9ef4d7eccae5d763ef2179bdbcc2'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-framework'}, {'type': 'WEB', 'url': '...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T22:25:00Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-3mw4-6rj6-74g5
2022-02-11T16:22:36Z
2022-02-09T23:46:46Z
null
['CVE-2022-21739']
Null pointer dereference in TensorFlow
### Impact The [implementation of `QuantizedMaxPool`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/quantized_pooling_ops.cc#L114-L130) has an undefined behavior where user controlled inputs can trigger a reference binding to null pointer. ```python imp...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3mw4-6rj6-74g5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21739'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/53b0dd6dc5957652f35964af16b892ec9af4a559'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:07:52Z', 'nvd_published_at': '2022-02-03T14:15:00Z'}
1.4.0
GHSA-x5m6-jh4r-34mv
2023-07-05T20:53:41Z
2022-02-15T01:07:53Z
null
['CVE-2014-0177']
Hub Package Arbitrary File Overwrite
The `am` function in `lib/hub/commands.rb` in hub before 1.12.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary patch file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/github/hub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'hub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0177'}, {'type': 'WEB', 'url': 'https://github.com/github/hub/commit/016ec99d25b1cb83cb4367e541177aa431beb600'}, {'type': 'WEB', 'url': 'https://github.com/mislav/hub/commit/016ec99d25b1cb83cb4367e541177aa431beb600'}, {'type': 'PACKAGE', 'url': 'ht...
{'cwe_ids': ['CWE-377'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:32:04Z', 'nvd_published_at': None}
1.4.0
GHSA-6473-gqrj-4p65
2023-05-30T19:32:09Z
2022-02-16T00:01:34Z
null
['CVE-2022-25176']
Improper Link Resolution Before File Access in Jenkins Pipeline: Groovy Plugin
Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier follows symbolic links to locations outside of the checkout directory for the configured SCM when reading the script file (typically Jenkinsfile) for Pipelines, allowing attackers able to configure Pipelines to read arbitrary files on the Jenkins controller...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.93'}, {'fixed': '2.94.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25176'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/workflow-cps-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613'}]
{'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:46:35Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-gjqc-q9g6-q2j3
2022-02-11T20:37:11Z
2022-02-10T00:34:13Z
null
['CVE-2022-23583']
`CHECK`-failures in binary ops in Tensorflow
### Impact A malicious user can cause a denial of service by altering a `SavedModel` such that [any binary op](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/cwise_ops_common.h#L88-L137) would trigger `CHECK` failures. This occurs when the protobuf part co...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gjqc-q9g6-q2j3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23583'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T19:45:57Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-v4h8-794j-g8mm
2021-05-19T22:04:37Z
2022-02-15T01:57:18Z
null
['CVE-2015-3631']
Arbitrary File Override in Docker Engine
Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/moby/moby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3631'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/compare/769acfec2928c47a35da5357d854145b1036448d...b6a9dc399be31c531e3753104e10d74760ed75a2'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-...
{'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:04:37Z', 'nvd_published_at': None}
1.4.0
GHSA-7g7g-82fp-hpxx
2022-12-01T22:32:34Z
2022-02-16T00:01:22Z
null
['CVE-2022-25198']
CSRF vulnerability in Jenkins SCP publisher Plugin
SCP publisher Plugin 1.8 and earlier does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified username and password. Additionally, this form validation method does not requir...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:scp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25198'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/scp-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2323'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:32:34Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-m6j2-v3gq-45r5
2022-04-04T20:06:43Z
2022-02-10T23:42:39Z
null
['CVE-2019-10062']
Cross-site Scripting in aurelia-framework
The HTMLSanitizer class in html-sanitizer.ts in all released versions of the Aurelia framework 1.x repository is vulnerable to XSS. The sanitizer only attempts to filter SCRIPT elements, which makes it feasible for remote attackers to conduct XSS attacks via (for example) JavaScript code in an attribute of various othe...
[]
[{'package': {'ecosystem': 'npm', 'name': 'aurelia-framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10062'}, {'type': 'WEB', 'url': 'https://github.com/aurelia/framework/issues/992'}, {'type': 'WEB', 'url': 'https://discourse.aurelia.io/t/xss-vulnerability-in-htmlsanitizer-might-be-insufficiently-handled/4219'}, {'type': 'PACKAGE', 'url': 'https:...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T20:26:22Z', 'nvd_published_at': '2021-05-13T21:15:00Z'}
1.4.0
GHSA-4mpj-488r-vh6m
2022-07-22T16:35:11Z
2022-02-01T22:01:14Z
null
['CVE-2021-42767']
Neo4j Graph Database vulnerable to Path Traversal
### Impact Directory Traversal Vulnerabilities found in several functions of apoc plugins in Neo4j Graph database. The attacker can retrieve and download files from outside the configured directory on the affected server. Under some circumstances, the attacker can also create files. ### Patches The users should aim to...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1...
[{'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/security/advisories/GHSA-4mpj-488r-vh6m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42767'}, {'type': 'WEB', 'url': 'https://neo4j.com'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-01T15:58:43Z', 'nvd_published_at': '2022-03-01T02:15:00Z'}
1.4.0
GHSA-x7jh-595q-wq82
2021-08-31T21:09:38Z
2022-02-09T21:59:46Z
null
['CVE-2020-1736']
Incorrect Permission Assignment for Critical Resource in Ansible
A flaw was found in Ansible Engine when a file is moved using atomic_move primitive as the file mode cannot be specified. This sets the destination files world-readable if the destination file does not exist and if the file exists, the file could be changed to have less restrictive permissions before the move. This cou...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'last_affected': '2.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1736'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67794'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1736'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-732'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T15:53:26Z', 'nvd_published_at': '2020-03-16T16:15:00Z'}
1.4.0
GHSA-82rr-mq4r-p4r3
2022-03-04T21:39:00Z
2022-02-25T00:01:08Z
null
['CVE-2021-44567']
SQL injection in francoisjacquet/rosariosis
An SQL Injection vulnerability exits in RosarioSIS before 7.6.1 via the votes parameter in ProgramFunctions/PortalPollsNotes.fnc.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44567'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md#changes-in-761'}, {'type': 'WEB', 'url': 'https://gitlab.com/franco...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T20:47:10Z', 'nvd_published_at': '2022-02-24T15:15:00Z'}
1.4.0
GHSA-8c9h-4q7g-fp7h
2023-03-07T23:46:45Z
2022-02-02T00:01:45Z
null
['CVE-2022-24198']
Out-of-bounds Read in iText
iText v7.1.17 was discovered to contain an out-of-bounds exception via the component ARCFOUREncryption.encryptARCFOUR, which allows attackers to cause a Denial of Service (DoS) via a crafted PDF file. NOTE: Vendor does not view this as a vulnerability and has not found it to be exploitable.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.itextpdf:itext7-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.1.17'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24198'}, {'type': 'WEB', 'url': 'https://github.com/itext/itext7/pull/78'}, {'type': 'WEB', 'url': 'https://github.com/itext/itext7/pull/78#issuecomment-1089287808'}, {'type': 'PACKAGE', 'url': 'https://github.com/itext/itext7'}]
{'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T20:59:10Z', 'nvd_published_at': '2022-02-01T20:15:00Z'}
1.4.0
GHSA-f2vv-v9cg-qhh7
2022-02-11T16:23:03Z
2022-02-09T23:43:48Z
null
['CVE-2022-21737']
Assertion failure based denial of service in Tensorflow
### Impact The [implementation of `*Bincount` operations](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/bincount_op.cc) allows malicious users to cause denial of service by passing in arguments which would trigger a `CHECK`-fail: ```python import tensor...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f2vv-v9cg-qhh7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21737'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/7019ce4f68925fd01cdafde26f8d8c938f47e6f9'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617', 'CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T19:59:49Z', 'nvd_published_at': '2022-02-03T14:15:00Z'}
1.4.0
GHSA-rpvr-mw7r-25xx
2023-09-25T15:44:07Z
2022-02-19T00:01:24Z
null
['CVE-2021-46062']
MCMS Arbitrary File Deletion vulnerability
`net.mingsoft:ms-basic` is used for plugin management for applications built with Maven for the [Mingfei Content Management System (MCMS)](https://gitee.com/mingSoft/MCMS). ms-basic before 2.1.16 is vulnerable to arbitrary file deletion using POST requests to `/template/writeFileContent` via the `oldFileName` parameter...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-basic'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ecosystem_specific': {'affected_functio...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46062'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/59'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T20:58:14Z', 'nvd_published_at': '2022-02-18T20:15:00Z'}
1.4.0
GHSA-86f3-hf24-76q4
2022-02-22T19:40:23Z
2022-02-22T19:40:23Z
null
['CVE-2022-23650']
Use of Hard-coded Cryptographic Key in Netmaker
### Impact There is a hard-coded cryptographic key in the code base which can be exploited to run admin commands on a remote server, if you know the address and username of the admin. This effects the server (netmaker) component, and not clients. ### Patches This has been patched in Netmaker v0.8.5, v0.9.4, and v0.10....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.9.4'...
[{'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/security/advisories/GHSA-86f3-hf24-76q4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23650'}, {'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/pull/781/commits/1bec97c662670dfdab804343fc42ae4b1d050a87'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-321', 'CWE-798'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T19:40:23Z', 'nvd_published_at': '2022-02-18T22:15:00Z'}
1.4.0
GHSA-pg38-r834-g45j
2022-09-08T00:01:33Z
2022-02-10T00:00:20Z
null
['CVE-2021-45330']
Improper Privilege Management in Gitea
An issue exsits in Gitea through 1.15.7, which could let a malicious user gain privileges due to client side cookies not being deleted and the session remains valid on the server side for reuse.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45330'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/issues/4336'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/4840'}]
{'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-08T00:01:33Z', 'nvd_published_at': '2022-02-09T18:15:00Z'}
1.4.0
GHSA-mp28-rq7g-qx62
2021-04-08T20:55:45Z
2022-02-09T22:44:38Z
null
['CVE-2020-13931']
Remote code execution in Apache TomEE
If Apache TomEE 8.0.0-M1 - 8.0.3, 7.1.0 - 7.1.3, 7.0.0-M1 - 7.0.8, 1.0.0 - 1.7.5 is configured to use the embedded ActiveMQ broker, and the broker config is misconfigured, a JMX port is opened on TCP port 1099, which does not include authentication. CVE-2020-11969 previously addressed the creation of the JMX management...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomee:apache-tomee'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomee:apache-tomee'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'f...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13931'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7f98907165b355dc65f28a57f15103a06173ce03261115fa46d569b4@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r85b87478f8aa4751aa3a06e88622...
{'cwe_ids': ['CWE-306'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:55:45Z', 'nvd_published_at': '2020-12-18T00:15:00Z'}
1.4.0
GHSA-9chx-2vqw-8vq5
2022-02-08T16:08:49Z
2022-02-01T00:01:00Z
null
['CVE-2022-23409']
Path Traversal in the Logs plugin for Craft CMS
The Logs plugin before 3.0.4 for Craft CMS allows remote attackers to read arbitrary files via input to actionStream in Controller.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'ether/logs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23409'}, {'type': 'WEB', 'url': 'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethercreative/logs'}, {'type': 'WEB', 'url': 'https://plugins.craftcms.com/logs...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-08T16:08:49Z', 'nvd_published_at': '2022-01-31T08:15:00Z'}
1.4.0
GHSA-92x2-jw7w-xvvx
2022-02-07T22:36:00Z
2022-02-07T22:36:00Z
null
['CVE-2022-21712']
Cookie and header exposure in twisted
### Impact Cookie and Authorization headers are leaked when following cross-origin redirects in `twited.web.client.RedirectAgent` and `twisted.web.client.BrowserLikeRedirectAgent`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'twisted'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.1'}, {'fixed': '22.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/twisted/twisted/security/advisories/GHSA-92x2-jw7w-xvvx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21712'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/af8fe78542a6f2bf2235ccee8158d9c88d31e8e2'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-200', 'CWE-346'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T22:36:00Z', 'nvd_published_at': '2022-02-07T22:15:00Z'}
1.4.0
GHSA-xxq4-3742-3h28
2022-02-09T22:23:35Z
2022-02-09T00:00:31Z
null
['CVE-2022-0504']
Generation of Error Message Containing Sensitive Information in microweber
microweber version 1.2.10 and prior may generate an error message containing sensitive information.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0504'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/e607e5f745cd99d5c06a7fce16b3577fab8e1250'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2...
{'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T22:22:09Z', 'nvd_published_at': '2022-02-08T09:15:00Z'}
1.4.0
GHSA-gggp-gh2p-996x
2022-03-02T21:56:44Z
2022-02-19T00:01:27Z
null
['CVE-2022-0673']
Path Traversal in LemMinX
A flaw was found in LemMinX in versions prior to 0.19.0. Cache poisoning of external schema files is possible due to directory traversal.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.lemminx:lemminx-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.19.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0673'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/lemminx/pull/1171'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/lemminx'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/lemminx/blob/master/CHANGELOG.md#0190-february-14-2...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T21:56:46Z', 'nvd_published_at': '2022-02-18T18:15:00Z'}
1.4.0
GHSA-2jhm-qp48-hv5j
2022-02-09T21:56:05Z
2022-02-09T21:56:05Z
null
['CVE-2022-23621']
Missing authorization in xwiki-platform
### Impact Any user with SCRIPT right (EDIT right before XWiki 7.4) can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString: ``` $xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg") ``` ### Patches It has been patched in XWiki versi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.6-rc-1'}, {'fixed': '13.7-rc-1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 13.6'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.plat...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2jhm-qp48-hv5j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23621'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/df8bd49b5a4d87a427002c6535fb5b1746ff117a'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-552', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T21:56:05Z', 'nvd_published_at': '2022-02-09T22:15:00Z'}
1.4.0
GHSA-9p77-mmrw-69c7
2022-02-11T20:48:51Z
2022-02-09T23:33:35Z
null
['CVE-2022-23570']
Null-dereference in Tensorflow
### Impact When decoding a tensor from protobuf, TensorFlow might do a null-dereference if attributes of some mutable arguments to some operations are missing from the proto. This is [guarded by a `DCHECK`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9p77-mmrw-69c7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23570'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8a513cec4bec15961fbfdedcaa5376522980455c'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T16:24:16Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-v6vg-pxvv-g5cq
2022-02-24T17:08:24Z
2022-02-15T00:02:45Z
null
['CVE-2022-0579']
Improper Privilege Management in Snipe-IT
Snipe-IT prior to 5.3.9 is vulnerable to improper privilege management. A user who does not have access to the supplier module may view supplier content.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0579'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/db0c0e790892db874573d95f8ae4268b8a011ab1'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/70a99cf4-3241-4...
{'cwe_ids': ['CWE-269', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T17:08:24Z', 'nvd_published_at': '2022-02-14T19:15:00Z'}
1.4.0
GHSA-xhqq-x44f-9fgg
2021-05-21T21:11:37Z
2022-02-11T23:58:09Z
null
['CVE-2020-29509']
Authentication Bypass in github.com/russellhaering/gosaml2
### Impact Given a valid SAML Response, it may be possible for an attacker to mutate the XML document in such a way that gosaml2 will trust a different portion of the document than was signed. Depending on the implementation of the Service Provider this enables a variety of attacks, including users accessing accounts ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/russellhaering/gosaml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/security/advisories/GHSA-xhqq-x44f-9fgg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29509'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/commit/42606dafba60c58c458f14f75c4c230459672ab9'}, {'type': 'WEB...
{'cwe_ids': ['CWE-115'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:11:37Z', 'nvd_published_at': '2020-12-14T20:15:00Z'}
1.4.0
GHSA-vwxp-9qmf-w299
2022-02-03T19:18:02Z
2022-02-01T00:49:48Z
null
['CVE-2022-0394']
Cross-site Scripting in LiveHelperChat
LiveHelperChat (remdex/livehelperchat in Packagist) has a stored Cross-site Scripting (XSS) vulnerability prior to version 3.93.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.93'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0394'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T21:19:09Z', 'nvd_published_at': '2022-01-28T11:15:00Z'}
1.4.0
GHSA-q9vw-wr57-xjv3
2023-02-03T00:34:34Z
2022-02-15T01:57:18Z
null
['CVE-2017-15104']
Information Exposure in Heketi
An access flaw was found in Heketi 5, where the heketi.json configuration file was world readable. An attacker having local access to the Heketi server could read plain-text passwords from the heketi.json file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/heketi/heketi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15104'}, {'type': 'WEB', 'url': 'https://github.com/heketi/heketi/commit/787bae461b23003a4daa4d1d639016a754cf6b00'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3481'}, {'type': 'WEB', 'url': 'https://access.redhat.com/securi...
{'cwe_ids': ['CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:48:28Z', 'nvd_published_at': '2017-12-18T19:29:00Z'}
1.4.0
GHSA-2587-w93g-63m2
2022-12-01T22:34:55Z
2022-02-16T00:01:21Z
null
['CVE-2022-25197']
Agent-to-controller security bypass in Jenkins HashiCorp Vault Plugin allows reading arbitrary files
Jenkins HashiCorp Vault Plugin 336.v182c0fbaaeb7 and earlier implements functionality that allows agent processes to read arbitrary files on the Jenkins controller file system. This allows attackers able to control agent processes to read arbitrary files on the Jenkins controller file system. This vulnerability is on...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.datapipe.jenkins.plugins:hashicorp-vault-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '351.vdb_f83a_1c6a_9d'}]}], 'database_specific': {'last_known_affected_version_range': '<= 336.v182c0fbaaeb7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25197'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/hashicorp-vault-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/hashicorp-vault-plugin/releases/tag/351.vdb_f83a_1c6a_9d'}, {'type': 'WEB', 'url': 'https://www.jenkins...
{'cwe_ids': ['CWE-693'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:34:55Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}