schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-wqfh-9m4g-7x6x | 2021-06-15T19:11:50Z | 2022-02-09T22:14:58Z | null | ['CVE-2020-11998'] | Remote code execution in Apache ActiveMQ | A regression has been introduced in the commit preventing JMX re-bind. By passing an empty environment map to RMIConnectorServer, instead of the map that contains the authentication credentials, it leaves ActiveMQ open to the following attack - A remote client could create a javax.management.loading.MLet MBean and use ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.15.12'}, {'fixed': '5.15.13'}]}], 'versions': ['5.15.12']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11998'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r946488fb942fd35c6a6e0359f52504a558ed438574a8f14d36d7dcd7@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T23:02:39Z', 'nvd_published_at': '2020-09-10T19:15:00Z'} |
1.4.0 | GHSA-f768-8pvq-mm6r | 2023-06-30T20:07:03Z | 2022-02-01T22:01:47Z | null | ['CVE-2022-0414'] | Dolibarr vulnerable to Improper Validation of Specified Quantity in Input | Dolibarr 14.0.5 and prior versions are vulnerable to Improper Validation of Specified Quantity in Input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 14.0.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0414'}, {'type': 'WEB', 'url': 'https://github.com/dolibarr/dolibarr/commit/37fb02ee760cfff18c795ba468da1ba1c53f4684'}, {'type': 'PACKAGE', 'url': 'https://github.com/dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/76f3b405-... | {'cwe_ids': ['CWE-1284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-01T15:33:18Z', 'nvd_published_at': '2022-01-31T11:15:00Z'} |
1.4.0 | GHSA-rpx7-33j2-xx9x | 2022-01-07T22:34:36Z | 2022-02-15T01:57:18Z | null | [] | Arbitrary file deletion in NeMo ASR webapp | ### Description
NVIDIA NeMo contains a vulnerability in ASR WebApp, where Relative Path Traversal (CWE-23) may lead to deletion of any directory through the "../" structure when admin privileges are available.
CVSS Score = 2.0
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'nemo_toolkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/NVIDIA/NeMo/security/advisories/GHSA-rpx7-33j2-xx9x'}, {'type': 'WEB', 'url': 'https://github.com/NVIDIA/NeMo/commit/f7e4ed7e4f7f2fa43765a38c2fafa1b6d1ebd7c0'}, {'type': 'PACKAGE', 'url': 'https://github.com/NVIDIA/NeMo'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T22:34:36Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qj5r-f9mv-rffh | 2022-02-11T16:23:32Z | 2022-02-09T23:38:56Z | null | ['CVE-2022-23569'] | `CHECK`-fails when building invalid tensor shapes in Tensorflow | ### Impact
Multiple operations in TensorFlow can be used to trigger a denial of service via `CHECK`-fails (i.e., assertion failures). This is similar to [TFSA-2021-198](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/security/advisory/tfsa-2021-198.md) (CVE-2021-41197) and has similar fixes.
### Patch... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qj5r-f9mv-rffh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23569'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tenso... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T21:16:06Z', 'nvd_published_at': '2022-02-03T13:15:00Z'} |
1.4.0 | GHSA-4cxw-hq44-r344 | 2022-03-03T19:17:50Z | 2022-02-24T00:00:52Z | null | ['CVE-2021-4070'] | Off-by-one Error in v2fly/v2ray-core | v2fly/v2ray-core prior to 4.44.0 is vulnerable to an off-by-one error. Indexing operations on arrays, slices, or strings should use an index at most one less than the length. If the index is checked for being less than or equal to the length (`<=`), instead of less than the length (`<`), the index could be out of bound... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/v2fly/v2ray-core/v4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.44.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/v2fly/v2ray-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_spec... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4070'}, {'type': 'WEB', 'url': 'https://github.com/v2fly/v2ray-core/commit/c1af2bfd7aa59a4482aa7f6ec4b9208c1d350b5c'}, {'type': 'PACKAGE', 'url': 'https://github.com/v2fly/v2ray-core'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8da19456-4d... | {'cwe_ids': ['CWE-193'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T20:44:31Z', 'nvd_published_at': '2022-02-23T20:15:00Z'} |
1.4.0 | GHSA-q62h-jw38-24vh | 2022-04-11T19:15:59Z | 2022-02-25T00:01:04Z | null | ['CVE-2022-24615'] | Uncaught Exception in zip4j | zip4j up to 2.9.1 can throw various uncaught exceptions while parsing a specially crafted ZIP file, which could result in an application crash. This could be used to mount a denial of service attack against services that use zip4j library. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.lingala.zip4j:zip4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24615'}, {'type': 'WEB', 'url': 'https://github.com/srikanth-lingala/zip4j/issues/377'}, {'type': 'WEB', 'url': 'https://github.com/srikanth-lingala/zip4j/issues/418'}, {'type': 'PACKAGE', 'url': 'https://github.com/srikanth-lingala/zip4j'}] | {'cwe_ids': ['CWE-248', 'CWE-755'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T20:36:17Z', 'nvd_published_at': '2022-02-24T15:15:00Z'} |
1.4.0 | GHSA-x5f3-qmwj-4f84 | 2021-05-12T21:11:09Z | 2022-02-15T01:57:18Z | null | ['CVE-2021-25835'] | Authentication bypass by capture-replay in github.com/cosmos/ethermint | Cosmos Network Ethermint <= v0.4.0 is affected by a cross-chain transaction replay vulnerability in the EVM module. Since ethermint uses the same chainIDEpoch and signature schemes with ethereum for compatibility, a verified signature in ethereum is still valid in ethermint with the same msg content and chainIDEpoch, w... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cosmos/ethermint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cosmos/ethermint/rpc/namespaces/eth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25835'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/ethermint/issues/687'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/ethermint/pull/692'}, {'type': 'WEB', 'url': 'https://github.com/cosmos/ethermint/releases/tag/v0.4.1'}] | {'cwe_ids': ['CWE-294', 'CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:11:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f7qw-5fgj-247x | 2022-01-31T19:08:58Z | 2022-02-01T00:48:35Z | null | [] | Cross-site Scripting and Open Redirect in plone.app.contenttypes | ### Impact
Plone is vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscreen page in a cache, for example in Varnish.
The technique is known as cache poisoning.
Any later visitor can get redirected when clicking on a link on this page.
Us... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'plone.app.contenttypes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/plone/Products.ATContentTypes/security/advisories/GHSA-g4c2-ghfg-g5rh'}, {'type': 'WEB', 'url': 'https://github.com/plone/plone.app.contenttypes/security/advisories/GHSA-f7qw-5fgj-247x'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/plone.app.contenttypes'}] | {'cwe_ids': ['CWE-601', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T19:07:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g6w6-r76c-28j7 | 2023-08-08T20:44:45Z | 2022-02-08T17:23:16Z | null | ['CVE-2022-24450'] | Incorrect Authorization in NATS nats-server | (This advisory is canonically <https://advisories.nats.io/CVE/CVE-2022-24450.txt>)
## Problem Description
NATS nats-server through 2022-02-04 has Incorrect Access Control, with unchecked ability for clients to authorize into any account, because of a coding error in a long-extant experimental feature.
A client craft... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server/v2'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-streaming-server'}, 'ecosystem_... | [{'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/security/advisories/GHSA-g6w6-r76c-28j7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24450'}, {'type': 'WEB', 'url': 'https://advisories.nats.io/CVE/CVE-2022-24450.txt'}, {'type': 'PACKAGE', 'url': 'https://github.com/nats-io/n... | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-08T17:23:16Z', 'nvd_published_at': '2022-02-08T02:15:00Z'} |
1.4.0 | GHSA-gx6h-936c-vrrr | 2022-02-09T23:25:44Z | 2022-02-09T23:25:44Z | null | ['CVE-2022-23622'] | Cross site scripting in registration template in xwiki-platform | ### Impact
We found a possible XSS vector in the `registerinline.vm` template related to the `xredirect` hidden field.
This template is only used in the following conditions:
- the wiki must be open to registration for anyone
- the wiki must be closed to view for Guest users (more specifically the XWiki.Registrat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.1'}, {'fixed': '12.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', ... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gx6h-936c-vrrr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23622'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/053d957d53f2a543d158f3ab651e390d2728e0b9'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T23:25:44Z', 'nvd_published_at': '2022-02-09T22:15:00Z'} |
1.4.0 | GHSA-pj84-qjm3-77mg | 2022-07-21T16:18:43Z | 2022-02-16T00:01:36Z | null | ['CVE-2022-25175'] | Jenkins Pipeline: Multibranch Plugin vulnerable to OS Command Injection | Jenkins Pipeline: Multibranch Plugin 706.vd43c65dec013 and earlier uses distinct checkout directories per SCM for the readTrusted step, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-multibranch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '707.v71c3f0a_6ccdb'}]}], 'database_specific': {'last_known_affected_version_range': '<= 706.vd43c65dec013'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25175'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2463'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:46:22Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-82hx-w2r5-c2wq | 2023-09-20T22:42:48Z | 2022-02-15T01:57:18Z | null | ['CVE-2020-8552'] | Kubernetes API Server DoS Via API Requests | The Kubernetes API server component in Kubernetes versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via successful API requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'k8s.io/apiserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/apiserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'r... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8552'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/89378'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/87669'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/commit/5978856c... | {'cwe_ids': ['CWE-400', 'CWE-770', 'CWE-789'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T21:48:16Z', 'nvd_published_at': '2020-03-27T15:15:00Z'} |
1.4.0 | GHSA-394c-5j6w-4xmx | 2022-09-14T20:38:16Z | 2022-02-09T22:46:53Z | null | ['CVE-2020-7793'] | ua-parser-js Regular Expression Denial of Service vulnerability | The package ua-parser-js before 0.7.23 are vulnerable to Regular Expression Denial of Service (ReDoS) in multiple regexes (see linked commit for more info). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ua-parser-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.23'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7793'}, {'type': 'WEB', 'url': 'https://github.com/faisalman/ua-parser-js/commit/6d1f26df051ba681463ef109d36c9cf0f7e32b18'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf'}, {'type': 'WEB', 'url': 'https://s... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T21:32:22Z', 'nvd_published_at': '2020-12-11T14:15:00Z'} |
1.4.0 | GHSA-v6wh-2wvh-c8x5 | 2023-09-11T23:10:32Z | 2022-02-09T23:15:46Z | null | ['CVE-2020-7779'] | Regular Expression Denial of Service in djvalidator | All versions of package djvalidator are vulnerable to Regular Expression Denial of Service (ReDoS) by sending crafted invalid emails - for example,
`--@------------------------------------------------------------------------------------------------------------------------!`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'djvalidator'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7779'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-DJVALIDATOR-1018709'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T18:54:11Z', 'nvd_published_at': '2020-11-26T11:15:00Z'} |
1.4.0 | GHSA-8459-6rc9-8vf8 | 2022-02-14T22:52:15Z | 2022-02-14T22:52:15Z | null | [] | Path traversal in github.com/cloudflare/cfrpki/cmd/octorpki | ### Impact
In the case that a malicious TAL file is parsed pointing to a repository that provides a malicious ROA file which octorpki downloads, it is possible to bypass the current directory traversal mitigation to allow writing outside of the current directory.
### Patches
No patch release has been made | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/cfrpki/cmd/octorpki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/cloudflare/cfrpki/security/advisories/GHSA-8459-6rc9-8vf8'}] | {'cwe_ids': ['CWE-22'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:52:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p225-pc2x-4jpm | 2021-04-01T19:38:17Z | 2022-02-09T00:58:52Z | null | ['CVE-2020-1725'] | Incorrect Authorization in keycloak | A flaw was found in keycloak before version 13.0.0. In some scenarios a user still has access to a resource after changing the role mappings in Keycloak and after expiration of the previous access token. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1725'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1765129'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/KEYCLOAK-16550'}] | {'cwe_ids': ['CWE-668', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T19:38:17Z', 'nvd_published_at': '2021-01-28T20:15:00Z'} |
1.4.0 | GHSA-5hr6-vc97-qxxh | 2021-04-13T17:51:27Z | 2022-02-09T23:08:01Z | null | ['CVE-2017-15685'] | XML Injection in Crafter CMS Crafter Studio 3.0.1 | Crafter CMS Crafter Studio 3.0.1 is affected by: XML External Entity (XXE). An unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15685'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.0/security/advisory.html'}, {'type': 'WEB', 'url': 'http://crafter.com'}] | {'cwe_ids': ['CWE-91'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T17:51:27Z', 'nvd_published_at': '2020-11-27T18:15:00Z'} |
1.4.0 | GHSA-h87q-g2wp-47pj | 2022-02-15T01:51:57Z | 2022-02-09T22:41:19Z | null | [] | Signatures are mistakenly recognized to be valid in jsrsasign | In the jsrsasign package through 10.1.13 for Node.js, some invalid RSA PKCS#1 v1.5 signatures are mistakenly recognized to be valid. NOTE: there is no known practical attack. | [] | [{'package': {'ecosystem': 'npm', 'name': 'jsrsasign'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30246'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/issues/478'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/releases/tag/10.1.13'}, {'type': 'WEB', 'url': 'https://github.com/kjur/jsrsasign/releases/tag/10.2.0'}, {'ty... | {'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:09:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6vc5-v7hw-h5h2 | 2021-05-10T22:34:11Z | 2022-02-10T22:26:10Z | null | ['CVE-2020-15721'] | Cross-site Scripting in RosarioSIS | RosarioSIS through 6.8-beta allows modules/Custom/NotifyParents.php XSS because of the href attributes for AddStudents.php and User.php. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15721'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/c4a694860b50c4aa5c67d6568f7d0613fef1a30d'}, {'type': 'WEB', 'u... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-10T22:34:11Z', 'nvd_published_at': '2020-07-14T15:15:00Z'} |
1.4.0 | GHSA-3756-hwhv-qw58 | 2022-03-04T21:38:43Z | 2022-02-25T00:01:08Z | null | ['CVE-2021-44566'] | Cross site scripting in francoisjacquet/rosariosis | A Cross Site Scripting vulnerability exists RosarioSIS before 4.3 via the SanitizeMarkDown function in ProgramFunctions/MarkDownHTML.fnc.php. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44566'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES_V3_4.md#changes-in-43'}, {'type': 'WEB', 'url': 'https://gitlab.com/fr... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T20:47:42Z', 'nvd_published_at': '2022-02-24T15:15:00Z'} |
1.4.0 | GHSA-c6rq-rjc2-86v2 | 2021-05-12T20:23:29Z | 2022-02-10T23:33:39Z | null | ['CVE-2017-18869'] | Time-of-check Time-of-use (TOCTOU) Race Condition in chownr | A TOCTOU issue in the chownr package before 1.1.0 for Node.js 10.10 could allow a local attacker to trick it into descending into unintended directories via symlink attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'chownr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-18869'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/chownr/issues/14'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/chownr/commit/36a93e3f0a220062c47b237cf6ab6d5f55cd79c9'}, {'type': 'WEB', 'url': 'https://github.com/isaacs/chownr/comm... | {'cwe_ids': ['CWE-367'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T20:23:29Z', 'nvd_published_at': '2020-06-15T15:15:00Z'} |
1.4.0 | GHSA-c582-c96p-r5cq | 2022-02-11T17:05:42Z | 2022-02-10T00:20:29Z | null | ['CVE-2022-21732'] | Memory exhaustion in Tensorflow | ### Impact
The [implementation of `ThreadPoolHandle`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/experimental/threadpool_dataset_op.cc#L79-L135) can be used to trigger a denial of service attack by allocating too much memory:
```python
import te... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c582-c96p-r5cq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21732'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e3749a6d5d1e8d11806d4a2e9cc3123d1a90b75e'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T19:13:50Z', 'nvd_published_at': '2022-02-03T12:15:00Z'} |
1.4.0 | GHSA-hfmf-q69j-6m5p | 2023-09-15T20:18:29Z | 2022-02-10T00:00:22Z | null | ['CVE-2021-45331'] | Reuse of one time passwords allowed in Gitea | An Authentication Bypass vulnerability exists in Gitea before 1.5.0, which could let a malicious user gain privileges. If captured, the TOTP code for the 2FA can be submitted correctly more than once. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45331'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/3878'}, {'type': 'WEB', 'url': 'https://blog.gitea.io/2018/08/gitea-1.5.0-is-released/'}] | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-08T00:01:19Z', 'nvd_published_at': '2022-02-09T18:15:00Z'} |
1.4.0 | GHSA-j4f2-536g-r55m | 2022-08-12T21:04:49Z | 2022-02-09T22:29:04Z | null | ['CVE-2020-36048'] | Resource exhaustion in engine.io | Engine.IO before 4.0.0 and 3.6.0 allows attackers to cause a denial of service (resource consumption) via a POST request to the long polling transport. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'engine.io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36048'}, {'type': 'WEB', 'url': 'https://github.com/socketio/engine.io/commit/734f9d1268840722c41219e69eb58318e0b2ac6b'}, {'type': 'WEB', 'url': 'https://blog.caller.xyz/socketio-engineio-dos/'}, {'type': 'WEB', 'url': 'https://github.com/bcaller/k... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T22:58:33Z', 'nvd_published_at': '2021-01-08T00:15:00Z'} |
1.4.0 | GHSA-8h8p-x289-vvqr | 2022-02-14T21:42:51Z | 2022-02-09T00:00:29Z | null | ['CVE-2021-45325'] | Gitea displaying raw OpenID error in UI | Gitea is a project to help users set up a self-hosted Git service. Server Side Request Forgery (SSRF) vulnerability exists in Gitea before 1.7.0 using the OpenID URL. Gitea can leak sensitive information about the local network through the error provided by the UI. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/go-gitea/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45325'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/issues/4973'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/5705'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/5712'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T19:58:31Z', 'nvd_published_at': '2022-02-08T15:15:00Z'} |
1.4.0 | GHSA-vg27-hr3v-3cqv | 2023-02-28T16:49:36Z | 2022-02-16T23:02:09Z | null | ['CVE-2022-0637'] | open redirect in pollbot | (From https://bugzilla.mozilla.org/show_bug.cgi?id=1753838)
Summary:
There was an open redirection vulnerability in the path of:
https://pollbot.services.mozilla.com/ and https://pollbot.stage.mozaws.net/
Description:
An attacker can redirect anyone to malicious sites.
Steps To Reproduce:
Type in this URL:
https:/... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pollbot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mozilla/PollBot/security/advisories/GHSA-vg27-hr3v-3cqv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0637'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/PollBot/pull/360'}, {'type': 'WEB', 'url': 'https://github.com/mozilla/PollBot/commit/e... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T23:02:09Z', 'nvd_published_at': '2023-02-16T22:15:00Z'} |
1.4.0 | GHSA-5545-2q6w-2gh6 | 2022-08-10T22:18:31Z | 2022-02-08T00:00:56Z | null | ['CVE-2021-41495'] | NumPy NULL Pointer Dereference | Null Pointer Dereference vulnerability exists in numpy.sort in NumPy < and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating sort arrays. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'numpy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.18.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41495'}, {'type': 'WEB', 'url': 'https://github.com/numpy/numpy/issues/19038'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5545-2q6w-2gh6'}, {'type': 'PACKAGE', 'url': 'https://github.com/numpy/numpy'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-21T20:10:22Z', 'nvd_published_at': '2021-12-17T20:15:00Z'} |
1.4.0 | GHSA-43q8-3fv7-pr5x | 2022-02-03T23:10:42Z | 2022-02-09T23:37:55Z | null | [] | Improper Validation of Integrity Check Value in TensorFlow | ### Impact
The implementation of [`tf.sparse.split`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_split_op.cc#L26-L102) does not fully validate the input arguments. Hence, a malicious user can trigger a denial of service via a segfault or a heap O... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-43q8-3fv7-pr5x'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pgcq-h79j-2f69'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/pull/53695'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-354'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T23:10:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gpch-h32j-gx6x | 2021-07-08T14:31:41Z | 2022-02-10T20:24:17Z | null | ['CVE-2020-5404'] | Insufficiently Protected Credentials in Reactor Netty | The HttpClient from Reactor Netty, versions 0.9.x prior to 0.9.5, and versions 0.8.x prior to 0.8.16, may be used incorrectly, leading to a credentials leak during a redirect to a different domain. In order for this to happen, the HttpClient must have been explicitly configured to follow redirects. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.projectreactor.netty:reactor-netty-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.9.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.projectreactor.netty:reactor-netty-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5404'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2020-5404'}] | {'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T20:23:58Z', 'nvd_published_at': '2020-03-03T18:15:00Z'} |
1.4.0 | GHSA-hjxc-462x-x77j | 2023-09-08T23:56:07Z | 2022-02-09T22:49:38Z | null | ['CVE-2019-15608'] | TOCTOU Race Condition in Yarn | The package integrity validation in yarn < 1.19.0 contains a TOCTOU vulnerability where the hash is computed before writing a package to cache. It's not computed again when reading from the cache. This may lead to a cache pollution attack. This issue is fixed in 1.19.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'yarn'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-15608'}, {'type': 'WEB', 'url': 'https://github.com/yarnpkg/yarn/commit/0474b8c66a8ea298f5e4dedc67b2de464297ad1c'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/703138'}, {'type': 'WEB', 'url': 'https://github.com/yarnpkg/yarn/blob/master/... | {'cwe_ids': ['CWE-367'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T22:21:40Z', 'nvd_published_at': '2020-03-15T18:15:00Z'} |
1.4.0 | GHSA-g5v4-5x39-vwhx | 2022-10-25T20:26:42Z | 2022-02-15T00:32:04Z | null | ['CVE-2021-21272'] | Zip slip directory exploit in github.com/deislabs/oras | ### Impact
The directory support (#55) allows the downloaded gzipped tarballs to be automatically extracted to the user-specified directory where the tarball can have symbolic links and hard links.
A well-crafted tarball or tarballs allow malicious artifact providers linking, writing, or overwriting specific files on ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/deislabs/oras'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/deislabs/oras/security/advisories/GHSA-g5v4-5x39-vwhx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21272'}, {'type': 'WEB', 'url': 'https://github.com/deislabs/oras/commit/96cd90423303f1bb42bd043cb4c36085e6e91e8e'}, {'type': 'PACKAGE', 'url': 'htt... | {'cwe_ids': ['CWE-22', 'CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T14:42:50Z', 'nvd_published_at': '2021-01-25T19:15:00Z'} |
1.4.0 | GHSA-jw3v-5ch2-wfmm | 2023-07-13T22:11:44Z | 2022-02-15T01:38:27Z | null | ['CVE-2020-25640'] | Wildfly logs plaintext passwords | A flaw was discovered in WildFly before 21.0.0.Final where, Resource adapter logs plain text JMS password at warning level on connection error, inserting sensitive information in the log file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly:wildfly-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.0.0.Final'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25640'}, {'type': 'WEB', 'url': 'https://github.com/amqphub/amqp-10-resource-adapter/issues/13'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1881637'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201... | {'cwe_ids': ['CWE-209', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T22:11:44Z', 'nvd_published_at': '2020-11-24T19:15:00Z'} |
1.4.0 | GHSA-2pj6-5hqc-w5x9 | 2022-12-01T22:06:24Z | 2022-02-16T00:01:12Z | null | ['CVE-2022-25212'] | CSRF vulnerability in Jenkins SWAMP Plugin allows capturing credentials | WAMP Plugin 1.2.6 and earlier does not perform a permission check in a method implementing form validation.\
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
Add... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.continuousassurance.swamp.jenkins:swamp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25212'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/swamp-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1988'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:06:24Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-44cg-qcpr-fwjh | 2022-03-04T21:38:29Z | 2022-02-25T00:01:07Z | null | ['CVE-2021-44565'] | Cross site scripting in francoisjacquet/rosariosis | A Cross Site Scripting (XSS) vulnerabilty exits in RosarioSIS before 7.6.1 via the xss_clean function in classes/Security.php, which allows remote malicious users to inject arbitrary JaveScript of HTML.An example of affected components are all Markdown input fields. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44565'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md#changes-in-761'}, {'type': 'WEB', 'url': 'https://gitlab.com/franco... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T20:47:39Z', 'nvd_published_at': '2022-02-24T15:15:00Z'} |
1.4.0 | GHSA-hrxv-694f-22g3 | 2022-03-02T21:57:30Z | 2022-02-19T00:01:28Z | null | ['CVE-2022-0672'] | Exposure of Sensitive Information to an Unauthorized Actor in LemMinX | A flaw was found in LemMinX in versions prior to 0.19.0. Insecure redirect could allow unauthorized access to sensitive information locally if LemMinX is run under a privileged user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.lemminx:lemminx-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.19.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0672'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/lemminx/pull/1174'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/lemminx/commit/076b88052c2a63f60a98ef4b45e3e38c217b70ae'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/lem... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T21:58:23Z', 'nvd_published_at': '2022-02-18T18:15:00Z'} |
1.4.0 | GHSA-rww7-2gpw-fv6j | 2022-02-11T20:48:05Z | 2022-02-09T23:28:29Z | null | ['CVE-2022-23572'] | Crash when type cannot be specialized in Tensorflow | ### Impact
Under certain scenarios, TensorFlow can fail to specialize a type during [shape inference](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/shape_inference.cc#L168-L174):
```cc
void InferenceContext::PreInputInit(
const OpDef& op_def, const... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rww7-2gpw-fv6j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23572'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/cb164786dc891ea11d3a900e90367c339305dc7b'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617', 'CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T18:58:49Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-36h2-95gj-w488 | 2022-02-14T23:00:49Z | 2022-02-09T00:00:28Z | null | ['CVE-2021-45328'] | Open redirect in Gitea | Gitea before 1.4.3 is affected by URL Redirection to Untrusted Site ('Open Redirect') via internal URLs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/go-gitea/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45328'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/issues/4332'}, {'type': 'WEB', 'url': 'https://blog.gitea.io/2018/06/release-of-1.4.3/'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-gitea/gitea'}] | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T23:00:49Z', 'nvd_published_at': '2022-02-08T16:15:00Z'} |
1.4.0 | GHSA-h2fg-54x9-5qhq | 2023-02-17T22:18:36Z | 2022-02-11T23:43:13Z | null | ['CVE-2020-26521'] | Nil dereference in NATS JWT, DoS of nats-server | ## Problem Description
The NATS account system has an Operator trusted by the servers, which signs Accounts, and each Account can then create and sign Users within their account. The Operator should be able to safely issue Accounts to other entities which it does not fully trust.
A malicious Account could create and... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/jwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.9'}]}... | [{'type': 'WEB', 'url': 'https://github.com/nats-io/jwt/security/advisories/GHSA-h2fg-54x9-5qhq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26521'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/jwt/pull/107'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/commit/9ff8... | {'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:32:02Z', 'nvd_published_at': '2020-11-06T08:15:00Z'} |
1.4.0 | GHSA-88xq-w8cq-xfg7 | 2022-02-16T22:35:03Z | 2022-02-16T22:35:03Z | null | ['CVE-2022-23636'] | Invalid drop of partially-initialized instances in the pooling instance allocator for modules with defined `externref` globals | ### Impact
There exists a bug in the pooling instance allocator in Wasmtime's runtime where a failure to instantiate an instance for a module that defines an `externref` global will result in an invalid drop of a `VMExternRef` via an uninitialized pointer.
As instance slots may be reused between consecutive instantia... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.34.0'}, {'fixed': '0.34.1'}]}], 'versions': ['0.34.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.33... | [{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-88xq-w8cq-xfg7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23636'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/commit/886ecc562040bef61faf19438c22285c2d62403a'}, {'type'... | {'cwe_ids': ['CWE-824'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:35:03Z', 'nvd_published_at': '2022-02-16T22:15:00Z'} |
1.4.0 | GHSA-j8jp-9x42-4pj5 | 2022-03-11T19:40:15Z | 2022-02-27T00:00:14Z | null | ['CVE-2022-26149'] | Unrestricted Upload of File with Dangerous Type in MODX Revolution | MODX Revolution through 2.8.3-pl allows remote authenticated administrators to execute arbitrary code by uploading an executable file, because the Uploadable File Types setting can be changed by an administrator. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'modx/revolution'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8.3-pl'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26149'}, {'type': 'PACKAGE', 'url': 'https://github.com/modxcms/revolution'}, {'type': 'WEB', 'url': 'https://github.com/sartlabs/0days/blob/main/Modx/Exploit.txt'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/171488/MODX-Revolutio... | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T19:40:15Z', 'nvd_published_at': '2022-02-26T21:15:00Z'} |
1.4.0 | GHSA-6pw2-5hjv-9pf7 | 2022-02-24T13:46:56Z | 2022-02-12T00:00:38Z | null | ['CVE-2021-23555'] | Sandbox bypass in vm2 | The package vm2 before 3.9.6 are vulnerable to Sandbox Bypass via direct access to host error objects generated by node internals during generation of a stacktraces, which can lead to execution of arbitrary code on the host machine. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'vm2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23555'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/commit/532120d5cdec7da8225fc6242e154ebabc63fe4d'}, {'type': 'PACKAGE', 'url': 'https://github.com/patriksimek/vm2'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-VM2-230990... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:46:08Z', 'nvd_published_at': '2022-02-11T20:15:00Z'} |
1.4.0 | GHSA-2m53-83f3-562j | 2022-01-27T23:11:40Z | 2022-02-01T00:44:35Z | null | [] | Prototype pollution in min-dash < 3.8.1 | ### Impact
The `set` method is vulnerable to prototype pollution with specially crafted inputs.
```javascript
// insert the following into poc.js and run node poc,js (after installing the package)
let parser = require("min-dash");
parser.set({}, [["__proto__"], "polluted"], "success");
console.log(polluted);
```
#... | [] | [{'package': {'ecosystem': 'npm', 'name': 'min-dash'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/bpmn-io/min-dash/security/advisories/GHSA-2m53-83f3-562j'}, {'type': 'PACKAGE', 'url': 'https://github.com/bpmn-io/min-dash'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-27T23:11:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-m6mm-q862-j366 | 2023-09-25T11:16:54Z | 2022-02-09T00:56:14Z | null | ['CVE-2020-1714'] | Improper Input Validation in Keycloak | A flaw was found in Keycloak before version 11.0.0, where the code base contains usages of ObjectInputStream without type checks. This flaw allows an attacker to inject arbitrarily serialized Java Objects, which would then get deserialized in a privileged context and potentially lead to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.0.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-common'}, 'ecosystem_specific': {'aff... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1714'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/pull/7053'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/33863ba16117844930a38ebde57a25258f5b80fd'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/sh... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T22:02:39Z', 'nvd_published_at': '2020-05-13T19:15:00Z'} |
1.4.0 | GHSA-fhpf-pp6p-55qc | 2022-02-09T18:28:16Z | 2022-02-01T00:43:38Z | null | ['CVE-2022-23607'] | Unsafe handling of user-specified cookies in treq | ### Impact
Treq's request methods (`treq.get`, `treq.post`, `HTTPClient.request`, `HTTPClient.get`, etc.) accept cookies as a dictionary, for example:
```py
treq.get('https://example.com/', cookies={'session': '1234'})
```
Such cookies are not bound to a single domain, and are therefore sent to *every* domain ("supe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'treq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/twisted/treq/security/advisories/GHSA-fhpf-pp6p-55qc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23607'}, {'type': 'WEB', 'url': 'https://github.com/twisted/treq/commit/1da6022cc880bbcff59321abe02bf8498b89efb2'}, {'type': 'PACKAGE', 'url': 'https... | {'cwe_ids': ['CWE-200', 'CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T22:05:38Z', 'nvd_published_at': '2022-02-01T11:15:00Z'} |
1.4.0 | GHSA-vfp4-xx6m-7vf6 | 2021-05-13T20:25:19Z | 2022-02-15T01:57:18Z | null | ['CVE-2020-7010'] | Cryptographic Issues in ECK | Elastic Cloud on Kubernetes (ECK) versions prior to 1.1.0 generate passwords using a weak random number generator. If an attacker is able to determine when the current Elastic Stack cluster was deployed they may be able to more easily brute force the Elasticsearch credentials generated by ECK. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/elastic/cloud-on-k8s'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7010'}, {'type': 'WEB', 'url': 'https://www.elastic.co/community/security/'}] | {'cwe_ids': ['CWE-335'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T20:25:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3wwj-wh2w-g4xp | 2022-02-23T15:04:54Z | 2022-02-19T00:01:35Z | null | ['CVE-2022-0666'] | CRLF Injection in microweber | CRLF Injection leads to Stack Trace Exposure due to lack of filtering at https://demo.microweber.org/ in Packagist microweber/microweber prior to 1.2.11. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0666'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/f0e338f1b7dc5ec9d99231f4ed3fa6245a5eb128'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7... | {'cwe_ids': ['CWE-93'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T15:04:54Z', 'nvd_published_at': '2022-02-18T15:15:00Z'} |
1.4.0 | GHSA-6m26-25q2-cq46 | 2022-03-09T20:36:46Z | 2022-02-27T00:00:15Z | null | ['CVE-2022-0763'] | Cross-site Scripting in microweber | Microweber Cross-site Scripting (XSS) - Stored XSS vulnerability on admin page up to version 1.3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0763'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/c897d0dc159849763a813184d9b75b966c6360bf'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:57:12Z', 'nvd_published_at': '2022-02-26T10:15:00Z'} |
1.4.0 | GHSA-6566-9526-52v6 | 2022-02-10T20:48:47Z | 2022-02-10T20:48:47Z | null | ['CVE-2020-10591'] | Exposure of Sensitive Information to an Unauthorized Actor in Concord | An issue was discovered in Walmart Labs Concord before 1.44.0. CORS Access-Control-Allow-Origin headers have a potentially unsafe dependency on Origin headers, and are not configurable. This allows remote attackers to discover host information, nodes, API metadata, and references to usernames via api/v1/apikey. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.walmartlabs.concord.docker:concord-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.44.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10591'}, {'type': 'WEB', 'url': 'https://github.com/walmartlabs/concord/issues/22'}, {'type': 'WEB', 'url': 'https://github.com/walmartlabs/concord/compare/1.43.0...1.44.0'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T20:59:37Z', 'nvd_published_at': '2020-03-15T21:15:00Z'} |
1.4.0 | GHSA-fx5c-h9f6-rv7c | 2022-02-11T20:01:09Z | 2022-02-09T23:28:07Z | null | ['CVE-2022-23588'] | `CHECK`-fails due to attempting to build a reference tensor | ### Impact
A malicious user can cause a denial of service by altering a `SavedModel` such that [Grappler optimizer would attempt to build a tensor using a reference `dtype`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/constant_folding.cc#L13... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fx5c-h9f6-rv7c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23588'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/6b5adc0877de832b2a7c189532dbbbc64622eeb6'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T18:59:59Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-23hm-7w47-xw72 | 2022-02-09T18:28:54Z | 2022-02-09T18:28:54Z | null | ['CVE-2022-21726'] | Out of bounds read in Tensorflow | ### Impact
The [implementation of `Dequantize`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/dequantize_op.cc#L92-L153) does not fully validate the value of `axis` and can result in heap OOB accesses:
```python
import tensorflow as tf
@tf.function
def... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-23hm-7w47-xw72'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21726'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/23968a8bf65b009120c43b5ebcceaf52dbc9e943'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T18:08:22Z', 'nvd_published_at': '2022-02-03T11:15:00Z'} |
1.4.0 | GHSA-qrrc-ww9x-r43g | 2023-03-02T20:00:40Z | 2022-02-15T01:57:18Z | null | ['CVE-2020-13401'] | Improper Input Validation in Docker Engine | An issue was discovered in Docker Engine before 19.03.11. An attacker in a container, with the CAP_NET_RAW capability, can craft IPv6 router advertisements, and consequently spoof external IPv6 hosts, obtain sensitive information, or cause a denial of service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker-ce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.03.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13401'}, {'type': 'WEB', 'url': 'https://docs.docker.com/engine/release-notes/'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker-ce/releases/tag/v19.03.11'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-an... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-14T16:27:26Z', 'nvd_published_at': '2020-06-02T14:15:00Z'} |
1.4.0 | GHSA-qmmc-jppf-32wv | 2021-05-20T21:02:14Z | 2022-02-15T00:41:14Z | null | ['CVE-2014-9358'] | Directory Traversal in Docker | Docker before 1.3.3 does not properly validate image IDs, which allows remote attackers to conduct path traversal attacks and spoof repositories via a crafted image in a (1) "docker load" operation or (2) "registry communications." | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-9358'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2014-9358'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!msg/docker-user/nFAz-B-n4Bw/0wr3wvLsnUwJ'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#%... | {'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:02:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6978-vg2j-cc9q | 2021-10-20T17:38:18Z | 2022-02-15T01:57:18Z | null | ['CVE-2020-2023'] | Improper Privilege Management and Execution with Unnecessary Privileges in Kata Containers | Kata Containers doesn't restrict containers from accessing the guest's root filesystem device. Malicious containers can exploit this to gain code execution on the guest and masquerade as the kata-agent. This issue affects Kata Containers 1.11 versions earlier than 1.11.1; Kata Containers 1.10 versions earlier than 1.10... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kata-containers/agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kata-containers/agent'}, 'range... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-2023'}, {'type': 'WEB', 'url': 'https://github.com/kata-containers/agent/issues/791'}, {'type': 'WEB', 'url': 'https://github.com/kata-containers/runtime/issues/2488'}, {'type': 'WEB', 'url': 'https://github.com/kata-containers/agent/pull/792'}, {'... | {'cwe_ids': ['CWE-250', 'CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T19:41:22Z', 'nvd_published_at': '2020-06-10T18:15:00Z'} |
1.4.0 | GHSA-6gmv-pjp9-p8w8 | 2022-02-09T18:29:24Z | 2022-02-09T18:29:24Z | null | ['CVE-2022-21728'] | Out of bounds read in Tensorflow | ### Impact
The [implementation of shape inference for `ReverseSequence`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/ops/array_ops.cc#L1636-L1671) does not fully validate the value of `batch_dim` and can result in a heap OOB read:
```python
import tensorflow ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-6gmv-pjp9-p8w8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21728'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/37c01fb5e25c3d80213060460196406c43d31995'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T18:29:10Z', 'nvd_published_at': '2022-02-03T11:15:00Z'} |
1.4.0 | GHSA-g44j-7vp3-68cv | 2021-05-19T22:08:41Z | 2022-02-15T01:57:18Z | null | ['CVE-2015-3629'] | Arbitrary File Write in Libcontainer | Libcontainer 1.6.0, as used in Docker Engine, allows local users to escape containerization ("mount namespace breakout") and write to arbitrary file on the host system via a symlink attack in an image when respawning a container. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3629'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker/commit/d5ebb60bddbabea0439213501f4f6ed494b23cba'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ'}, {'type'... | {'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:08:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g9mp-8g3h-3c5c | 2023-08-29T20:07:14Z | 2022-02-15T01:57:18Z | null | [] | flynn/noise has improper nonce handling yielding potential state DoS | The Go package `github.com/flynn/noise`, a [Noise Protocol](https://noiseprotocol.org/) implementation, has two bugs in nonce handling in versions prior to v1.0.0.
### Issue 1: Potential nonce overflow
If 2<sup>64</sup> (~18.4 quintillion) or more messages are encrypted with `Encrypt` after handshaking, the nonce cou... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/flynn/noise'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/flynn/noise/security/advisories/GHSA-g9mp-8g3h-3c5c'}, {'type': 'WEB', 'url': 'https://github.com/flynn/noise/pull/44'}, {'type': 'PACKAGE', 'url': 'https://github.com/flynn/noise'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0425'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T21:46:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ppfm-rj6p-38q6 | 2022-02-24T12:14:14Z | 2022-02-16T00:01:53Z | null | ['CVE-2022-0587'] | Improper Authorization in librenms | Improper Authorization in Packagist librenms/librenms prior to 22.2.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0587'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0c7c9ecd-... | {'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:51:55Z', 'nvd_published_at': '2022-02-15T08:15:00Z'} |
1.4.0 | GHSA-w3wf-cfx3-6gcx | 2022-02-11T23:59:14Z | 2022-02-11T23:59:14Z | null | ['CVE-2020-26276'] | SAML authentication vulnerability due to stdlib XML parsing | ### Impact
Due to issues in Go's standard library XML parsing, a valid SAML response may be mutated by an attacker to modify the trusted document. This can result in allowing unverified logins from a SAML IdP.
Users that configure Fleet with SSO login may be vulnerable to this issue.
### Patches
This issue is patched... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/fleetdm/fleet/v4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/fleetdm/fleet/security/advisories/GHSA-w3wf-cfx3-6gcx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26276'}, {'type': 'WEB', 'url': 'https://github.com/fleetdm/fleet/commit/57812a532e5f749c8e18c6f6a652eca65c083607'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-290'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T20:46:21Z', 'nvd_published_at': '2020-12-17T20:15:00Z'} |
1.4.0 | GHSA-7p79-6x2v-5h88 | 2022-02-25T14:54:31Z | 2022-02-16T22:57:57Z | null | [] | Server crash if running Python 3.10 w/ Sanic 20.12 | **!!! ONLY APPLIES TO VERSIONS PRIOR TO Sanic v20.12 WHEN USING Python 3.10 !!!**
Sanic v20.12 officially supports Python versions 3.6, 3.7, 3.8, and 3.9. However, if you accidentally run it with version 3.10 (**which is not supported by Sanic 20.12**), your server is prone to crashing on an incoming web request.
###... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'sanic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.7'}, {'fixed': '20.12.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sanic-org/sanic/security/advisories/GHSA-7p79-6x2v-5h88'}, {'type': 'PACKAGE', 'url': 'https://github.com/sanic-org/sanic'}, {'type': 'WEB', 'url': 'https://github.com/sanic-org/sanic/releases/tag/v20.12.6'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:57:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j586-cj67-vg4p | 2022-02-23T19:23:39Z | 2022-02-12T00:00:47Z | null | ['CVE-2020-13674'] | Cross-Site Request Forgery in Drupal core | The QuickEdit module does not properly validate access to routes, which could allow cross-site request forgery under some circumstances and lead to possible data integrity issues. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed. Removing the "access in-place editing"... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.9.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.1.0'}, {'fixed': '9.1.13'}]}]}, {'pac... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13674'}, {'type': 'WEB', 'url': 'https://github.com/drupal/core/commit/20cd85db8198c63101bd050ea973b13f2f3edef6'}, {'type': 'WEB', 'url': 'https://github.com/drupal/core/commit/6359b3ea5aacf85399285c522c6d787a218c897c'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T19:23:39Z', 'nvd_published_at': '2022-02-11T16:15:00Z'} |
1.4.0 | GHSA-3v7g-4pg3-7r6j | 2022-03-07T13:39:11Z | 2022-02-26T00:00:44Z | null | ['CVE-2022-24288'] | OS Command injection in Apache Airflow | In Apache Airflow, prior to version 2.2.4, some example DAGs did not properly sanitize user-provided params, making them susceptible to OS Command Injection from the web UI. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24288'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/dbw5ozcmr0h0lhs0yjph7xdc64oht23t'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:33:11Z', 'nvd_published_at': '2022-02-25T09:15:00Z'} |
1.4.0 | GHSA-8jj7-5vxc-pg2q | 2022-02-11T20:31:17Z | 2022-02-09T23:27:49Z | null | ['CVE-2022-23587'] | Integer overflow in TensorFlow | ### Impact
Under certain scenarios, Grappler component of TensorFlow is vulnerable to an integer overflow during [cost estimation for crop and resize](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L2621-L2689). Since the ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8jj7-5vxc-pg2q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23587'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/0aaaae6eca5a7175a193696383f582f53adab23f'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T19:01:18Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-j3ch-vjph-8q6v | 2022-03-01T22:31:11Z | 2022-02-21T00:00:19Z | null | ['CVE-2022-23848'] | Command injection in Alluxio | In Alluxio before 2.7.3, the logserver does not validate the input stream. NOTE: this is not the same as the CVE-2021-44228 Log4j vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.alluxio:alluxio-core-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23848'}, {'type': 'WEB', 'url': 'https://www.alluxio.io/download/releases/alluxio-2-7-3-release/'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:11:15Z', 'nvd_published_at': '2022-02-20T19:15:00Z'} |
1.4.0 | GHSA-5875-p652-2ppm | 2023-08-03T17:34:37Z | 2022-02-27T00:00:16Z | null | ['CVE-2022-0762'] | Exposure of Resource to Wrong Sphere in microweber | Exposure of Resource to Wrong Sphere in microweber prior to 1.3 allows users to add deleted products to a cart and buy it. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0762'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/76361264d9fdfff38a1af79c63141455cc4d36e3'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1... | {'cwe_ids': ['CWE-668', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:09:05Z', 'nvd_published_at': '2022-02-26T10:15:00Z'} |
1.4.0 | GHSA-4m7p-55jm-3vwv | 2023-05-25T13:20:35Z | 2022-02-16T00:01:37Z | null | ['CVE-2022-25173'] | Improper Neutralization of Special Elements used in an OS Command in Jenkins Pipeline: Groovy Plugin | Jenkins Pipeline: Groovy Plugin prior to 2656.vf7a_e7b_75a_457, 2.94.1, and 2.92.1 uses the same checkout directories for distinct SCMs when reading the script file (typically Jenkinsfile) for Pipelines, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2646.v6ed3b5b01ff1'}, {'fixed': '2656.vf7a'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps'}, 'ranges': [{'type': 'ECOS... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25173'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/3615f493b8a36ff15735fb9d79c9dc9e0d542695/2022/25xxx/CVE-2022-25173.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2463'}, {'t... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:48:23Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-53hp-jpwq-2jgq | 2022-02-09T23:01:22Z | 2022-02-09T23:01:22Z | null | ['CVE-2020-11996'] | Uncontrolled Resource Consumption in Apache Tomcat | A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.0-M5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.0-M4'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11996'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r2529016c311ce9485e6f173446d469600fdfbb94dccadfcd9dfdac79@%3Cusers.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r3ea96d8f36dd404acce83df8a... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T19:42:18Z', 'nvd_published_at': '2020-06-26T17:15:00Z'} |
1.4.0 | GHSA-5m8f-v3gw-h94w | 2022-07-27T21:24:40Z | 2022-02-16T00:01:28Z | null | ['CVE-2022-25187'] | Support Core Plugin before 2.79.1 stores sensitive data in plain text | Jenkins Support Core Plugin 2.79 and earlier does not redact some sensitive information in the support bundle. Support Core Plugin 2.79.1 adds a list of keywords whose associated values are redacted. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:support-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.79.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25187'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/support-core-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2186'}] | {'cwe_ids': ['CWE-212', 'CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T21:24:40Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-f8vc-wfc8-hxqh | 2021-10-18T14:37:38Z | 2022-02-09T22:17:38Z | null | ['CVE-2020-9492'] | Improper Privilege Management in Apache Hadoop | In Apache Hadoop 3.2.0 to 3.2.1, 3.0.0-alpha1 to 3.1.3, and 2.0.0-alpha to 2.10.0, WebHDFS client might send SPNEGO authorization header to remote URL without proper verification. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2.0'}, {'fixed': '3.2.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9492'}, {'type': 'WEB', 'url': 'https://github.com/apache/hadoop/commit/ca65409836d2949e9a9408d40bec0177b414cd5d'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hadoop'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r0a534f... | {'cwe_ids': ['CWE-269', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T18:29:12Z', 'nvd_published_at': '2021-01-26T18:16:00Z'} |
1.4.0 | GHSA-9r5x-fjv3-q6h4 | 2022-07-13T18:57:29Z | 2022-02-15T01:57:18Z | null | ['CVE-2021-3127'] | Incorrect Access Control in github.com/nats-io/jwt and github.com/nats-io/nats-server/v2 | NATS Server 2.x before 2.2.0 and JWT library before 2.0.1 have Incorrect Access Control because Import Token bindings are mishandled. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/jwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server/v2/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3127'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/jwt/pull/149/commits/a826c77dc9d2671c961b75ceefdb439c41029866'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/commit/423b79440c80c863de9f4e20548504e6c5d5e403'}, {'type': '... | {'cwe_ids': ['CWE-284', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T20:34:10Z', 'nvd_published_at': '2021-03-16T20:15:00Z'} |
1.4.0 | GHSA-pr38-qpxm-g88x | 2023-09-25T10:37:03Z | 2022-02-06T00:00:55Z | null | ['CVE-2022-23913'] | Apache ActiveMQ Artemis Uncontrolled Resource Consumption (DoS) | In Apache ActiveMQ Artemis prior to 2.20.0 or 2.19.1, an attacker could partially disrupt availability (DoS) through uncontrolled resource consumption of memory. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:artemis-core-client'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.19.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23913'}, {'type': 'WEB', 'url': 'https://github.com/github/codeql-java-CVE-coverage/issues/1061'}, {'type': 'WEB', 'url': 'https://github.com/apache/activemq-artemis/pull/3862'}, {'type': 'WEB', 'url': 'https://github.com/apache/activemq-artemis/pu... | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-08T17:52:10Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-x4rg-4545-4w7w | 2021-11-03T14:59:45Z | 2022-02-15T01:57:18Z | null | ['CVE-2019-3564'] | Improper Input Validation and Excessive Iteration in Go Facebook Thrift | Go Facebook Thrift servers would not error upon receiving messages with containers of fields of unknown type. As a result, malicious clients could send short messages which would take a long time for the server to parse, potentially leading to denial of service. This issue affects Facebook Thrift prior to v2019.03.04.0... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/facebook/fbthrift'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.31.1-0.20190225164308-c461c1bd1a3e'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3564'}, {'type': 'WEB', 'url': 'https://github.com/facebook/fbthrift/commit/c461c1bd1a3e130b181aa9c854da3030cd4b5156'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/fbthrift'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html... | {'cwe_ids': ['CWE-20', 'CWE-755', 'CWE-834'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T15:32:10Z', 'nvd_published_at': '2019-05-06T16:29:00Z'} |
1.4.0 | GHSA-hhh6-cm2m-3fhc | 2022-02-07T20:59:04Z | 2022-02-02T00:01:45Z | null | ['CVE-2022-24196'] | Allocation of Resources Without Limits or Throttling in iText | iText v7.1.17 was discovered to contain an out-of-memory error via the component readStreamBytesRaw, which allows attackers to cause a Denial of Service (DoS) via a crafted PDF file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.itextpdf:itext7-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.18'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.1.17'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24196'}, {'type': 'WEB', 'url': 'https://github.com/itext/itext7/pull/78'}, {'type': 'WEB', 'url': 'https://github.com/itext/itext7/pull/78#issuecomment-1089279222'}, {'type': 'PACKAGE', 'url': 'https://github.com/itext/itext7'}, {'type': 'WEB', 'u... | {'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T20:59:04Z', 'nvd_published_at': '2022-02-01T20:15:00Z'} |
1.4.0 | GHSA-32m2-9f76-4gv8 | 2022-02-11T20:51:39Z | 2022-02-06T00:01:01Z | null | ['CVE-2022-0227'] | Business Logic Errors in SilverStripe Framework | SilverStripe Framework prior to version 4.10.1 is vulnerable to business logic errors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0227'}, {'type': 'WEB', 'url': 'https://github.com/silverstripe/silverstripe-framework/commit/cbf2987a616e9ef4d7eccae5d763ef2179bdbcc2'}, {'type': 'PACKAGE', 'url': 'https://github.com/silverstripe/silverstripe-framework'}, {'type': 'WEB', 'url': '... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T22:25:00Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-3mw4-6rj6-74g5 | 2022-02-11T16:22:36Z | 2022-02-09T23:46:46Z | null | ['CVE-2022-21739'] | Null pointer dereference in TensorFlow | ### Impact
The [implementation of `QuantizedMaxPool`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/quantized_pooling_ops.cc#L114-L130) has an undefined behavior where user controlled inputs can trigger a reference binding to null pointer.
```python
imp... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-3mw4-6rj6-74g5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21739'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/53b0dd6dc5957652f35964af16b892ec9af4a559'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:07:52Z', 'nvd_published_at': '2022-02-03T14:15:00Z'} |
1.4.0 | GHSA-x5m6-jh4r-34mv | 2023-07-05T20:53:41Z | 2022-02-15T01:07:53Z | null | ['CVE-2014-0177'] | Hub Package Arbitrary File Overwrite | The `am` function in `lib/hub/commands.rb` in hub before 1.12.1 allows local users to overwrite arbitrary files via a symlink attack on a temporary patch file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/github/hub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.1'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'hub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0177'}, {'type': 'WEB', 'url': 'https://github.com/github/hub/commit/016ec99d25b1cb83cb4367e541177aa431beb600'}, {'type': 'WEB', 'url': 'https://github.com/mislav/hub/commit/016ec99d25b1cb83cb4367e541177aa431beb600'}, {'type': 'PACKAGE', 'url': 'ht... | {'cwe_ids': ['CWE-377'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:32:04Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6473-gqrj-4p65 | 2023-05-30T19:32:09Z | 2022-02-16T00:01:34Z | null | ['CVE-2022-25176'] | Improper Link Resolution Before File Access in Jenkins Pipeline: Groovy Plugin | Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier follows symbolic links to locations outside of the checkout directory for the configured SCM when reading the script file (typically Jenkinsfile) for Pipelines, allowing attackers able to configure Pipelines to read arbitrary files on the Jenkins controller... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.93'}, {'fixed': '2.94.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25176'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/workflow-cps-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613'}] | {'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:46:35Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-gjqc-q9g6-q2j3 | 2022-02-11T20:37:11Z | 2022-02-10T00:34:13Z | null | ['CVE-2022-23583'] | `CHECK`-failures in binary ops in Tensorflow | ### Impact
A malicious user can cause a denial of service by altering a `SavedModel` such that [any binary op](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/kernels/cwise_ops_common.h#L88-L137) would trigger `CHECK` failures. This occurs when the protobuf part co... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gjqc-q9g6-q2j3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23583'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a7c02f1a9bbc35473969618a09ee5f9f5d3e52d9'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T19:45:57Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-v4h8-794j-g8mm | 2021-05-19T22:04:37Z | 2022-02-15T01:57:18Z | null | ['CVE-2015-3631'] | Arbitrary File Override in Docker Engine | Docker Engine before 1.6.1 allows local users to set arbitrary Linux Security Modules (LSM) and docker_t policies via an image that allows volumes to override files in /proc. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/moby/moby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3631'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/compare/769acfec2928c47a35da5357d854145b1036448d...b6a9dc399be31c531e3753104e10d74760ed75a2'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-... | {'cwe_ids': ['CWE-285'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:04:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7g7g-82fp-hpxx | 2022-12-01T22:32:34Z | 2022-02-16T00:01:22Z | null | ['CVE-2022-25198'] | CSRF vulnerability in Jenkins SCP publisher Plugin | SCP publisher Plugin 1.8 and earlier does not perform a permission check in a method implementing form validation.
This allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified username and password.
Additionally, this form validation method does not requir... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:scp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25198'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/scp-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2323'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:32:34Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-m6j2-v3gq-45r5 | 2022-04-04T20:06:43Z | 2022-02-10T23:42:39Z | null | ['CVE-2019-10062'] | Cross-site Scripting in aurelia-framework | The HTMLSanitizer class in html-sanitizer.ts in all released versions of the Aurelia framework 1.x repository is vulnerable to XSS. The sanitizer only attempts to filter SCRIPT elements, which makes it feasible for remote attackers to conduct XSS attacks via (for example) JavaScript code in an attribute of various othe... | [] | [{'package': {'ecosystem': 'npm', 'name': 'aurelia-framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10062'}, {'type': 'WEB', 'url': 'https://github.com/aurelia/framework/issues/992'}, {'type': 'WEB', 'url': 'https://discourse.aurelia.io/t/xss-vulnerability-in-htmlsanitizer-might-be-insufficiently-handled/4219'}, {'type': 'PACKAGE', 'url': 'https:... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T20:26:22Z', 'nvd_published_at': '2021-05-13T21:15:00Z'} |
1.4.0 | GHSA-4mpj-488r-vh6m | 2022-07-22T16:35:11Z | 2022-02-01T22:01:14Z | null | ['CVE-2021-42767'] | Neo4j Graph Database vulnerable to Path Traversal | ### Impact
Directory Traversal Vulnerabilities found in several functions of apoc plugins in Neo4j Graph database. The attacker can retrieve and download files from outside the configured directory on the affected server. Under some circumstances, the attacker can also create files.
### Patches
The users should aim to... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.17'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.2.0'}, {'fixed': '4.2.1... | [{'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/security/advisories/GHSA-4mpj-488r-vh6m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42767'}, {'type': 'WEB', 'url': 'https://neo4j.com'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-01T15:58:43Z', 'nvd_published_at': '2022-03-01T02:15:00Z'} |
1.4.0 | GHSA-x7jh-595q-wq82 | 2021-08-31T21:09:38Z | 2022-02-09T21:59:46Z | null | ['CVE-2020-1736'] | Incorrect Permission Assignment for Critical Resource in Ansible | A flaw was found in Ansible Engine when a file is moved using atomic_move primitive as the file mode cannot be specified. This sets the destination files world-readable if the destination file does not exist and if the file exists, the file could be changed to have less restrictive permissions before the move. This cou... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'last_affected': '2.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1736'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67794'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1736'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-732'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T15:53:26Z', 'nvd_published_at': '2020-03-16T16:15:00Z'} |
1.4.0 | GHSA-82rr-mq4r-p4r3 | 2022-03-04T21:39:00Z | 2022-02-25T00:01:08Z | null | ['CVE-2021-44567'] | SQL injection in francoisjacquet/rosariosis | An SQL Injection vulnerability exits in RosarioSIS before 7.6.1 via the votes parameter in ProgramFunctions/PortalPollsNotes.fnc.php. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44567'}, {'type': 'PACKAGE', 'url': 'https://gitlab.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/-/blob/mobile/CHANGES.md#changes-in-761'}, {'type': 'WEB', 'url': 'https://gitlab.com/franco... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T20:47:10Z', 'nvd_published_at': '2022-02-24T15:15:00Z'} |
1.4.0 | GHSA-8c9h-4q7g-fp7h | 2023-03-07T23:46:45Z | 2022-02-02T00:01:45Z | null | ['CVE-2022-24198'] | Out-of-bounds Read in iText | iText v7.1.17 was discovered to contain an out-of-bounds exception via the component ARCFOUREncryption.encryptARCFOUR, which allows attackers to cause a Denial of Service (DoS) via a crafted PDF file. NOTE: Vendor does not view this as a vulnerability and has not found it to be exploitable. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.itextpdf:itext7-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.2.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.1.17'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24198'}, {'type': 'WEB', 'url': 'https://github.com/itext/itext7/pull/78'}, {'type': 'WEB', 'url': 'https://github.com/itext/itext7/pull/78#issuecomment-1089287808'}, {'type': 'PACKAGE', 'url': 'https://github.com/itext/itext7'}] | {'cwe_ids': ['CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T20:59:10Z', 'nvd_published_at': '2022-02-01T20:15:00Z'} |
1.4.0 | GHSA-f2vv-v9cg-qhh7 | 2022-02-11T16:23:03Z | 2022-02-09T23:43:48Z | null | ['CVE-2022-21737'] | Assertion failure based denial of service in Tensorflow | ### Impact
The [implementation of `*Bincount` operations](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/bincount_op.cc) allows malicious users to cause denial of service by passing in arguments which would trigger a `CHECK`-fail:
```python
import tensor... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f2vv-v9cg-qhh7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21737'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/7019ce4f68925fd01cdafde26f8d8c938f47e6f9'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617', 'CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T19:59:49Z', 'nvd_published_at': '2022-02-03T14:15:00Z'} |
1.4.0 | GHSA-rpvr-mw7r-25xx | 2023-09-25T15:44:07Z | 2022-02-19T00:01:24Z | null | ['CVE-2021-46062'] | MCMS Arbitrary File Deletion vulnerability | `net.mingsoft:ms-basic` is used for plugin management for applications built with Maven for the [Mingfei Content Management System (MCMS)](https://gitee.com/mingSoft/MCMS). ms-basic before 2.1.16 is vulnerable to arbitrary file deletion using POST requests to `/template/writeFileContent` via the `oldFileName` parameter... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-basic'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ecosystem_specific': {'affected_functio... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46062'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/59'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T20:58:14Z', 'nvd_published_at': '2022-02-18T20:15:00Z'} |
1.4.0 | GHSA-86f3-hf24-76q4 | 2022-02-22T19:40:23Z | 2022-02-22T19:40:23Z | null | ['CVE-2022-23650'] | Use of Hard-coded Cryptographic Key in Netmaker | ### Impact
There is a hard-coded cryptographic key in the code base which can be exploited to run admin commands on a remote server, if you know the address and username of the admin. This effects the server (netmaker) component, and not clients.
### Patches
This has been patched in Netmaker v0.8.5, v0.9.4, and v0.10.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.9.4'... | [{'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/security/advisories/GHSA-86f3-hf24-76q4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23650'}, {'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/pull/781/commits/1bec97c662670dfdab804343fc42ae4b1d050a87'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-321', 'CWE-798'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T19:40:23Z', 'nvd_published_at': '2022-02-18T22:15:00Z'} |
1.4.0 | GHSA-pg38-r834-g45j | 2022-09-08T00:01:33Z | 2022-02-10T00:00:20Z | null | ['CVE-2021-45330'] | Improper Privilege Management in Gitea | An issue exsits in Gitea through 1.15.7, which could let a malicious user gain privileges due to client side cookies not being deleted and the session remains valid on the server side for reuse. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45330'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/issues/4336'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/4840'}] | {'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-08T00:01:33Z', 'nvd_published_at': '2022-02-09T18:15:00Z'} |
1.4.0 | GHSA-mp28-rq7g-qx62 | 2021-04-08T20:55:45Z | 2022-02-09T22:44:38Z | null | ['CVE-2020-13931'] | Remote code execution in Apache TomEE | If Apache TomEE 8.0.0-M1 - 8.0.3, 7.1.0 - 7.1.3, 7.0.0-M1 - 7.0.8, 1.0.0 - 1.7.5 is configured to use the embedded ActiveMQ broker, and the broker config is misconfigured, a JMX port is opened on TCP port 1099, which does not include authentication. CVE-2020-11969 previously addressed the creation of the JMX management... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomee:apache-tomee'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.0.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomee:apache-tomee'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'f... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13931'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r7f98907165b355dc65f28a57f15103a06173ce03261115fa46d569b4@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r85b87478f8aa4751aa3a06e88622... | {'cwe_ids': ['CWE-306'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T20:55:45Z', 'nvd_published_at': '2020-12-18T00:15:00Z'} |
1.4.0 | GHSA-9chx-2vqw-8vq5 | 2022-02-08T16:08:49Z | 2022-02-01T00:01:00Z | null | ['CVE-2022-23409'] | Path Traversal in the Logs plugin for Craft CMS | The Logs plugin before 3.0.4 for Craft CMS allows remote attackers to read arbitrary files via input to actionStream in Controller.php. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'ether/logs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23409'}, {'type': 'WEB', 'url': 'https://github.com/ethercreative/logs/commit/eb225cc78b1123a10ce2784790f232d71c2066c4'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethercreative/logs'}, {'type': 'WEB', 'url': 'https://plugins.craftcms.com/logs... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-08T16:08:49Z', 'nvd_published_at': '2022-01-31T08:15:00Z'} |
1.4.0 | GHSA-92x2-jw7w-xvvx | 2022-02-07T22:36:00Z | 2022-02-07T22:36:00Z | null | ['CVE-2022-21712'] | Cookie and header exposure in twisted | ### Impact
Cookie and Authorization headers are leaked when following cross-origin redirects in `twited.web.client.RedirectAgent` and `twisted.web.client.BrowserLikeRedirectAgent`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'twisted'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.1'}, {'fixed': '22.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/twisted/twisted/security/advisories/GHSA-92x2-jw7w-xvvx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21712'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/af8fe78542a6f2bf2235ccee8158d9c88d31e8e2'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-200', 'CWE-346'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T22:36:00Z', 'nvd_published_at': '2022-02-07T22:15:00Z'} |
1.4.0 | GHSA-xxq4-3742-3h28 | 2022-02-09T22:23:35Z | 2022-02-09T00:00:31Z | null | ['CVE-2022-0504'] | Generation of Error Message Containing Sensitive Information in microweber | microweber version 1.2.10 and prior may generate an error message containing sensitive information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0504'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/e607e5f745cd99d5c06a7fce16b3577fab8e1250'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2... | {'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T22:22:09Z', 'nvd_published_at': '2022-02-08T09:15:00Z'} |
1.4.0 | GHSA-gggp-gh2p-996x | 2022-03-02T21:56:44Z | 2022-02-19T00:01:27Z | null | ['CVE-2022-0673'] | Path Traversal in LemMinX | A flaw was found in LemMinX in versions prior to 0.19.0. Cache poisoning of external schema files is possible due to directory traversal. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.lemminx:lemminx-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.19.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0673'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/lemminx/pull/1171'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/lemminx'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/lemminx/blob/master/CHANGELOG.md#0190-february-14-2... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T21:56:46Z', 'nvd_published_at': '2022-02-18T18:15:00Z'} |
1.4.0 | GHSA-2jhm-qp48-hv5j | 2022-02-09T21:56:05Z | 2022-02-09T21:56:05Z | null | ['CVE-2022-23621'] | Missing authorization in xwiki-platform | ### Impact
Any user with SCRIPT right (EDIT right before XWiki 7.4) can read any file located in the XWiki WAR (for example xwiki.cfg and xwiki.properties) through XWiki#invokeServletAndReturnAsString:
```
$xwiki.invokeServletAndReturnAsString("/WEB-INF/xwiki.cfg")
```
### Patches
It has been patched in XWiki versi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.6-rc-1'}, {'fixed': '13.7-rc-1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 13.6'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.plat... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2jhm-qp48-hv5j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23621'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/df8bd49b5a4d87a427002c6535fb5b1746ff117a'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-552', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T21:56:05Z', 'nvd_published_at': '2022-02-09T22:15:00Z'} |
1.4.0 | GHSA-9p77-mmrw-69c7 | 2022-02-11T20:48:51Z | 2022-02-09T23:33:35Z | null | ['CVE-2022-23570'] | Null-dereference in Tensorflow | ### Impact
When decoding a tensor from protobuf, TensorFlow might do a null-dereference if attributes of some mutable arguments to some operations are missing from the proto. This is [guarded by a `DCHECK`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9p77-mmrw-69c7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23570'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8a513cec4bec15961fbfdedcaa5376522980455c'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T16:24:16Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-v6vg-pxvv-g5cq | 2022-02-24T17:08:24Z | 2022-02-15T00:02:45Z | null | ['CVE-2022-0579'] | Improper Privilege Management in Snipe-IT | Snipe-IT prior to 5.3.9 is vulnerable to improper privilege management. A user who does not have access to the supplier module may view supplier content. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0579'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/db0c0e790892db874573d95f8ae4268b8a011ab1'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/70a99cf4-3241-4... | {'cwe_ids': ['CWE-269', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T17:08:24Z', 'nvd_published_at': '2022-02-14T19:15:00Z'} |
1.4.0 | GHSA-xhqq-x44f-9fgg | 2021-05-21T21:11:37Z | 2022-02-11T23:58:09Z | null | ['CVE-2020-29509'] | Authentication Bypass in github.com/russellhaering/gosaml2 | ### Impact
Given a valid SAML Response, it may be possible for an attacker to mutate the XML document in such a way that gosaml2 will trust a different portion of the document than was signed.
Depending on the implementation of the Service Provider this enables a variety of attacks, including users accessing accounts ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/russellhaering/gosaml2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/security/advisories/GHSA-xhqq-x44f-9fgg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29509'}, {'type': 'WEB', 'url': 'https://github.com/russellhaering/gosaml2/commit/42606dafba60c58c458f14f75c4c230459672ab9'}, {'type': 'WEB... | {'cwe_ids': ['CWE-115'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:11:37Z', 'nvd_published_at': '2020-12-14T20:15:00Z'} |
1.4.0 | GHSA-vwxp-9qmf-w299 | 2022-02-03T19:18:02Z | 2022-02-01T00:49:48Z | null | ['CVE-2022-0394'] | Cross-site Scripting in LiveHelperChat | LiveHelperChat (remdex/livehelperchat in Packagist) has a stored Cross-site Scripting (XSS) vulnerability prior to version 3.93. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.93'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0394'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/d7b85466c217b3750eaccc8703ce54ba8785c4d3'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T21:19:09Z', 'nvd_published_at': '2022-01-28T11:15:00Z'} |
1.4.0 | GHSA-q9vw-wr57-xjv3 | 2023-02-03T00:34:34Z | 2022-02-15T01:57:18Z | null | ['CVE-2017-15104'] | Information Exposure in Heketi | An access flaw was found in Heketi 5, where the heketi.json configuration file was world readable. An attacker having local access to the Heketi server could read plain-text passwords from the heketi.json file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/heketi/heketi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15104'}, {'type': 'WEB', 'url': 'https://github.com/heketi/heketi/commit/787bae461b23003a4daa4d1d639016a754cf6b00'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2017:3481'}, {'type': 'WEB', 'url': 'https://access.redhat.com/securi... | {'cwe_ids': ['CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:48:28Z', 'nvd_published_at': '2017-12-18T19:29:00Z'} |
1.4.0 | GHSA-2587-w93g-63m2 | 2022-12-01T22:34:55Z | 2022-02-16T00:01:21Z | null | ['CVE-2022-25197'] | Agent-to-controller security bypass in Jenkins HashiCorp Vault Plugin allows reading arbitrary files | Jenkins HashiCorp Vault Plugin 336.v182c0fbaaeb7 and earlier implements functionality that allows agent processes to read arbitrary files on the Jenkins controller file system.
This allows attackers able to control agent processes to read arbitrary files on the Jenkins controller file system.
This vulnerability is on... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.datapipe.jenkins.plugins:hashicorp-vault-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '351.vdb_f83a_1c6a_9d'}]}], 'database_specific': {'last_known_affected_version_range': '<= 336.v182c0fbaaeb7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25197'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/hashicorp-vault-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/hashicorp-vault-plugin/releases/tag/351.vdb_f83a_1c6a_9d'}, {'type': 'WEB', 'url': 'https://www.jenkins... | {'cwe_ids': ['CWE-693'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:34:55Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.