schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-vpq7-m4qm-p2gp | 2023-06-30T20:09:24Z | 2022-02-16T00:01:45Z | null | ['CVE-2022-0596'] | Microweber vulnerable to Improper Validation of Specified Quantity in Input | Microweber prior to version 1.2.11 can have a negative product amount. This could allow an attacker to manipulate the total value and get products for free. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0596'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/91a9d899741557c75050614ff7adb8c0e3feb005'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f... | {'cwe_ids': ['CWE-1284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:49:11Z', 'nvd_published_at': '2022-02-15T14:15:00Z'} |
1.4.0 | GHSA-926x-m6m5-3mmp | 2023-09-11T18:16:40Z | 2022-02-09T22:50:06Z | null | ['CVE-2019-10803'] | push-dir Enables OS Command Injection | push-dir through 0.4.1 allows execution of arbritary commands. Arguments provided as part of the variable `opt.branch` is not validated before being provided to the `git` command within [index.js#L139](https://github.com/L33T-KR3W/push-dir/blob/master/index.js#L139). This could be abused by an attacker to inject arbitr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'push-dir'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10803'}, {'type': 'WEB', 'url': 'https://github.com/L33T-KR3W/push-dir/blob/master/index.js#L139'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PUSHDIR-559009'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T21:01:28Z', 'nvd_published_at': '2020-02-28T21:15:00Z'} |
1.4.0 | GHSA-8p8q-wvxx-jq94 | 2022-12-01T22:10:17Z | 2022-02-16T00:01:13Z | null | ['CVE-2022-25211'] | Missing permission check in Jenkins SWAMP Plugin allows capturing credentials | SWAMP Plugin 1.2.6 and earlier does not perform a permission check in a method implementing form validation.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.continuousassurance.swamp.jenkins:swamp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25211'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/swamp-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1988'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:10:17Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-7rcw-fwfh-2h2g | 2022-06-20T22:38:43Z | 2022-02-16T00:01:31Z | null | ['CVE-2022-25182'] | Protection Mechanism Failure in Jenkins Pipeline: Shared Groovy Libraries Plugin | A sandbox bypass vulnerability in Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier allows attackers with Item/Configure permission to execute arbitrary code on the Jenkins controller JVM using specially crafted library names if a global Pipeline library is already configured. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps-global-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '561.va_ce0de3c2d69'}]}], 'database_specific': {'last_known_affected_version_range': '<= 552.vd9cc05b8a2e1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25182'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2422'}] | {'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:38:43Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-q9x4-q76f-5h5j | 2023-01-10T15:48:41Z | 2022-02-11T23:17:25Z | null | ['CVE-2019-19030'] | Unauthenticated users can exploit an enumeration vulnerability in Harbor (CVE-2019-19030) | # Impact
Sean Wright from Secureworks has discovered an enumeration vulnerability. An attacker can make use of the Harbor API to make unauthenticated calls to the Harbor instance. Based on the HTTP status code in the response, an attacker is then able to work out which resources exist, and which do not. This would like... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.10.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0... | [{'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories/GHSA-q9x4-q76f-5h5j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19030'}, {'type': 'PACKAGE', 'url': 'https://github.com/goharbor/harbor/'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T18:52:37Z', 'nvd_published_at': '2022-12-26T22:15:00Z'} |
1.4.0 | GHSA-9wvh-ff5f-xjpj | 2021-05-17T16:40:42Z | 2022-02-15T01:57:18Z | null | ['CVE-2019-16097'] | Missing Authorization in Harbor | core/api/user.go in Harbor 1.7.0 through 1.8.2 allows non-admin users to create admin accounts via the POST /api/users API. This is fixed in 1.9.0-rc1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.9.0-rc1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16097'}, {'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/commit/b6db8a8a106259ec9a2c48be8a380cb3b37cf517'}, {'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/compare/v1.8.2...v1.9.0-rc1'}, {'type': 'WEB', 'url': 'https://github.... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T16:40:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pfr3-87q3-65rc | 2023-09-11T16:23:54Z | 2022-02-10T23:46:28Z | null | ['CVE-2021-33041'] | Cross-site Scripting in vmd | vmd through 1.34.0 allows `div class="markdown-body"` XSS, as demonstrated by Electron remote code execution via `require('child_process').execSync('calc.exe')` on Windows and a similar attack on macOS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'vmd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.34.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33041'}, {'type': 'WEB', 'url': 'https://github.com/yoshuawuyts/vmd/issues/137'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/vmd'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T17:45:57Z', 'nvd_published_at': '2021-05-17T17:15:00Z'} |
1.4.0 | GHSA-9689-rx4v-cqgc | 2023-09-15T18:07:59Z | 2022-02-15T01:57:18Z | null | ['CVE-2018-15798'] | Pivotal Concourse Open Redirect in Login Flow | Pivotal Concourse Release, versions 4.x prior to 4.2.2, login flow allows redirects to untrusted websites. A remote unauthenticated attacker could convince a user to click on a link using the oAuth redirect link with an untrusted website and gain access to that user's access token in Concourse. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/concourse/skymarshal/skyserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/concourse/skymarshal... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15798'}, {'type': 'WEB', 'url': 'https://github.com/concourse/concourse/pull/5350/commits/38cb4cc025e5ed28764b4adc363a0bbf41f3c7cb'}, {'type': 'WEB', 'url': 'https://github.com/concourse/concourse/blob/release/5.2.x/release-notes/v5.2.8.md'}, {'typ... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T18:15:16Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mf22-92pm-m8p8 | 2022-03-09T21:12:59Z | 2022-02-25T15:36:47Z | null | ['CVE-2022-24709'] | Cross site scripting in @awsui/components-react | ### Impact
Components could potentially allow cross-site scripting (XSS) in certain circumstances. These components could render content without adequate neutralization.
### Patches
Fixed in 3.0.367. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@awsui/components-react'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.367'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/aws/awsui-documentation/security/advisories/GHSA-mf22-92pm-m8p8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24709'}, {'type': 'PACKAGE', 'url': 'https://github.com/aws/awsui-documentation/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T15:36:47Z', 'nvd_published_at': '2022-02-24T20:15:00Z'} |
1.4.0 | GHSA-99cg-575x-774p | 2023-08-29T20:29:19Z | 2022-02-01T00:43:17Z | null | ['CVE-2022-0317'] | Go-Attestation Improper Input Validation with attacker-controlled TPM Quote | ### Impact
An improper input validation vulnerability in go-attestation before 0.4.0 allows local users to provide a maliciously-formed Quote over no/some PCRs, causing `AKPublic.Verify` to succeed despite the inconsistency. Subsequent use of the same set of PCR values in `Eventlog.Verify` lacks the authentication per... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/google/go-attestation'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/google/go-attestation/security/advisories/GHSA-99cg-575x-774p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0317'}, {'type': 'WEB', 'url': 'https://github.com/google/go-attestation/commit/82f2c9c2c76e1d3691d17ee78116d1d93a123788'}, {'type': 'PACKAG... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T22:15:30Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-pv7r-9vjg-g3f9 | 2023-06-19T17:00:46Z | 2022-02-11T00:00:47Z | 2023-06-19T17:00:46Z | [] | Duplicate advisory: swift-nio-http2 vulnerable to denial of service via invalid HTTP/2 HEADERS frame length | ## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-pgfx-g6rc-8cjv. This link is maintained to preserve external references.
## Original Description
A program using swift-nio-http2 is vulnerable to a denial of service attack, caused by a network peer sending a specially crafted H... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-nio-http2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.19.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-http2/security/advisories/GHSA-ccw9-q5h2-8c2w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24666'}, {'type': 'PACKAGE', 'url': 'https://github.com/apple/swift-nio-http2'}] | {'cwe_ids': ['CWE-130'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T17:00:46Z', 'nvd_published_at': '2022-02-09T23:15:00Z'} |
1.4.0 | GHSA-8r7c-3cm2-3h8f | 2022-02-11T20:39:19Z | 2022-02-10T00:33:13Z | null | ['CVE-2022-23578'] | Memory leak in Tensorflow | ### Impact
If a graph node is invalid, TensorFlow can leak memory in the [implementation of `ImmutableExecutorState::Initialize`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/common_runtime/immutable_executor_state.cc#L84-L262):
```cc
Status s = params_.create_... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8r7c-3cm2-3h8f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23578'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c79ccba517dbb1a0ccb9b01ee3bd2a63748b60dd'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-401'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T20:15:02Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-g9fx-6j5c-grmw | 2023-05-25T13:24:03Z | 2022-02-16T00:01:36Z | null | ['CVE-2022-25174'] | Improper Neutralization of Special Elements used in an OS Command in Jenkins Pipeline: Shared Groovy Libraries Plugin | Jenkins Pipeline: Shared Groovy Libraries Plugin prior to 561.va_ce0de3c2d69, 2.21.1, and 2.18.1 uses the same checkout directories for distinct SCMs for Pipeline libraries, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps-global-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '544.vff04fa68714d'}, {'fixed': '561.va'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps-global-lib'}, 'ranges... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25174'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/e19344451ce1c4a4181b9f094b8fd38cd8d86c9f/2022/25xxx/CVE-2022-25174.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2463'}] | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:48:09Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-g2qx-6ghw-67hm | 2021-05-20T22:20:34Z | 2022-02-15T00:33:30Z | null | ['CVE-2020-13246'] | Denial of Service in Gitea | An issue was discovered in Gitea in which an attacker can trigger a deadlock by initiating a transfer of a repository's ownership from one organization to another. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/go-gitea/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13246'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/issues/10549'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/11438'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=DmVgADSVS88'}] | {'cwe_ids': ['CWE-667'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T22:20:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8cxv-76p7-jxwr | 2022-02-11T20:45:58Z | 2022-02-10T00:32:29Z | null | ['CVE-2022-23577'] | Null-dereference in Tensorflow | ### Impact
The [implementation of `GetInitOp`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/cc/saved_model/loader_util.cc#L31-L61) is vulnerable to a crash caused by dereferencing a null pointer:
```cc
const auto& init_op_sig_it =
meta_graph_def.signature_def().... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8cxv-76p7-jxwr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23577'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/4f38b1ac8e42727e18a2f0bde06d3bee8e77b250'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T20:26:34Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-rvpc-w57p-q95f | 2021-04-07T21:38:25Z | 2022-02-09T22:35:29Z | null | ['CVE-2019-10797'] | HTTP Response Splitting in WSO2 transport-http | Netty in WSO2 transport-http before v6.3.1 is vulnerable to HTTP Response Splitting due to HTTP Header validation being disabled. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wso2.transport.http:org.wso2.transport.http.netty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10797'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWSO2TRANSPORTHTTP-548944'}] | {'cwe_ids': ['CWE-113'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T21:38:25Z', 'nvd_published_at': '2020-02-19T19:15:00Z'} |
1.4.0 | GHSA-j7m2-58wv-9v79 | 2021-10-05T16:28:48Z | 2022-02-10T20:47:29Z | null | ['CVE-2019-11343'] | Vulnerability in Torpedo Query | Torpedo Query before 2.5.3 mishandles the LIKE operator in ConditionBuilder.java, LikeCondition.java, and NotLikeCondition.java. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.torpedoquery:org.torpedoquery'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11343'}, {'type': 'WEB', 'url': 'https://github.com/xjodoin/torpedoquery/commit/3c20b874fba9cc2a78b9ace10208de1602b56c3f'}, {'type': 'PACKAGE', 'url': 'https://github.com/xjodoin/torpedoquery/'}, {'type': 'WEB', 'url': 'https://github.com/xjodoin/t... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T18:10:05Z', 'nvd_published_at': '2020-03-12T21:15:00Z'} |
1.4.0 | GHSA-2phq-ghf8-6586 | 2022-12-02T21:11:18Z | 2022-02-16T00:01:24Z | null | ['CVE-2022-25193'] | Jenkins Snow Commander Plugin prior to 2.0 vulnerable to Missing Authorization | Snow Commander Plugin 1.10 and earlier does not perform permission checks in methods implementing form validation.
This allows attackers with Overall/Read permission to connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in J... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:embotics-vcommander'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25193'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/snowsoftware-commander-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2536'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:26:21Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-p867-fxfr-ph2w | 2022-03-08T18:25:02Z | 2022-02-24T12:08:24Z | null | ['CVE-2022-23651'] | b2-sdk-python TOCTOU application key disclosure | ### Impact
Linux and Mac releases of the SDK version 1.14.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition.
SDK users of the `SqliteAccountInfo` format are vulnerable while users of the `InMe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'b2sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Backblaze/b2-sdk-python/security/advisories/GHSA-p867-fxfr-ph2w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23651'}, {'type': 'WEB', 'url': 'https://github.com/Backblaze/b2-sdk-python/commit/62476638986e5b6d7459aca5ef8ce220760226e0'}, {'type': 'P... | {'cwe_ids': ['CWE-367'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T12:08:24Z', 'nvd_published_at': '2022-02-23T23:15:00Z'} |
1.4.0 | GHSA-8j3f-mhq8-gmh4 | 2022-08-15T20:02:53Z | 2022-02-15T01:57:18Z | null | ['CVE-2021-21432'] | Reject unauthorized access with GitHub PATs | ### Impact
_What kind of vulnerability is it? Who is impacted?_
The additional auth mechanism added within https://github.com/go-vela/server/pull/246 enables some malicious user to obtain secrets utilizing the injected credentials within the `~/.netrc` file. Steps to reproduce
1. Create Vela server
2. Login to Vela U... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/go-vela/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '0.7.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/go-vela/server/api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '0.... | [{'type': 'WEB', 'url': 'https://github.com/go-vela/server/security/advisories/GHSA-8j3f-mhq8-gmh4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21432'}, {'type': 'WEB', 'url': 'https://github.com/go-vela/server/pull/337'}, {'type': 'WEB', 'url': 'https://github.com/go-vela/server/commit/cb4... | {'cwe_ids': ['CWE-285', 'CWE-862', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:12:26Z', 'nvd_published_at': '2021-04-09T18:15:00Z'} |
1.4.0 | GHSA-3949-f494-cm99 | 2022-02-22T19:32:18Z | 2022-02-22T19:32:18Z | null | ['CVE-2022-23647'] | Cross-site Scripting in Prism | ### Impact
Prism's [Command line plugin](https://prismjs.com/plugins/command-line/) can be used by attackers to achieve an XSS attack. The Command line plugin did not properly escape its output, leading to the input text being inserted into the DOM as HTML code.
Server-side usage of Prism is not impacted. Websites tha... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'prismjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.27.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/PrismJS/prism/security/advisories/GHSA-3949-f494-cm99'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23647'}, {'type': 'WEB', 'url': 'https://github.com/PrismJS/prism/pull/3341'}, {'type': 'WEB', 'url': 'https://github.com/PrismJS/prism/commit/e002e... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T19:32:18Z', 'nvd_published_at': '2022-02-18T15:15:00Z'} |
1.4.0 | GHSA-66gw-ch5v-74v8 | 2021-04-05T20:50:26Z | 2022-02-09T22:01:32Z | null | ['CVE-2020-13947'] | Cross-site scripting (XSS) in Apache ActiveMQ | An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the message.jsp page of Apache ActiveMQ versions 5.15.12 through 5.16.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.16.0'}, {'fixed': '5.16.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13947'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r021c490028f61c8b6f7e38efb98e61693b0cbb6b99b02238c6fc7d66@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra66791f1f2b59fa651a81... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T20:50:26Z', 'nvd_published_at': '2021-02-08T22:15:00Z'} |
1.4.0 | GHSA-pfwp-q984-w7wh | 2022-06-20T22:36:46Z | 2022-02-16T00:01:31Z | null | ['CVE-2022-25183'] | Protection Mechanism Failure in Jenkins Pipeline: Shared Groovy Libraries Plugin | Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier uses the names of Pipeline libraries to create cache directories without any sanitization, allowing attackers with Item/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM using specially crafted libra... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps-global-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '561.va_ce0de3c2d69'}]}], 'database_specific': {'last_known_affected_version_range': '<= 552.vd9cc05b8a2e1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25183'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2586'}] | {'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:36:46Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-v6fq-q792-j46j | 2021-04-14T19:36:05Z | 2022-02-09T23:20:47Z | null | ['CVE-2020-11975'] | Improper Input Validation in Apache Unomi | Apache Unomi allows conditions to use OGNL scripting which offers the possibility to call static Java classes from the JDK that could execute code with the permission level of the running Java process. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.unomi:unomi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11975'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r01021bc4b25c1e98812efca0b07f0e078a6281bd52f7c3817a429d95@%3Ccommits.unomi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r79672c25e0ef9bb4b9148376... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T19:36:05Z', 'nvd_published_at': '2020-06-05T15:15:00Z'} |
1.4.0 | GHSA-gwcx-jrx4-92w2 | 2022-05-26T20:05:00Z | 2022-02-09T23:32:08Z | null | ['CVE-2022-23593'] | Segfault in `simplifyBroadcast` in Tensorflow | ### Impact
The [`simplifyBroadcast` function in the MLIR-TFRT infrastructure in TensorFlow](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/compiler/mlir/tfrt/jit/transforms/tf_cpurt_symbolic_shape_optimization.cc#L149-L205) is vulnerable to a segfault (hence, denial of... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0-rc0'}, {'fixed': '2.8.0'}]}], 'versions': ['2.8.0-rc0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0-rc0'}, {'fi... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gwcx-jrx4-92w2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23593'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/35f0fabb4c178253a964d7aabdbb15c6a398b69a'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T18:15:07Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-8fvr-5rqf-3wwh | 2021-05-19T22:47:32Z | 2022-02-15T01:57:18Z | null | ['CVE-2015-3630'] | Information Exposure in Docker Engine | Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/moby/moby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3630'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/commit/545b440a80f676a506e5837678dd4c4f65e78660'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ'}, {'type': 'W... | {'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:47:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6jm6-cmcp-fqjq | 2022-04-04T20:33:50Z | 2022-02-16T00:01:42Z | null | ['CVE-2022-24684'] | Nomad Spread Job Stanza May Trigger Panic in Servers | Nomad and Nomad Enterprise allows operators with job-submit capabilities to use the spread stanza in a way such that it can cause panic in Nomad servers. This vulnerability, CVE-2022-24684, was fixed in Nomad 1.0.18, 1.1.12, and 1.2.6. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '1.0.18'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24684'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-04-nomad-spread-job-stanza-may-trigger-panic-in-servers/'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-04-nomad-spread-job-stanza-may-trigger-panic-... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T20:33:50Z', 'nvd_published_at': '2022-02-15T15:15:00Z'} |
1.4.0 | GHSA-hv53-vf5m-8q94 | 2022-09-19T22:53:33Z | 2022-02-11T23:28:20Z | null | [] | personnummer/go vulnerable to Improper Input Validation | This vulnerability was reported to the personnummer team in June 2020. The slow response was due to locked ownership of some of the affected packages, which caused delays to update packages prior to disclosure.
The vulnerability is determined to be low severity.
### Impact
This vulnerability impacts users who rely o... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/personnummer/go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/personnummer/go/security/advisories/GHSA-hv53-vf5m-8q94'}, {'type': 'PACKAGE', 'url': 'https://github.com/personnummer/go/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/github.com/personnummer/go'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T17:26:30Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rmj8-8hhh-gv5h | 2022-08-16T19:43:34Z | 2022-02-11T21:33:23Z | null | ['CVE-2022-23634'] | Puma used with Rails may lead to Information Exposure | ### Impact
Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAttributes` implementation to work correctly.
From Rails:
> Under certain circumstances response bodies will not b... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.6.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.11'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-rmj8-8hhh-gv5h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23634'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/commit/b70f451fe8abc0cff192c065d549778452e155bb'}, {'type': 'ADVISORY', 'url': 'https://gi... | {'cwe_ids': ['CWE-200', 'CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-11T21:33:23Z', 'nvd_published_at': '2022-02-11T22:15:00Z'} |
1.4.0 | GHSA-px4w-rcv2-6x8x | 2021-04-06T20:02:19Z | 2022-02-09T22:19:00Z | null | ['CVE-2020-17532'] | Arbitrary code execution in Apache ServiceComb java-chassis | When handler-router component is enabled in servicecomb-java-chassis, authenticated user may inject some data and cause arbitrary code execution.
The problem happens in versions between 2.0.0 ~ 2.1.3 and fixed in Apache ServiceComb-Java-Chassis 2.1.5 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.servicecomb:java-chassis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.servicecomb:java-chassis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17532'}, {'type': 'WEB', 'url': 'https://github.com/apache/servicecomb-java-chassis/commit/839a52e27c754cb5ce14f20063902f21065bd26c'}, {'type': 'WEB', 'url': 'https://github.com/apache/servicecomb-java-chassis/commit/ba4fb37b6ab8bd3a6c3d0693f295d99... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T20:02:19Z', 'nvd_published_at': '2021-01-25T10:16:00Z'} |
1.4.0 | GHSA-mm6g-mmq6-53ff | 2022-02-08T19:44:19Z | 2022-02-01T16:23:00Z | null | ['CVE-2021-32842'] | Path Traversal in SharpZipLib | SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.0.0 and prior to version 1.3.3, a check was added if the destination file is under a destination directory. However, it is not enforced that `_baseDirectory` ends with slash. If the _baseDirectory is not slash terminated like `/home/user... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'SharpZipLib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32842'}, {'type': 'PACKAGE', 'url': 'https://github.com/icsharpcode/SharpZipLib'}, {'type': 'WEB', 'url': 'https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-01T16:22:12Z', 'nvd_published_at': '2022-01-26T21:15:00Z'} |
1.4.0 | GHSA-v88g-cgmw-v5xw | 2022-12-03T03:40:56Z | 2022-02-10T23:30:59Z | null | ['CVE-2020-15366'] | Prototype Pollution in Ajv | An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'ajv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.12.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15366'}, {'type': 'WEB', 'url': 'https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f'}, {'type': 'PACKAGE', 'url': 'https://github.com/ajv-validator/ajv'}, {'type': 'WEB', 'url': 'https://github.com/ajv-validator/aj... | {'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-10T21:23:41Z', 'nvd_published_at': '2020-07-15T20:15:00Z'} |
1.4.0 | GHSA-wfj5-2mqr-7jvv | 2021-07-29T18:20:14Z | 2022-02-10T23:06:57Z | null | ['CVE-2020-9296'] | Expression Language Injection in Netflix Conductor | Netflix Conductor uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, different types of interpolation are supported, including Java EL expressions. If an attacker can inject arbitrary data in the error message template being passed to ConstraintVa... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.netflix.conductor:conductor-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.25.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.25.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9296'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-001.md'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md'}] | {'cwe_ids': ['CWE-917'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T14:18:14Z', 'nvd_published_at': '2020-06-16T14:15:00Z'} |
1.4.0 | GHSA-w9mp-p2wp-2xf7 | 2021-04-22T23:05:56Z | 2022-02-10T20:35:42Z | null | ['CVE-2020-13953'] | Improper file downloads in Apache Tapestry | In Apache Tapestry from 5.4.0 to 5.5.0, crafting specific URLs, an attacker can download files inside the WEB-INF folder of the WAR being run. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0'}, {'fixed': '5.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13953'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r37dab61fc7f7088d4311e7f995ef4117d58d86a675f0256caa6991eb@%3Cusers.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r50eb12e8a12074a9b7ed63c... | {'cwe_ids': ['CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T23:05:56Z', 'nvd_published_at': '2020-09-30T18:15:00Z'} |
1.4.0 | GHSA-8v38-pw62-9cw2 | 2023-09-11T22:51:42Z | 2022-02-18T00:00:33Z | null | ['CVE-2022-0639'] | url-parse Incorrectly parses URLs that include an '@' | A specially crafted URL with an '@' sign but empty user info and no hostname, when parsed with url-parse, url-parse will return the incorrect href. In particular,
```js
parse(\"http://@/127.0.0.1\")
```
Will return:
```yaml
{
slashes: true,
protocol: 'http:',
hash: '',
query: '',
pathname: '/127.0.0.1',
auth: ''... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'url-parse'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0639'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/url-parse/commit/ef45a1355375a8244063793a19059b4f62fc8788'}, {'type': 'PACKAGE', 'url': 'https://github.com/unshiftio/url-parse'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/83a6b... | {'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T18:08:05Z', 'nvd_published_at': '2022-02-17T18:15:00Z'} |
1.4.0 | GHSA-4w5x-x539-ppf5 | 2023-08-29T22:09:18Z | 2022-02-11T23:42:20Z | null | ['CVE-2020-26892'] | Incorrect handling of credential expiry by /nats-io/nats-server |
## Problem Description
NATS nats-server through 2020-10-07 has Incorrect Access Control because of how expired credentials are handled.
The NATS accounts system has expiration timestamps on credentials; the <https://github.com/nats-io/jwt> library had an API which encouraged misuse and an `IsRevoked()` method which ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/jwt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server/v2'}, 'ecosystem_specific': {'affected_... | [{'type': 'WEB', 'url': 'https://github.com/nats-io/jwt/security/advisories/GHSA-4w5x-x539-ppf5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26892'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/jwt/commit/e11ce317263cef69619fc1ca743b195d02aa1d8a'}, {'type': 'WEB', 'url': 'https://git... | {'cwe_ids': ['CWE-798'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:18:09Z', 'nvd_published_at': '2020-11-06T08:15:00Z'} |
1.4.0 | GHSA-5f2r-qp73-37mr | 2022-02-11T20:39:07Z | 2022-02-10T00:33:29Z | null | ['CVE-2022-23579'] | `CHECK`-failures during Grappler's `SafeToRemoveIdentity` in Tensorflow | ### Impact
The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that [`SafeToRemoveIdentity`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/dependency_optimizer.cc#L59-L98) would trigger... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5f2r-qp73-37mr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23579'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/92dba16749fae36c246bec3f9ba474d9ddeb7662'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T20:12:18Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-v3mr-gp7j-pw5w | 2022-02-04T17:26:40Z | 2022-02-10T22:33:46Z | null | [] | Possible SQL injection in tablelookupwizard Contao Extension | ### Impact
The currently selected widget values were not correctly sanitized before passing it to the database, leading to an SQL injection possibility.
### Patches
The issue has been patched in `tablelookupwizard` version 3.3.5 and version 4.0.0.
### For more information
If you have any questions or comments about t... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'terminal42/contao-tablelookupwizard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/terminal42/contao-tablelookupwizard/security/advisories/GHSA-v3mr-gp7j-pw5w'}, {'type': 'WEB', 'url': 'https://github.com/terminal42/contao-tablelookupwizard/commit/a5e723a28f110b7df8ffc4175cef9b061d3cc717'}, {'type': 'PACKAGE', 'url': 'https://github.com/terminal42/contao-ta... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T17:26:40Z', 'nvd_published_at': None} |
1.4.0 | GHSA-287r-574x-f4h4 | 2023-07-12T00:23:24Z | 2022-02-02T00:01:46Z | null | ['CVE-2021-45416'] | RosarioSIS XSS Vulnerability | Reflected Cross-site scripting (XSS) vulnerability in RosarioSIS 8.2.1 allows attackers to inject arbitrary HTML via the search_term parameter in the modules/Scheduling/Courses.php script. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.2.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45416'}, {'type': 'WEB', 'url': 'https://github.com/86x/CVE-2021-45416'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/aec018065ca12ecef03ee454a8112f992ea35315'}, {'type': 'WEB', 'url': 'https://www.youtube.com/wat... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T00:23:24Z', 'nvd_published_at': '2022-02-01T13:15:00Z'} |
1.4.0 | GHSA-pwwm-pwx2-2hw7 | 2022-02-22T18:12:11Z | 2022-02-18T00:00:37Z | null | ['CVE-2022-0622'] | Generation of Error Message Containing Sensitive Information in Snipe-IT | Snipe-IT prior to version 5.3.11 is vulnerable to Generation of Error Message Containing Sensitive Information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0622'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/178e44095141ab805c282f563fb088df1a10b2e2'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4ed99dab-5319-4... | {'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T18:12:11Z', 'nvd_published_at': '2022-02-17T02:15:00Z'} |
1.4.0 | GHSA-4xrw-wvmq-8jmh | 2021-07-28T22:30:07Z | 2022-02-10T23:46:11Z | null | ['CVE-2020-7627'] | OS Command Injection in node-key-sender | node-key-sender through 1.0.11 is vulnerable to Command Injection. It allows execution of arbitrary commands via the 'arrParams' argument in the 'execute()' function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-key-sender'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7627'}, {'type': 'WEB', 'url': 'https://github.com/garimpeiro-it/node-key-sender/blob/master/key-sender.js#L117,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEKEYSENDER-564261'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:40:44Z', 'nvd_published_at': '2020-04-02T22:15:00Z'} |
1.4.0 | GHSA-v83p-xwm9-v4g8 | 2021-05-11T22:24:26Z | 2022-02-10T23:06:22Z | null | ['CVE-2020-9495'] | Injection in Apache Archiva | Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the resp... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.archiva:archiva'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9495'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252... | {'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T22:24:26Z', 'nvd_published_at': '2020-06-19T19:15:00Z'} |
1.4.0 | GHSA-hjp8-2cm3-cc45 | 2022-03-03T22:02:13Z | 2022-02-24T00:00:54Z | null | ['CVE-2022-0654'] | Cookie exposure in requestretry | Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository fgribreau/node-request-retry prior to 7.0.0 via cookies being leaked to external sites. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'requestretry'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0654'}, {'type': 'WEB', 'url': 'https://github.com/fgribreau/node-request-retry/commit/0979c6001d9d57c2aac3157c11b007397158922a'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a779faf5-c2cc-48be-a31d-4ddfac357afc'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:03:55Z', 'nvd_published_at': '2022-02-23T00:15:00Z'} |
1.4.0 | GHSA-9x52-887g-fhc2 | 2022-02-11T19:56:20Z | 2022-02-09T23:32:41Z | null | ['CVE-2022-23594'] | Out of bounds read in Tensorflow | ### Impact
The [TFG dialect of TensorFlow (MLIR)](https://github.com/tensorflow/tensorflow/tree/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/ir/importexport) makes several assumptions about the incoming `GraphDef` before converting it to the MLIR-based dialect.
If an attacker changes the `SavedModel` forma... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.1'}]}], 'versions': ['2.7.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.1... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9x52-887g-fhc2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23594'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow/'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tens... | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T18:13:49Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-fm6q-97gw-c4wh | 2022-12-01T23:35:47Z | 2022-02-16T00:01:28Z | null | ['CVE-2022-25186'] | Agent-to-controller security bypass in Jenkins HashiCorp Vault Plugin | Jenkins HashiCorp Vault Plugin 3.8.0 and earlier implements functionality that allows agent processes to retrieve any Vault secrets for use on the agent, allowing attackers able to control agent processes to obtain Vault secrets for an attacker-specified path and key. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.datapipe.jenkins.plugins:hashicorp-vault-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '336.v182c0fbaaeb7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.8.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25186'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/hashicorp-vault-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2429'}] | {'cwe_ids': ['CWE-693'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:47:15Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-h6gw-r52c-724r | 2022-02-03T23:09:44Z | 2022-02-09T23:38:36Z | null | [] | NULL Pointer Dereference and Access of Uninitialized Pointer in TensorFlow | ### Impact
The [code for boosted trees in TensorFlow](https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/kernels/boosted_trees/stats_ops.cc) is still missing validation. This allows malicious users to read and write outside of bounds of heap allocated data as well as... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-57wx-m983-2f88'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6gw-r52c-724r'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-476', 'CWE-824'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T23:09:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pc58-wgmc-hfjr | 2022-02-09T22:49:10Z | 2022-02-09T22:49:10Z | null | ['CVE-2020-7792'] | Prototype Pollution in mout | This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, lead... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mout'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7792'}, {'type': 'WEB', 'url': 'https://github.com/mout/mout/commit/3fecf1333e6d71ae72edf48c71dc665e40df7605'}, {'type': 'WEB', 'url': 'https://github.com/mout/mout/blob/master/src/object/deepFillIn.js'}, {'type': 'WEB', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T21:52:43Z', 'nvd_published_at': '2020-12-11T11:15:00Z'} |
1.4.0 | GHSA-rp34-85x3-3764 | 2022-02-24T13:07:04Z | 2022-02-15T00:02:47Z | null | ['CVE-2022-0576'] | Cross-site Scripting in librenms | Cross-site Scripting (XSS) - Generic in Packagist librenms/librenms prior to 22.1.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0576'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/135717a9a05c5bf8921f1389cbb469dcbf300bfd'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/114ba055-... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:42:21Z', 'nvd_published_at': '2022-02-14T12:15:00Z'} |
1.4.0 | GHSA-m639-9whg-fw97 | 2022-02-28T22:17:42Z | 2022-02-19T00:01:25Z | null | ['CVE-2021-23702'] | Prototype Pollution in object-extend | The package object-extend from 0.0.0 through 0.5.0 is vulnerable to Prototype Pollution via object-extend. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'object-extend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23702'}, {'type': 'PACKAGE', 'url': 'https://github.com/bernhardw/object-extend'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-OBJECTEXTEND-2401470'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T20:51:50Z', 'nvd_published_at': '2022-02-18T20:15:00Z'} |
1.4.0 | GHSA-6w4v-qr4m-97gg | 2022-03-09T21:15:50Z | 2022-02-25T00:01:01Z | null | ['CVE-2022-25838'] | Multi-Factor Authentication issue in Laravel Fortify | Laravel Fortify before 1.11.1 allows reuse within a short time window, thus calling into question the "OT" part of the "TOTP" concept. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'laravel/fortify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25838'}, {'type': 'WEB', 'url': 'https://github.com/laravel/fortify/issues/201'}, {'type': 'WEB', 'url': 'https://github.com/laravel/fortify/issues/201#issuecomment-1009282153'}, {'type': 'WEB', 'url': 'https://github.com/laravel/fortify/pull/357'}... | {'cwe_ids': ['CWE-294'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T19:12:48Z', 'nvd_published_at': '2022-02-24T15:15:00Z'} |
1.4.0 | GHSA-h2fj-77wh-fh5w | 2022-02-24T13:52:12Z | 2022-02-17T00:00:36Z | null | ['CVE-2022-0612'] | Cross-site Scripting in livehelperchat | Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.93'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0612'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/4d4f1db1701f09177896a38e43fd0c693835f03b'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-17T23:37:28Z', 'nvd_published_at': '2022-02-16T06:15:00Z'} |
1.4.0 | GHSA-p93c-h8qm-7256 | 2022-02-09T22:32:29Z | 2022-02-09T22:32:29Z | null | ['CVE-2020-13654'] | Improper escaping in XWiki Platform | XWiki Platform before 12.8 mishandles escaping in the property displayer. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13654'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/pull/1315'}, {'type': 'WEB', 'url': 'https://cve.anastasi.link/cve-2020-13654'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/compare/xwiki-platform-12.7.1.... | {'cwe_ids': ['CWE-116'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T19:52:54Z', 'nvd_published_at': '2020-12-31T01:15:00Z'} |
1.4.0 | GHSA-c5gj-w4hx-gvmx | 2022-02-25T19:18:15Z | 2022-02-21T00:00:21Z | null | ['CVE-2022-0688'] | Business Logic Errors in microweber | Microweber prior to 1.2.11 can suffer from insecure direct object reference(s). A malicious actor can remove items from a victim's cart. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0688'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/a41f0fddaf08ff12b2b82506b1ca9490c93ab605'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0... | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T19:17:23Z', 'nvd_published_at': '2022-02-20T15:15:00Z'} |
1.4.0 | GHSA-ppc3-fpvh-7396 | 2022-05-03T19:31:06Z | 2022-02-09T22:25:18Z | null | ['CVE-2020-17534'] | Improper synchronization in Apache Netbeans HTML/Java API | There exists a race condition between the deletion of the temporary file and the creation of the temporary directory in `webkit` subproject of HTML/Java API version 1.7. A similar vulnerability has recently been disclosed in other Java projects and the fix in HTML/Java API version 1.7.1 follows theirs: To avoid local p... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.netbeans.html:pom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17534'}, {'type': 'WEB', 'url': 'https://github.com/apache/netbeans-html4j/commit/fa70e507e5555e1adb4f6518479fc408a7abd0e6'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra6119c0cdfccf051a846fa11b61364f5df9e7db93c310706a947f86a%40%... | {'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T22:32:25Z', 'nvd_published_at': '2021-01-11T16:15:00Z'} |
1.4.0 | GHSA-v9p9-535w-4285 | 2022-02-25T15:40:33Z | 2022-02-17T00:00:32Z | null | ['CVE-2021-23682'] | Prototype Pollution in litespeed.js and appwrite/server-ce | This affects the package litespeed.js before 0.3.12; the package appwrite/server-ce from 0.12.0 and before 0.12.2, before 0.11.1. When parsing the query string in the getJsonFromUrl function, the key that is set in the result object is not properly sanitized leading to a Prototype Pollution vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'litespeed.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'appwrite/server-ce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.0'}, {'fixed': '0.12.2'}]}]}, {'pack... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23682'}, {'type': 'WEB', 'url': 'https://github.com/appwrite/appwrite/pull/2778'}, {'type': 'WEB', 'url': 'https://github.com/litespeed-js/litespeed.js/pull/18'}, {'type': 'WEB', 'url': 'https://github.com/appwrite/appwrite/releases/tag/0.11.1'}, {... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-17T23:35:34Z', 'nvd_published_at': '2022-02-16T17:15:00Z'} |
1.4.0 | GHSA-6rrw-4fm9-rghv | 2022-02-23T15:45:21Z | 2022-02-19T00:01:36Z | null | ['CVE-2022-0664'] | Use of Hard-coded Cryptographic Key in Netmaker | Netmaker prior to versions 0.8.5, 0.9.4, 0.10.0, and 0.10.1 uses a hard-coded cryptographic key. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.9.4'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0664'}, {'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/commit/9bee12642986cb9534e268447b70e6f0f03c59cf'}, {'type': 'PACKAGE', 'url': 'https://github.com/gravitl/netmaker'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/29898a42-fd... | {'cwe_ids': ['CWE-321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T15:45:21Z', 'nvd_published_at': '2022-02-18T14:15:00Z'} |
1.4.0 | GHSA-hrhx-6h34-j5hc | 2022-02-16T22:30:57Z | 2022-02-16T22:30:57Z | null | ['CVE-2022-23632'] | Skip the router TLS configuration when the host header is an FQDN | ### Impact
People that configure mTLS between Traefik and clients.
For a request, the TLS configuration choice can be different than the router choice, which implies the use of a wrong TLS configuration.
- When sending a request using FQDN handled by a router configured with a dedicated TLS configuration, the TLS co... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/traefik/traefik/security/advisories/GHSA-hrhx-6h34-j5hc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23632'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/pull/8764'}, {'type': 'PACKAGE', 'url': 'https://github.com/traefik/traefik'},... | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:30:57Z', 'nvd_published_at': '2022-02-17T15:15:00Z'} |
1.4.0 | GHSA-vm64-cfqx-3698 | 2023-09-11T23:08:53Z | 2022-02-10T20:18:37Z | null | ['CVE-2020-7777'] | Code Injection in jsen | This affects all versions of package jsen. If an attacker can control the schema file, it could run arbitrary JavaScript code on the victim machine. In the module description and README file there is no mention about the risks of untrusted schema files, so it is assumed that this is applicable. In particular the requir... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'jsen'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7777'}, {'type': 'WEB', 'url': 'https://github.com/bugventure/jsen/blob/master/lib/jsen.js#L875'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-JSEN-1014670'}] | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T19:49:04Z', 'nvd_published_at': '2020-11-23T16:15:00Z'} |
1.4.0 | GHSA-7w2w-fwpf-9m4h | 2022-06-20T22:39:16Z | 2022-02-16T00:01:32Z | null | ['CVE-2022-25181'] | Protection Mechanism Failure in Jenkins Pipeline: Shared Groovy Libraries Plugin | A sandbox bypass vulnerability in Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier allows attackers with Item/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM through crafted SCM contents, if a global Pipeline library already exists. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps-global-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '561.va_ce0de3c2d69'}]}], 'database_specific': {'last_known_affected_version_range': '<= 552.vd9cc05b8a2e1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25181'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2441'}] | {'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:39:16Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-c94w-c95p-phf8 | 2022-02-11T20:46:28Z | 2022-02-10T00:32:59Z | null | ['CVE-2022-23575'] | Integer overflow in Tensorflow | ### Impact
The [implementation of `OpLevelCostEstimator::CalculateTensorSize`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1552-L1558) is vulnerable to an integer overflow if an attacker can create an operation which w... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c94w-c95p-phf8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23575'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/fcd18ce3101f245b083b30655c27b239dc72221e'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T20:19:53Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-4g4p-42wc-9f3m | 2022-04-20T16:25:04Z | 2022-02-11T23:39:18Z | null | ['CVE-2020-27955'] | Git LFS can execute a Git binary from the current directory | ### Impact
On Windows, if Git LFS operates on a malicious repository with a `git.bat` or `git.exe` file in the current directory, that program would be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems.
This occurs because on Windows, Go includes (and prefers) the current ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/git-lfs/git-lfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/git-lfs/git-lfs/security/advisories/GHSA-4g4p-42wc-9f3m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27955'}, {'type': 'PACKAGE', 'url': 'https://github.com/git-lfs/git-lfs'}, {'type': 'WEB', 'url': 'https://github.com/git-lfs/git-lfs/releases'}, ... | {'cwe_ids': ['CWE-427'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T22:10:31Z', 'nvd_published_at': '2020-11-05T15:15:00Z'} |
1.4.0 | GHSA-38r5-34mr-mvm7 | 2022-02-12T00:01:51Z | 2022-02-12T00:01:51Z | null | ['CVE-2020-29662'] | "catalog's registry v2 api exposed on unauthenticated path in Harbor" | ### **Impact**
Javier Provecho, member of the TCCT (Telefonica Cloud & Cybersecurity Tech better known as ElevenPaths) SRE team discovered a vulnerability regarding Harbor’s v2 API.
The catalog’s registry v2 api is exposed on an unauthenticated path. The current catalog API path is served at the following path and it ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]... | [{'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories/GHSA-38r5-34mr-mvm7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29662'}, {'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/pull/13676'}, {'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/commi... | {'cwe_ids': ['CWE-287', 'CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T19:00:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qhh5-9738-g9mx | 2021-04-06T22:46:07Z | 2022-02-09T22:26:32Z | null | ['CVE-2020-13922'] | Incorrect Default Permissions in Apache DolphinScheduler | Versions of Apache DolphinScheduler prior to 1.3.2 allowed an ordinary user under any tenant to override another users password through the API interface. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13922'}, {'type': 'WEB', 'url': 'https://github.com/apache/incubator-dolphinscheduler/commit/b8a9e2e00f2f207ae60c913a7173b59405ff95f1'}, {'type': 'WEB', 'url': 'https://www.mail-archive.com/announce@apache.org/msg06076.html'}] | {'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T22:46:07Z', 'nvd_published_at': '2021-01-11T10:15:00Z'} |
1.4.0 | GHSA-5888-ffcr-r425 | 2022-02-09T22:20:49Z | 2022-02-09T22:20:49Z | null | ['CVE-2022-23631'] | Prototype Pollution leading to Remote Code Execution in superjson | ### Impact
This is critical vulnerability, as it allows to run arbitrary code on any server using superjson input, including a Blitz.js server, without prior authentication or knowledge. Attackers gain full control over the server so they could steal and manipulate data or attack further systems. The only requirement ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'superjson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'blitz'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.45.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/blitz-js/superjson/security/advisories/GHSA-5888-ffcr-r425'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23631'}, {'type': 'PACKAGE', 'url': 'https://github.com/blitz-js/superjson'}, {'type': 'WEB', 'url': 'https://www.sonarsource.com/blog/blitzjs-... | {'cwe_ids': ['CWE-1321', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T22:20:49Z', 'nvd_published_at': '2022-02-09T22:15:00Z'} |
1.4.0 | GHSA-wm93-f238-7v37 | 2022-02-11T20:46:10Z | 2022-02-10T00:32:44Z | null | ['CVE-2022-23576'] | Integer overflow in Tensorflow | ### Impact
The [implementation of `OpLevelCostEstimator::CalculateOutputSize`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1598-L1617) is vulnerable to an integer overflow if an attacker can create an operation which w... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wm93-f238-7v37'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23576'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/b9bd6cfd1c50e6807846af9a86f9b83cafc9c8ae'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T20:23:17Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-5gjm-fj42-x983 | 2023-09-15T18:11:15Z | 2022-02-15T01:57:18Z | null | ['CVE-2018-1098'] | etcd Cross-site Request Forgery (CSRF) | A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an at... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1098'}, {'type': 'WEB', 'url': 'https://github.com/coreos/etcd/issues/9353'}, {'type': 'WEB', 'url': 'https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T18:17:42Z', 'nvd_published_at': '2018-04-03T16:29:00Z'} |
1.4.0 | GHSA-wqv3-8cm6-h6wg | 2023-01-06T22:23:41Z | 2022-02-15T01:57:18Z | null | ['CVE-2020-8558'] | Improper Authentication in Kubernetes | A security issue was discovered in the Kubelet and kube-proxy components of Kubernetes which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. For example, if a cluster administrator runs a TCP service on a node that listens on 127.0.0.1:1234,... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.18.0'}, {'fixed': '1.18.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.17.0'}, {'fixed': '1.17.7'}]}]}, {'pac... | [{'type': 'WEB', 'url': 'https://github.com/bottlerocket-os/bottlerocket/security/advisories/GHSA-wqv3-8cm6-h6wg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8558'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/92315'}, {'type': 'WEB', 'url': 'https://bugzilla.red... | {'cwe_ids': ['CWE-420'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T19:30:36Z', 'nvd_published_at': '2020-07-27T20:15:00Z'} |
1.4.0 | GHSA-7x22-pmw5-66mq | 2022-01-28T22:22:26Z | 2022-02-01T00:44:14Z | null | ['CVE-2021-4172'] | Cross-site Scripting in showdoc | Stored XSS via upload attachment with format .svg in File Library. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4172'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/409c8a1208bbb847046a9496303192980f2e6219'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c041b693-877b... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T22:22:26Z', 'nvd_published_at': '2022-01-22T12:15:00Z'} |
1.4.0 | GHSA-7f33-f4f5-xwgw | 2023-02-07T21:22:51Z | 2022-02-11T23:23:13Z | null | ['CVE-2020-8912'] | In-band key negotiation issue in AWS S3 Crypto SDK for golang | ### Summary
The golang AWS S3 Crypto SDK is impacted by an issue that can result in loss of confidentiality and message forgery. The attack requires write access to the bucket in question, and that the attacker has access to an endpoint that reveals decryption failures (without revealing the plaintext) and that when e... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/aws/aws-sdk-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.34.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/google/security-research/security/advisories/GHSA-7f33-f4f5-xwgw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8912'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-go/pull/3403'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-go/... | {'cwe_ids': ['CWE-327'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T18:08:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9c78-vcq7-7vxq | 2022-02-11T15:07:45Z | 2022-02-09T23:53:47Z | null | ['CVE-2022-23561'] | Out of bounds write in TFLite | ### Impact
An attacker can craft a TFLite model that would cause a write outside of bounds of an array in TFLite. In fact, the attacker can override the linked list used by the memory allocator. This can be leveraged for an arbitrary write primitive under certain conditions.
### Patches
We have patched the issue in G... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c78-vcq7-7vxq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23561'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/6c0b2b70eeee588591680f5b7d5d38175fd7cdf6'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:47:32Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-rhcw-wjcm-9h6g | 2021-03-31T23:48:27Z | 2022-02-09T00:54:12Z | null | ['CVE-2020-27782'] | Denial of service in Undertow | A flaw was found in the Undertow AJP connector. Malicious requests and abrupt connection closes could be triggered by an attacker using query strings with non-RFC compliant characters resulting in a denial of service. The highest threat from this vulnerability is to system availability. This affects Undertow 2.1.5.SP1,... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27782'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/pull/997/commits/98a9ab7f2d7fe7a7254eaf17d47816c452169c90'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1901304'}, {'type': 'WEB', 'url': 'https://iss... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T23:48:27Z', 'nvd_published_at': '2021-02-23T19:15:00Z'} |
1.4.0 | GHSA-whww-v56c-cgv2 | 2021-05-10T21:50:14Z | 2022-02-10T22:39:17Z | null | ['CVE-2020-1948'] | Deserialization of Untrusted Data in Apache Dubbo | This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.7'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1948'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbaa41711b3e7a8cd20e9013737423ddd079ddc12f90180f86e76523c%40%3Csecurity.dubbo.apache.org%3E'}, {'type': 'WEB', 'url': 'https://nsfocusglobal.com/apache-dubbo-remote-code-execution... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-10T21:50:14Z', 'nvd_published_at': '2020-07-14T14:15:00Z'} |
1.4.0 | GHSA-wmrx-57hm-mw7r | 2022-03-24T22:47:39Z | 2022-02-18T00:00:34Z | null | ['CVE-2022-24683'] | Arbitrary file reads in HashiCorp Nomad | Nomad is an easy-to-use, flexible, and performant workload orchestrator that can deploy a mix of microservice, batch, containerized, and non-containerized applications. HashiCorp Nomad and Nomad Enterprise 0.9.2 through 1.0.17, 1.1.11, and 1.2.5 allow operators with read-fs and alloc-exec (or job-submit) capabilities t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.2'}, {'fixed': '1.0.18'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24683'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/commit/1aa46c3796e924b72eb45a7f02dae32df0c1179c'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/commit/b3c0e6a7a53d624003698b48b6c59739552c3721'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:36:15Z', 'nvd_published_at': '2022-02-17T17:15:00Z'} |
1.4.0 | GHSA-8vwm-8vj8-rqjf | 2022-03-01T19:27:43Z | 2022-02-26T00:00:44Z | null | ['CVE-2022-25327'] | User login denial of service in github.com/google/fscrypt | The PAM module for fscrypt doesn't adequately validate fscrypt metadata files, allowing users to create malicious metadata files that prevent other users from logging in. A local user can cause a denial of service by creating a fscrypt metadata file that prevents other users from logging into the system. We recommend u... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/google/fscrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25327'}, {'type': 'WEB', 'url': 'https://github.com/google/fscrypt/pull/346'}, {'type': 'WEB', 'url': 'https://github.com/google/fscrypt/commit/91aa3ebf42032ca783c41f9ec25d885875f66ddb'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/fscryp... | {'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:27:43Z', 'nvd_published_at': '2022-02-25T11:15:00Z'} |
1.4.0 | GHSA-cg57-p69r-3m7p | 2021-05-19T17:48:44Z | 2022-02-10T23:46:51Z | null | ['CVE-2021-32622'] | Improper file handling in matrix-react-sdk | Matrix-React-SDK is a react-based SDK for inserting a Matrix chat/voip client into a web page. Before version 3.21.0, when uploading a file, the local file preview can lead to execution of scripts embedded in the uploaded file. This can only occur after several user interactions to open the preview in a separate tab. T... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'matrix-react-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.21.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-8796-gc9j-63rv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32622'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/pull/5981'}, {'type': 'WEB', 'url': 'https://www.npmjs... | {'cwe_ids': ['CWE-434', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T17:48:44Z', 'nvd_published_at': '2021-05-17T20:15:00Z'} |
1.4.0 | GHSA-g8j8-mgh9-q77p | 2022-03-01T21:32:31Z | 2022-02-19T00:01:25Z | null | ['CVE-2021-46036'] | File upload leading to RCE in MCMS | An arbitrary file upload vulnerability in the component /ms/file/uploadTemplate.do of MCMS v5.2.4 allows attackers to execute arbitrary code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46036'}, {'type': 'WEB', 'url': 'https://lycshub.github.io/2021/12/28/MCMS-vulnerabilities/'}] | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:29:04Z', 'nvd_published_at': '2022-02-18T19:15:00Z'} |
1.4.0 | GHSA-qh2g-7h5p-mxf4 | 2021-04-05T21:49:45Z | 2022-02-09T22:05:39Z | null | ['CVE-2020-1958'] | Credentials bypass in Apache Druid | When LDAP authentication is enabled in Apache Druid 0.17.0, callers of Druid APIs with a valid set of LDAP credentials can bypass the credentialsValidator.userSearch filter barrier that determines if a valid LDAP user is allowed to authenticate with Druid. They are still subject to role-based authorization checks, if c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.druid:druid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.17.0'}, {'fixed': '0.17.1'}]}], 'versions': ['0.17.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1958'}, {'type': 'WEB', 'url': 'https://github.com/apache/druid/pull/9600#issuecomment-607497875'}, {'type': 'WEB', 'url': 'https://github.com/apache/druid/commit/dbaabdd24710fef726c5730c609937706f456a44#diff-fab6b7a8a160a405e787690201aade546296155... | {'cwe_ids': ['CWE-200', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T21:49:45Z', 'nvd_published_at': '2020-04-01T22:15:00Z'} |
1.4.0 | GHSA-mv5c-724f-3fq7 | 2022-12-01T22:19:55Z | 2022-02-16T00:01:18Z | null | ['CVE-2022-25203'] | Stored Cross-site Scripting vulnerability in Jenkins Team Views Plugin | Jenkins Team Views Plugin 0.9.0 and earlier does not escape team names, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Read permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.sonymobile.jenkins.plugins.teamviews:team-views'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25203'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/team-views-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2324'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:19:55Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-mv26-cx23-vrfg | 2022-02-09T22:27:07Z | 2022-02-09T00:00:31Z | null | ['CVE-2022-0508'] | Server-Side Request Forgery in @peertube/embed-api | @peertube/embed-api version 4.0.0 and prior is vulnerable to server-side request forgery. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@peertube/embed-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0-rc.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0508'}, {'type': 'WEB', 'url': 'https://github.com/chocobozzz/peertube/commit/f33e515991a32885622b217bf2ed1d1b0d9d6832'}, {'type': 'PACKAGE', 'url': 'https://github.com/chocobozzz/peertube'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c3724... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T22:27:07Z', 'nvd_published_at': '2022-02-08T11:15:00Z'} |
1.4.0 | GHSA-4v9w-pvwr-38h3 | 2021-07-28T21:54:53Z | 2022-02-10T23:36:54Z | null | ['CVE-2020-7621'] | OS Command Injection in strong-nginx-controller | strong-nginx-controller through 1.0.2 is vulnerable to Command Injection. It allows execution of arbitrary command as part of the '_nginxCmd()' function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'strong-nginx-controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7621'}, {'type': 'WEB', 'url': 'https://github.com/strongloop/strong-nginx-controller/blob/master/lib/server.js#L65,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-STRONGNGINXCONTROLLER-564248'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T15:21:47Z', 'nvd_published_at': '2020-04-02T21:15:00Z'} |
1.4.0 | GHSA-57qf-82hh-2hmc | 2022-02-14T22:30:19Z | 2022-02-07T00:00:30Z | null | ['CVE-2022-0502'] | Cross-site Scripting in LiveHelperChat | LiveHelperChat prior to version 3.93 is vulnerable to cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.93'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0502'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/d3b107aaa8ec10816acc762d60e7321079c21706'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-08T16:53:59Z', 'nvd_published_at': '2022-02-06T11:15:00Z'} |
1.4.0 | GHSA-rrp4-2xx3-mv29 | 2022-02-07T21:07:25Z | 2022-02-01T00:47:33Z | null | ['CVE-2022-21687'] | Command injection in gh-ost | Gh-ost version <= 1.1.2 allows users to inject DSN strings via the `-database` parameter.
This is a low severity vulnerability as the attacker must have access to the target host or trick an administrator into executing a malicious `gh-ost` command on a host running `gh-ost`, plus network access from host running `gh-... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/github/gh-ost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/github/gh-ost/security/advisories/GHSA-rrp4-2xx3-mv29'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21687'}, {'type': 'WEB', 'url': 'https://github.com/github/gh-ost/commit/a91ab042de013cfd8fbb633763438932d9080d8f'}, {'type': 'PACKAGE', 'url': 'htt... | {'cwe_ids': ['CWE-20', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T20:45:59Z', 'nvd_published_at': '2022-02-01T12:15:00Z'} |
1.4.0 | GHSA-4hvf-hxvg-f67v | 2022-02-11T15:07:59Z | 2022-02-09T23:53:30Z | null | ['CVE-2022-23560'] | Read and Write outside of bounds in TensorFlow | ### Impact
An attacker can craft a TFLite model that would allow limited reads and writes outside of arrays in TFLite. This exploits missing validation in [the conversion from sparse tensors to dense tensors](https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hvf-hxvg-f67v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23560'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/6364463d6f5b6254cac3d6aedf999b6a96225038'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:41:13Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-h676-pjr4-hgqx | 2022-02-23T15:52:20Z | 2022-02-12T00:00:42Z | null | ['CVE-2021-44111'] | Path Traversal in S-Cart | A Directory Traversal vulnerability exists in S-Cart 6.7 via download in sc-admin/backup. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 's-cart/s-cart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44111'}, {'type': 'WEB', 'url': 'https://github.com/s-cart/s-cart/issues/102'}, {'type': 'WEB', 'url': 'https://github.com/s-cart/core/commit/328dd312866b86144b43941dee2ad942708f70da'}, {'type': 'PACKAGE', 'url': 'https://github.com/s-cart/s-cart'}... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T15:52:20Z', 'nvd_published_at': '2022-02-11T18:15:00Z'} |
1.4.0 | GHSA-f4cj-3q3h-884r | 2022-05-05T18:01:28Z | 2022-02-09T21:21:53Z | null | ['CVE-2022-23615'] | Partial authorization bypass on document save in xwiki-platform | XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with SCRIPT right (EDIT right before XWiki 7.4) can save a document with the right of the current user which allow accessing API requiring programming right if the current user has programming right. It has... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '13.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-f4cj-3q3h-884r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23615'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/7ab0fe7b96809c7a3881454147598d46a1c9bbbe'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T21:21:53Z', 'nvd_published_at': '2022-02-09T21:15:00Z'} |
1.4.0 | GHSA-wqwf-x5cj-rg56 | 2021-05-12T18:22:09Z | 2022-02-15T01:57:18Z | null | ['CVE-2018-1002101'] | Arbitrary Command Injection | In Kubernetes versions 1.9.0-1.9.9, 1.10.0-1.10.5, and 1.11.0-1.11.1, user input was handled insecurely while setting up volume mounts on Windows nodes, which could lead to command line argument injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes/pkg/util/mount'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '1.9.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes/pkg/util/mount'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002101'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/65750'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/65751'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/commit/d6503... | {'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T18:22:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8m9g-647g-5pxw | 2021-05-07T16:04:45Z | 2022-02-15T01:57:18Z | null | ['CVE-2021-28484'] | Infinite loop in Yubico yubihsm-connector | An issue was discovered in the /api/connector endpoint handler in Yubico yubihsm-connector before 3.0.1 (in YubiHSM SDK before 2021.04). The handler did not validate the length of the request, which can lead to a state where yubihsm-connector becomes stuck in a loop waiting for the YubiHSM to send it data, preventing a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:R'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/Yubico/yubihsm-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28484'}, {'type': 'WEB', 'url': 'https://github.com/Yubico/yubihsm-connector/commit/82bdf202c53460bac9106cc9b4b34a0a16cae0ed'}, {'type': 'WEB', 'url': 'https://github.com/Yubico/yubihsm-connector/releases'}, {'type': 'WEB', 'url': 'https://www.yubi... | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T16:04:45Z', 'nvd_published_at': '2021-04-14T18:15:00Z'} |
1.4.0 | GHSA-fmvm-x8mv-47mj | 2022-02-23T15:26:32Z | 2022-02-17T17:19:18Z | null | ['CVE-2022-23646'] | Improper CSP in Image Optimization API for Next.js versions between 10.0.0 and 12.1.0 | Next.js is a React framework. Starting with version 10.0.0 and prior to version 12.1.0, Next.js is vulnerable to User Interface (UI) Misrepresentation of Critical Information. In order to be affected, the `next.config.js` file must have an `images.domains` array assigned and the image host assigned in `images.domains` ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '12.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vercel/next.js/security/advisories/GHSA-fmvm-x8mv-47mj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23646'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/pull/34075'}, {'type': 'PACKAGE', 'url': 'https://github.com/vercel/next.js'}, {... | {'cwe_ids': ['CWE-451'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-17T17:19:18Z', 'nvd_published_at': '2022-02-17T21:15:00Z'} |
1.4.0 | GHSA-qfhg-m6r8-xxpj | 2022-02-23T16:04:57Z | 2022-02-12T00:00:46Z | null | ['CVE-2020-13676'] | Incorrect Authorization in Drupal core | The QuickEdit module does not properly check access to fields in some circumstances, which can lead to unintended disclosure of field data. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.9.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.1.0'}, {'fixed': '9.1.13'}]}]}, {'pac... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13676'}, {'type': 'PACKAGE', 'url': 'https://github.com/drupal/core'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2021-009'}] | {'cwe_ids': ['CWE-284', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T16:04:57Z', 'nvd_published_at': '2022-02-11T16:15:00Z'} |
1.4.0 | GHSA-wwf6-x2rv-vxqh | 2022-12-01T22:23:35Z | 2022-02-16T00:01:19Z | null | ['CVE-2022-25201'] | Missing permission checks in Jenkins Checkmarx Plugin allow capturing credentials | Checkmarx Plugin 2022.1.2 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.checkmarx.jenkins:checkmarx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25201'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/checkmarx-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/checkmarx-plugin/releases/tag/Release_2022.1.3'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/adv... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:23:35Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-qv6q-x9vr-w7j3 | 2022-06-20T22:47:17Z | 2022-02-16T00:01:32Z | null | ['CVE-2022-25180'] | Insufficiently Protected Credentials in Jenkins Pipeline: Groovy Plugin | Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier includes password parameters from the original build in replayed builds, allowing attackers with Run/Replay permission to obtain the values of password parameters passed to previous builds of a Pipeline. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2648.2651.v230593e03e9f'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2648.va9433432b33c'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25180'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2443'}] | {'cwe_ids': ['CWE-319', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:47:17Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-6hr9-4692-fch9 | 2021-07-28T22:11:47Z | 2022-02-10T23:45:54Z | null | ['CVE-2020-7624'] | OS Command Injection in effect | effect through 1.0.4 is vulnerable to Command Injection. It allows execution of arbitrary command via the options argument. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'effect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7624'}, {'type': 'WEB', 'url': 'https://github.com/Javascipt/effect/blob/master/helper.js#L24,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-EFFECT-564256'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:10:14Z', 'nvd_published_at': '2020-04-02T22:15:00Z'} |
1.4.0 | GHSA-5946-mpw5-pqxx | 2022-03-08T18:49:35Z | 2022-02-21T00:00:20Z | null | ['CVE-2021-45083'] | Incorrect Default Permissions in Cobbler | An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. I... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45083'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/pull/2945'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/commit/10b2112db83fedfc391e900edfedc2b4e507d3f7'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bu... | {'cwe_ids': ['CWE-276'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-08T18:49:35Z', 'nvd_published_at': '2022-02-20T18:15:00Z'} |
1.4.0 | GHSA-34f9-hjfq-rr8j | 2022-02-11T17:04:52Z | 2022-02-10T00:18:53Z | null | ['CVE-2022-21729'] | Overflow and uncaught divide by zero in Tensorflow | ### Impact
The [implementation of `UnravelIndex`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/unravel_index_op.cc#L36-L135) is vulnerable to a division by zero caused by an integer overflow bug:
```python
import tensorflow as tf
tf.raw_ops.UnravelInd... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-34f9-hjfq-rr8j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21729'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/58b34c6c8250983948b5a781b426f6aa01fd47af'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T18:32:59Z', 'nvd_published_at': '2022-02-03T13:15:00Z'} |
1.4.0 | GHSA-rrx2-r989-2c43 | 2022-02-11T17:05:34Z | 2022-02-09T23:39:33Z | null | ['CVE-2022-23567'] | Integer overflows in Tensorflow | ### Impact
The [implementations of `Sparse*Cwise*` ops](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc) are vulnerable to integer overflows. These can be used to trigger large allocations (so, OOM based denial of service) ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rrx2-r989-2c43'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23567'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1b54cadd19391b60b6fcccd8d076426f7221d5e8'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T21:08:01Z', 'nvd_published_at': '2022-02-03T12:15:00Z'} |
1.4.0 | GHSA-hhrj-wp42-32v3 | 2022-02-28T22:18:00Z | 2022-02-19T00:01:36Z | null | ['CVE-2022-0660'] | Generation of Error Message Containing Sensitive Information in microweber | Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0660'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/2417bd2eda2aa2868c1dad1abf62341f22bfc20a'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0... | {'cwe_ids': ['CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T15:37:01Z', 'nvd_published_at': '2022-02-18T11:15:00Z'} |
1.4.0 | GHSA-hpmr-prr2-cqc4 | 2023-09-15T18:15:48Z | 2022-02-15T01:57:18Z | null | ['CVE-2019-11229'] | Gitea Remote Code Execution | models/repo_mirror.go in Gitea before 1.7.6 and 1.8.x before 1.8-RC3 mishandles mirror repo URL settings, leading to remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/go-gitea/gitea'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11229'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/6593'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/6595'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/releases/tag/v1.7.6'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T17:52:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4284-x26r-4hhc | 2022-03-07T13:37:09Z | 2022-02-26T00:00:44Z | null | ['CVE-2022-24947'] | Cross Site Request Forgery in Apache JSPWiki | Apache JSPWiki user preferences form is vulnerable to CSRF attacks, which can lead to account takeover. Apache JSPWiki users should upgrade to 2.11.2 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24947'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/txrgykjkpt80t57kzpbjo8kfrv8ss02c'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/02/25/1'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:38:57Z', 'nvd_published_at': '2022-02-25T09:15:00Z'} |
1.4.0 | GHSA-9f3j-pm6f-9fm5 | 2022-04-19T15:24:44Z | 2022-02-01T00:45:44Z | null | ['CVE-2022-23181'] | Race condition in Apache Tomcat | The fix for bug CVE-2020-9484 introduced a time of check time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23181'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/10/msg000... | {'cwe_ids': ['CWE-367'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T19:06:23Z', 'nvd_published_at': '2022-01-27T13:15:00Z'} |
1.4.0 | GHSA-428x-9xc2-m8mj | 2022-02-11T16:20:59Z | 2022-02-09T23:47:30Z | null | ['CVE-2022-21741'] | Division by zero in TFLite | ### Impact
An attacker can craft a TFLite model that would trigger a division by zero in [the implementation of depthwise convolutions](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/depthwise_conv.cc#L96).
The parameters of the convolution can be user c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-428x-9xc2-m8mj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21741'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e5b0eec199c2d03de54fd6a7fd9275692218e2bc'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:16:37Z', 'nvd_published_at': '2022-02-03T15:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.