schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-vpq7-m4qm-p2gp
2023-06-30T20:09:24Z
2022-02-16T00:01:45Z
null
['CVE-2022-0596']
Microweber vulnerable to Improper Validation of Specified Quantity in Input
Microweber prior to version 1.2.11 can have a negative product amount. This could allow an attacker to manipulate the total value and get products for free.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0596'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/91a9d899741557c75050614ff7adb8c0e3feb005'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f...
{'cwe_ids': ['CWE-1284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:49:11Z', 'nvd_published_at': '2022-02-15T14:15:00Z'}
1.4.0
GHSA-926x-m6m5-3mmp
2023-09-11T18:16:40Z
2022-02-09T22:50:06Z
null
['CVE-2019-10803']
push-dir Enables OS Command Injection
push-dir through 0.4.1 allows execution of arbritary commands. Arguments provided as part of the variable `opt.branch` is not validated before being provided to the `git` command within [index.js#L139](https://github.com/L33T-KR3W/push-dir/blob/master/index.js#L139). This could be abused by an attacker to inject arbitr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'push-dir'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10803'}, {'type': 'WEB', 'url': 'https://github.com/L33T-KR3W/push-dir/blob/master/index.js#L139'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-PUSHDIR-559009'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T21:01:28Z', 'nvd_published_at': '2020-02-28T21:15:00Z'}
1.4.0
GHSA-8p8q-wvxx-jq94
2022-12-01T22:10:17Z
2022-02-16T00:01:13Z
null
['CVE-2022-25211']
Missing permission check in Jenkins SWAMP Plugin allows capturing credentials
SWAMP Plugin 1.2.6 and earlier does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.continuousassurance.swamp.jenkins:swamp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25211'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/swamp-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-1988'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:10:17Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-7rcw-fwfh-2h2g
2022-06-20T22:38:43Z
2022-02-16T00:01:31Z
null
['CVE-2022-25182']
Protection Mechanism Failure in Jenkins Pipeline: Shared Groovy Libraries Plugin
A sandbox bypass vulnerability in Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier allows attackers with Item/Configure permission to execute arbitrary code on the Jenkins controller JVM using specially crafted library names if a global Pipeline library is already configured.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps-global-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '561.va_ce0de3c2d69'}]}], 'database_specific': {'last_known_affected_version_range': '<= 552.vd9cc05b8a2e1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25182'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2422'}]
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:38:43Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-q9x4-q76f-5h5j
2023-01-10T15:48:41Z
2022-02-11T23:17:25Z
null
['CVE-2019-19030']
Unauthenticated users can exploit an enumeration vulnerability in Harbor (CVE-2019-19030)
# Impact Sean Wright from Secureworks has discovered an enumeration vulnerability. An attacker can make use of the Harbor API to make unauthenticated calls to the Harbor instance. Based on the HTTP status code in the response, an attacker is then able to work out which resources exist, and which do not. This would like...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.10.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0...
[{'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories/GHSA-q9x4-q76f-5h5j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-19030'}, {'type': 'PACKAGE', 'url': 'https://github.com/goharbor/harbor/'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T18:52:37Z', 'nvd_published_at': '2022-12-26T22:15:00Z'}
1.4.0
GHSA-9wvh-ff5f-xjpj
2021-05-17T16:40:42Z
2022-02-15T01:57:18Z
null
['CVE-2019-16097']
Missing Authorization in Harbor
core/api/user.go in Harbor 1.7.0 through 1.8.2 allows non-admin users to create admin accounts via the POST /api/users API. This is fixed in 1.9.0-rc1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.7.0'}, {'fixed': '1.9.0-rc1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.9'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-16097'}, {'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/commit/b6db8a8a106259ec9a2c48be8a380cb3b37cf517'}, {'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/compare/v1.8.2...v1.9.0-rc1'}, {'type': 'WEB', 'url': 'https://github....
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T16:40:42Z', 'nvd_published_at': None}
1.4.0
GHSA-pfr3-87q3-65rc
2023-09-11T16:23:54Z
2022-02-10T23:46:28Z
null
['CVE-2021-33041']
Cross-site Scripting in vmd
vmd through 1.34.0 allows `div class="markdown-body"` XSS, as demonstrated by Electron remote code execution via `require('child_process').execSync('calc.exe')` on Windows and a similar attack on macOS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'vmd'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.34.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-33041'}, {'type': 'WEB', 'url': 'https://github.com/yoshuawuyts/vmd/issues/137'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/vmd'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T17:45:57Z', 'nvd_published_at': '2021-05-17T17:15:00Z'}
1.4.0
GHSA-9689-rx4v-cqgc
2023-09-15T18:07:59Z
2022-02-15T01:57:18Z
null
['CVE-2018-15798']
Pivotal Concourse Open Redirect in Login Flow
Pivotal Concourse Release, versions 4.x prior to 4.2.2, login flow allows redirects to untrusted websites. A remote unauthenticated attacker could convince a user to click on a link using the oAuth redirect link with an untrusted website and gain access to that user's access token in Concourse.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/concourse/skymarshal/skyserver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/concourse/skymarshal...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-15798'}, {'type': 'WEB', 'url': 'https://github.com/concourse/concourse/pull/5350/commits/38cb4cc025e5ed28764b4adc363a0bbf41f3c7cb'}, {'type': 'WEB', 'url': 'https://github.com/concourse/concourse/blob/release/5.2.x/release-notes/v5.2.8.md'}, {'typ...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T18:15:16Z', 'nvd_published_at': None}
1.4.0
GHSA-mf22-92pm-m8p8
2022-03-09T21:12:59Z
2022-02-25T15:36:47Z
null
['CVE-2022-24709']
Cross site scripting in @awsui/components-react
### Impact Components could potentially allow cross-site scripting (XSS) in certain circumstances. These components could render content without adequate neutralization. ### Patches Fixed in 3.0.367.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@awsui/components-react'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.367'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/aws/awsui-documentation/security/advisories/GHSA-mf22-92pm-m8p8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24709'}, {'type': 'PACKAGE', 'url': 'https://github.com/aws/awsui-documentation/'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T15:36:47Z', 'nvd_published_at': '2022-02-24T20:15:00Z'}
1.4.0
GHSA-99cg-575x-774p
2023-08-29T20:29:19Z
2022-02-01T00:43:17Z
null
['CVE-2022-0317']
Go-Attestation Improper Input Validation with attacker-controlled TPM Quote
### Impact An improper input validation vulnerability in go-attestation before 0.4.0 allows local users to provide a maliciously-formed Quote over no/some PCRs, causing `AKPublic.Verify` to succeed despite the inconsistency. Subsequent use of the same set of PCR values in `Eventlog.Verify` lacks the authentication per...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/google/go-attestation'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/google/go-attestation/security/advisories/GHSA-99cg-575x-774p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0317'}, {'type': 'WEB', 'url': 'https://github.com/google/go-attestation/commit/82f2c9c2c76e1d3691d17ee78116d1d93a123788'}, {'type': 'PACKAG...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T22:15:30Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-pv7r-9vjg-g3f9
2023-06-19T17:00:46Z
2022-02-11T00:00:47Z
2023-06-19T17:00:46Z
[]
Duplicate advisory: swift-nio-http2 vulnerable to denial of service via invalid HTTP/2 HEADERS frame length
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-pgfx-g6rc-8cjv. This link is maintained to preserve external references. ## Original Description A program using swift-nio-http2 is vulnerable to a denial of service attack, caused by a network peer sending a specially crafted H...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-nio-http2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.19.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-http2/security/advisories/GHSA-ccw9-q5h2-8c2w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24666'}, {'type': 'PACKAGE', 'url': 'https://github.com/apple/swift-nio-http2'}]
{'cwe_ids': ['CWE-130'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T17:00:46Z', 'nvd_published_at': '2022-02-09T23:15:00Z'}
1.4.0
GHSA-8r7c-3cm2-3h8f
2022-02-11T20:39:19Z
2022-02-10T00:33:13Z
null
['CVE-2022-23578']
Memory leak in Tensorflow
### Impact If a graph node is invalid, TensorFlow can leak memory in the [implementation of `ImmutableExecutorState::Initialize`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/common_runtime/immutable_executor_state.cc#L84-L262): ```cc Status s = params_.create_...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8r7c-3cm2-3h8f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23578'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c79ccba517dbb1a0ccb9b01ee3bd2a63748b60dd'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-401'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T20:15:02Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-g9fx-6j5c-grmw
2023-05-25T13:24:03Z
2022-02-16T00:01:36Z
null
['CVE-2022-25174']
Improper Neutralization of Special Elements used in an OS Command in Jenkins Pipeline: Shared Groovy Libraries Plugin
Jenkins Pipeline: Shared Groovy Libraries Plugin prior to 561.va_ce0de3c2d69, 2.21.1, and 2.18.1 uses the same checkout directories for distinct SCMs for Pipeline libraries, allowing attackers with Item/Configure permission to invoke arbitrary OS commands on the controller through crafted SCM contents.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps-global-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '544.vff04fa68714d'}, {'fixed': '561.va'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps-global-lib'}, 'ranges...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25174'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/e19344451ce1c4a4181b9f094b8fd38cd8d86c9f/2022/25xxx/CVE-2022-25174.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2463'}]
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:48:09Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-g2qx-6ghw-67hm
2021-05-20T22:20:34Z
2022-02-15T00:33:30Z
null
['CVE-2020-13246']
Denial of Service in Gitea
An issue was discovered in Gitea in which an attacker can trigger a deadlock by initiating a transfer of a repository's ownership from one organization to another.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/go-gitea/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13246'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/issues/10549'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/11438'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=DmVgADSVS88'}]
{'cwe_ids': ['CWE-667'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T22:20:34Z', 'nvd_published_at': None}
1.4.0
GHSA-8cxv-76p7-jxwr
2022-02-11T20:45:58Z
2022-02-10T00:32:29Z
null
['CVE-2022-23577']
Null-dereference in Tensorflow
### Impact The [implementation of `GetInitOp`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/cc/saved_model/loader_util.cc#L31-L61) is vulnerable to a crash caused by dereferencing a null pointer: ```cc const auto& init_op_sig_it = meta_graph_def.signature_def()....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-8cxv-76p7-jxwr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23577'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/4f38b1ac8e42727e18a2f0bde06d3bee8e77b250'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T20:26:34Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-rvpc-w57p-q95f
2021-04-07T21:38:25Z
2022-02-09T22:35:29Z
null
['CVE-2019-10797']
HTTP Response Splitting in WSO2 transport-http
Netty in WSO2 transport-http before v6.3.1 is vulnerable to HTTP Response Splitting due to HTTP Header validation being disabled.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wso2.transport.http:org.wso2.transport.http.netty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10797'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWSO2TRANSPORTHTTP-548944'}]
{'cwe_ids': ['CWE-113'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T21:38:25Z', 'nvd_published_at': '2020-02-19T19:15:00Z'}
1.4.0
GHSA-j7m2-58wv-9v79
2021-10-05T16:28:48Z
2022-02-10T20:47:29Z
null
['CVE-2019-11343']
Vulnerability in Torpedo Query
Torpedo Query before 2.5.3 mishandles the LIKE operator in ConditionBuilder.java, LikeCondition.java, and NotLikeCondition.java.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.torpedoquery:org.torpedoquery'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11343'}, {'type': 'WEB', 'url': 'https://github.com/xjodoin/torpedoquery/commit/3c20b874fba9cc2a78b9ace10208de1602b56c3f'}, {'type': 'PACKAGE', 'url': 'https://github.com/xjodoin/torpedoquery/'}, {'type': 'WEB', 'url': 'https://github.com/xjodoin/t...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T18:10:05Z', 'nvd_published_at': '2020-03-12T21:15:00Z'}
1.4.0
GHSA-2phq-ghf8-6586
2022-12-02T21:11:18Z
2022-02-16T00:01:24Z
null
['CVE-2022-25193']
Jenkins Snow Commander Plugin prior to 2.0 vulnerable to Missing Authorization
Snow Commander Plugin 1.10 and earlier does not perform permission checks in methods implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in J...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:embotics-vcommander'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25193'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/snowsoftware-commander-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2536'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:26:21Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-p867-fxfr-ph2w
2022-03-08T18:25:02Z
2022-02-24T12:08:24Z
null
['CVE-2022-23651']
b2-sdk-python TOCTOU application key disclosure
### Impact Linux and Mac releases of the SDK version 1.14.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. SDK users of the `SqliteAccountInfo` format are vulnerable while users of the `InMe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'b2sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Backblaze/b2-sdk-python/security/advisories/GHSA-p867-fxfr-ph2w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23651'}, {'type': 'WEB', 'url': 'https://github.com/Backblaze/b2-sdk-python/commit/62476638986e5b6d7459aca5ef8ce220760226e0'}, {'type': 'P...
{'cwe_ids': ['CWE-367'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T12:08:24Z', 'nvd_published_at': '2022-02-23T23:15:00Z'}
1.4.0
GHSA-8j3f-mhq8-gmh4
2022-08-15T20:02:53Z
2022-02-15T01:57:18Z
null
['CVE-2021-21432']
Reject unauthorized access with GitHub PATs
### Impact _What kind of vulnerability is it? Who is impacted?_ The additional auth mechanism added within https://github.com/go-vela/server/pull/246 enables some malicious user to obtain secrets utilizing the injected credentials within the `~/.netrc` file. Steps to reproduce 1. Create Vela server 2. Login to Vela U...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/go-vela/server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '0.7.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/go-vela/server/api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '0....
[{'type': 'WEB', 'url': 'https://github.com/go-vela/server/security/advisories/GHSA-8j3f-mhq8-gmh4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21432'}, {'type': 'WEB', 'url': 'https://github.com/go-vela/server/pull/337'}, {'type': 'WEB', 'url': 'https://github.com/go-vela/server/commit/cb4...
{'cwe_ids': ['CWE-285', 'CWE-862', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:12:26Z', 'nvd_published_at': '2021-04-09T18:15:00Z'}
1.4.0
GHSA-3949-f494-cm99
2022-02-22T19:32:18Z
2022-02-22T19:32:18Z
null
['CVE-2022-23647']
Cross-site Scripting in Prism
### Impact Prism's [Command line plugin](https://prismjs.com/plugins/command-line/) can be used by attackers to achieve an XSS attack. The Command line plugin did not properly escape its output, leading to the input text being inserted into the DOM as HTML code. Server-side usage of Prism is not impacted. Websites tha...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'prismjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.14.0'}, {'fixed': '1.27.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/PrismJS/prism/security/advisories/GHSA-3949-f494-cm99'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23647'}, {'type': 'WEB', 'url': 'https://github.com/PrismJS/prism/pull/3341'}, {'type': 'WEB', 'url': 'https://github.com/PrismJS/prism/commit/e002e...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T19:32:18Z', 'nvd_published_at': '2022-02-18T15:15:00Z'}
1.4.0
GHSA-66gw-ch5v-74v8
2021-04-05T20:50:26Z
2022-02-09T22:01:32Z
null
['CVE-2020-13947']
Cross-site scripting (XSS) in Apache ActiveMQ
An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the message.jsp page of Apache ActiveMQ versions 5.15.12 through 5.16.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.16.0'}, {'fixed': '5.16.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:activemq-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13947'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r021c490028f61c8b6f7e38efb98e61693b0cbb6b99b02238c6fc7d66@%3Ccommits.activemq.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra66791f1f2b59fa651a81...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T20:50:26Z', 'nvd_published_at': '2021-02-08T22:15:00Z'}
1.4.0
GHSA-pfwp-q984-w7wh
2022-06-20T22:36:46Z
2022-02-16T00:01:31Z
null
['CVE-2022-25183']
Protection Mechanism Failure in Jenkins Pipeline: Shared Groovy Libraries Plugin
Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier uses the names of Pipeline libraries to create cache directories without any sanitization, allowing attackers with Item/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM using specially crafted libra...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps-global-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '561.va_ce0de3c2d69'}]}], 'database_specific': {'last_known_affected_version_range': '<= 552.vd9cc05b8a2e1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25183'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2586'}]
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:36:46Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-v6fq-q792-j46j
2021-04-14T19:36:05Z
2022-02-09T23:20:47Z
null
['CVE-2020-11975']
Improper Input Validation in Apache Unomi
Apache Unomi allows conditions to use OGNL scripting which offers the possibility to call static Java classes from the JDK that could execute code with the permission level of the running Java process.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.unomi:unomi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11975'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r01021bc4b25c1e98812efca0b07f0e078a6281bd52f7c3817a429d95@%3Ccommits.unomi.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r79672c25e0ef9bb4b9148376...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T19:36:05Z', 'nvd_published_at': '2020-06-05T15:15:00Z'}
1.4.0
GHSA-gwcx-jrx4-92w2
2022-05-26T20:05:00Z
2022-02-09T23:32:08Z
null
['CVE-2022-23593']
Segfault in `simplifyBroadcast` in Tensorflow
### Impact The [`simplifyBroadcast` function in the MLIR-TFRT infrastructure in TensorFlow](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/compiler/mlir/tfrt/jit/transforms/tf_cpurt_symbolic_shape_optimization.cc#L149-L205) is vulnerable to a segfault (hence, denial of...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0-rc0'}, {'fixed': '2.8.0'}]}], 'versions': ['2.8.0-rc0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0-rc0'}, {'fi...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gwcx-jrx4-92w2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23593'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/35f0fabb4c178253a964d7aabdbb15c6a398b69a'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T18:15:07Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-8fvr-5rqf-3wwh
2021-05-19T22:47:32Z
2022-02-15T01:57:18Z
null
['CVE-2015-3630']
Information Exposure in Docker Engine
Docker Engine before 1.6.1 uses weak permissions for (1) /proc/asound, (2) /proc/timer_stats, (3) /proc/latency_stats, and (4) /proc/fs, which allows local users to modify the host, obtain sensitive information, and perform protocol downgrade attacks via a crafted image.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/moby/moby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0'}, {'fixed': '1.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3630'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/commit/545b440a80f676a506e5837678dd4c4f65e78660'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!searchin/docker-user/1.6.1/docker-user/47GZrihtr-4/nwgeOOFLexIJ'}, {'type': 'W...
{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:47:32Z', 'nvd_published_at': None}
1.4.0
GHSA-6jm6-cmcp-fqjq
2022-04-04T20:33:50Z
2022-02-16T00:01:42Z
null
['CVE-2022-24684']
Nomad Spread Job Stanza May Trigger Panic in Servers
Nomad and Nomad Enterprise allows operators with job-submit capabilities to use the spread stanza in a way such that it can cause panic in Nomad servers. This vulnerability, CVE-2022-24684, was fixed in Nomad 1.0.18, 1.1.12, and 1.2.6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '1.0.18'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24684'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-04-nomad-spread-job-stanza-may-trigger-panic-in-servers/'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-04-nomad-spread-job-stanza-may-trigger-panic-...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-04T20:33:50Z', 'nvd_published_at': '2022-02-15T15:15:00Z'}
1.4.0
GHSA-hv53-vf5m-8q94
2022-09-19T22:53:33Z
2022-02-11T23:28:20Z
null
[]
personnummer/go vulnerable to Improper Input Validation
This vulnerability was reported to the personnummer team in June 2020. The slow response was due to locked ownership of some of the affected packages, which caused delays to update packages prior to disclosure. The vulnerability is determined to be low severity. ### Impact This vulnerability impacts users who rely o...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/personnummer/go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/personnummer/go/security/advisories/GHSA-hv53-vf5m-8q94'}, {'type': 'PACKAGE', 'url': 'https://github.com/personnummer/go/'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/github.com/personnummer/go'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T17:26:30Z', 'nvd_published_at': None}
1.4.0
GHSA-rmj8-8hhh-gv5h
2022-08-16T19:43:34Z
2022-02-11T21:33:23Z
null
['CVE-2022-23634']
Puma used with Rails may lead to Information Exposure
### Impact Prior to `puma` version `5.6.2`, `puma` may not always call `close` on the response body. Rails, prior to version `7.0.2.2`, depended on the response body being closed in order for its `CurrentAttributes` implementation to work correctly. From Rails: > Under certain circumstances response bodies will not b...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.6.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.11'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-rmj8-8hhh-gv5h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23634'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/commit/b70f451fe8abc0cff192c065d549778452e155bb'}, {'type': 'ADVISORY', 'url': 'https://gi...
{'cwe_ids': ['CWE-200', 'CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-11T21:33:23Z', 'nvd_published_at': '2022-02-11T22:15:00Z'}
1.4.0
GHSA-px4w-rcv2-6x8x
2021-04-06T20:02:19Z
2022-02-09T22:19:00Z
null
['CVE-2020-17532']
Arbitrary code execution in Apache ServiceComb java-chassis
When handler-router component is enabled in servicecomb-java-chassis, authenticated user may inject some data and cause arbitrary code execution. The problem happens in versions between 2.0.0 ~ 2.1.3 and fixed in Apache ServiceComb-Java-Chassis 2.1.5
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.servicecomb:java-chassis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.3.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.servicecomb:java-chassis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17532'}, {'type': 'WEB', 'url': 'https://github.com/apache/servicecomb-java-chassis/commit/839a52e27c754cb5ce14f20063902f21065bd26c'}, {'type': 'WEB', 'url': 'https://github.com/apache/servicecomb-java-chassis/commit/ba4fb37b6ab8bd3a6c3d0693f295d99...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T20:02:19Z', 'nvd_published_at': '2021-01-25T10:16:00Z'}
1.4.0
GHSA-mm6g-mmq6-53ff
2022-02-08T19:44:19Z
2022-02-01T16:23:00Z
null
['CVE-2021-32842']
Path Traversal in SharpZipLib
SharpZipLib (or #ziplib) is a Zip, GZip, Tar and BZip2 library. Starting version 1.0.0 and prior to version 1.3.3, a check was added if the destination file is under a destination directory. However, it is not enforced that `_baseDirectory` ends with slash. If the _baseDirectory is not slash terminated like `/home/user...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'SharpZipLib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32842'}, {'type': 'PACKAGE', 'url': 'https://github.com/icsharpcode/SharpZipLib'}, {'type': 'WEB', 'url': 'https://github.com/icsharpcode/SharpZipLib/releases/tag/v1.3.3'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-01T16:22:12Z', 'nvd_published_at': '2022-01-26T21:15:00Z'}
1.4.0
GHSA-v88g-cgmw-v5xw
2022-12-03T03:40:56Z
2022-02-10T23:30:59Z
null
['CVE-2020-15366']
Prototype Pollution in Ajv
An issue was discovered in ajv.validate() in Ajv (aka Another JSON Schema Validator) 6.12.2. A carefully crafted JSON schema could be provided that allows execution of other code by prototype pollution. (While untrusted schemas are recommended against, the worst case of an untrusted schema should be a denial of service...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'ajv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.12.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15366'}, {'type': 'WEB', 'url': 'https://github.com/ajv-validator/ajv/commit/65b2f7d76b190ac63a0d4e9154c712d7aa37049f'}, {'type': 'PACKAGE', 'url': 'https://github.com/ajv-validator/ajv'}, {'type': 'WEB', 'url': 'https://github.com/ajv-validator/aj...
{'cwe_ids': ['CWE-1321', 'CWE-915'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-10T21:23:41Z', 'nvd_published_at': '2020-07-15T20:15:00Z'}
1.4.0
GHSA-wfj5-2mqr-7jvv
2021-07-29T18:20:14Z
2022-02-10T23:06:57Z
null
['CVE-2020-9296']
Expression Language Injection in Netflix Conductor
Netflix Conductor uses Java Bean Validation (JSR 380) custom constraint validators. When building custom constraint violation error messages, different types of interpolation are supported, including Java EL expressions. If an attacker can inject arbitrary data in the error message template being passed to ConstraintVa...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.netflix.conductor:conductor-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.25.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.25.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9296'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-001.md'}, {'type': 'WEB', 'url': 'https://github.com/Netflix/security-bulletins/blob/master/advisories/nflx-2020-002.md'}]
{'cwe_ids': ['CWE-917'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T14:18:14Z', 'nvd_published_at': '2020-06-16T14:15:00Z'}
1.4.0
GHSA-w9mp-p2wp-2xf7
2021-04-22T23:05:56Z
2022-02-10T20:35:42Z
null
['CVE-2020-13953']
Improper file downloads in Apache Tapestry
In Apache Tapestry from 5.4.0 to 5.5.0, crafting specific URLs, an attacker can download files inside the WEB-INF folder of the WAR being run.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0'}, {'fixed': '5.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13953'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r37dab61fc7f7088d4311e7f995ef4117d58d86a675f0256caa6991eb@%3Cusers.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r50eb12e8a12074a9b7ed63c...
{'cwe_ids': ['CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T23:05:56Z', 'nvd_published_at': '2020-09-30T18:15:00Z'}
1.4.0
GHSA-8v38-pw62-9cw2
2023-09-11T22:51:42Z
2022-02-18T00:00:33Z
null
['CVE-2022-0639']
url-parse Incorrectly parses URLs that include an '@'
A specially crafted URL with an '@' sign but empty user info and no hostname, when parsed with url-parse, url-parse will return the incorrect href. In particular, ```js parse(\"http://@/127.0.0.1\") ``` Will return: ```yaml { slashes: true, protocol: 'http:', hash: '', query: '', pathname: '/127.0.0.1', auth: ''...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'url-parse'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0639'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/url-parse/commit/ef45a1355375a8244063793a19059b4f62fc8788'}, {'type': 'PACKAGE', 'url': 'https://github.com/unshiftio/url-parse'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/83a6b...
{'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T18:08:05Z', 'nvd_published_at': '2022-02-17T18:15:00Z'}
1.4.0
GHSA-4w5x-x539-ppf5
2023-08-29T22:09:18Z
2022-02-11T23:42:20Z
null
['CVE-2020-26892']
Incorrect handling of credential expiry by /nats-io/nats-server
## Problem Description NATS nats-server through 2020-10-07 has Incorrect Access Control because of how expired credentials are handled. The NATS accounts system has expiration timestamps on credentials; the <https://github.com/nats-io/jwt> library had an API which encouraged misuse and an `IsRevoked()` method which ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/jwt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server/v2'}, 'ecosystem_specific': {'affected_...
[{'type': 'WEB', 'url': 'https://github.com/nats-io/jwt/security/advisories/GHSA-4w5x-x539-ppf5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26892'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/jwt/commit/e11ce317263cef69619fc1ca743b195d02aa1d8a'}, {'type': 'WEB', 'url': 'https://git...
{'cwe_ids': ['CWE-798'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T21:18:09Z', 'nvd_published_at': '2020-11-06T08:15:00Z'}
1.4.0
GHSA-5f2r-qp73-37mr
2022-02-11T20:39:07Z
2022-02-10T00:33:29Z
null
['CVE-2022-23579']
`CHECK`-failures during Grappler's `SafeToRemoveIdentity` in Tensorflow
### Impact The Grappler optimizer in TensorFlow can be used to cause a denial of service by altering a `SavedModel` such that [`SafeToRemoveIdentity`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/optimizers/dependency_optimizer.cc#L59-L98) would trigger...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5f2r-qp73-37mr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23579'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/92dba16749fae36c246bec3f9ba474d9ddeb7662'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T20:12:18Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-v3mr-gp7j-pw5w
2022-02-04T17:26:40Z
2022-02-10T22:33:46Z
null
[]
Possible SQL injection in tablelookupwizard Contao Extension
### Impact The currently selected widget values were not correctly sanitized before passing it to the database, leading to an SQL injection possibility. ### Patches The issue has been patched in `tablelookupwizard` version 3.3.5 and version 4.0.0. ### For more information If you have any questions or comments about t...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'terminal42/contao-tablelookupwizard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/terminal42/contao-tablelookupwizard/security/advisories/GHSA-v3mr-gp7j-pw5w'}, {'type': 'WEB', 'url': 'https://github.com/terminal42/contao-tablelookupwizard/commit/a5e723a28f110b7df8ffc4175cef9b061d3cc717'}, {'type': 'PACKAGE', 'url': 'https://github.com/terminal42/contao-ta...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T17:26:40Z', 'nvd_published_at': None}
1.4.0
GHSA-287r-574x-f4h4
2023-07-12T00:23:24Z
2022-02-02T00:01:46Z
null
['CVE-2021-45416']
RosarioSIS XSS Vulnerability
Reflected Cross-site scripting (XSS) vulnerability in RosarioSIS 8.2.1 allows attackers to inject arbitrary HTML via the search_term parameter in the modules/Scheduling/Courses.php script.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.2.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45416'}, {'type': 'WEB', 'url': 'https://github.com/86x/CVE-2021-45416'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/-/commit/aec018065ca12ecef03ee454a8112f992ea35315'}, {'type': 'WEB', 'url': 'https://www.youtube.com/wat...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T00:23:24Z', 'nvd_published_at': '2022-02-01T13:15:00Z'}
1.4.0
GHSA-pwwm-pwx2-2hw7
2022-02-22T18:12:11Z
2022-02-18T00:00:37Z
null
['CVE-2022-0622']
Generation of Error Message Containing Sensitive Information in Snipe-IT
Snipe-IT prior to version 5.3.11 is vulnerable to Generation of Error Message Containing Sensitive Information.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0622'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/178e44095141ab805c282f563fb088df1a10b2e2'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4ed99dab-5319-4...
{'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T18:12:11Z', 'nvd_published_at': '2022-02-17T02:15:00Z'}
1.4.0
GHSA-4xrw-wvmq-8jmh
2021-07-28T22:30:07Z
2022-02-10T23:46:11Z
null
['CVE-2020-7627']
OS Command Injection in node-key-sender
node-key-sender through 1.0.11 is vulnerable to Command Injection. It allows execution of arbitrary commands via the 'arrParams' argument in the 'execute()' function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-key-sender'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7627'}, {'type': 'WEB', 'url': 'https://github.com/garimpeiro-it/node-key-sender/blob/master/key-sender.js#L117,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODEKEYSENDER-564261'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:40:44Z', 'nvd_published_at': '2020-04-02T22:15:00Z'}
1.4.0
GHSA-v83p-xwm9-v4g8
2021-05-11T22:24:26Z
2022-02-10T23:06:22Z
null
['CVE-2020-9495']
Injection in Apache Archiva
Apache Archiva login service before 2.2.5 is vulnerable to LDAP injection. A attacker is able to retrieve user attribute data from the connected LDAP server by providing special values to the login form. With certain characters it is possible to modify the LDAP filter used to query the LDAP users. By measuring the resp...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.archiva:archiva'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-9495'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252494a2ce3f188f59450dd8f9b6d@%3Cannounce.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r576eaabe3f772c045ec832a0200252...
{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T22:24:26Z', 'nvd_published_at': '2020-06-19T19:15:00Z'}
1.4.0
GHSA-hjp8-2cm3-cc45
2022-03-03T22:02:13Z
2022-02-24T00:00:54Z
null
['CVE-2022-0654']
Cookie exposure in requestretry
Exposure of Sensitive Information to an Unauthorized Actor in GitHub repository fgribreau/node-request-retry prior to 7.0.0 via cookies being leaked to external sites.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'requestretry'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0654'}, {'type': 'WEB', 'url': 'https://github.com/fgribreau/node-request-retry/commit/0979c6001d9d57c2aac3157c11b007397158922a'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a779faf5-c2cc-48be-a31d-4ddfac357afc'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:03:55Z', 'nvd_published_at': '2022-02-23T00:15:00Z'}
1.4.0
GHSA-9x52-887g-fhc2
2022-02-11T19:56:20Z
2022-02-09T23:32:41Z
null
['CVE-2022-23594']
Out of bounds read in Tensorflow
### Impact The [TFG dialect of TensorFlow (MLIR)](https://github.com/tensorflow/tensorflow/tree/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/core/ir/importexport) makes several assumptions about the incoming `GraphDef` before converting it to the MLIR-based dialect. If an attacker changes the `SavedModel` forma...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.1'}]}], 'versions': ['2.7.0']}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.1...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9x52-887g-fhc2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23594'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow/'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tens...
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T18:13:49Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-fm6q-97gw-c4wh
2022-12-01T23:35:47Z
2022-02-16T00:01:28Z
null
['CVE-2022-25186']
Agent-to-controller security bypass in Jenkins HashiCorp Vault Plugin
Jenkins HashiCorp Vault Plugin 3.8.0 and earlier implements functionality that allows agent processes to retrieve any Vault secrets for use on the agent, allowing attackers able to control agent processes to obtain Vault secrets for an attacker-specified path and key.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.datapipe.jenkins.plugins:hashicorp-vault-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '336.v182c0fbaaeb7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.8.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25186'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/hashicorp-vault-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2429'}]
{'cwe_ids': ['CWE-693'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:47:15Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-h6gw-r52c-724r
2022-02-03T23:09:44Z
2022-02-09T23:38:36Z
null
[]
NULL Pointer Dereference and Access of Uninitialized Pointer in TensorFlow
### Impact The [code for boosted trees in TensorFlow](https://github.com/tensorflow/tensorflow/blob/e0b6e58c328059829c3eb968136f17aa72b6c876/tensorflow/core/kernels/boosted_trees/stats_ops.cc) is still missing validation. This allows malicious users to read and write outside of bounds of heap allocated data as well as...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-57wx-m983-2f88'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h6gw-r52c-724r'}, {'type': 'PACKAGE', 'url': 'https://github.com/tensorflow/tensorflow'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-476', 'CWE-824'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T23:09:44Z', 'nvd_published_at': None}
1.4.0
GHSA-pc58-wgmc-hfjr
2022-02-09T22:49:10Z
2022-02-09T22:49:10Z
null
['CVE-2020-7792']
Prototype Pollution in mout
This affects all versions of package mout. The deepFillIn function can be used to 'fill missing properties recursively', while the deepMixIn 'mixes objects into the target object, recursively mixing existing child objects as well'. In both cases, the key used to access the target object recursively is not checked, lead...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mout'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7792'}, {'type': 'WEB', 'url': 'https://github.com/mout/mout/commit/3fecf1333e6d71ae72edf48c71dc665e40df7605'}, {'type': 'WEB', 'url': 'https://github.com/mout/mout/blob/master/src/object/deepFillIn.js'}, {'type': 'WEB', 'url': 'https://github.com/...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-08T21:52:43Z', 'nvd_published_at': '2020-12-11T11:15:00Z'}
1.4.0
GHSA-rp34-85x3-3764
2022-02-24T13:07:04Z
2022-02-15T00:02:47Z
null
['CVE-2022-0576']
Cross-site Scripting in librenms
Cross-site Scripting (XSS) - Generic in Packagist librenms/librenms prior to 22.1.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0576'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/135717a9a05c5bf8921f1389cbb469dcbf300bfd'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/114ba055-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:42:21Z', 'nvd_published_at': '2022-02-14T12:15:00Z'}
1.4.0
GHSA-m639-9whg-fw97
2022-02-28T22:17:42Z
2022-02-19T00:01:25Z
null
['CVE-2021-23702']
Prototype Pollution in object-extend
The package object-extend from 0.0.0 through 0.5.0 is vulnerable to Prototype Pollution via object-extend.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'object-extend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23702'}, {'type': 'PACKAGE', 'url': 'https://github.com/bernhardw/object-extend'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-OBJECTEXTEND-2401470'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T20:51:50Z', 'nvd_published_at': '2022-02-18T20:15:00Z'}
1.4.0
GHSA-6w4v-qr4m-97gg
2022-03-09T21:15:50Z
2022-02-25T00:01:01Z
null
['CVE-2022-25838']
Multi-Factor Authentication issue in Laravel Fortify
Laravel Fortify before 1.11.1 allows reuse within a short time window, thus calling into question the "OT" part of the "TOTP" concept.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'laravel/fortify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25838'}, {'type': 'WEB', 'url': 'https://github.com/laravel/fortify/issues/201'}, {'type': 'WEB', 'url': 'https://github.com/laravel/fortify/issues/201#issuecomment-1009282153'}, {'type': 'WEB', 'url': 'https://github.com/laravel/fortify/pull/357'}...
{'cwe_ids': ['CWE-294'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T19:12:48Z', 'nvd_published_at': '2022-02-24T15:15:00Z'}
1.4.0
GHSA-h2fj-77wh-fh5w
2022-02-24T13:52:12Z
2022-02-17T00:00:36Z
null
['CVE-2022-0612']
Cross-site Scripting in livehelperchat
Cross-site Scripting (XSS) - Stored in Packagist remdex/livehelperchat prior to 3.93v.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.93'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0612'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/4d4f1db1701f09177896a38e43fd0c693835f03b'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-17T23:37:28Z', 'nvd_published_at': '2022-02-16T06:15:00Z'}
1.4.0
GHSA-p93c-h8qm-7256
2022-02-09T22:32:29Z
2022-02-09T22:32:29Z
null
['CVE-2020-13654']
Improper escaping in XWiki Platform
XWiki Platform before 12.8 mishandles escaping in the property displayer.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13654'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/pull/1315'}, {'type': 'WEB', 'url': 'https://cve.anastasi.link/cve-2020-13654'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/compare/xwiki-platform-12.7.1....
{'cwe_ids': ['CWE-116'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T19:52:54Z', 'nvd_published_at': '2020-12-31T01:15:00Z'}
1.4.0
GHSA-c5gj-w4hx-gvmx
2022-02-25T19:18:15Z
2022-02-21T00:00:21Z
null
['CVE-2022-0688']
Business Logic Errors in microweber
Microweber prior to 1.2.11 can suffer from insecure direct object reference(s). A malicious actor can remove items from a victim's cart.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0688'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/a41f0fddaf08ff12b2b82506b1ca9490c93ab605'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0...
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T19:17:23Z', 'nvd_published_at': '2022-02-20T15:15:00Z'}
1.4.0
GHSA-ppc3-fpvh-7396
2022-05-03T19:31:06Z
2022-02-09T22:25:18Z
null
['CVE-2020-17534']
Improper synchronization in Apache Netbeans HTML/Java API
There exists a race condition between the deletion of the temporary file and the creation of the temporary directory in `webkit` subproject of HTML/Java API version 1.7. A similar vulnerability has recently been disclosed in other Java projects and the fix in HTML/Java API version 1.7.1 follows theirs: To avoid local p...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.netbeans.html:pom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17534'}, {'type': 'WEB', 'url': 'https://github.com/apache/netbeans-html4j/commit/fa70e507e5555e1adb4f6518479fc408a7abd0e6'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra6119c0cdfccf051a846fa11b61364f5df9e7db93c310706a947f86a%40%...
{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T22:32:25Z', 'nvd_published_at': '2021-01-11T16:15:00Z'}
1.4.0
GHSA-v9p9-535w-4285
2022-02-25T15:40:33Z
2022-02-17T00:00:32Z
null
['CVE-2021-23682']
Prototype Pollution in litespeed.js and appwrite/server-ce
This affects the package litespeed.js before 0.3.12; the package appwrite/server-ce from 0.12.0 and before 0.12.2, before 0.11.1. When parsing the query string in the getJsonFromUrl function, the key that is set in the result object is not properly sanitized leading to a Prototype Pollution vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'litespeed.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.12'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'appwrite/server-ce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.12.0'}, {'fixed': '0.12.2'}]}]}, {'pack...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23682'}, {'type': 'WEB', 'url': 'https://github.com/appwrite/appwrite/pull/2778'}, {'type': 'WEB', 'url': 'https://github.com/litespeed-js/litespeed.js/pull/18'}, {'type': 'WEB', 'url': 'https://github.com/appwrite/appwrite/releases/tag/0.11.1'}, {...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-17T23:35:34Z', 'nvd_published_at': '2022-02-16T17:15:00Z'}
1.4.0
GHSA-6rrw-4fm9-rghv
2022-02-23T15:45:21Z
2022-02-19T00:01:36Z
null
['CVE-2022-0664']
Use of Hard-coded Cryptographic Key in Netmaker
Netmaker prior to versions 0.8.5, 0.9.4, 0.10.0, and 0.10.1 uses a hard-coded cryptographic key.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.9.4'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0664'}, {'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/commit/9bee12642986cb9534e268447b70e6f0f03c59cf'}, {'type': 'PACKAGE', 'url': 'https://github.com/gravitl/netmaker'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/29898a42-fd...
{'cwe_ids': ['CWE-321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T15:45:21Z', 'nvd_published_at': '2022-02-18T14:15:00Z'}
1.4.0
GHSA-hrhx-6h34-j5hc
2022-02-16T22:30:57Z
2022-02-16T22:30:57Z
null
['CVE-2022-23632']
Skip the router TLS configuration when the host header is an FQDN
### Impact People that configure mTLS between Traefik and clients. For a request, the TLS configuration choice can be different than the router choice, which implies the use of a wrong TLS configuration. - When sending a request using FQDN handled by a router configured with a dedicated TLS configuration, the TLS co...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.6.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/traefik/traefik/security/advisories/GHSA-hrhx-6h34-j5hc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23632'}, {'type': 'WEB', 'url': 'https://github.com/traefik/traefik/pull/8764'}, {'type': 'PACKAGE', 'url': 'https://github.com/traefik/traefik'},...
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:30:57Z', 'nvd_published_at': '2022-02-17T15:15:00Z'}
1.4.0
GHSA-vm64-cfqx-3698
2023-09-11T23:08:53Z
2022-02-10T20:18:37Z
null
['CVE-2020-7777']
Code Injection in jsen
This affects all versions of package jsen. If an attacker can control the schema file, it could run arbitrary JavaScript code on the victim machine. In the module description and README file there is no mention about the risks of untrusted schema files, so it is assumed that this is applicable. In particular the requir...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'jsen'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7777'}, {'type': 'WEB', 'url': 'https://github.com/bugventure/jsen/blob/master/lib/jsen.js#L875'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-JSEN-1014670'}]
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-14T19:49:04Z', 'nvd_published_at': '2020-11-23T16:15:00Z'}
1.4.0
GHSA-7w2w-fwpf-9m4h
2022-06-20T22:39:16Z
2022-02-16T00:01:32Z
null
['CVE-2022-25181']
Protection Mechanism Failure in Jenkins Pipeline: Shared Groovy Libraries Plugin
A sandbox bypass vulnerability in Jenkins Pipeline: Shared Groovy Libraries Plugin 552.vd9cc05b8a2e1 and earlier allows attackers with Item/Configure permission to execute arbitrary code in the context of the Jenkins controller JVM through crafted SCM contents, if a global Pipeline library already exists.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps-global-lib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '561.va_ce0de3c2d69'}]}], 'database_specific': {'last_known_affected_version_range': '<= 552.vd9cc05b8a2e1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25181'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2441'}]
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:39:16Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-c94w-c95p-phf8
2022-02-11T20:46:28Z
2022-02-10T00:32:59Z
null
['CVE-2022-23575']
Integer overflow in Tensorflow
### Impact The [implementation of `OpLevelCostEstimator::CalculateTensorSize`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1552-L1558) is vulnerable to an integer overflow if an attacker can create an operation which w...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-c94w-c95p-phf8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23575'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/fcd18ce3101f245b083b30655c27b239dc72221e'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T20:19:53Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-4g4p-42wc-9f3m
2022-04-20T16:25:04Z
2022-02-11T23:39:18Z
null
['CVE-2020-27955']
Git LFS can execute a Git binary from the current directory
### Impact On Windows, if Git LFS operates on a malicious repository with a `git.bat` or `git.exe` file in the current directory, that program would be executed, permitting the attacker to execute arbitrary code. This does not affect Unix systems. This occurs because on Windows, Go includes (and prefers) the current ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/git-lfs/git-lfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/git-lfs/git-lfs/security/advisories/GHSA-4g4p-42wc-9f3m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27955'}, {'type': 'PACKAGE', 'url': 'https://github.com/git-lfs/git-lfs'}, {'type': 'WEB', 'url': 'https://github.com/git-lfs/git-lfs/releases'}, ...
{'cwe_ids': ['CWE-427'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T22:10:31Z', 'nvd_published_at': '2020-11-05T15:15:00Z'}
1.4.0
GHSA-38r5-34mr-mvm7
2022-02-12T00:01:51Z
2022-02-12T00:01:51Z
null
['CVE-2020-29662']
"catalog's registry v2 api exposed on unauthenticated path in Harbor"
### **Impact** Javier Provecho, member of the TCCT (Telefonica Cloud & Cybersecurity Tech better known as ElevenPaths) SRE team discovered a vulnerability regarding Harbor’s v2 API. The catalog’s registry v2 api is exposed on an unauthenticated path. The current catalog API path is served at the following path and it ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.2'}]...
[{'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories/GHSA-38r5-34mr-mvm7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-29662'}, {'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/pull/13676'}, {'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/commi...
{'cwe_ids': ['CWE-287', 'CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T19:00:31Z', 'nvd_published_at': None}
1.4.0
GHSA-qhh5-9738-g9mx
2021-04-06T22:46:07Z
2022-02-09T22:26:32Z
null
['CVE-2020-13922']
Incorrect Default Permissions in Apache DolphinScheduler
Versions of Apache DolphinScheduler prior to 1.3.2 allowed an ordinary user under any tenant to override another users password through the API interface.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13922'}, {'type': 'WEB', 'url': 'https://github.com/apache/incubator-dolphinscheduler/commit/b8a9e2e00f2f207ae60c913a7173b59405ff95f1'}, {'type': 'WEB', 'url': 'https://www.mail-archive.com/announce@apache.org/msg06076.html'}]
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T22:46:07Z', 'nvd_published_at': '2021-01-11T10:15:00Z'}
1.4.0
GHSA-5888-ffcr-r425
2022-02-09T22:20:49Z
2022-02-09T22:20:49Z
null
['CVE-2022-23631']
Prototype Pollution leading to Remote Code Execution in superjson
### Impact This is critical vulnerability, as it allows to run arbitrary code on any server using superjson input, including a Blitz.js server, without prior authentication or knowledge. Attackers gain full control over the server so they could steal and manipulate data or attack further systems. The only requirement ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'superjson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'blitz'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.45.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/blitz-js/superjson/security/advisories/GHSA-5888-ffcr-r425'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23631'}, {'type': 'PACKAGE', 'url': 'https://github.com/blitz-js/superjson'}, {'type': 'WEB', 'url': 'https://www.sonarsource.com/blog/blitzjs-...
{'cwe_ids': ['CWE-1321', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T22:20:49Z', 'nvd_published_at': '2022-02-09T22:15:00Z'}
1.4.0
GHSA-wm93-f238-7v37
2022-02-11T20:46:10Z
2022-02-10T00:32:44Z
null
['CVE-2022-23576']
Integer overflow in Tensorflow
### Impact The [implementation of `OpLevelCostEstimator::CalculateOutputSize`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/op_level_cost_estimator.cc#L1598-L1617) is vulnerable to an integer overflow if an attacker can create an operation which w...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wm93-f238-7v37'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23576'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/b9bd6cfd1c50e6807846af9a86f9b83cafc9c8ae'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T20:23:17Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-5gjm-fj42-x983
2023-09-15T18:11:15Z
2022-02-15T01:57:18Z
null
['CVE-2018-1098']
etcd Cross-site Request Forgery (CSRF)
A cross-site request forgery flaw was found in etcd 3.3.1 and earlier. An attacker can set up a website that tries to send a POST request to the etcd server and modify a key. Adding a key is done with PUT so it is theoretically safe (can't PUT from an HTML form or such) but POST allows creating in-order keys that an at...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1098'}, {'type': 'WEB', 'url': 'https://github.com/coreos/etcd/issues/9353'}, {'type': 'WEB', 'url': 'https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T18:17:42Z', 'nvd_published_at': '2018-04-03T16:29:00Z'}
1.4.0
GHSA-wqv3-8cm6-h6wg
2023-01-06T22:23:41Z
2022-02-15T01:57:18Z
null
['CVE-2020-8558']
Improper Authentication in Kubernetes
A security issue was discovered in the Kubelet and kube-proxy components of Kubernetes which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. For example, if a cluster administrator runs a TCP service on a node that listens on 127.0.0.1:1234,...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.18.0'}, {'fixed': '1.18.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.17.0'}, {'fixed': '1.17.7'}]}]}, {'pac...
[{'type': 'WEB', 'url': 'https://github.com/bottlerocket-os/bottlerocket/security/advisories/GHSA-wqv3-8cm6-h6wg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8558'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/92315'}, {'type': 'WEB', 'url': 'https://bugzilla.red...
{'cwe_ids': ['CWE-420'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T19:30:36Z', 'nvd_published_at': '2020-07-27T20:15:00Z'}
1.4.0
GHSA-7x22-pmw5-66mq
2022-01-28T22:22:26Z
2022-02-01T00:44:14Z
null
['CVE-2021-4172']
Cross-site Scripting in showdoc
Stored XSS via upload attachment with format .svg in File Library.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4172'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/409c8a1208bbb847046a9496303192980f2e6219'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c041b693-877b...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T22:22:26Z', 'nvd_published_at': '2022-01-22T12:15:00Z'}
1.4.0
GHSA-7f33-f4f5-xwgw
2023-02-07T21:22:51Z
2022-02-11T23:23:13Z
null
['CVE-2020-8912']
In-band key negotiation issue in AWS S3 Crypto SDK for golang
### Summary The golang AWS S3 Crypto SDK is impacted by an issue that can result in loss of confidentiality and message forgery. The attack requires write access to the bucket in question, and that the attacker has access to an endpoint that reveals decryption failures (without revealing the plaintext) and that when e...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/aws/aws-sdk-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.34.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/google/security-research/security/advisories/GHSA-7f33-f4f5-xwgw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8912'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-go/pull/3403'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-go/...
{'cwe_ids': ['CWE-327'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T18:08:44Z', 'nvd_published_at': None}
1.4.0
GHSA-9c78-vcq7-7vxq
2022-02-11T15:07:45Z
2022-02-09T23:53:47Z
null
['CVE-2022-23561']
Out of bounds write in TFLite
### Impact An attacker can craft a TFLite model that would cause a write outside of bounds of an array in TFLite. In fact, the attacker can override the linked list used by the memory allocator. This can be leveraged for an arbitrary write primitive under certain conditions. ### Patches We have patched the issue in G...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9c78-vcq7-7vxq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23561'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/6c0b2b70eeee588591680f5b7d5d38175fd7cdf6'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:47:32Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-rhcw-wjcm-9h6g
2021-03-31T23:48:27Z
2022-02-09T00:54:12Z
null
['CVE-2020-27782']
Denial of service in Undertow
A flaw was found in the Undertow AJP connector. Malicious requests and abrupt connection closes could be triggered by an attacker using query strings with non-RFC compliant characters resulting in a denial of service. The highest threat from this vulnerability is to system availability. This affects Undertow 2.1.5.SP1,...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.1.0'}, {'fixed': '2.1.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27782'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/pull/997/commits/98a9ab7f2d7fe7a7254eaf17d47816c452169c90'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1901304'}, {'type': 'WEB', 'url': 'https://iss...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T23:48:27Z', 'nvd_published_at': '2021-02-23T19:15:00Z'}
1.4.0
GHSA-whww-v56c-cgv2
2021-05-10T21:50:14Z
2022-02-10T22:39:17Z
null
['CVE-2020-1948']
Deserialization of Untrusted Data in Apache Dubbo
This vulnerability can affect all Dubbo users stay on version 2.7.6 or lower. An attacker can send RPC requests with unrecognized service name or method name along with some malicious parameter payloads. When the malicious parameter is deserialized, it will execute some malicious code. More details can be found below.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.7'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1948'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbaa41711b3e7a8cd20e9013737423ddd079ddc12f90180f86e76523c%40%3Csecurity.dubbo.apache.org%3E'}, {'type': 'WEB', 'url': 'https://nsfocusglobal.com/apache-dubbo-remote-code-execution...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-10T21:50:14Z', 'nvd_published_at': '2020-07-14T14:15:00Z'}
1.4.0
GHSA-wmrx-57hm-mw7r
2022-03-24T22:47:39Z
2022-02-18T00:00:34Z
null
['CVE-2022-24683']
Arbitrary file reads in HashiCorp Nomad
Nomad is an easy-to-use, flexible, and performant workload orchestrator that can deploy a mix of microservice, batch, containerized, and non-containerized applications. HashiCorp Nomad and Nomad Enterprise 0.9.2 through 1.0.17, 1.1.11, and 1.2.5 allow operators with read-fs and alloc-exec (or job-submit) capabilities t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.2'}, {'fixed': '1.0.18'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24683'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/commit/1aa46c3796e924b72eb45a7f02dae32df0c1179c'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/commit/b3c0e6a7a53d624003698b48b6c59739552c3721'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:36:15Z', 'nvd_published_at': '2022-02-17T17:15:00Z'}
1.4.0
GHSA-8vwm-8vj8-rqjf
2022-03-01T19:27:43Z
2022-02-26T00:00:44Z
null
['CVE-2022-25327']
User login denial of service in github.com/google/fscrypt
The PAM module for fscrypt doesn't adequately validate fscrypt metadata files, allowing users to create malicious metadata files that prevent other users from logging in. A local user can cause a denial of service by creating a fscrypt metadata file that prevents other users from logging into the system. We recommend u...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/google/fscrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25327'}, {'type': 'WEB', 'url': 'https://github.com/google/fscrypt/pull/346'}, {'type': 'WEB', 'url': 'https://github.com/google/fscrypt/commit/91aa3ebf42032ca783c41f9ec25d885875f66ddb'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/fscryp...
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:27:43Z', 'nvd_published_at': '2022-02-25T11:15:00Z'}
1.4.0
GHSA-cg57-p69r-3m7p
2021-05-19T17:48:44Z
2022-02-10T23:46:51Z
null
['CVE-2021-32622']
Improper file handling in matrix-react-sdk
Matrix-React-SDK is a react-based SDK for inserting a Matrix chat/voip client into a web page. Before version 3.21.0, when uploading a file, the local file preview can lead to execution of scripts embedded in the uploaded file. This can only occur after several user interactions to open the preview in a separate tab. T...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'matrix-react-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.21.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/security/advisories/GHSA-8796-gc9j-63rv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32622'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-react-sdk/pull/5981'}, {'type': 'WEB', 'url': 'https://www.npmjs...
{'cwe_ids': ['CWE-434', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T17:48:44Z', 'nvd_published_at': '2021-05-17T20:15:00Z'}
1.4.0
GHSA-g8j8-mgh9-q77p
2022-03-01T21:32:31Z
2022-02-19T00:01:25Z
null
['CVE-2021-46036']
File upload leading to RCE in MCMS
An arbitrary file upload vulnerability in the component /ms/file/uploadTemplate.do of MCMS v5.2.4 allows attackers to execute arbitrary code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46036'}, {'type': 'WEB', 'url': 'https://lycshub.github.io/2021/12/28/MCMS-vulnerabilities/'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:29:04Z', 'nvd_published_at': '2022-02-18T19:15:00Z'}
1.4.0
GHSA-qh2g-7h5p-mxf4
2021-04-05T21:49:45Z
2022-02-09T22:05:39Z
null
['CVE-2020-1958']
Credentials bypass in Apache Druid
When LDAP authentication is enabled in Apache Druid 0.17.0, callers of Druid APIs with a valid set of LDAP credentials can bypass the credentialsValidator.userSearch filter barrier that determines if a valid LDAP user is allowed to authenticate with Druid. They are still subject to role-based authorization checks, if c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.druid:druid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.17.0'}, {'fixed': '0.17.1'}]}], 'versions': ['0.17.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1958'}, {'type': 'WEB', 'url': 'https://github.com/apache/druid/pull/9600#issuecomment-607497875'}, {'type': 'WEB', 'url': 'https://github.com/apache/druid/commit/dbaabdd24710fef726c5730c609937706f456a44#diff-fab6b7a8a160a405e787690201aade546296155...
{'cwe_ids': ['CWE-200', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T21:49:45Z', 'nvd_published_at': '2020-04-01T22:15:00Z'}
1.4.0
GHSA-mv5c-724f-3fq7
2022-12-01T22:19:55Z
2022-02-16T00:01:18Z
null
['CVE-2022-25203']
Stored Cross-site Scripting vulnerability in Jenkins Team Views Plugin
Jenkins Team Views Plugin 0.9.0 and earlier does not escape team names, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Read permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.sonymobile.jenkins.plugins.teamviews:team-views'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25203'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/team-views-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2324'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:19:55Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-mv26-cx23-vrfg
2022-02-09T22:27:07Z
2022-02-09T00:00:31Z
null
['CVE-2022-0508']
Server-Side Request Forgery in @peertube/embed-api
@peertube/embed-api version 4.0.0 and prior is vulnerable to server-side request forgery.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@peertube/embed-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0-rc.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0508'}, {'type': 'WEB', 'url': 'https://github.com/chocobozzz/peertube/commit/f33e515991a32885622b217bf2ed1d1b0d9d6832'}, {'type': 'PACKAGE', 'url': 'https://github.com/chocobozzz/peertube'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c3724...
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T22:27:07Z', 'nvd_published_at': '2022-02-08T11:15:00Z'}
1.4.0
GHSA-4v9w-pvwr-38h3
2021-07-28T21:54:53Z
2022-02-10T23:36:54Z
null
['CVE-2020-7621']
OS Command Injection in strong-nginx-controller
strong-nginx-controller through 1.0.2 is vulnerable to Command Injection. It allows execution of arbitrary command as part of the '_nginxCmd()' function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'strong-nginx-controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7621'}, {'type': 'WEB', 'url': 'https://github.com/strongloop/strong-nginx-controller/blob/master/lib/server.js#L65,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-STRONGNGINXCONTROLLER-564248'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T15:21:47Z', 'nvd_published_at': '2020-04-02T21:15:00Z'}
1.4.0
GHSA-57qf-82hh-2hmc
2022-02-14T22:30:19Z
2022-02-07T00:00:30Z
null
['CVE-2022-0502']
Cross-site Scripting in LiveHelperChat
LiveHelperChat prior to version 3.93 is vulnerable to cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.93'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0502'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/d3b107aaa8ec10816acc762d60e7321079c21706'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-08T16:53:59Z', 'nvd_published_at': '2022-02-06T11:15:00Z'}
1.4.0
GHSA-rrp4-2xx3-mv29
2022-02-07T21:07:25Z
2022-02-01T00:47:33Z
null
['CVE-2022-21687']
Command injection in gh-ost
Gh-ost version <= 1.1.2 allows users to inject DSN strings via the `-database` parameter. This is a low severity vulnerability as the attacker must have access to the target host or trick an administrator into executing a malicious `gh-ost` command on a host running `gh-ost`, plus network access from host running `gh-...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/github/gh-ost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/github/gh-ost/security/advisories/GHSA-rrp4-2xx3-mv29'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21687'}, {'type': 'WEB', 'url': 'https://github.com/github/gh-ost/commit/a91ab042de013cfd8fbb633763438932d9080d8f'}, {'type': 'PACKAGE', 'url': 'htt...
{'cwe_ids': ['CWE-20', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T20:45:59Z', 'nvd_published_at': '2022-02-01T12:15:00Z'}
1.4.0
GHSA-4hvf-hxvg-f67v
2022-02-11T15:07:59Z
2022-02-09T23:53:30Z
null
['CVE-2022-23560']
Read and Write outside of bounds in TensorFlow
### Impact An attacker can craft a TFLite model that would allow limited reads and writes outside of arrays in TFLite. This exploits missing validation in [the conversion from sparse tensors to dense tensors](https://github.com/tensorflow/tensorflow/blob/ca6f96b62ad84207fbec580404eaa7dd7403a550/tensorflow/lite/kernels/...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4hvf-hxvg-f67v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23560'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/6364463d6f5b6254cac3d6aedf999b6a96225038'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-125', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:41:13Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-h676-pjr4-hgqx
2022-02-23T15:52:20Z
2022-02-12T00:00:42Z
null
['CVE-2021-44111']
Path Traversal in S-Cart
A Directory Traversal vulnerability exists in S-Cart 6.7 via download in sc-admin/backup.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 's-cart/s-cart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44111'}, {'type': 'WEB', 'url': 'https://github.com/s-cart/s-cart/issues/102'}, {'type': 'WEB', 'url': 'https://github.com/s-cart/core/commit/328dd312866b86144b43941dee2ad942708f70da'}, {'type': 'PACKAGE', 'url': 'https://github.com/s-cart/s-cart'}...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T15:52:20Z', 'nvd_published_at': '2022-02-11T18:15:00Z'}
1.4.0
GHSA-f4cj-3q3h-884r
2022-05-05T18:01:28Z
2022-02-09T21:21:53Z
null
['CVE-2022-23615']
Partial authorization bypass on document save in xwiki-platform
XWiki Platform is a generic wiki platform offering runtime services for applications built on top of it. Any user with SCRIPT right (EDIT right before XWiki 7.4) can save a document with the right of the current user which allow accessing API requiring programming right if the current user has programming right. It has...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '13.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-f4cj-3q3h-884r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23615'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/7ab0fe7b96809c7a3881454147598d46a1c9bbbe'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T21:21:53Z', 'nvd_published_at': '2022-02-09T21:15:00Z'}
1.4.0
GHSA-wqwf-x5cj-rg56
2021-05-12T18:22:09Z
2022-02-15T01:57:18Z
null
['CVE-2018-1002101']
Arbitrary Command Injection
In Kubernetes versions 1.9.0-1.9.9, 1.10.0-1.10.5, and 1.11.0-1.11.1, user input was handled insecurely while setting up volume mounts on Windows nodes, which could lead to command line argument injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes/pkg/util/mount'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.9.0'}, {'fixed': '1.9.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes/pkg/util/mount'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002101'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/65750'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/65751'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/commit/d6503...
{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T18:22:09Z', 'nvd_published_at': None}
1.4.0
GHSA-8m9g-647g-5pxw
2021-05-07T16:04:45Z
2022-02-15T01:57:18Z
null
['CVE-2021-28484']
Infinite loop in Yubico yubihsm-connector
An issue was discovered in the /api/connector endpoint handler in Yubico yubihsm-connector before 3.0.1 (in YubiHSM SDK before 2021.04). The handler did not validate the length of the request, which can lead to a state where yubihsm-connector becomes stuck in a loop waiting for the YubiHSM to send it data, preventing a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:R'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/Yubico/yubihsm-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28484'}, {'type': 'WEB', 'url': 'https://github.com/Yubico/yubihsm-connector/commit/82bdf202c53460bac9106cc9b4b34a0a16cae0ed'}, {'type': 'WEB', 'url': 'https://github.com/Yubico/yubihsm-connector/releases'}, {'type': 'WEB', 'url': 'https://www.yubi...
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T16:04:45Z', 'nvd_published_at': '2021-04-14T18:15:00Z'}
1.4.0
GHSA-fmvm-x8mv-47mj
2022-02-23T15:26:32Z
2022-02-17T17:19:18Z
null
['CVE-2022-23646']
Improper CSP in Image Optimization API for Next.js versions between 10.0.0 and 12.1.0
Next.js is a React framework. Starting with version 10.0.0 and prior to version 12.1.0, Next.js is vulnerable to User Interface (UI) Misrepresentation of Critical Information. In order to be affected, the `next.config.js` file must have an `images.domains` array assigned and the image host assigned in `images.domains` ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '12.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vercel/next.js/security/advisories/GHSA-fmvm-x8mv-47mj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23646'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/pull/34075'}, {'type': 'PACKAGE', 'url': 'https://github.com/vercel/next.js'}, {...
{'cwe_ids': ['CWE-451'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-17T17:19:18Z', 'nvd_published_at': '2022-02-17T21:15:00Z'}
1.4.0
GHSA-qfhg-m6r8-xxpj
2022-02-23T16:04:57Z
2022-02-12T00:00:46Z
null
['CVE-2020-13676']
Incorrect Authorization in Drupal core
The QuickEdit module does not properly check access to fields in some circumstances, which can lead to unintended disclosure of field data. Sites are only affected if the QuickEdit module (which comes with the Standard profile) is installed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.9.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.1.0'}, {'fixed': '9.1.13'}]}]}, {'pac...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13676'}, {'type': 'PACKAGE', 'url': 'https://github.com/drupal/core'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2021-009'}]
{'cwe_ids': ['CWE-284', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T16:04:57Z', 'nvd_published_at': '2022-02-11T16:15:00Z'}
1.4.0
GHSA-wwf6-x2rv-vxqh
2022-12-01T22:23:35Z
2022-02-16T00:01:19Z
null
['CVE-2022-25201']
Missing permission checks in Jenkins Checkmarx Plugin allow capturing credentials
Checkmarx Plugin 2022.1.2 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to connect to an attacker-specified webserver using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.checkmarx.jenkins:checkmarx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2022.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25201'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/checkmarx-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/checkmarx-plugin/releases/tag/Release_2022.1.3'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/adv...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:23:35Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-qv6q-x9vr-w7j3
2022-06-20T22:47:17Z
2022-02-16T00:01:32Z
null
['CVE-2022-25180']
Insufficiently Protected Credentials in Jenkins Pipeline: Groovy Plugin
Jenkins Pipeline: Groovy Plugin 2648.va9433432b33c and earlier includes password parameters from the original build in replayed builds, allowing attackers with Run/Replay permission to obtain the values of password parameters passed to previous builds of a Pipeline.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-cps'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2648.2651.v230593e03e9f'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2648.va9433432b33c'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25180'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2443'}]
{'cwe_ids': ['CWE-319', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:47:17Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-6hr9-4692-fch9
2021-07-28T22:11:47Z
2022-02-10T23:45:54Z
null
['CVE-2020-7624']
OS Command Injection in effect
effect through 1.0.4 is vulnerable to Command Injection. It allows execution of arbitrary command via the options argument.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'effect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7624'}, {'type': 'WEB', 'url': 'https://github.com/Javascipt/effect/blob/master/helper.js#L24,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-EFFECT-564256'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T23:10:14Z', 'nvd_published_at': '2020-04-02T22:15:00Z'}
1.4.0
GHSA-5946-mpw5-pqxx
2022-03-08T18:49:35Z
2022-02-21T00:00:20Z
null
['CVE-2021-45083']
Incorrect Default Permissions in Cobbler
An issue was discovered in Cobbler before 3.3.1. Files in /etc/cobbler are world readable. Two of those files contain some sensitive information that can be exposed to a local user who has non-privileged access to the server. The users.digest file contains the sha2-512 digest of users in a Cobbler local installation. I...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45083'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/pull/2945'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/commit/10b2112db83fedfc391e900edfedc2b4e507d3f7'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bu...
{'cwe_ids': ['CWE-276'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-08T18:49:35Z', 'nvd_published_at': '2022-02-20T18:15:00Z'}
1.4.0
GHSA-34f9-hjfq-rr8j
2022-02-11T17:04:52Z
2022-02-10T00:18:53Z
null
['CVE-2022-21729']
Overflow and uncaught divide by zero in Tensorflow
### Impact The [implementation of `UnravelIndex`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/unravel_index_op.cc#L36-L135) is vulnerable to a division by zero caused by an integer overflow bug: ```python import tensorflow as tf tf.raw_ops.UnravelInd...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-34f9-hjfq-rr8j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21729'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/58b34c6c8250983948b5a781b426f6aa01fd47af'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T18:32:59Z', 'nvd_published_at': '2022-02-03T13:15:00Z'}
1.4.0
GHSA-rrx2-r989-2c43
2022-02-11T17:05:34Z
2022-02-09T23:39:33Z
null
['CVE-2022-23567']
Integer overflows in Tensorflow
### Impact The [implementations of `Sparse*Cwise*` ops](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/sparse_dense_binary_op_shared.cc) are vulnerable to integer overflows. These can be used to trigger large allocations (so, OOM based denial of service) ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rrx2-r989-2c43'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23567'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1b54cadd19391b60b6fcccd8d076426f7221d5e8'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T21:08:01Z', 'nvd_published_at': '2022-02-03T12:15:00Z'}
1.4.0
GHSA-hhrj-wp42-32v3
2022-02-28T22:18:00Z
2022-02-19T00:01:36Z
null
['CVE-2022-0660']
Generation of Error Message Containing Sensitive Information in microweber
Generation of Error Message Containing Sensitive Information in Packagist microweber/microweber prior to 1.2.11.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0660'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/2417bd2eda2aa2868c1dad1abf62341f22bfc20a'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0...
{'cwe_ids': ['CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T15:37:01Z', 'nvd_published_at': '2022-02-18T11:15:00Z'}
1.4.0
GHSA-hpmr-prr2-cqc4
2023-09-15T18:15:48Z
2022-02-15T01:57:18Z
null
['CVE-2019-11229']
Gitea Remote Code Execution
models/repo_mirror.go in Gitea before 1.7.6 and 1.8.x before 1.8-RC3 mishandles mirror repo URL settings, leading to remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/go-gitea/gitea'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-11229'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/6593'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/6595'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/releases/tag/v1.7.6'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T17:52:21Z', 'nvd_published_at': None}
1.4.0
GHSA-4284-x26r-4hhc
2022-03-07T13:37:09Z
2022-02-26T00:00:44Z
null
['CVE-2022-24947']
Cross Site Request Forgery in Apache JSPWiki
Apache JSPWiki user preferences form is vulnerable to CSRF attacks, which can lead to account takeover. Apache JSPWiki users should upgrade to 2.11.2 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24947'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/txrgykjkpt80t57kzpbjo8kfrv8ss02c'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/02/25/1'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:38:57Z', 'nvd_published_at': '2022-02-25T09:15:00Z'}
1.4.0
GHSA-9f3j-pm6f-9fm5
2022-04-19T15:24:44Z
2022-02-01T00:45:44Z
null
['CVE-2022-23181']
Race condition in Apache Tomcat
The fix for bug CVE-2020-9484 introduced a time of check time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23181'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/10/msg000...
{'cwe_ids': ['CWE-367'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T19:06:23Z', 'nvd_published_at': '2022-01-27T13:15:00Z'}
1.4.0
GHSA-428x-9xc2-m8mj
2022-02-11T16:20:59Z
2022-02-09T23:47:30Z
null
['CVE-2022-21741']
Division by zero in TFLite
### Impact An attacker can craft a TFLite model that would trigger a division by zero in [the implementation of depthwise convolutions](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/lite/kernels/depthwise_conv.cc#L96). The parameters of the convolution can be user c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-428x-9xc2-m8mj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21741'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e5b0eec199c2d03de54fd6a7fd9275692218e2bc'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:16:37Z', 'nvd_published_at': '2022-02-03T15:15:00Z'}