schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-rmr5-cpv2-vgjf | 2022-02-07T21:02:28Z | 2022-02-01T00:48:15Z | null | ['CVE-2021-43859'] | Denial of Service by injecting highly recursive collections or maps in XStream | ### Impact
The vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream.
### Patches
XStream 1.4.19 monitors and accumulates the time it takes t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.19'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-rmr5-cpv2-vgjf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43859'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/commit/e8e88621ba1c85ac3b8620337dd672e0c0c3a846'}, {'type': 'PACKAGE', 'url'... | {'cwe_ids': ['CWE-400', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T20:12:15Z', 'nvd_published_at': '2022-02-01T12:15:00Z'} |
1.4.0 | GHSA-vf77-8h7g-gghp | 2022-02-08T22:05:00Z | 2022-02-08T22:05:00Z | null | ['CVE-2020-13934'] | Improper Restriction of Operations within the Bounds of a Memory Buffer in Apache Tomcat | An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.0-M6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.0-M5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13934'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r61f411cf82488d6ec213063fc15feeeb88e31b0ca9c29652ee4f962e%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra072b1f786e7d139e86f... | {'cwe_ids': ['CWE-119', 'CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T18:34:04Z', 'nvd_published_at': '2020-07-14T15:15:00Z'} |
1.4.0 | GHSA-f5fj-7265-jxhj | 2023-09-15T18:06:52Z | 2022-02-15T01:57:18Z | null | ['CVE-2018-1000803'] | Gitea Exposes Private Email Addresses | Gitea version prior to version 1.5.1 contains a CWE-200 vulnerability that can result in Exposure of users private email addresses. This attack appear to be exploitable via Watch a repository to receive email notifications. Emails received contain the other recipients even if they have the email set as private. This vu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/go-gitea/gitea/models'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000803'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/4664'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/4664/files#diff-146e0c2b5bb1ea96c9fb73d509456e57'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T18:09:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h9vc-2p9g-63gp | 2022-02-24T13:10:51Z | 2022-02-15T00:02:47Z | null | ['CVE-2022-0565'] | Exposure of Sensitive Information to an Unauthorized Actor in pimcore | Exposure of Sensitive Information to an Unauthorized Actor in Packagist pimcore/pimcore prior to 10.3.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0565'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/7697f709a501860144352696e583a2533a6e1245'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b0b29656-4bb... | {'cwe_ids': ['CWE-200', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:43:57Z', 'nvd_published_at': '2022-02-14T12:15:00Z'} |
1.4.0 | GHSA-vv6j-ww6x-54gx | 2022-04-12T15:14:36Z | 2022-02-22T21:51:19Z | null | ['CVE-2022-0609'] | Use after free in Animation | CVE-2022-0609: Use after free in Animation
- https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0609
Google is aware of reports that exploits for CVE-2022-0609 exist in the wild.
The exploitation is known to be easy. The a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '98.1.210'}]}], 'database_specific': {'last_known_affected_version_range': '<= 98.1.190'}}, {'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.OffScreen'}, 'ranges': [{'type': 'EC... | [{'type': 'WEB', 'url': 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-vv6j-ww6x-54gx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0609'}, {'type': 'WEB', 'url': 'https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T21:51:19Z', 'nvd_published_at': '2022-04-05T00:15:00Z'} |
1.4.0 | GHSA-4j82-5ccr-4r8v | 2022-02-11T20:38:31Z | 2022-02-10T00:34:01Z | null | ['CVE-2022-23582'] | `CHECK`-failures in `TensorByteSize` in Tensorflow | ### Impact
A malicious user can cause a denial of service by altering a `SavedModel` such that [`TensorByteSize`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/attr_value_util.cc#L46-L50) would trigger `CHECK` failures.
```cc
int64_t TensorByteSize(con... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4j82-5ccr-4r8v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23582'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c2426bba00a01de6913738df8fa78e0215fcce02'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T19:53:00Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-5q5w-mqp6-g2gh | 2022-02-11T20:51:14Z | 2022-02-06T00:01:07Z | null | ['CVE-2022-0472'] | Unrestricted Upload of File with Dangerous Type in jsdecena/laracom | jsdecena/laracom prior to version 2.0.9 is vulnerable to Unrestricted Upload of File with Dangerous Type. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'jsdecena/laracom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0472'}, {'type': 'WEB', 'url': 'https://github.com/jsdecena/laracom/commit/256026193ce994dc4c1365e02f414d8a0cd77ae8'}, {'type': 'PACKAGE', 'url': 'https://github.com/jsdecena/laracom'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cb5b8563-15... | {'cwe_ids': ['CWE-434', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T22:21:11Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-pfjj-m3jj-9jc9 | 2022-02-11T16:24:03Z | 2022-02-09T23:43:27Z | null | ['CVE-2022-21736'] | Undefined behavior in `SparseTensorSliceDataset` | ### Impact
The [implementation of `SparseTensorSliceDataset`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/sparse_tensor_slice_dataset_op.cc#L227-L292) has an undefined behavior: under certain condition it can be made to dereference a `nullptr` val... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pfjj-m3jj-9jc9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21736'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/965b97e4a9650495cda5a8c210ef6684b4b9eceb'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T19:56:37Z', 'nvd_published_at': '2022-02-03T12:15:00Z'} |
1.4.0 | GHSA-7x7c-qm48-pq9c | 2022-02-11T19:59:48Z | 2022-02-06T00:00:54Z | null | ['CVE-2022-0437'] | Cross-site Scripting in karma | karma prior to version 6.3.14 contains a cross-site scripting vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'karma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0437'}, {'type': 'WEB', 'url': 'https://github.com/karma-runner/karma/commit/839578c45a8ac42fbc1d72105f97eab77dd3eb8a'}, {'type': 'PACKAGE', 'url': 'https://github.com/karma-runner/karma/'}, {'type': 'WEB', 'url': 'https://github.com/karma-runner/k... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T21:57:20Z', 'nvd_published_at': '2022-02-05T02:15:00Z'} |
1.4.0 | GHSA-j8cx-j9j2-f29w | 2022-02-24T22:27:40Z | 2022-02-24T00:00:53Z | null | ['CVE-2022-0724'] | Insecure Storage of Sensitive Information in Microweber | Microweber prior to version 1.3 does not strip images of EXIF data, exposing information about users' locations, device hardware, and device software. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0724'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0... | {'cwe_ids': ['CWE-922'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T22:27:40Z', 'nvd_published_at': '2022-02-23T11:15:00Z'} |
1.4.0 | GHSA-4xc7-x2jr-cr74 | 2022-03-03T22:06:43Z | 2022-02-24T00:00:52Z | null | ['CVE-2022-0731'] | Improper Authorization in dolibarr/dolibarr | Dolibarr allows improper access control issues in the userphoto modulepart. The impact could lead to data exposure as the attached files and documents may contain sensitive information of relevant parties such as contacts, suppliers, invoices, orders, stocks, agenda, accounting and more. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0731'}, {'type': 'WEB', 'url': 'https://github.com/dolibarr/dolibarr/commit/209ab708d4b65fbd88ba4340d60b7822cb72651a'}, {'type': 'PACKAGE', 'url': 'https://github.com/dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e242ab4e-... | {'cwe_ids': ['CWE-639', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T22:06:43Z', 'nvd_published_at': '2022-02-23T19:15:00Z'} |
1.4.0 | GHSA-673j-qm5f-xpv8 | 2022-12-06T14:40:09Z | 2022-02-16T00:08:18Z | null | [] | pgjdbc Arbitrary File Write Vulnerability | ### Overview
The connection properties for configuring a pgjdbc connection are not meant to be exposed to an unauthenticated attacker. While allowing an attacker to specify arbitrary connection properties could lead to a compromise of a system, that's a defect of an application that allows unauthenticated attackers tha... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '42.1.0'}, {'fixed': '42.3.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-673j-qm5f-xpv8'}, {'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/commit/f6d47034a4ce292e1a659fa00963f6f713117064'}, {'type': 'PACKAGE', 'url': 'https://github.com/pgjdbc/pgjdbc'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T00:08:18Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wf43-55jj-vwq8 | 2021-05-19T22:09:57Z | 2022-02-15T01:57:18Z | null | ['CVE-2018-1099'] | DNS Rebinding in etcd | DNS rebinding vulnerability found in etcd 3.3.1 and earlier. An attacker can control his DNS records to direct to localhost, and trick the browser into sending requests to localhost (or any other address). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1099'}, {'type': 'WEB', 'url': 'https://github.com/coreos/etcd/issues/9353'}, {'type': 'WEB', 'url': 'https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi... | {'cwe_ids': ['CWE-20', 'CWE-350'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:09:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pf8j-vhg8-xmc3 | 2023-09-08T23:51:18Z | 2022-02-10T23:42:58Z | null | ['CVE-2020-7626'] | karma-mojo enables OS Command Injection | karma-mojo through 1.0.1 is vulnerable to Command Injection. It allows execution of arbitrary commands via the config argument. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'karma-mojo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7626'}, {'type': 'WEB', 'url': 'https://github.com/amireh/karma-mojo/blob/master/index.js#L100,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-KARMAMOJO-564260'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T15:44:15Z', 'nvd_published_at': '2020-04-02T22:15:00Z'} |
1.4.0 | GHSA-v84g-cf5j-xjqx | 2022-02-08T20:38:52Z | 2022-02-08T00:00:34Z | null | ['CVE-2022-22931'] | Path Traversal in Apache James Server | Apache James Server prior to version 3.6.2 contains a path traversal vulnerability. The fix for CVE-2021-40525 does not prepend delimiters upon valid directory validations. Affected implementations include: - maildir mailbox store - Sieve file repository This enables a user to access other users data stores (limited to... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22931'}, {'type': 'WEB', 'url': 'https://github.com/apache/james-project/pull/877'}, {'type': 'WEB', 'url': 'https://github.com/apache/james-project/pull/877/commits/b1e891a9e5eeadfa1d779ae50f21c73efe4d2fc7'}, {'type': 'PACKAGE', 'url': 'https://gi... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-08T20:38:52Z', 'nvd_published_at': '2022-02-07T19:15:00Z'} |
1.4.0 | GHSA-q5rx-8c2h-5q7j | 2022-02-11T16:15:31Z | 2022-02-06T00:01:07Z | null | ['CVE-2021-36152'] | Apache Gobblin trusts all certificates used for LDAP connections in Gobblin-as-a-Service | Apache Gobblin trusts all certificates used for LDAP connections in Gobblin-as-a-Service. This affects versions <= 0.15.0. Users should update to version 0.16.0 which addresses this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.gobblin:gobblin-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36152'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/3bxf7rbf4zh95r78jtgth6gwhr5fyl2j'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T23:07:32Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-ccxc-vr6p-4858 | 2022-03-08T18:26:05Z | 2022-02-22T19:34:09Z | null | ['CVE-2022-23649'] | Improper Certificate Validation in Cosign | ### Impact
Cosign can be manipulated to claim that an entry for a signature exists in the Rekor transparency log even if it doesn't. This requires the attacker to have pull and push permissions for the signature in OCI. This can happen with both standard signing with a keypair and "keyless signing" with Fulcio.
#### ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/sigstore/cosign'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sigstore/cosign/security/advisories/GHSA-ccxc-vr6p-4858'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23649'}, {'type': 'WEB', 'url': 'https://github.com/sigstore/cosign/commit/96d410a6580e4e81d24d112a0855c70ca3fb5b49'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-295'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T19:34:09Z', 'nvd_published_at': '2022-02-18T22:15:00Z'} |
1.4.0 | GHSA-7x2h-3v2v-24p9 | 2022-02-14T22:33:33Z | 2022-02-09T00:00:31Z | null | ['CVE-2022-0505'] | Cross-Site Request Forgery in microweber | microweber version 1.2.10 and prior is vulnerable to cross-site request forgery. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0505'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T22:24:28Z', 'nvd_published_at': '2022-02-08T09:15:00Z'} |
1.4.0 | GHSA-82mm-ffjr-h86c | 2023-09-14T18:46:02Z | 2022-02-15T01:57:18Z | null | ['CVE-2020-16844'] | Authorization bypass in Istio | In Istio 1.5.0 though 1.5.8 and Istio 1.6.0 through 1.6.7, when users specify an AuthorizationPolicy resource with DENY actions using wildcard suffixes (e.g. *-some-suffix) for source principals or namespace fields, callers will never be denied access, bypassing the intended policy. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ran... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-16844'}, {'type': 'WEB', 'url': 'https://github.com/istio/istio/commit/4c73414556b83f0e75c1b3a0a89a23103a71573c'}, {'type': 'WEB', 'url': 'https://github.com/istio/istio/commit/72d2e135374f421b656d6f1a21f474db46134ace'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:59:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5x92-p4p5-33c4 | 2021-05-12T21:53:03Z | 2022-02-15T01:57:18Z | null | ['CVE-2020-28348'] | Path Traversal in HashiCorp Nomad | HashiCorp Nomad and Nomad Enterprise 0.9.0 up to 0.12.7 client Docker file sandbox feature may be subverted when not explicitly disabled or when using a volume mount type. Fixed in 0.12.8, 0.11.7, and 0.10.8. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.12.7'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad/drivers/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28348'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/issues/9303'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/pull/9321'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/nomad-0-12-8-0-11-7-and-0-10-8-releas... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:53:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5cgx-vhfp-6cf9 | 2023-08-30T11:47:19Z | 2022-02-15T01:57:18Z | null | ['CVE-2020-8568'] | Directory traversal in Kubernetes Secrets Store CSI Driver | Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a `SecretProviderClassPodStatus/Status` resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under `var/lib/kubelet/pods` that contain other Kuberne... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'sigs.k8s.io/secrets-store-csi-driver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.15'}, {'fixed': '0.0.17'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'sigs.k8s.io/secrets-store-csi-driver/pkg/secrets-s... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8568'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes-sigs/secrets-store-csi-driver/issues/378'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes-sigs/secrets-store-csi-driver/pull/371'}, {'type': 'WEB', 'url': 'https://github.com/kub... | {'cwe_ids': ['CWE-20', 'CWE-22', 'CWE-24'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:44:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wxj3-qwv4-cvfm | 2023-02-13T20:34:37Z | 2022-02-15T00:40:44Z | null | ['CVE-2014-3499'] | Privilege Escalation in Docker | Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3499'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker/commit/707ef9618b3b26a0534a0af732a22f159eccfaa5'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1111687'}, {'type': 'WEB', 'url': 'https://rhn.redhat.com/errata... | {'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:10:59Z', 'nvd_published_at': '2014-07-11T14:55:00Z'} |
1.4.0 | GHSA-5wmg-j84w-4jj4 | 2022-07-16T04:26:05Z | 2022-02-15T01:57:18Z | null | ['CVE-2018-1002207'] | Arbitrary File Write via Archive Extraction in mholt/archiver | mholt/archiver golang package before e4ef56d48eb029648b0e895bb0b6a393ef0829c3 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/mholt/archiver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002207'}, {'type': 'WEB', 'url': 'https://github.com/mholt/archiver/pull/65'}, {'type': 'WEB', 'url': 'https://github.com/mholt/archiver/commit/e4ef56d48eb029648b0e895bb0b6a393ef0829c3'}, {'type': 'PACKAGE', 'url': 'https://github.com/mholt/archiv... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:56:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g4gm-pxh3-29fq | 2021-11-02T18:42:15Z | 2022-02-10T22:28:41Z | null | ['CVE-2020-14961'] | Unrestricted Uploads in Concrete5 | Concrete5 before 8.5.3 does not constrain the sort direction to a valid asc or desc value. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14961'}, {'type': 'WEB', 'url': 'https://github.com/concrete5/concrete5/pull/8651'}, {'type': 'PACKAGE', 'url': 'https://github.com/concrete5/concrete5'}, {'type': 'WEB', 'url': 'https://github.com/concrete5/concrete5/releases/tag/8.5.3'}] | {'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T22:06:57Z', 'nvd_published_at': '2020-06-22T00:15:00Z'} |
1.4.0 | GHSA-6r86-2jm9-9mh4 | 2022-03-04T21:39:12Z | 2022-02-25T00:01:07Z | null | ['CVE-2022-23043'] | File upload restriction bypass in Zenario CMS | Zenario CMS 9.2 allows an authenticated admin user to bypass the file upload restriction by creating a new 'File/MIME Types' using the '.phar' extension. Then an attacker can upload a malicious file, intercept the request and change the extension to '.phar' in order to run commands on the server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.55826'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23043'}, {'type': 'WEB', 'url': 'https://github.com/TribalSystems/Zenario/commit/f0682d22688d9921dc0dfd6e858900ebf2706f19'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/simone/'}, {'type': 'PACKAGE', 'url': 'https://github.com/Triba... | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T17:55:05Z', 'nvd_published_at': '2022-02-24T15:15:00Z'} |
1.4.0 | GHSA-vx6f-6rp6-f2px | 2022-12-01T22:17:23Z | 2022-02-16T00:01:17Z | null | ['CVE-2022-25205'] | Cross-Site Request Forgery in Jenkins dbCharts Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins dbCharts Plugin 0.5.2 and earlier allows attackers to connect to an attacker-specified database via JDBC using attacker-specified credentials and to determine if a class is available in the Jenkins instance. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dbCharts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25205'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dbCharts-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2177'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T17:33:38Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-r8f7-9pfq-mjmv | 2023-04-21T19:18:26Z | 2022-02-09T22:22:24Z | null | ['CVE-2020-24025'] | Improper Certificate Validation in node-sass | Certificate validation in node-sass 2.0.0 to 6.0.1 is disabled when requesting binaries even if the user is not specifying an alternative download path. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-sass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '7.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24025'}, {'type': 'WEB', 'url': 'https://github.com/sass/node-sass/issues/3067'}, {'type': 'WEB', 'url': 'https://github.com/sass/node-sass/pull/3149'}, {'type': 'WEB', 'url': 'https://github.com/sass/node-sass/pull/567#issuecomment-656609236'}, {'... | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T22:18:40Z', 'nvd_published_at': '2021-01-11T19:15:00Z'} |
1.4.0 | GHSA-47wr-426j-fr82 | 2021-05-21T18:35:39Z | 2022-02-12T00:14:07Z | null | ['CVE-2020-26277'] | Symbolic links in an unpacking routine may enable attackers to read and/or write to arbitrary locations in dbdeployer | ### Impact
_Users unpacking a tarball through dbdeployer may use a maliciously packaged tarball that contains symlinks to files external to the target. In such scenario, an attacker could induce dbdeployer to write into a system file, thus altering the computer defences._
### Mitigating factors
For the attach to succe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/datacharmer/dbdeployer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.58.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/datacharmer/dbdeployer/security/advisories/GHSA-47wr-426j-fr82'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26277'}, {'type': 'WEB', 'url': 'https://github.com/datacharmer/dbdeployer/commit/548e256c1de2f99746e861454e7714ec6bc9bb10'}] | {'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T18:35:39Z', 'nvd_published_at': '2020-12-21T22:15:00Z'} |
1.4.0 | GHSA-9953-fmrw-v4vm | 2022-03-07T13:41:54Z | 2022-02-26T00:00:44Z | null | ['CVE-2022-24948'] | Cross-site Scripting in Apache JSPWiki | A carefully crafted user preferences for submission could trigger an XSS vulnerability on Apache JSPWiki, related to the user preferences screen, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24948'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/86p0yzopc4mw2h5bkwpt927b2c8tfq3b'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/02/25/2'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:43:13Z', 'nvd_published_at': '2022-02-25T09:15:00Z'} |
1.4.0 | GHSA-53c4-cmhf-gp7w | 2022-12-01T22:57:17Z | 2022-02-16T00:01:26Z | null | ['CVE-2022-25191'] | Stored Cross-site Scripting vulnerability in Jenkins Agent Server Parameter Plugin | Jenkins Agent Server Parameter Plugin 1.0 and earlier does not escape parameter names of agent server parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:agent-server-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25191'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/agent-server-parameter-plugin/commit/cd237c40c76661b5c6a05e542034746e431e706e'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/agent-server-parameter-plugin'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:57:17Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-44qp-9wwf-734r | 2022-02-11T16:21:11Z | 2022-02-09T23:47:14Z | null | ['CVE-2022-21740'] | Heap overflow in Tensorflow | ### Impact
The [implementation of `SparseCountSparseOutput`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273) is vulnerable to a heap overflow:
```python
import tensorflow as tf
import numpy as np
tf.raw_ops.SparseCountSparseOutput... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-44qp-9wwf-734r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21740'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/2b7100d6cdff36aa21010a82269bc05a6d1cc74a'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-120', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:13:28Z', 'nvd_published_at': '2022-02-03T15:15:00Z'} |
1.4.0 | GHSA-m744-2jj8-vpfv | 2022-02-10T23:51:16Z | 2022-02-10T23:51:16Z | null | ['CVE-2021-26543'] | Command injection in git-parse | The "gitDiff" function in Wayfair git-parse <=1.0.4 has a command injection vulnerability. Clients of the git-parse library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'git-parse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26543'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2020-4302'}, {'type': 'PACKAGE', 'url': 'https://github.com/wayfair/git-parse'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/git-parse'}] | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T20:35:31Z', 'nvd_published_at': '2021-05-06T13:15:00Z'} |
1.4.0 | GHSA-4m8h-h59m-m34j | 2022-02-07T21:21:00Z | 2022-02-01T00:50:09Z | null | ['CVE-2021-23558'] | Prototype Pollution in bmoor | The package bmoor before 0.10.1 is vulnerable to Prototype Pollution due to missing sanitization in set function. **Note:** This vulnerability derives from an incomplete fix in [CVE-2020-7736](https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'bmoor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23558'}, {'type': 'WEB', 'url': 'https://github.com/b-heilman/bmoor/commit/29b0162cc1dc1791fc060891f568b0ae29bc542b'}, {'type': 'PACKAGE', 'url': 'https://github.com/b-heilman/bmoor/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T20:51:31Z', 'nvd_published_at': '2022-01-28T22:15:00Z'} |
1.4.0 | GHSA-hp5x-rqf7-43vf | 2022-09-21T19:22:58Z | 2022-02-10T20:24:21Z | null | ['CVE-2020-5403'] | Improper Handling of Exceptional Conditions and Improper Input Validation in Reactor Netty | Reactor Netty HttpServer, versions 0.9.3 and 0.9.4, is exposed to a URISyntaxException that causes the connection to be closed prematurely instead of producing a 400 response. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.projectreactor.netty:reactor-netty-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.3'}, {'fixed': '0.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5403'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2020-5403'}] | {'cwe_ids': ['CWE-20', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T20:27:06Z', 'nvd_published_at': '2020-03-03T19:15:00Z'} |
1.4.0 | GHSA-v9mf-jgq3-c28h | 2021-04-09T22:29:34Z | 2022-02-09T22:54:21Z | null | ['CVE-2020-28923'] | Data Amplification in Play Framework | An issue was discovered in Play Framework 2.8.0 through 2.8.4. Carefully crafted JSON payloads sent as a form field lead to Data Amplification. This affects users migrating from a Play version prior to 2.8.0 that used the Play Java API to serialize classes with protected or private fields to JSON. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28923'}, {'type': 'WEB', 'url': 'https://www.playframework.com/security/vulnerability'}, {'type': 'WEB', 'url': 'https://www.playframework.com/security/vulnerability/CVE-2020-28923-ImproperRemovalofSensitiveInformationBeforeStorageorTransfer'}] | {'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T22:29:34Z', 'nvd_published_at': '2020-12-03T17:15:00Z'} |
1.4.0 | GHSA-79jw-2f46-wv22 | 2022-02-25T15:37:37Z | 2022-02-23T21:08:44Z | null | ['CVE-2022-21705'] | Authenticated remote code execution in October CMS | ### Impact
An authenticated user with the permissions to create, modify and delete website pages can exploit this vulnerability to bypass `cms.safe_mode` / `cms.enableSafeMode` in order to execute arbitrary code.
- This issue only affects admin panels that rely on safe mode and restricted permissions.
- To exploit t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.474'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.10'}]}]}, {'... | [{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-79jw-2f46-wv22'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21705'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/commit/c393c5ce9ca2c5acc3ed6c9bb0dab5ffd61965fe'}, {'type': 'PACKAGE', '... | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T21:08:44Z', 'nvd_published_at': '2022-02-23T19:15:00Z'} |
1.4.0 | GHSA-g84f-cmc8-682c | 2022-12-01T23:40:03Z | 2022-02-16T00:01:29Z | null | ['CVE-2022-25184'] | Password parameter default values exposed by Jenkins Pipeline: Build Step Plugin | Jenkins Pipeline: Build Step Plugin 2.15 and earlier reveals password parameter default values when generating a pipeline script using the Pipeline Snippet Generator, allowing attackers with Item/Read permission to retrieve the default password parameter value from jobs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-build-step'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25184'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/pipeline-build-step-plugin/commit/c06f65425fe9696d2237f591959dd4b5c6083fd9'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-build-step-plugin'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T23:40:03Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-878w-7gxp-mc63 | 2021-04-05T23:12:48Z | 2022-02-09T22:16:53Z | null | ['CVE-2020-5428'] | SQL Injection in Spring Cloud Task | In applications using Spring Cloud Task 2.2.4.RELEASE and below, may be vulnerable to SQL injection when exercising certain lookup queries in the TaskExplorer. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-task-dependencies'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5428'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2020-5428'}] | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T23:12:48Z', 'nvd_published_at': '2021-01-27T18:15:00Z'} |
1.4.0 | GHSA-836g-5fr5-fgcr | 2021-07-29T18:21:38Z | 2022-02-10T23:07:37Z | null | ['CVE-2020-11969'] | Missing Authentication for Critical Function in Apache TomEE | If Apache TomEE is configured to use the embedded ActiveMQ broker, and the broker URI includes the useJMX=true parameter, a JMX port is opened on TCP port 1099, which does not include authentication. This affects Apache TomEE 8.0.0-M1 - 8.0.1, Apache TomEE 7.1.0 - 7.1.2, Apache TomEE 7.0.0-M1 - 7.0.7, Apache TomEE 1.0.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomee:tomee'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0-M1'}, {'fixed': '8.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.0.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomee:tomee'}, 'ranges': [... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11969'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r85b87478f8aa4751aa3a06e88622e80ffabae376ee7283e147ee56b9@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbd23418646dedda70a546331ea1c... | {'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T15:57:39Z', 'nvd_published_at': '2020-06-15T20:15:00Z'} |
1.4.0 | GHSA-cp67-8w3w-6h9c | 2021-04-01T20:31:36Z | 2022-02-09T00:58:03Z | null | ['CVE-2020-14366'] | Path Traversal | A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path. Only few specific folder hierarchies can be exposed by this flaw | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14366'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14366'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T20:31:36Z', 'nvd_published_at': '2020-11-09T17:15:00Z'} |
1.4.0 | GHSA-7c6q-jqwc-4423 | 2021-04-13T17:54:22Z | 2022-02-09T23:07:59Z | null | ['CVE-2017-15681'] | Path Traversal in Crafter CMS Crafter Studio | In Crafter CMS Crafter Studio 3.0.1 a directory traversal vulnerability exists which allows unauthenticated attackers to overwrite files from the operating system which can lead to RCE. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15681'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.0/security/advisory.html'}, {'type': 'WEB', 'url': 'http://crafter.com'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T17:54:22Z', 'nvd_published_at': '2020-11-27T18:15:00Z'} |
1.4.0 | GHSA-pqcf-v8v5-jmcg | 2021-05-07T21:58:37Z | 2022-02-10T22:23:18Z | null | ['CVE-2020-28337'] | Zip slip in Microweber | A directory traversal issue in the Utils/Unzip module in Microweber through 1.1.20 allows an authenticated attacker to gain remote code execution via the backup restore feature. To exploit the vulnerability, an attacker must have the credentials of an administrative user, upload a maliciously constructed ZIP file with ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28337'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/777ee9c3e7519eb3672c79ac41066175b2001b50'}, {'type': 'WEB', 'url': 'https://sl1nki.page/advisories/CVE-2020-28337'}, {'type': 'WEB', 'url': 'https://sl1nki.page/blog/2... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T21:58:37Z', 'nvd_published_at': '2021-02-15T20:15:00Z'} |
1.4.0 | GHSA-j8jw-g6fq-mp7h | 2022-11-24T01:37:03Z | 2022-02-09T22:57:29Z | null | ['CVE-2020-25638'] | SQL injection in hibernate-core | A flaw was found in hibernate-core in versions prior to 5.3.20.Final and in 5.4.0.Final up to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access una... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.hibernate:hibernate-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0.Final'}, {'fixed': '5.4.24.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.hibernate:hibernate-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25638'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1881353'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r833c1276e41334fa675848a08daf0c61f39009f9f9a400d9f7006d44@%3Cdev.turbine.apache.org%3E'}, {'type': ... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T22:49:21Z', 'nvd_published_at': '2020-12-02T15:15:00Z'} |
1.4.0 | GHSA-wfvq-p7qf-vv64 | 2023-06-19T16:54:47Z | 2022-02-11T00:00:47Z | 2023-06-19T16:53:38Z | [] | Duplicate advisory: swift-nio-http2 vulnerable to denial of service via mishandled HPACK variable length integer encoding | ## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-w3f6-pc54-gfw7. This link is maintained to preserve external references.
## Original Description
A program using swift-nio-http2 is vulnerable to a denial of service attack, caused by a network peer sending a specially crafted H... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-nio-http2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.19.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-http2/security/advisories/GHSA-w3f6-pc54-gfw7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24667'}, {'type': 'PACKAGE', 'url': 'https://github.com/apple/swift-nio-http2'}] | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T16:53:38Z', 'nvd_published_at': '2022-02-09T23:15:00Z'} |
1.4.0 | GHSA-2m9w-9xh2-wxc3 | 2023-05-24T14:25:01Z | 2022-02-16T00:01:33Z | null | ['CVE-2022-25179'] | Link Following in Jenkins Pipeline Multibranch Plugin | Jenkins Pipeline: Multibranch Plugin prior to 2.23.1, 2.26.1, 696.698.v9b4218eea50f, and 707.v71c3f0a_6ccdb_ follows symbolic links to locations outside of the checkout directory for the configured SCM when reading files using the readTrusted step, allowing attackers able to configure Pipelines permission to read arbit... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-multibranch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.24'}, {'fixed': '2.26.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-multibranch'}, 'ranges': [{'type': 'ECOSY... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25179'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/00bfb5abeecc9f553a2f42954ee540e493498ee9/2022/25xxx/CVE-2022-25179.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613'}] | {'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T20:40:40Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-pqrv-8r2f-7278 | 2022-02-11T20:00:42Z | 2022-02-09T23:29:38Z | null | ['CVE-2022-23590'] | Crash due to erroneous `StatusOr` in TensorFlow | ### Impact
A `GraphDef` from a TensorFlow `SavedModel` can be maliciously altered to cause a TensorFlow process to crash due to encountering [a `StatusOr` value that is an error and forcibly extracting the value from it](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pqrv-8r2f-7278'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23590'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/955059813cc325dc1db5e2daa6221271406d4439'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T18:27:28Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-qh36-44jv-c8xj | 2022-03-30T21:11:43Z | 2022-02-02T00:01:58Z | null | ['CVE-2020-8562'] | Potential proxy IP restriction bypass in Kubernetes | As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to prevent proxied connections from accessing link-local or localhost networks when making user-driven connections to Services, Pods, Nodes, or StorageClass service providers. As part of this mitigation Kubernetes does a DNS name resolution che... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.21.0'}, {'fixed': '1.21.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.20.0'}, {'fixed': '1.20.7'}]}]}, {'pac... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8562'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/101493'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/-MF... | {'cwe_ids': ['CWE-367'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T17:52:40Z', 'nvd_published_at': '2022-02-01T11:15:00Z'} |
1.4.0 | GHSA-vwx4-frpr-w27j | 2022-12-01T22:11:12Z | 2022-02-16T00:01:14Z | null | ['CVE-2022-25210'] | Improper Synchronization in Jenkins Convertigo Mobile Platform Plugin | Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier uses static fields to store job configuration information, allowing attackers with Item/Configure permission to capture passwords of the jobs that will be configured. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.convertigo.jenkins.plugins:convertigo-mobile-platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25210'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/convertigo-mobile-platform-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2280'}] | {'cwe_ids': ['CWE-662', 'CWE-820'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T17:41:42Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-6qq8-5wq3-86rp | 2022-08-04T20:56:21Z | 2022-02-11T23:19:21Z | null | ['CVE-2020-15129'] | Traefik vulnerable to Open Redirect via handling of X-Forwarded-Prefix header | ## Summary
There exists a potential open redirect vulnerability in Traefik's handling of the `X-Forwarded-Prefix` header. Active Exploitation of this issue is unlikely as it would require active header injection, however the Traefik team addressed this issue nonetheless to prevent abuse in e.g. cache poisoning scenari... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0-rc5'}, {'fixed': '1.7.26'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '... | [{'type': 'WEB', 'url': 'https://github.com/containous/traefik/security/advisories/GHSA-6qq8-5wq3-86rp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15129'}, {'type': 'WEB', 'url': 'https://github.com/containous/traefik/pull/7109'}, {'type': 'WEB', 'url': 'https://github.com/containous/traef... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T18:21:00Z', 'nvd_published_at': '2020-07-30T16:15:00Z'} |
1.4.0 | GHSA-grc3-8q8m-4j7c | 2021-04-07T22:41:39Z | 2022-02-09T22:37:59Z | null | ['CVE-2020-17533'] | Improper privilege handling in Apache Accumulo | Apache Accumulo versions 1.5.0 through 1.10.0 and version 2.0.0 do not properly check the return value of some policy enforcement functions before permitting an authenticated user to perform certain administrative operations. Specifically, the return values of the 'canFlush' and 'canPerformSystemActions' security funct... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.accumulo:accumulo-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.10.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.accumulo:accumulo-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17533'}, {'type': 'WEB', 'url': 'https://github.com/apache/accumulo/commit/877ad502f6857e48342664e4b0ce83db74e4cda4'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser.... | {'cwe_ids': ['CWE-280', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:41:39Z', 'nvd_published_at': '2020-12-29T12:15:00Z'} |
1.4.0 | GHSA-8786-wg74-f522 | 2021-04-13T18:21:39Z | 2022-02-09T23:07:54Z | null | ['CVE-2020-25803'] | Improper Control of Dynamically-Managed Code Resources in Crafter CMS Crafter Studio | Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via FreeMarker template exposed objects. This issue affects: Crafter Software Crafter CMS 3.0 versions prior to 3.0.27; 3.1 versions prior to 3.1.7. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.27'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1'}, {'fixe... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25803'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2020080102'}] | {'cwe_ids': ['CWE-913'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T18:21:39Z', 'nvd_published_at': '2020-10-06T15:15:00Z'} |
1.4.0 | GHSA-8grg-q944-cch5 | 2022-05-03T02:28:28Z | 2022-02-10T23:05:04Z | null | ['CVE-2019-14900'] | SQL Injection in Hibernate ORM | A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Beta1. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.infinispan:infinispan-hibernate-cache-v53'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.18'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.infinispan:infinispan-hibernate-cache-v53'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14900'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1666499'}, {'type': 'PACKAGE', 'url': 'https://github.com/infinispan/infinispan'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r833c1276e41334fa675848a08d... | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T17:45:44Z', 'nvd_published_at': '2020-07-06T19:15:00Z'} |
1.4.0 | GHSA-f9fq-vjvh-779p | 2021-05-12T20:21:27Z | 2022-02-15T01:57:18Z | null | ['CVE-2020-24359'] | Improper Input Validation in vault-ssh-helper | HashiCorp vault-ssh-helper up to and including version 0.1.6 incorrectly accepted Vault-issued SSH OTPs for the subnet in which a host's network interface was located, rather than the specific IP address assigned to that interface. Fixed in 0.2.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault-ssh-helper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault-ssh-helper/helper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24359'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault-ssh-helper/commit/83effd08cbcbe4b993d776bd9b39465cd9e4603f'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault-ssh-helper/blob/master/CHANGELOG.md#020-august-19-2020'}, {... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T20:21:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gc79-gh4f-9g6w | 2022-03-01T21:31:55Z | 2022-02-19T00:01:24Z | null | ['CVE-2021-46063'] | Server Side Template Injection in MCMS | MCMS v5.2.5 was discovered to contain a Server Side Template Injection (SSTI) vulnerability via the Template Management module. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46063'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/59'}] | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T20:57:56Z', 'nvd_published_at': '2022-02-18T20:15:00Z'} |
1.4.0 | GHSA-7fhr-2694-rg79 | 2022-11-08T20:21:38Z | 2022-02-15T01:39:57Z | null | ['CVE-2020-10714'] | Session Fixation in WildFly Elytron | A flaw was found in WildFly Elytron version 1.11.3.Final and before. When using WildFly Elytron FORM authentication with a session ID in the URL, an attacker could perform a session fixation attack. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.security:wildfly-elytron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10714'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1825714'}, {'type': 'PACKAGE', 'url': 'https://github.com/wildfly-security/wildfly-elytron'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201223-00... | {'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T01:26:35Z', 'nvd_published_at': '2020-09-23T13:15:00Z'} |
1.4.0 | GHSA-h39q-95q5-9jfp | 2023-02-03T20:42:31Z | 2022-02-09T00:11:19Z | null | ['CVE-2020-1734'] | OS Command Injection in ansible | A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1734'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67792'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/70159'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2020:0547'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T18:38:15Z', 'nvd_published_at': '2020-03-03T22:15:00Z'} |
1.4.0 | GHSA-247x-2f9f-5wp7 | 2022-02-11T20:00:23Z | 2022-02-09T23:30:01Z | null | ['CVE-2022-23591'] | Stack overflow in TensorFlow | ### Impact
The `GraphDef` format in TensorFlow does not allow self recursive functions. The runtime assumes that this invariant is satisfied. However, a `GraphDef` containing a fragment such as the following can be consumed when loading a `SavedModel`:
```
library {
function {
signature {
name: "So... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-247x-2f9f-5wp7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23591'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-400', 'CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T18:23:58Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-m4hf-j54p-p353 | 2022-02-11T17:05:51Z | 2022-02-10T00:19:50Z | null | ['CVE-2022-21731'] | Type confusion leading to segfault in Tensorflow | ### Impact
The [implementation of shape inference for `ConcatV2`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/common_shape_fns.cc#L1961-L2059) can be used to trigger a denial of service attack via a segfault caused by a type confusion:
```python
imp... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m4hf-j54p-p353'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21731'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-754', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T19:01:09Z', 'nvd_published_at': '2022-02-03T12:15:00Z'} |
1.4.0 | GHSA-33p6-fx42-7rf5 | 2021-05-24T19:08:11Z | 2022-02-11T23:17:02Z | null | ['CVE-2020-13788'] | Harbor is vulnerable to a limited Server-Side Request Forgery (SSRF) (CVE-2020-13788) | # Impact
Matt Hamilton from Soluble has discovered a limited Server-Side Request Forgery (SSRF) that allowed Harbor project owners to scan the TCP ports of hosts on the Harbor server's internal network.
The vulnerability was immediately fixed by the Harbor team.
# Issue
The “Test Endpoint” API, part of the functi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '2.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories/GHSA-33p6-fx42-7rf5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13788'}, {'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/releases'}, {'type': 'WEB', 'url': 'https://www.soluble.ai/blog/harbor-ssrf-cv... | {'cwe_ids': ['CWE-918'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T19:08:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hgpg-593r-hhvp | 2021-04-01T21:35:42Z | 2022-02-09T00:56:37Z | null | ['CVE-2020-10748'] | Cross-site Scripting in Keycloak | A flaw was found in Keycloak's data filter, in version 10.0.1, where it allowed the processing of data URLs in some circumstances. This flaw allows an attacker to conduct cross-site scripting or further attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10748'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1836786'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T21:35:42Z', 'nvd_published_at': '2020-09-16T18:15:00Z'} |
1.4.0 | GHSA-g622-r636-qfqh | 2021-05-17T16:33:43Z | 2022-02-15T01:57:18Z | null | ['CVE-2019-9039'] | SQL Injection in Couchbase Sync Gateway | The Couchbase Sync Gateway 2.1.2 in combination with a Couchbase Server is affected by a previously undisclosed N1QL-injection vulnerability in the REST API. An attacker with access to the public REST API can insert additional N1QL statements through the parameters ?startkey? and ?endkey? of the ?_all_docs? endpoint. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/couchbase/sync_gateway'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9039'}, {'type': 'WEB', 'url': 'https://github.com/couchbase/sync_gateway/commit/97adb5b496aa96aa70398018ea96da913ffd8d8c'}, {'type': 'WEB', 'url': 'https://docs.couchbase.com/sync-gateway/2.5/release-notes.html'}, {'type': 'WEB', 'url': 'https://r... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T16:33:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-254q-rqmw-vx45 | 2022-02-24T13:05:38Z | 2022-02-16T00:01:52Z | null | ['CVE-2022-0588'] | Exposure of Sensitive Information to an Unauthorized Actor in librenms | Exposure of Sensitive Information to an Unauthorized Actor in Packagist librenms/librenms prior to 22.2.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0588'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/caab3310-... | {'cwe_ids': ['CWE-200', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:53:08Z', 'nvd_published_at': '2022-02-15T08:15:00Z'} |
1.4.0 | GHSA-rcvx-rmvf-mxch | 2021-04-06T21:53:29Z | 2022-02-09T22:19:44Z | null | ['CVE-2020-27219'] | Cross-site Scripting in Eclipse Hawkbit | In all version of Eclipse Hawkbit prior to 0.3.0M7, the HTTP 404 (Not Found) JSON response body returned by the REST API may contain unsafe characters within the path attribute. Sending a POST request to a non existing resource will return the full path from the given URL unescaped to the client. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27219'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/hawkbit/issues/1067'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/hawkbit/commit/94b7c12cde1b38eda5414bd88d6d068008cfb9f9'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/s... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:53:29Z', 'nvd_published_at': '2021-01-14T23:15:00Z'} |
1.4.0 | GHSA-33wf-4crm-2322 | 2022-02-24T12:12:44Z | 2022-02-16T00:01:58Z | null | ['CVE-2022-0580'] | Improper Access Control in librenms | Improper Access Control in Packagist librenms/librenms prior to 22.2.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0580'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2494106c-... | {'cwe_ids': ['CWE-284', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:51:15Z', 'nvd_published_at': '2022-02-14T23:15:00Z'} |
1.4.0 | GHSA-h6pr-c536-6rjg | 2022-02-11T16:16:47Z | 2022-02-05T00:00:31Z | null | ['CVE-2021-23507'] | Prototype Pollution in object-path-set | The package object-path-set before 1.0.2 are vulnerable to Prototype Pollution via the setPath method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-OBJECTPATHSET-607908 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'object-path-set'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23507'}, {'type': 'WEB', 'url': 'https://github.com/skratchdot/object-path-set/commit/2d67a714159c4099589b6661fa84e6d2adc31761'}, {'type': 'PACKAGE', 'url': 'https://github.com/skratchdot/object-path-set/'}, {'type': 'WEB', 'url': 'https://github.c... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T19:07:16Z', 'nvd_published_at': '2022-02-04T20:15:00Z'} |
1.4.0 | GHSA-8wr4-2wm6-w3pr | 2022-03-08T18:24:32Z | 2022-02-24T13:11:51Z | null | ['CVE-2022-23653'] | B2 Command Line Tool TOCTOU application key disclosure | ### Impact
Linux and Mac releases of the B2 command-line tool version 3.2.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition.
The command line tool saves API keys (and bucket name-to-id mapping... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'b2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Backblaze/B2_Command_Line_Tool/security/advisories/GHSA-8wr4-2wm6-w3pr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23653'}, {'type': 'WEB', 'url': 'https://github.com/Backblaze/B2_Command_Line_Tool/commit/c74029f9f75065e8f7e3c3ec8e0a23fb8204feeb'... | {'cwe_ids': ['CWE-367'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T13:11:51Z', 'nvd_published_at': '2022-02-23T23:15:00Z'} |
1.4.0 | GHSA-hcw3-j74m-qc58 | 2022-02-23T22:04:25Z | 2022-02-09T22:17:37Z | null | ['CVE-2022-23628'] | Incorrect Calculation in github.com/open-policy-agent/opa | ### Impact
Under certain conditions, pretty-printing an AST that contains synthetic nodes could change the logic of some statements by reordering array literals. Example of policies impacted are those that parse and compare web paths, see the example below.
**All of these** three conditions have to be met to create a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/open-policy-agent/opa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.33.1'}, {'fixed': '0.37.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/open-policy-agent/opa/security/advisories/GHSA-hcw3-j74m-qc58'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23628'}, {'type': 'WEB', 'url': 'https://github.com/open-policy-agent/opa/pull/3851'}, {'type': 'WEB', 'url': 'https://github.com/open-polic... | {'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T22:17:37Z', 'nvd_published_at': '2022-02-09T22:15:00Z'} |
1.4.0 | GHSA-qpv2-jxc7-3638 | 2022-02-24T13:13:01Z | 2022-02-15T00:02:47Z | null | ['CVE-2022-0569'] | Exposure of Sensitive Information in snipe/snipe-it | Snipe-IT prior to v5.3.10 is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0569'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/05c0819776b07425b2831cd31a8a0f4e7ac30c09'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b41d5e63-bcd8-4... | {'cwe_ids': ['CWE-200', 'CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:40:14Z', 'nvd_published_at': '2022-02-14T12:15:00Z'} |
1.4.0 | GHSA-r5cq-9537-9rpf | 2021-12-13T21:33:52Z | 2022-02-10T23:52:01Z | null | ['CVE-2021-28860'] | Prototype Pollution in mixme | Node.js mixme 0.5.0, an attacker can add or alter properties of an object via '__proto__' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mixme'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9g4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28860'}, {'type': 'WEB', 'url': 'https://github.com/adaltas/node-mixme/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/adaltas/node-mixm... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T21:34:53Z', 'nvd_published_at': '2021-05-03T12:15:00Z'} |
1.4.0 | GHSA-h48w-c35p-6m8x | 2021-04-22T17:02:38Z | 2022-02-10T20:23:25Z | null | ['CVE-2020-27196'] | Out-of-bounds Write in Play Framework | An issue was discovered in PlayJava in Play Framework 2.6.0 through 2.8.2. The body parsing of HTTP requests eagerly parses a payload given a Content-Type header. A deep JSON structure sent to a valid POST endpoint (that may or may not expect JSON payloads) causes a StackOverflowError and Denial of Service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.3'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27196'}, {'type': 'WEB', 'url': 'https://github.com/playframework/playframework/pull/10321'}, {'type': 'WEB', 'url': 'https://www.playframework.com/security/vulnerability/CVE-2020-27196-DosViaJsonStackOverflow'}] | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T17:02:38Z', 'nvd_published_at': '2020-11-06T14:15:00Z'} |
1.4.0 | GHSA-hwrr-rhmm-vcvf | 2021-05-12T21:41:14Z | 2022-02-15T01:57:18Z | null | ['CVE-2020-8569'] | NULL Pointer Dereference in Kubernetes CSI snapshot-controller | Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when:
- The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass.
- The snapshot-controller crashes, is automatically res... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes-csi/external-snapshotter/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes-csi/external-snapshotter/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'even... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8569'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes-csi/external-snapshotter/issues/380'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/1EzCr1qUxxU'}] | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:41:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wxjg-p59j-6c92 | 2022-03-08T18:26:50Z | 2022-02-26T00:00:44Z | null | ['CVE-2022-25328'] | Command injection in github.com/google/fscrypt | The bash_completion script for fscrypt allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint path and if the syst... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/google/fscrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25328'}, {'type': 'WEB', 'url': 'https://github.com/google/fscrypt/pull/346'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/fscrypt/'}] | {'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:30:03Z', 'nvd_published_at': '2022-02-25T11:15:00Z'} |
1.4.0 | GHSA-85p9-j7c9-v4gr | 2023-08-29T18:49:34Z | 2022-02-15T01:57:18Z | null | ['CVE-2019-10214'] | containers/image library Insufficiently Protects Credentials | The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and ste... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/image'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10214'}, {'type': 'WEB', 'url': 'https://github.com/containers/image/issues/654'}, {'type': 'WEB', 'url': 'https://github.com/containers/image/pull/655'}, {'type': 'WEB', 'url': 'https://github.com/containers/image/pull/669'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T17:33:33Z', 'nvd_published_at': '2019-11-25T11:15:00Z'} |
1.4.0 | GHSA-h289-x5wc-xcv8 | 2022-02-16T22:56:21Z | 2022-02-16T22:56:21Z | null | [] | Improper Validation of Certificate with Host Mismatch in mellium.im/xmpp/websocket | ### Impact
If no TLS configuration is provided by the user, the websocket package constructs its own TLS configuration using recommended defaults. When looking up a WSS endpoint using the DNS TXT record method described in [XEP-0156: Discovering Alternative XMPP Connection Methods](https://xmpp.org/extensions/xep-0156... | [] | [{'package': {'ecosystem': 'Go', 'name': 'mellium.im/xmpp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.21.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mellium/xmpp/security/advisories/GHSA-h289-x5wc-xcv8'}, {'type': 'WEB', 'url': 'https://github.com/mellium/xmpp/pull/260'}, {'type': 'WEB', 'url': 'https://github.com/mellium/xmpp/commit/0d92aa486da69b71f2f4a30e62aa722c711b98ac'}, {'type': 'WEB', 'url': 'https://mellium.im/cv... | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:56:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-65hp-4vxr-c356 | 2022-02-23T21:53:30Z | 2022-02-12T00:00:37Z | null | ['CVE-2021-46363'] | Arbitrary code execution in Magnolia CMS | An issue in the Export function of Magnolia v6.2.3 and below allows attackers to execute arbitrary code via a crafted CSV/XLS file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'info.magnolia:magnolia-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46363'}, {'type': 'WEB', 'url': 'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory'}, {'type': 'WEB', 'url': 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46363... | {'cwe_ids': ['CWE-1236'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:43:59Z', 'nvd_published_at': '2022-02-11T21:15:00Z'} |
1.4.0 | GHSA-f85h-23mf-2fwh | 2021-08-31T21:09:28Z | 2022-02-09T22:00:04Z | null | ['CVE-2020-1738'] | Argument Injection in Ansible | A flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be v... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.9.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1738'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67796'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1738'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-88'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T18:34:03Z', 'nvd_published_at': '2020-03-16T16:15:00Z'} |
1.4.0 | GHSA-9px9-73fg-3fqp | 2022-02-11T20:00:54Z | 2022-02-09T23:29:14Z | null | ['CVE-2022-23589'] | Null pointer dereference in Grappler's `IsConstant` | ### Impact
Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the second place):
First, during [constant folding](... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9px9-73fg-3fqp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23589'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T18:50:26Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-g5wh-fw4m-2v28 | 2022-12-01T22:44:48Z | 2022-02-16T00:01:23Z | null | ['CVE-2022-25194'] | CSRF vulnerability in Jenkins autonomiq plugin | autonomiq Plugin 1.15 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password.
Additionally, this HTTP endpoint does not require POST requests, resulting in a cross-si... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:autonomiq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25194'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/autonomiq-plugin'}, {'type': 'WEB', 'url': 'https://www.jenki... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T20:57:40Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-fqfh-778m-2v32 | 2021-05-21T22:06:12Z | 2022-02-11T23:41:11Z | null | [] | GitHub CLI can execute a git binary from the current directory | ### Impact
GitHub CLI depends on a `git.exe` executable being found in system `%PATH%` on Windows. However, if a malicious `.\git.exe` or `.\git.bat` is found in the current working directory at the time of running `gh`, the malicious command will be invoked instead of the system one.
Windows users who run `gh` inside... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cli/cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/cli/cli/security/advisories/GHSA-fqfh-778m-2v32'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T22:06:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qqwx-hcp6-25vr | 2022-12-01T23:38:24Z | 2022-02-16T00:01:29Z | null | ['CVE-2022-25185'] | Stored XSS vulnerability in Jenkins Generic Webhook Trigger Plugin | Jenkins Generic Webhook Trigger Plugin 1.81 and earlier does not escape the build cause when using the webhook, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to trigger builds using the webhook. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:generic-webhook-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.82'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25185'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/generic-webhook-trigger-plugin/commit/b289c32aa74439f3a8deb7674128a3a6fd90a61c'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/generic-webhook-trigger-plugin'}, {'type': 'WEB... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T23:38:24Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-cg3q-j54f-5p7p | 2022-02-25T15:41:10Z | 2022-02-16T22:26:35Z | null | ['CVE-2022-21698'] | Uncontrolled Resource Consumption in promhttp | This is the Go client library for Prometheus. It has two separate parts, one for instrumenting application code, and one for creating clients that talk to the Prometheus HTTP API. client_golang is the instrumentation library for Go applications in Prometheus, and the promhttp package in client_golang provides tooling a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/client_golang'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21698'}, {'type': 'WEB', 'url': 'https://github.com/prometheus/client_golang/pull/962'}, {'type': 'WEB', 'url': 'https://github.com/prome... | {'cwe_ids': ['CWE-400', 'CWE-772'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:26:35Z', 'nvd_published_at': '2022-02-15T16:15:00Z'} |
1.4.0 | GHSA-gcvh-66ff-4mwm | 2022-02-11T16:55:36Z | 2022-02-10T00:21:12Z | null | ['CVE-2022-21734'] | `CHECK`-failures in Tensorflow | ### Impact
The [implementation of `MapStage`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/map_stage_op.cc#L519-L550) is vulnerable a `CHECK`-fail if the key tensor is not a scalar:
```python
import tensorflow as tf
import numpy as np
tf.raw_ops.MapSt... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gcvh-66ff-4mwm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21734'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f57315566d7094f322b784947093406c2aea0d7d'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T19:45:02Z', 'nvd_published_at': '2022-02-03T13:15:00Z'} |
1.4.0 | GHSA-4w8p-x6g8-fv64 | 2022-02-23T17:39:11Z | 2022-02-01T00:48:54Z | null | ['CVE-2022-0339'] | Server-Side Request Forgery in calibreweb | calibreweb prior to version 0.6.16 contains a Server-Side Request Forgery (SSRF) vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'calibreweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0339'}, {'type': 'WEB', 'url': 'https://github.com/janeczku/calibre-web/commit/35f6f4c727c887f8f3607fe3233dbc1980d15020'}, {'type': 'WEB', 'url': 'https://github.com/janeczku/calibre-web/commit/3b216bfa07ec7992eff03e55d61732af6df9bb92'}, {'type': '... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T22:07:47Z', 'nvd_published_at': '2022-01-30T14:15:00Z'} |
1.4.0 | GHSA-wh98-p28r-vrc9 | 2022-02-24T13:15:43Z | 2022-02-11T20:49:14Z | null | ['CVE-2022-23633'] | Exposure of information in Action Pack | ### Impact
Under certain circumstances response bodies will not be closed, for example a [bug in a webserver](https://github.com/puma/puma/pull/2812) or a bug in a Rack middleware. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0.0'}, {'fixed': '5.2.6.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.6.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSY... | [{'type': 'WEB', 'url': 'https://github.com/rails/rails/security/advisories/GHSA-wh98-p28r-vrc9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23633'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/f9a2ad03943d5c2ba54e1d45f155442b519c75da'}, {'type': 'WEB', 'url': 'https://dis... | {'cwe_ids': ['CWE-200', 'CWE-212'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-11T20:49:14Z', 'nvd_published_at': '2022-02-11T21:15:00Z'} |
1.4.0 | GHSA-v54f-xcmp-43cr | 2021-04-26T14:48:19Z | 2022-02-10T20:39:47Z | null | ['CVE-2020-1947'] | Deserialization of Untrusted Data in Apache ShardingSphere | In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere's web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shardingsphere:shardingsphere'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC3'}, {'fixed': '4.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1947'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4a61a24c119bd820da6fb02100d286f8aae55c8f9b94a346b9bb27d8%40%3Cdev.shardingsphere.apache.org%3E'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-26T14:48:19Z', 'nvd_published_at': '2020-03-11T21:15:00Z'} |
1.4.0 | GHSA-9f52-hpvw-v96w | 2021-04-19T23:18:06Z | 2022-02-10T20:22:06Z | null | ['CVE-2020-27217'] | Improper Validation of Specified Quantity in Input in Eclipse Hono | In Eclipse Hono version 1.3.0 and 1.4.0 the AMQP protocol adapter does not verify the size of AMQP messages received from devices. In particular, a device may send messages that are bigger than the max-message-size that the protocol adapter has indicated during link establishment. While the AMQP 1.0 protocol explicitly... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hono:hono-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27217'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=567068'}] | {'cwe_ids': ['CWE-1284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T23:18:06Z', 'nvd_published_at': '2020-11-13T20:15:00Z'} |
1.4.0 | GHSA-73wx-rpj3-mx46 | 2022-03-01T21:31:14Z | 2022-02-19T00:01:25Z | null | ['CVE-2021-46037'] | Path traversal in MCMS | MCMS v5.2.4 was discovered to contain an arbitrary file deletion vulnerability via the component /template/unzip.do. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46037'}, {'type': 'WEB', 'url': 'https://lycshub.github.io/2021/12/28/MCMS-vulnerabilities/'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T20:58:21Z', 'nvd_published_at': '2022-02-18T19:15:00Z'} |
1.4.0 | GHSA-fpcp-9h7m-ffpx | 2022-02-11T19:55:40Z | 2022-02-09T23:33:17Z | null | ['CVE-2022-23595'] | Null pointer dereference in TensorFlow | ### Impact
When [building an XLA compilation cache](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/compiler/jit/xla_platform_info.cc#L43-L104), if default settings are used, TensorFlow triggers a null pointer dereference:
```cc
string allowed_gpus =
flr->conf... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fpcp-9h7m-ffpx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23595'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e21af685e1828f7ca65038307df5cc06de4479e8'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T18:12:23Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-fr76-2wp8-fp92 | 2023-09-05T23:08:50Z | 2022-02-10T23:35:21Z | null | ['CVE-2021-32820'] | Insecure template handling in Express-handlebars | Express-handlebars is a Handlebars view engine for Express. Express-handlebars mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewh... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'express-handlebars'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32820'}, {'type': 'WEB', 'url': 'https://github.com/express-handlebars/express-handlebars/pull/163'}, {'type': 'WEB', 'url': 'https://github.com/express-handlebars/express-handlebars/commit/78c47a235c4ad7bc2674bddd8ec2721567ed8c72'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-200', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T18:45:00Z', 'nvd_published_at': '2021-05-14T19:15:00Z'} |
1.4.0 | GHSA-52vv-3vf7-f7wh | 2022-03-02T21:57:09Z | 2022-02-19T00:01:28Z | null | ['CVE-2022-0671'] | Server-Side Request Forgery and Uncontrolled Resource Consumption in LemMinX | A flaw was found in vscode-xml in versions prior to 0.19.0. Schema download could lead to blind SSRF or DoS via a large file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.lemminx:lemminx-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.19.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0671'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/lemminx/issues/1169'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/lemminx'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/lemminx/blob/master/CHANGELOG.md#0190-february-14... | {'cwe_ids': ['CWE-400', 'CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T15:02:26Z', 'nvd_published_at': '2022-02-18T18:15:00Z'} |
1.4.0 | GHSA-gcv8-gh4r-25x6 | 2022-04-01T18:06:53Z | 2022-02-17T00:00:35Z | null | ['CVE-2022-0613'] | Authorization Bypass Through User-Controlled Key in urijs | Attacker can use case-insensitive protocol schemes like HTTP, htTP, HTtp etc. in order to bypass the patch for CVE-2021-3647. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'urijs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0613'}, {'type': 'WEB', 'url': 'https://github.com/medialize/uri.js/commit/6ea641cc8648b025ed5f30b090c2abd4d1a5249f'}, {'type': 'PACKAGE', 'url': 'https://github.com/medialize/uri.js'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f53d5c42-c1... | {'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-17T23:36:53Z', 'nvd_published_at': '2022-02-16T09:15:00Z'} |
1.4.0 | GHSA-g6ww-v8xp-vmwg | 2022-04-18T21:58:49Z | 2022-02-10T20:21:24Z | null | ['CVE-2020-7751'] | Prototype pollution in pathval | A prototype pollution vulnerability affects all versions of package pathval under 1.1.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'pathval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7751'}, {'type': 'WEB', 'url': 'https://github.com/chaijs/pathval/pull/58/commits/21a9046cfa0c2697cb41990f3b4316db410e6c8a'}, {'type': 'WEB', 'url': 'https://github.com/chaijs/pathval/pull/58/files'}, {'type': 'PACKAGE', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-1321', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T17:32:20Z', 'nvd_published_at': '2020-10-26T12:17:00Z'} |
1.4.0 | GHSA-5qw5-89mw-wcg2 | 2022-02-11T20:48:38Z | 2022-02-09T23:55:43Z | null | ['CVE-2022-23566'] | Out of bounds write in Tensorflow | ### Impact
TensorFlow is vulnerable to a heap OOB write in [Grappler](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/graph_properties.cc#L1132-L1141):
```cc
Status SetUnknownShape(const NodeDef* node, int output_port) {
shape_inference::ShapeHand... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5qw5-89mw-wcg2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23566'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/97282c6d0d34476b6ba033f961590b783fa184cd'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T21:04:00Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-6hv3-7c34-4hx8 | 2023-04-17T19:21:09Z | 2022-02-15T01:57:18Z | null | ['CVE-2019-14802'] | Hashicorp Nomad Information Exposure Through Environmental Variables | In Nomad before version 0.9.5, when rendering a task template, all environment variables were available to the rendering task. As a fix, only task environment variables are used. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14802'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/pull/6055'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/commit/e8238305ef0b9ef37be3efd86a8d34bfbed5f63f'}, {'type': 'WEB', 'url': 'https://advisories.gitlab.com/adv... | {'cwe_ids': ['CWE-526'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T17:59:46Z', 'nvd_published_at': '2022-12-26T21:15:00Z'} |
1.4.0 | GHSA-9jg9-6wm2-x7p5 | 2021-05-13T15:36:05Z | 2022-02-10T23:04:32Z | null | ['CVE-2020-11980'] | Server-Side Request Forgery in Karaf | In Karaf, JMX authentication takes place using JAAS and authorization takes place using ACL files. By default, only an "admin" can actually invoke on an MBean. However there is a vulnerability there for someone who is not an admin, but has a "viewer" role. In the 'etc/jmx.acl.cfg', such as role can call get*. It's poss... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11980'}, {'type': 'WEB', 'url': 'http://karaf.apache.org/security/cve-2020-11980.txt'}] | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T15:36:05Z', 'nvd_published_at': '2020-06-12T22:15:00Z'} |
1.4.0 | GHSA-x27w-qxhg-343v | 2021-05-20T17:02:56Z | 2022-02-15T01:57:18Z | null | ['CVE-2017-14623'] | Access Restriction Bypass in go-ldap | In the ldap.v2 (aka go-ldap) package through 2.5.0 for Go, an attacker may be able to login with an empty password. This issue affects an application using this package if these conditions are met: (1) it relies only on the return error of the Bind function call to determine whether a user is authorized (i.e., a nil re... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/go-ldap/ldap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-14623'}, {'type': 'WEB', 'url': 'https://github.com/go-ldap/ldap/pull/126'}, {'type': 'WEB', 'url': 'https://github.com/go-ldap/ldap/commit/95ede1266b237bf8e9aa5dce0b3250e51bfefe66'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T17:02:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qx3f-p745-w4hr | 2022-02-11T15:07:29Z | 2022-02-09T23:54:07Z | null | ['CVE-2022-23562'] | Integer overflow in Tensorflow | ### Impact
The implementation of `Range` suffers from integer overflows. These can trigger undefined behavior or, in some scenarios, extremely large allocations.
### Patches
We have patched the issue in GitHub commit [f0147751fd5d2ff23251149ebad9af9f03010732](https://github.com/tensorflow/tensorflow/commit/f0147751fd5... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qx3f-p745-w4hr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23562'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/52676'}, {'type': 'WEB', 'url': 'https://github.com/tensorf... | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:51:55Z', 'nvd_published_at': '2022-02-04T23:15:00Z'} |
1.4.0 | GHSA-jp32-vmm6-3vf5 | 2023-08-30T11:46:16Z | 2022-02-15T01:57:18Z | null | ['CVE-2015-5305'] | Directory Traversal in Kubernetes | Directory traversal vulnerability in Kubernetes, as used in Red Hat OpenShift Enterprise 3.0, allows attackers to write to arbitrary files via a crafted object type name, which is not properly handled before passing it to etcd. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functi... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5305'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/16381'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/commit/37f730f68c7f06e060f90714439bfb0dbb2df5e7'}, {'type': 'WEB', 'url': 'https://github.com/ku... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:19:56Z', 'nvd_published_at': '2015-11-06T18:59:00Z'} |
1.4.0 | GHSA-4wp3-8q92-mh8w | 2023-09-15T20:20:04Z | 2022-02-09T00:00:29Z | null | ['CVE-2021-45326'] | Cross Site Request Forgery in Gitea | Cross Site Request Forgery (CSRF) vulnerability exists in Gitea before 1.5.2 via API routes.This can be dangerous especially with state altering POST requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/go-gitea/gitea'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45326'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/issues/4838'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/4840'}, {'type': 'WEB', 'url': 'https://blog.gitea.io/2018/10/gitea-1.5.2-is-released/'}, {'type': 'PAC... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T23:01:01Z', 'nvd_published_at': '2022-02-08T15:15:00Z'} |
1.4.0 | GHSA-4fqx-74rv-638w | 2023-09-15T18:12:48Z | 2022-02-15T01:57:18Z | null | ['CVE-2019-3792'] | Pivotal Concourse SQL Injection Vulnerability | Pivotal Concourse version 5.0.0, contains an API that is vulnerable to SQL injection. An Concourse resource can craft a version identifier that can carry a SQL injection payload to the Concourse server, allowing the attacker to read privileged data. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/concourse'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3792'}, {'type': 'WEB', 'url': 'https://github.com/concourse/concourse/commit/dc3d15ab6c3a69890c9985f9c875d4c2949be727'}, {'type': 'WEB', 'url': 'https://github.com/concourse/concourse/blob/master/release-notes/v5.0.1.md#v501-note-1'}, {'type': 'WE... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T18:21:05Z', 'nvd_published_at': None} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.