schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-rmr5-cpv2-vgjf
2022-02-07T21:02:28Z
2022-02-01T00:48:15Z
null
['CVE-2021-43859']
Denial of Service by injecting highly recursive collections or maps in XStream
### Impact The vulnerability may allow a remote attacker to allocate 100% CPU time on the target system depending on CPU type or parallel execution of such a payload resulting in a denial of service only by manipulating the processed input stream. ### Patches XStream 1.4.19 monitors and accumulates the time it takes t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.19'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-rmr5-cpv2-vgjf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43859'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/commit/e8e88621ba1c85ac3b8620337dd672e0c0c3a846'}, {'type': 'PACKAGE', 'url'...
{'cwe_ids': ['CWE-400', 'CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T20:12:15Z', 'nvd_published_at': '2022-02-01T12:15:00Z'}
1.4.0
GHSA-vf77-8h7g-gghp
2022-02-08T22:05:00Z
2022-02-08T22:05:00Z
null
['CVE-2020-13934']
Improper Restriction of Operations within the Bounds of a Memory Buffer in Apache Tomcat
An h2c direct connection to Apache Tomcat 10.0.0-M1 to 10.0.0-M6, 9.0.0.M5 to 9.0.36 and 8.5.1 to 8.5.56 did not release the HTTP/1.1 processor after the upgrade to HTTP/2. If a sufficient number of such requests were made, an OutOfMemoryException could occur leading to a denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0-M1'}, {'fixed': '10.0.0-M6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.0-M5'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13934'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r61f411cf82488d6ec213063fc15feeeb88e31b0ca9c29652ee4f962e%40%3Cannounce.tomcat.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra072b1f786e7d139e86f...
{'cwe_ids': ['CWE-119', 'CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-12T18:34:04Z', 'nvd_published_at': '2020-07-14T15:15:00Z'}
1.4.0
GHSA-f5fj-7265-jxhj
2023-09-15T18:06:52Z
2022-02-15T01:57:18Z
null
['CVE-2018-1000803']
Gitea Exposes Private Email Addresses
Gitea version prior to version 1.5.1 contains a CWE-200 vulnerability that can result in Exposure of users private email addresses. This attack appear to be exploitable via Watch a repository to receive email notifications. Emails received contain the other recipients even if they have the email set as private. This vu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/go-gitea/gitea/models'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000803'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/4664'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/4664/files#diff-146e0c2b5bb1ea96c9fb73d509456e57'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T18:09:38Z', 'nvd_published_at': None}
1.4.0
GHSA-h9vc-2p9g-63gp
2022-02-24T13:10:51Z
2022-02-15T00:02:47Z
null
['CVE-2022-0565']
Exposure of Sensitive Information to an Unauthorized Actor in pimcore
Exposure of Sensitive Information to an Unauthorized Actor in Packagist pimcore/pimcore prior to 10.3.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0565'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/7697f709a501860144352696e583a2533a6e1245'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore/'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b0b29656-4bb...
{'cwe_ids': ['CWE-200', 'CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:43:57Z', 'nvd_published_at': '2022-02-14T12:15:00Z'}
1.4.0
GHSA-vv6j-ww6x-54gx
2022-04-12T15:14:36Z
2022-02-22T21:51:19Z
null
['CVE-2022-0609']
Use after free in Animation
CVE-2022-0609: Use after free in Animation - https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0609 Google is aware of reports that exploits for CVE-2022-0609 exist in the wild. The exploitation is known to be easy. The a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '98.1.210'}]}], 'database_specific': {'last_known_affected_version_range': '<= 98.1.190'}}, {'package': {'ecosystem': 'NuGet', 'name': 'CefSharp.OffScreen'}, 'ranges': [{'type': 'EC...
[{'type': 'WEB', 'url': 'https://github.com/cefsharp/CefSharp/security/advisories/GHSA-vv6j-ww6x-54gx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0609'}, {'type': 'WEB', 'url': 'https://chromereleases.googleblog.com/2022/02/stable-channel-update-for-desktop_14.html'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T21:51:19Z', 'nvd_published_at': '2022-04-05T00:15:00Z'}
1.4.0
GHSA-4j82-5ccr-4r8v
2022-02-11T20:38:31Z
2022-02-10T00:34:01Z
null
['CVE-2022-23582']
`CHECK`-failures in `TensorByteSize` in Tensorflow
### Impact A malicious user can cause a denial of service by altering a `SavedModel` such that [`TensorByteSize`](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/framework/attr_value_util.cc#L46-L50) would trigger `CHECK` failures. ```cc int64_t TensorByteSize(con...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4j82-5ccr-4r8v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23582'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c2426bba00a01de6913738df8fa78e0215fcce02'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T19:53:00Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-5q5w-mqp6-g2gh
2022-02-11T20:51:14Z
2022-02-06T00:01:07Z
null
['CVE-2022-0472']
Unrestricted Upload of File with Dangerous Type in jsdecena/laracom
jsdecena/laracom prior to version 2.0.9 is vulnerable to Unrestricted Upload of File with Dangerous Type.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'jsdecena/laracom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0472'}, {'type': 'WEB', 'url': 'https://github.com/jsdecena/laracom/commit/256026193ce994dc4c1365e02f414d8a0cd77ae8'}, {'type': 'PACKAGE', 'url': 'https://github.com/jsdecena/laracom'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/cb5b8563-15...
{'cwe_ids': ['CWE-434', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T22:21:11Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-pfjj-m3jj-9jc9
2022-02-11T16:24:03Z
2022-02-09T23:43:27Z
null
['CVE-2022-21736']
Undefined behavior in `SparseTensorSliceDataset`
### Impact The [implementation of `SparseTensorSliceDataset`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/data/sparse_tensor_slice_dataset_op.cc#L227-L292) has an undefined behavior: under certain condition it can be made to dereference a `nullptr` val...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pfjj-m3jj-9jc9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21736'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/965b97e4a9650495cda5a8c210ef6684b4b9eceb'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T19:56:37Z', 'nvd_published_at': '2022-02-03T12:15:00Z'}
1.4.0
GHSA-7x7c-qm48-pq9c
2022-02-11T19:59:48Z
2022-02-06T00:00:54Z
null
['CVE-2022-0437']
Cross-site Scripting in karma
karma prior to version 6.3.14 contains a cross-site scripting vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'karma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0437'}, {'type': 'WEB', 'url': 'https://github.com/karma-runner/karma/commit/839578c45a8ac42fbc1d72105f97eab77dd3eb8a'}, {'type': 'PACKAGE', 'url': 'https://github.com/karma-runner/karma/'}, {'type': 'WEB', 'url': 'https://github.com/karma-runner/k...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T21:57:20Z', 'nvd_published_at': '2022-02-05T02:15:00Z'}
1.4.0
GHSA-j8cx-j9j2-f29w
2022-02-24T22:27:40Z
2022-02-24T00:00:53Z
null
['CVE-2022-0724']
Insecure Storage of Sensitive Information in Microweber
Microweber prior to version 1.3 does not strip images of EXIF data, exposing information about users' locations, device hardware, and device software.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0724'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/b592c86d2b927c0cae5b73b87fb541f25e777aa3'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0...
{'cwe_ids': ['CWE-922'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T22:27:40Z', 'nvd_published_at': '2022-02-23T11:15:00Z'}
1.4.0
GHSA-4xc7-x2jr-cr74
2022-03-03T22:06:43Z
2022-02-24T00:00:52Z
null
['CVE-2022-0731']
Improper Authorization in dolibarr/dolibarr
Dolibarr allows improper access control issues in the userphoto modulepart. The impact could lead to data exposure as the attached files and documents may contain sensitive information of relevant parties such as contacts, suppliers, invoices, orders, stocks, agenda, accounting and more.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0731'}, {'type': 'WEB', 'url': 'https://github.com/dolibarr/dolibarr/commit/209ab708d4b65fbd88ba4340d60b7822cb72651a'}, {'type': 'PACKAGE', 'url': 'https://github.com/dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e242ab4e-...
{'cwe_ids': ['CWE-639', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T22:06:43Z', 'nvd_published_at': '2022-02-23T19:15:00Z'}
1.4.0
GHSA-673j-qm5f-xpv8
2022-12-06T14:40:09Z
2022-02-16T00:08:18Z
null
[]
pgjdbc Arbitrary File Write Vulnerability
### Overview The connection properties for configuring a pgjdbc connection are not meant to be exposed to an unauthenticated attacker. While allowing an attacker to specify arbitrary connection properties could lead to a compromise of a system, that's a defect of an application that allows unauthenticated attackers tha...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '42.1.0'}, {'fixed': '42.3.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-673j-qm5f-xpv8'}, {'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/commit/f6d47034a4ce292e1a659fa00963f6f713117064'}, {'type': 'PACKAGE', 'url': 'https://github.com/pgjdbc/pgjdbc'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T00:08:18Z', 'nvd_published_at': None}
1.4.0
GHSA-wf43-55jj-vwq8
2021-05-19T22:09:57Z
2022-02-15T01:57:18Z
null
['CVE-2018-1099']
DNS Rebinding in etcd
DNS rebinding vulnerability found in etcd 3.3.1 and earlier. An attacker can control his DNS records to direct to localhost, and trick the browser into sending requests to localhost (or any other address).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'go.etcd.io/etcd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1099'}, {'type': 'WEB', 'url': 'https://github.com/coreos/etcd/issues/9353'}, {'type': 'WEB', 'url': 'https://github.com/coreos/etcd/commit/a7e5790c82039945639798ae9a3289fe787f5e56'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi...
{'cwe_ids': ['CWE-20', 'CWE-350'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T22:09:57Z', 'nvd_published_at': None}
1.4.0
GHSA-pf8j-vhg8-xmc3
2023-09-08T23:51:18Z
2022-02-10T23:42:58Z
null
['CVE-2020-7626']
karma-mojo enables OS Command Injection
karma-mojo through 1.0.1 is vulnerable to Command Injection. It allows execution of arbitrary commands via the config argument.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'karma-mojo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7626'}, {'type': 'WEB', 'url': 'https://github.com/amireh/karma-mojo/blob/master/index.js#L100,'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-KARMAMOJO-564260'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-18T15:44:15Z', 'nvd_published_at': '2020-04-02T22:15:00Z'}
1.4.0
GHSA-v84g-cf5j-xjqx
2022-02-08T20:38:52Z
2022-02-08T00:00:34Z
null
['CVE-2022-22931']
Path Traversal in Apache James Server
Apache James Server prior to version 3.6.2 contains a path traversal vulnerability. The fix for CVE-2021-40525 does not prepend delimiters upon valid directory validations. Affected implementations include: - maildir mailbox store - Sieve file repository This enables a user to access other users data stores (limited to...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22931'}, {'type': 'WEB', 'url': 'https://github.com/apache/james-project/pull/877'}, {'type': 'WEB', 'url': 'https://github.com/apache/james-project/pull/877/commits/b1e891a9e5eeadfa1d779ae50f21c73efe4d2fc7'}, {'type': 'PACKAGE', 'url': 'https://gi...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-08T20:38:52Z', 'nvd_published_at': '2022-02-07T19:15:00Z'}
1.4.0
GHSA-q5rx-8c2h-5q7j
2022-02-11T16:15:31Z
2022-02-06T00:01:07Z
null
['CVE-2021-36152']
Apache Gobblin trusts all certificates used for LDAP connections in Gobblin-as-a-Service
Apache Gobblin trusts all certificates used for LDAP connections in Gobblin-as-a-Service. This affects versions <= 0.15.0. Users should update to version 0.16.0 which addresses this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.gobblin:gobblin-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36152'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/3bxf7rbf4zh95r78jtgth6gwhr5fyl2j'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T23:07:32Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-ccxc-vr6p-4858
2022-03-08T18:26:05Z
2022-02-22T19:34:09Z
null
['CVE-2022-23649']
Improper Certificate Validation in Cosign
### Impact Cosign can be manipulated to claim that an entry for a signature exists in the Rekor transparency log even if it doesn't. This requires the attacker to have pull and push permissions for the signature in OCI. This can happen with both standard signing with a keypair and "keyless signing" with Fulcio. #### ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sigstore/cosign'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sigstore/cosign/security/advisories/GHSA-ccxc-vr6p-4858'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23649'}, {'type': 'WEB', 'url': 'https://github.com/sigstore/cosign/commit/96d410a6580e4e81d24d112a0855c70ca3fb5b49'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-295'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-02-22T19:34:09Z', 'nvd_published_at': '2022-02-18T22:15:00Z'}
1.4.0
GHSA-7x2h-3v2v-24p9
2022-02-14T22:33:33Z
2022-02-09T00:00:31Z
null
['CVE-2022-0505']
Cross-Site Request Forgery in microweber
microweber version 1.2.10 and prior is vulnerable to cross-site request forgery.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0505'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/63447b369973724f0d352a006f25af6ff71ae292'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T22:24:28Z', 'nvd_published_at': '2022-02-08T09:15:00Z'}
1.4.0
GHSA-82mm-ffjr-h86c
2023-09-14T18:46:02Z
2022-02-15T01:57:18Z
null
['CVE-2020-16844']
Authorization bypass in Istio
In Istio 1.5.0 though 1.5.8 and Istio 1.6.0 through 1.6.7, when users specify an AuthorizationPolicy resource with DENY actions using wildcard suffixes (e.g. *-some-suffix) for source principals or namespace fields, callers will never be denied access, bypassing the intended policy.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.5.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'istio.io/istio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ran...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-16844'}, {'type': 'WEB', 'url': 'https://github.com/istio/istio/commit/4c73414556b83f0e75c1b3a0a89a23103a71573c'}, {'type': 'WEB', 'url': 'https://github.com/istio/istio/commit/72d2e135374f421b656d6f1a21f474db46134ace'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:59:07Z', 'nvd_published_at': None}
1.4.0
GHSA-5x92-p4p5-33c4
2021-05-12T21:53:03Z
2022-02-15T01:57:18Z
null
['CVE-2020-28348']
Path Traversal in HashiCorp Nomad
HashiCorp Nomad and Nomad Enterprise 0.9.0 up to 0.12.7 client Docker file sandbox feature may be subverted when not explicitly disabled or when using a volume mount type. Fixed in 0.12.8, 0.11.7, and 0.10.8.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.12.7'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad/drivers/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28348'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/issues/9303'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/pull/9321'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/nomad-0-12-8-0-11-7-and-0-10-8-releas...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:53:03Z', 'nvd_published_at': None}
1.4.0
GHSA-5cgx-vhfp-6cf9
2023-08-30T11:47:19Z
2022-02-15T01:57:18Z
null
['CVE-2020-8568']
Directory traversal in Kubernetes Secrets Store CSI Driver
Kubernetes Secrets Store CSI Driver versions v0.0.15 and v0.0.16 allow an attacker who can modify a `SecretProviderClassPodStatus/Status` resource the ability to write content to the host filesystem and sync file contents to Kubernetes Secrets. This includes paths under `var/lib/kubelet/pods` that contain other Kuberne...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'sigs.k8s.io/secrets-store-csi-driver'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.15'}, {'fixed': '0.0.17'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'sigs.k8s.io/secrets-store-csi-driver/pkg/secrets-s...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8568'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes-sigs/secrets-store-csi-driver/issues/378'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes-sigs/secrets-store-csi-driver/pull/371'}, {'type': 'WEB', 'url': 'https://github.com/kub...
{'cwe_ids': ['CWE-20', 'CWE-22', 'CWE-24'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:44:15Z', 'nvd_published_at': None}
1.4.0
GHSA-wxj3-qwv4-cvfm
2023-02-13T20:34:37Z
2022-02-15T00:40:44Z
null
['CVE-2014-3499']
Privilege Escalation in Docker
Docker 1.0.0 uses world-readable and world-writable permissions on the management socket, which allows local users to gain privileges via unspecified vectors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/docker/docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-3499'}, {'type': 'WEB', 'url': 'https://github.com/docker/docker/commit/707ef9618b3b26a0534a0af732a22f159eccfaa5'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1111687'}, {'type': 'WEB', 'url': 'https://rhn.redhat.com/errata...
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T21:10:59Z', 'nvd_published_at': '2014-07-11T14:55:00Z'}
1.4.0
GHSA-5wmg-j84w-4jj4
2022-07-16T04:26:05Z
2022-02-15T01:57:18Z
null
['CVE-2018-1002207']
Arbitrary File Write via Archive Extraction in mholt/archiver
mholt/archiver golang package before e4ef56d48eb029648b0e895bb0b6a393ef0829c3 is vulnerable to directory traversal, allowing attackers to write to arbitrary files via a ../ (dot dot slash) in an archive entry that is mishandled during extraction. This vulnerability is also known as 'Zip-Slip'.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mholt/archiver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1002207'}, {'type': 'WEB', 'url': 'https://github.com/mholt/archiver/pull/65'}, {'type': 'WEB', 'url': 'https://github.com/mholt/archiver/commit/e4ef56d48eb029648b0e895bb0b6a393ef0829c3'}, {'type': 'PACKAGE', 'url': 'https://github.com/mholt/archiv...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:56:29Z', 'nvd_published_at': None}
1.4.0
GHSA-g4gm-pxh3-29fq
2021-11-02T18:42:15Z
2022-02-10T22:28:41Z
null
['CVE-2020-14961']
Unrestricted Uploads in Concrete5
Concrete5 before 8.5.3 does not constrain the sort direction to a valid asc or desc value.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'concrete5/concrete5'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14961'}, {'type': 'WEB', 'url': 'https://github.com/concrete5/concrete5/pull/8651'}, {'type': 'PACKAGE', 'url': 'https://github.com/concrete5/concrete5'}, {'type': 'WEB', 'url': 'https://github.com/concrete5/concrete5/releases/tag/8.5.3'}]
{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T22:06:57Z', 'nvd_published_at': '2020-06-22T00:15:00Z'}
1.4.0
GHSA-6r86-2jm9-9mh4
2022-03-04T21:39:12Z
2022-02-25T00:01:07Z
null
['CVE-2022-23043']
File upload restriction bypass in Zenario CMS
Zenario CMS 9.2 allows an authenticated admin user to bypass the file upload restriction by creating a new 'File/MIME Types' using the '.phar' extension. Then an attacker can upload a malicious file, intercept the request and change the extension to '.phar' in order to run commands on the server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.2.55826'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23043'}, {'type': 'WEB', 'url': 'https://github.com/TribalSystems/Zenario/commit/f0682d22688d9921dc0dfd6e858900ebf2706f19'}, {'type': 'WEB', 'url': 'https://fluidattacks.com/advisories/simone/'}, {'type': 'PACKAGE', 'url': 'https://github.com/Triba...
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T17:55:05Z', 'nvd_published_at': '2022-02-24T15:15:00Z'}
1.4.0
GHSA-vx6f-6rp6-f2px
2022-12-01T22:17:23Z
2022-02-16T00:01:17Z
null
['CVE-2022-25205']
Cross-Site Request Forgery in Jenkins dbCharts Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins dbCharts Plugin 0.5.2 and earlier allows attackers to connect to an attacker-specified database via JDBC using attacker-specified credentials and to determine if a class is available in the Jenkins instance.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dbCharts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25205'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dbCharts-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2177'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T17:33:38Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-r8f7-9pfq-mjmv
2023-04-21T19:18:26Z
2022-02-09T22:22:24Z
null
['CVE-2020-24025']
Improper Certificate Validation in node-sass
Certificate validation in node-sass 2.0.0 to 6.0.1 is disabled when requesting binaries even if the user is not specifying an alternative download path.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-sass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '7.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24025'}, {'type': 'WEB', 'url': 'https://github.com/sass/node-sass/issues/3067'}, {'type': 'WEB', 'url': 'https://github.com/sass/node-sass/pull/3149'}, {'type': 'WEB', 'url': 'https://github.com/sass/node-sass/pull/567#issuecomment-656609236'}, {'...
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T22:18:40Z', 'nvd_published_at': '2021-01-11T19:15:00Z'}
1.4.0
GHSA-47wr-426j-fr82
2021-05-21T18:35:39Z
2022-02-12T00:14:07Z
null
['CVE-2020-26277']
Symbolic links in an unpacking routine may enable attackers to read and/or write to arbitrary locations in dbdeployer
### Impact _Users unpacking a tarball through dbdeployer may use a maliciously packaged tarball that contains symlinks to files external to the target. In such scenario, an attacker could induce dbdeployer to write into a system file, thus altering the computer defences._ ### Mitigating factors For the attach to succe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/datacharmer/dbdeployer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.58.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/datacharmer/dbdeployer/security/advisories/GHSA-47wr-426j-fr82'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26277'}, {'type': 'WEB', 'url': 'https://github.com/datacharmer/dbdeployer/commit/548e256c1de2f99746e861454e7714ec6bc9bb10'}]
{'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T18:35:39Z', 'nvd_published_at': '2020-12-21T22:15:00Z'}
1.4.0
GHSA-9953-fmrw-v4vm
2022-03-07T13:41:54Z
2022-02-26T00:00:44Z
null
['CVE-2022-24948']
Cross-site Scripting in Apache JSPWiki
A carefully crafted user preferences for submission could trigger an XSS vulnerability on Apache JSPWiki, related to the user preferences screen, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24948'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/86p0yzopc4mw2h5bkwpt927b2c8tfq3b'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/02/25/2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:43:13Z', 'nvd_published_at': '2022-02-25T09:15:00Z'}
1.4.0
GHSA-53c4-cmhf-gp7w
2022-12-01T22:57:17Z
2022-02-16T00:01:26Z
null
['CVE-2022-25191']
Stored Cross-site Scripting vulnerability in Jenkins Agent Server Parameter Plugin
Jenkins Agent Server Parameter Plugin 1.0 and earlier does not escape parameter names of agent server parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:agent-server-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25191'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/agent-server-parameter-plugin/commit/cd237c40c76661b5c6a05e542034746e431e706e'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/agent-server-parameter-plugin'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:57:17Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-44qp-9wwf-734r
2022-02-11T16:21:11Z
2022-02-09T23:47:14Z
null
['CVE-2022-21740']
Heap overflow in Tensorflow
### Impact The [implementation of `SparseCountSparseOutput`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/count_ops.cc#L168-L273) is vulnerable to a heap overflow: ```python import tensorflow as tf import numpy as np tf.raw_ops.SparseCountSparseOutput...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-44qp-9wwf-734r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21740'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/2b7100d6cdff36aa21010a82269bc05a6d1cc74a'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-120', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:13:28Z', 'nvd_published_at': '2022-02-03T15:15:00Z'}
1.4.0
GHSA-m744-2jj8-vpfv
2022-02-10T23:51:16Z
2022-02-10T23:51:16Z
null
['CVE-2021-26543']
Command injection in git-parse
The "gitDiff" function in Wayfair git-parse <=1.0.4 has a command injection vulnerability. Clients of the git-parse library are unlikely to be aware of this, so they might unwittingly write code that contains a vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'git-parse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26543'}, {'type': 'WEB', 'url': 'https://advisory.checkmarx.net/advisory/CX-2020-4302'}, {'type': 'PACKAGE', 'url': 'https://github.com/wayfair/git-parse'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/git-parse'}]
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T20:35:31Z', 'nvd_published_at': '2021-05-06T13:15:00Z'}
1.4.0
GHSA-4m8h-h59m-m34j
2022-02-07T21:21:00Z
2022-02-01T00:50:09Z
null
['CVE-2021-23558']
Prototype Pollution in bmoor
The package bmoor before 0.10.1 is vulnerable to Prototype Pollution due to missing sanitization in set function. **Note:** This vulnerability derives from an incomplete fix in [CVE-2020-7736](https://security.snyk.io/vuln/SNYK-JS-BMOOR-598664)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'bmoor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23558'}, {'type': 'WEB', 'url': 'https://github.com/b-heilman/bmoor/commit/29b0162cc1dc1791fc060891f568b0ae29bc542b'}, {'type': 'PACKAGE', 'url': 'https://github.com/b-heilman/bmoor/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T20:51:31Z', 'nvd_published_at': '2022-01-28T22:15:00Z'}
1.4.0
GHSA-hp5x-rqf7-43vf
2022-09-21T19:22:58Z
2022-02-10T20:24:21Z
null
['CVE-2020-5403']
Improper Handling of Exceptional Conditions and Improper Input Validation in Reactor Netty
Reactor Netty HttpServer, versions 0.9.3 and 0.9.4, is exposed to a URISyntaxException that causes the connection to be closed prematurely instead of producing a 400 response.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.projectreactor.netty:reactor-netty-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.3'}, {'fixed': '0.9.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5403'}, {'type': 'WEB', 'url': 'https://pivotal.io/security/cve-2020-5403'}]
{'cwe_ids': ['CWE-20', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T20:27:06Z', 'nvd_published_at': '2020-03-03T19:15:00Z'}
1.4.0
GHSA-v9mf-jgq3-c28h
2021-04-09T22:29:34Z
2022-02-09T22:54:21Z
null
['CVE-2020-28923']
Data Amplification in Play Framework
An issue was discovered in Play Framework 2.8.0 through 2.8.4. Carefully crafted JSON payloads sent as a form field lead to Data Amplification. This affects users migrating from a Play version prior to 2.8.0 that used the Play Java API to serialize classes with protected or private fields to JSON.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28923'}, {'type': 'WEB', 'url': 'https://www.playframework.com/security/vulnerability'}, {'type': 'WEB', 'url': 'https://www.playframework.com/security/vulnerability/CVE-2020-28923-ImproperRemovalofSensitiveInformationBeforeStorageorTransfer'}]
{'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T22:29:34Z', 'nvd_published_at': '2020-12-03T17:15:00Z'}
1.4.0
GHSA-79jw-2f46-wv22
2022-02-25T15:37:37Z
2022-02-23T21:08:44Z
null
['CVE-2022-21705']
Authenticated remote code execution in October CMS
### Impact An authenticated user with the permissions to create, modify and delete website pages can exploit this vulnerability to bypass `cms.safe_mode` / `cms.enableSafeMode` in order to execute arbitrary code. - This issue only affects admin panels that rely on safe mode and restricted permissions. - To exploit t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.474'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.10'}]}]}, {'...
[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-79jw-2f46-wv22'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21705'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/commit/c393c5ce9ca2c5acc3ed6c9bb0dab5ffd61965fe'}, {'type': 'PACKAGE', '...
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T21:08:44Z', 'nvd_published_at': '2022-02-23T19:15:00Z'}
1.4.0
GHSA-g84f-cmc8-682c
2022-12-01T23:40:03Z
2022-02-16T00:01:29Z
null
['CVE-2022-25184']
Password parameter default values exposed by Jenkins Pipeline: Build Step Plugin
Jenkins Pipeline: Build Step Plugin 2.15 and earlier reveals password parameter default values when generating a pipeline script using the Pipeline Snippet Generator, allowing attackers with Item/Read permission to retrieve the default password parameter value from jobs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:pipeline-build-step'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.15.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25184'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/pipeline-build-step-plugin/commit/c06f65425fe9696d2237f591959dd4b5c6083fd9'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/pipeline-build-step-plugin'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T23:40:03Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-878w-7gxp-mc63
2021-04-05T23:12:48Z
2022-02-09T22:16:53Z
null
['CVE-2020-5428']
SQL Injection in Spring Cloud Task
In applications using Spring Cloud Task 2.2.4.RELEASE and below, may be vulnerable to SQL injection when exercising certain lookup queries in the TaskExplorer.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-task-dependencies'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-5428'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2020-5428'}]
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T23:12:48Z', 'nvd_published_at': '2021-01-27T18:15:00Z'}
1.4.0
GHSA-836g-5fr5-fgcr
2021-07-29T18:21:38Z
2022-02-10T23:07:37Z
null
['CVE-2020-11969']
Missing Authentication for Critical Function in Apache TomEE
If Apache TomEE is configured to use the embedded ActiveMQ broker, and the broker URI includes the useJMX=true parameter, a JMX port is opened on TCP port 1099, which does not include authentication. This affects Apache TomEE 8.0.0-M1 - 8.0.1, Apache TomEE 7.1.0 - 7.1.2, Apache TomEE 7.0.0-M1 - 7.0.7, Apache TomEE 1.0....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomee:tomee'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0-M1'}, {'fixed': '8.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.0.1'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomee:tomee'}, 'ranges': [...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11969'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r85b87478f8aa4751aa3a06e88622e80ffabae376ee7283e147ee56b9@%3Cdev.tomee.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rbd23418646dedda70a546331ea1c...
{'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T15:57:39Z', 'nvd_published_at': '2020-06-15T20:15:00Z'}
1.4.0
GHSA-cp67-8w3w-6h9c
2021-04-01T20:31:36Z
2022-02-09T00:58:03Z
null
['CVE-2020-14366']
Path Traversal
A vulnerability was found in keycloak, where path traversal using URL-encoded path segments in the request is possible because the resources endpoint applies a transformation of the url path to the file path. Only few specific folder hierarchies can be exposed by this flaw
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14366'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14366'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T20:31:36Z', 'nvd_published_at': '2020-11-09T17:15:00Z'}
1.4.0
GHSA-7c6q-jqwc-4423
2021-04-13T17:54:22Z
2022-02-09T23:07:59Z
null
['CVE-2017-15681']
Path Traversal in Crafter CMS Crafter Studio
In Crafter CMS Crafter Studio 3.0.1 a directory traversal vulnerability exists which allows unauthenticated attackers to overwrite files from the operating system which can lead to RCE.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15681'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.0/security/advisory.html'}, {'type': 'WEB', 'url': 'http://crafter.com'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T17:54:22Z', 'nvd_published_at': '2020-11-27T18:15:00Z'}
1.4.0
GHSA-pqcf-v8v5-jmcg
2021-05-07T21:58:37Z
2022-02-10T22:23:18Z
null
['CVE-2020-28337']
Zip slip in Microweber
A directory traversal issue in the Utils/Unzip module in Microweber through 1.1.20 allows an authenticated attacker to gain remote code execution via the backup restore feature. To exploit the vulnerability, an attacker must have the credentials of an administrative user, upload a maliciously constructed ZIP file with ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28337'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/777ee9c3e7519eb3672c79ac41066175b2001b50'}, {'type': 'WEB', 'url': 'https://sl1nki.page/advisories/CVE-2020-28337'}, {'type': 'WEB', 'url': 'https://sl1nki.page/blog/2...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T21:58:37Z', 'nvd_published_at': '2021-02-15T20:15:00Z'}
1.4.0
GHSA-j8jw-g6fq-mp7h
2022-11-24T01:37:03Z
2022-02-09T22:57:29Z
null
['CVE-2020-25638']
SQL injection in hibernate-core
A flaw was found in hibernate-core in versions prior to 5.3.20.Final and in 5.4.0.Final up to and including 5.4.23.Final. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SQL comments of the query. This flaw could allow an attacker to access una...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.hibernate:hibernate-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0.Final'}, {'fixed': '5.4.24.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.hibernate:hibernate-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25638'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1881353'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r833c1276e41334fa675848a08daf0c61f39009f9f9a400d9f7006d44@%3Cdev.turbine.apache.org%3E'}, {'type': ...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-09T22:49:21Z', 'nvd_published_at': '2020-12-02T15:15:00Z'}
1.4.0
GHSA-wfvq-p7qf-vv64
2023-06-19T16:54:47Z
2022-02-11T00:00:47Z
2023-06-19T16:53:38Z
[]
Duplicate advisory: swift-nio-http2 vulnerable to denial of service via mishandled HPACK variable length integer encoding
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-w3f6-pc54-gfw7. This link is maintained to preserve external references. ## Original Description A program using swift-nio-http2 is vulnerable to a denial of service attack, caused by a network peer sending a specially crafted H...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'purl-type:swift', 'name': 'github.com/apple/swift-nio-http2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.19.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/apple/swift-nio-http2/security/advisories/GHSA-w3f6-pc54-gfw7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24667'}, {'type': 'PACKAGE', 'url': 'https://github.com/apple/swift-nio-http2'}]
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-19T16:53:38Z', 'nvd_published_at': '2022-02-09T23:15:00Z'}
1.4.0
GHSA-2m9w-9xh2-wxc3
2023-05-24T14:25:01Z
2022-02-16T00:01:33Z
null
['CVE-2022-25179']
Link Following in Jenkins Pipeline Multibranch Plugin
Jenkins Pipeline: Multibranch Plugin prior to 2.23.1, 2.26.1, 696.698.v9b4218eea50f, and 707.v71c3f0a_6ccdb_ follows symbolic links to locations outside of the checkout directory for the configured SCM when reading files using the readTrusted step, allowing attackers able to configure Pipelines permission to read arbit...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-multibranch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.24'}, {'fixed': '2.26.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins.workflow:workflow-multibranch'}, 'ranges': [{'type': 'ECOSY...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25179'}, {'type': 'WEB', 'url': 'https://github.com/CVEProject/cvelist/blob/00bfb5abeecc9f553a2f42954ee540e493498ee9/2022/25xxx/CVE-2022-25179.json'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2613'}]
{'cwe_ids': ['CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T20:40:40Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-pqrv-8r2f-7278
2022-02-11T20:00:42Z
2022-02-09T23:29:38Z
null
['CVE-2022-23590']
Crash due to erroneous `StatusOr` in TensorFlow
### Impact A `GraphDef` from a TensorFlow `SavedModel` can be maliciously altered to cause a TensorFlow process to crash due to encountering [a `StatusOr` value that is an error and forcibly extracting the value from it](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow-cpu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pqrv-8r2f-7278'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23590'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/955059813cc325dc1db5e2daa6221271406d4439'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T18:27:28Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-qh36-44jv-c8xj
2022-03-30T21:11:43Z
2022-02-02T00:01:58Z
null
['CVE-2020-8562']
Potential proxy IP restriction bypass in Kubernetes
As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to prevent proxied connections from accessing link-local or localhost networks when making user-driven connections to Services, Pods, Nodes, or StorageClass service providers. As part of this mitigation Kubernetes does a DNS name resolution che...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.21.0'}, {'fixed': '1.21.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.20.0'}, {'fixed': '1.20.7'}]}]}, {'pac...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8562'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/101493'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/-MF...
{'cwe_ids': ['CWE-367'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T17:52:40Z', 'nvd_published_at': '2022-02-01T11:15:00Z'}
1.4.0
GHSA-vwx4-frpr-w27j
2022-12-01T22:11:12Z
2022-02-16T00:01:14Z
null
['CVE-2022-25210']
Improper Synchronization in Jenkins Convertigo Mobile Platform Plugin
Jenkins Convertigo Mobile Platform Plugin 1.1 and earlier uses static fields to store job configuration information, allowing attackers with Item/Configure permission to capture passwords of the jobs that will be configured.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.convertigo.jenkins.plugins:convertigo-mobile-platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25210'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/convertigo-mobile-platform-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-02-15/#SECURITY-2280'}]
{'cwe_ids': ['CWE-662', 'CWE-820'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T17:41:42Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-6qq8-5wq3-86rp
2022-08-04T20:56:21Z
2022-02-11T23:19:21Z
null
['CVE-2020-15129']
Traefik vulnerable to Open Redirect via handling of X-Forwarded-Prefix header
## Summary There exists a potential open redirect vulnerability in Traefik's handling of the `X-Forwarded-Prefix` header. Active Exploitation of this issue is unlikely as it would require active header injection, however the Traefik team addressed this issue nonetheless to prevent abuse in e.g. cache poisoning scenari...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0-rc5'}, {'fixed': '1.7.26'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/traefik/traefik/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '...
[{'type': 'WEB', 'url': 'https://github.com/containous/traefik/security/advisories/GHSA-6qq8-5wq3-86rp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15129'}, {'type': 'WEB', 'url': 'https://github.com/containous/traefik/pull/7109'}, {'type': 'WEB', 'url': 'https://github.com/containous/traef...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T18:21:00Z', 'nvd_published_at': '2020-07-30T16:15:00Z'}
1.4.0
GHSA-grc3-8q8m-4j7c
2021-04-07T22:41:39Z
2022-02-09T22:37:59Z
null
['CVE-2020-17533']
Improper privilege handling in Apache Accumulo
Apache Accumulo versions 1.5.0 through 1.10.0 and version 2.0.0 do not properly check the return value of some policy enforcement functions before permitting an authenticated user to perform certain administrative operations. Specifically, the return values of the 'canFlush' and 'canPerformSystemActions' security funct...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.accumulo:accumulo-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '1.10.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.accumulo:accumulo-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-17533'}, {'type': 'WEB', 'url': 'https://github.com/apache/accumulo/commit/877ad502f6857e48342664e4b0ce83db74e4cda4'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf8c1a787b6951d3dacb9ec58f0bf1633790c91f54ff10c6f8ff9d8ed%40%3Cuser....
{'cwe_ids': ['CWE-280', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-07T22:41:39Z', 'nvd_published_at': '2020-12-29T12:15:00Z'}
1.4.0
GHSA-8786-wg74-f522
2021-04-13T18:21:39Z
2022-02-09T23:07:54Z
null
['CVE-2020-25803']
Improper Control of Dynamically-Managed Code Resources in Crafter CMS Crafter Studio
Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via FreeMarker template exposed objects. This issue affects: Crafter Software Crafter CMS 3.0 versions prior to 3.0.27; 3.1 versions prior to 3.1.7.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '3.0.27'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1'}, {'fixe...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-25803'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2020080102'}]
{'cwe_ids': ['CWE-913'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T18:21:39Z', 'nvd_published_at': '2020-10-06T15:15:00Z'}
1.4.0
GHSA-8grg-q944-cch5
2022-05-03T02:28:28Z
2022-02-10T23:05:04Z
null
['CVE-2019-14900']
SQL Injection in Hibernate ORM
A flaw was found in Hibernate ORM in versions before 5.3.18, 5.4.18 and 5.5.0.Beta1. A SQL injection in the implementation of the JPA Criteria API can permit unsanitized literals when a literal is used in the SELECT or GROUP BY parts of the query. This flaw could allow an attacker to access unauthorized information or ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.infinispan:infinispan-hibernate-cache-v53'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.18'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.infinispan:infinispan-hibernate-cache-v53'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14900'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1666499'}, {'type': 'PACKAGE', 'url': 'https://github.com/infinispan/infinispan'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r833c1276e41334fa675848a08d...
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-11T17:45:44Z', 'nvd_published_at': '2020-07-06T19:15:00Z'}
1.4.0
GHSA-f9fq-vjvh-779p
2021-05-12T20:21:27Z
2022-02-15T01:57:18Z
null
['CVE-2020-24359']
Improper Input Validation in vault-ssh-helper
HashiCorp vault-ssh-helper up to and including version 0.1.6 incorrectly accepted Vault-issued SSH OTPs for the subnet in which a host's network interface was located, rather than the specific IP address assigned to that interface. Fixed in 0.2.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault-ssh-helper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault-ssh-helper/helper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-24359'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault-ssh-helper/commit/83effd08cbcbe4b993d776bd9b39465cd9e4603f'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/vault-ssh-helper/blob/master/CHANGELOG.md#020-august-19-2020'}, {...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T20:21:27Z', 'nvd_published_at': None}
1.4.0
GHSA-gc79-gh4f-9g6w
2022-03-01T21:31:55Z
2022-02-19T00:01:24Z
null
['CVE-2021-46063']
Server Side Template Injection in MCMS
MCMS v5.2.5 was discovered to contain a Server Side Template Injection (SSTI) vulnerability via the Template Management module.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46063'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/59'}]
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T20:57:56Z', 'nvd_published_at': '2022-02-18T20:15:00Z'}
1.4.0
GHSA-7fhr-2694-rg79
2022-11-08T20:21:38Z
2022-02-15T01:39:57Z
null
['CVE-2020-10714']
Session Fixation in WildFly Elytron
A flaw was found in WildFly Elytron version 1.11.3.Final and before. When using WildFly Elytron FORM authentication with a session ID in the URL, an attacker could perform a session fixation attack. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.security:wildfly-elytron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10714'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1825714'}, {'type': 'PACKAGE', 'url': 'https://github.com/wildfly-security/wildfly-elytron'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20201223-00...
{'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T01:26:35Z', 'nvd_published_at': '2020-09-23T13:15:00Z'}
1.4.0
GHSA-h39q-95q5-9jfp
2023-02-03T20:42:31Z
2022-02-09T00:11:19Z
null
['CVE-2020-1734']
OS Command Injection in ansible
A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1734'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67792'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/70159'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHBA-2020:0547'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-02T18:38:15Z', 'nvd_published_at': '2020-03-03T22:15:00Z'}
1.4.0
GHSA-247x-2f9f-5wp7
2022-02-11T20:00:23Z
2022-02-09T23:30:01Z
null
['CVE-2022-23591']
Stack overflow in TensorFlow
### Impact The `GraphDef` format in TensorFlow does not allow self recursive functions. The runtime assumes that this invariant is satisfied. However, a `GraphDef` containing a fragment such as the following can be consumed when loading a `SavedModel`: ``` library { function { signature { name: "So...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-247x-2f9f-5wp7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23591'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/448a16182065bd08a202d9057dd8ca541e67996c'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-400', 'CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T18:23:58Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-m4hf-j54p-p353
2022-02-11T17:05:51Z
2022-02-10T00:19:50Z
null
['CVE-2022-21731']
Type confusion leading to segfault in Tensorflow
### Impact The [implementation of shape inference for `ConcatV2`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/framework/common_shape_fns.cc#L1961-L2059) can be used to trigger a denial of service attack via a segfault caused by a type confusion: ```python imp...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m4hf-j54p-p353'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21731'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/08d7b00c0a5a20926363849f611729f53f3ec022'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-754', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T19:01:09Z', 'nvd_published_at': '2022-02-03T12:15:00Z'}
1.4.0
GHSA-33p6-fx42-7rf5
2021-05-24T19:08:11Z
2022-02-11T23:17:02Z
null
['CVE-2020-13788']
Harbor is vulnerable to a limited Server-Side Request Forgery (SSRF) (CVE-2020-13788)
# Impact Matt Hamilton from Soluble has discovered a limited Server-Side Request Forgery (SSRF) that allowed Harbor project owners to scan the TCP ports of hosts on the Harbor server's internal network. The vulnerability was immediately fixed by the Harbor team. # Issue The “Test Endpoint” API, part of the functi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.8.0'}, {'fixed': '2.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories/GHSA-33p6-fx42-7rf5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13788'}, {'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/releases'}, {'type': 'WEB', 'url': 'https://www.soluble.ai/blog/harbor-ssrf-cv...
{'cwe_ids': ['CWE-918'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2021-05-24T19:08:11Z', 'nvd_published_at': None}
1.4.0
GHSA-hgpg-593r-hhvp
2021-04-01T21:35:42Z
2022-02-09T00:56:37Z
null
['CVE-2020-10748']
Cross-site Scripting in Keycloak
A flaw was found in Keycloak's data filter, in version 10.0.1, where it allowed the processing of data URLs in some circumstances. This flaw allows an attacker to conduct cross-site scripting or further attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.0.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10748'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1836786'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T21:35:42Z', 'nvd_published_at': '2020-09-16T18:15:00Z'}
1.4.0
GHSA-g622-r636-qfqh
2021-05-17T16:33:43Z
2022-02-15T01:57:18Z
null
['CVE-2019-9039']
SQL Injection in Couchbase Sync Gateway
The Couchbase Sync Gateway 2.1.2 in combination with a Couchbase Server is affected by a previously undisclosed N1QL-injection vulnerability in the REST API. An attacker with access to the public REST API can insert additional N1QL statements through the parameters ?startkey? and ?endkey? of the ?_all_docs? endpoint.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/couchbase/sync_gateway'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9039'}, {'type': 'WEB', 'url': 'https://github.com/couchbase/sync_gateway/commit/97adb5b496aa96aa70398018ea96da913ffd8d8c'}, {'type': 'WEB', 'url': 'https://docs.couchbase.com/sync-gateway/2.5/release-notes.html'}, {'type': 'WEB', 'url': 'https://r...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T16:33:43Z', 'nvd_published_at': None}
1.4.0
GHSA-254q-rqmw-vx45
2022-02-24T13:05:38Z
2022-02-16T00:01:52Z
null
['CVE-2022-0588']
Exposure of Sensitive Information to an Unauthorized Actor in librenms
Exposure of Sensitive Information to an Unauthorized Actor in Packagist librenms/librenms prior to 22.2.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0588'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/caab3310-...
{'cwe_ids': ['CWE-200', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:53:08Z', 'nvd_published_at': '2022-02-15T08:15:00Z'}
1.4.0
GHSA-rcvx-rmvf-mxch
2021-04-06T21:53:29Z
2022-02-09T22:19:44Z
null
['CVE-2020-27219']
Cross-site Scripting in Eclipse Hawkbit
In all version of Eclipse Hawkbit prior to 0.3.0M7, the HTTP 404 (Not Found) JSON response body returned by the REST API may contain unsafe characters within the path attribute. Sending a POST request to a non existing resource will return the full path from the given URL unescaped to the client.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hawkbit:hawkbit-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0M7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.3.0M6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27219'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/hawkbit/issues/1067'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/hawkbit/commit/94b7c12cde1b38eda5414bd88d6d068008cfb9f9'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/s...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T21:53:29Z', 'nvd_published_at': '2021-01-14T23:15:00Z'}
1.4.0
GHSA-33wf-4crm-2322
2022-02-24T12:12:44Z
2022-02-16T00:01:58Z
null
['CVE-2022-0580']
Improper Access Control in librenms
Improper Access Control in Packagist librenms/librenms prior to 22.2.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0580'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/95970af78e4c899744a715766d744deef8c505f7'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2494106c-...
{'cwe_ids': ['CWE-284', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:51:15Z', 'nvd_published_at': '2022-02-14T23:15:00Z'}
1.4.0
GHSA-h6pr-c536-6rjg
2022-02-11T16:16:47Z
2022-02-05T00:00:31Z
null
['CVE-2021-23507']
Prototype Pollution in object-path-set
The package object-path-set before 1.0.2 are vulnerable to Prototype Pollution via the setPath method, as it allows an attacker to merge object prototypes into it. *Note:* This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-JS-OBJECTPATHSET-607908
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'object-path-set'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23507'}, {'type': 'WEB', 'url': 'https://github.com/skratchdot/object-path-set/commit/2d67a714159c4099589b6661fa84e6d2adc31761'}, {'type': 'PACKAGE', 'url': 'https://github.com/skratchdot/object-path-set/'}, {'type': 'WEB', 'url': 'https://github.c...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T19:07:16Z', 'nvd_published_at': '2022-02-04T20:15:00Z'}
1.4.0
GHSA-8wr4-2wm6-w3pr
2022-03-08T18:24:32Z
2022-02-24T13:11:51Z
null
['CVE-2022-23653']
B2 Command Line Tool TOCTOU application key disclosure
### Impact Linux and Mac releases of the B2 command-line tool version 3.2.0 and below contain a key disclosure vulnerability that, in certain conditions, can be exploited by local attackers through a time-of-check-time-of-use (TOCTOU) race condition. The command line tool saves API keys (and bucket name-to-id mapping...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'b2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Backblaze/B2_Command_Line_Tool/security/advisories/GHSA-8wr4-2wm6-w3pr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23653'}, {'type': 'WEB', 'url': 'https://github.com/Backblaze/B2_Command_Line_Tool/commit/c74029f9f75065e8f7e3c3ec8e0a23fb8204feeb'...
{'cwe_ids': ['CWE-367'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-24T13:11:51Z', 'nvd_published_at': '2022-02-23T23:15:00Z'}
1.4.0
GHSA-hcw3-j74m-qc58
2022-02-23T22:04:25Z
2022-02-09T22:17:37Z
null
['CVE-2022-23628']
Incorrect Calculation in github.com/open-policy-agent/opa
### Impact Under certain conditions, pretty-printing an AST that contains synthetic nodes could change the logic of some statements by reordering array literals. Example of policies impacted are those that parse and compare web paths, see the example below. **All of these** three conditions have to be met to create a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/open-policy-agent/opa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.33.1'}, {'fixed': '0.37.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/open-policy-agent/opa/security/advisories/GHSA-hcw3-j74m-qc58'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23628'}, {'type': 'WEB', 'url': 'https://github.com/open-policy-agent/opa/pull/3851'}, {'type': 'WEB', 'url': 'https://github.com/open-polic...
{'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T22:17:37Z', 'nvd_published_at': '2022-02-09T22:15:00Z'}
1.4.0
GHSA-qpv2-jxc7-3638
2022-02-24T13:13:01Z
2022-02-15T00:02:47Z
null
['CVE-2022-0569']
Exposure of Sensitive Information in snipe/snipe-it
Snipe-IT prior to v5.3.10 is vulnerable to Exposure of Sensitive Information to an Unauthorized Actor.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0569'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/05c0819776b07425b2831cd31a8a0f4e7ac30c09'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b41d5e63-bcd8-4...
{'cwe_ids': ['CWE-200', 'CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:40:14Z', 'nvd_published_at': '2022-02-14T12:15:00Z'}
1.4.0
GHSA-r5cq-9537-9rpf
2021-12-13T21:33:52Z
2022-02-10T23:52:01Z
null
['CVE-2021-28860']
Prototype Pollution in mixme
Node.js mixme 0.5.0, an attacker can add or alter properties of an object via '__proto__' through the mutate() and merge() functions. The polluted attribute will be directly assigned to every object in the program. This will put the availability of the program at risk causing a potential denial of service (DoS).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mixme'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/adaltas/node-mixme/security/advisories/GHSA-79jw-6wg7-r9g4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-28860'}, {'type': 'WEB', 'url': 'https://github.com/adaltas/node-mixme/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/adaltas/node-mixm...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T21:34:53Z', 'nvd_published_at': '2021-05-03T12:15:00Z'}
1.4.0
GHSA-h48w-c35p-6m8x
2021-04-22T17:02:38Z
2022-02-10T20:23:25Z
null
['CVE-2020-27196']
Out-of-bounds Write in Play Framework
An issue was discovered in PlayJava in Play Framework 2.6.0 through 2.8.2. The body parsing of HTTP requests eagerly parses a payload given a Content-Type header. A deep JSON structure sent to a valid POST endpoint (that may or may not expect JSON payloads) causes a StackOverflowError and Denial of Service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.7.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.typesafe.play:play'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.3'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27196'}, {'type': 'WEB', 'url': 'https://github.com/playframework/playframework/pull/10321'}, {'type': 'WEB', 'url': 'https://www.playframework.com/security/vulnerability/CVE-2020-27196-DosViaJsonStackOverflow'}]
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T17:02:38Z', 'nvd_published_at': '2020-11-06T14:15:00Z'}
1.4.0
GHSA-hwrr-rhmm-vcvf
2021-05-12T21:41:14Z
2022-02-15T01:57:18Z
null
['CVE-2020-8569']
NULL Pointer Dereference in Kubernetes CSI snapshot-controller
Kubernetes CSI snapshot-controller prior to v2.1.3 and v3.0.2 could panic when processing a VolumeSnapshot custom resource when: - The VolumeSnapshot referenced a non-existing PersistentVolumeClaim and the VolumeSnapshot did not reference any VolumeSnapshotClass. - The snapshot-controller crashes, is automatically res...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes-csi/external-snapshotter/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes-csi/external-snapshotter/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'even...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8569'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes-csi/external-snapshotter/issues/380'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/kubernetes-security-announce/c/1EzCr1qUxxU'}]
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:41:14Z', 'nvd_published_at': None}
1.4.0
GHSA-wxjg-p59j-6c92
2022-03-08T18:26:50Z
2022-02-26T00:00:44Z
null
['CVE-2022-25328']
Command injection in github.com/google/fscrypt
The bash_completion script for fscrypt allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint path and if the syst...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/google/fscrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25328'}, {'type': 'WEB', 'url': 'https://github.com/google/fscrypt/pull/346'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/fscrypt/'}]
{'cwe_ids': ['CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:30:03Z', 'nvd_published_at': '2022-02-25T11:15:00Z'}
1.4.0
GHSA-85p9-j7c9-v4gr
2023-08-29T18:49:34Z
2022-02-15T01:57:18Z
null
['CVE-2019-10214']
containers/image library Insufficiently Protects Credentials
The containers/image library used by the container tools Podman, Buildah, and Skopeo in Red Hat Enterprise Linux version 8 and CRI-O in OpenShift Container Platform, does not enforce TLS connections to the container registry authorization service. An attacker could use this vulnerability to launch a MiTM attack and ste...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/image'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10214'}, {'type': 'WEB', 'url': 'https://github.com/containers/image/issues/654'}, {'type': 'WEB', 'url': 'https://github.com/containers/image/pull/655'}, {'type': 'WEB', 'url': 'https://github.com/containers/image/pull/669'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-07T17:33:33Z', 'nvd_published_at': '2019-11-25T11:15:00Z'}
1.4.0
GHSA-h289-x5wc-xcv8
2022-02-16T22:56:21Z
2022-02-16T22:56:21Z
null
[]
Improper Validation of Certificate with Host Mismatch in mellium.im/xmpp/websocket
### Impact If no TLS configuration is provided by the user, the websocket package constructs its own TLS configuration using recommended defaults. When looking up a WSS endpoint using the DNS TXT record method described in [XEP-0156: Discovering Alternative XMPP Connection Methods](https://xmpp.org/extensions/xep-0156...
[]
[{'package': {'ecosystem': 'Go', 'name': 'mellium.im/xmpp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.18.0'}, {'fixed': '0.21.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mellium/xmpp/security/advisories/GHSA-h289-x5wc-xcv8'}, {'type': 'WEB', 'url': 'https://github.com/mellium/xmpp/pull/260'}, {'type': 'WEB', 'url': 'https://github.com/mellium/xmpp/commit/0d92aa486da69b71f2f4a30e62aa722c711b98ac'}, {'type': 'WEB', 'url': 'https://mellium.im/cv...
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:56:21Z', 'nvd_published_at': None}
1.4.0
GHSA-65hp-4vxr-c356
2022-02-23T21:53:30Z
2022-02-12T00:00:37Z
null
['CVE-2021-46363']
Arbitrary code execution in Magnolia CMS
An issue in the Export function of Magnolia v6.2.3 and below allows attackers to execute arbitrary code via a crafted CSV/XLS file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'info.magnolia:magnolia-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46363'}, {'type': 'WEB', 'url': 'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory'}, {'type': 'WEB', 'url': 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46363...
{'cwe_ids': ['CWE-1236'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:43:59Z', 'nvd_published_at': '2022-02-11T21:15:00Z'}
1.4.0
GHSA-f85h-23mf-2fwh
2021-08-31T21:09:28Z
2022-02-09T22:00:04Z
null
['CVE-2020-1738']
Argument Injection in Ansible
A flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be v...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.9.19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1738'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/issues/67796'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1738'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-88'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-05T18:34:03Z', 'nvd_published_at': '2020-03-16T16:15:00Z'}
1.4.0
GHSA-9px9-73fg-3fqp
2022-02-11T20:00:54Z
2022-02-09T23:29:14Z
null
['CVE-2022-23589']
Null pointer dereference in Grappler's `IsConstant`
### Impact Under certain scenarios, Grappler component of TensorFlow can trigger a null pointer dereference. There are 2 places where this can occur, for the same malicious alteration of a `SavedModel` file (fixing the first one would trigger the same dereference in the second place): First, during [constant folding](...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9px9-73fg-3fqp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23589'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/045deec1cbdebb27d817008ad5df94d96a08b1bf'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T18:50:26Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-g5wh-fw4m-2v28
2022-12-01T22:44:48Z
2022-02-16T00:01:23Z
null
['CVE-2022-25194']
CSRF vulnerability in Jenkins autonomiq plugin
autonomiq Plugin 1.15 and earlier does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password. Additionally, this HTTP endpoint does not require POST requests, resulting in a cross-si...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:autonomiq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25194'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/autonomiq-plugin/commit/e06b1ff67664a90819c9561bbc12f4c6e593d1dc'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/autonomiq-plugin'}, {'type': 'WEB', 'url': 'https://www.jenki...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-05-04T20:57:40Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-fqfh-778m-2v32
2021-05-21T22:06:12Z
2022-02-11T23:41:11Z
null
[]
GitHub CLI can execute a git binary from the current directory
### Impact GitHub CLI depends on a `git.exe` executable being found in system `%PATH%` on Windows. However, if a malicious `.\git.exe` or `.\git.bat` is found in the current working directory at the time of running `gh`, the malicious command will be invoked instead of the system one. Windows users who run `gh` inside...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cli/cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cli/cli/security/advisories/GHSA-fqfh-778m-2v32'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T22:06:12Z', 'nvd_published_at': None}
1.4.0
GHSA-qqwx-hcp6-25vr
2022-12-01T23:38:24Z
2022-02-16T00:01:29Z
null
['CVE-2022-25185']
Stored XSS vulnerability in Jenkins Generic Webhook Trigger Plugin
Jenkins Generic Webhook Trigger Plugin 1.81 and earlier does not escape the build cause when using the webhook, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to trigger builds using the webhook.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:generic-webhook-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.82'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25185'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/generic-webhook-trigger-plugin/commit/b289c32aa74439f3a8deb7674128a3a6fd90a61c'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/generic-webhook-trigger-plugin'}, {'type': 'WEB...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T23:38:24Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-cg3q-j54f-5p7p
2022-02-25T15:41:10Z
2022-02-16T22:26:35Z
null
['CVE-2022-21698']
Uncontrolled Resource Consumption in promhttp
This is the Go client library for Prometheus. It has two separate parts, one for instrumenting application code, and one for creating clients that talk to the Prometheus HTTP API. client_golang is the instrumentation library for Go applications in Prometheus, and the promhttp package in client_golang provides tooling a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/client_golang'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/prometheus/client_golang/security/advisories/GHSA-cg3q-j54f-5p7p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21698'}, {'type': 'WEB', 'url': 'https://github.com/prometheus/client_golang/pull/962'}, {'type': 'WEB', 'url': 'https://github.com/prome...
{'cwe_ids': ['CWE-400', 'CWE-772'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-16T22:26:35Z', 'nvd_published_at': '2022-02-15T16:15:00Z'}
1.4.0
GHSA-gcvh-66ff-4mwm
2022-02-11T16:55:36Z
2022-02-10T00:21:12Z
null
['CVE-2022-21734']
`CHECK`-failures in Tensorflow
### Impact The [implementation of `MapStage`](https://github.com/tensorflow/tensorflow/blob/5100e359aef5c8021f2e71c7b986420b85ce7b3d/tensorflow/core/kernels/map_stage_op.cc#L519-L550) is vulnerable a `CHECK`-fail if the key tensor is not a scalar: ```python import tensorflow as tf import numpy as np tf.raw_ops.MapSt...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gcvh-66ff-4mwm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21734'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f57315566d7094f322b784947093406c2aea0d7d'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617', 'CWE-843'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T19:45:02Z', 'nvd_published_at': '2022-02-03T13:15:00Z'}
1.4.0
GHSA-4w8p-x6g8-fv64
2022-02-23T17:39:11Z
2022-02-01T00:48:54Z
null
['CVE-2022-0339']
Server-Side Request Forgery in calibreweb
calibreweb prior to version 0.6.16 contains a Server-Side Request Forgery (SSRF) vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'calibreweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0339'}, {'type': 'WEB', 'url': 'https://github.com/janeczku/calibre-web/commit/35f6f4c727c887f8f3607fe3233dbc1980d15020'}, {'type': 'WEB', 'url': 'https://github.com/janeczku/calibre-web/commit/3b216bfa07ec7992eff03e55d61732af6df9bb92'}, {'type': '...
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T22:07:47Z', 'nvd_published_at': '2022-01-30T14:15:00Z'}
1.4.0
GHSA-wh98-p28r-vrc9
2022-02-24T13:15:43Z
2022-02-11T20:49:14Z
null
['CVE-2022-23633']
Exposure of information in Action Pack
### Impact Under certain circumstances response bodies will not be closed, for example a [bug in a webserver](https://github.com/puma/puma/pull/2812) or a bug in a Rack middleware. In the event a response is *not* notified of a `close`, `ActionDispatch::Executor` will not know to reset thread local state for the next...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0.0'}, {'fixed': '5.2.6.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.6.1'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'actionpack'}, 'ranges': [{'type': 'ECOSY...
[{'type': 'WEB', 'url': 'https://github.com/rails/rails/security/advisories/GHSA-wh98-p28r-vrc9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23633'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/f9a2ad03943d5c2ba54e1d45f155442b519c75da'}, {'type': 'WEB', 'url': 'https://dis...
{'cwe_ids': ['CWE-200', 'CWE-212'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-11T20:49:14Z', 'nvd_published_at': '2022-02-11T21:15:00Z'}
1.4.0
GHSA-v54f-xcmp-43cr
2021-04-26T14:48:19Z
2022-02-10T20:39:47Z
null
['CVE-2020-1947']
Deserialization of Untrusted Data in Apache ShardingSphere
In Apache ShardingSphere(incubator) 4.0.0-RC3 and 4.0.0, the ShardingSphere&#39;s web console uses the SnakeYAML library for parsing YAML inputs to load datasource configuration. SnakeYAML allows to unmarshal data to a Java type By using the YAML tag. Unmarshalling untrusted data can lead to security flaws of RCE.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shardingsphere:shardingsphere'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC3'}, {'fixed': '4.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.0.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1947'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r4a61a24c119bd820da6fb02100d286f8aae55c8f9b94a346b9bb27d8%40%3Cdev.shardingsphere.apache.org%3E'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-26T14:48:19Z', 'nvd_published_at': '2020-03-11T21:15:00Z'}
1.4.0
GHSA-9f52-hpvw-v96w
2021-04-19T23:18:06Z
2022-02-10T20:22:06Z
null
['CVE-2020-27217']
Improper Validation of Specified Quantity in Input in Eclipse Hono
In Eclipse Hono version 1.3.0 and 1.4.0 the AMQP protocol adapter does not verify the size of AMQP messages received from devices. In particular, a device may send messages that are bigger than the max-message-size that the protocol adapter has indicated during link establishment. While the AMQP 1.0 protocol explicitly...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.hono:hono-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27217'}, {'type': 'WEB', 'url': 'https://bugs.eclipse.org/bugs/show_bug.cgi?id=567068'}]
{'cwe_ids': ['CWE-1284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-19T23:18:06Z', 'nvd_published_at': '2020-11-13T20:15:00Z'}
1.4.0
GHSA-73wx-rpj3-mx46
2022-03-01T21:31:14Z
2022-02-19T00:01:25Z
null
['CVE-2021-46037']
Path traversal in MCMS
MCMS v5.2.4 was discovered to contain an arbitrary file deletion vulnerability via the component /template/unzip.do.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46037'}, {'type': 'WEB', 'url': 'https://lycshub.github.io/2021/12/28/MCMS-vulnerabilities/'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T20:58:21Z', 'nvd_published_at': '2022-02-18T19:15:00Z'}
1.4.0
GHSA-fpcp-9h7m-ffpx
2022-02-11T19:55:40Z
2022-02-09T23:33:17Z
null
['CVE-2022-23595']
Null pointer dereference in TensorFlow
### Impact When [building an XLA compilation cache](https://github.com/tensorflow/tensorflow/blob/274df9b02330b790aa8de1cee164b70f72b9b244/tensorflow/compiler/jit/xla_platform_info.cc#L43-L104), if default settings are used, TensorFlow triggers a null pointer dereference: ```cc string allowed_gpus = flr->conf...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fpcp-9h7m-ffpx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23595'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/e21af685e1828f7ca65038307df5cc06de4479e8'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-04T18:12:23Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-fr76-2wp8-fp92
2023-09-05T23:08:50Z
2022-02-10T23:35:21Z
null
['CVE-2021-32820']
Insecure template handling in Express-handlebars
Express-handlebars is a Handlebars view engine for Express. Express-handlebars mixes pure template data with engine configuration options through the Express render API. More specifically, the layout parameter may trigger file disclosure vulnerabilities in downstream applications. This potential vulnerability is somewh...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'express-handlebars'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32820'}, {'type': 'WEB', 'url': 'https://github.com/express-handlebars/express-handlebars/pull/163'}, {'type': 'WEB', 'url': 'https://github.com/express-handlebars/express-handlebars/commit/78c47a235c4ad7bc2674bddd8ec2721567ed8c72'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-200', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T18:45:00Z', 'nvd_published_at': '2021-05-14T19:15:00Z'}
1.4.0
GHSA-52vv-3vf7-f7wh
2022-03-02T21:57:09Z
2022-02-19T00:01:28Z
null
['CVE-2022-0671']
Server-Side Request Forgery and Uncontrolled Resource Consumption in LemMinX
A flaw was found in vscode-xml in versions prior to 0.19.0. Schema download could lead to blind SSRF or DoS via a large file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.lemminx:lemminx-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.19.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0671'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/lemminx/issues/1169'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/lemminx'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/lemminx/blob/master/CHANGELOG.md#0190-february-14...
{'cwe_ids': ['CWE-400', 'CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T15:02:26Z', 'nvd_published_at': '2022-02-18T18:15:00Z'}
1.4.0
GHSA-gcv8-gh4r-25x6
2022-04-01T18:06:53Z
2022-02-17T00:00:35Z
null
['CVE-2022-0613']
Authorization Bypass Through User-Controlled Key in urijs
Attacker can use case-insensitive protocol schemes like HTTP, htTP, HTtp etc. in order to bypass the patch for CVE-2021-3647.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'urijs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0613'}, {'type': 'WEB', 'url': 'https://github.com/medialize/uri.js/commit/6ea641cc8648b025ed5f30b090c2abd4d1a5249f'}, {'type': 'PACKAGE', 'url': 'https://github.com/medialize/uri.js'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f53d5c42-c1...
{'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-17T23:36:53Z', 'nvd_published_at': '2022-02-16T09:15:00Z'}
1.4.0
GHSA-g6ww-v8xp-vmwg
2022-04-18T21:58:49Z
2022-02-10T20:21:24Z
null
['CVE-2020-7751']
Prototype pollution in pathval
A prototype pollution vulnerability affects all versions of package pathval under 1.1.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'pathval'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7751'}, {'type': 'WEB', 'url': 'https://github.com/chaijs/pathval/pull/58/commits/21a9046cfa0c2697cb41990f3b4316db410e6c8a'}, {'type': 'WEB', 'url': 'https://github.com/chaijs/pathval/pull/58/files'}, {'type': 'PACKAGE', 'url': 'https://github.com/...
{'cwe_ids': ['CWE-1321', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-20T17:32:20Z', 'nvd_published_at': '2020-10-26T12:17:00Z'}
1.4.0
GHSA-5qw5-89mw-wcg2
2022-02-11T20:48:38Z
2022-02-09T23:55:43Z
null
['CVE-2022-23566']
Out of bounds write in Tensorflow
### Impact TensorFlow is vulnerable to a heap OOB write in [Grappler](https://github.com/tensorflow/tensorflow/blob/a1320ec1eac186da1d03f033109191f715b2b130/tensorflow/core/grappler/costs/graph_properties.cc#L1132-L1141): ```cc Status SetUnknownShape(const NodeDef* node, int output_port) { shape_inference::ShapeHand...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-5qw5-89mw-wcg2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23566'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/97282c6d0d34476b6ba033f961590b783fa184cd'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T21:04:00Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-6hv3-7c34-4hx8
2023-04-17T19:21:09Z
2022-02-15T01:57:18Z
null
['CVE-2019-14802']
Hashicorp Nomad Information Exposure Through Environmental Variables
In Nomad before version 0.9.5, when rendering a task template, all environment variables were available to the rendering task. As a fix, only task environment variables are used.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-14802'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/pull/6055'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/commit/e8238305ef0b9ef37be3efd86a8d34bfbed5f63f'}, {'type': 'WEB', 'url': 'https://advisories.gitlab.com/adv...
{'cwe_ids': ['CWE-526'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T17:59:46Z', 'nvd_published_at': '2022-12-26T21:15:00Z'}
1.4.0
GHSA-9jg9-6wm2-x7p5
2021-05-13T15:36:05Z
2022-02-10T23:04:32Z
null
['CVE-2020-11980']
Server-Side Request Forgery in Karaf
In Karaf, JMX authentication takes place using JAAS and authorization takes place using ACL files. By default, only an "admin" can actually invoke on an MBean. However there is a vulnerability there for someone who is not an admin, but has a "viewer" role. In the 'etc/jmx.acl.cfg', such as role can call get*. It's poss...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11980'}, {'type': 'WEB', 'url': 'http://karaf.apache.org/security/cve-2020-11980.txt'}]
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T15:36:05Z', 'nvd_published_at': '2020-06-12T22:15:00Z'}
1.4.0
GHSA-x27w-qxhg-343v
2021-05-20T17:02:56Z
2022-02-15T01:57:18Z
null
['CVE-2017-14623']
Access Restriction Bypass in go-ldap
In the ldap.v2 (aka go-ldap) package through 2.5.0 for Go, an attacker may be able to login with an empty password. This issue affects an application using this package if these conditions are met: (1) it relies only on the return error of the Bind function call to determine whether a user is authorized (i.e., a nil re...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/go-ldap/ldap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-14623'}, {'type': 'WEB', 'url': 'https://github.com/go-ldap/ldap/pull/126'}, {'type': 'WEB', 'url': 'https://github.com/go-ldap/ldap/commit/95ede1266b237bf8e9aa5dce0b3250e51bfefe66'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T17:02:56Z', 'nvd_published_at': None}
1.4.0
GHSA-qx3f-p745-w4hr
2022-02-11T15:07:29Z
2022-02-09T23:54:07Z
null
['CVE-2022-23562']
Integer overflow in Tensorflow
### Impact The implementation of `Range` suffers from integer overflows. These can trigger undefined behavior or, in some scenarios, extremely large allocations. ### Patches We have patched the issue in GitHub commit [f0147751fd5d2ff23251149ebad9af9f03010732](https://github.com/tensorflow/tensorflow/commit/f0147751fd5...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qx3f-p745-w4hr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23562'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/52676'}, {'type': 'WEB', 'url': 'https://github.com/tensorf...
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T20:51:55Z', 'nvd_published_at': '2022-02-04T23:15:00Z'}
1.4.0
GHSA-jp32-vmm6-3vf5
2023-08-30T11:46:16Z
2022-02-15T01:57:18Z
null
['CVE-2015-5305']
Directory Traversal in Kubernetes
Directory traversal vulnerability in Kubernetes, as used in Red Hat OpenShift Enterprise 3.0, allows attackers to write to arbitrary files via a crafted object type name, which is not properly handled before passing it to etcd.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functi...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5305'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/16381'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/commit/37f730f68c7f06e060f90714439bfb0dbb2df5e7'}, {'type': 'WEB', 'url': 'https://github.com/ku...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T16:19:56Z', 'nvd_published_at': '2015-11-06T18:59:00Z'}
1.4.0
GHSA-4wp3-8q92-mh8w
2023-09-15T20:20:04Z
2022-02-09T00:00:29Z
null
['CVE-2021-45326']
Cross Site Request Forgery in Gitea
Cross Site Request Forgery (CSRF) vulnerability exists in Gitea before 1.5.2 via API routes.This can be dangerous especially with state altering POST requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/go-gitea/gitea'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45326'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/issues/4838'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/4840'}, {'type': 'WEB', 'url': 'https://blog.gitea.io/2018/10/gitea-1.5.2-is-released/'}, {'type': 'PAC...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T23:01:01Z', 'nvd_published_at': '2022-02-08T15:15:00Z'}
1.4.0
GHSA-4fqx-74rv-638w
2023-09-15T18:12:48Z
2022-02-15T01:57:18Z
null
['CVE-2019-3792']
Pivotal Concourse SQL Injection Vulnerability
Pivotal Concourse version 5.0.0, contains an API that is vulnerable to SQL injection. An Concourse resource can craft a version identifier that can carry a SQL injection payload to the Concourse server, allowing the attacker to read privileged data.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/concourse/concourse'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-3792'}, {'type': 'WEB', 'url': 'https://github.com/concourse/concourse/commit/dc3d15ab6c3a69890c9985f9c875d4c2949be727'}, {'type': 'WEB', 'url': 'https://github.com/concourse/concourse/blob/master/release-notes/v5.0.1.md#v501-note-1'}, {'type': 'WE...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T18:21:05Z', 'nvd_published_at': None}