schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-pj4j-287j-f742 | 2021-05-03T21:22:13Z | 2022-02-10T20:49:48Z | null | ['CVE-2018-10125'] | Cross-site Scripting in Contao | Contao before 4.5.7 has XSS in the system log. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10125'}, {'type': 'WEB', 'url': 'https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T21:22:13Z', 'nvd_published_at': '2020-03-16T15:15:00Z'} |
1.4.0 | GHSA-rhg5-fqr3-hrf5 | 2023-01-20T18:52:58Z | 2022-02-10T20:54:31Z | null | ['CVE-2019-12416'] | Injection in DeltaSpike | we got reports for 2 injection attacks against the DeltaSpike windowhandler.js. This is only active if a developer selected the ClientSideWindowStrategy which is not the default. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.deltaspike:deltaspike'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12416'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r848d7d4c0bf637da55f01103eb8ba0fce344c295fda53264cbaa1568@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8f327712b2b07f867fde1e77... | {'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T21:47:46Z', 'nvd_published_at': '2020-03-19T15:15:00Z'} |
1.4.0 | GHSA-4g77-cvgw-grvw | 2022-02-11T16:15:46Z | 2022-02-05T00:00:31Z | null | ['CVE-2021-23470'] | Prototype Pollution in putil-merge | This affects the package putil-merge before 3.8.0. The merge() function does not check the values passed into the argument. An attacker can supply a malicious value by adjusting the value to include the constructor property. Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-J... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'putil-merge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23470'}, {'type': 'WEB', 'url': 'https://github.com/panates/putil-merge/commit/476d00078dfb2827d7c9ee0f2392c81b864f7bc5'}, {'type': 'PACKAGE', 'url': 'https://github.com/panates/putil-merge/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-P... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T17:15:36Z', 'nvd_published_at': '2022-02-04T20:15:00Z'} |
1.4.0 | GHSA-vx57-7f4q-fpc7 | 2021-05-28T22:05:12Z | 2022-02-15T01:57:18Z | null | ['CVE-2021-29622'] | Arbitrary redirects under /new endpoint | ### Impact
In 2.23.0, Prometheus changed its default UI to the New ui. To ensure a seamless transition, the URL's prefixed by /new redirect to /.
Due to a bug in the code, it is possible for an attacker to craft an URL that can redirect to any other URL, in the /new endpoint.
If a user visits a prometheus server with... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/prometheus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.23.0'}, {'fixed': '2.26.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/prometheus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.27.0'}, ... | [{'type': 'WEB', 'url': 'https://github.com/prometheus/prometheus/security/advisories/GHSA-vx57-7f4q-fpc7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29622'}, {'type': 'WEB', 'url': 'https://github.com/prometheus/prometheus/releases/tag/v2.26.1'}, {'type': 'WEB', 'url': 'https://github.com... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T17:58:51Z', 'nvd_published_at': '2021-05-19T20:15:00Z'} |
1.4.0 | GHSA-wpfr-6297-9v57 | 2022-02-09T22:29:01Z | 2022-02-09T22:29:01Z | null | [] | User object created with invalid provider data in GoTrue | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Under certain circumstances a valid user object would have been created with invalid provider metadata.
This vulnerability affects everyone running an instance of GoTrue as a service. We advise you to update especially if you are using the provider metad... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/netlify/gotrue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/netlify/gotrue/security/advisories/GHSA-wpfr-6297-9v57'}, {'type': 'WEB', 'url': 'https://github.com/netlify/gotrue/pull/313'}, {'type': 'WEB', 'url': 'https://github.com/netlify/gotrue/commit/4d8a3b39fe485a5f83c70617d594be01130c5b83'}, {'type': 'PACKAGE', 'url': 'https://git... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T22:29:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x6mj-w4jf-jmgw | 2023-09-18T22:44:56Z | 2022-02-15T01:57:18Z | null | ['CVE-2020-8555'] | Server Side Request Forgery (SSRF) in Kubernetes | The Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints within the master's host... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.18.0'}, {'fixed': '1.18.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': [''... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8555'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/91542'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/89794'}, {'type': 'WEB', 'url': 'https://groups.google.com/d/topic/kubernetes-security-an... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T20:13:43Z', 'nvd_published_at': '2020-06-05T17:15:00Z'} |
1.4.0 | GHSA-j9wf-vvm6-4r9w | 2022-10-31T15:56:21Z | 2022-02-08T21:50:34Z | null | ['CVE-2020-8554'] | Unverified Ownership in Kubernetes | Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to user... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.22.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8554'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/97076'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/97110'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type... | {'cwe_ids': ['CWE-283'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:42:11Z', 'nvd_published_at': '2021-01-21T17:15:00Z'} |
1.4.0 | GHSA-ph76-rhqq-xj7j | 2021-04-13T17:23:33Z | 2022-02-09T23:08:06Z | null | ['CVE-2017-15686'] | Cross-site scripting in Crafter CMS Crafter Studio | Crafter CMS Crafter Studio 3.0.1 is affected by: Cross Site Scripting (XSS), which allows remote attackers to steal users’ cookies. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15686'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.0/security/advisory.html'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T17:23:33Z', 'nvd_published_at': '2020-11-27T18:15:00Z'} |
1.4.0 | GHSA-w4jq-qh47-hvjq | 2022-06-24T01:25:49Z | 2022-02-15T01:37:41Z | null | ['CVE-2020-14338'] | Improper Input Validation in Xerces | A flaw was found in Wildfly's implementation of Xerces, specifically in the way the XMLSchemaValidator class in the JAXP component of Wildfly enforced the "use-grammar-pool-only" feature. This flaw allows a specially-crafted XML file to manipulate the validation process in certain cases. This issue is the same flaw as ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'xerces:xercesImpl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.0.sp3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.12.0.sp2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14338'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1860054'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf96c5afb26b596b4b97883aa90b6c0b0fc4c26aaeea7123c21912103@%3Cj-users.xerces.apache.org%3E'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T01:25:49Z', 'nvd_published_at': '2020-09-17T15:15:00Z'} |
1.4.0 | GHSA-mvq8-hgxh-4v2g | 2022-12-01T22:38:36Z | 2022-02-16T00:01:22Z | null | ['CVE-2022-25196'] | Open redirect vulnerability in Jenkins GitLab Authentication Plugin | Jenkins GitLab Authentication Plugin 1.13 and earlier records the HTTP `Referer` header as part of the URL query parameters when the authentication process starts, allowing attackers with access to Jenkins to craft a URL that will redirect users to an attacker-specified URL after logging in.
This issue is caused by an... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gitlab-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25196'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/gitlab-oauth-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2019-08-07/#SECURITY-796'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:38:36Z', 'nvd_published_at': '2022-02-15T17:15:00Z'} |
1.4.0 | GHSA-gjq4-69wj-p6pr | 2022-03-02T21:16:04Z | 2022-02-23T00:00:59Z | null | ['CVE-2022-0665'] | Path traversal in pimcore | The application doesn't perform a check/filter against the value of "importFile" parameter at endpoint "/admin/translation/import". After the API is executed, PHP unlink function will proceed to delete the file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0665'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/28945649a6234ccaa8c94c6cd83d1954603baf3e'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/423df64d-c591... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-02T21:16:04Z', 'nvd_published_at': '2022-02-22T15:15:00Z'} |
1.4.0 | GHSA-h6xq-3h62-99qx | 2021-05-04T20:51:07Z | 2022-02-10T20:51:46Z | null | ['CVE-2020-13928'] | Cross-site scripting in Apache Atlas | Apache Atlas before 2.1.0 contain a XSS vulnerability. While saving search or rendering elements values are not sanitized correctly and because of that it triggers the XSS vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.atlas:apache-atlas'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13928'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra468036f913be41b0c8fea74f91d53e273b0bfa838a4b140a5dcd463%40%3Cuser.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://mvnrepository.com/artifact/org.apache.atlas/apache-atla... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T20:51:07Z', 'nvd_published_at': '2020-09-16T18:15:00Z'} |
1.4.0 | GHSA-qhm4-jxv7-j9pq | 2023-01-27T21:42:48Z | 2022-02-15T01:57:18Z | null | ['CVE-2020-8551'] | Allocation of Resources Without Limits or Throttling and Uncontrolled Memory Allocation in Kubernetes | The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0'}, {'fixed': '1.15.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8551'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/89377'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/87913'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/commit/9802bfce... | {'cwe_ids': ['CWE-770', 'CWE-789'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T21:53:58Z', 'nvd_published_at': '2020-03-27T15:15:00Z'} |
1.4.0 | GHSA-gwmc-6795-qghj | 2022-03-18T18:21:52Z | 2022-02-15T00:02:46Z | null | ['CVE-2022-24686'] | HashiCorp Nomad Artifact Download Race Condition | HashiCorp Nomad and Nomad Enterprise 0.3.0 through 1.0.17, 1.1.11, and 1.2.5 artifact download functionality has a race condition such that the Nomad client agent could download the wrong artifact into the wrong destination. This issue is fixed in 1.0.18, 1.1.12, and 1.2.6. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '1.0.18'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24686'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/issues/12036'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-01-nomad-artifact-download-race-conditio... | {'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T18:21:52Z', 'nvd_published_at': '2022-02-14T14:15:00Z'} |
1.4.0 | GHSA-jmhf-9fj8-88gh | 2022-03-02T21:07:57Z | 2022-02-23T21:15:01Z | null | ['CVE-2022-0692'] | Open Redirect in AllTube | ### Impact
Releases prior to 3.0.1 are vulnerable to an open redirect vulnerability that allows an attacker to construct a URL that redirects to an arbitrary external domain.
### Patches
3.0.1 contains a fix for this vulnerability.
(The 1.x and 2.x releases are not maintained anymore.)
### References
* https://github... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'rudloff/alltube'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Rudloff/alltube/security/advisories/GHSA-jmhf-9fj8-88gh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0692'}, {'type': 'WEB', 'url': 'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'}, {'type': 'PACKAGE', 'url': '... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T21:15:01Z', 'nvd_published_at': '2022-02-21T13:15:00Z'} |
1.4.0 | GHSA-fq42-c5rg-92c2 | 2022-02-25T20:32:09Z | 2022-02-25T20:32:09Z | null | [] | Vulnerable dependencies in Nokogiri | ### Summary
Nokogiri [v1.13.2](https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.2) upgrades two of its packaged dependencies:
- vendored libxml2 from v2.9.12 to [v2.9.13](https://download.gnome.org/sources/libxml2/2.9/libxml2-2.9.13.news)
- vendored libxslt from v1.1.34 to [v1.1.35](https://download.gnome... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-fq42-c5rg-92c2'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri/'}] | {'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T20:32:09Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jf5r-8hm2-f872 | 2023-09-11T22:57:14Z | 2022-02-22T00:00:30Z | null | ['CVE-2022-0691'] | url-parse incorrectly parses hostname / protocol due to unstripped leading control characters. | Leading control characters in a URL are not stripped when passed into url-parse. This can cause input URLs to be mistakenly be interpreted as a relative URL without a hostname and protocol, while the WHATWG URL parser will trim control characters and treat it as an absolute URL.
If url-parse is used in security decisi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'url-parse'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0691'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63'}, {'type': 'PACKAGE', 'url': 'https://github.com/unshiftio/url-parse'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/57124... | {'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:05:20Z', 'nvd_published_at': '2022-02-21T09:15:00Z'} |
1.4.0 | GHSA-vvmr-8829-6whx | 2022-02-07T22:11:10Z | 2022-02-01T00:46:57Z | null | ['CVE-2022-23601'] | CSRF token missing in Symfony | Description
-----------
The Symfony form component provides a CSRF protection mechanism by using a random token injected in the form and using the session to store and control the token submitted by the user.
When using the FrameworkBundle, this protection can be enabled or disabled with the configuration. If the conf... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/framework-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.14'}, {'fixed': '5.3.15'}]}], 'versions': ['5.3.14']}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/framework-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'in... | [{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-vvmr-8829-6whx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23601'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/f0ffb775febdf07e57117aabadac96fa37857f50'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T22:03:31Z', 'nvd_published_at': '2022-02-01T13:15:00Z'} |
1.4.0 | GHSA-62gr-4qp9-h98f | 2021-04-22T23:31:21Z | 2022-02-10T20:38:22Z | null | ['CVE-2019-20922'] | Regular Expression Denial of Service in Handlebars | Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ecosystem_specific': {'affected_functions': ['handlebars.compile']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20922'}, {'type': 'WEB', 'url': 'https://github.com/handlebars-lang/handlebars.js/commit/8d5530ee2c3ea9f0aee3fde310b9f36887d00b8b'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-480388'}, {'type': 'WEB', 'url': 'https://www.npmjs... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T23:31:21Z', 'nvd_published_at': '2020-09-30T18:15:00Z'} |
1.4.0 | GHSA-62mh-w5cv-p88c | 2023-08-29T22:06:59Z | 2022-02-15T00:42:28Z | null | [] | nats-io/jwt not enforcing checking of Import token permissions | (This advisory is canonically <https://advisories.nats.io/CVE/CVE-2021-3127.txt>)
## Problem Description
The NATS server provides for Subjects which are namespaced by Account; all Subjects are supposed to be private to an account, with an Export/Import system used to grant cross-account access to some Subjects. Some... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/jwt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/jwt/v2'}, 'ecosystem_specific': {'affected_function... | [{'type': 'WEB', 'url': 'https://github.com/nats-io/jwt/security/advisories/GHSA-62mh-w5cv-p88c'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/jwt/pull/149'}, {'type': 'WEB', 'url': 'https://advisories.nats.io/CVE/CVE-2021-3127.txt'}, {'type': 'PACKAGE', 'url': 'https://github.com/nats-io/jwt'}] | {'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:58:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3gg9-f3vh-866f | 2021-05-10T21:16:56Z | 2022-02-10T22:39:58Z | null | ['CVE-2020-15813'] | Improper Certificate Validation in Graylog | Graylog before 3.3.3 lacks SSL Certificate Validation for LDAP servers. It allows use of an external user/group database stored in LDAP. The connection configuration allows the usage of unencrypted, SSL- or TLS-secured connections. Unfortunately, the Graylog client code (in all versions that support LDAP) does not impl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.graylog:graylog-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15813'}, {'type': 'WEB', 'url': 'https://github.com/Graylog2/graylog2-server/issues/5906'}, {'type': 'WEB', 'url': 'https://github.com/Graylog2/graylog2-server/pull/8569'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-10T21:16:56Z', 'nvd_published_at': '2020-07-17T19:15:00Z'} |
1.4.0 | GHSA-x2p8-rgfm-qw3v | 2022-03-03T22:07:41Z | 2022-02-25T00:01:07Z | null | ['CVE-2021-44550'] | Access Control vulnerability within CoreNLP | An Incorrect Access Control vulnerability exists in CoreNLP 4.3.2 via the classifier in NERServlet.java (lines 158 and 159). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'edu.stanford.nlp:stanford-corenlp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44550'}, {'type': 'WEB', 'url': 'https://github.com/stanfordnlp/CoreNLP/issues/1222'}, {'type': 'WEB', 'url': 'https://github.com/stanfordnlp/CoreNLP/commit/5ee097dbede547023e88f60ed3f430ff09398b87'}, {'type': 'PACKAGE', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T22:02:34Z', 'nvd_published_at': '2022-02-24T15:15:00Z'} |
1.4.0 | GHSA-2qp4-g3q3-f92w | 2022-06-20T22:37:38Z | 2022-02-26T00:00:43Z | null | ['CVE-2022-24329'] | Improper Locking in JetBrains Kotlin | In JetBrains Kotlin before 1.6.0, it was not possible to lock dependencies for Multiplatform Gradle Projects. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jetbrains.kotlin:kotlin-stdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5.32'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24329'}, {'type': 'WEB', 'url': 'https://blog.jetbrains.com'}, {'type': 'WEB', 'url': 'https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021/'}, {'type': 'PACKAGE', 'url': 'https://github.com/JetBrains/kotlin'}, {'type': 'W... | {'cwe_ids': ['CWE-667'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:37:38Z', 'nvd_published_at': '2022-02-25T15:15:00Z'} |
1.4.0 | GHSA-q2qr-3c2p-9235 | 2021-05-13T14:26:25Z | 2022-02-15T01:57:18Z | null | ['CVE-2020-12758'] | Denial of Service (DoS) in HashiCorp Consul | HashiCorp Consul and Consul Enterprise could crash when configured with an abnormally-formed service-router entry. Introduced in 1.6.0, fixed in 1.6.6 and 1.7.4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul/agent/consul/discoverychain'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0-beta1'}, {'fixed': '1.6.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul/agent/consul/discoverychain'}, 'ranges': [{'type': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12758'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/pull/7783'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/69b44fb9424cfdc05f1b7243876ab10d236ef1fc'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/co... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T14:26:25Z', 'nvd_published_at': None} |
1.4.0 | GHSA-484q-784p-8m5h | 2021-04-01T19:41:54Z | 2022-02-09T00:58:15Z | null | ['CVE-2020-10776'] | Cross-site Scripting in keycloak | A flaw was found in Keycloak before version 12.0.0, where it is possible to add unsafe schemes for the redirect_uri parameter. This flaw allows an attacker to perform a Cross-site scripting attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10776'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1847428'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T19:41:54Z', 'nvd_published_at': '2020-11-17T02:15:00Z'} |
1.4.0 | GHSA-jqmc-79gx-7g8p | 2022-02-23T22:00:51Z | 2022-02-11T00:00:54Z | null | ['CVE-2022-0532'] | Incorrect Permission Assignment for Critical Resource in CRI-O | An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork kernel namespace. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0532'}, {'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/pull/5610'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2051730'}, {'type': 'PACKAGE', 'url': 'https://github.com/cri-o/cri-o'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-11T18:50:08Z', 'nvd_published_at': '2022-02-09T23:15:00Z'} |
1.4.0 | GHSA-v8wr-r69p-mmwx | 2022-02-23T19:14:17Z | 2022-02-12T00:00:47Z | null | ['CVE-2020-13675'] | Unrestricted Upload of File with Dangerous Type in Drupal core | Drupal's JSON:API and REST/File modules allow file uploads through their HTTP APIs. The modules do not correctly run all file validation, which causes an access bypass vulnerability. An attacker might be able to upload files that bypass the file validation process implemented by modules on the site. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.9.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.1.0'}, {'fixed': '9.1.13'}]}]}, {'pac... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13675'}, {'type': 'PACKAGE', 'url': 'https://github.com/drupal/core'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2021-008'}] | {'cwe_ids': ['CWE-284', 'CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T19:14:17Z', 'nvd_published_at': '2022-02-11T16:15:00Z'} |
1.4.0 | GHSA-wp47-9r3h-xfgq | 2022-02-14T22:58:25Z | 2022-02-07T00:00:23Z | null | ['CVE-2022-23206'] | Server-Side Request Forgery in Apache Traffic Control | In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, an unprivileged user who can reach Traffic Ops over HTTPS can send a specially-crafted POST request to /user/login/oauth to scan a port of a server that Traffic Ops can reach. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/apache/trafficcontrol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/apache/trafficcontrol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23206'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/lsrd2mqj29vrvwsh8g0d560vvz8n126f'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:58:25Z', 'nvd_published_at': '2022-02-06T16:15:00Z'} |
1.4.0 | GHSA-hxvf-35w8-f5mw | 2022-02-24T13:18:02Z | 2022-02-12T00:00:37Z | null | ['CVE-2021-46366'] | Cross-Site Request Forgery in Magnolia CMS | An issue in the Login page of Magnolia CMS v6.2.3 and below allows attackers to exploit both an Open Redirect vulnerability and Cross-Site Request Forgery (CSRF) in order to brute force and exfiltrate users' credentials. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'info.magnolia:magnolia-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46366'}, {'type': 'WEB', 'url': 'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory'}, {'type': 'WEB', 'url': 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46366... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:43:53Z', 'nvd_published_at': '2022-02-11T21:15:00Z'} |
1.4.0 | GHSA-54g4-5cf6-hjp3 | 2022-08-11T16:40:17Z | 2022-02-09T00:48:54Z | null | ['CVE-2020-1926'] | Apache Hive Information Exposure and Observable Timing Discrepancy | Apache Hive cookie signature verification used a non constant time comparison which is known to be vulnerable to timing attacks. This could allow recovery of another users cookie signature. The issue was addressed in Apache Hive 2.3.8 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1926'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/HIVE-22708'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd186eedff68102ba1e68059a808101c5aa587e11542c7dcd26e7b9d7%40%3Cuser.hive.apache.org%3E'}] | {'cwe_ids': ['CWE-200', 'CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T21:30:08Z', 'nvd_published_at': '2021-03-16T13:15:00Z'} |
1.4.0 | GHSA-v7wg-cpwc-24m4 | 2022-08-12T13:14:09Z | 2022-02-02T00:04:20Z | null | ['CVE-2022-21724'] | pgjdbc Does Not Check Class Instantiation when providing Plugin Classes | ### Impact
pgjdbc instantiates plugin instances based on class names provided via `authenticationPluginClassName`, `sslhostnameverifier`, `socketFactory`, `sslfactory`, `sslpasswordcallback` connection properties.
However, the driver did not verify if the class implements the expected interface before instantiating t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.1208'}, {'fixed': '42.2.25'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '42.3.0'}, {'fix... | [{'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-v7wg-cpwc-24m4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21724'}, {'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813'}, {'type': 'PACKAGE', 'url': 'htt... | {'cwe_ids': ['CWE-665', 'CWE-668', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-01T22:40:00Z', 'nvd_published_at': '2022-02-02T12:15:00Z'} |
1.4.0 | GHSA-hhm3-48h2-597v | 2023-08-31T15:18:54Z | 2022-02-02T00:01:46Z | null | ['CVE-2021-44451'] | Insufficiently Protected Credentials in Apache Superset | Apache Superset up to and including 1.3.2 allowed for registered database connections password leak for authenticated users. This information could be accessed in a non-trivial way. Users should upgrade to Apache Superset 1.4.0 or higher. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44451'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/xww1pccs2ckb5506wrf1v4lmxg198vkb'}] | {'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T17:20:28Z', 'nvd_published_at': '2022-02-01T14:15:00Z'} |
1.4.0 | GHSA-r773-pmw3-f4mr | 2023-09-05T23:11:11Z | 2022-02-10T23:47:27Z | null | ['CVE-2021-23384'] | Open Redirect in koa-remove-trailing-slashes | The package koa-remove-trailing-slashes before 2.0.2 are vulnerable to Open Redirect via the use of trailing double slashes in the URL when accessing the vulnerable endpoint (such as `https://example.com//attacker.example/`). The vulnerable code is in `index.js::removeTrailingSlashes()`, as the web server uses relative... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'koa-remove-trailing-slashes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23384'}, {'type': 'WEB', 'url': 'https://github.com/vgno/koa-remove-trailing-slashes/commit/e7ce4000e9fe4d957332df1056640a22ebea28ee'}, {'type': 'PACKAGE', 'url': 'https://github.com/vgno/koa-remove-trailing-slashes'}, {'type': 'WEB', 'url': 'https... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T17:57:27Z', 'nvd_published_at': '2021-05-17T18:15:00Z'} |
1.4.0 | GHSA-72j4-94rx-cr6w | 2021-04-01T21:11:24Z | 2022-02-09T00:57:02Z | null | ['CVE-2020-1694'] | Incorrect Permission Assignment for Critical Resource and Permissive List of Allowed Inputs in Keycloak | A flaw was found in all versions of Keycloak before 10.0.0, where the NodeJS adapter did not support the verify-token-audience. This flaw results in some users having access to sensitive information outside of their permissions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1694'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1790759'}] | {'cwe_ids': ['CWE-183', 'CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T21:11:24Z', 'nvd_published_at': '2020-09-16T19:15:00Z'} |
1.4.0 | GHSA-3w4v-rvc4-2xpw | 2022-09-02T21:12:52Z | 2022-08-27T00:00:45Z | null | ['CVE-2021-3856'] | Keycloak has Files or Directories Accessible to External Parties | ClassLoaderTheme and ClasspathThemeResourceProviderFactory allows reading any file available as a resource to the classloader. By sending requests for theme resources with a relative path from an external HTTP client, the client will receive the content of random files if available. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3856'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/pull/8588'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/73f0474008e1bebd0733e62a22aceda9e5de6743'}, {'type': 'WEB', 'url': 'https://access.redhat.com/secu... | {'cwe_ids': ['CWE-22', 'CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-02T21:12:52Z', 'nvd_published_at': '2022-08-26T16:15:00Z'} |
1.4.0 | GHSA-jxmw-3gxf-fprh | 2022-11-29T21:44:38Z | 2022-08-24T00:00:28Z | null | ['CVE-2022-38663'] | Improper masking of credentials Jenkins in Git Plugin | Jenkins Git Plugin 4.11.4 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log provided by the Git Username and Password (`gitUsernamePassword`) credentials binding. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38663'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-08-23/#SECURITY-2796'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/08... | {'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:44:38Z', 'nvd_published_at': '2022-08-23T17:15:00Z'} |
1.4.0 | GHSA-6j58-grhv-2769 | 2022-09-01T22:22:11Z | 2022-08-25T00:00:27Z | null | ['CVE-2021-4041'] | ansible-runner vulnerable to shell command injection | A flaw was found in ansible-runner. An improper escaping of the shell command, while calling the ansible_runner.interface.run_command, can lead to parameters getting executed as host's shell command. A developer could unintentionally write code that gets executed in the host rather than the virtual environment. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible-runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4041'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible-runner/commit/3533f265f4349a3f2a0283158cd01b59a6bbc7bd'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-4041'}, {'type': 'WEB', 'url': 'https://bugzilla.re... | {'cwe_ids': ['CWE-116', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:22:11Z', 'nvd_published_at': '2022-08-24T16:15:00Z'} |
1.4.0 | GHSA-cmxc-9ghj-jp87 | 2022-09-08T14:09:26Z | 2022-08-26T00:03:29Z | null | ['CVE-2022-2997'] | Insufficient Session Expiration in snipe/snipe-it | Session Fixation in GitHub repository snipe/snipe-it prior to version 6.0.10. The session is not invalidated after a password change. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2997'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/6fde72a69335c80079363b7d26aa94e7f67400e1'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c09bf21b-50d2-4... | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:54:45Z', 'nvd_published_at': '2022-08-25T21:15:00Z'} |
1.4.0 | GHSA-7942-2fx8-qhpf | 2022-08-11T15:20:10Z | 2022-08-05T00:00:23Z | null | ['CVE-2022-35143'] | Raneto v0.17.0 employs weak password complexity requirements | Raneto v0.17.0 employs weak password complexity requirements, allowing attackers to crack user passwords via brute-force attacks. Version 0.17.1 contains security mitigations for this and other vulnerabilities. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'raneto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.17.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35143'}, {'type': 'WEB', 'url': 'https://github.com/ryanlelek/Raneto/pull/370'}, {'type': 'WEB', 'url': 'https://github.com/ryanlelek/Raneto/commit/55e442c9bc67b845094e14ceb228e95c639595be'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/defin... | {'cwe_ids': ['CWE-521'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:20:10Z', 'nvd_published_at': '2022-08-04T20:15:00Z'} |
1.4.0 | GHSA-rr2m-gffv-mgrj | 2022-09-08T14:13:04Z | 2022-08-26T00:03:33Z | null | ['CVE-2021-25642'] | Deserialization of Untrusted Data in Apache Hadoop YARN | ZKConfigurationStore which is optionally used by CapacityScheduler of Apache Hadoop YARN deserializes data obtained from ZooKeeper without validation. An attacker having access to ZooKeeper can run arbitrary commands as YARN user by exploiting this. Users should upgrade to Apache Hadoop 2.10.2, 3.2.4, 3.3.4 or later (c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-yarn-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-yarn-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25642'}, {'type': 'WEB', 'url': 'https://github.com/apache/hadoop/commit/5e2f4339fadc88f20543915fc9b0aaeaf4f9e7bf'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hadoop'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/g6vf2h4wdgz... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:55:27Z', 'nvd_published_at': '2022-08-25T14:15:00Z'} |
1.4.0 | GHSA-qcgc-6q86-7x2p | 2022-08-11T15:57:01Z | 2022-08-11T15:57:01Z | null | ['CVE-2022-35697'] | AEM WCM Core Components CVG Image vulnerable to Reflected Cross-site Scripting | Core Components version 2.20.6 (and earlier) suffer from a reflected cross-site scripting (XSS) vulnerability in `AdaptiveImageServlet` via SVG images. An attacker with author access can upload a special crafted SVG image (including a malicious Javascript) and obtain a link that, when loaded by another authenticated us... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.adobe.cq:core.wcm.components.core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.20.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/adobe/aem-core-wcm-components/security/advisories/GHSA-qcgc-6q86-7x2p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35697'}, {'type': 'PACKAGE', 'url': 'https://github.com/adobe/aem-core-wcm-components'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:57:01Z', 'nvd_published_at': '2022-08-10T20:15:00Z'} |
1.4.0 | GHSA-2m65-m22p-9wjw | 2022-08-11T21:17:41Z | 2022-08-10T00:00:18Z | null | ['CVE-2022-34716'] | .NET Information Disclosure Vulnerability | Microsoft is releasing this security advisory to provide information about a vulnerability in .NET Core 3.1 and .NET 6.0. An information disclosure vulnerability exists in .NET Core 3.1 and .NET 6.0 that could lead to unauthorized access of privileged information.
## Affected software
* Any .NET 6.0 application runn... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'System.Security.Cryptography.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Security.Cryptography.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {... | [{'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-vh55-786g-wjwj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34716'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/232'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetc... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T21:17:41Z', 'nvd_published_at': '2022-08-09T20:15:00Z'} |
1.4.0 | GHSA-5hm8-vh6r-2cjq | 2022-08-18T19:03:34Z | 2022-08-18T19:03:34Z | null | ['CVE-2022-35943'] | CodeIgniter Shield Vulnerable to SameSite Attackers Bypassing the CSRF Protection | ### Impact
This vulnerability may allow [SameSite Attackers](https://canitakeyoursubdomain.name/) to bypass the [CodeIgniter4 CSRF protection](https://codeigniter4.github.io/userguide/libraries/security.html) mechanism with CodeIgniter Shield.
For this attack to succeed, the attacker must have direct (or indirect, e.g... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter4/shield'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0-beta'}, {'fixed': '1.0.0-beta.2'}]}], 'versions': ['1.0.0-beta']}] | [{'type': 'WEB', 'url': 'https://github.com/codeigniter4/shield/security/advisories/GHSA-5hm8-vh6r-2cjq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35943'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/shield/commit/342a368536678621998c3c41d276480cd14ec6c6'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:03:34Z', 'nvd_published_at': '2022-08-12T21:15:00Z'} |
1.4.0 | GHSA-vm6p-35rw-3fxc | 2022-08-18T19:14:08Z | 2022-08-09T00:00:25Z | null | ['CVE-2022-2713'] | Cockpit before 2.2.0 vulnerable to Insufficient Session Expiration | Cockpit before version 2.2.0 is vulnerable to Insufficient Session Expiration. The application does not validate requests after password changes, allowing a user to change their account details even after an admin changes their password. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'aheinze/cockpit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2713'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/dd8d0314912fa6517ebd2cc9939d9fafbe68731b'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3080fc9... | {'cwe_ids': ['CWE-613'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:14:08Z', 'nvd_published_at': '2022-08-08T15:15:00Z'} |
1.4.0 | GHSA-xfhg-9pjg-xg7g | 2022-09-16T18:47:42Z | 2022-08-26T00:03:30Z | null | ['CVE-2021-42521'] | VTK NULL pointer dereference vulnerability | There is a NULL pointer dereference vulnerability in VTK, and it lies in IO/Infovis/vtkXMLTreeReader.cxx. The vendor didn't check the return value of libxml2 API 'xmlDocGetRootElement', and try to dereference it. It is unsafe as the return value can be NULL and that NULL pointer dereference may crash the application. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'vtk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42521'}, {'type': 'WEB', 'url': 'https://discourse.vtk.org/t/vtk-9-2-5-is-out/10549'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xfhg-9pjg-xg7g'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vul... | {'cwe_ids': ['CWE-400', 'CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:47:42Z', 'nvd_published_at': '2022-08-25T18:15:00Z'} |
1.4.0 | GHSA-ggjq-8c4c-68r5 | 2022-08-11T15:46:48Z | 2022-08-05T00:00:30Z | null | ['CVE-2022-28730'] | Apache JSPWiki XSS due to incomplete patch for CVE-2021-40369 | A carefully crafted request on AJAXPreview.jsp could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. This vulnerability leverages CVE-2021-40369, where the Denounce plugin dangerously render... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28730'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jspwiki'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-28732'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:46:48Z', 'nvd_published_at': '2022-08-04T07:15:00Z'} |
1.4.0 | GHSA-mjvm-mhgc-q4gp | 2022-08-26T19:23:16Z | 2022-08-18T19:18:25Z | null | ['CVE-2022-36008'] | Incorrect parsing of EVM reversion exit reason in RPC | ### Impact
A low severity security issue was discovered affecting parsing of the RPC result of the exit reason in case of EVM reversion. In release build, this would cause the exit reason being incorrectly parsed and returned by RPC. In debug build, this would cause an overflow panic.
No action is needed unless you h... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'frontier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/security/advisories/GHSA-mjvm-mhgc-q4gp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36008'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/pull/820'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/fron... | {'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:18:25Z', 'nvd_published_at': '2022-08-19T21:15:00Z'} |
1.4.0 | GHSA-76fg-mhrg-fmmg | 2022-09-02T19:14:08Z | 2022-08-27T00:00:44Z | null | ['CVE-2022-0084'] | XNIO `notifyReadClosed` method logging message to unexpected end | A flaw was found in XNIO, specifically in the `notifyReadClosed` method. The issue revealed this method was logging a message to another expected end. This flaw allows an attacker to send flawed requests to a server, possibly causing log contention-related performance concerns or an unwanted disk fill-up. A fix for thi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.xnio:xnio-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.8.7.Final'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0084'}, {'type': 'WEB', 'url': 'https://github.com/xnio/xnio/pull/291'}, {'type': 'WEB', 'url': 'https://github.com/xnio/xnio/commit/fdefb3b8b715d33387cadc4d48991fb1989b0c12'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022... | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-02T19:14:08Z', 'nvd_published_at': '2022-08-26T18:15:00Z'} |
1.4.0 | GHSA-4h66-vghf-xg5x | 2022-08-10T17:43:31Z | 2022-08-03T00:00:57Z | null | ['CVE-2020-7795'] | get-npm-package-version Command Injection vulnerability | The package get-npm-package-version before 1.0.7 is vulnerable to Command Injection via the `main` function in index.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'get-npm-package-version'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7795'}, {'type': 'WEB', 'url': 'https://github.com/hoperyy/get-npm-package-version/commit/40b1cf31a0607ea66f9e30a0c3af1383b52b2dec'}, {'type': 'WEB', 'url': 'https://github.com/hoperyy/get-npm-package-version/commit/49459d4a3ce68587d48ffa8dead86fc9... | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T17:43:31Z', 'nvd_published_at': '2022-08-02T14:15:00Z'} |
1.4.0 | GHSA-9qxh-258v-666c | 2022-08-10T17:26:00Z | 2022-08-10T17:26:00Z | null | [] | owning_ref vulnerable to multiple soundness issues | - `OwningRef::map_with_owner` is [unsound](https://github.com/Kimundi/owning-ref-rs/issues/77) and may result in a use-after-free.
- `OwningRef::map` is [unsound](https://github.com/Kimundi/owning-ref-rs/issues/71) and may result in a use-after-free.
- `OwningRefMut::as_owner` and `OwningRefMut::as_owner_mut` are [unso... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'owning_ref'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.1'}]}]}] | [{'type': 'PACKAGE', 'url': 'https://github.com/Kimundi/owning-ref-rs'}, {'type': 'WEB', 'url': 'https://github.com/noamtashma/owning-ref-unsoundness'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0040.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T17:26:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h3qm-jrrf-cgj3 | 2023-02-09T20:23:23Z | 2022-08-02T00:00:20Z | null | ['CVE-2022-37315'] | graphql-go has infinite recursion in the type definition parser | graphql-go (aka GraphQL for Go) through 0.8.0 has infinite recursion in the type definition parser. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/graphql-go/graphql'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.8.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37315'}, {'type': 'WEB', 'url': 'https://github.com/graphql-go/graphql/issues/637'}, {'type': 'WEB', 'url': 'https://github.com/graphql-go/graphql/pull/642'}, {'type': 'WEB', 'url': 'https://github.com/graphql-go/graphql/pull/642/commits/4188bd5b38... | {'cwe_ids': ['CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T15:43:18Z', 'nvd_published_at': '2022-08-01T22:15:00Z'} |
1.4.0 | GHSA-hmj3-mqgw-2fq6 | 2022-08-30T20:13:24Z | 2022-08-17T00:00:30Z | null | ['CVE-2022-36272'] | Mingsoft MCMS SQL injection vulnerability in /mdiy/page/verify URI via fieldName parameter | Mingsoft MCMS 5.2.8 was discovered to contain a SQL injection vulnerability in /mdiy/page/verify URI via fieldName parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36272'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/97'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:13:24Z', 'nvd_published_at': '2022-08-16T13:15:00Z'} |
1.4.0 | GHSA-h28c-453m-h9xm | 2022-08-30T20:20:37Z | 2022-08-19T00:00:20Z | null | ['CVE-2022-37422'] | Path Traversal in Payara | Payara through 5.2022.2 allows directory traversal without authentication. This affects Payara Server, Payara Micro, and Payara Server Embedded. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'fish.payara.api:payara-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2022.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37422'}, {'type': 'WEB', 'url': 'https://blog.payara.fish/august-community-5-release'}] | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:20:37Z', 'nvd_published_at': '2022-08-18T19:15:00Z'} |
1.4.0 | GHSA-7hfp-qfw3-5jxh | 2023-08-30T18:43:09Z | 2022-08-30T20:52:31Z | null | ['CVE-2022-36055'] | Helm Vulnerable to denial of service through string value parsing | Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the `_strvals_` package that can cause an out of memory panic. Out of memory panics cannot be recovered from. Applications that use functions from the `_strvals_` package in the Helm SDK can have a Denial of Service attack when they... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36055'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/10466e3e179cc8cad4b0bb451108d3c442c69fbc'}, {'type': 'PACKAGE', 'url': 'https://git... | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:52:31Z', 'nvd_published_at': '2022-09-01T13:15:00Z'} |
1.4.0 | GHSA-jp3m-p26h-mm7v | 2022-08-11T15:53:13Z | 2022-08-05T00:00:31Z | null | ['CVE-2022-34158'] | Apache JSPWiki CSRF due to crafted invocation on the Image plugin | A carefully crafted invocation on the Image plugin could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow a group privilege escalation of the attacker's account. Further examination of this issue established that it could also be used to modify the email associated with the attacked acco... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34158'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jspwiki'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-34158'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:53:13Z', 'nvd_published_at': '2022-08-04T07:15:00Z'} |
1.4.0 | GHSA-cf6r-q678-f2p7 | 2022-08-16T19:33:55Z | 2022-08-12T00:01:25Z | null | ['CVE-2022-2777'] | Microweber's title parameter in the body of POST request vulnerable to stored XSS | In Microweber prior to v1.3.1, the title parameter in the body of POST request when creating/editing a category is vulnerable to stored cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2777'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/60eef7494211d1c458228c321e986edeaa401a58'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-12T15:30:00Z', 'nvd_published_at': '2022-08-11T11:15:00Z'} |
1.4.0 | GHSA-6gjm-6wj6-4px5 | 2022-08-06T05:20:52Z | 2022-08-06T05:20:52Z | null | ['CVE-2022-35921'] | Byobu user preference to prevent private discussions being started are not respected | ### Impact
Users electing to prevent others starting private discussions with themselves.
> Please note that admins and others with appropriate permissions can always bypass this preference, as was the case before.
### Patches
Users of Byobu should update the extension to version 1.1.7, where this has been patched. *... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'fof/byobu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0-beta.2'}, {'fixed': '1.1.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/FriendsOfFlarum/byobu/security/advisories/GHSA-6gjm-6wj6-4px5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35921'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfFlarum/byobu/commit/23dcf93a30f948d30c678a96681f7fdefeba5171'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-269', 'CWE-863'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:20:52Z', 'nvd_published_at': '2022-08-01T22:15:00Z'} |
1.4.0 | GHSA-mj5w-w588-j6xg | 2022-08-30T20:19:47Z | 2022-08-19T00:00:16Z | null | ['CVE-2022-35540'] | Use of Hard-coded Credentials in AgileConfig.Client | Hardcoded JWT Secret in AgileConfig <1.6.8 Server allows remote attackers to use the generated JWT token to gain administrator access. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'AgileConfig.Client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35540'}, {'type': 'WEB', 'url': 'https://github.com/dotnetcore/AgileConfig/issues/91'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnetcore/AgileConfig'}] | {'cwe_ids': ['CWE-798'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:19:47Z', 'nvd_published_at': '2022-08-18T23:15:00Z'} |
1.4.0 | GHSA-w88m-2936-rmxr | 2022-09-02T21:13:13Z | 2022-08-27T00:00:45Z | null | ['CVE-2021-3644'] | wildfly-core allows user with access to management interface to access vault expression, retrieve item from vault | A flaw was found in wildfly-core in all versions. If a vault expression is in the form of a single attribute that contains multiple expressions, a user who was granted access to the management interface can potentially access a vault expression they should not be able to access and possibly retrieve the item which was ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.core:wildfly-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '16.0.1.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.core:wildfly-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '17.0.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3644'}, {'type': 'WEB', 'url': 'https://github.com/wildfly/wildfly-core/pull/4668'}, {'type': 'WEB', 'url': 'https://github.com/wildfly/wildfly-core/commit/06dd9884f6ba50470b1fb5a35198a8784f037714'}, {'type': 'WEB', 'url': 'https://github.com/wildf... | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-02T21:13:13Z', 'nvd_published_at': '2022-08-26T16:15:00Z'} |
1.4.0 | GHSA-4mmh-5vw7-rgvj | 2022-08-18T19:07:58Z | 2022-08-18T19:07:58Z | null | ['CVE-2022-36007'] | Venice vulnerable to Partial Path Traversal issue within the functions `load-file` and `load-resource` | ### Impact
A partial path traversal issue exists within the functions `load-file` and `load-resource`. These functions can be limited to load files from a list of load paths.
Assuming Venice has been configured with the load paths: `[ "/Users/foo/resources" ]`
When passing **relative** paths to these two vulnerable ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.github.jlangch:venice'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.17'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.16'}}] | [{'type': 'WEB', 'url': 'https://github.com/jlangch/venice/security/advisories/GHSA-4mmh-5vw7-rgvj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36007'}, {'type': 'WEB', 'url': 'https://github.com/jlangch/venice/commit/215ae91bb964013b0a2d70718a692832d561ae0a'}, {'type': 'WEB', 'url': 'https... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:07:58Z', 'nvd_published_at': '2022-08-15T11:21:00Z'} |
1.4.0 | GHSA-v78c-4p63-2j6c | 2022-08-30T20:28:43Z | 2022-08-30T20:28:43Z | null | [] | Cleartext Transmission of Sensitive Information in moment-timezone | ### Impact
* if Alice uses `grunt data` (or `grunt release`) to prepare a custom-build, moment-timezone with the latest tzdata from IANA's website
* and Mallory intercepts the request to IANA's unencrypted ftp server, Mallory can serve data which might exploit further stages of the moment-timezone tzdata pipeline, or ... | [] | [{'package': {'ecosystem': 'npm', 'name': 'moment-timezone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'fixed': '0.5.35'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/moment/moment-timezone/security/advisories/GHSA-v78c-4p63-2j6c'}, {'type': 'WEB', 'url': 'https://github.com/moment/moment-timezone/commit/7915ac567ab19700e44ad6b5d8ef0b85e48a9e75'}, {'type': 'PACKAGE', 'url': 'https://github.com/moment/moment-timezone'}] | {'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:28:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-33wh-w4m7-c6r8 | 2022-08-15T20:00:28Z | 2022-08-11T21:18:31Z | null | ['CVE-2022-35956'] | update_by_case before 0.1.3 can be vulnerable to sql injection | Before version 0.1.3 `update_by_case` gem used custom sql strings, and it was not sanitized, making it vulnerable to sql injection. Upgrade to version >= 0.1.3 that uses `Arel` instead to construct the resulting sql statement, with sanitized sql. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'update_by_case'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/camilova/activerecord-update-by-case/security/advisories/GHSA-33wh-w4m7-c6r8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35956'}, {'type': 'PACKAGE', 'url': 'https://github.com/camilova/activerecord-update-by-case'}, {'type': 'WEB', 'url': 'https... | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T21:18:31Z', 'nvd_published_at': '2022-08-12T21:15:00Z'} |
1.4.0 | GHSA-3rq8-h3gj-r5c6 | 2022-08-31T20:09:21Z | 2022-08-30T19:32:29Z | null | ['CVE-2022-29117'] | .NET Denial of Service Vulnerability | Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0 and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A vulnerability exists in .NET 6.0, .NET 5.0 and .NET core 3.1 wh... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.24'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.Owin.Secur... | [{'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-3rq8-h3gj-r5c6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29117'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/aspnetcore'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/li... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T19:32:29Z', 'nvd_published_at': '2022-05-10T21:15:00Z'} |
1.4.0 | GHSA-pm55-qfxr-h247 | 2022-08-31T18:47:40Z | 2022-08-19T00:00:16Z | null | ['CVE-2020-36599'] | OmniAuth's `lib/omniauth/failure_endpoint.rb` does not escape `message_key` value | lib/omniauth/failure_endpoint.rb in OmniAuth before 1.9.2 (and before 2.0) does not escape the message_key value. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'omniauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'omniauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0.pre.rc1'}, {'fixed': '2.0.0'}]}], 'versions': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36599'}, {'type': 'WEB', 'url': 'https://github.com/omniauth/omniauth/commit/43a396f181ef7d0ed2ec8291c939c95e3ed3ff00#diff-575abda9deb9b1a77bf534e898a923029b9a61e991d626db88dc6e8b34260aa2'}, {'type': 'PACKAGE', 'url': 'https://github.com/omniauth/o... | {'cwe_ids': ['CWE-116'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-31T18:47:40Z', 'nvd_published_at': '2022-08-18T23:15:00Z'} |
1.4.0 | GHSA-3mc7-4q67-w48m | 2022-09-09T17:53:43Z | 2022-08-31T00:00:24Z | null | ['CVE-2022-25857'] | Uncontrolled Resource Consumption in snakeyaml | The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.yaml:snakeyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.31'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25857'}, {'type': 'WEB', 'url': 'https://github.com/snakeyaml/snakeyaml/commit/fc300780da21f4bb92c148bc90257201220cf174'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/commits/fc300780da21f4bb92c148bc90257201220cf174'}, {'type'... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-09T17:53:43Z', 'nvd_published_at': '2022-08-30T05:15:00Z'} |
1.4.0 | GHSA-5w5x-q9p5-9qg3 | 2023-09-01T21:55:17Z | 2022-08-16T00:00:31Z | null | ['CVE-2022-2822'] | OctoPrint does not have rate limiting on the login page | OctoPrint 1.7.3 and prior does not have rate limiting on the login page, making it possible for attackers to attempt brute force attacks. The severity of this issue is limited by OctoPrint normally running in a restricted LAN. The `devel` and `maintenance` branches of the repository have a fix that limits the rate of f... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'OctoPrint'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2822'}, {'type': 'WEB', 'url': 'https://github.com/octoprint/octoprint/commit/82c892ba40b3741d1b7711d949e56af64f5bc2de'}, {'type': 'PACKAGE', 'url': 'https://github.com/octoprint/octoprint'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6369f... | {'cwe_ids': ['CWE-307'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:18:01Z', 'nvd_published_at': '2022-08-15T11:21:00Z'} |
1.4.0 | GHSA-4m2g-668v-jwjx | 2022-08-30T20:33:35Z | 2022-08-19T00:00:20Z | null | ['CVE-2022-35174'] | Cross site scripting in getkirby/starterkit | A stored cross-site scripting (XSS) vulnerability in Kirby's Starterkit v3.7.0.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Tags field. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/starterkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.7.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35174'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/starterkit'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/attacks/xss/'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=0lngc_zPTSg'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:33:35Z', 'nvd_published_at': '2022-08-18T18:15:00Z'} |
1.4.0 | GHSA-cv6r-h2fm-pvrp | 2022-08-30T20:48:53Z | 2022-08-24T00:00:29Z | null | ['CVE-2022-35278'] | HTML Injection in ActiveMQ Artemis Web Console | In Apache ActiveMQ Artemis prior to 2.24.0, an attacker could show malicious content and/or redirect users to a malicious URL in the web console by using HTML in the name of an address or queue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:artemis-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.24.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35278'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/bh6y81wtotg75337bpvxcjy436zfgf3n'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221209-0005/'}] | {'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:48:53Z', 'nvd_published_at': '2022-08-23T15:15:00Z'} |
1.4.0 | GHSA-5rf4-f24c-hpvh | 2022-08-30T20:49:09Z | 2022-08-24T00:00:29Z | null | ['CVE-2022-37199'] | SQL injection in jflyfox jfinal | JFinal CMS 5.1.0 is vulnerable to SQL Injection via /jfinal_cms/system/user/list. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.jflyfox:jflyfox_jfinal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37199'}, {'type': 'WEB', 'url': 'https://github.com/jflyfox/jfinal_cms/issues/48'}, {'type': 'PACKAGE', 'url': 'https://github.com/jflyfox/jfinal_cms'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:49:09Z', 'nvd_published_at': '2022-08-23T13:15:00Z'} |
1.4.0 | GHSA-vqc4-v8hc-h2jg | 2022-09-08T14:11:35Z | 2022-08-31T22:23:39Z | null | ['CVE-2022-36034'] | Polynomial regular expression used on uncontrolled data in nitrado.js | ### Impact
Possible ReDoS with lib input of `{{` and with many repetitions of `{{|`
### Patches
Patched in all versions above `0.2.5`
### Workarounds
No known work arounds.
### References
- OWASP: [Regular expression Denial of Service - ReDoS](https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_Re... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'nitrado.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/cainthebest/nitrado.js/security/advisories/GHSA-vqc4-v8hc-h2jg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36034'}, {'type': 'PACKAGE', 'url': 'https://github.com/cainthebest/nitrado.js'}, {'type': 'WEB', 'url': 'https://github.com/cainthebest/ni... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-31T22:23:39Z', 'nvd_published_at': '2022-08-29T17:15:00Z'} |
1.4.0 | GHSA-hrx5-cv4v-4c44 | 2022-08-30T20:18:01Z | 2022-08-18T00:00:19Z | null | ['CVE-2022-2871'] | NotrinosERP Cross-site Scripting vulnerability | NotrinosERP version 0.7 and prior is vulnerable to stored cross-site scripting. A fix is available on the `master` branch of the repository. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'notrinos/notrinos-erp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2871'}, {'type': 'WEB', 'url': 'https://github.com/notrinos/notrinoserp/commit/0362778f4f678156c22a009094225823df8a4760'}, {'type': 'PACKAGE', 'url': 'https://github.com/notrinos/notrinoserp'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/611... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:18:01Z', 'nvd_published_at': '2022-08-17T09:15:00Z'} |
1.4.0 | GHSA-w83m-rghh-frxj | 2022-08-30T20:42:30Z | 2022-08-23T00:00:19Z | null | ['CVE-2022-1340'] | Cross site scripting in yetiforce/yetiforce-crm | Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1340'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/2c14baaf8dbc7fd82d5c585f2fa0c23528450618'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:42:30Z', 'nvd_published_at': '2022-08-22T12:15:00Z'} |
1.4.0 | GHSA-x5cw-843f-r366 | 2022-09-16T19:27:37Z | 2022-08-31T00:00:24Z | null | ['CVE-2022-25646'] | x-data-spreadsheet through 1.1.9 vulnerable to Cross-site Scripting | All versions of package x-data-spreadsheet are vulnerable to Cross-site Scripting (XSS) due to missing sanitization of values inserted into the cells. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'x-data-spreadsheet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25646'}, {'type': 'WEB', 'url': 'https://github.com/myliang/x-spreadsheet/issues/580'}, {'type': 'PACKAGE', 'url': 'https://github.com/myliang/x-spreadsheet'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-XDATASPREADSHEET-2430381'}... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:27:37Z', 'nvd_published_at': '2022-08-30T05:15:00Z'} |
1.4.0 | GHSA-44w5-q257-8428 | 2022-08-30T20:49:50Z | 2022-08-22T00:00:52Z | null | ['CVE-2022-2921'] | Exposure of password hashes in notrinos/notrinos-erp | The AP officers account is authorized to Backup and Restore the Database, Due to this he/she can download the backup and see the password hash of the System Administrator account, The weak hash (MD5) of the password can be easily cracked and get the admin password. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'notrinos/notrinos-erp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2921'}, {'type': 'WEB', 'url': 'https://github.com/notrinos/notrinoserp/commit/1b9903f4deea3289872793e60d730c63ecbf7b45'}, {'type': 'PACKAGE', 'url': 'https://github.com/notrinos/NotrinosERP'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/51b... | {'cwe_ids': ['CWE-359'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:49:50Z', 'nvd_published_at': '2022-08-21T04:15:00Z'} |
1.4.0 | GHSA-mpwp-pf96-9g4r | 2022-08-11T18:02:03Z | 2022-08-03T00:00:57Z | null | ['CVE-2020-28453'] | npos-tesseract Command Injection vulnerability | A command injection vulnerability affects all versions of package npos-tesseract. The injection point is located in line 55 in lib/ocr.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'npos-tesseract'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28453'}, {'type': 'PACKAGE', 'url': 'https://github.com/taoyuan/npos-tesseract'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-NPOSTESSERACT-1051031'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T18:02:03Z', 'nvd_published_at': '2022-08-02T14:15:00Z'} |
1.4.0 | GHSA-8cwq-4cmf-px73 | 2022-08-18T19:19:21Z | 2022-08-18T19:19:21Z | null | [] | PocketMine-MP invalid skin geometry JSON data leading to server crash | ### Impact
`pocketmine\entity\Skin` doesn't correctly handle errors produced by `adhocore/json-comment`, which throws `RuntimeException` rather than returning `false` as PocketMine-MP expects.
This leads to a server crash if the skin geometry data is invalid for some reason (e.g. a syntax error).
### Patches
c9626c61... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-8cwq-4cmf-px73'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/c9626c610b8f6810c8c987559c9197b2a291f0bb'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:19:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4696-g7jj-xg2h | 2022-11-22T00:03:50Z | 2022-08-17T00:00:33Z | null | ['CVE-2022-38216'] | Mapbox is vulnerable to Integer Overflow | An integer overflow exists in Mapbox's closed source gl-native library prior to version 10.6.1, which is bundled with multiple Mapbox products including open source libraries. The overflow is caused by large image height and width values when creating a new Image and allows for out of bounds writes, potentially crashin... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.mapbox.mapboxsdk:mapbox-android-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38216'}, {'type': 'PACKAGE', 'url': 'https://github.com/mapbox/mapbox-maps-android'}, {'type': 'WEB', 'url': 'https://github.com/mapbox/mapbox-maps-android/releases/tag/android-v10.6.1'}] | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:03:50Z', 'nvd_published_at': '2022-08-16T01:15:00Z'} |
1.4.0 | GHSA-6955-67hm-vjjq | 2023-05-10T00:36:31Z | 2022-08-06T09:33:38Z | null | ['CVE-2022-25277'] | Drupal core arbitrary PHP code execution | Drupal core sanitizes filenames with dangerous extensions upon upload and strips leading and trailing dots from filenames to prevent uploading server configuration files.
However, the protections for these two vulnerabilities previously did not work correctly together. As a result, if the site were configured to allow... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '9.3.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.0'}, {'fixed': '9.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25277'}, {'type': 'WEB', 'url': 'https://github.com/drupal/core/commit/1cd1830d79f221cc8490f53c2bb487dd07094f17'}, {'type': 'WEB', 'url': 'https://github.com/drupal/core/commit/5d464ea4407c50e40dcf6cb5ee376e7b8dd36f3a'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:33:38Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qwp3-5fw3-5wgv | 2022-08-30T20:19:35Z | 2022-08-20T00:00:39Z | null | ['CVE-2022-35909'] | Incorrect Access Control and Cross Site Scripting in Jellyfin | In Jellyfin before 10.8, the /users endpoint has incorrect access control for admin functionality. This lack of access control can be leveraged to performe a cross site scripting attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Jellyfin.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35909'}, {'type': 'WEB', 'url': 'https://github.com/jellyfin/jellyfin/pull/7569/files'}, {'type': 'WEB', 'url': 'https://docs.google.com/document/d/1cBXQrokCvWxKET4BKi3ZLtVp5gst6-MrGPgMKpfXw8Y/edit'}, {'type': 'PACKAGE', 'url': 'https://github.com/... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:19:35Z', 'nvd_published_at': '2022-08-19T13:15:00Z'} |
1.4.0 | GHSA-mfpj-3qhm-976m | 2022-09-30T02:21:34Z | 2022-08-24T00:00:31Z | null | ['CVE-2022-25304'] | Uncontrolled Resource Consumption in asyncua and opcua | All versions of package opcua; all versions of package asyncua are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'asyncua'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.96'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.95'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opcua'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25304'}, {'type': 'WEB', 'url': 'https://github.com/FreeOpcUa/python-opcua/issues/1466'}, {'type': 'WEB', 'url': 'https://github.com/FreeOpcUa/opcua-asyncio/commit/01c7acf047887b62d979cd4373d370e72a4b9057'}, {'type': 'PACKAGE', 'url': 'https://gith... | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:50:07Z', 'nvd_published_at': '2022-08-23T05:15:00Z'} |
1.4.0 | GHSA-hgxq-hcrm-c5pm | 2022-09-01T22:23:05Z | 2022-08-25T00:00:29Z | null | ['CVE-2022-25903'] | opcua Vulnerable to Out-of-bounds Write | The package opcua from 0.0.0 until 0.11.0 is vulnerable to Denial of Service (DoS) via the ExtensionObjects and Variants objects, when it allows unlimited nesting levels, which could result in a stack overflow even if the message size is less than the maximum allowed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'opcua'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25903'}, {'type': 'WEB', 'url': 'https://github.com/locka99/opcua/pull/216'}, {'type': 'WEB', 'url': 'https://github.com/locka99/opcua/pull/216/commits/e75dada28a40c3fefc4aeee4cdc272e1b748f8dd'}, {'type': 'PACKAGE', 'url': 'https://github.com/locka... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:23:05Z', 'nvd_published_at': '2022-08-24T05:15:00Z'} |
1.4.0 | GHSA-9j3m-g383-29qr | 2022-08-14T00:25:11Z | 2022-08-14T00:25:11Z | null | ['CVE-2022-35916'] | OpenZeppelin Contracts's Cross chain utilities for Arbitrum L2 see EOA calls as cross chain calls | ### Impact
Contracts using the cross chain utilies for Arbitrum L2, `CrossChainEnabledArbitrumL2` or `LibArbitrumL2`, will classify direct interactions of externally owned accounts (EOAs) as cross chain calls, even though they are not started on L1. This is assessed as low severity because any action taken by an EOA o... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed': '4.7.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed... | [{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9j3m-g383-29qr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35916'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3578'}, {'type': 'PACKAGE', 'url'... | {'cwe_ids': ['CWE-669'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-14T00:25:11Z', 'nvd_published_at': '2022-08-01T21:15:00Z'} |
1.4.0 | GHSA-7qqq-gh2f-wq76 | 2022-08-15T20:13:34Z | 2022-08-10T00:00:31Z | null | ['CVE-2022-25907'] | ts-deepmerge before 2.0.2 vulnerable to Prototype Pollution | The package ts-deepmerge before version 2.0.2 is vulnerable to Prototype Pollution due to missing sanitization of the `merge` function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ts-deepmerge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25907'}, {'type': 'WEB', 'url': 'https://github.com/voodoocreation/ts-deepmerge/commit/9be5148773343c57be9de39728d6ead18eddf10b'}, {'type': 'PACKAGE', 'url': 'https://github.com/voodoocreation/ts-deepmerge'}, {'type': 'WEB', 'url': 'https://github.... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T18:13:21Z', 'nvd_published_at': '2022-08-09T05:15:00Z'} |
1.4.0 | GHSA-qpq9-jpv4-6gwr | 2022-11-23T18:46:31Z | 2022-08-27T00:00:45Z | null | ['CVE-2021-3632'] | Keycloak allows anyone to register new security device or key for any user by using WebAuthn password-less login flow | A flaw was found in Keycloak. This vulnerability allows anyone to register a new security device or key when there is not a device already registered for any user by using the WebAuthn password-less login flow. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3632'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/pull/8203'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/65480cb5a11630909c086f79d396004499fbd1e4'}, {'type': 'WEB', 'url': 'https://access.redhat.com/secu... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-02T19:35:29Z', 'nvd_published_at': '2022-08-26T16:15:00Z'} |
1.4.0 | GHSA-pcjh-6r5h-r92r | 2022-08-11T18:12:35Z | 2022-08-11T18:12:35Z | null | [] | django-sendfile2 before 0.7.0 contains reflected file download vulnerability | Similar to CVE-2022-36359 for Django, django-sendfile2 did not protect against a reflected file download attack in version 0.6.1 and earlier. If the file name used by django-sendfile2 was derived from user input, then it would be possible to perform a such an attack. A new version of django-sendfile2 will be released. ... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-sendfile2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/moggers87/django-sendfile2/security/advisories/GHSA-pcjh-6r5h-r92r'}, {'type': 'WEB', 'url': 'https://github.com/moggers87/django-sendfile2/commit/4c370859023292e3715200a57843f86c5ef3cd77'}, {'type': 'PACKAGE', 'url': 'https://github.com/moggers87/django-sendfile2'}, {'type':... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T18:12:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qrqq-9c63-xfrg | 2022-08-11T15:36:42Z | 2022-08-11T15:36:42Z | null | [] | tower-http's improper validation of Windows paths could lead to directory traversal attack | `tower_http::services::fs::ServeDir` didn't correctly validate Windows paths, meaning paths like `/foo/bar/c:/windows/web/screen/img101.png` would be allowed and respond with the contents of `c:/windows/web/screen/img101.png`. Thus users could potentially read files anywhere on the filesystem.
This only impacts Window... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'tower-http'}, 'ecosystem_specific': {'affected_functions': ['tower_http::services::fs::ServeDir']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.2.1'}]}], 'versions': ['0.2.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'tower-h... | [{'type': 'WEB', 'url': 'https://github.com/tower-rs/tower-http/pull/204'}, {'type': 'PACKAGE', 'url': 'https://github.com/tower-rs/tower-http'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0043.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:36:42Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rvgm-35jw-q628 | 2022-09-08T14:12:04Z | 2022-08-31T22:26:11Z | null | ['CVE-2022-36036'] | Improper Control of Generation of Code ('Code Injection') in mdx-mermaid | ### Impact
Arbitary javascript injection
Modify any mermaid code blocks with the following code and the code inside will execute when the component is loaded by MDXjs
```
` + (function () {
// Put Javascript code here
return ''
}()) + `
```
The block below shows a valid mermaid code block
````md
```mermaid
gra... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'mdx-mermaid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mdx-mermaid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-rc1'}, {'fixed': '2.0.0-rc2'}]}], 'versions': ['2.... | [{'type': 'WEB', 'url': 'https://github.com/sjwall/mdx-mermaid/security/advisories/GHSA-rvgm-35jw-q628'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36036'}, {'type': 'WEB', 'url': 'https://github.com/sjwall/mdx-mermaid/commit/f2b99386660fd13316823529c3f1314ebbcdfd2a'}, {'type': 'PACKAGE', '... | {'cwe_ids': ['CWE-94'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-08-31T22:26:11Z', 'nvd_published_at': '2022-08-29T18:15:00Z'} |
1.4.0 | GHSA-xh3v-6f9j-wxw3 | 2023-05-09T16:17:47Z | 2022-08-06T05:31:26Z | null | ['CVE-2022-25275'] | Drupal core Information Disclosure vulnerability | In some situations, the Image module does not correctly check access to image files not stored in the standard public files directory when generating derivative images using the image styles system.
Access to a non-public file is checked only if it is stored in the "private" file system. However, some contributed modu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.91'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '9.3.19'}]}]}, {'packa... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25275'}, {'type': 'WEB', 'url': 'https://github.com/drupal/core/commit/2d5f47fc8a166115f56c2330a81e83abe22445cf'}, {'type': 'WEB', 'url': 'https://github.com/drupal/core/commit/e2fbf63700819cb470a1be425798f1a3f2020116'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:31:26Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f772-66g8-q5h3 | 2023-01-19T01:01:59Z | 2022-08-18T19:02:56Z | null | ['CVE-2022-35948'] | Nodejs ‘undici’ vulnerable to CRLF Injection via Content-Type | ### Impact
`=< undici@5.8.0` users are vulnerable to _CRLF Injection_ on headers when using unsanitized input as request headers, more specifically, inside the `content-type` header.
Example:
```
import { request } from 'undici'
const unsanitizedContentTypeInput = 'application/json\r\n\r\nGET /foo2 HTTP/1.1'
awai... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'undici'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.8.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/nodejs/undici/security/advisories/GHSA-f772-66g8-q5h3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35948'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/undici/commit/66165d604fd0aee70a93ed5c44ad4cc2df395f80'}, {'type': 'PACKAGE', 'url': 'htt... | {'cwe_ids': ['CWE-74', 'CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:02:56Z', 'nvd_published_at': '2022-08-15T11:21:00Z'} |
1.4.0 | GHSA-772j-xvf9-qpf5 | 2022-09-01T22:17:50Z | 2022-08-24T00:00:29Z | null | ['CVE-2021-3702'] | ansible-runner 2.0.0 vulnerable to Race Condition | A race condition flaw was found in ansible-runner, where an attacker could watch for rapid creation and deletion of a temporary directory, substitute their directory at that name, and then have access to ansible-runner's private_data_dir the next time ansible-runner made use of the private_data_dir. The highest Threat ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible-runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3702'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible-runner/pull/742'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible-runner/pull/742/commits'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible-runner/commit... | {'cwe_ids': ['CWE-362', 'CWE-377'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:17:50Z', 'nvd_published_at': '2022-08-23T16:15:00Z'} |
1.4.0 | GHSA-9jmq-rx5f-8jwq | 2023-06-06T17:24:12Z | 2022-08-10T17:51:53Z | null | ['CVE-2021-32862'] | nbconvert vulnerable to cross-site scripting (XSS) via multiple exploit paths | Cross-linking to https://github.com/jupyter/nbviewer/security/advisories/GHSA-h274-fcvj-h2wm
Most of the fixes will be in this repo, though, so having it here gives us the private fork to work on patches
Below is currently a duplicate of the original report:
----
Received on security@ipython.org unedited, I'm not s... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'nbconvert'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jupyter/nbconvert/security/advisories/GHSA-9jmq-rx5f-8jwq'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/nbviewer/security/advisories/GHSA-h274-fcvj-h2wm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32862'}, {'type': 'PACKAGE', 'url': 'http... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T17:51:53Z', 'nvd_published_at': '2022-08-18T19:15:00Z'} |
1.4.0 | GHSA-7qq9-9g2w-56f9 | 2022-08-30T20:42:16Z | 2022-08-20T00:00:30Z | null | ['CVE-2022-36157'] | Improper Privilege Management in com.xuxueli:xxl-job | XXL-JOB all versions as of 11 July 2022 are vulnerable to Insecure Permissions resulting in the ability to execute admin function with low Privilege account. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-job'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36157'}, {'type': 'WEB', 'url': 'https://github.com/Richard-Muzi/vulnerability/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-job/'}] | {'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:42:16Z', 'nvd_published_at': '2022-08-19T22:15:00Z'} |
1.4.0 | GHSA-w3rc-2whg-w934 | 2022-08-30T19:56:06Z | 2022-08-17T00:00:30Z | null | ['CVE-2022-36599'] | Mingsoft MCMS SQL injection vulnerability in /mdiy/model/delete URI via models List | Mingsoft MCMS 5.2.8 was discovered to contain a SQL injection vulnerability in /mdiy/model/delete URI via models Lists. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36599'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/mingSoft/MCMS'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I5I1P5'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T19:56:06Z', 'nvd_published_at': '2022-08-16T13:15:00Z'} |
1.4.0 | GHSA-8449-7gc2-pwrp | 2022-09-08T14:07:19Z | 2022-08-18T00:00:17Z | null | ['CVE-2022-38149'] | HashiCorp Consul Template could reveal Vault secret contents in error messages | In HashiCorp Consul Template through version 0.29.1, invalid templates could inadvertently reveal the contents of Vault secret in errors returned by the `*template.Template.Execute 5` method, when given a template using Vault secret contents incorrectly. This method has been updated to redact Vault secrets when creatin... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul-template'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul-template'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.28.0'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38149'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul-template/commit/d6a6f4af219c28e67d847ba0e0b2bea8f5bb9076'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hsec-2022-16-consul-template-may-expose-vault-secrets-when-proc... | {'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:17:03Z', 'nvd_published_at': '2022-08-17T15:15:00Z'} |
1.4.0 | GHSA-j3rv-w43q-f9x2 | 2022-08-18T19:15:28Z | 2022-08-18T19:15:28Z | null | ['CVE-2022-36010'] | React Editable Json Tree vulnerable to arbitrary code execution via function parsing | ### Impact
Our library allows strings to be parsed as functions and stored as a specialized component, [`JsonFunctionValue`](https://github.com/oxyno-zeta/react-editable-json-tree/blob/09a0ca97835b0834ad054563e2fddc6f22bc5d8c/src/components/JsonFunctionValue.js). To do this, Javascript's [`eval`](https://developer.mozi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'react-editable-json-tree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/oxyno-zeta/react-editable-json-tree/security/advisories/GHSA-j3rv-w43q-f9x2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36010'}, {'type': 'PACKAGE', 'url': 'https://github.com/oxyno-zeta/react-editable-json-tree'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:15:28Z', 'nvd_published_at': '2022-08-15T19:15:00Z'} |
1.4.0 | GHSA-wff4-fpwg-qqv3 | 2022-09-08T14:17:38Z | 2022-08-30T20:38:34Z | null | ['CVE-2022-36046'] | Unexpected server crash in Next.js | ### Impact
When specific requests are made to the Next.js server it can cause an `unhandledRejection` in the server which can crash the process to exit in specific Node.js versions with strict `unhandledRejection` handling.
- Affected: All of the following must be true to be affected by this CVE
- Node.js version ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.2.3'}, {'fixed': '12.2.4'}]}], 'versions': ['12.2.3']}] | [{'type': 'WEB', 'url': 'https://github.com/vercel/next.js/security/advisories/GHSA-wff4-fpwg-qqv3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36046'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/releases/tag/v12.2.4'}] | {'cwe_ids': ['CWE-248', 'CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:38:34Z', 'nvd_published_at': '2022-08-31T19:15:00Z'} |
1.4.0 | GHSA-39gf-864w-pxw4 | 2022-08-30T20:25:13Z | 2022-08-23T00:00:19Z | null | ['CVE-2022-2930'] | Unverified Password Change in OctoPrint | Versions of OctoPrint prior to 1.8.3 did not require the current user password in order to change that users password. As a result users could be locked out of their accounts or have their accounts stolen under certain circumstances. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'OctoPrint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2930'}, {'type': 'WEB', 'url': 'https://github.com/octoprint/octoprint/commit/1453076ee3e47fcab2dc73664ec2d61d3ef7fc4f'}, {'type': 'PACKAGE', 'url': 'https://github.com/octoprint/octoprint'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/da674... | {'cwe_ids': ['CWE-620'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:25:13Z', 'nvd_published_at': '2022-08-22T12:15:00Z'} |
1.4.0 | GHSA-vp56-6g26-6827 | 2022-08-04T17:37:24Z | 2022-08-02T00:00:25Z | null | ['CVE-2022-2596'] | node-fetch Inefficient Regular Expression Complexity | [node-fetch](https://www.npmjs.com/package/node-fetch) is a light-weight module that brings window.fetch to node.js.
Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) in the `isOriginPotentiallyTrustworthy()` function in `referrer.js`, when processing a URL string with al... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-fetch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2596'}, {'type': 'WEB', 'url': 'https://github.com/node-fetch/node-fetch/pull/1611'}, {'type': 'WEB', 'url': 'https://github.com/node-fetch/node-fetch/commit/28802387292baee467e042e168d92597b5bbbe3d'}, {'type': 'PACKAGE', 'url': 'https://github.com... | {'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-04T17:37:24Z', 'nvd_published_at': '2022-08-01T15:15:00Z'} |
1.4.0 | GHSA-fcg8-mg9g-6hc4 | 2022-08-30T19:35:52Z | 2022-08-30T19:35:52Z | null | ['CVE-2022-29145'] | .NET Denial of Service Vulnerability | Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0 and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A vulnerability exists in .NET 6.0, .NET 5.0 and .NET core 3.1 wh... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.25'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'int... | [{'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-fcg8-mg9g-6hc4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29145'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXQL7EZORGU4PZC... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T19:35:52Z', 'nvd_published_at': '2022-05-10T21:15:00Z'} |
1.4.0 | GHSA-jp45-65jw-94mj | 2022-08-10T17:54:26Z | 2022-08-03T00:00:57Z | null | ['CVE-2020-28437'] | heroku-env susceptible to command injection | A command injection vulnerability affects all versions of package heroku-env. The injection point is located in lib/get.js which is required by index.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'heroku-env'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28437'}, {'type': 'PACKAGE', 'url': 'https://github.com/brianc/node-heroku-env'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-HEROKUENV-1050432'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T17:54:26Z', 'nvd_published_at': '2022-08-02T14:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.