schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-pj4j-287j-f742
2021-05-03T21:22:13Z
2022-02-10T20:49:48Z
null
['CVE-2018-10125']
Cross-site Scripting in Contao
Contao before 4.5.7 has XSS in the system log.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'contao/core-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-10125'}, {'type': 'WEB', 'url': 'https://contao.org/en/security-advisories/cross-site-scripting-in-the-system-log.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-03T21:22:13Z', 'nvd_published_at': '2020-03-16T15:15:00Z'}
1.4.0
GHSA-rhg5-fqr3-hrf5
2023-01-20T18:52:58Z
2022-02-10T20:54:31Z
null
['CVE-2019-12416']
Injection in DeltaSpike
we got reports for 2 injection attacks against the DeltaSpike windowhandler.js. This is only active if a developer selected the ClientSideWindowStrategy which is not the default.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.deltaspike:deltaspike'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-12416'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r848d7d4c0bf637da55f01103eb8ba0fce344c295fda53264cbaa1568@%3Ccommits.camel.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r8f327712b2b07f867fde1e77...
{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T21:47:46Z', 'nvd_published_at': '2020-03-19T15:15:00Z'}
1.4.0
GHSA-4g77-cvgw-grvw
2022-02-11T16:15:46Z
2022-02-05T00:00:31Z
null
['CVE-2021-23470']
Prototype Pollution in putil-merge
This affects the package putil-merge before 3.8.0. The merge() function does not check the values passed into the argument. An attacker can supply a malicious value by adjusting the value to include the constructor property. Note: This vulnerability derives from an incomplete fix in https://security.snyk.io/vuln/SNYK-J...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'putil-merge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23470'}, {'type': 'WEB', 'url': 'https://github.com/panates/putil-merge/commit/476d00078dfb2827d7c9ee0f2392c81b864f7bc5'}, {'type': 'PACKAGE', 'url': 'https://github.com/panates/putil-merge/'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-P...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-07T17:15:36Z', 'nvd_published_at': '2022-02-04T20:15:00Z'}
1.4.0
GHSA-vx57-7f4q-fpc7
2021-05-28T22:05:12Z
2022-02-15T01:57:18Z
null
['CVE-2021-29622']
Arbitrary redirects under /new endpoint
### Impact In 2.23.0, Prometheus changed its default UI to the New ui. To ensure a seamless transition, the URL's prefixed by /new redirect to /. Due to a bug in the code, it is possible for an attacker to craft an URL that can redirect to any other URL, in the /new endpoint. If a user visits a prometheus server with...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/prometheus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.23.0'}, {'fixed': '2.26.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/prometheus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.27.0'}, ...
[{'type': 'WEB', 'url': 'https://github.com/prometheus/prometheus/security/advisories/GHSA-vx57-7f4q-fpc7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29622'}, {'type': 'WEB', 'url': 'https://github.com/prometheus/prometheus/releases/tag/v2.26.1'}, {'type': 'WEB', 'url': 'https://github.com...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T17:58:51Z', 'nvd_published_at': '2021-05-19T20:15:00Z'}
1.4.0
GHSA-wpfr-6297-9v57
2022-02-09T22:29:01Z
2022-02-09T22:29:01Z
null
[]
User object created with invalid provider data in GoTrue
### Impact _What kind of vulnerability is it? Who is impacted?_ Under certain circumstances a valid user object would have been created with invalid provider metadata. This vulnerability affects everyone running an instance of GoTrue as a service. We advise you to update especially if you are using the provider metad...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/netlify/gotrue'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/netlify/gotrue/security/advisories/GHSA-wpfr-6297-9v57'}, {'type': 'WEB', 'url': 'https://github.com/netlify/gotrue/pull/313'}, {'type': 'WEB', 'url': 'https://github.com/netlify/gotrue/commit/4d8a3b39fe485a5f83c70617d594be01130c5b83'}, {'type': 'PACKAGE', 'url': 'https://git...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-09T22:29:01Z', 'nvd_published_at': None}
1.4.0
GHSA-x6mj-w4jf-jmgw
2023-09-18T22:44:56Z
2022-02-15T01:57:18Z
null
['CVE-2020-8555']
Server Side Request Forgery (SSRF) in Kubernetes
The Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints within the master's host...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.18.0'}, {'fixed': '1.18.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': [''...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8555'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/91542'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/89794'}, {'type': 'WEB', 'url': 'https://groups.google.com/d/topic/kubernetes-security-an...
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T20:13:43Z', 'nvd_published_at': '2020-06-05T17:15:00Z'}
1.4.0
GHSA-j9wf-vvm6-4r9w
2022-10-31T15:56:21Z
2022-02-08T21:50:34Z
null
['CVE-2020-8554']
Unverified Ownership in Kubernetes
Kubernetes API server in all versions allow an attacker who is able to create a ClusterIP service and set the spec.externalIPs field, to intercept traffic to that IP address. Additionally, an attacker who is able to patch the status (which is considered a privileged operation and should not typically be granted to user...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.22.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8554'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/97076'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/97110'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'type...
{'cwe_ids': ['CWE-283'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-12T21:42:11Z', 'nvd_published_at': '2021-01-21T17:15:00Z'}
1.4.0
GHSA-ph76-rhqq-xj7j
2021-04-13T17:23:33Z
2022-02-09T23:08:06Z
null
['CVE-2017-15686']
Cross-site scripting in Crafter CMS Crafter Studio
Crafter CMS Crafter Studio 3.0.1 is affected by: Cross Site Scripting (XSS), which allows remote attackers to steal users’ cookies.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-15686'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.0/security/advisory.html'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-13T17:23:33Z', 'nvd_published_at': '2020-11-27T18:15:00Z'}
1.4.0
GHSA-w4jq-qh47-hvjq
2022-06-24T01:25:49Z
2022-02-15T01:37:41Z
null
['CVE-2020-14338']
Improper Input Validation in Xerces
A flaw was found in Wildfly's implementation of Xerces, specifically in the way the XMLSchemaValidator class in the JAXP component of Wildfly enforced the "use-grammar-pool-only" feature. This flaw allows a specially-crafted XML file to manipulate the validation process in certain cases. This issue is the same flaw as ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'xerces:xercesImpl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.12.0.sp3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.12.0.sp2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14338'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1860054'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rf96c5afb26b596b4b97883aa90b6c0b0fc4c26aaeea7123c21912103@%3Cj-users.xerces.apache.org%3E'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-24T01:25:49Z', 'nvd_published_at': '2020-09-17T15:15:00Z'}
1.4.0
GHSA-mvq8-hgxh-4v2g
2022-12-01T22:38:36Z
2022-02-16T00:01:22Z
null
['CVE-2022-25196']
Open redirect vulnerability in Jenkins GitLab Authentication Plugin
Jenkins GitLab Authentication Plugin 1.13 and earlier records the HTTP `Referer` header as part of the URL query parameters when the authentication process starts, allowing attackers with access to Jenkins to craft a URL that will redirect users to an attacker-specified URL after logging in. This issue is caused by an...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gitlab-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25196'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/gitlab-oauth-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2019-08-07/#SECURITY-796'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-01T22:38:36Z', 'nvd_published_at': '2022-02-15T17:15:00Z'}
1.4.0
GHSA-gjq4-69wj-p6pr
2022-03-02T21:16:04Z
2022-02-23T00:00:59Z
null
['CVE-2022-0665']
Path traversal in pimcore
The application doesn't perform a check/filter against the value of "importFile" parameter at endpoint "/admin/translation/import". After the API is executed, PHP unlink function will proceed to delete the file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0665'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/28945649a6234ccaa8c94c6cd83d1954603baf3e'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/423df64d-c591...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-02T21:16:04Z', 'nvd_published_at': '2022-02-22T15:15:00Z'}
1.4.0
GHSA-h6xq-3h62-99qx
2021-05-04T20:51:07Z
2022-02-10T20:51:46Z
null
['CVE-2020-13928']
Cross-site scripting in Apache Atlas
Apache Atlas before 2.1.0 contain a XSS vulnerability. While saving search or rendering elements values are not sanitized correctly and because of that it triggers the XSS vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.atlas:apache-atlas'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13928'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/ra468036f913be41b0c8fea74f91d53e273b0bfa838a4b140a5dcd463%40%3Cuser.atlas.apache.org%3E'}, {'type': 'WEB', 'url': 'https://mvnrepository.com/artifact/org.apache.atlas/apache-atla...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-04T20:51:07Z', 'nvd_published_at': '2020-09-16T18:15:00Z'}
1.4.0
GHSA-qhm4-jxv7-j9pq
2023-01-27T21:42:48Z
2022-02-15T01:57:18Z
null
['CVE-2020-8551']
Allocation of Resources Without Limits or Throttling and Uncontrolled Memory Allocation in Kubernetes
The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.15.0'}, {'fixed': '1.15.10'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes'}, 'ecosystem_specific': {'affected_functions': ['...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-8551'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/89377'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/87913'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/commit/9802bfce...
{'cwe_ids': ['CWE-770', 'CWE-789'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T21:53:58Z', 'nvd_published_at': '2020-03-27T15:15:00Z'}
1.4.0
GHSA-gwmc-6795-qghj
2022-03-18T18:21:52Z
2022-02-15T00:02:46Z
null
['CVE-2022-24686']
HashiCorp Nomad Artifact Download Race Condition
HashiCorp Nomad and Nomad Enterprise 0.3.0 through 1.0.17, 1.1.11, and 1.2.5 artifact download functionality has a race condition such that the Nomad client agent could download the wrong artifact into the wrong destination. This issue is fixed in 1.0.18, 1.1.12, and 1.2.6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '1.0.18'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/nomad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24686'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/nomad/issues/12036'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-01-nomad-artifact-download-race-conditio...
{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T18:21:52Z', 'nvd_published_at': '2022-02-14T14:15:00Z'}
1.4.0
GHSA-jmhf-9fj8-88gh
2022-03-02T21:07:57Z
2022-02-23T21:15:01Z
null
['CVE-2022-0692']
Open Redirect in AllTube
### Impact Releases prior to 3.0.1 are vulnerable to an open redirect vulnerability that allows an attacker to construct a URL that redirects to an arbitrary external domain. ### Patches 3.0.1 contains a fix for this vulnerability. (The 1.x and 2.x releases are not maintained anymore.) ### References * https://github...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'rudloff/alltube'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Rudloff/alltube/security/advisories/GHSA-jmhf-9fj8-88gh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0692'}, {'type': 'WEB', 'url': 'https://github.com/rudloff/alltube/commit/bc14b6e45c766c05757fb607ef8d444cbbfba71a'}, {'type': 'PACKAGE', 'url': '...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T21:15:01Z', 'nvd_published_at': '2022-02-21T13:15:00Z'}
1.4.0
GHSA-fq42-c5rg-92c2
2022-02-25T20:32:09Z
2022-02-25T20:32:09Z
null
[]
Vulnerable dependencies in Nokogiri
### Summary Nokogiri [v1.13.2](https://github.com/sparklemotion/nokogiri/releases/tag/v1.13.2) upgrades two of its packaged dependencies: - vendored libxml2 from v2.9.12 to [v2.9.13](https://download.gnome.org/sources/libxml2/2.9/libxml2-2.9.13.news) - vendored libxslt from v1.1.34 to [v1.1.35](https://download.gnome...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-fq42-c5rg-92c2'}, {'type': 'PACKAGE', 'url': 'https://github.com/sparklemotion/nokogiri/'}]
{'cwe_ids': ['CWE-416'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T20:32:09Z', 'nvd_published_at': None}
1.4.0
GHSA-jf5r-8hm2-f872
2023-09-11T22:57:14Z
2022-02-22T00:00:30Z
null
['CVE-2022-0691']
url-parse incorrectly parses hostname / protocol due to unstripped leading control characters.
Leading control characters in a URL are not stripped when passed into url-parse. This can cause input URLs to be mistakenly be interpreted as a relative URL without a hostname and protocol, while the WHATWG URL parser will trim control characters and treat it as an absolute URL. If url-parse is used in security decisi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'url-parse'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0691'}, {'type': 'WEB', 'url': 'https://github.com/unshiftio/url-parse/commit/0e3fb542d60ddbf6933f22eb9b1e06e25eaa5b63'}, {'type': 'PACKAGE', 'url': 'https://github.com/unshiftio/url-parse'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/57124...
{'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T19:05:20Z', 'nvd_published_at': '2022-02-21T09:15:00Z'}
1.4.0
GHSA-vvmr-8829-6whx
2022-02-07T22:11:10Z
2022-02-01T00:46:57Z
null
['CVE-2022-23601']
CSRF token missing in Symfony
Description ----------- The Symfony form component provides a CSRF protection mechanism by using a random token injected in the form and using the session to store and control the token submitted by the user. When using the FrameworkBundle, this protection can be enabled or disabled with the configuration. If the conf...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/framework-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3.14'}, {'fixed': '5.3.15'}]}], 'versions': ['5.3.14']}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/framework-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'in...
[{'type': 'WEB', 'url': 'https://github.com/symfony/symfony/security/advisories/GHSA-vvmr-8829-6whx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23601'}, {'type': 'WEB', 'url': 'https://github.com/symfony/symfony/commit/f0ffb775febdf07e57117aabadac96fa37857f50'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-31T22:03:31Z', 'nvd_published_at': '2022-02-01T13:15:00Z'}
1.4.0
GHSA-62gr-4qp9-h98f
2021-04-22T23:31:21Z
2022-02-10T20:38:22Z
null
['CVE-2019-20922']
Regular Expression Denial of Service in Handlebars
Handlebars before 4.4.5 allows Regular Expression Denial of Service (ReDoS) because of eager matching. The parser may be forced into an endless loop while processing crafted templates. This may allow attackers to exhaust system resources.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'handlebars'}, 'ecosystem_specific': {'affected_functions': ['handlebars.compile']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.4.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-20922'}, {'type': 'WEB', 'url': 'https://github.com/handlebars-lang/handlebars.js/commit/8d5530ee2c3ea9f0aee3fde310b9f36887d00b8b'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-HANDLEBARS-480388'}, {'type': 'WEB', 'url': 'https://www.npmjs...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-04-22T23:31:21Z', 'nvd_published_at': '2020-09-30T18:15:00Z'}
1.4.0
GHSA-62mh-w5cv-p88c
2023-08-29T22:06:59Z
2022-02-15T00:42:28Z
null
[]
nats-io/jwt not enforcing checking of Import token permissions
(This advisory is canonically <https://advisories.nats.io/CVE/CVE-2021-3127.txt>) ## Problem Description The NATS server provides for Subjects which are namespaced by Account; all Subjects are supposed to be private to an account, with an Export/Import system used to grant cross-account access to some Subjects. Some...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/jwt'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/jwt/v2'}, 'ecosystem_specific': {'affected_function...
[{'type': 'WEB', 'url': 'https://github.com/nats-io/jwt/security/advisories/GHSA-62mh-w5cv-p88c'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/jwt/pull/149'}, {'type': 'WEB', 'url': 'https://advisories.nats.io/CVE/CVE-2021-3127.txt'}, {'type': 'PACKAGE', 'url': 'https://github.com/nats-io/jwt'}]
{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T20:58:15Z', 'nvd_published_at': None}
1.4.0
GHSA-3gg9-f3vh-866f
2021-05-10T21:16:56Z
2022-02-10T22:39:58Z
null
['CVE-2020-15813']
Improper Certificate Validation in Graylog
Graylog before 3.3.3 lacks SSL Certificate Validation for LDAP servers. It allows use of an external user/group database stored in LDAP. The connection configuration allows the usage of unencrypted, SSL- or TLS-secured connections. Unfortunately, the Graylog client code (in all versions that support LDAP) does not impl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.graylog:graylog-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-15813'}, {'type': 'WEB', 'url': 'https://github.com/Graylog2/graylog2-server/issues/5906'}, {'type': 'WEB', 'url': 'https://github.com/Graylog2/graylog2-server/pull/8569'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-10T21:16:56Z', 'nvd_published_at': '2020-07-17T19:15:00Z'}
1.4.0
GHSA-x2p8-rgfm-qw3v
2022-03-03T22:07:41Z
2022-02-25T00:01:07Z
null
['CVE-2021-44550']
Access Control vulnerability within CoreNLP
An Incorrect Access Control vulnerability exists in CoreNLP 4.3.2 via the classifier in NERServlet.java (lines 158 and 159).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'edu.stanford.nlp:stanford-corenlp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44550'}, {'type': 'WEB', 'url': 'https://github.com/stanfordnlp/CoreNLP/issues/1222'}, {'type': 'WEB', 'url': 'https://github.com/stanfordnlp/CoreNLP/commit/5ee097dbede547023e88f60ed3f430ff09398b87'}, {'type': 'PACKAGE', 'url': 'https://github.com/...
{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-25T22:02:34Z', 'nvd_published_at': '2022-02-24T15:15:00Z'}
1.4.0
GHSA-2qp4-g3q3-f92w
2022-06-20T22:37:38Z
2022-02-26T00:00:43Z
null
['CVE-2022-24329']
Improper Locking in JetBrains Kotlin
In JetBrains Kotlin before 1.6.0, it was not possible to lock dependencies for Multiplatform Gradle Projects.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jetbrains.kotlin:kotlin-stdlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5.32'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24329'}, {'type': 'WEB', 'url': 'https://blog.jetbrains.com'}, {'type': 'WEB', 'url': 'https://blog.jetbrains.com/blog/2022/02/08/jetbrains-security-bulletin-q4-2021/'}, {'type': 'PACKAGE', 'url': 'https://github.com/JetBrains/kotlin'}, {'type': 'W...
{'cwe_ids': ['CWE-667'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:37:38Z', 'nvd_published_at': '2022-02-25T15:15:00Z'}
1.4.0
GHSA-q2qr-3c2p-9235
2021-05-13T14:26:25Z
2022-02-15T01:57:18Z
null
['CVE-2020-12758']
Denial of Service (DoS) in HashiCorp Consul
HashiCorp Consul and Consul Enterprise could crash when configured with an abnormally-formed service-router entry. Introduced in 1.6.0, fixed in 1.6.6 and 1.7.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul/agent/consul/discoverychain'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0-beta1'}, {'fixed': '1.6.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul/agent/consul/discoverychain'}, 'ranges': [{'type': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-12758'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/pull/7783'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/69b44fb9424cfdc05f1b7243876ab10d236ef1fc'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/co...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-13T14:26:25Z', 'nvd_published_at': None}
1.4.0
GHSA-484q-784p-8m5h
2021-04-01T19:41:54Z
2022-02-09T00:58:15Z
null
['CVE-2020-10776']
Cross-site Scripting in keycloak
A flaw was found in Keycloak before version 12.0.0, where it is possible to add unsafe schemes for the redirect_uri parameter. This flaw allows an attacker to perform a Cross-site scripting attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10776'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1847428'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T19:41:54Z', 'nvd_published_at': '2020-11-17T02:15:00Z'}
1.4.0
GHSA-jqmc-79gx-7g8p
2022-02-23T22:00:51Z
2022-02-11T00:00:54Z
null
['CVE-2022-0532']
Incorrect Permission Assignment for Critical Resource in CRI-O
An incorrect sysctls validation vulnerability was found in CRI-O 1.18 and earlier. The sysctls from the list of "safe" sysctls specified for the cluster will be applied to the host if an attacker is able to create a pod with a hostIPC and hostNetwork kernel namespace.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.23.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0532'}, {'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/pull/5610'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2051730'}, {'type': 'PACKAGE', 'url': 'https://github.com/cri-o/cri-o'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-11T18:50:08Z', 'nvd_published_at': '2022-02-09T23:15:00Z'}
1.4.0
GHSA-v8wr-r69p-mmwx
2022-02-23T19:14:17Z
2022-02-12T00:00:47Z
null
['CVE-2020-13675']
Unrestricted Upload of File with Dangerous Type in Drupal core
Drupal's JSON:API and REST/File modules allow file uploads through their HTTP APIs. The modules do not correctly run all file validation, which causes an access bypass vulnerability. An attacker might be able to upload files that bypass the file validation process implemented by modules on the site.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.9.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.1.0'}, {'fixed': '9.1.13'}]}]}, {'pac...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13675'}, {'type': 'PACKAGE', 'url': 'https://github.com/drupal/core'}, {'type': 'WEB', 'url': 'https://www.drupal.org/sa-core-2021-008'}]
{'cwe_ids': ['CWE-284', 'CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-02-23T19:14:17Z', 'nvd_published_at': '2022-02-11T16:15:00Z'}
1.4.0
GHSA-wp47-9r3h-xfgq
2022-02-14T22:58:25Z
2022-02-07T00:00:23Z
null
['CVE-2022-23206']
Server-Side Request Forgery in Apache Traffic Control
In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, an unprivileged user who can reach Traffic Ops over HTTPS can send a specially-crafted POST request to /user/login/oauth to scan a port of a server that Traffic Ops can reach.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/apache/trafficcontrol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.1.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/apache/trafficcontrol'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23206'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/lsrd2mqj29vrvwsh8g0d560vvz8n126f'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:58:25Z', 'nvd_published_at': '2022-02-06T16:15:00Z'}
1.4.0
GHSA-hxvf-35w8-f5mw
2022-02-24T13:18:02Z
2022-02-12T00:00:37Z
null
['CVE-2021-46366']
Cross-Site Request Forgery in Magnolia CMS
An issue in the Login page of Magnolia CMS v6.2.3 and below allows attackers to exploit both an Open Redirect vulnerability and Cross-Site Request Forgery (CSRF) in order to brute force and exfiltrate users' credentials.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'info.magnolia:magnolia-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46366'}, {'type': 'WEB', 'url': 'https://docs.magnolia-cms.com/product-docs/6.2/Releases/Release-notes-for-Magnolia-CMS-6.2.4.html#_security_advisory'}, {'type': 'WEB', 'url': 'https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2021-46366...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-14T22:43:53Z', 'nvd_published_at': '2022-02-11T21:15:00Z'}
1.4.0
GHSA-54g4-5cf6-hjp3
2022-08-11T16:40:17Z
2022-02-09T00:48:54Z
null
['CVE-2020-1926']
Apache Hive Information Exposure and Observable Timing Discrepancy
Apache Hive cookie signature verification used a non constant time comparison which is known to be vulnerable to timing attacks. This could allow recovery of another users cookie signature. The issue was addressed in Apache Hive 2.3.8
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1926'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/HIVE-22708'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rd186eedff68102ba1e68059a808101c5aa587e11542c7dcd26e7b9d7%40%3Cuser.hive.apache.org%3E'}]
{'cwe_ids': ['CWE-200', 'CWE-203', 'CWE-208'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-31T21:30:08Z', 'nvd_published_at': '2021-03-16T13:15:00Z'}
1.4.0
GHSA-v7wg-cpwc-24m4
2022-08-12T13:14:09Z
2022-02-02T00:04:20Z
null
['CVE-2022-21724']
pgjdbc Does Not Check Class Instantiation when providing Plugin Classes
### Impact pgjdbc instantiates plugin instances based on class names provided via `authenticationPluginClassName`, `sslhostnameverifier`, `socketFactory`, `sslfactory`, `sslpasswordcallback` connection properties. However, the driver did not verify if the class implements the expected interface before instantiating t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.1208'}, {'fixed': '42.2.25'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '42.3.0'}, {'fix...
[{'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-v7wg-cpwc-24m4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21724'}, {'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/commit/f4d0ed69c0b3aae8531d83d6af4c57f22312c813'}, {'type': 'PACKAGE', 'url': 'htt...
{'cwe_ids': ['CWE-665', 'CWE-668', 'CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-02-01T22:40:00Z', 'nvd_published_at': '2022-02-02T12:15:00Z'}
1.4.0
GHSA-hhm3-48h2-597v
2023-08-31T15:18:54Z
2022-02-02T00:01:46Z
null
['CVE-2021-44451']
Insufficiently Protected Credentials in Apache Superset
Apache Superset up to and including 1.3.2 allowed for registered database connections password leak for authenticated users. This information could be accessed in a non-trivial way. Users should upgrade to Apache Superset 1.4.0 or higher.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44451'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/xww1pccs2ckb5506wrf1v4lmxg198vkb'}]
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-02-03T17:20:28Z', 'nvd_published_at': '2022-02-01T14:15:00Z'}
1.4.0
GHSA-r773-pmw3-f4mr
2023-09-05T23:11:11Z
2022-02-10T23:47:27Z
null
['CVE-2021-23384']
Open Redirect in koa-remove-trailing-slashes
The package koa-remove-trailing-slashes before 2.0.2 are vulnerable to Open Redirect via the use of trailing double slashes in the URL when accessing the vulnerable endpoint (such as `https://example.com//attacker.example/`). The vulnerable code is in `index.js::removeTrailingSlashes()`, as the web server uses relative...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'koa-remove-trailing-slashes'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23384'}, {'type': 'WEB', 'url': 'https://github.com/vgno/koa-remove-trailing-slashes/commit/e7ce4000e9fe4d957332df1056640a22ebea28ee'}, {'type': 'PACKAGE', 'url': 'https://github.com/vgno/koa-remove-trailing-slashes'}, {'type': 'WEB', 'url': 'https...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T17:57:27Z', 'nvd_published_at': '2021-05-17T18:15:00Z'}
1.4.0
GHSA-72j4-94rx-cr6w
2021-04-01T21:11:24Z
2022-02-09T00:57:02Z
null
['CVE-2020-1694']
Incorrect Permission Assignment for Critical Resource and Permissive List of Allowed Inputs in Keycloak
A flaw was found in all versions of Keycloak before 10.0.0, where the NodeJS adapter did not support the verify-token-audience. This flaw results in some users having access to sensitive information outside of their permissions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1694'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1790759'}]
{'cwe_ids': ['CWE-183', 'CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-04-01T21:11:24Z', 'nvd_published_at': '2020-09-16T19:15:00Z'}
1.4.0
GHSA-3w4v-rvc4-2xpw
2022-09-02T21:12:52Z
2022-08-27T00:00:45Z
null
['CVE-2021-3856']
Keycloak has Files or Directories Accessible to External Parties
ClassLoaderTheme and ClasspathThemeResourceProviderFactory allows reading any file available as a resource to the classloader. By sending requests for theme resources with a relative path from an external HTTP client, the client will receive the content of random files if available.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3856'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/pull/8588'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/73f0474008e1bebd0733e62a22aceda9e5de6743'}, {'type': 'WEB', 'url': 'https://access.redhat.com/secu...
{'cwe_ids': ['CWE-22', 'CWE-552'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-02T21:12:52Z', 'nvd_published_at': '2022-08-26T16:15:00Z'}
1.4.0
GHSA-jxmw-3gxf-fprh
2022-11-29T21:44:38Z
2022-08-24T00:00:28Z
null
['CVE-2022-38663']
Improper masking of credentials Jenkins in Git Plugin
Jenkins Git Plugin 4.11.4 and earlier does not properly mask (i.e., replace with asterisks) credentials in the build log provided by the Git Username and Password (`gitUsernamePassword`) credentials binding.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38663'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-08-23/#SECURITY-2796'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/08...
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:44:38Z', 'nvd_published_at': '2022-08-23T17:15:00Z'}
1.4.0
GHSA-6j58-grhv-2769
2022-09-01T22:22:11Z
2022-08-25T00:00:27Z
null
['CVE-2021-4041']
ansible-runner vulnerable to shell command injection
A flaw was found in ansible-runner. An improper escaping of the shell command, while calling the ansible_runner.interface.run_command, can lead to parameters getting executed as host's shell command. A developer could unintentionally write code that gets executed in the host rather than the virtual environment.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible-runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4041'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible-runner/commit/3533f265f4349a3f2a0283158cd01b59a6bbc7bd'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-4041'}, {'type': 'WEB', 'url': 'https://bugzilla.re...
{'cwe_ids': ['CWE-116', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:22:11Z', 'nvd_published_at': '2022-08-24T16:15:00Z'}
1.4.0
GHSA-cmxc-9ghj-jp87
2022-09-08T14:09:26Z
2022-08-26T00:03:29Z
null
['CVE-2022-2997']
Insufficient Session Expiration in snipe/snipe-it
Session Fixation in GitHub repository snipe/snipe-it prior to version 6.0.10. The session is not invalidated after a password change.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2997'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/6fde72a69335c80079363b7d26aa94e7f67400e1'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c09bf21b-50d2-4...
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:54:45Z', 'nvd_published_at': '2022-08-25T21:15:00Z'}
1.4.0
GHSA-7942-2fx8-qhpf
2022-08-11T15:20:10Z
2022-08-05T00:00:23Z
null
['CVE-2022-35143']
Raneto v0.17.0 employs weak password complexity requirements
Raneto v0.17.0 employs weak password complexity requirements, allowing attackers to crack user passwords via brute-force attacks. Version 0.17.1 contains security mitigations for this and other vulnerabilities.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'raneto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.17.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35143'}, {'type': 'WEB', 'url': 'https://github.com/ryanlelek/Raneto/pull/370'}, {'type': 'WEB', 'url': 'https://github.com/ryanlelek/Raneto/commit/55e442c9bc67b845094e14ceb228e95c639595be'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/defin...
{'cwe_ids': ['CWE-521'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:20:10Z', 'nvd_published_at': '2022-08-04T20:15:00Z'}
1.4.0
GHSA-rr2m-gffv-mgrj
2022-09-08T14:13:04Z
2022-08-26T00:03:33Z
null
['CVE-2021-25642']
Deserialization of Untrusted Data in Apache Hadoop YARN
ZKConfigurationStore which is optionally used by CapacityScheduler of Apache Hadoop YARN deserializes data obtained from ZooKeeper without validation. An attacker having access to ZooKeeper can run arbitrary commands as YARN user by exploiting this. Users should upgrade to Apache Hadoop 2.10.2, 3.2.4, 3.3.4 or later (c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-yarn-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-yarn-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25642'}, {'type': 'WEB', 'url': 'https://github.com/apache/hadoop/commit/5e2f4339fadc88f20543915fc9b0aaeaf4f9e7bf'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hadoop'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/g6vf2h4wdgz...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:55:27Z', 'nvd_published_at': '2022-08-25T14:15:00Z'}
1.4.0
GHSA-qcgc-6q86-7x2p
2022-08-11T15:57:01Z
2022-08-11T15:57:01Z
null
['CVE-2022-35697']
AEM WCM Core Components CVG Image vulnerable to Reflected Cross-site Scripting
Core Components version 2.20.6 (and earlier) suffer from a reflected cross-site scripting (XSS) vulnerability in `AdaptiveImageServlet` via SVG images. An attacker with author access can upload a special crafted SVG image (including a malicious Javascript) and obtain a link that, when loaded by another authenticated us...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.adobe.cq:core.wcm.components.core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.20.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/adobe/aem-core-wcm-components/security/advisories/GHSA-qcgc-6q86-7x2p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35697'}, {'type': 'PACKAGE', 'url': 'https://github.com/adobe/aem-core-wcm-components'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:57:01Z', 'nvd_published_at': '2022-08-10T20:15:00Z'}
1.4.0
GHSA-2m65-m22p-9wjw
2022-08-11T21:17:41Z
2022-08-10T00:00:18Z
null
['CVE-2022-34716']
.NET Information Disclosure Vulnerability
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET Core 3.1 and .NET 6.0. An information disclosure vulnerability exists in .NET Core 3.1 and .NET 6.0 that could lead to unauthorized access of privileged information. ## Affected software * Any .NET 6.0 application runn...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'System.Security.Cryptography.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.1'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'System.Security.Cryptography.Xml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {...
[{'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-vh55-786g-wjwj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34716'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/announcements/issues/232'}, {'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetc...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T21:17:41Z', 'nvd_published_at': '2022-08-09T20:15:00Z'}
1.4.0
GHSA-5hm8-vh6r-2cjq
2022-08-18T19:03:34Z
2022-08-18T19:03:34Z
null
['CVE-2022-35943']
CodeIgniter Shield Vulnerable to SameSite Attackers Bypassing the CSRF Protection
### Impact This vulnerability may allow [SameSite Attackers](https://canitakeyoursubdomain.name/) to bypass the [CodeIgniter4 CSRF protection](https://codeigniter4.github.io/userguide/libraries/security.html) mechanism with CodeIgniter Shield. For this attack to succeed, the attacker must have direct (or indirect, e.g...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter4/shield'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0-beta'}, {'fixed': '1.0.0-beta.2'}]}], 'versions': ['1.0.0-beta']}]
[{'type': 'WEB', 'url': 'https://github.com/codeigniter4/shield/security/advisories/GHSA-5hm8-vh6r-2cjq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35943'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/shield/commit/342a368536678621998c3c41d276480cd14ec6c6'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:03:34Z', 'nvd_published_at': '2022-08-12T21:15:00Z'}
1.4.0
GHSA-vm6p-35rw-3fxc
2022-08-18T19:14:08Z
2022-08-09T00:00:25Z
null
['CVE-2022-2713']
Cockpit before 2.2.0 vulnerable to Insufficient Session Expiration
Cockpit before version 2.2.0 is vulnerable to Insufficient Session Expiration. The application does not validate requests after password changes, allowing a user to change their account details even after an admin changes their password.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'aheinze/cockpit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2713'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/dd8d0314912fa6517ebd2cc9939d9fafbe68731b'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3080fc9...
{'cwe_ids': ['CWE-613'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:14:08Z', 'nvd_published_at': '2022-08-08T15:15:00Z'}
1.4.0
GHSA-xfhg-9pjg-xg7g
2022-09-16T18:47:42Z
2022-08-26T00:03:30Z
null
['CVE-2021-42521']
VTK NULL pointer dereference vulnerability
There is a NULL pointer dereference vulnerability in VTK, and it lies in IO/Infovis/vtkXMLTreeReader.cxx. The vendor didn't check the return value of libxml2 API 'xmlDocGetRootElement', and try to dereference it. It is unsafe as the return value can be NULL and that NULL pointer dereference may crash the application.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'vtk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42521'}, {'type': 'WEB', 'url': 'https://discourse.vtk.org/t/vtk-9-2-5-is-out/10549'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xfhg-9pjg-xg7g'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vul...
{'cwe_ids': ['CWE-400', 'CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:47:42Z', 'nvd_published_at': '2022-08-25T18:15:00Z'}
1.4.0
GHSA-ggjq-8c4c-68r5
2022-08-11T15:46:48Z
2022-08-05T00:00:30Z
null
['CVE-2022-28730']
Apache JSPWiki XSS due to incomplete patch for CVE-2021-40369
A carefully crafted request on AJAXPreview.jsp could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. This vulnerability leverages CVE-2021-40369, where the Denounce plugin dangerously render...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28730'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jspwiki'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-28732'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:46:48Z', 'nvd_published_at': '2022-08-04T07:15:00Z'}
1.4.0
GHSA-mjvm-mhgc-q4gp
2022-08-26T19:23:16Z
2022-08-18T19:18:25Z
null
['CVE-2022-36008']
Incorrect parsing of EVM reversion exit reason in RPC
### Impact A low severity security issue was discovered affecting parsing of the RPC result of the exit reason in case of EVM reversion. In release build, this would cause the exit reason being incorrectly parsed and returned by RPC. In debug build, this would cause an overflow panic. No action is needed unless you h...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'frontier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/security/advisories/GHSA-mjvm-mhgc-q4gp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36008'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/pull/820'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/fron...
{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:18:25Z', 'nvd_published_at': '2022-08-19T21:15:00Z'}
1.4.0
GHSA-76fg-mhrg-fmmg
2022-09-02T19:14:08Z
2022-08-27T00:00:44Z
null
['CVE-2022-0084']
XNIO `notifyReadClosed` method logging message to unexpected end
A flaw was found in XNIO, specifically in the `notifyReadClosed` method. The issue revealed this method was logging a message to another expected end. This flaw allows an attacker to send flawed requests to a server, possibly causing log contention-related performance concerns or an unwanted disk fill-up. A fix for thi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.xnio:xnio-all'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.8.7.Final'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0084'}, {'type': 'WEB', 'url': 'https://github.com/xnio/xnio/pull/291'}, {'type': 'WEB', 'url': 'https://github.com/xnio/xnio/commit/fdefb3b8b715d33387cadc4d48991fb1989b0c12'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022...
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-02T19:14:08Z', 'nvd_published_at': '2022-08-26T18:15:00Z'}
1.4.0
GHSA-4h66-vghf-xg5x
2022-08-10T17:43:31Z
2022-08-03T00:00:57Z
null
['CVE-2020-7795']
get-npm-package-version Command Injection vulnerability
The package get-npm-package-version before 1.0.7 is vulnerable to Command Injection via the `main` function in index.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'get-npm-package-version'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7795'}, {'type': 'WEB', 'url': 'https://github.com/hoperyy/get-npm-package-version/commit/40b1cf31a0607ea66f9e30a0c3af1383b52b2dec'}, {'type': 'WEB', 'url': 'https://github.com/hoperyy/get-npm-package-version/commit/49459d4a3ce68587d48ffa8dead86fc9...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T17:43:31Z', 'nvd_published_at': '2022-08-02T14:15:00Z'}
1.4.0
GHSA-9qxh-258v-666c
2022-08-10T17:26:00Z
2022-08-10T17:26:00Z
null
[]
owning_ref vulnerable to multiple soundness issues
- `OwningRef::map_with_owner` is [unsound](https://github.com/Kimundi/owning-ref-rs/issues/77) and may result in a use-after-free. - `OwningRef::map` is [unsound](https://github.com/Kimundi/owning-ref-rs/issues/71) and may result in a use-after-free. - `OwningRefMut::as_owner` and `OwningRefMut::as_owner_mut` are [unso...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'owning_ref'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.4.1'}]}]}]
[{'type': 'PACKAGE', 'url': 'https://github.com/Kimundi/owning-ref-rs'}, {'type': 'WEB', 'url': 'https://github.com/noamtashma/owning-ref-unsoundness'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0040.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T17:26:00Z', 'nvd_published_at': None}
1.4.0
GHSA-h3qm-jrrf-cgj3
2023-02-09T20:23:23Z
2022-08-02T00:00:20Z
null
['CVE-2022-37315']
graphql-go has infinite recursion in the type definition parser
graphql-go (aka GraphQL for Go) through 0.8.0 has infinite recursion in the type definition parser.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/graphql-go/graphql'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.8.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37315'}, {'type': 'WEB', 'url': 'https://github.com/graphql-go/graphql/issues/637'}, {'type': 'WEB', 'url': 'https://github.com/graphql-go/graphql/pull/642'}, {'type': 'WEB', 'url': 'https://github.com/graphql-go/graphql/pull/642/commits/4188bd5b38...
{'cwe_ids': ['CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T15:43:18Z', 'nvd_published_at': '2022-08-01T22:15:00Z'}
1.4.0
GHSA-hmj3-mqgw-2fq6
2022-08-30T20:13:24Z
2022-08-17T00:00:30Z
null
['CVE-2022-36272']
Mingsoft MCMS SQL injection vulnerability in /mdiy/page/verify URI via fieldName parameter
Mingsoft MCMS 5.2.8 was discovered to contain a SQL injection vulnerability in /mdiy/page/verify URI via fieldName parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36272'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/97'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:13:24Z', 'nvd_published_at': '2022-08-16T13:15:00Z'}
1.4.0
GHSA-h28c-453m-h9xm
2022-08-30T20:20:37Z
2022-08-19T00:00:20Z
null
['CVE-2022-37422']
Path Traversal in Payara
Payara through 5.2022.2 allows directory traversal without authentication. This affects Payara Server, Payara Micro, and Payara Server Embedded.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'fish.payara.api:payara-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2022.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37422'}, {'type': 'WEB', 'url': 'https://blog.payara.fish/august-community-5-release'}]
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:20:37Z', 'nvd_published_at': '2022-08-18T19:15:00Z'}
1.4.0
GHSA-7hfp-qfw3-5jxh
2023-08-30T18:43:09Z
2022-08-30T20:52:31Z
null
['CVE-2022-36055']
Helm Vulnerable to denial of service through string value parsing
Fuzz testing, by Ada Logics and sponsored by the CNCF, identified input to functions in the `_strvals_` package that can cause an out of memory panic. Out of memory panics cannot be recovered from. Applications that use functions from the `_strvals_` package in the Helm SDK can have a Denial of Service attack when they...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'helm.sh/helm/v3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36055'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/commit/10466e3e179cc8cad4b0bb451108d3c442c69fbc'}, {'type': 'PACKAGE', 'url': 'https://git...
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:52:31Z', 'nvd_published_at': '2022-09-01T13:15:00Z'}
1.4.0
GHSA-jp3m-p26h-mm7v
2022-08-11T15:53:13Z
2022-08-05T00:00:31Z
null
['CVE-2022-34158']
Apache JSPWiki CSRF due to crafted invocation on the Image plugin
A carefully crafted invocation on the Image plugin could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow a group privilege escalation of the attacker's account. Further examination of this issue established that it could also be used to modify the email associated with the attacked acco...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34158'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jspwiki'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-34158'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:53:13Z', 'nvd_published_at': '2022-08-04T07:15:00Z'}
1.4.0
GHSA-cf6r-q678-f2p7
2022-08-16T19:33:55Z
2022-08-12T00:01:25Z
null
['CVE-2022-2777']
Microweber's title parameter in the body of POST request vulnerable to stored XSS
In Microweber prior to v1.3.1, the title parameter in the body of POST request when creating/editing a category is vulnerable to stored cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2777'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/60eef7494211d1c458228c321e986edeaa401a58'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-12T15:30:00Z', 'nvd_published_at': '2022-08-11T11:15:00Z'}
1.4.0
GHSA-6gjm-6wj6-4px5
2022-08-06T05:20:52Z
2022-08-06T05:20:52Z
null
['CVE-2022-35921']
Byobu user preference to prevent private discussions being started are not respected
### Impact Users electing to prevent others starting private discussions with themselves. > Please note that admins and others with appropriate permissions can always bypass this preference, as was the case before. ### Patches Users of Byobu should update the extension to version 1.1.7, where this has been patched. *...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'fof/byobu'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0-beta.2'}, {'fixed': '1.1.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/FriendsOfFlarum/byobu/security/advisories/GHSA-6gjm-6wj6-4px5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35921'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfFlarum/byobu/commit/23dcf93a30f948d30c678a96681f7fdefeba5171'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-269', 'CWE-863'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:20:52Z', 'nvd_published_at': '2022-08-01T22:15:00Z'}
1.4.0
GHSA-mj5w-w588-j6xg
2022-08-30T20:19:47Z
2022-08-19T00:00:16Z
null
['CVE-2022-35540']
Use of Hard-coded Credentials in AgileConfig.Client
Hardcoded JWT Secret in AgileConfig <1.6.8 Server allows remote attackers to use the generated JWT token to gain administrator access.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'AgileConfig.Client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35540'}, {'type': 'WEB', 'url': 'https://github.com/dotnetcore/AgileConfig/issues/91'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnetcore/AgileConfig'}]
{'cwe_ids': ['CWE-798'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:19:47Z', 'nvd_published_at': '2022-08-18T23:15:00Z'}
1.4.0
GHSA-w88m-2936-rmxr
2022-09-02T21:13:13Z
2022-08-27T00:00:45Z
null
['CVE-2021-3644']
wildfly-core allows user with access to management interface to access vault expression, retrieve item from vault
A flaw was found in wildfly-core in all versions. If a vault expression is in the form of a single attribute that contains multiple expressions, a user who was granted access to the management interface can potentially access a vault expression they should not be able to access and possibly retrieve the item which was ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.core:wildfly-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '16.0.1.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.core:wildfly-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '17.0....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3644'}, {'type': 'WEB', 'url': 'https://github.com/wildfly/wildfly-core/pull/4668'}, {'type': 'WEB', 'url': 'https://github.com/wildfly/wildfly-core/commit/06dd9884f6ba50470b1fb5a35198a8784f037714'}, {'type': 'WEB', 'url': 'https://github.com/wildf...
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-02T21:13:13Z', 'nvd_published_at': '2022-08-26T16:15:00Z'}
1.4.0
GHSA-4mmh-5vw7-rgvj
2022-08-18T19:07:58Z
2022-08-18T19:07:58Z
null
['CVE-2022-36007']
Venice vulnerable to Partial Path Traversal issue within the functions `load-file` and `load-resource`
### Impact A partial path traversal issue exists within the functions `load-file` and `load-resource`. These functions can be limited to load files from a list of load paths. Assuming Venice has been configured with the load paths: `[ "/Users/foo/resources" ]` When passing **relative** paths to these two vulnerable ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.github.jlangch:venice'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.17'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.16'}}]
[{'type': 'WEB', 'url': 'https://github.com/jlangch/venice/security/advisories/GHSA-4mmh-5vw7-rgvj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36007'}, {'type': 'WEB', 'url': 'https://github.com/jlangch/venice/commit/215ae91bb964013b0a2d70718a692832d561ae0a'}, {'type': 'WEB', 'url': 'https...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:07:58Z', 'nvd_published_at': '2022-08-15T11:21:00Z'}
1.4.0
GHSA-v78c-4p63-2j6c
2022-08-30T20:28:43Z
2022-08-30T20:28:43Z
null
[]
Cleartext Transmission of Sensitive Information in moment-timezone
### Impact * if Alice uses `grunt data` (or `grunt release`) to prepare a custom-build, moment-timezone with the latest tzdata from IANA's website * and Mallory intercepts the request to IANA's unencrypted ftp server, Mallory can serve data which might exploit further stages of the moment-timezone tzdata pipeline, or ...
[]
[{'package': {'ecosystem': 'npm', 'name': 'moment-timezone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'fixed': '0.5.35'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/moment/moment-timezone/security/advisories/GHSA-v78c-4p63-2j6c'}, {'type': 'WEB', 'url': 'https://github.com/moment/moment-timezone/commit/7915ac567ab19700e44ad6b5d8ef0b85e48a9e75'}, {'type': 'PACKAGE', 'url': 'https://github.com/moment/moment-timezone'}]
{'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:28:43Z', 'nvd_published_at': None}
1.4.0
GHSA-33wh-w4m7-c6r8
2022-08-15T20:00:28Z
2022-08-11T21:18:31Z
null
['CVE-2022-35956']
update_by_case before 0.1.3 can be vulnerable to sql injection
Before version 0.1.3 `update_by_case` gem used custom sql strings, and it was not sanitized, making it vulnerable to sql injection. Upgrade to version >= 0.1.3 that uses `Arel` instead to construct the resulting sql statement, with sanitized sql.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'update_by_case'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/camilova/activerecord-update-by-case/security/advisories/GHSA-33wh-w4m7-c6r8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35956'}, {'type': 'PACKAGE', 'url': 'https://github.com/camilova/activerecord-update-by-case'}, {'type': 'WEB', 'url': 'https...
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T21:18:31Z', 'nvd_published_at': '2022-08-12T21:15:00Z'}
1.4.0
GHSA-3rq8-h3gj-r5c6
2022-08-31T20:09:21Z
2022-08-30T19:32:29Z
null
['CVE-2022-29117']
.NET Denial of Service Vulnerability
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0 and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in .NET 6.0, .NET 5.0 and .NET core 3.1 wh...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.24'}}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.Owin.Secur...
[{'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-3rq8-h3gj-r5c6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29117'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/aspnetcore'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/li...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T19:32:29Z', 'nvd_published_at': '2022-05-10T21:15:00Z'}
1.4.0
GHSA-pm55-qfxr-h247
2022-08-31T18:47:40Z
2022-08-19T00:00:16Z
null
['CVE-2020-36599']
OmniAuth's `lib/omniauth/failure_endpoint.rb` does not escape `message_key` value
lib/omniauth/failure_endpoint.rb in OmniAuth before 1.9.2 (and before 2.0) does not escape the message_key value.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'omniauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'omniauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0.pre.rc1'}, {'fixed': '2.0.0'}]}], 'versions': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36599'}, {'type': 'WEB', 'url': 'https://github.com/omniauth/omniauth/commit/43a396f181ef7d0ed2ec8291c939c95e3ed3ff00#diff-575abda9deb9b1a77bf534e898a923029b9a61e991d626db88dc6e8b34260aa2'}, {'type': 'PACKAGE', 'url': 'https://github.com/omniauth/o...
{'cwe_ids': ['CWE-116'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-31T18:47:40Z', 'nvd_published_at': '2022-08-18T23:15:00Z'}
1.4.0
GHSA-3mc7-4q67-w48m
2022-09-09T17:53:43Z
2022-08-31T00:00:24Z
null
['CVE-2022-25857']
Uncontrolled Resource Consumption in snakeyaml
The package org.yaml:snakeyaml from 0 and before 1.31 are vulnerable to Denial of Service (DoS) due missing to nested depth limitation for collections.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.yaml:snakeyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.31'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25857'}, {'type': 'WEB', 'url': 'https://github.com/snakeyaml/snakeyaml/commit/fc300780da21f4bb92c148bc90257201220cf174'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/commits/fc300780da21f4bb92c148bc90257201220cf174'}, {'type'...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-09T17:53:43Z', 'nvd_published_at': '2022-08-30T05:15:00Z'}
1.4.0
GHSA-5w5x-q9p5-9qg3
2023-09-01T21:55:17Z
2022-08-16T00:00:31Z
null
['CVE-2022-2822']
OctoPrint does not have rate limiting on the login page
OctoPrint 1.7.3 and prior does not have rate limiting on the login page, making it possible for attackers to attempt brute force attacks. The severity of this issue is limited by OctoPrint normally running in a restricted LAN. The `devel` and `maintenance` branches of the repository have a fix that limits the rate of f...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'OctoPrint'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2822'}, {'type': 'WEB', 'url': 'https://github.com/octoprint/octoprint/commit/82c892ba40b3741d1b7711d949e56af64f5bc2de'}, {'type': 'PACKAGE', 'url': 'https://github.com/octoprint/octoprint'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6369f...
{'cwe_ids': ['CWE-307'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:18:01Z', 'nvd_published_at': '2022-08-15T11:21:00Z'}
1.4.0
GHSA-4m2g-668v-jwjx
2022-08-30T20:33:35Z
2022-08-19T00:00:20Z
null
['CVE-2022-35174']
Cross site scripting in getkirby/starterkit
A stored cross-site scripting (XSS) vulnerability in Kirby's Starterkit v3.7.0.2 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Tags field.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/starterkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.7.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35174'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/starterkit'}, {'type': 'WEB', 'url': 'https://owasp.org/www-community/attacks/xss/'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=0lngc_zPTSg'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:33:35Z', 'nvd_published_at': '2022-08-18T18:15:00Z'}
1.4.0
GHSA-cv6r-h2fm-pvrp
2022-08-30T20:48:53Z
2022-08-24T00:00:29Z
null
['CVE-2022-35278']
HTML Injection in ActiveMQ Artemis Web Console
In Apache ActiveMQ Artemis prior to 2.24.0, an attacker could show malicious content and/or redirect users to a malicious URL in the web console by using HTML in the name of an address or queue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:artemis-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.24.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35278'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/bh6y81wtotg75337bpvxcjy436zfgf3n'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221209-0005/'}]
{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:48:53Z', 'nvd_published_at': '2022-08-23T15:15:00Z'}
1.4.0
GHSA-5rf4-f24c-hpvh
2022-08-30T20:49:09Z
2022-08-24T00:00:29Z
null
['CVE-2022-37199']
SQL injection in jflyfox jfinal
JFinal CMS 5.1.0 is vulnerable to SQL Injection via /jfinal_cms/system/user/list.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.jflyfox:jflyfox_jfinal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37199'}, {'type': 'WEB', 'url': 'https://github.com/jflyfox/jfinal_cms/issues/48'}, {'type': 'PACKAGE', 'url': 'https://github.com/jflyfox/jfinal_cms'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:49:09Z', 'nvd_published_at': '2022-08-23T13:15:00Z'}
1.4.0
GHSA-vqc4-v8hc-h2jg
2022-09-08T14:11:35Z
2022-08-31T22:23:39Z
null
['CVE-2022-36034']
Polynomial regular expression used on uncontrolled data in nitrado.js
### Impact Possible ReDoS with lib input of `{{` and with many repetitions of `{{|` ### Patches Patched in all versions above `0.2.5` ### Workarounds No known work arounds. ### References - OWASP: [Regular expression Denial of Service - ReDoS](https://www.owasp.org/index.php/Regular_expression_Denial_of_Service_-_Re...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'nitrado.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cainthebest/nitrado.js/security/advisories/GHSA-vqc4-v8hc-h2jg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36034'}, {'type': 'PACKAGE', 'url': 'https://github.com/cainthebest/nitrado.js'}, {'type': 'WEB', 'url': 'https://github.com/cainthebest/ni...
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-31T22:23:39Z', 'nvd_published_at': '2022-08-29T17:15:00Z'}
1.4.0
GHSA-hrx5-cv4v-4c44
2022-08-30T20:18:01Z
2022-08-18T00:00:19Z
null
['CVE-2022-2871']
NotrinosERP Cross-site Scripting vulnerability
NotrinosERP version 0.7 and prior is vulnerable to stored cross-site scripting. A fix is available on the `master` branch of the repository.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'notrinos/notrinos-erp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2871'}, {'type': 'WEB', 'url': 'https://github.com/notrinos/notrinoserp/commit/0362778f4f678156c22a009094225823df8a4760'}, {'type': 'PACKAGE', 'url': 'https://github.com/notrinos/notrinoserp'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/611...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:18:01Z', 'nvd_published_at': '2022-08-17T09:15:00Z'}
1.4.0
GHSA-w83m-rghh-frxj
2022-08-30T20:42:30Z
2022-08-23T00:00:19Z
null
['CVE-2022-1340']
Cross site scripting in yetiforce/yetiforce-crm
Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1340'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/2c14baaf8dbc7fd82d5c585f2fa0c23528450618'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:42:30Z', 'nvd_published_at': '2022-08-22T12:15:00Z'}
1.4.0
GHSA-x5cw-843f-r366
2022-09-16T19:27:37Z
2022-08-31T00:00:24Z
null
['CVE-2022-25646']
x-data-spreadsheet through 1.1.9 vulnerable to Cross-site Scripting
All versions of package x-data-spreadsheet are vulnerable to Cross-site Scripting (XSS) due to missing sanitization of values inserted into the cells.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'x-data-spreadsheet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25646'}, {'type': 'WEB', 'url': 'https://github.com/myliang/x-spreadsheet/issues/580'}, {'type': 'PACKAGE', 'url': 'https://github.com/myliang/x-spreadsheet'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-XDATASPREADSHEET-2430381'}...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:27:37Z', 'nvd_published_at': '2022-08-30T05:15:00Z'}
1.4.0
GHSA-44w5-q257-8428
2022-08-30T20:49:50Z
2022-08-22T00:00:52Z
null
['CVE-2022-2921']
Exposure of password hashes in notrinos/notrinos-erp
The AP officers account is authorized to Backup and Restore the Database, Due to this he/she can download the backup and see the password hash of the System Administrator account, The weak hash (MD5) of the password can be easily cracked and get the admin password.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'notrinos/notrinos-erp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2921'}, {'type': 'WEB', 'url': 'https://github.com/notrinos/notrinoserp/commit/1b9903f4deea3289872793e60d730c63ecbf7b45'}, {'type': 'PACKAGE', 'url': 'https://github.com/notrinos/NotrinosERP'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/51b...
{'cwe_ids': ['CWE-359'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:49:50Z', 'nvd_published_at': '2022-08-21T04:15:00Z'}
1.4.0
GHSA-mpwp-pf96-9g4r
2022-08-11T18:02:03Z
2022-08-03T00:00:57Z
null
['CVE-2020-28453']
npos-tesseract Command Injection vulnerability
A command injection vulnerability affects all versions of package npos-tesseract. The injection point is located in line 55 in lib/ocr.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'npos-tesseract'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28453'}, {'type': 'PACKAGE', 'url': 'https://github.com/taoyuan/npos-tesseract'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-NPOSTESSERACT-1051031'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T18:02:03Z', 'nvd_published_at': '2022-08-02T14:15:00Z'}
1.4.0
GHSA-8cwq-4cmf-px73
2022-08-18T19:19:21Z
2022-08-18T19:19:21Z
null
[]
PocketMine-MP invalid skin geometry JSON data leading to server crash
### Impact `pocketmine\entity\Skin` doesn't correctly handle errors produced by `adhocore/json-comment`, which throws `RuntimeException` rather than returning `false` as PocketMine-MP expects. This leads to a server crash if the skin geometry data is invalid for some reason (e.g. a syntax error). ### Patches c9626c61...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-8cwq-4cmf-px73'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/c9626c610b8f6810c8c987559c9197b2a291f0bb'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:19:21Z', 'nvd_published_at': None}
1.4.0
GHSA-4696-g7jj-xg2h
2022-11-22T00:03:50Z
2022-08-17T00:00:33Z
null
['CVE-2022-38216']
Mapbox is vulnerable to Integer Overflow
An integer overflow exists in Mapbox's closed source gl-native library prior to version 10.6.1, which is bundled with multiple Mapbox products including open source libraries. The overflow is caused by large image height and width values when creating a new Image and allows for out of bounds writes, potentially crashin...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.mapbox.mapboxsdk:mapbox-android-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38216'}, {'type': 'PACKAGE', 'url': 'https://github.com/mapbox/mapbox-maps-android'}, {'type': 'WEB', 'url': 'https://github.com/mapbox/mapbox-maps-android/releases/tag/android-v10.6.1'}]
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-22T00:03:50Z', 'nvd_published_at': '2022-08-16T01:15:00Z'}
1.4.0
GHSA-6955-67hm-vjjq
2023-05-10T00:36:31Z
2022-08-06T09:33:38Z
null
['CVE-2022-25277']
Drupal core arbitrary PHP code execution
Drupal core sanitizes filenames with dangerous extensions upon upload and strips leading and trailing dots from filenames to prevent uploading server configuration files. However, the protections for these two vulnerabilities previously did not work correctly together. As a result, if the site were configured to allow...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '9.3.19'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.4.0'}, {'fixed': '9.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25277'}, {'type': 'WEB', 'url': 'https://github.com/drupal/core/commit/1cd1830d79f221cc8490f53c2bb487dd07094f17'}, {'type': 'WEB', 'url': 'https://github.com/drupal/core/commit/5d464ea4407c50e40dcf6cb5ee376e7b8dd36f3a'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:33:38Z', 'nvd_published_at': None}
1.4.0
GHSA-qwp3-5fw3-5wgv
2022-08-30T20:19:35Z
2022-08-20T00:00:39Z
null
['CVE-2022-35909']
Incorrect Access Control and Cross Site Scripting in Jellyfin
In Jellyfin before 10.8, the /users endpoint has incorrect access control for admin functionality. This lack of access control can be leveraged to performe a cross site scripting attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Jellyfin.Common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35909'}, {'type': 'WEB', 'url': 'https://github.com/jellyfin/jellyfin/pull/7569/files'}, {'type': 'WEB', 'url': 'https://docs.google.com/document/d/1cBXQrokCvWxKET4BKi3ZLtVp5gst6-MrGPgMKpfXw8Y/edit'}, {'type': 'PACKAGE', 'url': 'https://github.com/...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:19:35Z', 'nvd_published_at': '2022-08-19T13:15:00Z'}
1.4.0
GHSA-mfpj-3qhm-976m
2022-09-30T02:21:34Z
2022-08-24T00:00:31Z
null
['CVE-2022-25304']
Uncontrolled Resource Consumption in asyncua and opcua
All versions of package opcua; all versions of package asyncua are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'asyncua'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.96'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.95'}}, {'package': {'ecosystem': 'PyPI', 'name': 'opcua'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25304'}, {'type': 'WEB', 'url': 'https://github.com/FreeOpcUa/python-opcua/issues/1466'}, {'type': 'WEB', 'url': 'https://github.com/FreeOpcUa/opcua-asyncio/commit/01c7acf047887b62d979cd4373d370e72a4b9057'}, {'type': 'PACKAGE', 'url': 'https://gith...
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:50:07Z', 'nvd_published_at': '2022-08-23T05:15:00Z'}
1.4.0
GHSA-hgxq-hcrm-c5pm
2022-09-01T22:23:05Z
2022-08-25T00:00:29Z
null
['CVE-2022-25903']
opcua Vulnerable to Out-of-bounds Write
The package opcua from 0.0.0 until 0.11.0 is vulnerable to Denial of Service (DoS) via the ExtensionObjects and Variants objects, when it allows unlimited nesting levels, which could result in a stack overflow even if the message size is less than the maximum allowed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'opcua'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25903'}, {'type': 'WEB', 'url': 'https://github.com/locka99/opcua/pull/216'}, {'type': 'WEB', 'url': 'https://github.com/locka99/opcua/pull/216/commits/e75dada28a40c3fefc4aeee4cdc272e1b748f8dd'}, {'type': 'PACKAGE', 'url': 'https://github.com/locka...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:23:05Z', 'nvd_published_at': '2022-08-24T05:15:00Z'}
1.4.0
GHSA-9j3m-g383-29qr
2022-08-14T00:25:11Z
2022-08-14T00:25:11Z
null
['CVE-2022-35916']
OpenZeppelin Contracts's Cross chain utilities for Arbitrum L2 see EOA calls as cross chain calls
### Impact Contracts using the cross chain utilies for Arbitrum L2, `CrossChainEnabledArbitrumL2` or `LibArbitrumL2`, will classify direct interactions of externally owned accounts (EOAs) as cross chain calls, even though they are not started on L1. This is assessed as low severity because any action taken by an EOA o...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed': '4.7.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.6.0'}, {'fixed...
[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-9j3m-g383-29qr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35916'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3578'}, {'type': 'PACKAGE', 'url'...
{'cwe_ids': ['CWE-669'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-14T00:25:11Z', 'nvd_published_at': '2022-08-01T21:15:00Z'}
1.4.0
GHSA-7qqq-gh2f-wq76
2022-08-15T20:13:34Z
2022-08-10T00:00:31Z
null
['CVE-2022-25907']
ts-deepmerge before 2.0.2 vulnerable to Prototype Pollution
The package ts-deepmerge before version 2.0.2 is vulnerable to Prototype Pollution due to missing sanitization of the `merge` function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ts-deepmerge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25907'}, {'type': 'WEB', 'url': 'https://github.com/voodoocreation/ts-deepmerge/commit/9be5148773343c57be9de39728d6ead18eddf10b'}, {'type': 'PACKAGE', 'url': 'https://github.com/voodoocreation/ts-deepmerge'}, {'type': 'WEB', 'url': 'https://github....
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T18:13:21Z', 'nvd_published_at': '2022-08-09T05:15:00Z'}
1.4.0
GHSA-qpq9-jpv4-6gwr
2022-11-23T18:46:31Z
2022-08-27T00:00:45Z
null
['CVE-2021-3632']
Keycloak allows anyone to register new security device or key for any user by using WebAuthn password-less login flow
A flaw was found in Keycloak. This vulnerability allows anyone to register a new security device or key when there is not a device already registered for any user by using the WebAuthn password-less login flow.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3632'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/pull/8203'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/65480cb5a11630909c086f79d396004499fbd1e4'}, {'type': 'WEB', 'url': 'https://access.redhat.com/secu...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-02T19:35:29Z', 'nvd_published_at': '2022-08-26T16:15:00Z'}
1.4.0
GHSA-pcjh-6r5h-r92r
2022-08-11T18:12:35Z
2022-08-11T18:12:35Z
null
[]
django-sendfile2 before 0.7.0 contains reflected file download vulnerability
Similar to CVE-2022-36359 for Django, django-sendfile2 did not protect against a reflected file download attack in version 0.6.1 and earlier. If the file name used by django-sendfile2 was derived from user input, then it would be possible to perform a such an attack. A new version of django-sendfile2 will be released. ...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'django-sendfile2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/moggers87/django-sendfile2/security/advisories/GHSA-pcjh-6r5h-r92r'}, {'type': 'WEB', 'url': 'https://github.com/moggers87/django-sendfile2/commit/4c370859023292e3715200a57843f86c5ef3cd77'}, {'type': 'PACKAGE', 'url': 'https://github.com/moggers87/django-sendfile2'}, {'type':...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T18:12:35Z', 'nvd_published_at': None}
1.4.0
GHSA-qrqq-9c63-xfrg
2022-08-11T15:36:42Z
2022-08-11T15:36:42Z
null
[]
tower-http's improper validation of Windows paths could lead to directory traversal attack
`tower_http::services::fs::ServeDir` didn't correctly validate Windows paths, meaning paths like `/foo/bar/c:/windows/web/screen/img101.png` would be allowed and respond with the contents of `c:/windows/web/screen/img101.png`. Thus users could potentially read files anywhere on the filesystem. This only impacts Window...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'tower-http'}, 'ecosystem_specific': {'affected_functions': ['tower_http::services::fs::ServeDir']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.2.1'}]}], 'versions': ['0.2.0']}, {'package': {'ecosystem': 'crates.io', 'name': 'tower-h...
[{'type': 'WEB', 'url': 'https://github.com/tower-rs/tower-http/pull/204'}, {'type': 'PACKAGE', 'url': 'https://github.com/tower-rs/tower-http'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0043.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:36:42Z', 'nvd_published_at': None}
1.4.0
GHSA-rvgm-35jw-q628
2022-09-08T14:12:04Z
2022-08-31T22:26:11Z
null
['CVE-2022-36036']
Improper Control of Generation of Code ('Code Injection') in mdx-mermaid
### Impact Arbitary javascript injection Modify any mermaid code blocks with the following code and the code inside will execute when the component is loaded by MDXjs ``` ` + (function () { // Put Javascript code here return '' }()) + ` ``` The block below shows a valid mermaid code block ````md ```mermaid gra...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mdx-mermaid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mdx-mermaid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-rc1'}, {'fixed': '2.0.0-rc2'}]}], 'versions': ['2....
[{'type': 'WEB', 'url': 'https://github.com/sjwall/mdx-mermaid/security/advisories/GHSA-rvgm-35jw-q628'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36036'}, {'type': 'WEB', 'url': 'https://github.com/sjwall/mdx-mermaid/commit/f2b99386660fd13316823529c3f1314ebbcdfd2a'}, {'type': 'PACKAGE', '...
{'cwe_ids': ['CWE-94'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-08-31T22:26:11Z', 'nvd_published_at': '2022-08-29T18:15:00Z'}
1.4.0
GHSA-xh3v-6f9j-wxw3
2023-05-09T16:17:47Z
2022-08-06T05:31:26Z
null
['CVE-2022-25275']
Drupal core Information Disclosure vulnerability
In some situations, the Image module does not correctly check access to image files not stored in the standard public files directory when generating derivative images using the image styles system. Access to a non-public file is checked only if it is stored in the "private" file system. However, some contributed modu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.91'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'drupal/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '9.3.19'}]}]}, {'packa...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25275'}, {'type': 'WEB', 'url': 'https://github.com/drupal/core/commit/2d5f47fc8a166115f56c2330a81e83abe22445cf'}, {'type': 'WEB', 'url': 'https://github.com/drupal/core/commit/e2fbf63700819cb470a1be425798f1a3f2020116'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:31:26Z', 'nvd_published_at': None}
1.4.0
GHSA-f772-66g8-q5h3
2023-01-19T01:01:59Z
2022-08-18T19:02:56Z
null
['CVE-2022-35948']
Nodejs ‘undici’ vulnerable to CRLF Injection via Content-Type
### Impact `=< undici@5.8.0` users are vulnerable to _CRLF Injection_ on headers when using unsanitized input as request headers, more specifically, inside the `content-type` header. Example: ``` import { request } from 'undici' const unsanitizedContentTypeInput = 'application/json\r\n\r\nGET /foo2 HTTP/1.1' awai...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'undici'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.8.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/nodejs/undici/security/advisories/GHSA-f772-66g8-q5h3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35948'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/undici/commit/66165d604fd0aee70a93ed5c44ad4cc2df395f80'}, {'type': 'PACKAGE', 'url': 'htt...
{'cwe_ids': ['CWE-74', 'CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:02:56Z', 'nvd_published_at': '2022-08-15T11:21:00Z'}
1.4.0
GHSA-772j-xvf9-qpf5
2022-09-01T22:17:50Z
2022-08-24T00:00:29Z
null
['CVE-2021-3702']
ansible-runner 2.0.0 vulnerable to Race Condition
A race condition flaw was found in ansible-runner, where an attacker could watch for rapid creation and deletion of a temporary directory, substitute their directory at that name, and then have access to ansible-runner's private_data_dir the next time ansible-runner made use of the private_data_dir. The highest Threat ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible-runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3702'}, {'type': 'PACKAGE', 'url': 'https://github.com/ansible/ansible-runner/pull/742'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible-runner/pull/742/commits'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible-runner/commit...
{'cwe_ids': ['CWE-362', 'CWE-377'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:17:50Z', 'nvd_published_at': '2022-08-23T16:15:00Z'}
1.4.0
GHSA-9jmq-rx5f-8jwq
2023-06-06T17:24:12Z
2022-08-10T17:51:53Z
null
['CVE-2021-32862']
nbconvert vulnerable to cross-site scripting (XSS) via multiple exploit paths
Cross-linking to https://github.com/jupyter/nbviewer/security/advisories/GHSA-h274-fcvj-h2wm Most of the fixes will be in this repo, though, so having it here gives us the private fork to work on patches Below is currently a duplicate of the original report: ---- Received on security@ipython.org unedited, I'm not s...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'nbconvert'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.5.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jupyter/nbconvert/security/advisories/GHSA-9jmq-rx5f-8jwq'}, {'type': 'WEB', 'url': 'https://github.com/jupyter/nbviewer/security/advisories/GHSA-h274-fcvj-h2wm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32862'}, {'type': 'PACKAGE', 'url': 'http...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T17:51:53Z', 'nvd_published_at': '2022-08-18T19:15:00Z'}
1.4.0
GHSA-7qq9-9g2w-56f9
2022-08-30T20:42:16Z
2022-08-20T00:00:30Z
null
['CVE-2022-36157']
Improper Privilege Management in com.xuxueli:xxl-job
XXL-JOB all versions as of 11 July 2022 are vulnerable to Insecure Permissions resulting in the ability to execute admin function with low Privilege account.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-job'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36157'}, {'type': 'WEB', 'url': 'https://github.com/Richard-Muzi/vulnerability/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-job/'}]
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:42:16Z', 'nvd_published_at': '2022-08-19T22:15:00Z'}
1.4.0
GHSA-w3rc-2whg-w934
2022-08-30T19:56:06Z
2022-08-17T00:00:30Z
null
['CVE-2022-36599']
Mingsoft MCMS SQL injection vulnerability in /mdiy/model/delete URI via models List
Mingsoft MCMS 5.2.8 was discovered to contain a SQL injection vulnerability in /mdiy/model/delete URI via models Lists.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36599'}, {'type': 'PACKAGE', 'url': 'https://gitee.com/mingSoft/MCMS'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I5I1P5'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T19:56:06Z', 'nvd_published_at': '2022-08-16T13:15:00Z'}
1.4.0
GHSA-8449-7gc2-pwrp
2022-09-08T14:07:19Z
2022-08-18T00:00:17Z
null
['CVE-2022-38149']
HashiCorp Consul Template could reveal Vault secret contents in error messages
In HashiCorp Consul Template through version 0.29.1, invalid templates could inadvertently reveal the contents of Vault secret in errors returned by the `*template.Template.Execute 5` method, when given a template using Vault secret contents incorrectly. This method has been updated to redact Vault secrets when creatin...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul-template'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.27.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul-template'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.28.0'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38149'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul-template/commit/d6a6f4af219c28e67d847ba0e0b2bea8f5bb9076'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hsec-2022-16-consul-template-may-expose-vault-secrets-when-proc...
{'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:17:03Z', 'nvd_published_at': '2022-08-17T15:15:00Z'}
1.4.0
GHSA-j3rv-w43q-f9x2
2022-08-18T19:15:28Z
2022-08-18T19:15:28Z
null
['CVE-2022-36010']
React Editable Json Tree vulnerable to arbitrary code execution via function parsing
### Impact Our library allows strings to be parsed as functions and stored as a specialized component, [`JsonFunctionValue`](https://github.com/oxyno-zeta/react-editable-json-tree/blob/09a0ca97835b0834ad054563e2fddc6f22bc5d8c/src/components/JsonFunctionValue.js). To do this, Javascript's [`eval`](https://developer.mozi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'react-editable-json-tree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/oxyno-zeta/react-editable-json-tree/security/advisories/GHSA-j3rv-w43q-f9x2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36010'}, {'type': 'PACKAGE', 'url': 'https://github.com/oxyno-zeta/react-editable-json-tree'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:15:28Z', 'nvd_published_at': '2022-08-15T19:15:00Z'}
1.4.0
GHSA-wff4-fpwg-qqv3
2022-09-08T14:17:38Z
2022-08-30T20:38:34Z
null
['CVE-2022-36046']
Unexpected server crash in Next.js
### Impact When specific requests are made to the Next.js server it can cause an `unhandledRejection` in the server which can crash the process to exit in specific Node.js versions with strict `unhandledRejection` handling. - Affected: All of the following must be true to be affected by this CVE - Node.js version ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'next'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.2.3'}, {'fixed': '12.2.4'}]}], 'versions': ['12.2.3']}]
[{'type': 'WEB', 'url': 'https://github.com/vercel/next.js/security/advisories/GHSA-wff4-fpwg-qqv3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36046'}, {'type': 'WEB', 'url': 'https://github.com/vercel/next.js/releases/tag/v12.2.4'}]
{'cwe_ids': ['CWE-248', 'CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:38:34Z', 'nvd_published_at': '2022-08-31T19:15:00Z'}
1.4.0
GHSA-39gf-864w-pxw4
2022-08-30T20:25:13Z
2022-08-23T00:00:19Z
null
['CVE-2022-2930']
Unverified Password Change in OctoPrint
Versions of OctoPrint prior to 1.8.3 did not require the current user password in order to change that users password. As a result users could be locked out of their accounts or have their accounts stolen under certain circumstances.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'OctoPrint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2930'}, {'type': 'WEB', 'url': 'https://github.com/octoprint/octoprint/commit/1453076ee3e47fcab2dc73664ec2d61d3ef7fc4f'}, {'type': 'PACKAGE', 'url': 'https://github.com/octoprint/octoprint'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/da674...
{'cwe_ids': ['CWE-620'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:25:13Z', 'nvd_published_at': '2022-08-22T12:15:00Z'}
1.4.0
GHSA-vp56-6g26-6827
2022-08-04T17:37:24Z
2022-08-02T00:00:25Z
null
['CVE-2022-2596']
node-fetch Inefficient Regular Expression Complexity
[node-fetch](https://www.npmjs.com/package/node-fetch) is a light-weight module that brings window.fetch to node.js. Affected versions of this package are vulnerable to Regular Expression Denial of Service (ReDoS) in the `isOriginPotentiallyTrustworthy()` function in `referrer.js`, when processing a URL string with al...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-fetch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.2.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2596'}, {'type': 'WEB', 'url': 'https://github.com/node-fetch/node-fetch/pull/1611'}, {'type': 'WEB', 'url': 'https://github.com/node-fetch/node-fetch/commit/28802387292baee467e042e168d92597b5bbbe3d'}, {'type': 'PACKAGE', 'url': 'https://github.com...
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-04T17:37:24Z', 'nvd_published_at': '2022-08-01T15:15:00Z'}
1.4.0
GHSA-fcg8-mg9g-6hc4
2022-08-30T19:35:52Z
2022-08-30T19:35:52Z
null
['CVE-2022-29145']
.NET Denial of Service Vulnerability
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET 6.0, .NET 5.0 and .NET Core 3.1. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A vulnerability exists in .NET 6.0, .NET 5.0 and .NET core 3.1 wh...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.1.25'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'int...
[{'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-fcg8-mg9g-6hc4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-29145'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXQL7EZORGU4PZC...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T19:35:52Z', 'nvd_published_at': '2022-05-10T21:15:00Z'}
1.4.0
GHSA-jp45-65jw-94mj
2022-08-10T17:54:26Z
2022-08-03T00:00:57Z
null
['CVE-2020-28437']
heroku-env susceptible to command injection
A command injection vulnerability affects all versions of package heroku-env. The injection point is located in lib/get.js which is required by index.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'heroku-env'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28437'}, {'type': 'PACKAGE', 'url': 'https://github.com/brianc/node-heroku-env'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-HEROKUENV-1050432'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T17:54:26Z', 'nvd_published_at': '2022-08-02T14:15:00Z'}