schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-6xf3-5hp7-xqqg | 2022-09-27T08:28:17Z | 2022-08-25T00:00:28Z | null | ['CVE-2022-36633'] | Improper token validation leading to code execution in Teleport | Teleport 9.3.6 is vulnerable to Command injection leading to Remote Code Execution. An attacker can craft a malicious ssh agent installation link by URL encoding a bash escape with carriage return line feed. This url encoded payload can be used in place of a token and sent to a user in a social engineering attack. This... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/gravitational/teleport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.3.17'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/gravitational/teleport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fi... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36633'}, {'type': 'WEB', 'url': 'https://github.com/gravitational/teleport/pull/14726'}, {'type': 'WEB', 'url': 'https://github.com/gravitational/teleport/pull/14726/commits/46c23b9b64b944d1e82d2c8a79083f291ffdd3b6'}, {'type': 'PACKAGE', 'url': 'ht... | {'cwe_ids': ['CWE-20', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:53:54Z', 'nvd_published_at': '2022-08-24T13:15:00Z'} |
1.4.0 | GHSA-8wm5-8h9c-47pc | 2022-08-11T21:14:19Z | 2022-08-05T00:00:24Z | null | ['CVE-2022-25168'] | Apache Hadoop argument injection vulnerability | Apache Hadoop's `FileUtil.unTar(File, File)` API does not escape the input file name before being passed to the shell. An attacker can inject arbitrary commands. This is only used in Hadoop 3.3 InMemoryAliasMap.completeBootstrapTransfer, which is only ever run by a local user. It has been used in Hadoop 2.x for yarn lo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.10.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-a... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25168'}, {'type': 'WEB', 'url': 'https://github.com/apache/hadoop/commit/cae749b076f35f0be13a926ee8cfbb7ce4402746'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hadoop'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/mxqnb39jfrw... | {'cwe_ids': ['CWE-78', 'CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T21:14:19Z', 'nvd_published_at': '2022-08-04T15:15:00Z'} |
1.4.0 | GHSA-3f89-869f-5w76 | 2022-08-29T17:34:36Z | 2022-08-29T17:34:36Z | null | ['CVE-2022-36037'] | Cross-site scripting from dynamic options in the multiselect field | ### Introduction
Cross-site scripting (XSS) is a type of vulnerability that allows to execute any kind of JavaScript code inside the Panel session of the same or other users. In the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim.
Such vulnerabilities are cri... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.8.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-3f89-869f-5w76'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36037'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/commit/b5b8863885e17556abc070dde1e20aec15fbfdf5'}, {'type': 'PACKAGE', 'url': 'h... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-29T17:34:36Z', 'nvd_published_at': '2022-08-29T18:15:00Z'} |
1.4.0 | GHSA-77qm-wvqq-fg79 | 2022-08-30T20:18:48Z | 2022-08-30T20:18:48Z | null | ['CVE-2022-36031'] | Directus vulnerable to unhandled exception on illegal filename_disk value | The Directus process can be aborted by having an authorized user update the `filename_disk` value to a folder and accessing that file through the `/assets` endpoint.
The vulnerability is patched and released in v9.15.0.
You can prevent this problem by making sure no (untrusted) non-admin users have permissions to up... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'directus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.15.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/directus/directus/security/advisories/GHSA-77qm-wvqq-fg79'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36031'}, {'type': 'PACKAGE', 'url': 'https://github.com/directus/directus'}] | {'cwe_ids': ['CWE-755'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:18:48Z', 'nvd_published_at': '2022-08-19T21:15:00Z'} |
1.4.0 | GHSA-qpgc-xh7j-52q8 | 2022-09-01T22:19:48Z | 2022-08-24T00:00:31Z | null | ['CVE-2022-25231'] | node-opcua DoS vulnerability via message with memory allocation that exceeds v8's memory limit | The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) by sending a specifically crafted OPC UA message with a special OPC UA NodeID, when the requested memory allocation exceeds the v8’s memory limit. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-opcua'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.74.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25231'}, {'type': 'WEB', 'url': 'https://github.com/node-opcua/node-opcua/pull/1182'}, {'type': 'WEB', 'url': 'https://github.com/node-opcua/node-opcua/commit/7b5044b3f5866fbedc3efabd05e407352c07bd2f'}, {'type': 'PACKAGE', 'url': 'https://github.co... | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:19:48Z', 'nvd_published_at': '2022-08-23T05:15:00Z'} |
1.4.0 | GHSA-jwh2-vrr9-vcp2 | 2022-08-30T19:53:54Z | 2022-08-30T19:53:54Z | null | [] | mz-avro's incorrect use of `set_len` allows for un-initialized memory | Affected versions of this crate passes an uninitialized buffer to a user-provided `Read`
implementation.
Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure)
and also can return incorrect number of bytes written to the buffer.
Reading from uninitialized memory produces undefined v... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'mz-avro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/MaterializeInc/materialize/issues/8669'}, {'type': 'PACKAGE', 'url': 'https://github.com/MaterializeInc/materialize'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0138.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T19:53:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xc4w-28g8-vqm5 | 2022-08-30T20:55:17Z | 2022-08-24T00:00:31Z | null | ['CVE-2019-25075'] | Path Traversal in Gravitee API Management | HTML injection combined with path traversal in the Email service in Gravitee API Management before 1.25.3 allows anonymous users to read arbitrary files via a /management/users/register request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.gravitee.apim:gravitee-api-management'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.25.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25075'}, {'type': 'PACKAGE', 'url': 'https://github.com/gravitee-io/gravitee-api-management'}, {'type': 'WEB', 'url': 'https://medium.com/@maxime.escourbiac/write-up-of-path-traversal-on-gravitee-io-8835941be69f'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:55:17Z', 'nvd_published_at': '2022-08-23T01:15:00Z'} |
1.4.0 | GHSA-fcpw-vqh5-6qwj | 2023-07-13T23:38:08Z | 2022-08-17T00:00:17Z | null | ['CVE-2020-14320'] | Moodle reflected XSS Vulnerability | In Moodle before 3.9.1, 3.8.4 and 3.7.7, the filter in the admin task log required extra sanitizing to prevent a reflected XSS risk. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9'}, {'fixed': '3.9.1'}]}], 'versions': ['3.9']}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8'}, {'fixed': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14320'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/c6ffe9588ebb02b73c33a09e5d8061f58acc1701'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=407392'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T23:38:08Z', 'nvd_published_at': '2022-08-16T21:15:00Z'} |
1.4.0 | GHSA-j9xq-j329-2xvg | 2022-09-16T18:35:23Z | 2022-08-27T00:00:45Z | null | ['CVE-2021-3754'] | Keycloak user may register themselves with same email ID of any existing user | A flaw was found in keycloak where an attacker is able to register himself with the username same as the email ID of any existing user. This may cause trouble in getting password recovery email in case the user forgets the password. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '19.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3754'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-3754'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1999196'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:35:23Z', 'nvd_published_at': '2022-08-26T16:15:00Z'} |
1.4.0 | GHSA-v65g-f3cj-fjp4 | 2022-08-30T20:20:59Z | 2022-08-23T00:00:13Z | null | ['CVE-2022-1930'] | Regular expression denial of service in eth-account | An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the eth-account PyPI package, when an attacker is able to supply arbitrary input to the encode_structured_data method | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'eth-account'}, 'ecosystem_specific': {'affected_functions': ['eth_account._utils.structured_data.validation.TYPE_REGEX']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1930'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/eth-account/commit/70f89be700df0d5f08ef696252c88741f8414060'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/eth-account'}, {'type': 'WEB', 'url': 'https://research.jfrog.com/vul... | {'cwe_ids': ['CWE-1333', 'CWE-697'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:20:59Z', 'nvd_published_at': '2022-08-22T19:15:00Z'} |
1.4.0 | GHSA-p74q-2pf8-j5jx | 2022-09-16T18:47:21Z | 2022-08-25T00:00:29Z | null | ['CVE-2022-37333'] | exceedone/exment and exceedone/laravel-admin SQL Injection vulnerability | SQL injection vulnerability in the Exment ((PHP8) exceedone/exment v5.0.2 and earlier and exceedone/laravel-admin v3.0.0 and earlier, (PHP7) exceedone/exment v4.4.2 and earlier and exceedone/laravel-admin v2.2.2 and earlier) allows remote authenticated attackers to execute arbitrary SQL commands. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'exceedone/exment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'exceedone/exment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.3'}]}]}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37333'}, {'type': 'WEB', 'url': 'https://exment.net/docs/#/release_note?id=v503-20220817'}, {'type': 'WEB', 'url': 'https://exment.net/docs/#/weakness/20220817'}, {'type': 'PACKAGE', 'url': 'https://github.com/exceedone/exment'}, {'type': 'WEB', 'u... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:47:21Z', 'nvd_published_at': '2022-08-24T09:15:00Z'} |
1.4.0 | GHSA-2jq9-6xx7-3h29 | 2023-06-13T22:08:06Z | 2022-08-11T18:10:52Z | null | [] | `temporary` makes use of uninitialized memory | Uninitialized memory is used as a RNG seed in temporary. This has been resolved in the 0.6.4 release. The crate is not intended to be used outside of a testing environment. For a general purpose crate to create temporary directories, [`tempfile`](https://crates.io/crates/tempfile) is an alternative for this crate.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'temporary'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.6.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/stainless-steel/temporary/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/stainless-steel/temporary'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0022.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T18:10:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-cv6j-9835-p7fh | 2022-09-20T17:10:15Z | 2022-08-28T00:00:26Z | null | ['CVE-2022-38792'] | exotel-py 0.1.6 includes code execution backdoor inserted by a third party | The exotel (aka exotel-py) package in PyPI as of 0.1.6 includes a code execution backdoor inserted by a third party. Users should downgrade to version 0.1.5 to avoid the problem. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'exotel'}, 'versions': ['0.1.6']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38792'}, {'type': 'WEB', 'url': 'https://github.com/sarathsp06/exotel-py/issues/10'}, {'type': 'WEB', 'url': 'https://github.com/jertel/elastalert2/pull/931'}, {'type': 'PACKAGE', 'url': 'https://github.com/sarathsp06/exotel-py'}, {'type': 'WEB', '... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T17:10:15Z', 'nvd_published_at': '2022-08-27T20:15:00Z'} |
1.4.0 | GHSA-xpp3-xrff-w6rh | 2022-08-12T15:31:10Z | 2022-08-12T15:31:10Z | null | [] | rocksdb vulnerable to out-of-bounds read | Affected versions of this crate called the RocksDB C API
`rocksdb_open_column_families_with_ttl()` with a pointer to a single integer
TTL value, but one TTL value for each column family is expected.
This is only relevant when using
`rocksdb::DBWithThreadMode::open_cf_descriptors_with_ttl()` with multiple
column famili... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'rocksdb'}, 'ecosystem_specific': {'affected_functions': ['rocksdb::DBWithThreadMode::open_cf_descriptors_with_ttl']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.19.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rust-rocksdb/rust-rocksdb/pull/616'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-rocksdb/rust-rocksdb'}, {'type': 'WEB', 'url': 'https://github.com/rust-rocksdb/rust-rocksdb/releases/tag/v0.19.0'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-12T15:31:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-739f-hw6h-7wq8 | 2022-08-10T18:38:16Z | 2022-08-10T18:38:16Z | null | ['CVE-2022-35930'] | PolicyController before 0.2.1 may bypass attestation verification | PolicyController will report a false positive, resulting in an admission when it should not be admitted when:
* There is at least one attestation with a valid signature
* There are NO attestations of the type being verified (--type defaults to "custom")
Users should upgrade to cosign version 0.2.1 or greater for a p... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/sigstore/policy-controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sigstore/policy-controller/security/advisories/GHSA-739f-hw6h-7wq8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35930'}, {'type': 'WEB', 'url': 'https://github.com/sigstore/policy-controller/commit/e852af36fb7d42678b21d7e97503c25bd1fd05c8'}, {'typ... | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:38:16Z', 'nvd_published_at': '2022-08-04T22:15:00Z'} |
1.4.0 | GHSA-8mx2-gqx9-rm7f | 2022-08-30T20:50:35Z | 2022-08-24T00:00:31Z | null | ['CVE-2022-25888'] | Uncontrolled Resource Consumption in opcua | The package opcua from 0.0.0 are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the F... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'opcua'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25888'}, {'type': 'WEB', 'url': 'https://github.com/locka99/opcua/pull/216'}, {'type': 'WEB', 'url': 'https://github.com/locka99/opcua/pull/216/commits/6fb683c5fec46c6dd347824491c4d93a229da695'}, {'type': 'PACKAGE', 'url': 'https://github.com/locka... | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:50:35Z', 'nvd_published_at': '2022-08-23T05:15:00Z'} |
1.4.0 | GHSA-c7x2-7h8r-jq4m | 2022-09-16T21:07:12Z | 2022-08-25T00:00:25Z | null | ['CVE-2018-14519'] | Kirby CMS 2.5.12 Cross-site Request Forgery | An issue was discovered in Kirby 2.5.12. The delete page functionality suffers from a CSRF flaw. A remote attacker can craft a malicious CSRF page and force the user to delete a page. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.5.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14519'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/kirby'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45090'}, {'type': 'WEB', 'url': 'http://zaranshaikh.blogspot.com'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:07:12Z', 'nvd_published_at': '2022-08-24T20:15:00Z'} |
1.4.0 | GHSA-5c8p-qhch-qhx6 | 2022-09-01T22:19:29Z | 2022-08-27T00:00:44Z | null | ['CVE-2021-3427'] | Deluge Web-UI vulnerable to XSS through a crafted torrent file | The Deluge Web-UI is vulnerable to cross-site scripting through a crafted torrent file. The the data from torrent files is not properly sanitised as it's interpreted directly as HTML. Someone who supplies the user with a malicious torrent file can execute arbitrary Javascript code in the context of the user's browser s... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'deluge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3427'}, {'type': 'WEB', 'url': 'https://dev.deluge-torrent.org/ticket/3459'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5c8p-qhch-qhx6'}, {'type': 'PACKAGE', 'url': 'https://github.com/deluge-torrent/deluge'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:19:29Z', 'nvd_published_at': '2022-08-26T16:15:00Z'} |
1.4.0 | GHSA-p4cc-w597-6cpm | 2022-09-08T14:13:22Z | 2022-08-30T20:38:10Z | null | ['CVE-2022-36045'] | Cryptographically weak PRNG in `utils.generateUUID` | ### In Brief
`utils.generateUUID`, a helper function available in essentially all versions of NodeBB (as far back as v1.0.1 and potentially earlier) used a cryptographically insecure Pseudo-random number generator (`Math.random()`), which meant that a specially crafted script combined with multiple invocations of the p... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}] | [{'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-p4cc-w597-6cpm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36045'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/81e3c1ba488d03371a5ce8d0ebb5c5803026e0f9'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-330', 'CWE-338'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:38:10Z', 'nvd_published_at': '2022-08-31T15:15:00Z'} |
1.4.0 | GHSA-rjvc-mf7r-ch7r | 2022-08-30T20:49:28Z | 2022-08-22T00:00:49Z | null | ['CVE-2022-2885'] | Cross site scripting in yetiforce/yetiforce-crm | Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2885'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/a9ad9ee089b575855b9e5e202b4990a15811e8d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:49:28Z', 'nvd_published_at': '2022-08-21T08:15:00Z'} |
1.4.0 | GHSA-4rg6-fm25-gc34 | 2022-09-16T19:36:13Z | 2022-08-30T00:00:26Z | null | ['CVE-2020-26938'] | oauth2-server through 3.1.1 vulnerable to Open Redirect | In oauth2-server (aka node-oauth2-server) through 3.1.1, the value of the `redirect_uri` parameter received during the authorization and token request is checked against an incorrect URI pattern (`[a-zA-Z][a-zA-Z0-9+.-]+:`) before making a redirection. This allows a malicious client to pass an XSS payload through the r... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'oauth2-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26938'}, {'type': 'WEB', 'url': 'https://github.com/oauthjs/node-oauth2-server/issues/637'}, {'type': 'PACKAGE', 'url': 'https://github.com/oauthjs/node-oauth2-server'}, {'type': 'WEB', 'url': 'https://github.com/oauthjs/node-oauth2-server/blob/91d... | {'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:36:13Z', 'nvd_published_at': '2022-08-29T21:15:00Z'} |
1.4.0 | GHSA-hw2p-xqhq-3mjf | 2022-08-30T20:21:22Z | 2022-08-23T00:00:16Z | null | ['CVE-2022-2932'] | Cross site scripting in mobiledoc-kit | Cross-site Scripting (XSS) - Reflected in GitHub repository bustle/mobiledoc-kit prior to 0.14.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'mobiledoc-kit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2932'}, {'type': 'WEB', 'url': 'https://github.com/bustle/mobiledoc-kit/commit/f3fdaa5352904fd2a0b4247ccb0dbf68aad43b5a'}, {'type': 'PACKAGE', 'url': 'https://github.com/bustle/mobiledoc-kit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2-o... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:21:22Z', 'nvd_published_at': '2022-08-22T14:15:00Z'} |
1.4.0 | GHSA-qh87-2qvh-5jf8 | 2022-11-29T21:47:43Z | 2022-08-24T00:00:28Z | null | ['CVE-2022-38665'] | RabbitMQ password stored in plain text by Jenkins CollabNet Plugins Plugin | Jenkins CollabNet Plugins Plugin 2.0.8 and earlier stores a RabbitMQ password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:collabnet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38665'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/collabnet-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-08-23/#SECURITY-2157'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2... | {'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:47:43Z', 'nvd_published_at': '2022-08-23T17:15:00Z'} |
1.4.0 | GHSA-cc99-whm5-mmq3 | 2022-11-28T21:05:48Z | 2022-08-27T00:00:44Z | null | ['CVE-2021-3563'] | Openstack Keystone Incorrect Authorization vulnerability | A flaw was found in openstack-keystone, only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integrity. A [patch](https://opendev.org/openst... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '21.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3563'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-3563'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/ossa/+bug/1901891'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1962908'}, {'type': ... | {'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:08:51Z', 'nvd_published_at': '2022-08-26T16:15:00Z'} |
1.4.0 | GHSA-fqc7-5xxc-ph7r | 2022-09-02T18:06:37Z | 2022-08-27T00:00:44Z | null | ['CVE-2022-0225'] | Keycloak XSS via use of malicious payload as group name when creating new group from admin console | A flaw was found in Keycloak. This flaw allows a privileged attacker to use the malicious payload as the group name while creating a new group from the admin console, leading to a stored Cross-site scripting (XSS) attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '16.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-755v-r4x4-qf7m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0225'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2040268'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/k... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-02T18:06:37Z', 'nvd_published_at': '2022-08-26T18:15:00Z'} |
1.4.0 | GHSA-32fw-9wq8-9x9c | 2022-08-10T18:14:29Z | 2022-08-03T00:00:57Z | null | ['CVE-2020-28433'] | node-latex-pdf is susceptible to command injection | A command injection vulnerability affects all versions of the package node-latex-pdf. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-latex-pdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28433'}, {'type': 'PACKAGE', 'url': 'https://github.com/toolbuddy/node-latex-pdf'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-NODELATEXPDF-1050426'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:14:29Z', 'nvd_published_at': '2022-08-02T14:15:00Z'} |
1.4.0 | GHSA-4wm8-c2vv-xrpq | 2022-08-06T05:46:27Z | 2022-08-06T05:46:27Z | null | ['CVE-2022-31192'] | JSPUI Possible Cross Site Scripting in "Request a Copy" Feature | ### Impact
The JSPUI "Request a Copy" feature does not properly escape values submitted and stored from the "Request a Copy" form. This means that item requests could be vulnerable to XSS attacks. This vulnerability only impacts the JSPUI.
_This vulnerability does NOT impact the XMLUI or 7.x._
### Patches
_DSpace ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-jspui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-jspui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0'}, {'fixed': '6.4'}]}]}... | [{'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/security/advisories/GHSA-4wm8-c2vv-xrpq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31192'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/commit/28eb8158210d41168a62ed5f9e044f754513bc37'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:46:27Z', 'nvd_published_at': '2022-08-01T21:15:00Z'} |
1.4.0 | GHSA-vjxv-45g9-9296 | 2022-08-10T18:40:38Z | 2022-08-10T18:40:38Z | null | ['CVE-2022-35929'] | cosign's `cosign verify-attestaton --type` can report a false positive if any attestation exists | `cosign verify-attestation` used with the `--type` flag will report a false positive verification when:
- There is at least one attestation with a valid signature
- There are NO attestations of the type being verified (--type defaults to "custom")
This can happen when signing with a standard keypair and with "keyless... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/sigstore/cosign'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sigstore/cosign/security/advisories/GHSA-vjxv-45g9-9296'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35929'}, {'type': 'WEB', 'url': 'https://github.com/sigstore/cosign/commit/c5fda01a8ff33ca981f45a9f13e7fb6bd2080b94'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:40:38Z', 'nvd_published_at': '2022-08-04T19:15:00Z'} |
1.4.0 | GHSA-j47c-j42c-mwqq | 2022-08-06T05:39:18Z | 2022-08-06T05:39:18Z | null | ['CVE-2022-35917'] | Solana Pay Vulnerable to Weakness in Transfer Validation Logic | ### Description
When a Solana Pay transaction is located using a [reference key](https://github.com/solana-labs/solana-pay/blob/master/SPEC.md#reference), it may be checked to represent a transfer of the desired amount to the recipient, using the supplied [`validateTransfer` function](https://github.com/solana-labs/sol... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@solana/pay'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/solana-labs/solana-pay/security/advisories/GHSA-j47c-j42c-mwqq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35917'}, {'type': 'WEB', 'url': 'https://github.com/solana-labs/solana-pay/commit/ac6ce0d0a81137700874a8bf5a7caac3be999fad'}, {'type': 'PAC... | {'cwe_ids': ['CWE-670'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:39:18Z', 'nvd_published_at': '2022-08-01T22:15:00Z'} |
1.4.0 | GHSA-rff2-vqm3-jpv5 | 2022-09-16T18:49:13Z | 2022-08-30T00:00:29Z | null | ['CVE-2022-3035'] | snipe-it vulnerable to cross-site scripting (XSS) | Cross-site Scripting (XSS) - Stored in GitHub repository snipe/snipe-it prior to v6.0.11. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3035'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/9cf5f30c77df6ab60baab1c0e6bb0b4e773f0eae'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0bbb1046-ea9e-4... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:49:13Z', 'nvd_published_at': '2022-08-29T20:15:00Z'} |
1.4.0 | GHSA-cc8c-26rj-v2vx | 2023-01-27T00:02:22Z | 2022-08-06T00:00:47Z | null | ['CVE-2016-3098'] | administrate vulnerable to Cross-Site Request Forgery | Cross-site request forgery (CSRF) vulnerability in administrate 0.1.4 and earlier allows remote attackers to hijack the user's OAuth autorization code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'administrate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3098'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/administrate/CVE-2016-3098.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/thoughtbot/administrate'}, {'type': 'WEB', 'url': 'https://seclists.org/os... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:02:22Z', 'nvd_published_at': '2022-08-05T16:15:00Z'} |
1.4.0 | GHSA-pw4j-r69m-rrr5 | 2022-08-18T19:08:36Z | 2022-08-13T00:00:25Z | null | ['CVE-2022-35590'] | ForkCMS XSS via `end_date` parameter | A cross-site scripting (XSS) issue in the ForkCMS version 5.9.3 allows remote attackers to inject JavaScript via the `end_date` Parameter. This issue was patched in version 5.11.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35590'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/76bf739e01f697e10c1277b9726e39b9705be296'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4-other-fork... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:08:36Z', 'nvd_published_at': '2022-08-12T16:15:00Z'} |
1.4.0 | GHSA-78f9-745f-278p | 2022-08-12T15:38:33Z | 2022-08-12T15:38:33Z | null | ['CVE-2022-37423'] | Neo4j Graph apoc plugins Partial Path Traversal Vulnerability | ### Impact
A partial Directory Traversal Vulnerability found in `apoc.log.stream` function of apoc plugins in Neo4j Graph database.
This issue allows a malicious actor to potentially break out of the expected directory. The impact is limited to sibling directories. For example, `userControlled.getCanonicalPath().start... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0.0'}, {'fixed': '4.4.0.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.... | [{'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/security/advisories/GHSA-78f9-745f-278p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37423'}, {'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/pull/3080'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-12T15:38:33Z', 'nvd_published_at': '2022-08-12T15:15:00Z'} |
1.4.0 | GHSA-65wf-qm95-6mhm | 2022-08-18T19:10:40Z | 2022-08-13T00:00:25Z | null | ['CVE-2022-35587'] | ForkCMS XSS via `publish_on_date` parameter | A cross-site scripting (XSS) issue in the Fork version 5.9.3 allows remote attackers to inject JavaScript via the `publish_on_date` Parameter. This issue was patched in version 5.11.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35587'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/76bf739e01f697e10c1277b9726e39b9705be296'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6-other-fork... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:10:40Z', 'nvd_published_at': '2022-08-12T16:15:00Z'} |
1.4.0 | GHSA-3fg9-hcq5-vxrc | 2022-08-30T19:55:41Z | 2022-08-30T19:55:41Z | null | [] | iana-time-zone vulnerable to use after free in MacOS / iOS implementation | In iana-time-zone v0.1.43 a use-after-free bug in the MacOS / iOS implementation was introduced.
The copied system time zone was released before its name was copied.
If the system time zone was changed between the call of `CFRelease` and `str::to_owned()`,
random memory would be copied.
| [] | [{'package': {'ecosystem': 'crates.io', 'name': 'iana-time-zone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.43'}, {'fixed': '0.1.45'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/strawlab/iana-time-zone/pull/54'}, {'type': 'PACKAGE', 'url': 'https://github.com/strawlab/iana-time-zone'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0049.html'}] | {'cwe_ids': ['CWE-416'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T19:55:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-325v-g5vx-whxc | 2022-09-16T17:41:56Z | 2022-08-31T00:00:19Z | null | ['CVE-2022-36746'] | LibreNMS vulnerable to Cross-Site Scripting (XSS) | LibreNMS version 22.6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component oxidized-cfg-check.inc.php. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 22.6.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36746'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/14126'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:41:56Z', 'nvd_published_at': '2022-08-30T22:15:00Z'} |
1.4.0 | GHSA-2cg4-7q4x-7rr2 | 2022-08-15T20:08:52Z | 2022-08-11T00:00:21Z | null | ['CVE-2022-25973'] | mc-kill-port vulnerable to Arbitrary Command Execution via kill function | All versions of package mc-kill-port are vulnerable to Arbitrary Command Execution via the `kill` function, due to missing sanitization of the `port` argument. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mc-kill-port'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25973'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-MCKILLPORT-2419070'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/mc-kill-port'}] | {'cwe_ids': ['CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T21:15:25Z', 'nvd_published_at': '2022-08-10T05:15:00Z'} |
1.4.0 | GHSA-5229-94p3-7wwq | 2022-09-16T20:26:47Z | 2022-08-31T00:00:19Z | null | ['CVE-2022-36745'] | LibreNMS vulnerable to Cross-Site Scripting (XSS) | LibreNMS version 22.6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component print-customoid.php. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36745'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/14126'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/e5c91a0f835d59e058d9d3e4956e079476d59ee6'}, {'type': 'WEB', 'url': 'https://community.librenms.o... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T20:26:47Z', 'nvd_published_at': '2022-08-30T22:15:00Z'} |
1.4.0 | GHSA-7527-8855-9cf8 | 2022-09-08T14:16:39Z | 2022-08-26T00:03:30Z | null | ['CVE-2022-2255'] | Incorrect header handling in mod-wsgi | A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mod-wsgi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2255'}, {'type': 'WEB', 'url': 'https://github.com/GrahamDumpleton/mod_wsgi/commit/af3c0c2736bc0b0b01fa0f0aad3c904b7fa9c751'}, {'type': 'PACKAGE', 'url': 'https://github.com/GrahamDumpleton/mod_wsgi'}, {'type': 'WEB', 'url': 'https://github.com/Gra... | {'cwe_ids': ['CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:55:04Z', 'nvd_published_at': '2022-08-25T18:15:00Z'} |
1.4.0 | GHSA-h9mh-mgpv-gqmv | 2022-08-30T20:20:47Z | 2022-08-22T00:00:48Z | null | ['CVE-2022-34916'] | Remote code execution in Apache Flume | Apache Flume versions 1.4.0 through 1.10.0 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.flume.flume-ng-sources:flume-jms-source'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34916'}, {'type': 'WEB', 'url': 'https://github.com/apache/flume/commit/7fe9af49c485756e1b618493a5bc00b70d7fbd2d'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/flume'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/FLUME-3... | {'cwe_ids': ['CWE-20', 'CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:20:47Z', 'nvd_published_at': '2022-08-21T09:15:00Z'} |
1.4.0 | GHSA-28w4-h56g-grg7 | 2022-11-28T22:08:00Z | 2022-08-24T00:00:28Z | null | ['CVE-2022-38664'] | Cross-site Scripting in Jenkins Job Configuration History Plugin | Jenkins Job Configuration History Plugin 1165.v8cc9fd1f4597 and earlier does not escape the job name on the System Configuration History page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure job names. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jobConfigHistory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1166.vc9f255f45b'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1165.v8cc9fd1f4597'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38664'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/job-config-history-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-08-23/#SECURITY-2765'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-s... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-28T22:08:00Z', 'nvd_published_at': '2022-08-23T17:15:00Z'} |
1.4.0 | GHSA-mv48-hcvh-8jj8 | 2022-08-30T20:17:43Z | 2022-08-19T00:00:20Z | null | ['CVE-2022-35204'] | Vitejs Vite before v2.9.13 vulnerable to directory traversal via crafted URL to victim's service | Vitejs Vite before v2.9.13 was discovered to allow attackers to perform a directory traversal via a crafted URL to the victim's service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'vite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35204'}, {'type': 'WEB', 'url': 'https://github.com/vitejs/vite/issues/8498'}, {'type': 'PACKAGE', 'url': 'https://github.com/vitejs/vite'}, {'type': 'WEB', 'url': 'https://github.com/vitejs/vite/releases/tag/v2.9.13'}, {'type': 'WEB', 'url': 'http... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:17:43Z', 'nvd_published_at': '2022-08-18T19:15:00Z'} |
1.4.0 | GHSA-v456-chpw-6mmw | 2022-08-18T19:15:54Z | 2022-08-10T00:00:31Z | null | ['CVE-2022-35724'] | Apache Avro Rust SDK vulnerable to reader looping in cycle endlessly, consuming CPU | It is possible to provide data to be read that leads the reader to loop in cycles endlessly, consuming CPU. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'apache-avro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35724'}, {'type': 'PACKAGE', 'url': 'https://github.com/a0x8o/avro'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/771z1nwrpkn1ovmyfb2fm65mchdxgy7p'}] | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:15:54Z', 'nvd_published_at': '2022-08-09T07:15:00Z'} |
1.4.0 | GHSA-9hmc-87h4-w869 | 2022-08-18T19:08:18Z | 2022-08-13T00:00:25Z | null | ['CVE-2022-35585'] | ForkCMS stored XSS via `start_date` parameter | A stored cross-site scripting (XSS) issue in the ForkCMS version 5.9.3 allows remote attackers to inject JavaScript via the `start_date` Parameter. This issue was patched in version 5.11.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35585'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/76bf739e01f697e10c1277b9726e39b9705be296'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5-other-fork... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:08:18Z', 'nvd_published_at': '2022-08-12T16:15:00Z'} |
1.4.0 | GHSA-6hcj-qrw3-m66q | 2022-08-10T15:57:45Z | 2022-08-02T00:00:25Z | null | ['CVE-2022-2589'] | Fava before 1.22.3 vulnerable to reflected cross-site scripting | Fava before 1.22.3 is vulnerable to reflected cross-site scripting due to improper validation on filter conversion. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'fava'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2589'}, {'type': 'WEB', 'url': 'https://github.com/beancount/fava/commit/68bbb6e39319deb35ab9f18d0b6aa9fa70472539'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6hcj-qrw3-m66q'}, {'type': 'PACKAGE', 'url': 'https://github.com/be... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T15:57:45Z', 'nvd_published_at': '2022-08-01T15:15:00Z'} |
1.4.0 | GHSA-95rf-557x-44g5 | 2022-08-18T18:49:44Z | 2022-08-06T00:00:46Z | null | ['CVE-2022-2053'] | Undertow vulnerable to Dos via Large AJP request | When a POST request comes through AJP and the request exceeds the max-post-size limit (maxEntitySize), Undertow's AjpServerRequestConduit implementation closes a connection without sending any response to the client/proxy. This behavior results in that a front-end proxy marking the backend worker (application server) a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.19.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0.Alpha1'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2053'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/pull/1350'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2095862&comment#0'}, {'type': 'PACKAGE', 'url': 'https://github.com/undertow-io/undertow'}, {'t... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T18:49:44Z', 'nvd_published_at': '2022-08-05T16:15:00Z'} |
1.4.0 | GHSA-f92v-grc2-w2fg | 2022-08-18T19:04:47Z | 2022-08-18T19:04:47Z | null | ['CVE-2022-35936'] | Ethermint vulnerable to DoS through unintended Contract Selfdestruct | # Vulnerability Report
## Impact
Smart contract applications that make use of the `selfdestruct` functionality and their end-users.
## Classification
The vulnerability has been classified as `high` with a CVSS score of `8.2`. It has the potential to create a denial-of-service to all contracts that can invoke the [`... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/evmos/ethermint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.17.2'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/evmos/evmos'}, 'ranges': [{'type'... | [{'type': 'WEB', 'url': 'https://github.com/evmos/ethermint/security/advisories/GHSA-f92v-grc2-w2fg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35936'}, {'type': 'WEB', 'url': 'https://github.com/evmos/ethermint/commit/144741832007a26dbe950512acbda4ed95b2a451'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:04:47Z', 'nvd_published_at': '2022-08-05T13:15:00Z'} |
1.4.0 | GHSA-5vrc-7jfr-4642 | 2022-08-14T00:24:25Z | 2022-08-03T00:00:56Z | null | ['CVE-2020-28423'] | monorepo-build Command Injection vulnerability | A command injection vulnerability affects all versions of package monorepo-build. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'monorepo-build'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28423'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-MONOREPOBUILD-1050392'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-14T00:24:25Z', 'nvd_published_at': '2022-08-02T14:15:00Z'} |
1.4.0 | GHSA-h3w2-qg2r-c7mf | 2022-09-16T21:01:55Z | 2022-08-25T00:00:25Z | null | ['CVE-2018-14520'] | Kirby CMS 2.5.12 Cross-site Scripting | An issue was discovered in Kirby 2.5.12. The application allows malicious HTTP requests to be sent in order to trick a user into adding web pages. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.5.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14520'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/kirby'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45068'}, {'type': 'WEB', 'url': 'http://zaranshaikh.blogspot.com/2018/07/cross-site-request-forgery-kirby-cms.html... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:01:55Z', 'nvd_published_at': '2022-08-24T20:15:00Z'} |
1.4.0 | GHSA-7xr3-6ggc-wc9p | 2023-08-08T10:45:34Z | 2022-08-06T05:30:56Z | null | ['CVE-2022-33977'] | untangle vulnerable to XML Entity Expansion | ### Impact
An attacker may be able to cause a denial-of-service (DoS) condition on the server on which the product is running. This affects untangle versions up to and including 1.2.0
### Patches
The problem has been fixed with version 1.2.1
### Workarounds
None
### References
https://jvn.jp/en/jp/JVN30454777/
### ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'untangle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/stchris/untangle/security/advisories/GHSA-7xr3-6ggc-wc9p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33977'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/untangle/PYSEC-2022-243.yaml'}, {'type': 'PACKAGE', 'u... | {'cwe_ids': ['CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:30:56Z', 'nvd_published_at': '2022-07-26T06:15:00Z'} |
1.4.0 | GHSA-xv7h-95r7-595j | 2022-08-30T20:24:22Z | 2022-08-23T00:00:17Z | null | ['CVE-2021-3513'] | Incorrect implementation of lockout feature in Keycloak | A flaw was found in keycloak where a brute force attack is possible even when the permanent lockout feature is enabled. This is due to a wrong error message displayed when wrong credentials are entered. The highest threat from this vulnerability is to confidentiality. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3513'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/pull/7976'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-3513'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1953439'}, {'type'... | {'cwe_ids': ['CWE-209', 'CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:24:22Z', 'nvd_published_at': '2022-08-22T15:15:00Z'} |
1.4.0 | GHSA-xv97-c62v-4587 | 2022-08-11T22:13:10Z | 2022-08-02T18:00:33Z | null | ['CVE-2022-35924'] | NextAuth.js before 4.10.3 and 3.29.10 sending verification requests (magic link) to unwanted emails | ### Impact
`next-auth` users who are using the `EmailProvider` either in versions before `4.10.3` or `3.29.10` are affected.
If an attacker could forge a request that sent a comma-separated list of emails (eg.: `attacker@attacker.com,victim@victim.com`) to the sign-in endpoint, NextAuth.js would send emails to both th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.29.10'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-xv97-c62v-4587'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35924'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/commit/afb1fcdae3cc30445038ef588e491d139b916003'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-20', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-02T18:00:33Z', 'nvd_published_at': '2022-08-02T18:15:00Z'} |
1.4.0 | GHSA-qrjv-rf5q-qpxc | 2022-08-06T05:20:00Z | 2022-08-06T05:20:00Z | null | ['CVE-2022-35922'] | Rust-WebSocket memory allocation based on untrusted length | ## Impact
Untrusted websocket connections can cause an out-of-memory (OOM) process abort in a client or a server.
The root cause of the issue is during dataframe parsing.
Affected versions would allocate a buffer based on the declared dataframe size, which may come from an untrusted source.
When `Vec::with_capacity` fa... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'websocket'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.26.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/websockets-rs/rust-websocket/security/advisories/GHSA-qrjv-rf5q-qpxc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35922'}, {'type': 'WEB', 'url': 'https://github.com/websockets-rs/rust-websocket/commit/cbf6e9983e839d2ecad86de8cd1b3f20ed43390b'}, {... | {'cwe_ids': ['CWE-119', 'CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:20:00Z', 'nvd_published_at': '2022-08-01T22:15:00Z'} |
1.4.0 | GHSA-vc68-6x72-w22f | 2023-09-11T22:58:56Z | 2022-08-05T00:00:23Z | null | ['CVE-2022-35144'] | Raneto vulnerable to Cross-site Scripting | Renato v0.17.0 was discovered to contain a cross-site scripting (XSS) vulnerability. This issue is fixed in version 0.17.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'raneto'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.17.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35144'}, {'type': 'WEB', 'url': 'https://github.com/ryanlelek/Raneto/pull/370'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/definitions/79.html'}, {'type': 'WEB', 'url': 'https://gainsec.com/2022/08/04/cve-2022-35142-cve-2022-35143-cve-2022... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:06:58Z', 'nvd_published_at': '2022-08-04T20:15:00Z'} |
1.4.0 | GHSA-q6h8-qjjc-j8cg | 2022-09-16T18:33:32Z | 2022-08-29T20:06:55Z | null | ['CVE-2022-36573'] | Pagekit CMS cross-site scripting in Markdown text box where articles are edited | A cross-site scripting (XSS) vulnerability in Pagekit CMS v1.0.18 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Markdown text box under /blog/post/edit. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pagekit/pagekit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36573'}, {'type': 'WEB', 'url': 'https://github.com/pagekit/pagekit/issues/968'}, {'type': 'PACKAGE', 'url': 'https://github.com/pagekit/pagekit'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:33:32Z', 'nvd_published_at': '2022-08-29T00:15:00Z'} |
1.4.0 | GHSA-3w5g-989p-35r8 | 2022-08-18T19:14:55Z | 2022-08-10T00:00:31Z | null | ['CVE-2022-36125'] | Apache Avro Rust SDK corrupted data read can cause crash | It is possible to crash (panic) an application by providing a corrupted data to be read. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'apache-avro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36125'}, {'type': 'PACKAGE', 'url': 'https://github.com/a0x8o/avro'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/t1r5xz0pvhm4tosqopjpj6dz8zlsht07'}] | {'cwe_ids': ['CWE-190', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:14:55Z', 'nvd_published_at': '2022-08-09T07:15:00Z'} |
1.4.0 | GHSA-4hr4-pjjh-2q2w | 2022-08-30T20:51:43Z | 2022-08-24T00:00:31Z | null | ['CVE-2022-21208'] | Uncontrolled Resource Consumption in node-opcua | The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sendi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-opcua'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.74.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21208'}, {'type': 'WEB', 'url': 'https://github.com/node-opcua/node-opcua/pull/1149'}, {'type': 'WEB', 'url': 'https://github.com/node-opcua/node-opcua/commit/33ca3bab4ab781392a2f8d8f5a14de9a0aa0e410'}, {'type': 'WEB', 'url': 'https://github.com/no... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:51:43Z', 'nvd_published_at': '2022-08-23T05:15:00Z'} |
1.4.0 | GHSA-qhxv-296x-hjv7 | 2022-09-16T19:35:05Z | 2022-08-29T20:06:55Z | null | ['CVE-2022-25644'] | @pendo324/get-process-by-name are vulnerable to Arbitrary Code Execution | All versions of package @pendo324/get-process-by-name are vulnerable to Arbitrary Code Execution due to improper sanitization of getProcessByName function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@pendo324/get-process-by-name'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25644'}, {'type': 'PACKAGE', 'url': 'https://github.com/pendo324/get-process-by-name-js'}, {'type': 'WEB', 'url': 'https://github.com/pendo324/get-process-by-name-js/blob/34e8a279a94fa23acb13e302e9516ab1ea8d8731/index.js%23L27-L28'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:35:05Z', 'nvd_published_at': '2022-08-29T05:15:00Z'} |
1.4.0 | GHSA-q4qv-3x58-rxmh | 2022-08-18T19:09:10Z | 2022-08-13T00:00:25Z | null | ['CVE-2022-35589'] | ForkCMS XSS via `publish_on_time` parameter | A cross-site scripting (XSS) issue in the Fork version 5.9.3 allows remote attackers to inject JavaScript via the `publish_on_time` Parameter. This issue was patched in version 5.11.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35589'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/76bf739e01f697e10c1277b9726e39b9705be296'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7-other-fork... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:09:10Z', 'nvd_published_at': '2022-08-12T16:15:00Z'} |
1.4.0 | GHSA-hccx-cg4v-hrjx | 2022-08-30T19:56:48Z | 2022-08-13T00:00:43Z | null | ['CVE-2022-38180'] | JetBrain Ktor before 2.1.0 vulnerable to selection of wrong authentication provider | In JetBrains Ktor before 2.1.0 the wrong authentication provider could be selected in some cases | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.ktor:ktor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38180'}, {'type': 'WEB', 'url': 'https://github.com/ktorio/ktor/pull/3092'}, {'type': 'PACKAGE', 'url': 'https://github.com/ktorio/ktor'}, {'type': 'WEB', 'url': 'https://www.jetbrains.com/privacy-security/issues-fixed/'}] | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T19:56:48Z', 'nvd_published_at': '2022-08-12T10:15:00Z'} |
1.4.0 | GHSA-6qv6-q77g-7qm6 | 2022-09-08T14:26:34Z | 2022-08-31T22:29:27Z | null | ['CVE-2022-34668'] | NVFLARE unsafe deserialization due to Pickle | ### Impact
NVFLARE contains a vulnerability where deserialization of Untrusted Data due to Pickle usage may allow an unprivileged network attacker to cause Remote Code Execution, Denial Of Service, and Impact to both Confidentiality and Integrity.
All versions before 2.1.4 are affected.
CVSS Score = 9.8
[AV:N/AC... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'nvflare'}, 'ecosystem_specific': {'affected_functions': ['nvflare.apis.dxo.DXO.to_bytes', 'nvflare.apis.dxo.from_bytes']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/NVIDIA/NVFlare/security/advisories/GHSA-6qv6-q77g-7qm6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34668'}, {'type': 'WEB', 'url': 'https://github.com/NVIDIA/NVFlare/commit/6cde16f3f4711583ae4d896dfcc125d25c7d5b0d'}, {'type': 'PACKAGE', 'url': 'h... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-31T22:29:27Z', 'nvd_published_at': '2022-08-29T03:15:00Z'} |
1.4.0 | GHSA-fwv4-6mxc-x5h3 | 2022-09-16T19:37:53Z | 2022-08-29T20:06:55Z | null | ['CVE-2022-25921'] | morgan-json vulnerable to Arbitrary Code Execution | All versions of package morgan-json are vulnerable to Arbitrary Code Execution due to missing sanitization of input passed to the `Function` constructor. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'morgan-json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25921'}, {'type': 'PACKAGE', 'url': 'https://github.com/indexzero/morgan-json'}, {'type': 'WEB', 'url': 'https://github.com/indexzero/morgan-json/blob/3a76010215a4256d41687d082cd66c4f00ea5717/index.js%23L46'}, {'type': 'WEB', 'url': 'https://securi... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:37:53Z', 'nvd_published_at': '2022-08-29T05:15:00Z'} |
1.4.0 | GHSA-c2j7-66m3-r4ff | 2022-08-06T05:39:46Z | 2022-08-06T05:39:46Z | null | ['CVE-2022-31189'] | JSPUI's "Internal System Error" page prints exceptions and stack traces without sanitization | ### Impact
When an "Internal System Error" occurs in the JSPUI, then entire exception (including stack trace) is available. Information in this stacktrace may be useful to an attacker in launching a more sophisticated attack. This vulnerability only impacts the JSPUI.
_This vulnerability does NOT impact the XMLUI or ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-jspui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '6.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3'}}] | [{'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/security/advisories/GHSA-c2j7-66m3-r4ff'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31189'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/commit/afcc6c3389729b85d5c7b0230cbf9aaf7452f31a'}, {'type': 'PACKAGE', 'url': 'htt... | {'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:39:46Z', 'nvd_published_at': '2022-08-01T21:15:00Z'} |
1.4.0 | GHSA-j259-6c58-9m58 | 2022-08-11T21:13:43Z | 2022-08-11T21:13:43Z | null | ['CVE-2022-35942'] | loopback-connector-postgresql Vulnerable to Improper Sanitization of `contains` Filter | Improper input validation on the `contains` LoopBack filter may allow for arbitrary SQL injection.
### Impact
When the extended filter property `contains` is permitted to be interpreted by the Postgres connector, it is possible to inject arbitrary SQL which may affect the confidentiality and integrity of data stored ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'loopback-connector-postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/loopbackio/loopback-connector-postgresql/security/advisories/GHSA-j259-6c58-9m58'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35942'}, {'type': 'WEB', 'url': 'https://github.com/loopbackio/loopback-connector-postgresql/commit/d57406c6737692a3a106b... | {'cwe_ids': ['CWE-20', 'CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T21:13:43Z', 'nvd_published_at': '2022-08-12T23:15:00Z'} |
1.4.0 | GHSA-rh4r-9689-6xw4 | 2022-09-16T18:42:12Z | 2022-08-29T20:06:52Z | null | ['CVE-2022-37059'] | Subrion CMS 4.2.1 vulnerable to cross-site scripting in admin panel | Cross Site Scripting (XSS) in the Admin Panel of Subrion CMS 4.2.1 allows attacker to inject arbitrary code via the Login Field. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37059'}, {'type': 'WEB', 'url': 'https://drive.google.com/file/d/1lmU8zuyzyC9LHFXuXzamnkcLcjcfs0xE/view?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:42:12Z', 'nvd_published_at': '2022-08-29T13:15:00Z'} |
1.4.0 | GHSA-wcm8-86x6-8mv3 | 2022-08-30T20:05:09Z | 2022-08-10T00:00:31Z | null | ['CVE-2022-36124'] | Apache Avro Rust SDK's Reader could consume memory beyond allowed constraints | It is possible for a Reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'apache-avro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36124'}, {'type': 'PACKAGE', 'url': 'https://github.com/a0x8o/avro'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/kj429rzo1xxjgz058qqqg0y7c0p512zo'}] | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:05:09Z', 'nvd_published_at': '2022-08-09T07:15:00Z'} |
1.4.0 | GHSA-7pwq-f4pq-78gm | 2022-08-11T15:43:35Z | 2022-08-11T15:43:35Z | null | [] | `rustdecimal` is a malicious crate | The Rust Security Response WG and the crates.io team [were notified][1] on 2022-05-02 of the existence of the malicious crate `rustdecimal`, which contained malware. The crate name was intentionally similar to the name of the popular [`rust_decimal`][2] crate, hoping that potential victims would misspell its name (an a... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'rustdecimal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/paupino/rust-decimal/issues/514#issuecomment-1115408888'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rustlang-security-announcements/c/5DVtC8pgJLw?pli=1'}, {'type': 'WEB', 'url': 'https://raw.globalsecuritydatabase.org/GSD-2022-1002520'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:43:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-56x4-j7p9-fcf9 | 2022-08-30T20:31:21Z | 2022-08-30T20:31:21Z | null | [] | Command Injection in moment-timezone | ### Impact
All versions of moment-timezone from 0.1.0 contain build tasks vulnerable to command injection.
* if Alice uses tzdata pipeline to package moment-timezone on her own (for example via `grunt data:2014d`, where `2014d` stands for the version of the tzdata to be used from IANA's website),
* and Alice let's Ma... | [] | [{'package': {'ecosystem': 'npm', 'name': 'moment-timezone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'fixed': '0.5.35'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/moment/moment-timezone/security/advisories/GHSA-56x4-j7p9-fcf9'}, {'type': 'WEB', 'url': 'https://github.com/moment/moment-timezone/commit/ce955a301ff372e8e9fb3a5b516620c60e7a082a'}, {'type': 'PACKAGE', 'url': 'https://github.com/moment/moment-timezone'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:31:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jw36-hf63-69r9 | 2023-02-15T15:38:06Z | 2022-08-04T00:00:26Z | null | ['CVE-2022-35737'] | `libsqlite3-sys` via C SQLite improperly validates array index | SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'libsqlite3-sys'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.25.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35737'}, {'type': 'WEB', 'url': 'https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite'}, {'type': 'WEB', 'url': 'https://kb.cert.org/vuls/id/720344'}... | {'cwe_ids': ['CWE-129'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T15:38:06Z', 'nvd_published_at': '2022-08-03T06:15:00Z'} |
1.4.0 | GHSA-h864-m8vm-3xvj | 2022-08-18T19:06:39Z | 2022-08-18T19:06:39Z | null | [] | oqs's Post-Quantum Signature scheme Rainbow level I parametersets broken | Ward Beullens found a practical key-recovery attack against Rainbow.
The level I parametersets are removed from liboqs starting from version `0.7.2`.
Find the scientific details in [Breaking Rainbow Takes a Weekend on a Laptop](https://eprint.iacr.org/2022/214).
This means all the `oqs::sig::Algorithm::RainbowI*` vari... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'oqs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}] | [{'type': 'PACKAGE', 'url': 'https://github.com/open-quantum-safe/liboqs-rust'}, {'type': 'WEB', 'url': 'https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/KFgw5_qCXiI?pli=1'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0047.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:06:39Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gf8c-j759-86mg | 2022-09-01T22:22:33Z | 2022-08-25T00:00:27Z | null | ['CVE-2021-4040'] | org.apache.activemq:artemis-core-client Vulnerable to Out-of-Bounds Write | A flaw was found in AMQ Broker. This issue can cause a partial interruption to the availability of AMQ Broker via an Out of memory (OOM) condition. This flaw allows an attacker to partially disrupt availability to the broker through a sustained attack of maliciously crafted messages. The highest threat from this vulner... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:artemis-core-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.19.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4040'}, {'type': 'WEB', 'url': 'https://github.com/apache/activemq-artemis/pull/3862'}, {'type': 'WEB', 'url': 'https://github.com/apache/activemq-artemis/pull/3871'}, {'type': 'WEB', 'url': 'https://github.com/apache/activemq-artemis/pull/3871/com... | {'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:22:33Z', 'nvd_published_at': '2022-08-24T16:15:00Z'} |
1.4.0 | GHSA-p6mm-27gq-9v3p | 2022-08-06T05:29:45Z | 2022-08-06T05:29:45Z | null | ['CVE-2022-31186'] | next-auth before v4.10.2 and v3.29.9 leaks excessive information into log | ### Impact
An information disclosure vulnerability in `next-auth` before `v4.10.2` and `v3.29.9` allows an attacker with log access privilege to obtain excessive information such as an identity provider's secret in the log (which is thrown during OAuth error handling) and use it to leverage further attacks on the syste... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.29.9'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-p6mm-27gq-9v3p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31186'}, {'type': 'PACKAGE', 'url': 'https://github.com/nextauthjs/next-auth'}, {'type': 'WEB', 'url': 'https://next-auth.js.org/configuratio... | {'cwe_ids': ['CWE-532'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:29:45Z', 'nvd_published_at': '2022-08-01T20:15:00Z'} |
1.4.0 | GHSA-xrc4-737v-9q75 | 2022-08-18T18:48:41Z | 2022-08-18T18:48:41Z | null | ['CVE-2022-31198'] | OpenZeppelin Contracts's GovernorVotesQuorumFraction updates to quorum may affect past defeated proposals | ### Impact
This issue concerns instances of Governor that use the module `GovernorVotesQuorumFraction`, a mechanism that determines quorum requirements as a percentage of the voting token's total supply. In affected instances, when a proposal is passed to lower the quorum requirement, past proposals may become executa... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.7.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed... | [{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-xrc4-737v-9q75'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31198'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3561'}, {'type': 'PACKAGE', 'url'... | {'cwe_ids': ['CWE-682'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T18:48:41Z', 'nvd_published_at': '2022-08-01T21:15:00Z'} |
1.4.0 | GHSA-prrh-qvhf-x788 | 2022-09-13T17:33:45Z | 2022-08-31T21:27:38Z | null | ['CVE-2022-35933'] | PrestaShop Product Comments Cross-site Scripting vulnerability | ### Impact
An attacker could steal an admin's cookie
### Patches
The issue is fixed in 5.0.2
### References
[Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')](https://cwe.mitre.org/data/definitions/79.html)
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/productcomments'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/PrestaShop/productcomments/security/advisories/GHSA-prrh-qvhf-x788'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35933'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/productcomments/commit/314456d739155aa71f0b235827e8e0f24b97c26b'}, {'typ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-31T21:27:38Z', 'nvd_published_at': '2022-09-02T20:15:00Z'} |
1.4.0 | GHSA-8rmh-55h4-93h5 | 2022-08-11T17:03:11Z | 2022-08-06T05:48:56Z | null | ['CVE-2022-31195'] | DSpace ItemImportService API Vulnerable to Path Traversal in Simple Archive Format Package Import | ### Impact
ItemImportServiceImpl is vulnerable to a path traversal vulnerability. This means a malicious SAF (simple archive format) package could cause a file/directory to be created anywhere the Tomcat/DSpace user can write to on the server. However, this path traversal vulnerability is only possible by a user with ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '5.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0'}, {'fixed': '6.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/security/advisories/GHSA-8rmh-55h4-93h5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31195'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/commit/56e76049185bbd87c994128a9d77735ad7af0199'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:48:56Z', 'nvd_published_at': '2022-08-01T21:15:00Z'} |
1.4.0 | GHSA-wwch-cmqr-hhrm | 2023-02-17T21:33:15Z | 2022-08-24T00:00:29Z | null | ['CVE-2021-3701'] | ansible-runner 2.0.0 default temporary files written to world R/W locations | A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansible-runner to write files as the legitimate user in a place they did n... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible-runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3701'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible-runner/issues/738'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible-runner/pull/742'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible-runner/pull/742/commits... | {'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:18:53Z', 'nvd_published_at': '2022-08-23T16:15:00Z'} |
1.4.0 | GHSA-rv3r-vqjj-8c76 | 2022-08-30T20:53:03Z | 2022-08-30T20:53:03Z | null | [] | Cross-site scripting from content entered in the tags and multiselect fields | ### Introduction
Cross-site scripting (XSS) is a type of vulnerability that allows to execute any kind of JavaScript code inside the Panel session of the same or other users. In the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim.
Such vulnerabilities are cri... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.7'}, {'fixed': '3.5.8.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.6.1'}]}]}, {... | [{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-rv3r-vqjj-8c76'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/kirby'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:53:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gwj5-wp6r-5q9f | 2022-08-11T18:08:57Z | 2022-08-11T18:08:57Z | null | [] | Cronos vulnerable to DoS through unintended Contract Selfdestruct | In Cronos nodes running versions before v0.7.0, the contract selfdestruct invocation permanently removes the corresponding bytecode from the internal database storage. However, due to a bug in Ethermint, all contracts that used the identical bytecode (i.e shared the same CodeHash) will also stop working once one contra... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/crypto-org-chain/cronos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.7.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/crypto-org-chain/cronos/security/advisories/GHSA-gwj5-wp6r-5q9f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35936'}, {'type': 'WEB', 'url': 'https://github.com/crypto-org-chain/cronos/commit/2f2cc88b501b47149690fdef05afbbbe5bc116c9'}, {'type': 'P... | {'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T18:08:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xxc2-j7jj-6g5m | 2022-08-11T21:14:43Z | 2022-08-05T00:00:23Z | null | ['CVE-2022-35142'] | Raneto Denial of Service via crafted payload injected into `Search` parameter | An issue in Renato v0.17.0 allows attackers to cause a Denial of Service (DoS) via a crafted payload injected into the `Search` parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'raneto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.17.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35142'}, {'type': 'WEB', 'url': 'https://github.com/ryanlelek/Raneto/issues/368'}, {'type': 'WEB', 'url': 'https://github.com/ryanlelek/Raneto/pull/370'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/definitions/703.html'}, {'type': 'WEB', 'u... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T21:14:43Z', 'nvd_published_at': '2022-08-04T20:15:00Z'} |
1.4.0 | GHSA-8qr4-xgw6-wmr3 | 2023-01-18T21:52:48Z | 2022-08-18T18:59:46Z | null | ['CVE-2022-35949'] | `undici.request` vulnerable to SSRF using absolute URL on `pathname` | ### Impact
`undici` is vulnerable to SSRF (Server-side Request Forgery) when an application takes in **user input** into the `path/pathname` option of `undici.request`.
If a user specifies a URL such as `http://127.0.0.1` or `//127.0.0.1`
```js
const undici = require("undici")
undici.request({origin: "http://example... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'undici'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.8.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/nodejs/undici/security/advisories/GHSA-8qr4-xgw6-wmr3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35949'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/undici/commit/124f7ebf705366b2e1844dff721928d270f87895'}, {'type': 'PACKAGE', 'url': 'htt... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T18:59:46Z', 'nvd_published_at': '2022-08-12T23:15:00Z'} |
1.4.0 | GHSA-8x94-hmjh-97hq | 2022-09-16T21:38:06Z | 2022-08-11T14:49:12Z | null | ['CVE-2022-36359'] | Django vulnerable to Reflected File Download attack | An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2'}, {'fixed': '3.2.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.0.7'}]}]}, {'package': {'ecosystem': 'PyP... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36359'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/4.0/releases/security/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8x94-hmjh-97hq'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': ... | {'cwe_ids': ['CWE-494'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T14:49:12Z', 'nvd_published_at': '2022-08-03T14:15:00Z'} |
1.4.0 | GHSA-cwhp-rqfr-8462 | 2023-07-13T23:34:27Z | 2022-08-06T00:00:47Z | null | ['CVE-2020-1691'] | Moodle XSS Vulnerability | In Moodle 3.8, messages required extra sanitizing before updating the conversation overview, to prevent the risk of stored cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8'}, {'fixed': '3.8.1'}]}], 'versions': ['3.8']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1691'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/4e809346537e230cbff8235bfee0e7e151e4e9f9'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=395953'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T23:34:27Z', 'nvd_published_at': '2022-08-05T16:15:00Z'} |
1.4.0 | GHSA-6278-2q4m-cmf3 | 2022-09-16T18:37:18Z | 2022-08-27T00:00:43Z | null | ['CVE-2022-36537'] | ZK Framework vulnerable to malicious POST | ZK Framework version 9.6.1, 9.6.0.1, 9.5.1.3, 9.0.1.2 and 8.6.4.1 allows attackers to access sensitive information via a crafted POST request sent to the component AuUploader. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.zkoss.zk:zk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.6.4.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.zkoss.zk:zk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.0'}, {'fixed': '9.0.1.3'}]}]}, {'pac... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36537'}, {'type': 'WEB', 'url': 'https://github.com/zkoss/zk/commit/92a29aa9b1daf1fd2d9d188cb6545f0441d54e84'}, {'type': 'PACKAGE', 'url': 'https://github.com/zkoss/zk'}, {'type': 'WEB', 'url': 'https://tracker.zkoss.org/browse/ZK-5150'}, {'type': ... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:37:18Z', 'nvd_published_at': '2022-08-26T20:15:00Z'} |
1.4.0 | GHSA-7grf-83vw-6f5x | 2022-08-14T00:23:34Z | 2022-08-14T00:23:34Z | null | ['CVE-2022-35915'] | OpenZeppelin Contracts ERC165Checker unbounded gas consumption | ### Impact
The target contract of an EIP-165 `supportsInterface` query can cause unbounded gas consumption by returning a lot of data, while it is generally assumed that this operation has a bounded cost.
### Patches
The issue has been fixed in v4.7.2.
### References
https://github.com/OpenZeppelin/openzeppelin-co... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '4.7.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'openzeppelin-solidity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'last_affected': '4.... | [{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-7grf-83vw-6f5x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35915'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3587'}, {'type': 'PACKAGE', 'url'... | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-14T00:23:34Z', 'nvd_published_at': '2022-08-01T21:15:00Z'} |
1.4.0 | GHSA-qp5m-c3m9-8q2p | 2022-08-06T05:47:04Z | 2022-08-06T05:47:04Z | null | ['CVE-2022-31194'] | JSPUI vulnerable to path traversal in submission (resumable) upload | ### Impact
The JSPUI resumable upload implementations in SubmissionController and FileUploadRequest are vulnerable to multiple path traversal attacks, allowing an attacker to create files/directories anywhere on the server writable by the Tomcat/DSpace user, by modifying some request parameters during submission. This ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-jspui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '5.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-jspui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0'}, {'fixed': '6.4'}]}]}... | [{'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/security/advisories/GHSA-qp5m-c3m9-8q2p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31194'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/commit/7569c6374aefeafb996e202cf8d631020eda5f24'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:47:04Z', 'nvd_published_at': '2022-08-01T21:15:00Z'} |
1.4.0 | GHSA-hrjv-pf36-jpmr | 2022-08-18T19:01:15Z | 2022-08-18T19:01:15Z | null | [] | oqs's Post-Quantum Key Encapsulation Mechanism SIKE broken | Wouter Castryck and Thomas Decru presented an efficient key recovery attack on the SIDH protocol.
As a result, the secret key of SIKEp751 can be recovered in a matter of hours.
The SIKE and SIDH schemes will be removed from oqs 0.7.2.
[An efficient key recovery attack on SIDH (preliminary version)](https://eprint.iacr... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'oqs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/open-quantum-safe/liboqs-rust/pull/151'}, {'type': 'PACKAGE', 'url': 'https://github.com/open-quantum-safe/liboqs-rust'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0045.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:01:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-q2gp-gph3-88x9 | 2022-09-23T16:30:52Z | 2022-08-06T00:00:42Z | 2022-09-23T16:30:52Z | [] | Keycloak allows arbitrary Javascript to be uploaded for SAML protocol mapper even if UPLOAD_SCRIPTS feature disabled | ## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of [GHSA-wf7g-7h6h-678v]https://github.com/advisories/GHSA-wf7g-7h6h-678v). This link is maintained to preserve external references.
## Original Description
An issue was discovered in Keycloak that allows arbitrary Javascript to be upload... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-saml-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '19.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2668'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-2668'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2115392'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T18:53:18Z', 'nvd_published_at': '2022-08-05T17:15:00Z'} |
1.4.0 | GHSA-v866-gwf5-w92f | 2022-08-30T20:10:31Z | 2022-08-13T00:00:43Z | null | ['CVE-2022-38179'] | JetBrains Ktor before 2.1.0 was vulnerable to a Reflect File Download attack | JetBrains Ktor before 2.1.0 was vulnerable to a Reflect File Download attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.ktor:ktor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38179'}, {'type': 'WEB', 'url': 'https://github.com/ktorio/ktor/pull/3110'}, {'type': 'PACKAGE', 'url': 'https://github.com/ktorio/ktor'}, {'type': 'WEB', 'url': 'https://www.jetbrains.com/privacy-security/issues-fixed/'}] | {'cwe_ids': ['CWE-697'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:10:31Z', 'nvd_published_at': '2022-08-12T10:15:00Z'} |
1.4.0 | GHSA-9xgp-3mxp-rv7x | 2022-09-16T18:42:36Z | 2022-08-29T00:00:33Z | null | ['CVE-2022-3017'] | Froxlor vulnerable to Cross-Site Request Forgery (CSRF) | Cross-Site Request Forgery (CSRF) in GitHub repository froxlor/froxlor prior to 0.10.38. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.38'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3017'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/bbe82286aae21328668f24857995a67598fe978a'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5250c4b1-132b... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:42:36Z', 'nvd_published_at': '2022-08-28T14:15:00Z'} |
1.4.0 | GHSA-chw2-6c7r-37p7 | 2023-03-20T20:09:43Z | 2022-08-25T00:00:27Z | null | ['CVE-2021-43309'] | uri-template-lite Regular Expression Denial of Service | An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the uri-template-lite npm package, when an attacker is able to supply arbitrary input to the "URI.expand" method. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'uri-template-lite'}, 'ecosystem_specific': {'affected_functions': ['URI.expand']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43309'}, {'type': 'WEB', 'url': 'https://github.com/litejs/uri-template-lite/commit/cbeec2b2a275d819fb534137a155df14729706f8'}, {'type': 'PACKAGE', 'url': 'https://github.com/litejs/uri-template-lite'}, {'type': 'WEB', 'url': 'https://github.com/li... | {'cwe_ids': ['CWE-1333', 'CWE-697'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:21:35Z', 'nvd_published_at': '2022-08-24T16:15:00Z'} |
1.4.0 | GHSA-m2fc-9h5m-29cm | 2022-08-12T07:52:50Z | 2022-08-06T00:00:51Z | null | ['CVE-2022-21186'] | @acrontum/filesystem-template vulnerable to Command Injection due to fetchRepo API missing sanitization | The package @acrontum/filesystem-template before 0.0.2 is vulnerable to Arbitrary Command Injection due to the fetchRepo API missing sanitization of the href field of external input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@acrontum/filesystem-template'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21186'}, {'type': 'WEB', 'url': 'https://github.com/acrontum/filesystem-template/issues/13'}, {'type': 'WEB', 'url': 'https://github.com/acrontum/filesystem-template/pull/14/commits/baeb727b60991ad82d9e63ac660883793abc0acc'}, {'type': 'WEB', 'url':... | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T17:20:22Z', 'nvd_published_at': '2022-08-05T05:15:00Z'} |
1.4.0 | GHSA-pfhr-pccp-hwmh | 2022-08-30T20:06:02Z | 2022-08-30T20:06:02Z | null | [] | Network Policies & (Clusterwide) Cilium Network Policies with namespace label selectors may unexpectedly select pods with maliciously crafted labels | ### Impact
If a user has Network Policies with namespace selectors selecting labels of namespaces, or (clusterwide) Cilium Network Policies matching on namespace labels, then it is possible for an attacker with Kubernetes pod deploy rights (either directly or indirectly via higher-level APIs such as Deployment, Daemon... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.13'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'typ... | [{'type': 'WEB', 'url': 'https://github.com/cilium/cilium/security/advisories/GHSA-pfhr-pccp-hwmh'}, {'type': 'PACKAGE', 'url': 'https://github.com/cilium/cilium'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/releases/tag/v1.10.14'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/releases/tag/v1.... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:06:02Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f83q-2cp7-qrjg | 2023-08-08T10:50:07Z | 2022-08-06T05:30:13Z | null | ['CVE-2022-31471'] | untangle vulnerable to Improper Restriction of XML External Entity Reference | ### Description
untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts XML external entity references. By exploiting this vulnerability, a remote unauthenticated attacker may read the contents of local files.
### Impact
An attacker may be able to re... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'untangle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/stchris/untangle/security/advisories/GHSA-f83q-2cp7-qrjg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31471'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/untangle/PYSEC-2022-244.yaml'}, {'type': 'PACKAGE', 'u... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:30:13Z', 'nvd_published_at': '2022-07-26T06:15:00Z'} |
1.4.0 | GHSA-42wq-rch8-6f6j | 2022-08-11T18:08:35Z | 2022-08-06T09:40:43Z | null | ['CVE-2022-31175'] | CKEditor5 cross-site scripting vulnerability caused by the editor instance destroying process | ### Affected packages
@ckeditor/ckeditor5-markdown-gfm
@ckeditor/ckeditor5-html-support
@ckeditor/ckeditor5-html-embed
### Impact
A cross-site scripting vulnerability has been discovered affecting three optional CKEditor 5's packages. The vulnerability allowed to trigger a JavaScript code after fulfilling special cond... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-markdown-gfm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '35.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-html-support'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed'... | [{'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-42wq-rch8-6f6j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31175'}, {'type': 'WEB', 'url': 'https://ckeditor.com/docs/ckeditor5/latest/features/general-html-support.html'}, {'type': 'WEB', 'url': 'https... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:40:43Z', 'nvd_published_at': '2022-08-03T19:15:00Z'} |
1.4.0 | GHSA-4h98-2769-gh6h | 2022-08-18T19:00:43Z | 2022-08-18T19:00:43Z | null | ['CVE-2022-35961'] | OpenZeppelin Contracts vulnerable to ECDSA signature malleability | ### Impact
The functions `ECDSA.recover` and `ECDSA.tryRecover` are vulnerable to a kind of signature malleability due to accepting EIP-2098 compact signatures in addition to the traditional 65 byte signature format. This is only an issue for the functions that take a single `bytes` argument, and not the functions tha... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.7.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed... | [{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-4h98-2769-gh6h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35961'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3610'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-354'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:00:43Z', 'nvd_published_at': '2022-08-15T11:21:00Z'} |
1.4.0 | GHSA-jhjh-776m-4765 | 2022-09-10T02:26:17Z | 2022-08-31T21:25:37Z | null | ['CVE-2022-31152'] | Denial of service due to incorrect application of event authorization rules | ### Impact
The Matrix specification specifies a list of [event authorization rules](https://spec.matrix.org/v1.3/rooms/v10/#authorization-rules) which must be checked when determining if an event should be accepted into a room.
In versions of Synapse up to and including v1.61, some of these rules are not correctly ap... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.62'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-jhjh-776m-4765'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31152'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/13087'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/syna... | {'cwe_ids': ['CWE-703', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-31T21:25:37Z', 'nvd_published_at': '2022-09-02T20:15:00Z'} |
1.4.0 | GHSA-v4hr-4jpx-56gc | 2022-08-06T05:51:50Z | 2022-08-06T05:51:50Z | null | ['CVE-2022-35918'] | Streamlit directory traversal vulnerability | ### Impact
Users hosting Streamlit app(s) that use custom components are vulnerable to a directory traversal attack that could leak data from their web server file-system such as: server logs, world readable files, and potentially other sensitive information.
An attacker can craft a malicious URL with file paths and t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'streamlit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.63.0'}, {'fixed': '1.11.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/streamlit/streamlit/security/advisories/GHSA-v4hr-4jpx-56gc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35918'}, {'type': 'WEB', 'url': 'https://github.com/streamlit/streamlit/commit/80d9979d5f4a00217743d607078a1d867fad8acf'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:51:50Z', 'nvd_published_at': '2022-08-01T22:15:00Z'} |
1.4.0 | GHSA-cm6r-892j-jv2g | 2022-08-18T19:13:34Z | 2022-08-13T00:00:43Z | null | ['CVE-2022-2390'] | Google Play Services SDK leads to apps having incorrectly set mutability flag | Apps developed with Google Play Services SDK incorrectly had the mutability flag set to PendingIntents that were passed to the Notification service. As Google Play services SDK is so widely used, this bug affects many applications. For an application affected, this bug will let the attacker, gain the access to all non-... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.google.android.gms:play-services-basement'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2390'}, {'type': 'WEB', 'url': 'https://developers.google.com/android/guides/releases#may_03_2022'}, {'type': 'WEB', 'url': 'https://mvnrepository.com/artifact/com.google.android.gms/play-services-basement/18.0.2'}] | {'cwe_ids': ['CWE-471'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:13:34Z', 'nvd_published_at': '2022-08-12T11:15:00Z'} |
1.4.0 | GHSA-c558-5gfm-p2r8 | 2022-08-11T17:04:17Z | 2022-08-06T05:46:14Z | null | ['CVE-2022-31191'] | JSPUI spellcheck and autocomplete tools vulnerable to Cross Site Scripting | ### Impact
The JSPUI spellcheck "Did you mean" HTML escapes the data-spell attribute in the link, but not the actual displayed text. Similarly, the JSPUI autocomplete HTML does not properly escape text passed to it. Both are vulnerable to XSS. This vulnerability only impacts the JSPUI.
_This vulnerability does NOT i... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-jspui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '5.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-jspui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0'}, {'fixed': '6.4'}]}]}... | [{'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/security/advisories/GHSA-c558-5gfm-p2r8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31191'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/commit/35030a23e48b5946f5853332c797e1c4adea7bb7'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:46:14Z', 'nvd_published_at': '2022-08-01T21:15:00Z'} |
1.4.0 | GHSA-c438-6f6r-pg8w | 2022-08-18T19:18:55Z | 2022-08-16T00:00:22Z | null | ['CVE-2020-23622'] | 4thline cling uPnP protocol issue can lead to denial of service | An issue in the UPnP protocol in 4thline cling 2.0.0 through 2.1.2 allows remote attackers to cause a denial of service via an unchecked `CALLBACK` parameter in the request header. As of 2022, 4thline cling is no longer supported by the maintainers. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.fourthline.cling:cling-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'last_affected': '2.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23622'}, {'type': 'WEB', 'url': 'https://github.com/4thline/cling/issues/253'}, {'type': 'PACKAGE', 'url': 'https://github.com/4thline/cling'}, {'type': 'WEB', 'url': 'https://zh-cn.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-univ... | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:18:55Z', 'nvd_published_at': '2022-08-15T20:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.