schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-6xf3-5hp7-xqqg
2022-09-27T08:28:17Z
2022-08-25T00:00:28Z
null
['CVE-2022-36633']
Improper token validation leading to code execution in Teleport
Teleport 9.3.6 is vulnerable to Command injection leading to Remote Code Execution. An attacker can craft a malicious ssh agent installation link by URL encoding a bash escape with carriage return line feed. This url encoded payload can be used in place of a token and sent to a user in a social engineering attack. This...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gravitational/teleport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.3.17'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/gravitational/teleport'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fi...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36633'}, {'type': 'WEB', 'url': 'https://github.com/gravitational/teleport/pull/14726'}, {'type': 'WEB', 'url': 'https://github.com/gravitational/teleport/pull/14726/commits/46c23b9b64b944d1e82d2c8a79083f291ffdd3b6'}, {'type': 'PACKAGE', 'url': 'ht...
{'cwe_ids': ['CWE-20', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:53:54Z', 'nvd_published_at': '2022-08-24T13:15:00Z'}
1.4.0
GHSA-8wm5-8h9c-47pc
2022-08-11T21:14:19Z
2022-08-05T00:00:24Z
null
['CVE-2022-25168']
Apache Hadoop argument injection vulnerability
Apache Hadoop's `FileUtil.unTar(File, File)` API does not escape the input file name before being passed to the shell. An attacker can inject arbitrary commands. This is only used in Hadoop 3.3 InMemoryAliasMap.completeBootstrapTransfer, which is only ever run by a local user. It has been used in Hadoop 2.x for yarn lo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.10.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.hadoop:hadoop-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0-a...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25168'}, {'type': 'WEB', 'url': 'https://github.com/apache/hadoop/commit/cae749b076f35f0be13a926ee8cfbb7ce4402746'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hadoop'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/mxqnb39jfrw...
{'cwe_ids': ['CWE-78', 'CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T21:14:19Z', 'nvd_published_at': '2022-08-04T15:15:00Z'}
1.4.0
GHSA-3f89-869f-5w76
2022-08-29T17:34:36Z
2022-08-29T17:34:36Z
null
['CVE-2022-36037']
Cross-site scripting from dynamic options in the multiselect field
### Introduction Cross-site scripting (XSS) is a type of vulnerability that allows to execute any kind of JavaScript code inside the Panel session of the same or other users. In the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim. Such vulnerabilities are cri...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.5.8.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-3f89-869f-5w76'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36037'}, {'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/commit/b5b8863885e17556abc070dde1e20aec15fbfdf5'}, {'type': 'PACKAGE', 'url': 'h...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-29T17:34:36Z', 'nvd_published_at': '2022-08-29T18:15:00Z'}
1.4.0
GHSA-77qm-wvqq-fg79
2022-08-30T20:18:48Z
2022-08-30T20:18:48Z
null
['CVE-2022-36031']
Directus vulnerable to unhandled exception on illegal filename_disk value
The Directus process can be aborted by having an authorized user update the `filename_disk` value to a folder and accessing that file through the `/assets` endpoint. The vulnerability is patched and released in v9.15.0. You can prevent this problem by making sure no (untrusted) non-admin users have permissions to up...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'directus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.15.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/directus/directus/security/advisories/GHSA-77qm-wvqq-fg79'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36031'}, {'type': 'PACKAGE', 'url': 'https://github.com/directus/directus'}]
{'cwe_ids': ['CWE-755'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:18:48Z', 'nvd_published_at': '2022-08-19T21:15:00Z'}
1.4.0
GHSA-qpgc-xh7j-52q8
2022-09-01T22:19:48Z
2022-08-24T00:00:31Z
null
['CVE-2022-25231']
node-opcua DoS vulnerability via message with memory allocation that exceeds v8's memory limit
The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) by sending a specifically crafted OPC UA message with a special OPC UA NodeID, when the requested memory allocation exceeds the v8’s memory limit.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-opcua'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.74.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25231'}, {'type': 'WEB', 'url': 'https://github.com/node-opcua/node-opcua/pull/1182'}, {'type': 'WEB', 'url': 'https://github.com/node-opcua/node-opcua/commit/7b5044b3f5866fbedc3efabd05e407352c07bd2f'}, {'type': 'PACKAGE', 'url': 'https://github.co...
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:19:48Z', 'nvd_published_at': '2022-08-23T05:15:00Z'}
1.4.0
GHSA-jwh2-vrr9-vcp2
2022-08-30T19:53:54Z
2022-08-30T19:53:54Z
null
[]
mz-avro's incorrect use of `set_len` allows for un-initialized memory
Affected versions of this crate passes an uninitialized buffer to a user-provided `Read` implementation. Arbitrary `Read` implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined v...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'mz-avro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/MaterializeInc/materialize/issues/8669'}, {'type': 'PACKAGE', 'url': 'https://github.com/MaterializeInc/materialize'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0138.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T19:53:54Z', 'nvd_published_at': None}
1.4.0
GHSA-xc4w-28g8-vqm5
2022-08-30T20:55:17Z
2022-08-24T00:00:31Z
null
['CVE-2019-25075']
Path Traversal in Gravitee API Management
HTML injection combined with path traversal in the Email service in Gravitee API Management before 1.25.3 allows anonymous users to read arbitrary files via a /management/users/register request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.gravitee.apim:gravitee-api-management'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.25.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25075'}, {'type': 'PACKAGE', 'url': 'https://github.com/gravitee-io/gravitee-api-management'}, {'type': 'WEB', 'url': 'https://medium.com/@maxime.escourbiac/write-up-of-path-traversal-on-gravitee-io-8835941be69f'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:55:17Z', 'nvd_published_at': '2022-08-23T01:15:00Z'}
1.4.0
GHSA-fcpw-vqh5-6qwj
2023-07-13T23:38:08Z
2022-08-17T00:00:17Z
null
['CVE-2020-14320']
Moodle reflected XSS Vulnerability
In Moodle before 3.9.1, 3.8.4 and 3.7.7, the filter in the admin task log required extra sanitizing to prevent a reflected XSS risk.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.9'}, {'fixed': '3.9.1'}]}], 'versions': ['3.9']}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8'}, {'fixed': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14320'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/c6ffe9588ebb02b73c33a09e5d8061f58acc1701'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=407392'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T23:38:08Z', 'nvd_published_at': '2022-08-16T21:15:00Z'}
1.4.0
GHSA-j9xq-j329-2xvg
2022-09-16T18:35:23Z
2022-08-27T00:00:45Z
null
['CVE-2021-3754']
Keycloak user may register themselves with same email ID of any existing user
A flaw was found in keycloak where an attacker is able to register himself with the username same as the email ID of any existing user. This may cause trouble in getting password recovery email in case the user forgets the password.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '19.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3754'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-3754'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1999196'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:35:23Z', 'nvd_published_at': '2022-08-26T16:15:00Z'}
1.4.0
GHSA-v65g-f3cj-fjp4
2022-08-30T20:20:59Z
2022-08-23T00:00:13Z
null
['CVE-2022-1930']
Regular expression denial of service in eth-account
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the eth-account PyPI package, when an attacker is able to supply arbitrary input to the encode_structured_data method
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'eth-account'}, 'ecosystem_specific': {'affected_functions': ['eth_account._utils.structured_data.validation.TYPE_REGEX']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1930'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/eth-account/commit/70f89be700df0d5f08ef696252c88741f8414060'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/eth-account'}, {'type': 'WEB', 'url': 'https://research.jfrog.com/vul...
{'cwe_ids': ['CWE-1333', 'CWE-697'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:20:59Z', 'nvd_published_at': '2022-08-22T19:15:00Z'}
1.4.0
GHSA-p74q-2pf8-j5jx
2022-09-16T18:47:21Z
2022-08-25T00:00:29Z
null
['CVE-2022-37333']
exceedone/exment and exceedone/laravel-admin SQL Injection vulnerability
SQL injection vulnerability in the Exment ((PHP8) exceedone/exment v5.0.2 and earlier and exceedone/laravel-admin v3.0.0 and earlier, (PHP7) exceedone/exment v4.4.2 and earlier and exceedone/laravel-admin v2.2.2 and earlier) allows remote authenticated attackers to execute arbitrary SQL commands.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'exceedone/exment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'exceedone/exment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.3'}]}]}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37333'}, {'type': 'WEB', 'url': 'https://exment.net/docs/#/release_note?id=v503-20220817'}, {'type': 'WEB', 'url': 'https://exment.net/docs/#/weakness/20220817'}, {'type': 'PACKAGE', 'url': 'https://github.com/exceedone/exment'}, {'type': 'WEB', 'u...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:47:21Z', 'nvd_published_at': '2022-08-24T09:15:00Z'}
1.4.0
GHSA-2jq9-6xx7-3h29
2023-06-13T22:08:06Z
2022-08-11T18:10:52Z
null
[]
`temporary` makes use of uninitialized memory
Uninitialized memory is used as a RNG seed in temporary. This has been resolved in the 0.6.4 release. The crate is not intended to be used outside of a testing environment. For a general purpose crate to create temporary directories, [`tempfile`](https://crates.io/crates/tempfile) is an alternative for this crate.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'temporary'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.6.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/stainless-steel/temporary/issues/2'}, {'type': 'PACKAGE', 'url': 'https://github.com/stainless-steel/temporary'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2018-0022.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T18:10:52Z', 'nvd_published_at': None}
1.4.0
GHSA-cv6j-9835-p7fh
2022-09-20T17:10:15Z
2022-08-28T00:00:26Z
null
['CVE-2022-38792']
exotel-py 0.1.6 includes code execution backdoor inserted by a third party
The exotel (aka exotel-py) package in PyPI as of 0.1.6 includes a code execution backdoor inserted by a third party. Users should downgrade to version 0.1.5 to avoid the problem.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'exotel'}, 'versions': ['0.1.6']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38792'}, {'type': 'WEB', 'url': 'https://github.com/sarathsp06/exotel-py/issues/10'}, {'type': 'WEB', 'url': 'https://github.com/jertel/elastalert2/pull/931'}, {'type': 'PACKAGE', 'url': 'https://github.com/sarathsp06/exotel-py'}, {'type': 'WEB', '...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T17:10:15Z', 'nvd_published_at': '2022-08-27T20:15:00Z'}
1.4.0
GHSA-xpp3-xrff-w6rh
2022-08-12T15:31:10Z
2022-08-12T15:31:10Z
null
[]
rocksdb vulnerable to out-of-bounds read
Affected versions of this crate called the RocksDB C API `rocksdb_open_column_families_with_ttl()` with a pointer to a single integer TTL value, but one TTL value for each column family is expected. This is only relevant when using `rocksdb::DBWithThreadMode::open_cf_descriptors_with_ttl()` with multiple column famili...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'rocksdb'}, 'ecosystem_specific': {'affected_functions': ['rocksdb::DBWithThreadMode::open_cf_descriptors_with_ttl']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.19.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rust-rocksdb/rust-rocksdb/pull/616'}, {'type': 'PACKAGE', 'url': 'https://github.com/rust-rocksdb/rust-rocksdb'}, {'type': 'WEB', 'url': 'https://github.com/rust-rocksdb/rust-rocksdb/releases/tag/v0.19.0'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-12T15:31:10Z', 'nvd_published_at': None}
1.4.0
GHSA-739f-hw6h-7wq8
2022-08-10T18:38:16Z
2022-08-10T18:38:16Z
null
['CVE-2022-35930']
PolicyController before 0.2.1 may bypass attestation verification
PolicyController will report a false positive, resulting in an admission when it should not be admitted when: * There is at least one attestation with a valid signature * There are NO attestations of the type being verified (--type defaults to "custom") Users should upgrade to cosign version 0.2.1 or greater for a p...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sigstore/policy-controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sigstore/policy-controller/security/advisories/GHSA-739f-hw6h-7wq8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35930'}, {'type': 'WEB', 'url': 'https://github.com/sigstore/policy-controller/commit/e852af36fb7d42678b21d7e97503c25bd1fd05c8'}, {'typ...
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:38:16Z', 'nvd_published_at': '2022-08-04T22:15:00Z'}
1.4.0
GHSA-8mx2-gqx9-rm7f
2022-08-30T20:50:35Z
2022-08-24T00:00:31Z
null
['CVE-2022-25888']
Uncontrolled Resource Consumption in opcua
The package opcua from 0.0.0 are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sending the F...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'opcua'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25888'}, {'type': 'WEB', 'url': 'https://github.com/locka99/opcua/pull/216'}, {'type': 'WEB', 'url': 'https://github.com/locka99/opcua/pull/216/commits/6fb683c5fec46c6dd347824491c4d93a229da695'}, {'type': 'PACKAGE', 'url': 'https://github.com/locka...
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:50:35Z', 'nvd_published_at': '2022-08-23T05:15:00Z'}
1.4.0
GHSA-c7x2-7h8r-jq4m
2022-09-16T21:07:12Z
2022-08-25T00:00:25Z
null
['CVE-2018-14519']
Kirby CMS 2.5.12 Cross-site Request Forgery
An issue was discovered in Kirby 2.5.12. The delete page functionality suffers from a CSRF flaw. A remote attacker can craft a malicious CSRF page and force the user to delete a page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.5.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14519'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/kirby'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45090'}, {'type': 'WEB', 'url': 'http://zaranshaikh.blogspot.com'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:07:12Z', 'nvd_published_at': '2022-08-24T20:15:00Z'}
1.4.0
GHSA-5c8p-qhch-qhx6
2022-09-01T22:19:29Z
2022-08-27T00:00:44Z
null
['CVE-2021-3427']
Deluge Web-UI vulnerable to XSS through a crafted torrent file
The Deluge Web-UI is vulnerable to cross-site scripting through a crafted torrent file. The the data from torrent files is not properly sanitised as it's interpreted directly as HTML. Someone who supplies the user with a malicious torrent file can execute arbitrary Javascript code in the context of the user's browser s...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'deluge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3427'}, {'type': 'WEB', 'url': 'https://dev.deluge-torrent.org/ticket/3459'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5c8p-qhch-qhx6'}, {'type': 'PACKAGE', 'url': 'https://github.com/deluge-torrent/deluge'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:19:29Z', 'nvd_published_at': '2022-08-26T16:15:00Z'}
1.4.0
GHSA-p4cc-w597-6cpm
2022-09-08T14:13:22Z
2022-08-30T20:38:10Z
null
['CVE-2022-36045']
Cryptographically weak PRNG in `utils.generateUUID`
### In Brief `utils.generateUUID`, a helper function available in essentially all versions of NodeBB (as far back as v1.0.1 and potentially earlier) used a cryptographically insecure Pseudo-random number generator (`Math.random()`), which meant that a specially crafted script combined with multiple invocations of the p...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}]
[{'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-p4cc-w597-6cpm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36045'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/81e3c1ba488d03371a5ce8d0ebb5c5803026e0f9'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-330', 'CWE-338'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:38:10Z', 'nvd_published_at': '2022-08-31T15:15:00Z'}
1.4.0
GHSA-rjvc-mf7r-ch7r
2022-08-30T20:49:28Z
2022-08-22T00:00:49Z
null
['CVE-2022-2885']
Cross site scripting in yetiforce/yetiforce-crm
Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2885'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/a9ad9ee089b575855b9e5e202b4990a15811e8d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:49:28Z', 'nvd_published_at': '2022-08-21T08:15:00Z'}
1.4.0
GHSA-4rg6-fm25-gc34
2022-09-16T19:36:13Z
2022-08-30T00:00:26Z
null
['CVE-2020-26938']
oauth2-server through 3.1.1 vulnerable to Open Redirect
In oauth2-server (aka node-oauth2-server) through 3.1.1, the value of the `redirect_uri` parameter received during the authorization and token request is checked against an incorrect URI pattern (`[a-zA-Z][a-zA-Z0-9+.-]+:`) before making a redirection. This allows a malicious client to pass an XSS payload through the r...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'oauth2-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26938'}, {'type': 'WEB', 'url': 'https://github.com/oauthjs/node-oauth2-server/issues/637'}, {'type': 'PACKAGE', 'url': 'https://github.com/oauthjs/node-oauth2-server'}, {'type': 'WEB', 'url': 'https://github.com/oauthjs/node-oauth2-server/blob/91d...
{'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:36:13Z', 'nvd_published_at': '2022-08-29T21:15:00Z'}
1.4.0
GHSA-hw2p-xqhq-3mjf
2022-08-30T20:21:22Z
2022-08-23T00:00:16Z
null
['CVE-2022-2932']
Cross site scripting in mobiledoc-kit
Cross-site Scripting (XSS) - Reflected in GitHub repository bustle/mobiledoc-kit prior to 0.14.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mobiledoc-kit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2932'}, {'type': 'WEB', 'url': 'https://github.com/bustle/mobiledoc-kit/commit/f3fdaa5352904fd2a0b4247ccb0dbf68aad43b5a'}, {'type': 'PACKAGE', 'url': 'https://github.com/bustle/mobiledoc-kit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2-o...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:21:22Z', 'nvd_published_at': '2022-08-22T14:15:00Z'}
1.4.0
GHSA-qh87-2qvh-5jf8
2022-11-29T21:47:43Z
2022-08-24T00:00:28Z
null
['CVE-2022-38665']
RabbitMQ password stored in plain text by Jenkins CollabNet Plugins Plugin
Jenkins CollabNet Plugins Plugin 2.0.8 and earlier stores a RabbitMQ password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:collabnet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38665'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/collabnet-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-08-23/#SECURITY-2157'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2...
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:47:43Z', 'nvd_published_at': '2022-08-23T17:15:00Z'}
1.4.0
GHSA-cc99-whm5-mmq3
2022-11-28T21:05:48Z
2022-08-27T00:00:44Z
null
['CVE-2021-3563']
Openstack Keystone Incorrect Authorization vulnerability
A flaw was found in openstack-keystone, only the first 72 characters of an application secret are verified allowing attackers bypass some password complexity which administrators may be counting on. The highest threat from this vulnerability is to data confidentiality and integrity. A [patch](https://opendev.org/openst...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'keystone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '21.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3563'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-3563'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/ossa/+bug/1901891'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1962908'}, {'type': ...
{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:08:51Z', 'nvd_published_at': '2022-08-26T16:15:00Z'}
1.4.0
GHSA-fqc7-5xxc-ph7r
2022-09-02T18:06:37Z
2022-08-27T00:00:44Z
null
['CVE-2022-0225']
Keycloak XSS via use of malicious payload as group name when creating new group from admin console
A flaw was found in Keycloak. This flaw allows a privileged attacker to use the malicious payload as the group name while creating a new group from the admin console, leading to a stored Cross-site scripting (XSS) attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '16.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-755v-r4x4-qf7m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0225'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2040268'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/k...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-02T18:06:37Z', 'nvd_published_at': '2022-08-26T18:15:00Z'}
1.4.0
GHSA-32fw-9wq8-9x9c
2022-08-10T18:14:29Z
2022-08-03T00:00:57Z
null
['CVE-2020-28433']
node-latex-pdf is susceptible to command injection
A command injection vulnerability affects all versions of the package node-latex-pdf.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-latex-pdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28433'}, {'type': 'PACKAGE', 'url': 'https://github.com/toolbuddy/node-latex-pdf'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-NODELATEXPDF-1050426'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:14:29Z', 'nvd_published_at': '2022-08-02T14:15:00Z'}
1.4.0
GHSA-4wm8-c2vv-xrpq
2022-08-06T05:46:27Z
2022-08-06T05:46:27Z
null
['CVE-2022-31192']
JSPUI Possible Cross Site Scripting in "Request a Copy" Feature
### Impact The JSPUI "Request a Copy" feature does not properly escape values submitted and stored from the "Request a Copy" form. This means that item requests could be vulnerable to XSS attacks. This vulnerability only impacts the JSPUI. _This vulnerability does NOT impact the XMLUI or 7.x._ ### Patches _DSpace ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-jspui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-jspui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0'}, {'fixed': '6.4'}]}]}...
[{'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/security/advisories/GHSA-4wm8-c2vv-xrpq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31192'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/commit/28eb8158210d41168a62ed5f9e044f754513bc37'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:46:27Z', 'nvd_published_at': '2022-08-01T21:15:00Z'}
1.4.0
GHSA-vjxv-45g9-9296
2022-08-10T18:40:38Z
2022-08-10T18:40:38Z
null
['CVE-2022-35929']
cosign's `cosign verify-attestaton --type` can report a false positive if any attestation exists
`cosign verify-attestation` used with the `--type` flag will report a false positive verification when: - There is at least one attestation with a valid signature - There are NO attestations of the type being verified (--type defaults to "custom") This can happen when signing with a standard keypair and with "keyless...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sigstore/cosign'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sigstore/cosign/security/advisories/GHSA-vjxv-45g9-9296'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35929'}, {'type': 'WEB', 'url': 'https://github.com/sigstore/cosign/commit/c5fda01a8ff33ca981f45a9f13e7fb6bd2080b94'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:40:38Z', 'nvd_published_at': '2022-08-04T19:15:00Z'}
1.4.0
GHSA-j47c-j42c-mwqq
2022-08-06T05:39:18Z
2022-08-06T05:39:18Z
null
['CVE-2022-35917']
Solana Pay Vulnerable to Weakness in Transfer Validation Logic
### Description When a Solana Pay transaction is located using a [reference key](https://github.com/solana-labs/solana-pay/blob/master/SPEC.md#reference), it may be checked to represent a transfer of the desired amount to the recipient, using the supplied [`validateTransfer` function](https://github.com/solana-labs/sol...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@solana/pay'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.2.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/solana-labs/solana-pay/security/advisories/GHSA-j47c-j42c-mwqq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35917'}, {'type': 'WEB', 'url': 'https://github.com/solana-labs/solana-pay/commit/ac6ce0d0a81137700874a8bf5a7caac3be999fad'}, {'type': 'PAC...
{'cwe_ids': ['CWE-670'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:39:18Z', 'nvd_published_at': '2022-08-01T22:15:00Z'}
1.4.0
GHSA-rff2-vqm3-jpv5
2022-09-16T18:49:13Z
2022-08-30T00:00:29Z
null
['CVE-2022-3035']
snipe-it vulnerable to cross-site scripting (XSS)
Cross-site Scripting (XSS) - Stored in GitHub repository snipe/snipe-it prior to v6.0.11.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3035'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/9cf5f30c77df6ab60baab1c0e6bb0b4e773f0eae'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0bbb1046-ea9e-4...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:49:13Z', 'nvd_published_at': '2022-08-29T20:15:00Z'}
1.4.0
GHSA-cc8c-26rj-v2vx
2023-01-27T00:02:22Z
2022-08-06T00:00:47Z
null
['CVE-2016-3098']
administrate vulnerable to Cross-Site Request Forgery
Cross-site request forgery (CSRF) vulnerability in administrate 0.1.4 and earlier allows remote attackers to hijack the user's OAuth autorization code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'administrate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-3098'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/administrate/CVE-2016-3098.yml'}, {'type': 'PACKAGE', 'url': 'https://github.com/thoughtbot/administrate'}, {'type': 'WEB', 'url': 'https://seclists.org/os...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-27T00:02:22Z', 'nvd_published_at': '2022-08-05T16:15:00Z'}
1.4.0
GHSA-pw4j-r69m-rrr5
2022-08-18T19:08:36Z
2022-08-13T00:00:25Z
null
['CVE-2022-35590']
ForkCMS XSS via `end_date` parameter
A cross-site scripting (XSS) issue in the ForkCMS version 5.9.3 allows remote attackers to inject JavaScript via the `end_date` Parameter. This issue was patched in version 5.11.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35590'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/76bf739e01f697e10c1277b9726e39b9705be296'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4-other-fork...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:08:36Z', 'nvd_published_at': '2022-08-12T16:15:00Z'}
1.4.0
GHSA-78f9-745f-278p
2022-08-12T15:38:33Z
2022-08-12T15:38:33Z
null
['CVE-2022-37423']
Neo4j Graph apoc plugins Partial Path Traversal Vulnerability
### Impact A partial Directory Traversal Vulnerability found in `apoc.log.stream` function of apoc plugins in Neo4j Graph database. This issue allows a malicious actor to potentially break out of the expected directory. The impact is limited to sibling directories. For example, `userControlled.getCanonicalPath().start...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0.0'}, {'fixed': '4.4.0.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.neo4j.procedure:apoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4....
[{'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/security/advisories/GHSA-78f9-745f-278p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37423'}, {'type': 'WEB', 'url': 'https://github.com/neo4j-contrib/neo4j-apoc-procedures/pull/3080'}, {'type': 'WEB', 'url': 'h...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-12T15:38:33Z', 'nvd_published_at': '2022-08-12T15:15:00Z'}
1.4.0
GHSA-65wf-qm95-6mhm
2022-08-18T19:10:40Z
2022-08-13T00:00:25Z
null
['CVE-2022-35587']
ForkCMS XSS via `publish_on_date` parameter
A cross-site scripting (XSS) issue in the Fork version 5.9.3 allows remote attackers to inject JavaScript via the `publish_on_date` Parameter. This issue was patched in version 5.11.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35587'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/76bf739e01f697e10c1277b9726e39b9705be296'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6-other-fork...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:10:40Z', 'nvd_published_at': '2022-08-12T16:15:00Z'}
1.4.0
GHSA-3fg9-hcq5-vxrc
2022-08-30T19:55:41Z
2022-08-30T19:55:41Z
null
[]
iana-time-zone vulnerable to use after free in MacOS / iOS implementation
In iana-time-zone v0.1.43 a use-after-free bug in the MacOS / iOS implementation was introduced. The copied system time zone was released before its name was copied. If the system time zone was changed between the call of `CFRelease` and `str::to_owned()`, random memory would be copied.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'iana-time-zone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.43'}, {'fixed': '0.1.45'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/strawlab/iana-time-zone/pull/54'}, {'type': 'PACKAGE', 'url': 'https://github.com/strawlab/iana-time-zone'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0049.html'}]
{'cwe_ids': ['CWE-416'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T19:55:41Z', 'nvd_published_at': None}
1.4.0
GHSA-325v-g5vx-whxc
2022-09-16T17:41:56Z
2022-08-31T00:00:19Z
null
['CVE-2022-36746']
LibreNMS vulnerable to Cross-Site Scripting (XSS)
LibreNMS version 22.6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component oxidized-cfg-check.inc.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 22.6.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36746'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/14126'}, {'type': 'PACKAGE', 'url': 'https://github.com/librenms/librenms'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:41:56Z', 'nvd_published_at': '2022-08-30T22:15:00Z'}
1.4.0
GHSA-2cg4-7q4x-7rr2
2022-08-15T20:08:52Z
2022-08-11T00:00:21Z
null
['CVE-2022-25973']
mc-kill-port vulnerable to Arbitrary Command Execution via kill function
All versions of package mc-kill-port are vulnerable to Arbitrary Command Execution via the `kill` function, due to missing sanitization of the `port` argument.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mc-kill-port'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25973'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-MCKILLPORT-2419070'}, {'type': 'WEB', 'url': 'https://www.npmjs.com/package/mc-kill-port'}]
{'cwe_ids': ['CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T21:15:25Z', 'nvd_published_at': '2022-08-10T05:15:00Z'}
1.4.0
GHSA-5229-94p3-7wwq
2022-09-16T20:26:47Z
2022-08-31T00:00:19Z
null
['CVE-2022-36745']
LibreNMS vulnerable to Cross-Site Scripting (XSS)
LibreNMS version 22.6.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component print-customoid.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36745'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/14126'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/e5c91a0f835d59e058d9d3e4956e079476d59ee6'}, {'type': 'WEB', 'url': 'https://community.librenms.o...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T20:26:47Z', 'nvd_published_at': '2022-08-30T22:15:00Z'}
1.4.0
GHSA-7527-8855-9cf8
2022-09-08T14:16:39Z
2022-08-26T00:03:30Z
null
['CVE-2022-2255']
Incorrect header handling in mod-wsgi
A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mod-wsgi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2255'}, {'type': 'WEB', 'url': 'https://github.com/GrahamDumpleton/mod_wsgi/commit/af3c0c2736bc0b0b01fa0f0aad3c904b7fa9c751'}, {'type': 'PACKAGE', 'url': 'https://github.com/GrahamDumpleton/mod_wsgi'}, {'type': 'WEB', 'url': 'https://github.com/Gra...
{'cwe_ids': ['CWE-345'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:55:04Z', 'nvd_published_at': '2022-08-25T18:15:00Z'}
1.4.0
GHSA-h9mh-mgpv-gqmv
2022-08-30T20:20:47Z
2022-08-22T00:00:48Z
null
['CVE-2022-34916']
Remote code execution in Apache Flume
Apache Flume versions 1.4.0 through 1.10.0 are vulnerable to a remote code execution (RCE) attack when a configuration uses a JMS Source with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI to allow only the use of the java protocol or no protocol...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.flume.flume-ng-sources:flume-jms-source'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34916'}, {'type': 'WEB', 'url': 'https://github.com/apache/flume/commit/7fe9af49c485756e1b618493a5bc00b70d7fbd2d'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/flume'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/FLUME-3...
{'cwe_ids': ['CWE-20', 'CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:20:47Z', 'nvd_published_at': '2022-08-21T09:15:00Z'}
1.4.0
GHSA-28w4-h56g-grg7
2022-11-28T22:08:00Z
2022-08-24T00:00:28Z
null
['CVE-2022-38664']
Cross-site Scripting in Jenkins Job Configuration History Plugin
Jenkins Job Configuration History Plugin 1165.v8cc9fd1f4597 and earlier does not escape the job name on the System Configuration History page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure job names.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jobConfigHistory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1166.vc9f255f45b'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1165.v8cc9fd1f4597'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38664'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/job-config-history-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-08-23/#SECURITY-2765'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-s...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-28T22:08:00Z', 'nvd_published_at': '2022-08-23T17:15:00Z'}
1.4.0
GHSA-mv48-hcvh-8jj8
2022-08-30T20:17:43Z
2022-08-19T00:00:20Z
null
['CVE-2022-35204']
Vitejs Vite before v2.9.13 vulnerable to directory traversal via crafted URL to victim's service
Vitejs Vite before v2.9.13 was discovered to allow attackers to perform a directory traversal via a crafted URL to the victim's service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'vite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35204'}, {'type': 'WEB', 'url': 'https://github.com/vitejs/vite/issues/8498'}, {'type': 'PACKAGE', 'url': 'https://github.com/vitejs/vite'}, {'type': 'WEB', 'url': 'https://github.com/vitejs/vite/releases/tag/v2.9.13'}, {'type': 'WEB', 'url': 'http...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:17:43Z', 'nvd_published_at': '2022-08-18T19:15:00Z'}
1.4.0
GHSA-v456-chpw-6mmw
2022-08-18T19:15:54Z
2022-08-10T00:00:31Z
null
['CVE-2022-35724']
Apache Avro Rust SDK vulnerable to reader looping in cycle endlessly, consuming CPU
It is possible to provide data to be read that leads the reader to loop in cycles endlessly, consuming CPU. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'apache-avro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35724'}, {'type': 'PACKAGE', 'url': 'https://github.com/a0x8o/avro'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/771z1nwrpkn1ovmyfb2fm65mchdxgy7p'}]
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:15:54Z', 'nvd_published_at': '2022-08-09T07:15:00Z'}
1.4.0
GHSA-9hmc-87h4-w869
2022-08-18T19:08:18Z
2022-08-13T00:00:25Z
null
['CVE-2022-35585']
ForkCMS stored XSS via `start_date` parameter
A stored cross-site scripting (XSS) issue in the ForkCMS version 5.9.3 allows remote attackers to inject JavaScript via the `start_date` Parameter. This issue was patched in version 5.11.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35585'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/76bf739e01f697e10c1277b9726e39b9705be296'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5-other-fork...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:08:18Z', 'nvd_published_at': '2022-08-12T16:15:00Z'}
1.4.0
GHSA-6hcj-qrw3-m66q
2022-08-10T15:57:45Z
2022-08-02T00:00:25Z
null
['CVE-2022-2589']
Fava before 1.22.3 vulnerable to reflected cross-site scripting
Fava before 1.22.3 is vulnerable to reflected cross-site scripting due to improper validation on filter conversion.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'fava'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2589'}, {'type': 'WEB', 'url': 'https://github.com/beancount/fava/commit/68bbb6e39319deb35ab9f18d0b6aa9fa70472539'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-6hcj-qrw3-m66q'}, {'type': 'PACKAGE', 'url': 'https://github.com/be...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T15:57:45Z', 'nvd_published_at': '2022-08-01T15:15:00Z'}
1.4.0
GHSA-95rf-557x-44g5
2022-08-18T18:49:44Z
2022-08-06T00:00:46Z
null
['CVE-2022-2053']
Undertow vulnerable to Dos via Large AJP request
When a POST request comes through AJP and the request exceeds the max-post-size limit (maxEntitySize), Undertow's AjpServerRequestConduit implementation closes a connection without sending any response to the client/proxy. This behavior results in that a front-end proxy marking the backend worker (application server) a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.19.Final'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0.Alpha1'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2053'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/pull/1350'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2095862&comment#0'}, {'type': 'PACKAGE', 'url': 'https://github.com/undertow-io/undertow'}, {'t...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T18:49:44Z', 'nvd_published_at': '2022-08-05T16:15:00Z'}
1.4.0
GHSA-f92v-grc2-w2fg
2022-08-18T19:04:47Z
2022-08-18T19:04:47Z
null
['CVE-2022-35936']
Ethermint vulnerable to DoS through unintended Contract Selfdestruct
# Vulnerability Report ## Impact Smart contract applications that make use of the `selfdestruct` functionality and their end-users. ## Classification The vulnerability has been classified as `high` with a CVSS score of `8.2`. It has the potential to create a denial-of-service to all contracts that can invoke the [`...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/evmos/ethermint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.18.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.17.2'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/evmos/evmos'}, 'ranges': [{'type'...
[{'type': 'WEB', 'url': 'https://github.com/evmos/ethermint/security/advisories/GHSA-f92v-grc2-w2fg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35936'}, {'type': 'WEB', 'url': 'https://github.com/evmos/ethermint/commit/144741832007a26dbe950512acbda4ed95b2a451'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:04:47Z', 'nvd_published_at': '2022-08-05T13:15:00Z'}
1.4.0
GHSA-5vrc-7jfr-4642
2022-08-14T00:24:25Z
2022-08-03T00:00:56Z
null
['CVE-2020-28423']
monorepo-build Command Injection vulnerability
A command injection vulnerability affects all versions of package monorepo-build.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'monorepo-build'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28423'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-MONOREPOBUILD-1050392'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-14T00:24:25Z', 'nvd_published_at': '2022-08-02T14:15:00Z'}
1.4.0
GHSA-h3w2-qg2r-c7mf
2022-09-16T21:01:55Z
2022-08-25T00:00:25Z
null
['CVE-2018-14520']
Kirby CMS 2.5.12 Cross-site Scripting
An issue was discovered in Kirby 2.5.12. The application allows malicious HTTP requests to be sent in order to trick a user into adding web pages.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.5.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-14520'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/kirby'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/45068'}, {'type': 'WEB', 'url': 'http://zaranshaikh.blogspot.com/2018/07/cross-site-request-forgery-kirby-cms.html...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:01:55Z', 'nvd_published_at': '2022-08-24T20:15:00Z'}
1.4.0
GHSA-7xr3-6ggc-wc9p
2023-08-08T10:45:34Z
2022-08-06T05:30:56Z
null
['CVE-2022-33977']
untangle vulnerable to XML Entity Expansion
### Impact An attacker may be able to cause a denial-of-service (DoS) condition on the server on which the product is running. This affects untangle versions up to and including 1.2.0 ### Patches The problem has been fixed with version 1.2.1 ### Workarounds None ### References https://jvn.jp/en/jp/JVN30454777/ ### ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'untangle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/stchris/untangle/security/advisories/GHSA-7xr3-6ggc-wc9p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33977'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/untangle/PYSEC-2022-243.yaml'}, {'type': 'PACKAGE', 'u...
{'cwe_ids': ['CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:30:56Z', 'nvd_published_at': '2022-07-26T06:15:00Z'}
1.4.0
GHSA-xv7h-95r7-595j
2022-08-30T20:24:22Z
2022-08-23T00:00:17Z
null
['CVE-2021-3513']
Incorrect implementation of lockout feature in Keycloak
A flaw was found in keycloak where a brute force attack is possible even when the permanent lockout feature is enabled. This is due to a wrong error message displayed when wrong credentials are entered. The highest threat from this vulnerability is to confidentiality.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3513'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/pull/7976'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-3513'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1953439'}, {'type'...
{'cwe_ids': ['CWE-209', 'CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:24:22Z', 'nvd_published_at': '2022-08-22T15:15:00Z'}
1.4.0
GHSA-xv97-c62v-4587
2022-08-11T22:13:10Z
2022-08-02T18:00:33Z
null
['CVE-2022-35924']
NextAuth.js before 4.10.3 and 3.29.10 sending verification requests (magic link) to unwanted emails
### Impact `next-auth` users who are using the `EmailProvider` either in versions before `4.10.3` or `3.29.10` are affected. If an attacker could forge a request that sent a comma-separated list of emails (eg.: `attacker@attacker.com,victim@victim.com`) to the sign-in endpoint, NextAuth.js would send emails to both th...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.29.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-xv97-c62v-4587'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35924'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/commit/afb1fcdae3cc30445038ef588e491d139b916003'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-20', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-02T18:00:33Z', 'nvd_published_at': '2022-08-02T18:15:00Z'}
1.4.0
GHSA-qrjv-rf5q-qpxc
2022-08-06T05:20:00Z
2022-08-06T05:20:00Z
null
['CVE-2022-35922']
Rust-WebSocket memory allocation based on untrusted length
## Impact Untrusted websocket connections can cause an out-of-memory (OOM) process abort in a client or a server. The root cause of the issue is during dataframe parsing. Affected versions would allocate a buffer based on the declared dataframe size, which may come from an untrusted source. When `Vec::with_capacity` fa...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'websocket'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.26.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/websockets-rs/rust-websocket/security/advisories/GHSA-qrjv-rf5q-qpxc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35922'}, {'type': 'WEB', 'url': 'https://github.com/websockets-rs/rust-websocket/commit/cbf6e9983e839d2ecad86de8cd1b3f20ed43390b'}, {...
{'cwe_ids': ['CWE-119', 'CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:20:00Z', 'nvd_published_at': '2022-08-01T22:15:00Z'}
1.4.0
GHSA-vc68-6x72-w22f
2023-09-11T22:58:56Z
2022-08-05T00:00:23Z
null
['CVE-2022-35144']
Raneto vulnerable to Cross-site Scripting
Renato v0.17.0 was discovered to contain a cross-site scripting (XSS) vulnerability. This issue is fixed in version 0.17.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'raneto'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.17.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35144'}, {'type': 'WEB', 'url': 'https://github.com/ryanlelek/Raneto/pull/370'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/definitions/79.html'}, {'type': 'WEB', 'url': 'https://gainsec.com/2022/08/04/cve-2022-35142-cve-2022-35143-cve-2022...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:06:58Z', 'nvd_published_at': '2022-08-04T20:15:00Z'}
1.4.0
GHSA-q6h8-qjjc-j8cg
2022-09-16T18:33:32Z
2022-08-29T20:06:55Z
null
['CVE-2022-36573']
Pagekit CMS cross-site scripting in Markdown text box where articles are edited
A cross-site scripting (XSS) vulnerability in Pagekit CMS v1.0.18 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Markdown text box under /blog/post/edit.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pagekit/pagekit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36573'}, {'type': 'WEB', 'url': 'https://github.com/pagekit/pagekit/issues/968'}, {'type': 'PACKAGE', 'url': 'https://github.com/pagekit/pagekit'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:33:32Z', 'nvd_published_at': '2022-08-29T00:15:00Z'}
1.4.0
GHSA-3w5g-989p-35r8
2022-08-18T19:14:55Z
2022-08-10T00:00:31Z
null
['CVE-2022-36125']
Apache Avro Rust SDK corrupted data read can cause crash
It is possible to crash (panic) an application by providing a corrupted data to be read. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'apache-avro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36125'}, {'type': 'PACKAGE', 'url': 'https://github.com/a0x8o/avro'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/t1r5xz0pvhm4tosqopjpj6dz8zlsht07'}]
{'cwe_ids': ['CWE-190', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:14:55Z', 'nvd_published_at': '2022-08-09T07:15:00Z'}
1.4.0
GHSA-4hr4-pjjh-2q2w
2022-08-30T20:51:43Z
2022-08-24T00:00:31Z
null
['CVE-2022-21208']
Uncontrolled Resource Consumption in node-opcua
The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) due to a missing limitation on the number of received chunks - per single session or in total for all concurrent sessions. An attacker can exploit this vulnerability by sending an unlimited number of huge chunks (e.g. 2GB each) without sendi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-opcua'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.74.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21208'}, {'type': 'WEB', 'url': 'https://github.com/node-opcua/node-opcua/pull/1149'}, {'type': 'WEB', 'url': 'https://github.com/node-opcua/node-opcua/commit/33ca3bab4ab781392a2f8d8f5a14de9a0aa0e410'}, {'type': 'WEB', 'url': 'https://github.com/no...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:51:43Z', 'nvd_published_at': '2022-08-23T05:15:00Z'}
1.4.0
GHSA-qhxv-296x-hjv7
2022-09-16T19:35:05Z
2022-08-29T20:06:55Z
null
['CVE-2022-25644']
@pendo324/get-process-by-name are vulnerable to Arbitrary Code Execution
All versions of package @pendo324/get-process-by-name are vulnerable to Arbitrary Code Execution due to improper sanitization of getProcessByName function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@pendo324/get-process-by-name'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25644'}, {'type': 'PACKAGE', 'url': 'https://github.com/pendo324/get-process-by-name-js'}, {'type': 'WEB', 'url': 'https://github.com/pendo324/get-process-by-name-js/blob/34e8a279a94fa23acb13e302e9516ab1ea8d8731/index.js%23L27-L28'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:35:05Z', 'nvd_published_at': '2022-08-29T05:15:00Z'}
1.4.0
GHSA-q4qv-3x58-rxmh
2022-08-18T19:09:10Z
2022-08-13T00:00:25Z
null
['CVE-2022-35589']
ForkCMS XSS via `publish_on_time` parameter
A cross-site scripting (XSS) issue in the Fork version 5.9.3 allows remote attackers to inject JavaScript via the `publish_on_time` Parameter. This issue was patched in version 5.11.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35589'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/76bf739e01f697e10c1277b9726e39b9705be296'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7-other-fork...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:09:10Z', 'nvd_published_at': '2022-08-12T16:15:00Z'}
1.4.0
GHSA-hccx-cg4v-hrjx
2022-08-30T19:56:48Z
2022-08-13T00:00:43Z
null
['CVE-2022-38180']
JetBrain Ktor before 2.1.0 vulnerable to selection of wrong authentication provider
In JetBrains Ktor before 2.1.0 the wrong authentication provider could be selected in some cases
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.ktor:ktor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38180'}, {'type': 'WEB', 'url': 'https://github.com/ktorio/ktor/pull/3092'}, {'type': 'PACKAGE', 'url': 'https://github.com/ktorio/ktor'}, {'type': 'WEB', 'url': 'https://www.jetbrains.com/privacy-security/issues-fixed/'}]
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T19:56:48Z', 'nvd_published_at': '2022-08-12T10:15:00Z'}
1.4.0
GHSA-6qv6-q77g-7qm6
2022-09-08T14:26:34Z
2022-08-31T22:29:27Z
null
['CVE-2022-34668']
NVFLARE unsafe deserialization due to Pickle
### Impact NVFLARE contains a vulnerability where deserialization of Untrusted Data due to Pickle usage may allow an unprivileged network attacker to cause Remote Code Execution, Denial Of Service, and Impact to both Confidentiality and Integrity. All versions before 2.1.4 are affected. CVSS Score = 9.8 [AV:N/AC...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'nvflare'}, 'ecosystem_specific': {'affected_functions': ['nvflare.apis.dxo.DXO.to_bytes', 'nvflare.apis.dxo.from_bytes']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/NVIDIA/NVFlare/security/advisories/GHSA-6qv6-q77g-7qm6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34668'}, {'type': 'WEB', 'url': 'https://github.com/NVIDIA/NVFlare/commit/6cde16f3f4711583ae4d896dfcc125d25c7d5b0d'}, {'type': 'PACKAGE', 'url': 'h...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-31T22:29:27Z', 'nvd_published_at': '2022-08-29T03:15:00Z'}
1.4.0
GHSA-fwv4-6mxc-x5h3
2022-09-16T19:37:53Z
2022-08-29T20:06:55Z
null
['CVE-2022-25921']
morgan-json vulnerable to Arbitrary Code Execution
All versions of package morgan-json are vulnerable to Arbitrary Code Execution due to missing sanitization of input passed to the `Function` constructor.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'morgan-json'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25921'}, {'type': 'PACKAGE', 'url': 'https://github.com/indexzero/morgan-json'}, {'type': 'WEB', 'url': 'https://github.com/indexzero/morgan-json/blob/3a76010215a4256d41687d082cd66c4f00ea5717/index.js%23L46'}, {'type': 'WEB', 'url': 'https://securi...
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:37:53Z', 'nvd_published_at': '2022-08-29T05:15:00Z'}
1.4.0
GHSA-c2j7-66m3-r4ff
2022-08-06T05:39:46Z
2022-08-06T05:39:46Z
null
['CVE-2022-31189']
JSPUI's "Internal System Error" page prints exceptions and stack traces without sanitization
### Impact When an "Internal System Error" occurs in the JSPUI, then entire exception (including stack trace) is available. Information in this stacktrace may be useful to an attacker in launching a more sophisticated attack. This vulnerability only impacts the JSPUI. _This vulnerability does NOT impact the XMLUI or ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-jspui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '6.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3'}}]
[{'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/security/advisories/GHSA-c2j7-66m3-r4ff'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31189'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/commit/afcc6c3389729b85d5c7b0230cbf9aaf7452f31a'}, {'type': 'PACKAGE', 'url': 'htt...
{'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:39:46Z', 'nvd_published_at': '2022-08-01T21:15:00Z'}
1.4.0
GHSA-j259-6c58-9m58
2022-08-11T21:13:43Z
2022-08-11T21:13:43Z
null
['CVE-2022-35942']
loopback-connector-postgresql Vulnerable to Improper Sanitization of `contains` Filter
Improper input validation on the `contains` LoopBack filter may allow for arbitrary SQL injection. ### Impact When the extended filter property `contains` is permitted to be interpreted by the Postgres connector, it is possible to inject arbitrary SQL which may affect the confidentiality and integrity of data stored ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'loopback-connector-postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.5.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/loopbackio/loopback-connector-postgresql/security/advisories/GHSA-j259-6c58-9m58'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35942'}, {'type': 'WEB', 'url': 'https://github.com/loopbackio/loopback-connector-postgresql/commit/d57406c6737692a3a106b...
{'cwe_ids': ['CWE-20', 'CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T21:13:43Z', 'nvd_published_at': '2022-08-12T23:15:00Z'}
1.4.0
GHSA-rh4r-9689-6xw4
2022-09-16T18:42:12Z
2022-08-29T20:06:52Z
null
['CVE-2022-37059']
Subrion CMS 4.2.1 vulnerable to cross-site scripting in admin panel
Cross Site Scripting (XSS) in the Admin Panel of Subrion CMS 4.2.1 allows attacker to inject arbitrary code via the Login Field.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37059'}, {'type': 'WEB', 'url': 'https://drive.google.com/file/d/1lmU8zuyzyC9LHFXuXzamnkcLcjcfs0xE/view?usp=sharing'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:42:12Z', 'nvd_published_at': '2022-08-29T13:15:00Z'}
1.4.0
GHSA-wcm8-86x6-8mv3
2022-08-30T20:05:09Z
2022-08-10T00:00:31Z
null
['CVE-2022-36124']
Apache Avro Rust SDK's Reader could consume memory beyond allowed constraints
It is possible for a Reader to consume memory beyond the allowed constraints and thus lead to out of memory on the system. This issue affects Rust applications using Apache Avro Rust SDK prior to 0.14.0 (previously known as avro-rs). Users should update to apache-avro version 0.14.0 which addresses this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'apache-avro'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.14.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36124'}, {'type': 'PACKAGE', 'url': 'https://github.com/a0x8o/avro'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/kj429rzo1xxjgz058qqqg0y7c0p512zo'}]
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:05:09Z', 'nvd_published_at': '2022-08-09T07:15:00Z'}
1.4.0
GHSA-7pwq-f4pq-78gm
2022-08-11T15:43:35Z
2022-08-11T15:43:35Z
null
[]
`rustdecimal` is a malicious crate
The Rust Security Response WG and the crates.io team [were notified][1] on 2022-05-02 of the existence of the malicious crate `rustdecimal`, which contained malware. The crate name was intentionally similar to the name of the popular [`rust_decimal`][2] crate, hoping that potential victims would misspell its name (an a...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'rustdecimal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/paupino/rust-decimal/issues/514#issuecomment-1115408888'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/rustlang-security-announcements/c/5DVtC8pgJLw?pli=1'}, {'type': 'WEB', 'url': 'https://raw.globalsecuritydatabase.org/GSD-2022-1002520'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:43:35Z', 'nvd_published_at': None}
1.4.0
GHSA-56x4-j7p9-fcf9
2022-08-30T20:31:21Z
2022-08-30T20:31:21Z
null
[]
Command Injection in moment-timezone
### Impact All versions of moment-timezone from 0.1.0 contain build tasks vulnerable to command injection. * if Alice uses tzdata pipeline to package moment-timezone on her own (for example via `grunt data:2014d`, where `2014d` stands for the version of the tzdata to be used from IANA's website), * and Alice let's Ma...
[]
[{'package': {'ecosystem': 'npm', 'name': 'moment-timezone'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'fixed': '0.5.35'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/moment/moment-timezone/security/advisories/GHSA-56x4-j7p9-fcf9'}, {'type': 'WEB', 'url': 'https://github.com/moment/moment-timezone/commit/ce955a301ff372e8e9fb3a5b516620c60e7a082a'}, {'type': 'PACKAGE', 'url': 'https://github.com/moment/moment-timezone'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:31:21Z', 'nvd_published_at': None}
1.4.0
GHSA-jw36-hf63-69r9
2023-02-15T15:38:06Z
2022-08-04T00:00:26Z
null
['CVE-2022-35737']
`libsqlite3-sys` via C SQLite improperly validates array index
SQLite 1.0.12 through 3.39.x before 3.39.2 sometimes allows an array-bounds overflow if billions of bytes are used in a string argument to a C API.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'libsqlite3-sys'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.25.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35737'}, {'type': 'WEB', 'url': 'https://blog.trailofbits.com/2022/10/25/sqlite-vulnerability-july-2022-library-api/'}, {'type': 'PACKAGE', 'url': 'https://github.com/rusqlite/rusqlite'}, {'type': 'WEB', 'url': 'https://kb.cert.org/vuls/id/720344'}...
{'cwe_ids': ['CWE-129'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-02-15T15:38:06Z', 'nvd_published_at': '2022-08-03T06:15:00Z'}
1.4.0
GHSA-h864-m8vm-3xvj
2022-08-18T19:06:39Z
2022-08-18T19:06:39Z
null
[]
oqs's Post-Quantum Signature scheme Rainbow level I parametersets broken
Ward Beullens found a practical key-recovery attack against Rainbow. The level I parametersets are removed from liboqs starting from version `0.7.2`. Find the scientific details in [Breaking Rainbow Takes a Weekend on a Laptop](https://eprint.iacr.org/2022/214). This means all the `oqs::sig::Algorithm::RainbowI*` vari...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'oqs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}]
[{'type': 'PACKAGE', 'url': 'https://github.com/open-quantum-safe/liboqs-rust'}, {'type': 'WEB', 'url': 'https://groups.google.com/a/list.nist.gov/g/pqc-forum/c/KFgw5_qCXiI?pli=1'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0047.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:06:39Z', 'nvd_published_at': None}
1.4.0
GHSA-gf8c-j759-86mg
2022-09-01T22:22:33Z
2022-08-25T00:00:27Z
null
['CVE-2021-4040']
org.apache.activemq:artemis-core-client Vulnerable to Out-of-Bounds Write
A flaw was found in AMQ Broker. This issue can cause a partial interruption to the availability of AMQ Broker via an Out of memory (OOM) condition. This flaw allows an attacker to partially disrupt availability to the broker through a sustained attack of maliciously crafted messages. The highest threat from this vulner...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.activemq:artemis-core-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.19.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4040'}, {'type': 'WEB', 'url': 'https://github.com/apache/activemq-artemis/pull/3862'}, {'type': 'WEB', 'url': 'https://github.com/apache/activemq-artemis/pull/3871'}, {'type': 'WEB', 'url': 'https://github.com/apache/activemq-artemis/pull/3871/com...
{'cwe_ids': ['CWE-400', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:22:33Z', 'nvd_published_at': '2022-08-24T16:15:00Z'}
1.4.0
GHSA-p6mm-27gq-9v3p
2022-08-06T05:29:45Z
2022-08-06T05:29:45Z
null
['CVE-2022-31186']
next-auth before v4.10.2 and v3.29.9 leaks excessive information into log
### Impact An information disclosure vulnerability in `next-auth` before `v4.10.2` and `v3.29.9` allows an attacker with log access privilege to obtain excessive information such as an identity provider's secret in the log (which is thrown during OAuth error handling) and use it to leverage further attacks on the syste...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.29.9'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.10.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-p6mm-27gq-9v3p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31186'}, {'type': 'PACKAGE', 'url': 'https://github.com/nextauthjs/next-auth'}, {'type': 'WEB', 'url': 'https://next-auth.js.org/configuratio...
{'cwe_ids': ['CWE-532'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:29:45Z', 'nvd_published_at': '2022-08-01T20:15:00Z'}
1.4.0
GHSA-xrc4-737v-9q75
2022-08-18T18:48:41Z
2022-08-18T18:48:41Z
null
['CVE-2022-31198']
OpenZeppelin Contracts's GovernorVotesQuorumFraction updates to quorum may affect past defeated proposals
### Impact This issue concerns instances of Governor that use the module `GovernorVotesQuorumFraction`, a mechanism that determines quorum requirements as a percentage of the voting token's total supply. In affected instances, when a proposal is passed to lower the quorum requirement, past proposals may become executa...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed': '4.7.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.3.0'}, {'fixed...
[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-xrc4-737v-9q75'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31198'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3561'}, {'type': 'PACKAGE', 'url'...
{'cwe_ids': ['CWE-682'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T18:48:41Z', 'nvd_published_at': '2022-08-01T21:15:00Z'}
1.4.0
GHSA-prrh-qvhf-x788
2022-09-13T17:33:45Z
2022-08-31T21:27:38Z
null
['CVE-2022-35933']
PrestaShop Product Comments Cross-site Scripting vulnerability
### Impact An attacker could steal an admin's cookie ### Patches The issue is fixed in 5.0.2 ### References [Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')](https://cwe.mitre.org/data/definitions/79.html)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/productcomments'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/productcomments/security/advisories/GHSA-prrh-qvhf-x788'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35933'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/productcomments/commit/314456d739155aa71f0b235827e8e0f24b97c26b'}, {'typ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-31T21:27:38Z', 'nvd_published_at': '2022-09-02T20:15:00Z'}
1.4.0
GHSA-8rmh-55h4-93h5
2022-08-11T17:03:11Z
2022-08-06T05:48:56Z
null
['CVE-2022-31195']
DSpace ItemImportService API Vulnerable to Path Traversal in Simple Archive Format Package Import
### Impact ItemImportServiceImpl is vulnerable to a path traversal vulnerability. This means a malicious SAF (simple archive format) package could cause a file/directory to be created anywhere the Tomcat/DSpace user can write to on the server. However, this path traversal vulnerability is only possible by a user with ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '5.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0'}, {'fixed': '6.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/security/advisories/GHSA-8rmh-55h4-93h5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31195'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/commit/56e76049185bbd87c994128a9d77735ad7af0199'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:48:56Z', 'nvd_published_at': '2022-08-01T21:15:00Z'}
1.4.0
GHSA-wwch-cmqr-hhrm
2023-02-17T21:33:15Z
2022-08-24T00:00:29Z
null
['CVE-2021-3701']
ansible-runner 2.0.0 default temporary files written to world R/W locations
A flaw was found in ansible-runner where the default temporary files configuration in ansible-2.0.0 are written to world R/W locations. This flaw allows an attacker to pre-create the directory, resulting in reading private information or forcing ansible-runner to write files as the legitimate user in a place they did n...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible-runner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3701'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible-runner/issues/738'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible-runner/pull/742'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible-runner/pull/742/commits...
{'cwe_ids': ['CWE-276'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:18:53Z', 'nvd_published_at': '2022-08-23T16:15:00Z'}
1.4.0
GHSA-rv3r-vqjj-8c76
2022-08-30T20:53:03Z
2022-08-30T20:53:03Z
null
[]
Cross-site scripting from content entered in the tags and multiselect fields
### Introduction Cross-site scripting (XSS) is a type of vulnerability that allows to execute any kind of JavaScript code inside the Panel session of the same or other users. In the Panel, a harmful script can for example trigger requests to Kirby's API with the permissions of the victim. Such vulnerabilities are cri...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.5.7'}, {'fixed': '3.5.8.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'getkirby/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.6.1'}]}]}, {...
[{'type': 'WEB', 'url': 'https://github.com/getkirby/kirby/security/advisories/GHSA-rv3r-vqjj-8c76'}, {'type': 'PACKAGE', 'url': 'https://github.com/getkirby/kirby'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:53:03Z', 'nvd_published_at': None}
1.4.0
GHSA-gwj5-wp6r-5q9f
2022-08-11T18:08:57Z
2022-08-11T18:08:57Z
null
[]
Cronos vulnerable to DoS through unintended Contract Selfdestruct
In Cronos nodes running versions before v0.7.0, the contract selfdestruct invocation permanently removes the corresponding bytecode from the internal database storage. However, due to a bug in Ethermint, all contracts that used the identical bytecode (i.e shared the same CodeHash) will also stop working once one contra...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/crypto-org-chain/cronos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.7.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/crypto-org-chain/cronos/security/advisories/GHSA-gwj5-wp6r-5q9f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35936'}, {'type': 'WEB', 'url': 'https://github.com/crypto-org-chain/cronos/commit/2f2cc88b501b47149690fdef05afbbbe5bc116c9'}, {'type': 'P...
{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T18:08:57Z', 'nvd_published_at': None}
1.4.0
GHSA-xxc2-j7jj-6g5m
2022-08-11T21:14:43Z
2022-08-05T00:00:23Z
null
['CVE-2022-35142']
Raneto Denial of Service via crafted payload injected into `Search` parameter
An issue in Renato v0.17.0 allows attackers to cause a Denial of Service (DoS) via a crafted payload injected into the `Search` parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'raneto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.17.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.17.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35142'}, {'type': 'WEB', 'url': 'https://github.com/ryanlelek/Raneto/issues/368'}, {'type': 'WEB', 'url': 'https://github.com/ryanlelek/Raneto/pull/370'}, {'type': 'WEB', 'url': 'https://cwe.mitre.org/data/definitions/703.html'}, {'type': 'WEB', 'u...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T21:14:43Z', 'nvd_published_at': '2022-08-04T20:15:00Z'}
1.4.0
GHSA-8qr4-xgw6-wmr3
2023-01-18T21:52:48Z
2022-08-18T18:59:46Z
null
['CVE-2022-35949']
`undici.request` vulnerable to SSRF using absolute URL on `pathname`
### Impact `undici` is vulnerable to SSRF (Server-side Request Forgery) when an application takes in **user input** into the `path/pathname` option of `undici.request`. If a user specifies a URL such as `http://127.0.0.1` or `//127.0.0.1` ```js const undici = require("undici") undici.request({origin: "http://example...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'undici'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.8.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/nodejs/undici/security/advisories/GHSA-8qr4-xgw6-wmr3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35949'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/undici/commit/124f7ebf705366b2e1844dff721928d270f87895'}, {'type': 'PACKAGE', 'url': 'htt...
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T18:59:46Z', 'nvd_published_at': '2022-08-12T23:15:00Z'}
1.4.0
GHSA-8x94-hmjh-97hq
2022-09-16T21:38:06Z
2022-08-11T14:49:12Z
null
['CVE-2022-36359']
Django vulnerable to Reflected File Download attack
An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2'}, {'fixed': '3.2.15'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'Django'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '4.0.7'}]}]}, {'package': {'ecosystem': 'PyP...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36359'}, {'type': 'WEB', 'url': 'https://docs.djangoproject.com/en/4.0/releases/security/'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-8x94-hmjh-97hq'}, {'type': 'PACKAGE', 'url': 'https://github.com/django/django'}, {'type': ...
{'cwe_ids': ['CWE-494'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T14:49:12Z', 'nvd_published_at': '2022-08-03T14:15:00Z'}
1.4.0
GHSA-cwhp-rqfr-8462
2023-07-13T23:34:27Z
2022-08-06T00:00:47Z
null
['CVE-2020-1691']
Moodle XSS Vulnerability
In Moodle 3.8, messages required extra sanitizing before updating the conversation overview, to prevent the risk of stored cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.8'}, {'fixed': '3.8.1'}]}], 'versions': ['3.8']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1691'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/4e809346537e230cbff8235bfee0e7e151e4e9f9'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=395953'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-13T23:34:27Z', 'nvd_published_at': '2022-08-05T16:15:00Z'}
1.4.0
GHSA-6278-2q4m-cmf3
2022-09-16T18:37:18Z
2022-08-27T00:00:43Z
null
['CVE-2022-36537']
ZK Framework vulnerable to malicious POST
ZK Framework version 9.6.1, 9.6.0.1, 9.5.1.3, 9.0.1.2 and 8.6.4.1 allows attackers to access sensitive information via a crafted POST request sent to the component AuUploader.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.zkoss.zk:zk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.6.4.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.zkoss.zk:zk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0.0'}, {'fixed': '9.0.1.3'}]}]}, {'pac...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36537'}, {'type': 'WEB', 'url': 'https://github.com/zkoss/zk/commit/92a29aa9b1daf1fd2d9d188cb6545f0441d54e84'}, {'type': 'PACKAGE', 'url': 'https://github.com/zkoss/zk'}, {'type': 'WEB', 'url': 'https://tracker.zkoss.org/browse/ZK-5150'}, {'type': ...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:37:18Z', 'nvd_published_at': '2022-08-26T20:15:00Z'}
1.4.0
GHSA-7grf-83vw-6f5x
2022-08-14T00:23:34Z
2022-08-14T00:23:34Z
null
['CVE-2022-35915']
OpenZeppelin Contracts ERC165Checker unbounded gas consumption
### Impact The target contract of an EIP-165 `supportsInterface` query can cause unbounded gas consumption by returning a lot of data, while it is generally assumed that this operation has a bounded cost. ### Patches The issue has been fixed in v4.7.2. ### References https://github.com/OpenZeppelin/openzeppelin-co...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '4.7.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'openzeppelin-solidity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'last_affected': '4....
[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-7grf-83vw-6f5x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35915'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3587'}, {'type': 'PACKAGE', 'url'...
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-14T00:23:34Z', 'nvd_published_at': '2022-08-01T21:15:00Z'}
1.4.0
GHSA-qp5m-c3m9-8q2p
2022-08-06T05:47:04Z
2022-08-06T05:47:04Z
null
['CVE-2022-31194']
JSPUI vulnerable to path traversal in submission (resumable) upload
### Impact The JSPUI resumable upload implementations in SubmissionController and FileUploadRequest are vulnerable to multiple path traversal attacks, allowing an attacker to create files/directories anywhere on the server writable by the Tomcat/DSpace user, by modifying some request parameters during submission. This ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-jspui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '5.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-jspui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0'}, {'fixed': '6.4'}]}]}...
[{'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/security/advisories/GHSA-qp5m-c3m9-8q2p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31194'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/commit/7569c6374aefeafb996e202cf8d631020eda5f24'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:47:04Z', 'nvd_published_at': '2022-08-01T21:15:00Z'}
1.4.0
GHSA-hrjv-pf36-jpmr
2022-08-18T19:01:15Z
2022-08-18T19:01:15Z
null
[]
oqs's Post-Quantum Key Encapsulation Mechanism SIKE broken
Wouter Castryck and Thomas Decru presented an efficient key recovery attack on the SIDH protocol. As a result, the secret key of SIKEp751 can be recovered in a matter of hours. The SIKE and SIDH schemes will be removed from oqs 0.7.2. [An efficient key recovery attack on SIDH (preliminary version)](https://eprint.iacr...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'oqs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/open-quantum-safe/liboqs-rust/pull/151'}, {'type': 'PACKAGE', 'url': 'https://github.com/open-quantum-safe/liboqs-rust'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0045.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:01:15Z', 'nvd_published_at': None}
1.4.0
GHSA-q2gp-gph3-88x9
2022-09-23T16:30:52Z
2022-08-06T00:00:42Z
2022-09-23T16:30:52Z
[]
Keycloak allows arbitrary Javascript to be uploaded for SAML protocol mapper even if UPLOAD_SCRIPTS feature disabled
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of [GHSA-wf7g-7h6h-678v]https://github.com/advisories/GHSA-wf7g-7h6h-678v). This link is maintained to preserve external references. ## Original Description An issue was discovered in Keycloak that allows arbitrary Javascript to be upload...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-saml-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '19.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2668'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-2668'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2115392'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T18:53:18Z', 'nvd_published_at': '2022-08-05T17:15:00Z'}
1.4.0
GHSA-v866-gwf5-w92f
2022-08-30T20:10:31Z
2022-08-13T00:00:43Z
null
['CVE-2022-38179']
JetBrains Ktor before 2.1.0 was vulnerable to a Reflect File Download attack
JetBrains Ktor before 2.1.0 was vulnerable to a Reflect File Download attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.ktor:ktor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38179'}, {'type': 'WEB', 'url': 'https://github.com/ktorio/ktor/pull/3110'}, {'type': 'PACKAGE', 'url': 'https://github.com/ktorio/ktor'}, {'type': 'WEB', 'url': 'https://www.jetbrains.com/privacy-security/issues-fixed/'}]
{'cwe_ids': ['CWE-697'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:10:31Z', 'nvd_published_at': '2022-08-12T10:15:00Z'}
1.4.0
GHSA-9xgp-3mxp-rv7x
2022-09-16T18:42:36Z
2022-08-29T00:00:33Z
null
['CVE-2022-3017']
Froxlor vulnerable to Cross-Site Request Forgery (CSRF)
Cross-Site Request Forgery (CSRF) in GitHub repository froxlor/froxlor prior to 0.10.38.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'froxlor/froxlor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.38'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3017'}, {'type': 'WEB', 'url': 'https://github.com/froxlor/froxlor/commit/bbe82286aae21328668f24857995a67598fe978a'}, {'type': 'PACKAGE', 'url': 'https://github.com/Froxlor/Froxlor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5250c4b1-132b...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:42:36Z', 'nvd_published_at': '2022-08-28T14:15:00Z'}
1.4.0
GHSA-chw2-6c7r-37p7
2023-03-20T20:09:43Z
2022-08-25T00:00:27Z
null
['CVE-2021-43309']
uri-template-lite Regular Expression Denial of Service
An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the uri-template-lite npm package, when an attacker is able to supply arbitrary input to the "URI.expand" method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'uri-template-lite'}, 'ecosystem_specific': {'affected_functions': ['URI.expand']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43309'}, {'type': 'WEB', 'url': 'https://github.com/litejs/uri-template-lite/commit/cbeec2b2a275d819fb534137a155df14729706f8'}, {'type': 'PACKAGE', 'url': 'https://github.com/litejs/uri-template-lite'}, {'type': 'WEB', 'url': 'https://github.com/li...
{'cwe_ids': ['CWE-1333', 'CWE-697'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:21:35Z', 'nvd_published_at': '2022-08-24T16:15:00Z'}
1.4.0
GHSA-m2fc-9h5m-29cm
2022-08-12T07:52:50Z
2022-08-06T00:00:51Z
null
['CVE-2022-21186']
@acrontum/filesystem-template vulnerable to Command Injection due to fetchRepo API missing sanitization
The package @acrontum/filesystem-template before 0.0.2 is vulnerable to Arbitrary Command Injection due to the fetchRepo API missing sanitization of the href field of external input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@acrontum/filesystem-template'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21186'}, {'type': 'WEB', 'url': 'https://github.com/acrontum/filesystem-template/issues/13'}, {'type': 'WEB', 'url': 'https://github.com/acrontum/filesystem-template/pull/14/commits/baeb727b60991ad82d9e63ac660883793abc0acc'}, {'type': 'WEB', 'url':...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T17:20:22Z', 'nvd_published_at': '2022-08-05T05:15:00Z'}
1.4.0
GHSA-pfhr-pccp-hwmh
2022-08-30T20:06:02Z
2022-08-30T20:06:02Z
null
[]
Network Policies & (Clusterwide) Cilium Network Policies with namespace label selectors may unexpectedly select pods with maliciously crafted labels
### Impact If a user has Network Policies with namespace selectors selecting labels of namespaces, or (clusterwide) Cilium Network Policies matching on namespace labels, then it is possible for an attacker with Kubernetes pod deploy rights (either directly or indirectly via higher-level APIs such as Deployment, Daemon...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.13'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'typ...
[{'type': 'WEB', 'url': 'https://github.com/cilium/cilium/security/advisories/GHSA-pfhr-pccp-hwmh'}, {'type': 'PACKAGE', 'url': 'https://github.com/cilium/cilium'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/releases/tag/v1.10.14'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/releases/tag/v1....
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:06:02Z', 'nvd_published_at': None}
1.4.0
GHSA-f83q-2cp7-qrjg
2023-08-08T10:50:07Z
2022-08-06T05:30:13Z
null
['CVE-2022-31471']
untangle vulnerable to Improper Restriction of XML External Entity Reference
### Description untangle is a python library to convert XML data to python objects. untangle versions 1.2.0 and earlier improperly restricts XML external entity references. By exploiting this vulnerability, a remote unauthenticated attacker may read the contents of local files. ### Impact An attacker may be able to re...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'untangle'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/stchris/untangle/security/advisories/GHSA-f83q-2cp7-qrjg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31471'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/untangle/PYSEC-2022-244.yaml'}, {'type': 'PACKAGE', 'u...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:30:13Z', 'nvd_published_at': '2022-07-26T06:15:00Z'}
1.4.0
GHSA-42wq-rch8-6f6j
2022-08-11T18:08:35Z
2022-08-06T09:40:43Z
null
['CVE-2022-31175']
CKEditor5 cross-site scripting vulnerability caused by the editor instance destroying process
### Affected packages @ckeditor/ckeditor5-markdown-gfm @ckeditor/ckeditor5-html-support @ckeditor/ckeditor5-html-embed ### Impact A cross-site scripting vulnerability has been discovered affecting three optional CKEditor 5's packages. The vulnerability allowed to trigger a JavaScript code after fulfilling special cond...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-markdown-gfm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '35.0.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@ckeditor/ckeditor5-html-support'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed'...
[{'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor5/security/advisories/GHSA-42wq-rch8-6f6j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31175'}, {'type': 'WEB', 'url': 'https://ckeditor.com/docs/ckeditor5/latest/features/general-html-support.html'}, {'type': 'WEB', 'url': 'https...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:40:43Z', 'nvd_published_at': '2022-08-03T19:15:00Z'}
1.4.0
GHSA-4h98-2769-gh6h
2022-08-18T19:00:43Z
2022-08-18T19:00:43Z
null
['CVE-2022-35961']
OpenZeppelin Contracts vulnerable to ECDSA signature malleability
### Impact The functions `ECDSA.recover` and `ECDSA.tryRecover` are vulnerable to a kind of signature malleability due to accepting EIP-2098 compact signatures in addition to the traditional 65 byte signature format. This is only an issue for the functions that take a single `bytes` argument, and not the functions tha...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.7.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed...
[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-4h98-2769-gh6h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35961'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3610'}, {'type': 'WEB', 'url': 'h...
{'cwe_ids': ['CWE-354'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:00:43Z', 'nvd_published_at': '2022-08-15T11:21:00Z'}
1.4.0
GHSA-jhjh-776m-4765
2022-09-10T02:26:17Z
2022-08-31T21:25:37Z
null
['CVE-2022-31152']
Denial of service due to incorrect application of event authorization rules
### Impact The Matrix specification specifies a list of [event authorization rules](https://spec.matrix.org/v1.3/rooms/v10/#authorization-rules) which must be checked when determining if an event should be accepted into a room. In versions of Synapse up to and including v1.61, some of these rules are not correctly ap...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-synapse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.62'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/security/advisories/GHSA-jhjh-776m-4765'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31152'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/synapse/pull/13087'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/syna...
{'cwe_ids': ['CWE-703', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-31T21:25:37Z', 'nvd_published_at': '2022-09-02T20:15:00Z'}
1.4.0
GHSA-v4hr-4jpx-56gc
2022-08-06T05:51:50Z
2022-08-06T05:51:50Z
null
['CVE-2022-35918']
Streamlit directory traversal vulnerability
### Impact Users hosting Streamlit app(s) that use custom components are vulnerable to a directory traversal attack that could leak data from their web server file-system such as: server logs, world readable files, and potentially other sensitive information. An attacker can craft a malicious URL with file paths and t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'streamlit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.63.0'}, {'fixed': '1.11.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/streamlit/streamlit/security/advisories/GHSA-v4hr-4jpx-56gc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35918'}, {'type': 'WEB', 'url': 'https://github.com/streamlit/streamlit/commit/80d9979d5f4a00217743d607078a1d867fad8acf'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:51:50Z', 'nvd_published_at': '2022-08-01T22:15:00Z'}
1.4.0
GHSA-cm6r-892j-jv2g
2022-08-18T19:13:34Z
2022-08-13T00:00:43Z
null
['CVE-2022-2390']
Google Play Services SDK leads to apps having incorrectly set mutability flag
Apps developed with Google Play Services SDK incorrectly had the mutability flag set to PendingIntents that were passed to the Notification service. As Google Play services SDK is so widely used, this bug affects many applications. For an application affected, this bug will let the attacker, gain the access to all non-...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.google.android.gms:play-services-basement'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '18.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2390'}, {'type': 'WEB', 'url': 'https://developers.google.com/android/guides/releases#may_03_2022'}, {'type': 'WEB', 'url': 'https://mvnrepository.com/artifact/com.google.android.gms/play-services-basement/18.0.2'}]
{'cwe_ids': ['CWE-471'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:13:34Z', 'nvd_published_at': '2022-08-12T11:15:00Z'}
1.4.0
GHSA-c558-5gfm-p2r8
2022-08-11T17:04:17Z
2022-08-06T05:46:14Z
null
['CVE-2022-31191']
JSPUI spellcheck and autocomplete tools vulnerable to Cross Site Scripting
### Impact The JSPUI spellcheck "Did you mean" HTML escapes the data-spell attribute in the link, but not the actual displayed text. Similarly, the JSPUI autocomplete HTML does not properly escape text passed to it. Both are vulnerable to XSS. This vulnerability only impacts the JSPUI. _This vulnerability does NOT i...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-jspui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '5.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-jspui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0'}, {'fixed': '6.4'}]}]}...
[{'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/security/advisories/GHSA-c558-5gfm-p2r8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31191'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/commit/35030a23e48b5946f5853332c797e1c4adea7bb7'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:46:14Z', 'nvd_published_at': '2022-08-01T21:15:00Z'}
1.4.0
GHSA-c438-6f6r-pg8w
2022-08-18T19:18:55Z
2022-08-16T00:00:22Z
null
['CVE-2020-23622']
4thline cling uPnP protocol issue can lead to denial of service
An issue in the UPnP protocol in 4thline cling 2.0.0 through 2.1.2 allows remote attackers to cause a denial of service via an unchecked `CALLBACK` parameter in the request header. As of 2022, 4thline cling is no longer supported by the maintainers.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.fourthline.cling:cling-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'last_affected': '2.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-23622'}, {'type': 'WEB', 'url': 'https://github.com/4thline/cling/issues/253'}, {'type': 'PACKAGE', 'url': 'https://github.com/4thline/cling'}, {'type': 'WEB', 'url': 'https://zh-cn.tenable.com/blog/cve-2020-12695-callstranger-vulnerability-in-univ...
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:18:55Z', 'nvd_published_at': '2022-08-15T20:15:00Z'}