schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-8mgq-6r2q-82w9 | 2022-08-30T20:54:12Z | 2022-08-30T20:54:12Z | null | [] | Captcha Bypass in strapi-plugin-ezforms | ### Impact
Users using any captcha providers
### Patches
>0.1.0
### References
[Issue](https://github.com/excl-networks/strapi-plugin-ezforms/issues/15)
| [] | [{'package': {'ecosystem': 'npm', 'name': 'strapi-plugin-ezforms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/excl-networks/strapi-plugin-ezforms/security/advisories/GHSA-8mgq-6r2q-82w9'}, {'type': 'WEB', 'url': 'https://github.com/excl-networks/strapi-plugin-ezforms/issues/15'}, {'type': 'WEB', 'url': 'https://github.com/excl-networks/strapi-plugin-ezforms/commit/a8372190b7122e5dda3... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:54:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-r38f-c4h4-hqq2 | 2022-12-06T14:34:33Z | 2022-08-06T05:51:38Z | null | ['CVE-2022-31197'] | PostgreSQL JDBC Driver SQL Injection in ResultSet.refreshRow() with malicious column names | ### Impact
_What kind of vulnerability is it? Who is impacted?_
The PGJDBC implementation of the `java.sql.ResultRow.refreshRow()` method is not performing escaping of column names so a malicious column name that contains a statement terminator, e.g. `;`, could lead to SQL injection. This could lead to executing addit... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '42.2.26'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '42.4.0'}, {'fixed': '4... | [{'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-r38f-c4h4-hqq2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31197'}, {'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/commit/739e599d52ad80f8dcd6efedc6157859b1a9d637'}, {'type': 'PACKAGE', 'url': 'htt... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:51:38Z', 'nvd_published_at': '2022-08-03T19:15:00Z'} |
1.4.0 | GHSA-f4qr-f4xx-hjxw | 2022-08-12T17:50:17Z | 2022-08-12T17:31:58Z | null | ['CVE-2022-35980'] | OpenSearch vulnerable to Improper Authorization of Index Containing Sensitive Information | ### Impact
Requests to an OpenSearch cluster configured with advanced access control features ([document level security (DLS)](https://opensearch.org/docs/latest/security-plugin/access-control/document-level-security/), [field level security (FLS)](https://opensearch.org/docs/latest/security-plugin/access-control/field... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.opensearch.plugin:opensearch-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0.0'}, {'fixed': '2.2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.0.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/opensearch-project/security/security/advisories/GHSA-f4qr-f4xx-hjxw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35980'}, {'type': 'WEB', 'url': 'https://github.com/opensearch-project/security/pull/1999'}, {'type': 'WEB', 'url': 'https://github.co... | {'cwe_ids': ['CWE-612'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-12T17:31:58Z', 'nvd_published_at': '2022-08-12T18:15:00Z'} |
1.4.0 | GHSA-c8fj-4pm8-mp2c | 2022-08-30T20:54:28Z | 2022-08-30T20:54:28Z | null | ['CVE-2022-36051'] | Broken Authorization in ZITADEL Actions | ### Impact
**Actions**, introduced in ZITADEL **1.42.0** on the API and **1.56.0** for Console, is a feature, where users with role `ORG_OWNER` are able to create Javascript Code, which is invoked by the system at certain points during the login.
**Actions**, for example, allow creating authorizations (user grants) on... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/zitadel/zitadel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/zitadel/zitadel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.42.0'}, {'fixed': '1.8... | [{'type': 'WEB', 'url': 'https://github.com/zitadel/zitadel/security/advisories/GHSA-c8fj-4pm8-mp2c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36051'}, {'type': 'WEB', 'url': 'https://github.com/zitadel/zitadel/pull/4237'}, {'type': 'WEB', 'url': 'https://github.com/zitadel/zitadel/pull/4... | {'cwe_ids': ['CWE-436', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:54:28Z', 'nvd_published_at': '2022-08-31T23:15:00Z'} |
1.4.0 | GHSA-wmqq-r32m-87c5 | 2023-02-13T17:47:30Z | 2022-08-29T20:06:50Z | null | ['CVE-2022-0718'] | python-oslo-utils has improper password parsing | A flaw was found in python-oslo-utils. Due to improper parsing, passwords with a double quote ( " ) in them cause incorrect masking in debug logs, causing any part of the password after the double quote to be plaintext | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'oslo-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0718'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2022:0993'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2022:8873'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-0718'}, {'type': '... | {'cwe_ids': ['CWE-522', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:32:37Z', 'nvd_published_at': '2022-08-29T15:15:00Z'} |
1.4.0 | GHSA-rqmg-hrg4-fm69 | 2022-08-15T20:02:22Z | 2022-08-06T00:00:36Z | null | ['CVE-2022-37450'] | Go Ethereum allows attackers to use manipulation of time-difference values to achieve replacement of main-chain blocks | Go Ethereum (aka geth) through 1.10.21 allows attackers to increase rewards by mining blocks in certain situations, and using a manipulation of time-difference values to achieve replacement of main-chain blocks, aka Riskless Uncle Making (RUM), as exploited in the wild in 2020 through 2022. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.21'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37450'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/blob/671094279e8d27f4b4c3c94bf8b636c26b473976/core/forkchoice.go#L91-L94'}, {'type': 'WEB', 'url': 'http... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T16:51:45Z', 'nvd_published_at': '2022-08-05T21:15:00Z'} |
1.4.0 | GHSA-9x9j-vrhj-v364 | 2022-08-11T15:51:10Z | 2022-08-05T00:00:30Z | null | ['CVE-2022-28731'] | Apache JSPWiki CSRF due to crafted request on UserPreferences.jsp | A carefully crafted request on UserPreferences.jsp could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow the attacker to modify the email associated with the attacked account, and then a reset password request from the login page. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28731'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jspwiki'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-28732'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:51:10Z', 'nvd_published_at': '2022-08-04T07:15:00Z'} |
1.4.0 | GHSA-746v-hfh2-xphm | 2023-04-13T17:53:42Z | 2022-08-17T00:00:21Z | null | ['CVE-2022-38362'] | Remote code execution in Apache Airflow Docker's Provider | Apache Airflow Docker's Provider prior to 3.0.0 shipped with an example DAG that was vulnerable to (authenticated) remote code exploit of code on the Airflow worker host. Disable loading of example DAGs or upgrade apache-airflow-providers-docker to 3.0.0 or above. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38362'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/614p38nf4gbk8xhvnskj9b1sqo2dknkb'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/08/16/1'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-13T17:53:42Z', 'nvd_published_at': '2022-08-16T14:15:00Z'} |
1.4.0 | GHSA-3486-rvxc-hrrj | 2022-08-10T17:59:03Z | 2022-08-03T00:00:57Z | null | ['CVE-2020-28434'] | gitblame susceptible to command injection | A command injection vulnerability affects all versions of package gitblame. The injection point is located in line 15 in lib/gitblame.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'gitblame'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28434'}, {'type': 'PACKAGE', 'url': 'https://github.com/xjamundx/gitblame'}, {'type': 'WEB', 'url': 'https://github.com/xjamundx/gitblame/blob/master/lib/gitblame.js#L15'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-GITBLAME-1050... | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T17:59:03Z', 'nvd_published_at': '2022-08-02T14:15:00Z'} |
1.4.0 | GHSA-qhm8-69qh-g76j | 2022-08-30T20:28:16Z | 2022-08-23T00:00:19Z | null | ['CVE-2022-2927'] | Missing password strength check in notrinos/notrinos-erp | In versions of notrinos/notrinoserp prior to 0.7 new account passwords were missing a password strength check. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'notrinos/notrinos-erp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2927'}, {'type': 'WEB', 'url': 'https://github.com/notrinos/notrinoserp/commit/e61e76b44c6a2b28a4a648a06ef34f65c376ec1e'}, {'type': 'PACKAGE', 'url': 'https://github.com/notrinos/notrinoserp'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7fa... | {'cwe_ids': ['CWE-521'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:28:16Z', 'nvd_published_at': '2022-08-22T09:15:00Z'} |
1.4.0 | GHSA-85xx-xhjm-rhrw | 2022-08-11T20:49:17Z | 2022-08-03T00:00:57Z | null | ['CVE-2022-25867'] | Socket.IO-client Java before 2.0.1 vulnerable to NULL Pointer Dereference | The package io.socket:socket.io-client before 2.0.1 is vulnerable to NULL Pointer Dereference when parsing a packet with with invalid payload format. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.socket:socket.io-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25867'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io-client-java/issues/508%23issuecomment-1179817361'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io-client-java/commit/8664499b6f31154f49783531f778dac5387b766b'}, ... | {'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T17:41:10Z', 'nvd_published_at': '2022-08-02T14:15:00Z'} |
1.4.0 | GHSA-vh4f-fgpp-x8x2 | 2022-09-01T22:23:21Z | 2022-08-25T00:00:29Z | null | ['CVE-2022-24375'] | node-opcua DoS when bypassing limitations for excessive memory consumption | The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) when bypassing the limitations for excessive memory consumption by sending multiple `CloseSession` requests with the `deleteSubscription` parameter equal to `False`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-opcua'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.74.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24375'}, {'type': 'WEB', 'url': 'https://github.com/node-opcua/node-opcua/pull/1182'}, {'type': 'WEB', 'url': 'https://github.com/node-opcua/node-opcua/commit/3fd46ec156e7718a506be41f3916310b6bdd0407'}, {'type': 'WEB', 'url': 'https://github.com/no... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:23:21Z', 'nvd_published_at': '2022-08-24T05:15:00Z'} |
1.4.0 | GHSA-mw9h-hcp7-fgc6 | 2022-09-01T17:39:37Z | 2022-08-24T00:00:32Z | null | ['CVE-2022-33916'] | Exposure of Sensitive Information in OPCFoundation.NetStandard.Opc.Ua.Server | OPC UA .NET Standard Reference Server 1.04.368 allows a remote attacker to cause the application to access sensitive information. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua.Server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.370.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33916'}, {'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/commit/313aa2a2499d8690cf719a67176e131517bb8b78'}, {'type': 'WEB', 'url': 'https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-29T18:41:29Z', 'nvd_published_at': '2022-08-23T01:15:00Z'} |
1.4.0 | GHSA-7w85-pp86-p4pq | 2022-08-06T05:40:16Z | 2022-08-06T05:40:16Z | null | ['CVE-2022-31190'] | XMLUI's metadata of withdrawn Items is exposed to anonymous users | ### Impact
Metadata on a withdrawn Item is exposed via the XMLUI "mets.xml" object, as long as you know the handle/URL of the withdrawn Item. This vulnerability only impacts the XMLUI.
However, this vulnerability is very low severity as Item metadata does not tend to contain highly secure or sensitive information.
_T... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-xmlui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '6.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3'}}] | [{'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/security/advisories/GHSA-7w85-pp86-p4pq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31190'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/pull/2451'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/commit/574e2... | {'cwe_ids': ['CWE-200', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:40:16Z', 'nvd_published_at': '2022-08-01T20:15:00Z'} |
1.4.0 | GHSA-7r9x-qrpr-3cxw | 2022-08-11T18:06:05Z | 2022-08-11T18:06:05Z | null | [] | mofh Vulnerable to Improper Restriction of XML External Entity Reference | The `xml.etree.ElementTree` module that mofh used up until version `1.0.1` implements a simple and efficient API for parsing and creating XML data. But it makes the application vulnerable to:
- [Billion Laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack): It is a type of denial-of-service attack aimed ... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'mofh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Wallvon/mofh/security/advisories/GHSA-7r9x-qrpr-3cxw'}, {'type': 'WEB', 'url': 'https://github.com/Wallvon/mofh/commit/da0d33cfd368e2f237ab28bf7a7f00e3d281005a'}, {'type': 'PACKAGE', 'url': 'https://github.com/Wallvon/mofh'}, {'type': 'WEB', 'url': 'https://www.acunetix.com/v... | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T18:06:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8cw9-5hmv-77w6 | 2022-08-11T20:57:49Z | 2022-08-06T05:21:19Z | null | ['CVE-2022-35920'] | sanic vulnerable to Path Traversal when using `app.static` if using encoded `%2F` URLs | ### Impact
Access to lateral directories when using `app.static` if using encoded `%2F` URLs. Parent directory traversal is not impacted.
### Patches
- v20.12.7 (LTS)
- v21.12.2 (LTS)
- v22.6.1
### References
https://github.com/sanic-org/sanic/issues/2478
https://github.com/sanic-org/sanic/pull/2495
### For more inf... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'sanic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '22.0.0'}, {'fixed': '22.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'sanic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '21.0.0'}, {'fixed': '21.12.2'}]}]}, {'package': {'ecosystem'... | [{'type': 'WEB', 'url': 'https://github.com/sanic-org/sanic/security/advisories/GHSA-8cw9-5hmv-77w6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35920'}, {'type': 'WEB', 'url': 'https://github.com/sanic-org/sanic/issues/2478'}, {'type': 'WEB', 'url': 'https://github.com/sanic-org/sanic/pull... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:21:19Z', 'nvd_published_at': '2022-08-01T22:15:00Z'} |
1.4.0 | GHSA-8629-83m5-rj75 | 2022-09-16T21:06:16Z | 2022-08-25T00:00:29Z | null | ['CVE-2022-38080'] | exceedone/exment and exceedone/laravel-admin Cross-site Scripting vulnerability | Reflected cross-site scripting vulnerability in Exment ((PHP8) exceedone/exment v5.0.2 and earlier and exceedone/laravel-admin v3.0.0 and earlier, (PHP7) exceedone/exment v4.4.2 and earlier and exceedone/laravel-admin v2.2.2 and earlier) allows a remote authenticated attacker to inject an arbitrary script. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'exceedone/exment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'exceedone/exment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.3'}]}]}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38080'}, {'type': 'WEB', 'url': 'https://exment.net/docs/#/release_note?id=v503-20220817'}, {'type': 'WEB', 'url': 'https://exment.net/docs/#/weakness/20220817'}, {'type': 'PACKAGE', 'url': 'https://github.com/exceedone/exment'}, {'type': 'WEB', 'u... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:06:16Z', 'nvd_published_at': '2022-08-24T09:15:00Z'} |
1.4.0 | GHSA-grvv-h2f9-7v9c | 2022-08-30T19:54:34Z | 2022-08-30T19:54:34Z | null | ['CVE-2022-36009'] | gomatrixserverlib and Dendrite vulnerable to incorrect parsing of the event default power level in event auth | ### Impact
The power level parsing within gomatrixserverlib was failing to parse the `"events_default"` key of the `m.room.power_levels` event, defaulting the event default power level to zero in all cases.
In rooms where the `"events_default"` power level had been changed, this could result in events either being in... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/matrix-org/dendrite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/matrix-org/gomatrixserverlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixe... | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/gomatrixserverlib/security/advisories/GHSA-grvv-h2f9-7v9c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36009'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/gomatrixserverlib/commit/723fd495dde835d078b9f2074b6b62c06dea4575'}, {... | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T19:54:34Z', 'nvd_published_at': '2022-08-19T21:15:00Z'} |
1.4.0 | GHSA-2fxf-qj94-3f83 | 2022-08-11T15:44:49Z | 2022-08-05T00:00:31Z | null | ['CVE-2022-27166'] | Apache JSPWiki XSS due to crafted request on XHRHtml2Markup.jsp | A carefully crafted request on XHRHtml2Markup.jsp could trigger an XSS vulnerability on Apache JSPWiki up to and including 2.11.2, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Version 2.11.3 contains a fix for the problem | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.11.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27166'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jspwiki'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-28732'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:44:49Z', 'nvd_published_at': '2022-08-04T07:15:00Z'} |
1.4.0 | GHSA-2fvv-qxrq-7jq6 | 2022-08-18T18:55:01Z | 2022-08-18T18:55:01Z | null | [] | apollo-server-core vulnerable to URL-based XSS attack affecting IE11 on default landing page | ### Impact
The default landing page contained HTML to display a sample `curl` command which is made visible if the full landing page bundle could not be fetched from Apollo's CDN. The server's URL is directly interpolated into this command inside the browser from `window.location.href`. On some older browsers such as ... | [] | [{'package': {'ecosystem': 'npm', 'name': 'apollo-server-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.10.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/security/advisories/GHSA-2fvv-qxrq-7jq6'}, {'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/commit/68a439b6e3af9edc8a2480092f2d49f058be1e64'}, {'type': 'PACKAGE', 'url': 'https://github.com/apollographql/apollo-server'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T18:55:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hph8-29xw-qfxx | 2022-08-11T15:46:16Z | 2022-08-05T00:00:30Z | null | ['CVE-2022-28732'] | Apache JSPWiki XSS due to crafted request in WeblogPlugin | A carefully crafted request on WeblogPlugin could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.3 or later. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28732'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jspwiki'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-28732'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:46:16Z', 'nvd_published_at': '2022-08-04T07:15:00Z'} |
1.4.0 | GHSA-8wj3-cpmr-8whp | 2022-08-18T19:19:58Z | 2022-08-16T00:00:30Z | null | ['CVE-2022-2818'] | Cockpit Content Platform vulnerable to 2FA bypass | Cockpit Content Platform through version 2.2.1 is vulnerable to a two-factor authentication (2FA) bypass. The 2FA secret is disclosed in a JWT token after user logs into their account, allowing an attacker to bypass the 2FA code. A patch is available on the `develop` branch and is expected to be part of version 2.2.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2818'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/4bee1b903ee20818f4a8ecb9d974b9536cc54cb4'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ee27e5d... | {'cwe_ids': ['CWE-212', 'CWE-287', 'CWE-305'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:19:58Z', 'nvd_published_at': '2022-08-15T11:21:00Z'} |
1.4.0 | GHSA-763j-q7wv-vf3m | 2022-08-06T05:46:49Z | 2022-08-06T05:46:49Z | null | ['CVE-2022-31193'] | JSPUI's controlled vocabulary feature vulnerable to Open Redirect before v6.4 and v5.11 | ### Impact
The JSPUI controlled vocabulary servlet is vulnerable to an open redirect attack, where an attacker can craft a malicious URL that looks like a legitimate DSpace/repository URL. When that URL is clicked by the target, it redirects them to a site of the attacker's choice.
_This vulnerability does NOT impact... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-jspui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '5.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-jspui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0'}, {'fixed': '6.4'}]}]}... | [{'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/security/advisories/GHSA-763j-q7wv-vf3m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31193'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/commit/5f72424a478f59061dcc516b866dcc687bc3f9de'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:46:49Z', 'nvd_published_at': '2022-08-01T21:15:00Z'} |
1.4.0 | GHSA-rpj2-w6fr-79hc | 2022-12-05T23:03:56Z | 2022-08-24T00:00:29Z | null | ['CVE-2020-35509'] | Keycloak vulnerable to Improper Certificate Validation | keycloak accepts an expired certificate by the direct-grant authenticator because of missing time stamp validations. The highest threat from this vulnerability is to data confidentiality and integrity.
This issue was partially fixed in version [13.0.1](https://github.com/keycloak/keycloak/pull/6330) and more completel... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35509'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/pull/6330'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/pull/8067'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/478319348bdfdb9b6d39122... | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:03:56Z', 'nvd_published_at': '2022-08-23T16:15:00Z'} |
1.4.0 | GHSA-wv39-f3vx-3v6q | 2022-08-30T20:49:19Z | 2022-08-24T00:00:29Z | null | ['CVE-2022-37223'] | SQL injection in jflyfox jfinal | JFinal CMS 5.1.0 is vulnerable to SQL Injection via /jfinal_cms/system/role/list. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.jflyfox:jflyfox_jfinal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37223'}, {'type': 'WEB', 'url': 'https://github.com/jflyfox/jfinal_cms/issues/49'}, {'type': 'PACKAGE', 'url': 'https://github.com/jflyfox/jfinal_cms'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:49:19Z', 'nvd_published_at': '2022-08-23T14:15:00Z'} |
1.4.0 | GHSA-cqfc-9452-r36j | 2022-08-10T18:16:03Z | 2022-08-03T00:00:57Z | null | ['CVE-2020-28425'] | curljs Command Injection vulnerability | A command injection vulnerability affects all versions of the package curljs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'curljs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28425'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-CURLJS-1050404'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:16:03Z', 'nvd_published_at': '2022-08-02T14:15:00Z'} |
1.4.0 | GHSA-mrxv-pr4h-963q | 2022-08-10T17:58:03Z | 2022-08-03T00:00:57Z | null | ['CVE-2020-28451'] | image-tiler susceptible to command injection | A command injection vulnerability affects the package image-tiler before version 2.0.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'image-tiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.0.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28451'}, {'type': 'WEB', 'url': 'https://github.com/MrP/image-tiler/commit/f4a0b13a4bf43655fc4013e04bbceaf77aecbeb8'}, {'type': 'PACKAGE', 'url': 'https://github.com/MrP/image-tiler'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-I... | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T17:58:03Z', 'nvd_published_at': '2022-08-02T14:15:00Z'} |
1.4.0 | GHSA-cvx8-ppmc-78hm | 2022-09-30T00:44:46Z | 2022-08-18T19:02:18Z | 2022-09-30T00:44:46Z | ['CVE-2022-1798'] | Duplicate Advisory: KubeVirt arbitrary host file read from the VM | ## Duplicate Advisory
This advisory is a duplicate of [GHSA-qv98-3369-g364](https://github.com/advisories/GHSA-qv98-3369-g364). This link is maintained to preserve external references.
## Original Description
**Summary**
As part of a Kubevirt audit performed by NCC group, a finding dealing with systemic lack of path ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'kubevirt.io/kubevirt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.20.0'}, {'fixed': '0.55.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/google/security-research/security/advisories/GHSA-cvx8-ppmc-78hm'}, {'type': 'WEB', 'url': 'https://github.com/kubevirt/kubevirt/security/advisories/GHSA-qv98-3369-g364'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1798'}, {'type': 'PACKAGE', 'url'... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:02:18Z', 'nvd_published_at': '2022-09-15T16:15:00Z'} |
1.4.0 | GHSA-jhxh-68jj-68c7 | 2022-08-30T20:42:03Z | 2022-08-23T00:00:16Z | null | ['CVE-2022-2890'] | Cross site scripting in yetiforce/yetiforce-crm | Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2890'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/2c14baaf8dbc7fd82d5c585f2fa0c23528450618'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:42:03Z', 'nvd_published_at': '2022-08-22T14:15:00Z'} |
1.4.0 | GHSA-34j6-m83c-52x2 | 2022-09-01T22:23:46Z | 2022-08-26T00:03:30Z | null | ['CVE-2022-36527'] | Jfinal Cross-site Scripting vulnerability | Jfinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the post title text field under the publish blog module. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.jflyfox:jflyfox_jfinal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36527'}, {'type': 'WEB', 'url': 'https://github.com/jflyfox/jfinal_cms/issues/45'}, {'type': 'PACKAGE', 'url': 'https://github.com/jflyfox/jflyfox_jfinal'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:23:46Z', 'nvd_published_at': '2022-08-25T19:15:00Z'} |
1.4.0 | GHSA-qmhj-m29v-gvmr | 2022-08-18T14:18:37Z | 2022-08-18T14:18:37Z | null | ['CVE-2022-36024'] | Bots using py-cord as Discord API wrapper are vulnerable to shutdowns through remote code execution | ### Impact
py-cord is a an API wrapper for Discord written in Python. Bots using py-cord version 2.0.0 are vulnerable to remote shutdown if they are added to the server with the `application.commands` scope without the `bot` scope. Currently, it appears that all public bots that use slash commands are affected.
### Pa... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'py-cord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}] | [{'type': 'WEB', 'url': 'https://github.com/Pycord-Development/pycord/security/advisories/GHSA-qmhj-m29v-gvmr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36024'}, {'type': 'WEB', 'url': 'https://github.com/Pycord-Development/pycord/pull/1568'}, {'type': 'PACKAGE', 'url': 'https://github.co... | {'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T14:18:37Z', 'nvd_published_at': '2022-08-18T15:15:00Z'} |
1.4.0 | GHSA-7r3h-m5j6-3q42 | 2022-08-18T19:01:36Z | 2022-08-18T19:01:36Z | null | ['CVE-2022-35954'] | @actions/core has Delimiter Injection Vulnerability in exportVariable | ## Impact
The `core.exportVariable` function uses a well known delimiter that attackers can use to break out of that specific variable and assign values to other arbitrary variables. Workflows that write untrusted values to the `GITHUB_ENV` file may cause the path or other environment variables to be modified without ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@actions/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/actions/toolkit/security/advisories/GHSA-7r3h-m5j6-3q42'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35954'}, {'type': 'WEB', 'url': 'https://github.com/actions/toolkit/commit/4beda9cbc00ba6eefe387a937c21087ccb8ee9df'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-74', 'CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:01:36Z', 'nvd_published_at': '2022-08-15T11:21:00Z'} |
1.4.0 | GHSA-gq75-5gc3-rfwg | 2022-08-06T09:36:15Z | 2022-07-26T00:01:05Z | null | ['CVE-2020-7649'] | snyk-broker Path Traversal before v4.73.0 | This affects the package snyk-broker before 4.73.0. It allows arbitrary file reads for users with access to Snyk's internal network via directory traversal. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'snyk-broker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.73.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7649'}, {'type': 'WEB', 'url': 'https://github.com/snyk/broker/commit/90e0bac07a800b7c4c6646097c9c89d6b878b429'}, {'type': 'PACKAGE', 'url': 'https://github.com/snyk/broker'}, {'type': 'WEB', 'url': 'https://github.com/snyk/broker/releases/tag/v4.7... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:36:15Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-pmjg-52h9-72qv | 2022-07-21T15:54:45Z | 2022-07-12T22:11:16Z | null | ['CVE-2022-31102'] | Argo CD SSO users vulnerable to Cross-site Scripting | ### Impact
All versions of Argo CD starting with 2.3.0 are vulnerable to a cross-site scripting (XSS) bug which could allow an attacker to inject arbitrary JavaScript in the `/auth/callback` page in a victim's browser.
This vulnerability only affects Argo CD instances which have SSO enabled.
The exploit also assume... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2.... | [{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-pmjg-52h9-72qv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31102'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/3800a1e49d1d5a00a6692fee83396a37a6abe89a'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T22:11:16Z', 'nvd_published_at': '2022-07-12T22:15:00Z'} |
1.4.0 | GHSA-vpf7-q2rx-26mh | 2022-12-12T21:17:14Z | 2022-07-28T00:00:43Z | null | ['CVE-2022-36888'] | Jenkins HashiCorp Vault Plugin does not perform permission checks in several HTTP endpoints that perform Vault connection tests | A missing permission check in Jenkins HashiCorp Vault Plugin 354.vdb_858fd6b_f48 and earlier allows attackers with Overall/Read permission to obtain credentials stored in Vault with attacker-specified path and keys. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.datapipe.jenkins.plugins:hashicorp-vault-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '355.v3b_38d767a_b_a_8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 354.vdb'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36888'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/hashicorp-vault-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2593'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:16:00Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-5469-c5p2-xv5g | 2022-08-10T23:47:07Z | 2022-07-23T00:00:15Z | null | ['CVE-2022-34113'] | Dataease before 1.11.2 allows arbitrary code execution via crafter plugin | An issue in the component /api/plugin/upload of Dataease v1.11.1 allows attackers to execute arbitrary code via a crafted plugin. Version 1.11.2 contains a patch for the problem. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.dataease:dataease-plugin-common'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34113'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/issues/2431'}, {'type': 'PACKAGE', 'url': 'https://github.com/dataease/dataease'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/releases/tag/v1.11.2'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T22:10:26Z', 'nvd_published_at': '2022-07-22T23:15:00Z'} |
1.4.0 | GHSA-h5g3-v72x-hc6f | 2022-12-09T04:52:55Z | 2022-07-01T00:01:08Z | null | ['CVE-2022-34806'] | Plaintext Storage of a Password in Jenkins Jigomerge Plugin | Jenkins Jigomerge Plugin 0.9 and earlier stores passwords unencrypted in job `config.xml` files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jigomerge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34806'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jigomerge-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2083'}] | {'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T15:41:52Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-cm7j-p8hc-97vj | 2022-12-12T20:36:46Z | 2022-07-28T00:00:43Z | null | ['CVE-2022-36881'] | Jenkins Git client plugin 3.11.0 does not perform SSH host key verification | Jenkins Git client plugin 3.11.0 and earlier does not perform SSH host key verification when connecting to Git repositories via SSH, enabling man-in-the-middle attacks. Git client Plugin 3.11.1 provides strategies for performing host key verification for administrators to select the one that meets their security needs.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.11.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36881'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-client-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1468'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/... | {'cwe_ids': ['CWE-322'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T17:39:44Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-4rx6-g5vg-5f3j | 2022-07-29T22:29:22Z | 2022-07-29T22:29:22Z | null | ['CVE-2022-31173'] | Juniper is vulnerable to @DOS GraphQL Nested Fragments overflow | ### GraphQL behaviour
Nested fragment in GraphQL might be quite hard to handle depending on the implementation language.
Some language support natively a max recursion depth. However, on most compiled languages, you should add a threshold of recursion.
```graphql
# Infinite loop example
query {
...a
}
fragment a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'juniper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.10'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/graphql-rust/juniper/security/advisories/GHSA-4rx6-g5vg-5f3j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31173'}, {'type': 'WEB', 'url': 'https://github.com/graphql-rust/juniper/commit/2b609ee057be950e3454b69fadc431d120e407bb'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-400', 'CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T22:29:22Z', 'nvd_published_at': '2022-08-01T19:15:00Z'} |
1.4.0 | GHSA-54w4-2f2p-f48h | 2022-08-06T05:19:00Z | 2022-07-26T00:01:06Z | null | ['CVE-2020-28438'] | deferred-exec Command Injection vulnerability | A command injection vulnerability affects all versions of package deferred-exec. The injection point is located in line 42 in lib/deferred-exec.js | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'deferred-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28438'}, {'type': 'PACKAGE', 'url': 'https://github.com/danheberden/deferred-exec'}, {'type': 'WEB', 'url': 'https://github.com/danheberden/deferred-exec/blob/master/lib/deferred-exec.js#L42'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/... | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:19:00Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-wc5v-r48v-g4vh | 2022-07-20T17:01:55Z | 2022-07-15T21:46:51Z | null | [] | Cilium host policy bypass in endpoint-routes mode with dual-stack | ### Impact
This vulnerability allows bypassing host policies for IPv6 traffic coming from a Cilium-managed pod and destined to the host-network namespace (e.g., to a host-network pod). Host policy enforcement on IPv4 or for traffic coming from outside the node is not affected.
Cilium is only affected by this vulnerab... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.7'}]... | [{'type': 'WEB', 'url': 'https://github.com/cilium/cilium/security/advisories/GHSA-wc5v-r48v-g4vh'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/commit/c758da7e9d19cd19b96dc90424c0b5ec7409cd0a'}, {'type': 'PACKAGE', 'url': 'https://github.com/cilium/cilium'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T21:46:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wf5x-cr3r-xr77 | 2022-07-22T16:32:45Z | 2022-07-14T00:00:23Z | null | ['CVE-2019-10761'] | vm2 before 3.6.11 vulnerable to sandbox escape | This affects the package vm2 before 3.6.11. It is possible to trigger a RangeError exception from the host rather than the "sandboxed" context by reaching the stack call limit with an infinite recursion. The returned object is then used to reference the mainModule property of the host code running the script allowing i... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'vm2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10761'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/issues/197'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/issues/197#issuecomment-480643832'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/commit/4b22... | {'cwe_ids': ['CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:36:08Z', 'nvd_published_at': '2022-07-13T09:15:00Z'} |
1.4.0 | GHSA-fm67-cv37-96ff | 2022-07-15T20:48:04Z | 2022-07-05T21:05:59Z | null | ['CVE-2022-31117'] | Potential double free of buffer during string decoding | ### Impact
_What kind of vulnerability is it? Who is impacted?_
When an error occurs while reallocating the buffer for string decoding, the buffer gets freed twice.
Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python.
### Patches
_Has the problem been patched? What v... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ujson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ultrajson/ultrajson/security/advisories/GHSA-fm67-cv37-96ff'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31117'}, {'type': 'WEB', 'url': 'https://github.com/ultrajson/ultrajson/commit/9c20de0f77b391093967e25d01fb48671104b15b'}, {'type': 'PACKAGE',... | {'cwe_ids': ['CWE-415'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T21:05:59Z', 'nvd_published_at': '2022-07-05T18:15:00Z'} |
1.4.0 | GHSA-cj7v-27pg-wf7q | 2022-07-19T19:42:17Z | 2022-07-07T20:55:34Z | null | ['CVE-2022-2047'] | Jetty invalid URI parsing may produce invalid HttpURI.authority | ### Description
URI use within Jetty's `HttpURI` class can parse invalid URIs such as `http://localhost;/path` as having an authority with a host of `localhost;`.
A URIs of the type `http://localhost;/path` should be interpreted to be either invalid or as `localhost;` to be the userinfo and no host.
However, `HttpURI.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.47'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed... | [{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-cj7v-27pg-wf7q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2047'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-... | {'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T20:55:34Z', 'nvd_published_at': '2022-07-07T21:15:00Z'} |
1.4.0 | GHSA-c28r-hw5m-5gv3 | 2022-08-05T00:22:25Z | 2022-07-15T20:44:55Z | null | ['CVE-2022-31159'] | Partial Path Traversal in com.amazonaws:aws-java-sdk-s3 | ### Overview
A partial-path traversal issue exists within the `downloadDirectory` method in the AWS S3 TransferManager component of the AWS SDK for Java v1. Applications using the SDK control the `destinationDirectory` argument, but S3 object keys are determined by the application that uploaded the objects. The `downl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.amazonaws:aws-java-sdk-s3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.261'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-java/security/advisories/GHSA-c28r-hw5m-5gv3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31159'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-java/commit/cb66c50c885566d9a7fce837a68dc48ddced8a9a'}, {'type': 'PACKAGE', 'url'... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T20:44:55Z', 'nvd_published_at': '2022-07-15T18:15:00Z'} |
1.4.0 | GHSA-99j7-mhfh-w84p | 2022-08-10T23:31:07Z | 2022-07-20T01:30:21Z | null | ['CVE-2022-31162'] | Slack Morphism for Rust before 0.41.0 can leak Slack OAuth client information in application debug logs | ### Impact
Potential/accidental leaking of Slack OAuth client information in application debug logs.
### Patches
More strict and secure debug formatting was introduced in v0.41 for OAuth secret types to avoid the possibility of printing sensitive information in application logs.
### Workarounds
Don't print/output in ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'slack-morphism'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.41.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/abdolence/slack-morphism-rust/security/advisories/GHSA-99j7-mhfh-w84p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31162'}, {'type': 'WEB', 'url': 'https://github.com/abdolence/slack-morphism-rust/pull/133'}, {'type': 'WEB', 'url': 'https://github... | {'cwe_ids': ['CWE-1258', 'CWE-200', 'CWE-212'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T01:30:21Z', 'nvd_published_at': '2022-07-22T04:15:00Z'} |
1.4.0 | GHSA-q5vx-44v4-gch4 | 2023-07-11T00:18:17Z | 2022-07-15T00:00:18Z | null | ['CVE-2022-32214'] | llhttp allows HTTP Request Smuggling via Improper Delimiting of Header Fields | The llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. The LF character (without CR) is sufficient to delimit HTTP header fields in the lihttp parser. According to RFC7230 section 3, only the CRLF sequence should delimit each header-field. This can lead to HTTP... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'llhttp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32214'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/llhttp/commit/18a4afc7ffb4e49dc9e2daebc50588199a6d1dbb'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1524692'}, {'type': 'WEB', 'url': 'https://datatracker.ietf.org/doc/html/rfc7... | {'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T00:18:17Z', 'nvd_published_at': '2022-07-14T15:15:00Z'} |
1.4.0 | GHSA-79x9-477g-w256 | 2022-08-10T21:09:46Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36918'] | Jenkins Buckminster Plugin does not perform a permission check in a method implementing form validation | Jenkins Buckminster Plugin 1.1.1 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:buckminster'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36918'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2747'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T21:09:46Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-f33p-9287-h552 | 2022-07-20T16:51:10Z | 2022-07-12T18:15:29Z | null | ['CVE-2022-35410'] | mat2 before 0.13.0 allows directory traversal during the ZIP archive cleaning process. | mat2 (aka metadata anonymisation toolkit) before 0.13.0 allows ../ directory traversal during the ZIP archive cleaning process. This primarily affects mat2 web instances, in which clients could obtain sensitive information via a crafted archive. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'mat2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35410'}, {'type': 'PACKAGE', 'url': 'https://0xacab.org/jvoisin/mat2'}, {'type': 'WEB', 'url': 'https://0xacab.org/jvoisin/mat2/-/commit/beebca4bf1cd3b935824c966ce077e7bcf610385'}, {'type': 'WEB', 'url': 'https://0xacab.org/jvoisin/mat2/-/issues/17... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:15:29Z', 'nvd_published_at': '2022-07-08T18:15:00Z'} |
1.4.0 | GHSA-xwqx-x38c-cw95 | 2022-07-21T21:39:07Z | 2022-07-08T00:00:42Z | null | ['CVE-2022-32061'] | Snipe-IT 6.0.2 vulnerable to Cross-site Scripting | An arbitrary file upload vulnerability in the Select User function under the People Menu component of Snipe-IT v6.0.2 allows attackers to execute arbitrary code via a crafted file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32061'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://grimthereaperteam.medium.com/snipe-it-version-v6-0-2-file-upload-cross-site-scripting-c02e46fa72ab'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T21:39:07Z', 'nvd_published_at': '2022-07-07T23:15:00Z'} |
1.4.0 | GHSA-3hx4-285w-v6mm | 2022-12-09T14:27:38Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34787'] | Jenkins Project Inheritance Plugin vulnerable to cross site scripting | Jenkins Project Inheritance Plugin 21.04.03 and earlier does not escape the reason a build is blocked in tooltips, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers able to control the reason a queue item is blocked. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'hudson.plugins:project-inheritance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '21.04.03'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34787'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-1919'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T14:27:38Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-5qj8-6xxj-hp9h | 2022-07-25T18:25:17Z | 2022-07-19T00:00:26Z | null | ['CVE-2022-2400'] | Dompdf before v2.0.0 vulnerable to chroot check bypass | Dompdf prior to version 2.0.0 is vulnerable to a chroot check bypass, which could cause disclosure of png and jpeg files. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dompdf/dompdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2400'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/commit/99aeec1efec9213e87098d42eb09439e7ee0bb6a'}, {'type': 'PACKAGE', 'url': 'https://github.com/dompdf/dompdf'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a6da5e5e-86be-499... | {'cwe_ids': ['CWE-73'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T21:39:57Z', 'nvd_published_at': '2022-07-18T15:15:00Z'} |
1.4.0 | GHSA-29xr-v42j-r956 | 2023-01-23T18:54:10Z | 2022-07-18T19:15:29Z | null | ['CVE-2020-7677'] | thenify before 3.3.1 made use of unsafe calls to `eval`. | Versions of thenify prior to 3.3.1 made use of unsafe calls to `eval`. Untrusted user input could thus lead to arbitrary code execution on the host. The patch in version 3.3.1 removes calls to `eval`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'thenify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:thenify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7677'}, {'type': 'WEB', 'url': 'https://github.com/thenables/thenify/issues/29'}, {'type': 'WEB', 'url': 'https://github.com/thenables/thenify/commit/0d94a24eb933bc835d568f3009f4d269c4c4c17a'}, {'type': 'PACKAGE', 'url': 'https://github.com/thenabl... | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-18T19:15:29Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-98g7-rxmf-rrxm | 2022-09-08T14:19:24Z | 2022-07-15T05:17:35Z | null | ['CVE-2021-4178'] | fabric8 kubernetes-client vulnerable | fabric8 Kubernetes client had an arbitrary code execution flaw in versions 5.0.0-beta-1 and higher. Attackers could potentially insert malicious YAMLs due to misconfigured YAML parsing. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.fabric8:kubernetes-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0-beta-1'}, {'fixed': '5.0.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.fabric8:kubernetes-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4178'}, {'type': 'WEB', 'url': 'https://github.com/fabric8io/kubernetes-client/issues/3653'}, {'type': 'WEB', 'url': 'https://github.com/fabric8io/kubernetes-client/commit/445103004d1ed3153d5abb272473451d05891e39'}, {'type': 'WEB', 'url': 'https://... | {'cwe_ids': ['CWE-502', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T05:17:35Z', 'nvd_published_at': '2022-08-24T16:15:00Z'} |
1.4.0 | GHSA-8jmw-wjr8-2x66 | 2023-09-07T00:12:52Z | 2022-07-02T00:00:19Z | null | ['CVE-2022-25900'] | Command injection in git-clone | All versions of package git-clone are vulnerable to Command Injection due to insecure usage of the `--upload-pack` feature of git.
## Credits
Credit to @lirantal for discovering this vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'git-clone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25900'}, {'type': 'WEB', 'url': 'https://github.com/jaz303/git-clone/commit/fd330459593aef7c7a8c54d786e3c4d5722749f9'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/9441f3a1212728476f7a6caa4acb2ccc'}, {'type': 'PACKAGE', 'url': 'https:/... | {'cwe_ids': ['CWE-77', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:51:34Z', 'nvd_published_at': '2022-07-01T20:15:00Z'} |
1.4.0 | GHSA-jvjh-9r4q-8q5q | 2022-12-12T22:53:46Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36907'] | Missing permission check in Jenkins OpenShift Deployer Plugin | OpenShift Deployer Plugin 1.2.0 and earlier does not perform a permission check in a method implementing form validation.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:openshift-deployer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36907'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/openshift-deployer-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1375%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:33:10Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-697v-pxg3-j262 | 2023-01-10T15:47:23Z | 2022-07-15T20:55:21Z | null | ['CVE-2020-28191'] | Togglz console missing cross-site request forgery (CSRF) protection | Togglz is an implementation of the Feature Toggles pattern for Java. There is no CSRF protection in the togglz console and could allow an attacker to guess the CSRF token value. Version 2.9.4 adds the necessary CSRF protection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.togglz:togglz-console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28191'}, {'type': 'WEB', 'url': 'https://github.com/togglz/togglz/pull/495'}, {'type': 'WEB', 'url': 'https://github.com/togglz/togglz/commit/ed66e3f584de954297ebaf98ea4a235286784707'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHS... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T20:55:21Z', 'nvd_published_at': '2022-12-26T22:15:00Z'} |
1.4.0 | GHSA-44vr-rwwj-p88h | 2022-08-11T22:14:40Z | 2022-07-15T21:46:08Z | null | ['CVE-2022-31180'] | Shescape vulnerable to insufficient escaping of whitespace | ### Impact
This only impacts users that use the `escape` or `escapeAll` functions with the `interpolation` option set to `true`. Example:
```javascript
import cp from "node:child_process";
import * as shescape from "shescape";
// 1. Prerequisites
const options = {
shell: "bash",
// Or
shell: "dash",
// Or
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'shescape'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.5.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-44vr-rwwj-p88h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31180'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/pull/322'}, {'type': 'WEB', 'url': 'https://github.com/ericc... | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T21:46:08Z', 'nvd_published_at': '2022-08-01T20:15:00Z'} |
1.4.0 | GHSA-8hv7-4vfc-w8pg | 2022-12-09T04:36:22Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34778'] | Cross-site Scripting in Jenkins TestNG Results Plugin | TestNG Results Plugin has options in its post-build step configuration to not escape test descriptions and exception messages. If those options are unchecked, TestNG Results Plugin 554.va4a552116332 and earlier renders the unescaped text provided in test results. This results in a cross-site scripting (XSS) vulnerabili... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:testng-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '555.va0d5f66521e3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 554.va4a552116332'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34778'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/testng-plugin-plugin/commit/a0d5f66521e3bc470047a0b683004ce8889d3369'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/testng-plugin-plugin'}, {'type': 'WEB', 'url': 'https://w... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T15:45:02Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-7vrv-5m2h-rjw9 | 2022-08-06T09:36:29Z | 2022-07-26T00:01:05Z | null | ['CVE-2020-28462'] | ion-parser Prototype Pollution when malicious INI file submitted to application that parses with `parse` | This affects all versions of package ion-parser. If an attacker submits a malicious INI file to an application that parses it with `parse` , they will pollute the prototype on the application. This can be exploited further depending on the context. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ion-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28462'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-IONPARSER-1048971'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:36:29Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-q4mr-j6w9-r2mr | 2022-12-12T19:59:43Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34798'] | Missing Authorization in Jenkins Deployment Dashboard Plugin | Jenkins Deployment Dashboard Plugin version 1.0.10 and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified HTTP URL using attacker-specified credentials. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ec2-deployment-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34798'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ec2-deployment-dashboard'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2798%20(2)'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T20:35:58Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-c8f2-5h29-8j2h | 2023-07-11T00:18:37Z | 2022-07-13T00:00:39Z | null | ['CVE-2022-33157'] | libconnect Extension for Typo3 Vulnerable to XSS | The libconnect extension before 7.0.8 and 8.x before 8.1.0 for TYPO3 allows XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'subhh/libconnect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'subhh/libconnect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33157'}, {'type': 'WEB', 'url': 'https://github.com/subhh/libconnect/commit/8c582f3f6575f8744bf29f99bc1697ab8b7bd3af'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2022-010'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T00:18:37Z', 'nvd_published_at': '2022-07-12T23:15:00Z'} |
1.4.0 | GHSA-qq3j-44gw-cf6r | 2022-08-10T15:41:24Z | 2022-07-30T00:00:35Z | null | ['CVE-2022-2576'] | Eclipse Californium denial of service (DoS) via Datagram Transport Layer Security (DTLS) handshake on parameter mismatch | In Eclipse Californium versions 2.0.0 to 2.7.2 and 3.0.0-3.5.0 a DTLS resumption handshake falls back to a DTLS full handshake on a parameter mismatch without using a HelloVerifyRequest. Especially, if used with certificate based cipher suites, that results in message amplification (DDoS other peers) and high CPU load ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.californium:californium-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.7.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.californiu... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2576'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-californium/californium/pull/2039'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-californium/californium/commit/0cc953a1dc071efc960130e229fcb4f8bda7f9df'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-408'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T15:41:24Z', 'nvd_published_at': '2022-07-29T14:15:00Z'} |
1.4.0 | GHSA-339q-62wm-c39w | 2022-09-08T14:24:12Z | 2022-07-15T21:32:13Z | null | ['CVE-2021-3859'] | Undertow vulnerable to Denial of Service (DoS) attacks | Undertow client side invocation timeout raised when calling over HTTP2, this vulnerability can allow attacker to carry out denial of service (DoS) attacks in versions less than 2.2.15 Final. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3859'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/pull/1296'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/commit/db0f5be43f8e2a4b88fbedd2eb6d5a95a29ceaa8'}, {'type': 'WEB', 'url': 'https://github.com/under... | {'cwe_ids': ['CWE-214', 'CWE-400', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T21:32:13Z', 'nvd_published_at': '2022-08-26T16:15:00Z'} |
1.4.0 | GHSA-j3h2-8mf8-j5r2 | 2022-07-29T13:11:52Z | 2022-07-15T18:12:47Z | null | ['CVE-2015-8031'] | Hudson XML API susceptible to External Entity Injection Vunerability prior to v3.3.2 | In versions prior to 3.3.2, Hudson exhibits a flaw in its XML API processing that can allow access to potentially sensitive information on the filesystem of the Hudson master server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.main:hudson-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8031'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j3h2-8mf8-j5r2'}, {'type': 'PACKAGE', 'url': 'https://github.com/hudson/hudson-2.x'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGJVNETHUDSONMAIN-31221'}... | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:12:47Z', 'nvd_published_at': '2022-07-18T21:15:00Z'} |
1.4.0 | GHSA-h3qr-fjhm-jphw | 2022-07-29T18:08:32Z | 2022-07-14T00:00:23Z | null | ['CVE-2019-10800'] | Codecov prior to 2.0.16 does not sanitize gcov arguments | This affects the package codecov before 2.0.16. The vulnerability occurs due to not sanitizing gcov arguments before being being provided to the popen method. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'codecov'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10800'}, {'type': 'WEB', 'url': 'https://github.com/codecov/codecov-python/commit/2a80aa434f74feb31242b6f213b75ce63ae97902'}, {'type': 'PACKAGE', 'url': 'https://github.com/codecov/codecov-python'}, {'type': 'WEB', 'url': 'https://github.com/pypa/a... | {'cwe_ids': ['CWE-88'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:40:09Z', 'nvd_published_at': '2022-07-13T12:15:00Z'} |
1.4.0 | GHSA-fr75-x856-q6j8 | 2022-07-22T15:20:28Z | 2022-07-17T00:00:44Z | null | ['CVE-2021-36711'] | Octobot before 0.4.4 mishandles Tentacles upload | WebInterface in OctoBot before 0.4.4 allows remote code execution because Tentacles upload is mishandled. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'OctoBot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36711'}, {'type': 'WEB', 'url': 'https://github.com/Drakkar-Software/OctoBot/issues/1966'}, {'type': 'PACKAGE', 'url': 'https://github.com/Drakkar-Software/OctoBot'}, {'type': 'WEB', 'url': 'https://github.com/Drakkar-Software/OctoBot/blob/master/C... | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T01:31:34Z', 'nvd_published_at': '2022-07-16T17:15:00Z'} |
1.4.0 | GHSA-p64x-8rxx-wf6q | 2022-08-19T17:09:36Z | 2022-07-05T00:00:53Z | null | ['CVE-2022-34265'] | Django `Trunc()` and `Extract()` database functions vulnerable to SQL Injection | An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The `Trunc()` and `Extract()` database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.functions.Trunc', 'django.db.models.functions.Extract']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2'}, {'fixed': '3.2.14'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34265'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/0dc9c016fadb71a067e5a42be30164e3f96c0492'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/5e2f4ddf2940704a26a4ac782b851989668d74db'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T21:08:03Z', 'nvd_published_at': '2022-07-04T16:15:00Z'} |
1.4.0 | GHSA-h9cw-7g8j-h66h | 2022-07-13T20:00:30Z | 2022-07-02T00:00:19Z | null | ['CVE-2022-25876'] | Server-Side Request Forgery in link-preview-js | The package link-preview-js before 2.1.17 are vulnerable to Server-side Request Forgery (SSRF) which allows attackers to send arbitrary requests to the local network and read the response. This is due to flawed DNS rebinding protection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'link-preview-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25876'}, {'type': 'WEB', 'url': 'https://github.com/ospfranco/link-preview-js/issues/115'}, {'type': 'WEB', 'url': 'https://github.com/ospfranco/link-preview-js/pull/117'}, {'type': 'PACKAGE', 'url': 'https://github.com/ospfranco/link-preview-js'},... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T21:08:37Z', 'nvd_published_at': '2022-07-01T20:15:00Z'} |
1.4.0 | GHSA-7943-82jg-wmw5 | 2022-07-21T15:54:19Z | 2022-07-12T22:05:11Z | null | ['CVE-2022-31105'] | Argo CD certificate verification is skipped for connections to OIDC providers | ### Impact
All versions of Argo CD starting with v0.4.0 are vulnerable to an improper certificate validation bug which could cause Argo CD to trust a malicious (or otherwise untrustworthy) OIDC provider.
(Note: external OIDC provider support was added in v0.11.0. Before that version, the notes below apply only to the... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '2.2.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2... | [{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-7943-82jg-wmw5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31105'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/releases/... | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T22:05:11Z', 'nvd_published_at': '2022-07-12T22:15:00Z'} |
1.4.0 | GHSA-x4g7-5xrm-5wmq | 2022-12-12T19:55:21Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34797'] | Cross-Site Request Forgery in Jenkins Deployment Dashboard Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Deployment Dashboard Plugin 1.0.10 and earlier allows attackers to connect to an attacker-specified HTTP URL using attacker-specified credentials. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ec2-deployment-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34797'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ec2-deployment-dashboard'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2798%20(2)'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T20:37:21Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-7mwh-4pqv-wmr8 | 2022-08-15T21:58:30Z | 2022-07-02T00:00:19Z | null | ['CVE-2022-25758'] | Regular expression denial of service in scss-tokenizer | All versions of the package `scss-tokenizer` prior to 0.4.3 are vulnerable to Regular Expression Denial of Service (ReDoS) via the `loadAnnotation()` function, due to the usage of insecure regex. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'scss-tokenizer'}, 'ecosystem_specific': {'affected_functions': ['scss.tokenize']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.4.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25758'}, {'type': 'WEB', 'url': 'https://github.com/sasstools/scss-tokenizer/issues/45'}, {'type': 'WEB', 'url': 'https://github.com/sasstools/scss-tokenizer/pull/49'}, {'type': 'WEB', 'url': 'https://github.com/sasstools/scss-tokenizer/commit/a53b... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T21:07:13Z', 'nvd_published_at': '2022-07-01T20:15:00Z'} |
1.4.0 | GHSA-99mq-hw5m-gwjj | 2022-12-13T14:25:43Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36921'] | Missing permission check in Coverity Plugin allows capturing credentials | Coverity Plugin 1.11.4 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:coverity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36921'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/coverity-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2790%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur... | {'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:24:43Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-qf4p-7gqc-x6jx | 2022-08-10T21:14:01Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36895'] | Jenkins Compuware Topaz Utilities Plugin is missing authorization | A missing permission check in Jenkins Compuware Topaz Utilities Plugin 1.0.8 and earlier allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-topaz-utilities'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.8'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36895'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2619'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T21:14:01Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-j2gv-q44j-xm42 | 2022-12-09T04:26:38Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34784'] | Cross site scripting in Jenkins build-metrics Plugin | Jenkins build-metrics Plugin 1.3 does not escape the build description on one of its views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Build/Update permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:build-metrics'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34784'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/build-metrics-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-1118'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:25:15Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-c8rp-cgf4-937w | 2022-07-29T22:26:10Z | 2022-07-29T22:26:10Z | null | [] | mezzio-swoole Applications Using Diactoros Vulnerable to HTTP Host Header Attack | ### Impact
mezzio-swoole applications using Diactoros for their PSR-7 implementation, and which are either not behind a proxy, or can be accessed via untrusted proxies, can potentially have the host, protocol, and/or port of a `Laminas\Diactoros\Uri` instance associated with the incoming server request modified to ref... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'mezzio/mezzio-swoole'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'mezzio/mezzio-swoole'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.0'... | [{'type': 'WEB', 'url': 'https://github.com/mezzio/mezzio-swoole/security/advisories/GHSA-c8rp-cgf4-937w'}, {'type': 'PACKAGE', 'url': 'https://github.com/mezzio/mezzio-swoole'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T22:26:10Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rpr3-cw39-3pxh | 2023-01-10T15:40:17Z | 2022-07-15T19:41:47Z | null | ['CVE-2020-10650'] | jackson-databind before 2.9.10.4 vulnerable to unsafe deserialization | The com.fasterxml.jackson.core:jackson-databind library before version 2.9.10.4 is vulnerable to an Unsafe Deserialization vulnerability when handling interactions related to the class `ignite-jta`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10650'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2658'}, {'type': 'WEB', 'url': 'https://github.com/luisgarciacheckmarx/LGV_onefile/issues/19'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-datab... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T19:41:47Z', 'nvd_published_at': '2022-12-26T20:15:00Z'} |
1.4.0 | GHSA-8528-c6m6-gppm | 2022-12-12T22:51:56Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36906'] | CSRF vulnerability in Jenkins OpenShift Deployer Plugin | OpenShift Deployer Plugin 1.2.0 and earlier does not perform a permission check in a method implementing form validation.
This form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:openshift-deployer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36906'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1375%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:35:56Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-3829-mgmw-jcg4 | 2022-07-11T19:25:08Z | 2022-07-01T00:01:14Z | null | ['CVE-2021-40663'] | Prototype Pollution in deep.assign | deep.assign npm package 0.0.0-alpha.0 is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution'). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'deep.assign'}, 'versions': ['0.0.0-alpha.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40663'}, {'type': 'WEB', 'url': 'https://github.com/janbialostok/deep-assign/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/janbialostok/deep-assign'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220826-0002/'}, ... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:51:54Z', 'nvd_published_at': '2022-06-30T12:15:00Z'} |
1.4.0 | GHSA-5mv2-vqq7-mq5h | 2022-12-12T23:10:27Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36908'] | CSRF vulnerability in Jenkins OpenShift Deployer Plugin | OpenShift Deployer Plugin 1.2.0 and earlier does not perform permission checks in methods implementing form validation.
These form validation methods do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:openshift-deployer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36908'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/openshift-deployer-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1375%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:36:35Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-m58q-qq5h-mgqq | 2022-07-21T22:36:20Z | 2022-07-21T22:36:20Z | null | [] | Islandora 2.0 before 2.4.1 could allow any user to upload content into a repository | ### Impact
This vulnerability would allow any user, regardless of permissions, to upload content into a repository. This affects installations of Islandora core 2.0 or greater.
### Patches
Upgrade immediately to the [latest release](https://github.com/Islandora/islandora/releases/tag/2.4.1) of Islandora.
### Workarou... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'islandora/islandora'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.4.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Islandora/islandora/security/advisories/GHSA-m58q-qq5h-mgqq'}, {'type': 'WEB', 'url': 'https://github.com/Islandora/islandora/commit/573d6878edf057987f1e41e5068de0074573e4c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/Islandora-CLAW/islandora'}, {'type': 'WEB', 'url': '... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T22:36:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rqqx-fvqx-539g | 2022-08-11T15:17:01Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36891'] | Jenkins Deployer Framework Plugin allows attackers with Item/Read permission to read deployment logs | A missing permission check in Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier allows attackers with Item/Read permission but without Deploy Now/Deploy permission to read deployment logs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:deployer-framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '86.v7b_a_4a_55b_f3ec'}]}], 'database_specific': {'last_known_affected_version_range': '<= 85.v1d1888e8c021'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36891'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2205'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:17:01Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-jjc5-fp7p-6f8w | 2022-08-11T18:42:41Z | 2022-07-15T21:39:14Z | null | ['CVE-2022-31179'] | Shescape prior to 1.5.8 vulnerable to insufficient escaping of line feeds for CMD | ### Impact
This impacts users that use Shescape (any API function) to escape arguments for **cmd.exe** on **Windows**. An attacker can omit all arguments following their input by including a line feed character (`'\n'`) in the payload. Example:
```javascript
import cp from "node:child_process";
import * as shescape f... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'shescape'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-jjc5-fp7p-6f8w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31179'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/pull/332'}, {'type': 'WEB', 'url': 'https://github.com/ericc... | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T21:39:14Z', 'nvd_published_at': '2022-08-01T20:15:00Z'} |
1.4.0 | GHSA-376v-xgjx-7mfr | 2022-07-21T15:57:26Z | 2022-07-15T19:14:27Z | null | ['CVE-2022-31142'] | fastify-bearer-auth vulnerable to Timing Attack Vector | ### Impact
fastify-bearer-auth does not securely use crypto.timingSafeEqual. A malicious attacker could estimate the length of one valid bearer token. According to the corresponding RFC 6750, the bearer token has only base64 valid characters, reducing the range of characters for a brute force attack.
All versions of ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'fastify-bearer-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.1'}, {'last_affected': '6.0.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@fastify/bearer-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.2'}]}]}... | [{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-bearer-auth/security/advisories/GHSA-376v-xgjx-7mfr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31142'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-bearer-auth/commit/0c468a616d7e56126dc468150f6a5a92e530b8e4'}, {'t... | {'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T19:14:27Z', 'nvd_published_at': '2022-07-14T19:15:00Z'} |
1.4.0 | GHSA-m59q-vgq9-75cr | 2022-12-12T21:35:24Z | 2022-07-01T00:01:08Z | null | ['CVE-2022-34809'] | Password stored in plain text by Jenkins RQM Plugin | RQM Plugin 2.8 and earlier stores a password unencrypted in its global configuration file `net.praqma.jenkins.rqm.RqmBuilder.xml` on the Jenkins controller as part of its configuration.
This password can be viewed by users with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.praqma:rqm-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34809'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rqm-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2155'}] | {'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:35:24Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-g86g-chm8-7r2p | 2022-07-29T19:56:34Z | 2022-07-29T19:56:34Z | null | ['CVE-2021-32724'] | check-spelling workflow vulnerable to token leakage via symlink attack | ### Impact
For a repository with the [check-spelling action](https://github.com/marketplace/actions/check-spelling) enabled that triggers on `pull_request_target` (or `schedule`), an attacker can send a crafted Pull Request that causes a `GITHUB_TOKEN` to be exposed.
With the `GITHUB_TOKEN`, it's possible to push comm... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'GitHub Actions', 'name': 'check-spelling/check-spelling'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.19'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/check-spelling/check-spelling/security/advisories/GHSA-g86g-chm8-7r2p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32724'}, {'type': 'WEB', 'url': 'https://github.com/check-spelling/check-spelling/commit/436362fc6b588d9d561cbdb575260ca593c8dc56'},... | {'cwe_ids': ['CWE-532'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T19:56:34Z', 'nvd_published_at': '2021-09-09T21:15:00Z'} |
1.4.0 | GHSA-7c8f-m389-4xjc | 2022-12-12T21:38:20Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34779'] | Missing permission checks in Jenkins XebiaLabs XL Release Plugin allow enumerating credentials IDs | XebiaLabs XL Release Plugin 22.0.0 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.xebialabs.ci:xlrelease-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 22.0.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34779'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xlrelease-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2773%20(1)'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:38:20Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-hcjr-6jq3-392p | 2022-07-12T15:28:33Z | 2022-07-01T00:01:08Z | null | ['CVE-2022-34818'] | Missing Authorization in Jenkins Failed Job Deactivator Plugin | Jenkins Failed Job Deactivator Plugin 1.2.1 and earlier does not perform permission checks in several views and HTTP endpoints, allowing attackers with Overall/Read permission to disable jobs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'de.einsundeins.jenkins.plugins.failedjobdeactivator:failedJobDeactivator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34818'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/failedjobdeactivator-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2061'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T15:28:33Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-cm59-pr5q-cw85 | 2022-07-11T20:59:02Z | 2022-07-11T20:59:02Z | null | ['CVE-2022-27772'] | Temporary Directory Hijacking to Local Privilege Escalation Vulnerability in org.springframework.boot:spring-boot | spring-boot versions prior to version `v2.2.11.RELEASE` was vulnerable to temporary directory hijacking. This vulnerability impacted the `org.springframework.boot.web.server.AbstractConfigurableWebServerFactory.createTempDir` method.
The vulnerable method is used to create a work directory for embedded web servers suc... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.boot:spring-boot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.11.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.10.RELEASE'}}] | [{'type': 'WEB', 'url': 'https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-cm59-pr5q-cw85'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27772'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-boot/commit/667ccdae84822072f9ea1a27ed5c77964c71002d'}, {... | {'cwe_ids': ['CWE-377', 'CWE-379', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-11T20:59:02Z', 'nvd_published_at': '2022-03-30T18:15:00Z'} |
1.4.0 | GHSA-4v5c-5v6c-37pj | 2022-12-09T14:30:59Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34789'] | Jenkins Matrix Reloaded Plugin vulnerable to CSRF | Jenkins Matrix Reloaded Plugin 1.1.3 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to rebuild previous matrix builds. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.praqma:matrix-reloaded'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34789'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/matrix-reloaded-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2016'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T14:30:59Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-rm23-6mwv-8q9q | 2022-12-12T19:43:42Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34793'] | XML External Entity Reference in Jenkins Recipe Plugin | Jenkins Recipe Plugin 1.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:recipe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34793'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/recipe-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2000'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T21:18:56Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-jxg9-2ch7-f552 | 2022-08-06T05:31:43Z | 2022-07-28T00:00:53Z | null | ['CVE-2022-34971'] | Feehi CMS arbitrary code execution via crafted PHP file | An arbitrary file upload vulnerability in the Advertising Management module of Feehi CMS v2.1.1 allows attackers to execute arbitrary code via a crafted PHP file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34971'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/62'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}] | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:31:43Z', 'nvd_published_at': '2022-07-27T02:15:00Z'} |
1.4.0 | GHSA-xxj3-55p6-xg3h | 2023-03-01T20:32:45Z | 2022-07-25T00:00:31Z | null | ['CVE-2022-24294'] | Apache MXNet vulnerable to potential denial-of-service by excessive resource consumption | A regular expression used in Apache MXNet (incubating) is vulnerable to a potential denial-of-service by excessive resource consumption. The bug could be exploited when loading a model in Apache MXNet that has a specially crafted operator name that would cause the regular expression evaluation to use excessive resource... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mxnet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24294'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/mxnet'}, {'type': 'WEB', 'url': 'https://github.com/apache/mxnet/releases/tag/1.9.1'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/b1fbfmvzlr2bbp95lqoh3mtovclfcl3o'}, {'type... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T20:32:45Z', 'nvd_published_at': '2022-07-24T18:15:00Z'} |
1.4.0 | GHSA-cr6p-23cf-w9g9 | 2022-07-21T14:59:11Z | 2022-07-12T22:15:53Z | null | ['CVE-2022-31139'] | UnsafeAccessor 1.4.0 until 1.7.0 has no security checking for UnsafeAccess.getInstance() | ### Overview
Affected versions have no limit to using unsafe-accessor. Can be ignored if `SecurityCheck.AccessLimiter` not setup
### Details
If UA was loaded as a named module, the internal data of UA will be protected by JVM and others can only access UA via UA's standard api.
Main application can setup `SecurityCh... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.github.karlatemp:unsafe-accessor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.7.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Karlatemp/UnsafeAccessor/security/advisories/GHSA-cr6p-23cf-w9g9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31139'}, {'type': 'WEB', 'url': 'https://github.com/Karlatemp/UnsafeAccessor/commit/4ef83000184e8f13239a1ea2847ee401d81585fd'}, {'type': ... | {'cwe_ids': ['CWE-200', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T22:15:53Z', 'nvd_published_at': '2022-07-11T19:15:00Z'} |
1.4.0 | GHSA-2588-cx6w-6vm6 | 2022-12-09T14:19:16Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34781'] | Missing permission checks in Jenkins XebiaLabs XL Release Plugin allow capturing credentials | Missing permission checks in Jenkins XebiaLabs XL Release Plugin 22.0.0 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. XebiaLabs XL Release Plugin ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.xebialabs.ci:xlrelease-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34781'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xlrelease-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2773%20(2)'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T14:19:16Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-9x8m-2xpf-crp3 | 2022-07-29T22:26:57Z | 2022-07-29T22:26:57Z | null | [] | Scrapy before v2.6.2 and v1.8.3 vulnerable to one proxy sending credentials to another | ### Impact
When the [built-in HTTP proxy downloader middleware](https://docs.scrapy.org/en/2.6/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpproxy) processes a request with `proxy` metadata, and that `proxy` metadata includes proxy credentials, the built-in HTTP proxy downloader middleware ... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'scrapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'scrapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/security/advisories/GHSA-9x8m-2xpf-crp3'}, {'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/commit/af7dd16d8ded3e6cb2946603688f4f4a5212e80f'}, {'type': 'PACKAGE', 'url': 'https://github.com/scrapy/scrapy'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T22:26:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9x4h-8wgm-8xfg | 2022-07-06T19:26:17Z | 2022-07-06T19:26:17Z | null | [] | Malformed CAR panics and excessive memory usage | ### Impact
**Versions impacted**
* `<=` go-car@v0.3.3
* `<=` go-car@v2.3.0
**Description**
Decoding CAR data from untrusted user input can cause:
- Panics:
- Out of bound memory access
- Out of memory
- Divide by zero
- Excessive memory usage
Such panics can be triggered by intentionally malformed CARv1 ... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ipld/go-car'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/ipld/go-car/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ipld/go-car/security/advisories/GHSA-9x4h-8wgm-8xfg'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipld/go-car'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0503'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:26:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-pc62-cq5x-3j5g | 2022-08-06T09:35:27Z | 2022-07-26T00:01:05Z | null | ['CVE-2020-7678'] | node-import `params` argument can be controlled by users without any sanitization | This affects all versions of package node-import. The `params` argument of module function can be controlled by users without any sanitization. This is then provided to the “eval” function located in line 79 in the index file `index.js`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-import'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7678'}, {'type': 'PACKAGE', 'url': 'https://github.com/mahdaen/node-import'}, {'type': 'WEB', 'url': 'https://github.com/mahdaen/node-import/blob/master/index.js%23L79'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-NODEIMPORT-5716... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:35:27Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-m7gr-5w5g-36jf | 2022-07-29T13:06:38Z | 2022-07-23T00:00:22Z | null | ['CVE-2022-34037'] | Out-of-bounds Read can lead to client side denial of service | An out-of-bounds read in the rewrite function at /modules/caddyhttp/rewrite/rewrite.go in Caddy v2.5.1 allows attackers to cause a Denial of Service (DoS) on the client side via a crafted URI.
According to the maintainer, the bug only affects the client side of the request and cannot cause a denial of service on the s... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/caddyserver/caddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34037'}, {'type': 'WEB', 'url': 'https://github.com/caddyserver/caddy/issues/4775'}, {'type': 'WEB', 'url': 'https://github.com/caddyserver/caddy/commit/693e9b5283e675b56084ecc83d73176cab0ee27c'}, {'type': 'PACKAGE', 'url': 'https://github.com/cadd... | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T22:12:07Z', 'nvd_published_at': '2022-07-22T15:15:00Z'} |
1.4.0 | GHSA-f825-f98c-gj3g | 2023-09-11T16:22:58Z | 2022-07-29T00:00:18Z | null | ['CVE-2022-2564'] | automattic/mongoose vulnerable to Prototype pollution via Schema.path | Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment. Affected versions of this package are vulnerable to Prototype Pollution. The `Schema.path()` function is vulnerable to prototype pollution when setting the schema object. This vulnerability allows modification of the Object prot... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'mongoose'}, 'ecosystem_specific': {'affected_functions': ['mongoose.Schema']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mongoose'}, 'ecosystem_specific': {'affected_functions': ['mong... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2564'}, {'type': 'WEB', 'url': 'https://github.com/Automattic/mongoose/commit/99b418941e2fc974199b8e5bd9d382bb50bf680a'}, {'type': 'WEB', 'url': 'https://github.com/automattic/mongoose/commit/a45cfb6b0ce0067ae9794cfa80f7917e1fb3c6f8'}, {'type': 'WE... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-04T14:22:23Z', 'nvd_published_at': '2022-07-28T20:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.