schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-8mgq-6r2q-82w9
2022-08-30T20:54:12Z
2022-08-30T20:54:12Z
null
[]
Captcha Bypass in strapi-plugin-ezforms
### Impact Users using any captcha providers ### Patches >0.1.0 ### References [Issue](https://github.com/excl-networks/strapi-plugin-ezforms/issues/15)
[]
[{'package': {'ecosystem': 'npm', 'name': 'strapi-plugin-ezforms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/excl-networks/strapi-plugin-ezforms/security/advisories/GHSA-8mgq-6r2q-82w9'}, {'type': 'WEB', 'url': 'https://github.com/excl-networks/strapi-plugin-ezforms/issues/15'}, {'type': 'WEB', 'url': 'https://github.com/excl-networks/strapi-plugin-ezforms/commit/a8372190b7122e5dda3...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:54:12Z', 'nvd_published_at': None}
1.4.0
GHSA-r38f-c4h4-hqq2
2022-12-06T14:34:33Z
2022-08-06T05:51:38Z
null
['CVE-2022-31197']
PostgreSQL JDBC Driver SQL Injection in ResultSet.refreshRow() with malicious column names
### Impact _What kind of vulnerability is it? Who is impacted?_ The PGJDBC implementation of the `java.sql.ResultRow.refreshRow()` method is not performing escaping of column names so a malicious column name that contains a statement terminator, e.g. `;`, could lead to SQL injection. This could lead to executing addit...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '42.2.26'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '42.4.0'}, {'fixed': '4...
[{'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-r38f-c4h4-hqq2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31197'}, {'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/commit/739e599d52ad80f8dcd6efedc6157859b1a9d637'}, {'type': 'PACKAGE', 'url': 'htt...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:51:38Z', 'nvd_published_at': '2022-08-03T19:15:00Z'}
1.4.0
GHSA-f4qr-f4xx-hjxw
2022-08-12T17:50:17Z
2022-08-12T17:31:58Z
null
['CVE-2022-35980']
OpenSearch vulnerable to Improper Authorization of Index Containing Sensitive Information
### Impact Requests to an OpenSearch cluster configured with advanced access control features ([document level security (DLS)](https://opensearch.org/docs/latest/security-plugin/access-control/document-level-security/), [field level security (FLS)](https://opensearch.org/docs/latest/security-plugin/access-control/field...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.opensearch.plugin:opensearch-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0.0'}, {'fixed': '2.2.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.0.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/opensearch-project/security/security/advisories/GHSA-f4qr-f4xx-hjxw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35980'}, {'type': 'WEB', 'url': 'https://github.com/opensearch-project/security/pull/1999'}, {'type': 'WEB', 'url': 'https://github.co...
{'cwe_ids': ['CWE-612'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-12T17:31:58Z', 'nvd_published_at': '2022-08-12T18:15:00Z'}
1.4.0
GHSA-c8fj-4pm8-mp2c
2022-08-30T20:54:28Z
2022-08-30T20:54:28Z
null
['CVE-2022-36051']
Broken Authorization in ZITADEL Actions
### Impact **Actions**, introduced in ZITADEL **1.42.0** on the API and **1.56.0** for Console, is a feature, where users with role `ORG_OWNER` are able to create Javascript Code, which is invoked by the system at certain points during the login. **Actions**, for example, allow creating authorizations (user grants) on...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/zitadel/zitadel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.2.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/zitadel/zitadel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.42.0'}, {'fixed': '1.8...
[{'type': 'WEB', 'url': 'https://github.com/zitadel/zitadel/security/advisories/GHSA-c8fj-4pm8-mp2c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36051'}, {'type': 'WEB', 'url': 'https://github.com/zitadel/zitadel/pull/4237'}, {'type': 'WEB', 'url': 'https://github.com/zitadel/zitadel/pull/4...
{'cwe_ids': ['CWE-436', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:54:28Z', 'nvd_published_at': '2022-08-31T23:15:00Z'}
1.4.0
GHSA-wmqq-r32m-87c5
2023-02-13T17:47:30Z
2022-08-29T20:06:50Z
null
['CVE-2022-0718']
python-oslo-utils has improper password parsing
A flaw was found in python-oslo-utils. Due to improper parsing, passwords with a double quote ( " ) in them cause incorrect masking in debug logs, causing any part of the password after the double quote to be plaintext
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'oslo-utils'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0718'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2022:0993'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2022:8873'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-0718'}, {'type': '...
{'cwe_ids': ['CWE-522', 'CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:32:37Z', 'nvd_published_at': '2022-08-29T15:15:00Z'}
1.4.0
GHSA-rqmg-hrg4-fm69
2022-08-15T20:02:22Z
2022-08-06T00:00:36Z
null
['CVE-2022-37450']
Go Ethereum allows attackers to use manipulation of time-difference values to achieve replacement of main-chain blocks
Go Ethereum (aka geth) through 1.10.21 allows attackers to increase rewards by mining blocks in certain situations, and using a manipulation of time-difference values to achieve replacement of main-chain blocks, aka Riskless Uncle Making (RUM), as exploited in the wild in 2020 through 2022.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.21'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37450'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}, {'type': 'WEB', 'url': 'https://github.com/ethereum/go-ethereum/blob/671094279e8d27f4b4c3c94bf8b636c26b473976/core/forkchoice.go#L91-L94'}, {'type': 'WEB', 'url': 'http...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T16:51:45Z', 'nvd_published_at': '2022-08-05T21:15:00Z'}
1.4.0
GHSA-9x9j-vrhj-v364
2022-08-11T15:51:10Z
2022-08-05T00:00:30Z
null
['CVE-2022-28731']
Apache JSPWiki CSRF due to crafted request on UserPreferences.jsp
A carefully crafted request on UserPreferences.jsp could trigger an CSRF vulnerability on Apache JSPWiki before 2.11.3, which could allow the attacker to modify the email associated with the attacked account, and then a reset password request from the login page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28731'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jspwiki'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-28732'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:51:10Z', 'nvd_published_at': '2022-08-04T07:15:00Z'}
1.4.0
GHSA-746v-hfh2-xphm
2023-04-13T17:53:42Z
2022-08-17T00:00:21Z
null
['CVE-2022-38362']
Remote code execution in Apache Airflow Docker's Provider
Apache Airflow Docker's Provider prior to 3.0.0 shipped with an example DAG that was vulnerable to (authenticated) remote code exploit of code on the Airflow worker host. Disable loading of example DAGs or upgrade apache-airflow-providers-docker to 3.0.0 or above.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow-providers-docker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38362'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/614p38nf4gbk8xhvnskj9b1sqo2dknkb'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/08/16/1'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-04-13T17:53:42Z', 'nvd_published_at': '2022-08-16T14:15:00Z'}
1.4.0
GHSA-3486-rvxc-hrrj
2022-08-10T17:59:03Z
2022-08-03T00:00:57Z
null
['CVE-2020-28434']
gitblame susceptible to command injection
A command injection vulnerability affects all versions of package gitblame. The injection point is located in line 15 in lib/gitblame.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'gitblame'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28434'}, {'type': 'PACKAGE', 'url': 'https://github.com/xjamundx/gitblame'}, {'type': 'WEB', 'url': 'https://github.com/xjamundx/gitblame/blob/master/lib/gitblame.js#L15'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-GITBLAME-1050...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T17:59:03Z', 'nvd_published_at': '2022-08-02T14:15:00Z'}
1.4.0
GHSA-qhm8-69qh-g76j
2022-08-30T20:28:16Z
2022-08-23T00:00:19Z
null
['CVE-2022-2927']
Missing password strength check in notrinos/notrinos-erp
In versions of notrinos/notrinoserp prior to 0.7 new account passwords were missing a password strength check.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'notrinos/notrinos-erp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2927'}, {'type': 'WEB', 'url': 'https://github.com/notrinos/notrinoserp/commit/e61e76b44c6a2b28a4a648a06ef34f65c376ec1e'}, {'type': 'PACKAGE', 'url': 'https://github.com/notrinos/notrinoserp'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7fa...
{'cwe_ids': ['CWE-521'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:28:16Z', 'nvd_published_at': '2022-08-22T09:15:00Z'}
1.4.0
GHSA-85xx-xhjm-rhrw
2022-08-11T20:49:17Z
2022-08-03T00:00:57Z
null
['CVE-2022-25867']
Socket.IO-client Java before 2.0.1 vulnerable to NULL Pointer Dereference
The package io.socket:socket.io-client before 2.0.1 is vulnerable to NULL Pointer Dereference when parsing a packet with with invalid payload format.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.socket:socket.io-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25867'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io-client-java/issues/508%23issuecomment-1179817361'}, {'type': 'WEB', 'url': 'https://github.com/socketio/socket.io-client-java/commit/8664499b6f31154f49783531f778dac5387b766b'}, ...
{'cwe_ids': ['CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T17:41:10Z', 'nvd_published_at': '2022-08-02T14:15:00Z'}
1.4.0
GHSA-vh4f-fgpp-x8x2
2022-09-01T22:23:21Z
2022-08-25T00:00:29Z
null
['CVE-2022-24375']
node-opcua DoS when bypassing limitations for excessive memory consumption
The package node-opcua before 2.74.0 are vulnerable to Denial of Service (DoS) when bypassing the limitations for excessive memory consumption by sending multiple `CloseSession` requests with the `deleteSubscription` parameter equal to `False`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-opcua'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.74.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24375'}, {'type': 'WEB', 'url': 'https://github.com/node-opcua/node-opcua/pull/1182'}, {'type': 'WEB', 'url': 'https://github.com/node-opcua/node-opcua/commit/3fd46ec156e7718a506be41f3916310b6bdd0407'}, {'type': 'WEB', 'url': 'https://github.com/no...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:23:21Z', 'nvd_published_at': '2022-08-24T05:15:00Z'}
1.4.0
GHSA-mw9h-hcp7-fgc6
2022-09-01T17:39:37Z
2022-08-24T00:00:32Z
null
['CVE-2022-33916']
Exposure of Sensitive Information in OPCFoundation.NetStandard.Opc.Ua.Server
OPC UA .NET Standard Reference Server 1.04.368 allows a remote attacker to cause the application to access sensitive information.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'OPCFoundation.NetStandard.Opc.Ua.Server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.370.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33916'}, {'type': 'WEB', 'url': 'https://github.com/OPCFoundation/UA-.NETStandard/commit/313aa2a2499d8690cf719a67176e131517bb8b78'}, {'type': 'WEB', 'url': 'https://files.opcfoundation.org/SecurityBulletins/OPC%20Foundation%20Security%20Bulletin%20...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-29T18:41:29Z', 'nvd_published_at': '2022-08-23T01:15:00Z'}
1.4.0
GHSA-7w85-pp86-p4pq
2022-08-06T05:40:16Z
2022-08-06T05:40:16Z
null
['CVE-2022-31190']
XMLUI's metadata of withdrawn Items is exposed to anonymous users
### Impact Metadata on a withdrawn Item is exposed via the XMLUI "mets.xml" object, as long as you know the handle/URL of the withdrawn Item. This vulnerability only impacts the XMLUI. However, this vulnerability is very low severity as Item metadata does not tend to contain highly secure or sensitive information. _T...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-xmlui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '6.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.3'}}]
[{'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/security/advisories/GHSA-7w85-pp86-p4pq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31190'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/pull/2451'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/commit/574e2...
{'cwe_ids': ['CWE-200', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:40:16Z', 'nvd_published_at': '2022-08-01T20:15:00Z'}
1.4.0
GHSA-7r9x-qrpr-3cxw
2022-08-11T18:06:05Z
2022-08-11T18:06:05Z
null
[]
mofh Vulnerable to Improper Restriction of XML External Entity Reference
The `xml.etree.ElementTree` module that mofh used up until version `1.0.1` implements a simple and efficient API for parsing and creating XML data. But it makes the application vulnerable to: - [Billion Laughs attack](https://en.wikipedia.org/wiki/Billion_laughs_attack): It is a type of denial-of-service attack aimed ...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'mofh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Wallvon/mofh/security/advisories/GHSA-7r9x-qrpr-3cxw'}, {'type': 'WEB', 'url': 'https://github.com/Wallvon/mofh/commit/da0d33cfd368e2f237ab28bf7a7f00e3d281005a'}, {'type': 'PACKAGE', 'url': 'https://github.com/Wallvon/mofh'}, {'type': 'WEB', 'url': 'https://www.acunetix.com/v...
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T18:06:05Z', 'nvd_published_at': None}
1.4.0
GHSA-8cw9-5hmv-77w6
2022-08-11T20:57:49Z
2022-08-06T05:21:19Z
null
['CVE-2022-35920']
sanic vulnerable to Path Traversal when using `app.static` if using encoded `%2F` URLs
### Impact Access to lateral directories when using `app.static` if using encoded `%2F` URLs. Parent directory traversal is not impacted. ### Patches - v20.12.7 (LTS) - v21.12.2 (LTS) - v22.6.1 ### References https://github.com/sanic-org/sanic/issues/2478 https://github.com/sanic-org/sanic/pull/2495 ### For more inf...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'sanic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '22.0.0'}, {'fixed': '22.6.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'sanic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '21.0.0'}, {'fixed': '21.12.2'}]}]}, {'package': {'ecosystem'...
[{'type': 'WEB', 'url': 'https://github.com/sanic-org/sanic/security/advisories/GHSA-8cw9-5hmv-77w6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35920'}, {'type': 'WEB', 'url': 'https://github.com/sanic-org/sanic/issues/2478'}, {'type': 'WEB', 'url': 'https://github.com/sanic-org/sanic/pull...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:21:19Z', 'nvd_published_at': '2022-08-01T22:15:00Z'}
1.4.0
GHSA-8629-83m5-rj75
2022-09-16T21:06:16Z
2022-08-25T00:00:29Z
null
['CVE-2022-38080']
exceedone/exment and exceedone/laravel-admin Cross-site Scripting vulnerability
Reflected cross-site scripting vulnerability in Exment ((PHP8) exceedone/exment v5.0.2 and earlier and exceedone/laravel-admin v3.0.0 and earlier, (PHP7) exceedone/exment v4.4.2 and earlier and exceedone/laravel-admin v2.2.2 and earlier) allows a remote authenticated attacker to inject an arbitrary script.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'exceedone/exment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.3'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'exceedone/exment'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.3'}]}]}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38080'}, {'type': 'WEB', 'url': 'https://exment.net/docs/#/release_note?id=v503-20220817'}, {'type': 'WEB', 'url': 'https://exment.net/docs/#/weakness/20220817'}, {'type': 'PACKAGE', 'url': 'https://github.com/exceedone/exment'}, {'type': 'WEB', 'u...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:06:16Z', 'nvd_published_at': '2022-08-24T09:15:00Z'}
1.4.0
GHSA-grvv-h2f9-7v9c
2022-08-30T19:54:34Z
2022-08-30T19:54:34Z
null
['CVE-2022-36009']
gomatrixserverlib and Dendrite vulnerable to incorrect parsing of the event default power level in event auth
### Impact The power level parsing within gomatrixserverlib was failing to parse the `"events_default"` key of the `m.room.power_levels` event, defaulting the event default power level to zero in all cases. In rooms where the `"events_default"` power level had been changed, this could result in events either being in...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/matrix-org/dendrite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/matrix-org/gomatrixserverlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixe...
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/gomatrixserverlib/security/advisories/GHSA-grvv-h2f9-7v9c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36009'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/gomatrixserverlib/commit/723fd495dde835d078b9f2074b6b62c06dea4575'}, {...
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T19:54:34Z', 'nvd_published_at': '2022-08-19T21:15:00Z'}
1.4.0
GHSA-2fxf-qj94-3f83
2022-08-11T15:44:49Z
2022-08-05T00:00:31Z
null
['CVE-2022-27166']
Apache JSPWiki XSS due to crafted request on XHRHtml2Markup.jsp
A carefully crafted request on XHRHtml2Markup.jsp could trigger an XSS vulnerability on Apache JSPWiki up to and including 2.11.2, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Version 2.11.3 contains a fix for the problem
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.11.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27166'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jspwiki'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-28732'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:44:49Z', 'nvd_published_at': '2022-08-04T07:15:00Z'}
1.4.0
GHSA-2fvv-qxrq-7jq6
2022-08-18T18:55:01Z
2022-08-18T18:55:01Z
null
[]
apollo-server-core vulnerable to URL-based XSS attack affecting IE11 on default landing page
### Impact The default landing page contained HTML to display a sample `curl` command which is made visible if the full landing page bundle could not be fetched from Apollo's CDN. The server's URL is directly interpolated into this command inside the browser from `window.location.href`. On some older browsers such as ...
[]
[{'package': {'ecosystem': 'npm', 'name': 'apollo-server-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.10.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/security/advisories/GHSA-2fvv-qxrq-7jq6'}, {'type': 'WEB', 'url': 'https://github.com/apollographql/apollo-server/commit/68a439b6e3af9edc8a2480092f2d49f058be1e64'}, {'type': 'PACKAGE', 'url': 'https://github.com/apollographql/apollo-server'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T18:55:01Z', 'nvd_published_at': None}
1.4.0
GHSA-hph8-29xw-qfxx
2022-08-11T15:46:16Z
2022-08-05T00:00:30Z
null
['CVE-2022-28732']
Apache JSPWiki XSS due to crafted request in WeblogPlugin
A carefully crafted request on WeblogPlugin could trigger an XSS vulnerability on Apache JSPWiki, which could allow the attacker to execute javascript in the victim's browser and get some sensitive information about the victim. Apache JSPWiki users should upgrade to 2.11.3 or later.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.jspwiki:jspwiki-main'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28732'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/jspwiki'}, {'type': 'WEB', 'url': 'https://jspwiki-wiki.apache.org/Wiki.jsp?page=CVE-2022-28732'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:46:16Z', 'nvd_published_at': '2022-08-04T07:15:00Z'}
1.4.0
GHSA-8wj3-cpmr-8whp
2022-08-18T19:19:58Z
2022-08-16T00:00:30Z
null
['CVE-2022-2818']
Cockpit Content Platform vulnerable to 2FA bypass
Cockpit Content Platform through version 2.2.1 is vulnerable to a two-factor authentication (2FA) bypass. The 2FA secret is disclosed in a JWT token after user logs into their account, allowing an attacker to bypass the 2FA code. A patch is available on the `develop` branch and is expected to be part of version 2.2.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'cockpit-hq/cockpit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2818'}, {'type': 'WEB', 'url': 'https://github.com/cockpit-hq/cockpit/commit/4bee1b903ee20818f4a8ecb9d974b9536cc54cb4'}, {'type': 'PACKAGE', 'url': 'https://github.com/cockpit-hq/cockpit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ee27e5d...
{'cwe_ids': ['CWE-212', 'CWE-287', 'CWE-305'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:19:58Z', 'nvd_published_at': '2022-08-15T11:21:00Z'}
1.4.0
GHSA-763j-q7wv-vf3m
2022-08-06T05:46:49Z
2022-08-06T05:46:49Z
null
['CVE-2022-31193']
JSPUI's controlled vocabulary feature vulnerable to Open Redirect before v6.4 and v5.11
### Impact The JSPUI controlled vocabulary servlet is vulnerable to an open redirect attack, where an attacker can craft a malicious URL that looks like a legitimate DSpace/repository URL. When that URL is clicked by the target, it redirects them to a site of the attacker's choice. _This vulnerability does NOT impact...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-jspui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0'}, {'fixed': '5.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.dspace:dspace-jspui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0'}, {'fixed': '6.4'}]}]}...
[{'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/security/advisories/GHSA-763j-q7wv-vf3m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31193'}, {'type': 'WEB', 'url': 'https://github.com/DSpace/DSpace/commit/5f72424a478f59061dcc516b866dcc687bc3f9de'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:46:49Z', 'nvd_published_at': '2022-08-01T21:15:00Z'}
1.4.0
GHSA-rpj2-w6fr-79hc
2022-12-05T23:03:56Z
2022-08-24T00:00:29Z
null
['CVE-2020-35509']
Keycloak vulnerable to Improper Certificate Validation
keycloak accepts an expired certificate by the direct-grant authenticator because of missing time stamp validations. The highest threat from this vulnerability is to data confidentiality and integrity. This issue was partially fixed in version [13.0.1](https://github.com/keycloak/keycloak/pull/6330) and more completel...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35509'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/pull/6330'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/pull/8067'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/478319348bdfdb9b6d39122...
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:03:56Z', 'nvd_published_at': '2022-08-23T16:15:00Z'}
1.4.0
GHSA-wv39-f3vx-3v6q
2022-08-30T20:49:19Z
2022-08-24T00:00:29Z
null
['CVE-2022-37223']
SQL injection in jflyfox jfinal
JFinal CMS 5.1.0 is vulnerable to SQL Injection via /jfinal_cms/system/role/list.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.jflyfox:jflyfox_jfinal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37223'}, {'type': 'WEB', 'url': 'https://github.com/jflyfox/jfinal_cms/issues/49'}, {'type': 'PACKAGE', 'url': 'https://github.com/jflyfox/jfinal_cms'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:49:19Z', 'nvd_published_at': '2022-08-23T14:15:00Z'}
1.4.0
GHSA-cqfc-9452-r36j
2022-08-10T18:16:03Z
2022-08-03T00:00:57Z
null
['CVE-2020-28425']
curljs Command Injection vulnerability
A command injection vulnerability affects all versions of the package curljs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'curljs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28425'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-CURLJS-1050404'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:16:03Z', 'nvd_published_at': '2022-08-02T14:15:00Z'}
1.4.0
GHSA-mrxv-pr4h-963q
2022-08-10T17:58:03Z
2022-08-03T00:00:57Z
null
['CVE-2020-28451']
image-tiler susceptible to command injection
A command injection vulnerability affects the package image-tiler before version 2.0.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'image-tiler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 2.0.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28451'}, {'type': 'WEB', 'url': 'https://github.com/MrP/image-tiler/commit/f4a0b13a4bf43655fc4013e04bbceaf77aecbeb8'}, {'type': 'PACKAGE', 'url': 'https://github.com/MrP/image-tiler'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-I...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T17:58:03Z', 'nvd_published_at': '2022-08-02T14:15:00Z'}
1.4.0
GHSA-cvx8-ppmc-78hm
2022-09-30T00:44:46Z
2022-08-18T19:02:18Z
2022-09-30T00:44:46Z
['CVE-2022-1798']
Duplicate Advisory: KubeVirt arbitrary host file read from the VM
## Duplicate Advisory This advisory is a duplicate of [GHSA-qv98-3369-g364](https://github.com/advisories/GHSA-qv98-3369-g364). This link is maintained to preserve external references. ## Original Description **Summary** As part of a Kubevirt audit performed by NCC group, a finding dealing with systemic lack of path ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'kubevirt.io/kubevirt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.20.0'}, {'fixed': '0.55.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/google/security-research/security/advisories/GHSA-cvx8-ppmc-78hm'}, {'type': 'WEB', 'url': 'https://github.com/kubevirt/kubevirt/security/advisories/GHSA-qv98-3369-g364'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1798'}, {'type': 'PACKAGE', 'url'...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:02:18Z', 'nvd_published_at': '2022-09-15T16:15:00Z'}
1.4.0
GHSA-jhxh-68jj-68c7
2022-08-30T20:42:03Z
2022-08-23T00:00:16Z
null
['CVE-2022-2890']
Cross site scripting in yetiforce/yetiforce-crm
Cross-site Scripting (XSS) - Stored in GitHub repository yetiforcecompany/yetiforcecrm prior to 6.4.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2890'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/2c14baaf8dbc7fd82d5c585f2fa0c23528450618'}, {'type': 'PACKAGE', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-30T20:42:03Z', 'nvd_published_at': '2022-08-22T14:15:00Z'}
1.4.0
GHSA-34j6-m83c-52x2
2022-09-01T22:23:46Z
2022-08-26T00:03:30Z
null
['CVE-2022-36527']
Jfinal Cross-site Scripting vulnerability
Jfinal CMS v5.1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the post title text field under the publish blog module.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.jflyfox:jflyfox_jfinal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36527'}, {'type': 'WEB', 'url': 'https://github.com/jflyfox/jfinal_cms/issues/45'}, {'type': 'PACKAGE', 'url': 'https://github.com/jflyfox/jflyfox_jfinal'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:23:46Z', 'nvd_published_at': '2022-08-25T19:15:00Z'}
1.4.0
GHSA-qmhj-m29v-gvmr
2022-08-18T14:18:37Z
2022-08-18T14:18:37Z
null
['CVE-2022-36024']
Bots using py-cord as Discord API wrapper are vulnerable to shutdowns through remote code execution
### Impact py-cord is a an API wrapper for Discord written in Python. Bots using py-cord version 2.0.0 are vulnerable to remote shutdown if they are added to the server with the `application.commands` scope without the `bot` scope. Currently, it appears that all public bots that use slash commands are affected. ### Pa...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'py-cord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.1'}]}], 'versions': ['2.0.0']}]
[{'type': 'WEB', 'url': 'https://github.com/Pycord-Development/pycord/security/advisories/GHSA-qmhj-m29v-gvmr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36024'}, {'type': 'WEB', 'url': 'https://github.com/Pycord-Development/pycord/pull/1568'}, {'type': 'PACKAGE', 'url': 'https://github.co...
{'cwe_ids': ['CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T14:18:37Z', 'nvd_published_at': '2022-08-18T15:15:00Z'}
1.4.0
GHSA-7r3h-m5j6-3q42
2022-08-18T19:01:36Z
2022-08-18T19:01:36Z
null
['CVE-2022-35954']
@actions/core has Delimiter Injection Vulnerability in exportVariable
## Impact The `core.exportVariable` function uses a well known delimiter that attackers can use to break out of that specific variable and assign values to other arbitrary variables. Workflows that write untrusted values to the `GITHUB_ENV` file may cause the path or other environment variables to be modified without ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@actions/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/actions/toolkit/security/advisories/GHSA-7r3h-m5j6-3q42'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35954'}, {'type': 'WEB', 'url': 'https://github.com/actions/toolkit/commit/4beda9cbc00ba6eefe387a937c21087ccb8ee9df'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-74', 'CWE-77'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-18T19:01:36Z', 'nvd_published_at': '2022-08-15T11:21:00Z'}
1.4.0
GHSA-gq75-5gc3-rfwg
2022-08-06T09:36:15Z
2022-07-26T00:01:05Z
null
['CVE-2020-7649']
snyk-broker Path Traversal before v4.73.0
This affects the package snyk-broker before 4.73.0. It allows arbitrary file reads for users with access to Snyk's internal network via directory traversal.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'snyk-broker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.73.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7649'}, {'type': 'WEB', 'url': 'https://github.com/snyk/broker/commit/90e0bac07a800b7c4c6646097c9c89d6b878b429'}, {'type': 'PACKAGE', 'url': 'https://github.com/snyk/broker'}, {'type': 'WEB', 'url': 'https://github.com/snyk/broker/releases/tag/v4.7...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:36:15Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-pmjg-52h9-72qv
2022-07-21T15:54:45Z
2022-07-12T22:11:16Z
null
['CVE-2022-31102']
Argo CD SSO users vulnerable to Cross-site Scripting
### Impact All versions of Argo CD starting with 2.3.0 are vulnerable to a cross-site scripting (XSS) bug which could allow an attacker to inject arbitrary JavaScript in the `/auth/callback` page in a victim's browser. This vulnerability only affects Argo CD instances which have SSO enabled. The exploit also assume...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.3.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.0'}, {'fixed': '2....
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-pmjg-52h9-72qv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31102'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/3800a1e49d1d5a00a6692fee83396a37a6abe89a'}, {'type': 'WEB', 'url': 'h...
{'cwe_ids': ['CWE-79'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T22:11:16Z', 'nvd_published_at': '2022-07-12T22:15:00Z'}
1.4.0
GHSA-vpf7-q2rx-26mh
2022-12-12T21:17:14Z
2022-07-28T00:00:43Z
null
['CVE-2022-36888']
Jenkins HashiCorp Vault Plugin does not perform permission checks in several HTTP endpoints that perform Vault connection tests
A missing permission check in Jenkins HashiCorp Vault Plugin 354.vdb_858fd6b_f48 and earlier allows attackers with Overall/Read permission to obtain credentials stored in Vault with attacker-specified path and keys.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.datapipe.jenkins.plugins:hashicorp-vault-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '355.v3b_38d767a_b_a_8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 354.vdb'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36888'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/hashicorp-vault-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2593'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:16:00Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-5469-c5p2-xv5g
2022-08-10T23:47:07Z
2022-07-23T00:00:15Z
null
['CVE-2022-34113']
Dataease before 1.11.2 allows arbitrary code execution via crafter plugin
An issue in the component /api/plugin/upload of Dataease v1.11.1 allows attackers to execute arbitrary code via a crafted plugin. Version 1.11.2 contains a patch for the problem.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.dataease:dataease-plugin-common'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34113'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/issues/2431'}, {'type': 'PACKAGE', 'url': 'https://github.com/dataease/dataease'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/releases/tag/v1.11.2'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T22:10:26Z', 'nvd_published_at': '2022-07-22T23:15:00Z'}
1.4.0
GHSA-h5g3-v72x-hc6f
2022-12-09T04:52:55Z
2022-07-01T00:01:08Z
null
['CVE-2022-34806']
Plaintext Storage of a Password in Jenkins Jigomerge Plugin
Jenkins Jigomerge Plugin 0.9 and earlier stores passwords unencrypted in job `config.xml` files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jigomerge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34806'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jigomerge-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2083'}]
{'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T15:41:52Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-cm7j-p8hc-97vj
2022-12-12T20:36:46Z
2022-07-28T00:00:43Z
null
['CVE-2022-36881']
Jenkins Git client plugin 3.11.0 does not perform SSH host key verification
Jenkins Git client plugin 3.11.0 and earlier does not perform SSH host key verification when connecting to Git repositories via SSH, enabling man-in-the-middle attacks. Git client Plugin 3.11.1 provides strategies for performing host key verification for administrators to select the one that meets their security needs....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.11.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.11.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36881'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-client-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1468'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/...
{'cwe_ids': ['CWE-322'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T17:39:44Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-4rx6-g5vg-5f3j
2022-07-29T22:29:22Z
2022-07-29T22:29:22Z
null
['CVE-2022-31173']
Juniper is vulnerable to @DOS GraphQL Nested Fragments overflow
### GraphQL behaviour Nested fragment in GraphQL might be quite hard to handle depending on the implementation language. Some language support natively a max recursion depth. However, on most compiled languages, you should add a threshold of recursion. ```graphql # Infinite loop example query { ...a } fragment a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'juniper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/graphql-rust/juniper/security/advisories/GHSA-4rx6-g5vg-5f3j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31173'}, {'type': 'WEB', 'url': 'https://github.com/graphql-rust/juniper/commit/2b609ee057be950e3454b69fadc431d120e407bb'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-400', 'CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T22:29:22Z', 'nvd_published_at': '2022-08-01T19:15:00Z'}
1.4.0
GHSA-54w4-2f2p-f48h
2022-08-06T05:19:00Z
2022-07-26T00:01:06Z
null
['CVE-2020-28438']
deferred-exec Command Injection vulnerability
A command injection vulnerability affects all versions of package deferred-exec. The injection point is located in line 42 in lib/deferred-exec.js
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'deferred-exec'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28438'}, {'type': 'PACKAGE', 'url': 'https://github.com/danheberden/deferred-exec'}, {'type': 'WEB', 'url': 'https://github.com/danheberden/deferred-exec/blob/master/lib/deferred-exec.js#L42'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:19:00Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-wc5v-r48v-g4vh
2022-07-20T17:01:55Z
2022-07-15T21:46:51Z
null
[]
Cilium host policy bypass in endpoint-routes mode with dual-stack
### Impact This vulnerability allows bypassing host policies for IPv6 traffic coming from a Cilium-managed pod and destined to the host-network namespace (e.g., to a host-network pod). Host policy enforcement on IPv4 or for traffic coming from outside the node is not affected. Cilium is only affected by this vulnerab...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cilium/cilium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.7'}]...
[{'type': 'WEB', 'url': 'https://github.com/cilium/cilium/security/advisories/GHSA-wc5v-r48v-g4vh'}, {'type': 'WEB', 'url': 'https://github.com/cilium/cilium/commit/c758da7e9d19cd19b96dc90424c0b5ec7409cd0a'}, {'type': 'PACKAGE', 'url': 'https://github.com/cilium/cilium'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T21:46:51Z', 'nvd_published_at': None}
1.4.0
GHSA-wf5x-cr3r-xr77
2022-07-22T16:32:45Z
2022-07-14T00:00:23Z
null
['CVE-2019-10761']
vm2 before 3.6.11 vulnerable to sandbox escape
This affects the package vm2 before 3.6.11. It is possible to trigger a RangeError exception from the host rather than the "sandboxed" context by reaching the stack call limit with an infinite recursion. The returned object is then used to reference the mainModule property of the host code running the script allowing i...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'vm2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10761'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/issues/197'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/issues/197#issuecomment-480643832'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/commit/4b22...
{'cwe_ids': ['CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:36:08Z', 'nvd_published_at': '2022-07-13T09:15:00Z'}
1.4.0
GHSA-fm67-cv37-96ff
2022-07-15T20:48:04Z
2022-07-05T21:05:59Z
null
['CVE-2022-31117']
Potential double free of buffer during string decoding
### Impact _What kind of vulnerability is it? Who is impacted?_ When an error occurs while reallocating the buffer for string decoding, the buffer gets freed twice. Due to how UltraJSON uses the internal decoder, this double free is impossible to trigger from Python. ### Patches _Has the problem been patched? What v...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ujson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ultrajson/ultrajson/security/advisories/GHSA-fm67-cv37-96ff'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31117'}, {'type': 'WEB', 'url': 'https://github.com/ultrajson/ultrajson/commit/9c20de0f77b391093967e25d01fb48671104b15b'}, {'type': 'PACKAGE',...
{'cwe_ids': ['CWE-415'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T21:05:59Z', 'nvd_published_at': '2022-07-05T18:15:00Z'}
1.4.0
GHSA-cj7v-27pg-wf7q
2022-07-19T19:42:17Z
2022-07-07T20:55:34Z
null
['CVE-2022-2047']
Jetty invalid URI parsing may produce invalid HttpURI.authority
### Description URI use within Jetty's `HttpURI` class can parse invalid URIs such as `http://localhost;/path` as having an authority with a host of `localhost;`. A URIs of the type `http://localhost;/path` should be interpreted to be either invalid or as `localhost;` to be the userinfo and no host. However, `HttpURI....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.47'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed...
[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-cj7v-27pg-wf7q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2047'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-...
{'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T20:55:34Z', 'nvd_published_at': '2022-07-07T21:15:00Z'}
1.4.0
GHSA-c28r-hw5m-5gv3
2022-08-05T00:22:25Z
2022-07-15T20:44:55Z
null
['CVE-2022-31159']
Partial Path Traversal in com.amazonaws:aws-java-sdk-s3
### Overview A partial-path traversal issue exists within the `downloadDirectory` method in the AWS S3 TransferManager component of the AWS SDK for Java v1. Applications using the SDK control the `destinationDirectory` argument, but S3 object keys are determined by the application that uploaded the objects. The `downl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.amazonaws:aws-java-sdk-s3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.261'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-java/security/advisories/GHSA-c28r-hw5m-5gv3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31159'}, {'type': 'WEB', 'url': 'https://github.com/aws/aws-sdk-java/commit/cb66c50c885566d9a7fce837a68dc48ddced8a9a'}, {'type': 'PACKAGE', 'url'...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T20:44:55Z', 'nvd_published_at': '2022-07-15T18:15:00Z'}
1.4.0
GHSA-99j7-mhfh-w84p
2022-08-10T23:31:07Z
2022-07-20T01:30:21Z
null
['CVE-2022-31162']
Slack Morphism for Rust before 0.41.0 can leak Slack OAuth client information in application debug logs
### Impact Potential/accidental leaking of Slack OAuth client information in application debug logs. ### Patches More strict and secure debug formatting was introduced in v0.41 for OAuth secret types to avoid the possibility of printing sensitive information in application logs. ### Workarounds Don't print/output in ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'slack-morphism'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.41.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/abdolence/slack-morphism-rust/security/advisories/GHSA-99j7-mhfh-w84p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31162'}, {'type': 'WEB', 'url': 'https://github.com/abdolence/slack-morphism-rust/pull/133'}, {'type': 'WEB', 'url': 'https://github...
{'cwe_ids': ['CWE-1258', 'CWE-200', 'CWE-212'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T01:30:21Z', 'nvd_published_at': '2022-07-22T04:15:00Z'}
1.4.0
GHSA-q5vx-44v4-gch4
2023-07-11T00:18:17Z
2022-07-15T00:00:18Z
null
['CVE-2022-32214']
llhttp allows HTTP Request Smuggling via Improper Delimiting of Header Fields
The llhttp parser in the http module in Node.js does not strictly use the CRLF sequence to delimit HTTP requests. The LF character (without CR) is sufficient to delimit HTTP header fields in the lihttp parser. According to RFC7230 section 3, only the CRLF sequence should delimit each header-field. This can lead to HTTP...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'llhttp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32214'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/llhttp/commit/18a4afc7ffb4e49dc9e2daebc50588199a6d1dbb'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1524692'}, {'type': 'WEB', 'url': 'https://datatracker.ietf.org/doc/html/rfc7...
{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T00:18:17Z', 'nvd_published_at': '2022-07-14T15:15:00Z'}
1.4.0
GHSA-79x9-477g-w256
2022-08-10T21:09:46Z
2022-07-28T00:00:42Z
null
['CVE-2022-36918']
Jenkins Buckminster Plugin does not perform a permission check in a method implementing form validation
Jenkins Buckminster Plugin 1.1.1 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:buckminster'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36918'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2747'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T21:09:46Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-f33p-9287-h552
2022-07-20T16:51:10Z
2022-07-12T18:15:29Z
null
['CVE-2022-35410']
mat2 before 0.13.0 allows directory traversal during the ZIP archive cleaning process.
mat2 (aka metadata anonymisation toolkit) before 0.13.0 allows ../ directory traversal during the ZIP archive cleaning process. This primarily affects mat2 web instances, in which clients could obtain sensitive information via a crafted archive.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'mat2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35410'}, {'type': 'PACKAGE', 'url': 'https://0xacab.org/jvoisin/mat2'}, {'type': 'WEB', 'url': 'https://0xacab.org/jvoisin/mat2/-/commit/beebca4bf1cd3b935824c966ce077e7bcf610385'}, {'type': 'WEB', 'url': 'https://0xacab.org/jvoisin/mat2/-/issues/17...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:15:29Z', 'nvd_published_at': '2022-07-08T18:15:00Z'}
1.4.0
GHSA-xwqx-x38c-cw95
2022-07-21T21:39:07Z
2022-07-08T00:00:42Z
null
['CVE-2022-32061']
Snipe-IT 6.0.2 vulnerable to Cross-site Scripting
An arbitrary file upload vulnerability in the Select User function under the People Menu component of Snipe-IT v6.0.2 allows attackers to execute arbitrary code via a crafted file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32061'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://grimthereaperteam.medium.com/snipe-it-version-v6-0-2-file-upload-cross-site-scripting-c02e46fa72ab'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T21:39:07Z', 'nvd_published_at': '2022-07-07T23:15:00Z'}
1.4.0
GHSA-3hx4-285w-v6mm
2022-12-09T14:27:38Z
2022-07-01T00:01:07Z
null
['CVE-2022-34787']
Jenkins Project Inheritance Plugin vulnerable to cross site scripting
Jenkins Project Inheritance Plugin 21.04.03 and earlier does not escape the reason a build is blocked in tooltips, resulting in a cross-site scripting (XSS) vulnerability exploitable by attackers able to control the reason a queue item is blocked.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'hudson.plugins:project-inheritance'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '21.04.03'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34787'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-1919'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T14:27:38Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-5qj8-6xxj-hp9h
2022-07-25T18:25:17Z
2022-07-19T00:00:26Z
null
['CVE-2022-2400']
Dompdf before v2.0.0 vulnerable to chroot check bypass
Dompdf prior to version 2.0.0 is vulnerable to a chroot check bypass, which could cause disclosure of png and jpeg files.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dompdf/dompdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2400'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/commit/99aeec1efec9213e87098d42eb09439e7ee0bb6a'}, {'type': 'PACKAGE', 'url': 'https://github.com/dompdf/dompdf'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a6da5e5e-86be-499...
{'cwe_ids': ['CWE-73'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T21:39:57Z', 'nvd_published_at': '2022-07-18T15:15:00Z'}
1.4.0
GHSA-29xr-v42j-r956
2023-01-23T18:54:10Z
2022-07-18T19:15:29Z
null
['CVE-2020-7677']
thenify before 3.3.1 made use of unsafe calls to `eval`.
Versions of thenify prior to 3.3.1 made use of unsafe calls to `eval`. Untrusted user input could thus lead to arbitrary code execution on the host. The patch in version 3.3.1 removes calls to `eval`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'thenify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:thenify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7677'}, {'type': 'WEB', 'url': 'https://github.com/thenables/thenify/issues/29'}, {'type': 'WEB', 'url': 'https://github.com/thenables/thenify/commit/0d94a24eb933bc835d568f3009f4d269c4c4c17a'}, {'type': 'PACKAGE', 'url': 'https://github.com/thenabl...
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-18T19:15:29Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-98g7-rxmf-rrxm
2022-09-08T14:19:24Z
2022-07-15T05:17:35Z
null
['CVE-2021-4178']
fabric8 kubernetes-client vulnerable
fabric8 Kubernetes client had an arbitrary code execution flaw in versions 5.0.0-beta-1 and higher. Attackers could potentially insert malicious YAMLs due to misconfigured YAML parsing.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.fabric8:kubernetes-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0-beta-1'}, {'fixed': '5.0.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.fabric8:kubernetes-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4178'}, {'type': 'WEB', 'url': 'https://github.com/fabric8io/kubernetes-client/issues/3653'}, {'type': 'WEB', 'url': 'https://github.com/fabric8io/kubernetes-client/commit/445103004d1ed3153d5abb272473451d05891e39'}, {'type': 'WEB', 'url': 'https://...
{'cwe_ids': ['CWE-502', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T05:17:35Z', 'nvd_published_at': '2022-08-24T16:15:00Z'}
1.4.0
GHSA-8jmw-wjr8-2x66
2023-09-07T00:12:52Z
2022-07-02T00:00:19Z
null
['CVE-2022-25900']
Command injection in git-clone
All versions of package git-clone are vulnerable to Command Injection due to insecure usage of the `--upload-pack` feature of git. ## Credits Credit to @lirantal for discovering this vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'git-clone'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25900'}, {'type': 'WEB', 'url': 'https://github.com/jaz303/git-clone/commit/fd330459593aef7c7a8c54d786e3c4d5722749f9'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/9441f3a1212728476f7a6caa4acb2ccc'}, {'type': 'PACKAGE', 'url': 'https:/...
{'cwe_ids': ['CWE-77', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:51:34Z', 'nvd_published_at': '2022-07-01T20:15:00Z'}
1.4.0
GHSA-jvjh-9r4q-8q5q
2022-12-12T22:53:46Z
2022-07-28T00:00:42Z
null
['CVE-2022-36907']
Missing permission check in Jenkins OpenShift Deployer Plugin
OpenShift Deployer Plugin 1.2.0 and earlier does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:openshift-deployer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36907'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/openshift-deployer-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1375%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:33:10Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-697v-pxg3-j262
2023-01-10T15:47:23Z
2022-07-15T20:55:21Z
null
['CVE-2020-28191']
Togglz console missing cross-site request forgery (CSRF) protection
Togglz is an implementation of the Feature Toggles pattern for Java. There is no CSRF protection in the togglz console and could allow an attacker to guess the CSRF token value. Version 2.9.4 adds the necessary CSRF protection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.togglz:togglz-console'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28191'}, {'type': 'WEB', 'url': 'https://github.com/togglz/togglz/pull/495'}, {'type': 'WEB', 'url': 'https://github.com/togglz/togglz/commit/ed66e3f584de954297ebaf98ea4a235286784707'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHS...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T20:55:21Z', 'nvd_published_at': '2022-12-26T22:15:00Z'}
1.4.0
GHSA-44vr-rwwj-p88h
2022-08-11T22:14:40Z
2022-07-15T21:46:08Z
null
['CVE-2022-31180']
Shescape vulnerable to insufficient escaping of whitespace
### Impact This only impacts users that use the `escape` or `escapeAll` functions with the `interpolation` option set to `true`. Example: ```javascript import cp from "node:child_process"; import * as shescape from "shescape"; // 1. Prerequisites const options = { shell: "bash", // Or shell: "dash", // Or ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'shescape'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.5.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-44vr-rwwj-p88h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31180'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/pull/322'}, {'type': 'WEB', 'url': 'https://github.com/ericc...
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T21:46:08Z', 'nvd_published_at': '2022-08-01T20:15:00Z'}
1.4.0
GHSA-8hv7-4vfc-w8pg
2022-12-09T04:36:22Z
2022-07-01T00:01:07Z
null
['CVE-2022-34778']
Cross-site Scripting in Jenkins TestNG Results Plugin
TestNG Results Plugin has options in its post-build step configuration to not escape test descriptions and exception messages. If those options are unchecked, TestNG Results Plugin 554.va4a552116332 and earlier renders the unescaped text provided in test results. This results in a cross-site scripting (XSS) vulnerabili...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:testng-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '555.va0d5f66521e3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 554.va4a552116332'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34778'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/testng-plugin-plugin/commit/a0d5f66521e3bc470047a0b683004ce8889d3369'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/testng-plugin-plugin'}, {'type': 'WEB', 'url': 'https://w...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T15:45:02Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-7vrv-5m2h-rjw9
2022-08-06T09:36:29Z
2022-07-26T00:01:05Z
null
['CVE-2020-28462']
ion-parser Prototype Pollution when malicious INI file submitted to application that parses with `parse`
This affects all versions of package ion-parser. If an attacker submits a malicious INI file to an application that parses it with `parse` , they will pollute the prototype on the application. This can be exploited further depending on the context.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ion-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28462'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-IONPARSER-1048971'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:36:29Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-q4mr-j6w9-r2mr
2022-12-12T19:59:43Z
2022-07-01T00:01:07Z
null
['CVE-2022-34798']
Missing Authorization in Jenkins Deployment Dashboard Plugin
Jenkins Deployment Dashboard Plugin version 1.0.10 and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to connect to an attacker-specified HTTP URL using attacker-specified credentials.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ec2-deployment-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34798'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ec2-deployment-dashboard'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2798%20(2)'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T20:35:58Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-c8f2-5h29-8j2h
2023-07-11T00:18:37Z
2022-07-13T00:00:39Z
null
['CVE-2022-33157']
libconnect Extension for Typo3 Vulnerable to XSS
The libconnect extension before 7.0.8 and 8.x before 8.1.0 for TYPO3 allows XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'subhh/libconnect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.8'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'subhh/libconnect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33157'}, {'type': 'WEB', 'url': 'https://github.com/subhh/libconnect/commit/8c582f3f6575f8744bf29f99bc1697ab8b7bd3af'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2022-010'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T00:18:37Z', 'nvd_published_at': '2022-07-12T23:15:00Z'}
1.4.0
GHSA-qq3j-44gw-cf6r
2022-08-10T15:41:24Z
2022-07-30T00:00:35Z
null
['CVE-2022-2576']
Eclipse Californium denial of service (DoS) via Datagram Transport Layer Security (DTLS) handshake on parameter mismatch
In Eclipse Californium versions 2.0.0 to 2.7.2 and 3.0.0-3.5.0 a DTLS resumption handshake falls back to a DTLS full handshake on a parameter mismatch without using a HelloVerifyRequest. Especially, if used with certificate based cipher suites, that results in message amplification (DDoS other peers) and high CPU load ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.californium:californium-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.7.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.7.2'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.californiu...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2576'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-californium/californium/pull/2039'}, {'type': 'WEB', 'url': 'https://github.com/eclipse-californium/californium/commit/0cc953a1dc071efc960130e229fcb4f8bda7f9df'}, {'type': 'WEB', 'url': 'ht...
{'cwe_ids': ['CWE-408'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T15:41:24Z', 'nvd_published_at': '2022-07-29T14:15:00Z'}
1.4.0
GHSA-339q-62wm-c39w
2022-09-08T14:24:12Z
2022-07-15T21:32:13Z
null
['CVE-2021-3859']
Undertow vulnerable to Denial of Service (DoS) attacks
Undertow client side invocation timeout raised when calling over HTTP2, this vulnerability can allow attacker to carry out denial of service (DoS) attacks in versions less than 2.2.15 Final.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3859'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/pull/1296'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/commit/db0f5be43f8e2a4b88fbedd2eb6d5a95a29ceaa8'}, {'type': 'WEB', 'url': 'https://github.com/under...
{'cwe_ids': ['CWE-214', 'CWE-400', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T21:32:13Z', 'nvd_published_at': '2022-08-26T16:15:00Z'}
1.4.0
GHSA-j3h2-8mf8-j5r2
2022-07-29T13:11:52Z
2022-07-15T18:12:47Z
null
['CVE-2015-8031']
Hudson XML API susceptible to External Entity Injection Vunerability prior to v3.3.2
In versions prior to 3.3.2, Hudson exhibits a flaw in its XML API processing that can allow access to potentially sensitive information on the filesystem of the Hudson master server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.main:hudson-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-8031'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j3h2-8mf8-j5r2'}, {'type': 'PACKAGE', 'url': 'https://github.com/hudson/hudson-2.x'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGJVNETHUDSONMAIN-31221'}...
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:12:47Z', 'nvd_published_at': '2022-07-18T21:15:00Z'}
1.4.0
GHSA-h3qr-fjhm-jphw
2022-07-29T18:08:32Z
2022-07-14T00:00:23Z
null
['CVE-2019-10800']
Codecov prior to 2.0.16 does not sanitize gcov arguments
This affects the package codecov before 2.0.16. The vulnerability occurs due to not sanitizing gcov arguments before being being provided to the popen method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'codecov'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10800'}, {'type': 'WEB', 'url': 'https://github.com/codecov/codecov-python/commit/2a80aa434f74feb31242b6f213b75ce63ae97902'}, {'type': 'PACKAGE', 'url': 'https://github.com/codecov/codecov-python'}, {'type': 'WEB', 'url': 'https://github.com/pypa/a...
{'cwe_ids': ['CWE-88'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:40:09Z', 'nvd_published_at': '2022-07-13T12:15:00Z'}
1.4.0
GHSA-fr75-x856-q6j8
2022-07-22T15:20:28Z
2022-07-17T00:00:44Z
null
['CVE-2021-36711']
Octobot before 0.4.4 mishandles Tentacles upload
WebInterface in OctoBot before 0.4.4 allows remote code execution because Tentacles upload is mishandled.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'OctoBot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36711'}, {'type': 'WEB', 'url': 'https://github.com/Drakkar-Software/OctoBot/issues/1966'}, {'type': 'PACKAGE', 'url': 'https://github.com/Drakkar-Software/OctoBot'}, {'type': 'WEB', 'url': 'https://github.com/Drakkar-Software/OctoBot/blob/master/C...
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T01:31:34Z', 'nvd_published_at': '2022-07-16T17:15:00Z'}
1.4.0
GHSA-p64x-8rxx-wf6q
2022-08-19T17:09:36Z
2022-07-05T00:00:53Z
null
['CVE-2022-34265']
Django `Trunc()` and `Extract()` database functions vulnerable to SQL Injection
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The `Trunc()` and `Extract()` database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django'}, 'ecosystem_specific': {'affected_functions': ['django.db.models.functions.Trunc', 'django.db.models.functions.Extract']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.2'}, {'fixed': '3.2.14'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django'},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34265'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/0dc9c016fadb71a067e5a42be30164e3f96c0492'}, {'type': 'WEB', 'url': 'https://github.com/django/django/commit/5e2f4ddf2940704a26a4ac782b851989668d74db'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T21:08:03Z', 'nvd_published_at': '2022-07-04T16:15:00Z'}
1.4.0
GHSA-h9cw-7g8j-h66h
2022-07-13T20:00:30Z
2022-07-02T00:00:19Z
null
['CVE-2022-25876']
Server-Side Request Forgery in link-preview-js
The package link-preview-js before 2.1.17 are vulnerable to Server-side Request Forgery (SSRF) which allows attackers to send arbitrary requests to the local network and read the response. This is due to flawed DNS rebinding protection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'link-preview-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25876'}, {'type': 'WEB', 'url': 'https://github.com/ospfranco/link-preview-js/issues/115'}, {'type': 'WEB', 'url': 'https://github.com/ospfranco/link-preview-js/pull/117'}, {'type': 'PACKAGE', 'url': 'https://github.com/ospfranco/link-preview-js'},...
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T21:08:37Z', 'nvd_published_at': '2022-07-01T20:15:00Z'}
1.4.0
GHSA-7943-82jg-wmw5
2022-07-21T15:54:19Z
2022-07-12T22:05:11Z
null
['CVE-2022-31105']
Argo CD certificate verification is skipped for connections to OIDC providers
### Impact All versions of Argo CD starting with v0.4.0 are vulnerable to an improper certificate validation bug which could cause Argo CD to trust a malicious (or otherwise untrustworthy) OIDC provider. (Note: external OIDC provider support was added in v0.11.0. Before that version, the notes below apply only to the...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '2.2.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2...
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-7943-82jg-wmw5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31105'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/releases/...
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T22:05:11Z', 'nvd_published_at': '2022-07-12T22:15:00Z'}
1.4.0
GHSA-x4g7-5xrm-5wmq
2022-12-12T19:55:21Z
2022-07-01T00:01:07Z
null
['CVE-2022-34797']
Cross-Site Request Forgery in Jenkins Deployment Dashboard Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Deployment Dashboard Plugin 1.0.10 and earlier allows attackers to connect to an attacker-specified HTTP URL using attacker-specified credentials.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ec2-deployment-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34797'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ec2-deployment-dashboard'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2798%20(2)'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T20:37:21Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-7mwh-4pqv-wmr8
2022-08-15T21:58:30Z
2022-07-02T00:00:19Z
null
['CVE-2022-25758']
Regular expression denial of service in scss-tokenizer
All versions of the package `scss-tokenizer` prior to 0.4.3 are vulnerable to Regular Expression Denial of Service (ReDoS) via the `loadAnnotation()` function, due to the usage of insecure regex.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'scss-tokenizer'}, 'ecosystem_specific': {'affected_functions': ['scss.tokenize']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.4.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25758'}, {'type': 'WEB', 'url': 'https://github.com/sasstools/scss-tokenizer/issues/45'}, {'type': 'WEB', 'url': 'https://github.com/sasstools/scss-tokenizer/pull/49'}, {'type': 'WEB', 'url': 'https://github.com/sasstools/scss-tokenizer/commit/a53b...
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T21:07:13Z', 'nvd_published_at': '2022-07-01T20:15:00Z'}
1.4.0
GHSA-99mq-hw5m-gwjj
2022-12-13T14:25:43Z
2022-07-28T00:00:42Z
null
['CVE-2022-36921']
Missing permission check in Coverity Plugin allows capturing credentials
Coverity Plugin 1.11.4 and earlier does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:coverity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36921'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/coverity-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2790%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur...
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:24:43Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-qf4p-7gqc-x6jx
2022-08-10T21:14:01Z
2022-07-28T00:00:42Z
null
['CVE-2022-36895']
Jenkins Compuware Topaz Utilities Plugin is missing authorization
A missing permission check in Jenkins Compuware Topaz Utilities Plugin 1.0.8 and earlier allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-topaz-utilities'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.8'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36895'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2619'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T21:14:01Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-j2gv-q44j-xm42
2022-12-09T04:26:38Z
2022-07-01T00:01:07Z
null
['CVE-2022-34784']
Cross site scripting in Jenkins build-metrics Plugin
Jenkins build-metrics Plugin 1.3 does not escape the build description on one of its views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Build/Update permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:build-metrics'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34784'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/build-metrics-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-1118'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:25:15Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-c8rp-cgf4-937w
2022-07-29T22:26:10Z
2022-07-29T22:26:10Z
null
[]
mezzio-swoole Applications Using Diactoros Vulnerable to HTTP Host Header Attack
### Impact mezzio-swoole applications using Diactoros for their PSR-7 implementation, and which are either not behind a proxy, or can be accessed via untrusted proxies, can potentially have the host, protocol, and/or port of a `Laminas\Diactoros\Uri` instance associated with the incoming server request modified to ref...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'mezzio/mezzio-swoole'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.7.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'mezzio/mezzio-swoole'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.0'...
[{'type': 'WEB', 'url': 'https://github.com/mezzio/mezzio-swoole/security/advisories/GHSA-c8rp-cgf4-937w'}, {'type': 'PACKAGE', 'url': 'https://github.com/mezzio/mezzio-swoole'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T22:26:10Z', 'nvd_published_at': None}
1.4.0
GHSA-rpr3-cw39-3pxh
2023-01-10T15:40:17Z
2022-07-15T19:41:47Z
null
['CVE-2020-10650']
jackson-databind before 2.9.10.4 vulnerable to unsafe deserialization
The com.fasterxml.jackson.core:jackson-databind library before version 2.9.10.4 is vulnerable to an Unsafe Deserialization vulnerability when handling interactions related to the class `ignite-jta`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.9.10.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-10650'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2658'}, {'type': 'WEB', 'url': 'https://github.com/luisgarciacheckmarx/LGV_onefile/issues/19'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-datab...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T19:41:47Z', 'nvd_published_at': '2022-12-26T20:15:00Z'}
1.4.0
GHSA-8528-c6m6-gppm
2022-12-12T22:51:56Z
2022-07-28T00:00:42Z
null
['CVE-2022-36906']
CSRF vulnerability in Jenkins OpenShift Deployer Plugin
OpenShift Deployer Plugin 1.2.0 and earlier does not perform a permission check in a method implementing form validation. This form validation method does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:openshift-deployer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36906'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1375%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:35:56Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-3829-mgmw-jcg4
2022-07-11T19:25:08Z
2022-07-01T00:01:14Z
null
['CVE-2021-40663']
Prototype Pollution in deep.assign
deep.assign npm package 0.0.0-alpha.0 is vulnerable to Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution').
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'deep.assign'}, 'versions': ['0.0.0-alpha.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-40663'}, {'type': 'WEB', 'url': 'https://github.com/janbialostok/deep-assign/issues/1'}, {'type': 'PACKAGE', 'url': 'https://github.com/janbialostok/deep-assign'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220826-0002/'}, ...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:51:54Z', 'nvd_published_at': '2022-06-30T12:15:00Z'}
1.4.0
GHSA-5mv2-vqq7-mq5h
2022-12-12T23:10:27Z
2022-07-28T00:00:42Z
null
['CVE-2022-36908']
CSRF vulnerability in Jenkins OpenShift Deployer Plugin
OpenShift Deployer Plugin 1.2.0 and earlier does not perform permission checks in methods implementing form validation. These form validation methods do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:openshift-deployer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36908'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/openshift-deployer-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1375%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:36:35Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-m58q-qq5h-mgqq
2022-07-21T22:36:20Z
2022-07-21T22:36:20Z
null
[]
Islandora 2.0 before 2.4.1 could allow any user to upload content into a repository
### Impact This vulnerability would allow any user, regardless of permissions, to upload content into a repository. This affects installations of Islandora core 2.0 or greater. ### Patches Upgrade immediately to the [latest release](https://github.com/Islandora/islandora/releases/tag/2.4.1) of Islandora. ### Workarou...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'islandora/islandora'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0'}, {'fixed': '2.4.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Islandora/islandora/security/advisories/GHSA-m58q-qq5h-mgqq'}, {'type': 'WEB', 'url': 'https://github.com/Islandora/islandora/commit/573d6878edf057987f1e41e5068de0074573e4c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/Islandora-CLAW/islandora'}, {'type': 'WEB', 'url': '...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T22:36:20Z', 'nvd_published_at': None}
1.4.0
GHSA-rqqx-fvqx-539g
2022-08-11T15:17:01Z
2022-07-28T00:00:42Z
null
['CVE-2022-36891']
Jenkins Deployer Framework Plugin allows attackers with Item/Read permission to read deployment logs
A missing permission check in Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier allows attackers with Item/Read permission but without Deploy Now/Deploy permission to read deployment logs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:deployer-framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '86.v7b_a_4a_55b_f3ec'}]}], 'database_specific': {'last_known_affected_version_range': '<= 85.v1d1888e8c021'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36891'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2205'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:17:01Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-jjc5-fp7p-6f8w
2022-08-11T18:42:41Z
2022-07-15T21:39:14Z
null
['CVE-2022-31179']
Shescape prior to 1.5.8 vulnerable to insufficient escaping of line feeds for CMD
### Impact This impacts users that use Shescape (any API function) to escape arguments for **cmd.exe** on **Windows**. An attacker can omit all arguments following their input by including a line feed character (`'\n'`) in the payload. Example: ```javascript import cp from "node:child_process"; import * as shescape f...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'shescape'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-jjc5-fp7p-6f8w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31179'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/pull/332'}, {'type': 'WEB', 'url': 'https://github.com/ericc...
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T21:39:14Z', 'nvd_published_at': '2022-08-01T20:15:00Z'}
1.4.0
GHSA-376v-xgjx-7mfr
2022-07-21T15:57:26Z
2022-07-15T19:14:27Z
null
['CVE-2022-31142']
fastify-bearer-auth vulnerable to Timing Attack Vector
### Impact fastify-bearer-auth does not securely use crypto.timingSafeEqual. A malicious attacker could estimate the length of one valid bearer token. According to the corresponding RFC 6750, the bearer token has only base64 valid characters, reducing the range of characters for a brute force attack. All versions of ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'fastify-bearer-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.1'}, {'last_affected': '6.0.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@fastify/bearer-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.2'}]}]}...
[{'type': 'WEB', 'url': 'https://github.com/fastify/fastify-bearer-auth/security/advisories/GHSA-376v-xgjx-7mfr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31142'}, {'type': 'WEB', 'url': 'https://github.com/fastify/fastify-bearer-auth/commit/0c468a616d7e56126dc468150f6a5a92e530b8e4'}, {'t...
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T19:14:27Z', 'nvd_published_at': '2022-07-14T19:15:00Z'}
1.4.0
GHSA-m59q-vgq9-75cr
2022-12-12T21:35:24Z
2022-07-01T00:01:08Z
null
['CVE-2022-34809']
Password stored in plain text by Jenkins RQM Plugin
RQM Plugin 2.8 and earlier stores a password unencrypted in its global configuration file `net.praqma.jenkins.rqm.RqmBuilder.xml` on the Jenkins controller as part of its configuration. This password can be viewed by users with access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.praqma:rqm-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34809'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rqm-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2155'}]
{'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:35:24Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-g86g-chm8-7r2p
2022-07-29T19:56:34Z
2022-07-29T19:56:34Z
null
['CVE-2021-32724']
check-spelling workflow vulnerable to token leakage via symlink attack
### Impact For a repository with the [check-spelling action](https://github.com/marketplace/actions/check-spelling) enabled that triggers on `pull_request_target` (or `schedule`), an attacker can send a crafted Pull Request that causes a `GITHUB_TOKEN` to be exposed. With the `GITHUB_TOKEN`, it's possible to push comm...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'GitHub Actions', 'name': 'check-spelling/check-spelling'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.19'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/check-spelling/check-spelling/security/advisories/GHSA-g86g-chm8-7r2p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32724'}, {'type': 'WEB', 'url': 'https://github.com/check-spelling/check-spelling/commit/436362fc6b588d9d561cbdb575260ca593c8dc56'},...
{'cwe_ids': ['CWE-532'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T19:56:34Z', 'nvd_published_at': '2021-09-09T21:15:00Z'}
1.4.0
GHSA-7c8f-m389-4xjc
2022-12-12T21:38:20Z
2022-07-01T00:01:07Z
null
['CVE-2022-34779']
Missing permission checks in Jenkins XebiaLabs XL Release Plugin allow enumerating credentials IDs
XebiaLabs XL Release Plugin 22.0.0 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability. ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.xebialabs.ci:xlrelease-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 22.0.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34779'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xlrelease-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2773%20(1)'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:38:20Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-hcjr-6jq3-392p
2022-07-12T15:28:33Z
2022-07-01T00:01:08Z
null
['CVE-2022-34818']
Missing Authorization in Jenkins Failed Job Deactivator Plugin
Jenkins Failed Job Deactivator Plugin 1.2.1 and earlier does not perform permission checks in several views and HTTP endpoints, allowing attackers with Overall/Read permission to disable jobs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'de.einsundeins.jenkins.plugins.failedjobdeactivator:failedJobDeactivator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34818'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/failedjobdeactivator-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2061'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T15:28:33Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-cm59-pr5q-cw85
2022-07-11T20:59:02Z
2022-07-11T20:59:02Z
null
['CVE-2022-27772']
Temporary Directory Hijacking to Local Privilege Escalation Vulnerability in org.springframework.boot:spring-boot
spring-boot versions prior to version `v2.2.11.RELEASE` was vulnerable to temporary directory hijacking. This vulnerability impacted the `org.springframework.boot.web.server.AbstractConfigurableWebServerFactory.createTempDir` method. The vulnerable method is used to create a work directory for embedded web servers suc...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.boot:spring-boot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.11.RELEASE'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.10.RELEASE'}}]
[{'type': 'WEB', 'url': 'https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-cm59-pr5q-cw85'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27772'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-boot/commit/667ccdae84822072f9ea1a27ed5c77964c71002d'}, {...
{'cwe_ids': ['CWE-377', 'CWE-379', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-11T20:59:02Z', 'nvd_published_at': '2022-03-30T18:15:00Z'}
1.4.0
GHSA-4v5c-5v6c-37pj
2022-12-09T14:30:59Z
2022-07-01T00:01:07Z
null
['CVE-2022-34789']
Jenkins Matrix Reloaded Plugin vulnerable to CSRF
Jenkins Matrix Reloaded Plugin 1.1.3 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to rebuild previous matrix builds.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.praqma:matrix-reloaded'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34789'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/matrix-reloaded-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2016'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T14:30:59Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-rm23-6mwv-8q9q
2022-12-12T19:43:42Z
2022-07-01T00:01:07Z
null
['CVE-2022-34793']
XML External Entity Reference in Jenkins Recipe Plugin
Jenkins Recipe Plugin 1.2 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:recipe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34793'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/recipe-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2000'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T21:18:56Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-jxg9-2ch7-f552
2022-08-06T05:31:43Z
2022-07-28T00:00:53Z
null
['CVE-2022-34971']
Feehi CMS arbitrary code execution via crafted PHP file
An arbitrary file upload vulnerability in the Advertising Management module of Feehi CMS v2.1.1 allows attackers to execute arbitrary code via a crafted PHP file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34971'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/62'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}]
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:31:43Z', 'nvd_published_at': '2022-07-27T02:15:00Z'}
1.4.0
GHSA-xxj3-55p6-xg3h
2023-03-01T20:32:45Z
2022-07-25T00:00:31Z
null
['CVE-2022-24294']
Apache MXNet vulnerable to potential denial-of-service by excessive resource consumption
A regular expression used in Apache MXNet (incubating) is vulnerable to a potential denial-of-service by excessive resource consumption. The bug could be exploited when loading a model in Apache MXNet that has a specially crafted operator name that would cause the regular expression evaluation to use excessive resource...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mxnet'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24294'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/mxnet'}, {'type': 'WEB', 'url': 'https://github.com/apache/mxnet/releases/tag/1.9.1'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/b1fbfmvzlr2bbp95lqoh3mtovclfcl3o'}, {'type...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-03-01T20:32:45Z', 'nvd_published_at': '2022-07-24T18:15:00Z'}
1.4.0
GHSA-cr6p-23cf-w9g9
2022-07-21T14:59:11Z
2022-07-12T22:15:53Z
null
['CVE-2022-31139']
UnsafeAccessor 1.4.0 until 1.7.0 has no security checking for UnsafeAccess.getInstance()
### Overview Affected versions have no limit to using unsafe-accessor. Can be ignored if `SecurityCheck.AccessLimiter` not setup ### Details If UA was loaded as a named module, the internal data of UA will be protected by JVM and others can only access UA via UA's standard api. Main application can setup `SecurityCh...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.github.karlatemp:unsafe-accessor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.7.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Karlatemp/UnsafeAccessor/security/advisories/GHSA-cr6p-23cf-w9g9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31139'}, {'type': 'WEB', 'url': 'https://github.com/Karlatemp/UnsafeAccessor/commit/4ef83000184e8f13239a1ea2847ee401d81585fd'}, {'type': ...
{'cwe_ids': ['CWE-200', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T22:15:53Z', 'nvd_published_at': '2022-07-11T19:15:00Z'}
1.4.0
GHSA-2588-cx6w-6vm6
2022-12-09T14:19:16Z
2022-07-01T00:01:07Z
null
['CVE-2022-34781']
Missing permission checks in Jenkins XebiaLabs XL Release Plugin allow capturing credentials
Missing permission checks in Jenkins XebiaLabs XL Release Plugin 22.0.0 and earlier allow attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. XebiaLabs XL Release Plugin ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.xebialabs.ci:xlrelease-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34781'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xlrelease-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2773%20(2)'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T14:19:16Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-9x8m-2xpf-crp3
2022-07-29T22:26:57Z
2022-07-29T22:26:57Z
null
[]
Scrapy before v2.6.2 and v1.8.3 vulnerable to one proxy sending credentials to another
### Impact When the [built-in HTTP proxy downloader middleware](https://docs.scrapy.org/en/2.6/topics/downloader-middleware.html#module-scrapy.downloadermiddlewares.httpproxy) processes a request with `proxy` metadata, and that `proxy` metadata includes proxy credentials, the built-in HTTP proxy downloader middleware ...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'scrapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'scrapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/security/advisories/GHSA-9x8m-2xpf-crp3'}, {'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/commit/af7dd16d8ded3e6cb2946603688f4f4a5212e80f'}, {'type': 'PACKAGE', 'url': 'https://github.com/scrapy/scrapy'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T22:26:57Z', 'nvd_published_at': None}
1.4.0
GHSA-9x4h-8wgm-8xfg
2022-07-06T19:26:17Z
2022-07-06T19:26:17Z
null
[]
Malformed CAR panics and excessive memory usage
### Impact **Versions impacted** * `<=` go-car@v0.3.3 * `<=` go-car@v2.3.0 **Description** Decoding CAR data from untrusted user input can cause: - Panics: - Out of bound memory access - Out of memory - Divide by zero - Excessive memory usage Such panics can be triggered by intentionally malformed CARv1 ...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipld/go-car'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/ipld/go-car/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ipld/go-car/security/advisories/GHSA-9x4h-8wgm-8xfg'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipld/go-car'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0503'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:26:17Z', 'nvd_published_at': None}
1.4.0
GHSA-pc62-cq5x-3j5g
2022-08-06T09:35:27Z
2022-07-26T00:01:05Z
null
['CVE-2020-7678']
node-import `params` argument can be controlled by users without any sanitization
This affects all versions of package node-import. The `params` argument of module function can be controlled by users without any sanitization. This is then provided to the “eval” function located in line 79 in the index file `index.js`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-import'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7678'}, {'type': 'PACKAGE', 'url': 'https://github.com/mahdaen/node-import'}, {'type': 'WEB', 'url': 'https://github.com/mahdaen/node-import/blob/master/index.js%23L79'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-NODEIMPORT-5716...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:35:27Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-m7gr-5w5g-36jf
2022-07-29T13:06:38Z
2022-07-23T00:00:22Z
null
['CVE-2022-34037']
Out-of-bounds Read can lead to client side denial of service
An out-of-bounds read in the rewrite function at /modules/caddyhttp/rewrite/rewrite.go in Caddy v2.5.1 allows attackers to cause a Denial of Service (DoS) on the client side via a crafted URI. According to the maintainer, the bug only affects the client side of the request and cannot cause a denial of service on the s...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/caddyserver/caddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34037'}, {'type': 'WEB', 'url': 'https://github.com/caddyserver/caddy/issues/4775'}, {'type': 'WEB', 'url': 'https://github.com/caddyserver/caddy/commit/693e9b5283e675b56084ecc83d73176cab0ee27c'}, {'type': 'PACKAGE', 'url': 'https://github.com/cadd...
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T22:12:07Z', 'nvd_published_at': '2022-07-22T15:15:00Z'}
1.4.0
GHSA-f825-f98c-gj3g
2023-09-11T16:22:58Z
2022-07-29T00:00:18Z
null
['CVE-2022-2564']
automattic/mongoose vulnerable to Prototype pollution via Schema.path
Mongoose is a MongoDB object modeling tool designed to work in an asynchronous environment. Affected versions of this package are vulnerable to Prototype Pollution. The `Schema.path()` function is vulnerable to prototype pollution when setting the schema object. This vulnerability allows modification of the Object prot...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'mongoose'}, 'ecosystem_specific': {'affected_functions': ['mongoose.Schema']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'mongoose'}, 'ecosystem_specific': {'affected_functions': ['mong...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2564'}, {'type': 'WEB', 'url': 'https://github.com/Automattic/mongoose/commit/99b418941e2fc974199b8e5bd9d382bb50bf680a'}, {'type': 'WEB', 'url': 'https://github.com/automattic/mongoose/commit/a45cfb6b0ce0067ae9794cfa80f7917e1fb3c6f8'}, {'type': 'WE...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-04T14:22:23Z', 'nvd_published_at': '2022-07-28T20:15:00Z'}