schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-7r65-pjgv-h2h9
2022-07-13T15:44:03Z
2022-07-01T00:01:08Z
null
['CVE-2022-34804']
Cleartext Transmission of Sensitive Information in Jenkins OpsGenie Plugin
Jenkins OpsGenie Plugin 1.9 and earlier transmits API keys in plain text as part of the global Jenkins configuration form and job configuration forms, potentially resulting in their exposure.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:opsgenie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34804'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/opsgenie-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-1877'}]
{'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T15:44:03Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-qv6h-pcf2-2w3g
2022-08-05T18:57:58Z
2022-07-23T00:00:16Z
2022-08-05T18:57:58Z
['CVE-2022-36408']
Duplicate Advisory GHSA-hrgx-p36p-89q4
## Duplicate Advisory This advisory is a duplicate of GHSA-hrgx-p36p-89q4. This link is maintained to preserve external references. ## Original Description PrestaShop 1.6.0.10 through 1.7.x before 1.7.8.2 allows remote attackers to execute arbitrary code, aka a "previously unknown vulnerability chain" related to SQL...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0.10'}, {'fixed': '1.7.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36408'}, {'type': 'WEB', 'url': 'https://build.prestashop.com/news/major-security-vulnerability-on-prestashop-websites/'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-05T18:57:58Z', 'nvd_published_at': '2022-07-22T22:15:00Z'}
1.4.0
GHSA-qpx3-9565-5xwm
2022-07-19T22:28:27Z
2022-07-11T21:04:51Z
null
['CVE-2022-31078']
KubeEdge CloudCore Router memory exhaustion vulnerability
### Impact The CloudCore Router does not impose a limit on the size of responses to requests made by the REST handler. An attacker could use this weakness to make a request that will return an HTTP response with a large body and cause DoS of CloudCore. In the HTTP Handler API, the rest handler makes a request to a pre-...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed'...
[{'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/security/advisories/GHSA-qpx3-9565-5xwm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31078'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubeedge/kubeedge'}]
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-11T21:04:51Z', 'nvd_published_at': '2022-07-11T21:15:00Z'}
1.4.0
GHSA-cp6q-836q-gmj3
2022-12-09T16:16:49Z
2022-07-01T00:01:08Z
null
['CVE-2022-34817']
Cross-Site Request Forgery in Jenkins Failed Job Deactivator Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Failed Job Deactivator Plugin 1.2.1 and earlier allows attackers to disable jobs. This CSRF vulnerability is only exploitable in Jenkins 2.286 and earlier, LTS 2.277.1 and earlier. See the [LTS upgrade guide](https://www.jenkins.io/doc/upgrade-guide/2.277/#up...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'de.einsundeins.jenkins.plugins.failedjobdeactivator:failedJobDeactivator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34817'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/failedjobdeactivator-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2061'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:14:08Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-qv56-j8fg-39h6
2022-07-12T18:25:33Z
2022-07-01T00:01:07Z
null
['CVE-2022-34785']
Missing Authorization in Jenkins build-metrics Plugin
Jenkins build-metrics Plugin 1.3 and earlier does not perform permission checks in multiple HTTP endpoints, allowing attackers with Overall/Read permission to obtain information about jobs otherwise inaccessible to them.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:build-metrics'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34785'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/build-metrics-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2643'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:25:33Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-h5h5-m2mc-j2pv
2022-12-09T04:51:40Z
2022-07-01T00:01:08Z
null
['CVE-2022-34807']
Plaintext Storage of a Password in Jenkins Elasticsearch Query Plugin
Jenkins Elasticsearch Query Plugin 1.2 and earlier stores a password unencrypted in its global configuration file `org.jenkinsci.plugins.elasticsearchquery.ElasticsearchQueryBuilder.xml` on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:elasticsearch-query'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34807'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/elasticsearch-query-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2073'}]
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:19:07Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-v3r8-6vfj-pppf
2022-12-09T04:58:56Z
2022-07-01T00:01:07Z
null
['CVE-2022-34800']
Plaintext Storage of a Password in Jenkins Build Notifications Plugin
Build Notifications Plugin 1.5.0 and earlier stores multiple tokens unencrypted in its global configuration files on the Jenkins controller as part of its configuration:- Pushover Application Token in `tools.devnull.jenkins.plugins.buildnotifications.PushoverNotifier.xml`\n- Slack Bot Token in `tools.devnull.jenkins.pl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'tools.devnull:build-notifications'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34800'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/build-notifications-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2056'}]
{'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T21:25:42Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-h6gj-6jjq-h8g9
2022-08-10T22:17:46Z
2022-07-18T17:07:36Z
null
['CVE-2022-31160']
jQuery UI vulnerable to XSS when refreshing a checkboxradio with an HTML-like initial text label
### Impact Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. If you call `.checkboxradio( "refresh" )` on such a widget and the initial HTML contained encoded HTML entities, they will erroneously get decoded. This can lead to potentia...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']...
[{'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-h6gj-6jjq-h8g9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31160'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/commit/8cc5bae1caa1fcf96bf5862c5646c787020ba3f9'}, {'type': 'WEB', 'url': 'h...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-18T17:07:36Z', 'nvd_published_at': '2022-07-20T20:15:00Z'}
1.4.0
GHSA-7488-6x3r-23w5
2023-08-31T00:20:56Z
2022-07-13T15:43:03Z
null
['CVE-2022-31507']
Ganga allows absolute path traversal
The ganga-devs/ganga repository before 8.5.10 on GitHub allows absolute path traversal because the Flask `send_file` function is used unsafely.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ganga'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31507'}, {'type': 'WEB', 'url': 'https://github.com/github/securitylab/issues/669#issuecomment-1117265726'}, {'type': 'WEB', 'url': 'https://github.com/ganga-devs/ganga/commit/730e7aba192407d35eb37dd7938d49071124be8c'}, {'type': 'ADVISORY', 'url': ...
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T15:43:03Z', 'nvd_published_at': '2022-07-11T01:15:00Z'}
1.4.0
GHSA-cp5r-xqjr-84gm
2022-08-10T21:14:37Z
2022-07-28T00:00:42Z
null
['CVE-2022-36898']
Jenkins Compuware ISPW Operations Plugin does not perform permission checks in several HTTP endpoints
A missing permission check in Jenkins Compuware ISPW Operations Plugin 1.0.8 and earlier allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-ispw-operations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.8'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36898'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2628'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T21:14:37Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-8294-mv9c-7m5h
2022-12-12T16:09:13Z
2022-07-28T00:00:42Z
null
['CVE-2022-36905']
Stored XSS vulnerability in Jenkins Maven Metadata Plugin for Jenkins CI server plugin
Maven Metadata Plugin for Jenkins CI server Plugin 2.2 and earlier does not perform URL validation for the Repository Base URL of List maven artifact versions parameters. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'eu.markov.jenkins.plugin.mvnmeta:maven-metadata-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36905'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/maven-metadata-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2686'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T16:09:13Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-8mjr-jr5h-q2xr
2022-07-25T19:25:43Z
2022-07-15T18:17:19Z
null
['CVE-2022-31153']
OpenZeppelin Contracts for Cairo account cannot process transactions on Goerli
### Impact This vulnerability affects all accounts (vanilla and ethereum flavors) in the [v0.2.0 release of OpenZeppelin Contracts for Cairo](https://github.com/OpenZeppelin/cairo-contracts/releases/tag/v0.2.0), which are not whitelisted on StarkNet mainnet, so only goerli deployments of v0.2.0 accounts are affected. ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'openzeppelin-cairo-contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/cairo-contracts/security/advisories/GHSA-8mjr-jr5h-q2xr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31153'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/cairo-contracts/issues/386'}, {'type': 'WEB', 'url': 'https://github...
{'cwe_ids': ['CWE-664', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:17:19Z', 'nvd_published_at': '2022-07-15T18:15:00Z'}
1.4.0
GHSA-xj57-8qj4-c4m6
2022-07-15T20:45:07Z
2022-07-07T00:00:26Z
null
['CVE-2022-33980']
Code injection in Apache Commons Configuration
Apache Commons Configuration performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.configuration2.interpol.Lookup that performs the interpolation. Starti...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.commons:commons-configuration2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4'}, {'fixed': '2.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33980'}, {'type': 'WEB', 'url': 'https://commons.apache.org/proper/commons-configuration/changes-report.html#a2.8.0'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-configuration'}, {'type': 'WEB', 'url': 'https://issues.apache.org/...
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T16:56:07Z', 'nvd_published_at': '2022-07-06T13:15:00Z'}
1.4.0
GHSA-4828-473v-37gh
2022-07-13T15:41:23Z
2022-07-02T00:00:19Z
null
['CVE-2022-31943']
Unrestricted Upload of File with Dangerous Type in MCMS
MCMS v5.2.8 was discovered to contain an arbitrary file upload vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'versions': ['5.2.8']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31943'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/95'}, {'type': 'PACKAGE', 'url': 'https://github.com/ming-soft/MCMS'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T15:41:23Z', 'nvd_published_at': '2022-07-01T21:15:00Z'}
1.4.0
GHSA-96jv-vj39-x4j6
2023-06-27T20:58:57Z
2022-07-13T00:00:41Z
null
['CVE-2022-1025']
Argo CD improper access control bug can allow malicious user to escalate privileges to admin level
# Impact ## Impacts for versions starting with v1.0.0 All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level. To perform the following exploits, an authorized Argo CD user must have push...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'last_affected': '1.8.7'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixe...
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-2f5v-8r3f-8pww'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1025'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/af03b291d4b7e9d3ce9a6580ae9c8141af0e05cf'}, {'type': 'WEB', 'url': 'ht...
{'cwe_ids': ['CWE-1220', 'CWE-284', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T22:29:13Z', 'nvd_published_at': '2022-07-12T21:15:00Z'}
1.4.0
GHSA-qm37-c4w6-h9v9
2022-12-12T20:19:02Z
2022-07-01T00:01:08Z
null
['CVE-2022-34811']
Missing Authorization in Jenkins XPath Configuration Viewer Plugin
XPath Configuration Viewer Plugin 1.1.1 and earlier does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to access the XPath Configuration Viewer page. Given appropriate XPath expressions, this page grants access to job configuration XML data to every user with It...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xpath-config-viewer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34811'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2002'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:18:02Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-jxqv-jcvh-7gr4
2023-08-30T18:11:47Z
2022-07-30T00:00:41Z
null
['CVE-2022-24912']
Atlantis Events vulnerable to Timing Attack
The package github.com/runatlantis/atlantis/server/controllers/events before 0.19.7 is vulnerable to Timing Attack in the webhook event validator code, which does not use a constant-time comparison function to validate the webhook secret. It can allow an attacker to recover this secret as an attacker and then forge web...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/runatlantis/atlantis'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.19.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24912'}, {'type': 'WEB', 'url': 'https://github.com/runatlantis/atlantis/issues/2391'}, {'type': 'WEB', 'url': 'https://github.com/runatlantis/atlantis/pull/2392'}, {'type': 'WEB', 'url': 'https://github.com/runatlantis/atlantis/commit/48870911974a...
{'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:21:43Z', 'nvd_published_at': '2022-07-29T10:15:00Z'}
1.4.0
GHSA-36j8-f33j-vjwq
2022-12-09T16:45:25Z
2022-07-01T00:01:08Z
null
['CVE-2022-34816']
Passwords stored in plain text by Jenkins hpe-network-virtualization plugin
hpe-network-virtualization Plugin 1.0 stores passwords unencrypted in its global configuration file `org.jenkinsci.plugins.nvemulation.plugin.NvEmulationBuilder.xml` on the Jenkins controller as part of its configuration. These passwords can be viewed by users with access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:hpe-network-virtualization'}, 'versions': ['1.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34816'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/hpe-network-virtualization-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2080'}]
{'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T16:45:25Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-fj2w-qmjp-3rjm
2022-08-10T23:30:32Z
2022-07-16T00:00:28Z
null
['CVE-2020-35305']
Gollum Cross-site Scripting vulnerability via filename parameter to New Page dialog
Cross site scripting (XSS) in gollum 5.0 to 5.1.2 via the filename parameter to the 'New Page' dialog.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'gollum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35305'}, {'type': 'WEB', 'url': 'https://github.com/gollum/gollum/commit/137728cdabc0f60859fcd30404ad2b8fff6ef715'}, {'type': 'WEB', 'url': 'https://github.com/Szarny/'}, {'type': 'WEB', 'url': 'https://github.com/gollum/'}, {'type': 'PACKAGE', 'ur...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T01:25:22Z', 'nvd_published_at': '2022-07-15T14:15:00Z'}
1.4.0
GHSA-qq85-8g89-r5rc
2022-12-09T04:44:44Z
2022-07-01T00:01:08Z
null
['CVE-2022-34815']
Cross-Site Request Forgery in Jenkins Request Rename Or Delete Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Request Rename Or Delete Plugin 1.1.0 and earlier allows attackers to accept pending requests, thereby renaming or deleting jobs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rrod'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34815'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rrod-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2657'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:14:36Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-5fhj-g3p3-pq9g
2022-08-05T13:56:03Z
2022-07-20T22:47:13Z
null
['CVE-2022-31146']
Wasmtime vulnerable to Use After Free with `externref`s
There is a bug in Wasmtime's code generator, Cranelift, where functions using reference types may be incorrectly missing metadata required for runtime garbage collection (GC). This means that if a GC happens at runtime then the collector will mistakenly think some Wasm stack frames do not have live references to garbag...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.37.0'}, {'fixed': '0.38.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'cranelift-codegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.84.0'}, {'fixed': '0.85.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-5fhj-g3p3-pq9g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31146'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/commit/2ba4bce5cc719e5a74e571a534424614e62ecc41'}, {'type'...
{'cwe_ids': ['CWE-416'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T22:47:13Z', 'nvd_published_at': '2022-07-21T04:15:00Z'}
1.4.0
GHSA-4hq8-jgr8-mw9j
2022-08-05T15:54:03Z
2022-07-18T00:00:33Z
null
['CVE-2020-7641']
grunt-util-property 0.0.2 function call can add/modify properties of Object.prototype using a __proto__ payload
This affects all versions of package grunt-util-property. The function call could be tricked into adding or modifying properties of `Object.prototype` using a `__proto__` payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'grunt-util-property'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7641'}, {'type': 'PACKAGE', 'url': 'https://github.com/mikaelkaron/grunt-util-property'}, {'type': 'WEB', 'url': 'https://github.com/mikaelkaron/grunt-util-property/blob/master/main.js%23L41'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T21:37:35Z', 'nvd_published_at': '2022-07-17T09:15:00Z'}
1.4.0
GHSA-5jgj-h9wp-53fr
2022-07-19T16:52:22Z
2022-07-09T00:00:26Z
null
['CVE-2022-32115']
Known vulnerable to code execution via SVG file in v1.3.1
An issue in the isSVG() function of Known v1.3.1 allows attackers to execute arbitrary code via a crafted SVG file. The researcher report indicates that versions 1.3.1 and prior are vulnerable. Version 1.2.2 is the last version tagged on GitHub and in Packagist, and development related to the 1.3.x branch is currently...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'idno/known'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32115'}, {'type': 'WEB', 'url': 'https://github.com/idno/known/commit/80b716a8392fb71cfce84d03aaf7c045c62f6350'}, {'type': 'WEB', 'url': 'https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/'}, {'type': 'PACKAGE', ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:02:08Z', 'nvd_published_at': '2022-07-08T12:15:00Z'}
1.4.0
GHSA-2qh6-hhvv-m2ww
2022-12-09T17:01:35Z
2022-07-28T00:00:42Z
null
['CVE-2022-36901']
Jenkins HTTP Request Plugin stores HTTP Request passwords unencrypted
HTTP Request Plugin 1.15 and earlier stores HTTP Request passwords unencrypted in its global configuration file `jenkins.plugins.http_request.HttpRequest.xml` on the Jenkins controller as part of its configuration when using (deprecated) Basic/Digest Authentication. These passwords can be viewed by users with access to...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:http_request'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36901'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/http-request-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2053'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securit...
{'cwe_ids': ['CWE-256', 'CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:30:41Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-wfvx-fx73-3rfj
2022-08-06T09:35:55Z
2022-07-26T00:01:05Z
null
['CVE-2020-28455']
markdown-it-toc Cross-site Scripting due to title of generated toc and contents of header not being escaped
This affects all versions of package markdown-it-toc. The title of the generated toc and the contents of the header are not escaped.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'markdown-it-toc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28455'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-MARKDOWNITTOC-1044067'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:35:55Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-5pg2-qg87-vmj7
2022-07-11T19:27:35Z
2022-07-02T00:00:29Z
null
['CVE-2022-2280']
Cross-site Scripting in microweber
Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.19.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2280'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/9ebbb4dd35da74025ab6965f722829a7f8f86566'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:51:27Z', 'nvd_published_at': '2022-07-01T09:15:00Z'}
1.4.0
GHSA-p757-4v3p-j74f
2022-07-22T16:32:57Z
2022-07-09T00:00:26Z
null
['CVE-2022-33011']
Known vulnerable to account takeover via host header injection attack in v1.3.1
Known v1.3.1 was discovered to allow attackers to perform an account takeover via a host header injection attack. The researcher report indicates that versions 1.3.1 and prior are vulnerable. Version 1.2.2 is the last version tagged on GitHub and in Packagist, and development related to the 1.3.x branch is currently o...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'idno/known'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33011'}, {'type': 'WEB', 'url': 'https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/'}, {'type': 'PACKAGE', 'url': 'https://github.com/idno/known'}, {'type': 'WEB', 'url': 'https://github.com/idno/known/blob/dev/c...
{'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:02:05Z', 'nvd_published_at': '2022-07-08T12:15:00Z'}
1.4.0
GHSA-m939-vrfp-9v8p
2022-08-06T09:35:43Z
2022-07-26T00:01:05Z
null
['CVE-2020-28461']
js-ini Prorotype Pollution when malicious INI files submitted to an application that parses it with `parse`
This affects the package js-ini before 1.3.0. If an attacker submits a malicious INI file to an application that parses it with `parse` , they will pollute the prototype on the application. This can be exploited further depending on the context.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'js-ini'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28461'}, {'type': 'WEB', 'url': 'https://github.com/Sdju/js-ini/commit/fa17efb7e3a7c9464508a254838d4c231784931e'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sdju/js-ini'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-JSINI-104...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:35:43Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-m485-79jq-cxx7
2022-12-13T14:14:53Z
2022-07-28T00:00:42Z
null
['CVE-2022-36916']
CSRF vulnerability in Jenkins Google Cloud Backup Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Google Cloud Backup Plugin 0.6 and earlier does not perform a permission check in an HTTP endpoint. Additionally, this HTTP endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-cloud-backup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36916'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/google-cloud-backup-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2656'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:17:32Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-gq4p-4hxv-5rg9
2023-08-18T22:45:46Z
2022-07-28T00:00:49Z
null
['CVE-2022-34529']
WASM3 segmentation fault
WASM3 v0.5.0 was discovered to contain a segmentation fault via the component `Compile_Memory_CopyFill`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pywasm3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'wasm3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34529'}, {'type': 'WEB', 'url': 'https://github.com/wasm3/wasm3/issues/337'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pywasm3/PYSEC-2022-43057.yaml'}]
{'cwe_ids': ['CWE-119', 'CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-18T22:45:46Z', 'nvd_published_at': '2022-07-27T14:15:00Z'}
1.4.0
GHSA-qp72-96p2-g644
2022-07-21T21:36:55Z
2022-07-12T00:00:58Z
null
['CVE-2022-31558']
Tooxie Shiva 0.10.0 allows absolute path traversal because Flask send_file function used unsafely
The tooxie/shiva-server repository through 0.10.0 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'shiva'}, 'ecosystem_specific': {'affected_functions': ['shiva.fileserver.get_absolute_path']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.10.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31558'}, {'type': 'WEB', 'url': 'https://github.com/tooxie/shiva-server/issues/189'}, {'type': 'PACKAGE', 'url': 'https://github.com/tooxie/shiva-server'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T21:36:55Z', 'nvd_published_at': '2022-07-11T01:15:00Z'}
1.4.0
GHSA-w257-f7qj-4vrq
2022-12-09T00:18:16Z
2022-07-01T00:01:07Z
null
['CVE-2022-34790']
Cross-site Scripting in Jenkins eXtreme Feedback Panel Plugin
Jenkins eXtreme Feedback Panel Plugin 2.0.1 and earlier does not escape the job names used in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xfpanel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34790'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xfpanel-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-1939'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:21:02Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-wrcr-x4qj-j543
2022-07-19T21:05:39Z
2022-07-11T21:05:32Z
null
['CVE-2022-31079']
KubeEdge Cloud Stream and Edge Stream DoS from large stream message
### Impact The Cloud Stream server and the Edge Stream server reads the entire message into memory without imposing a limit on the size of this message. An attacker can exploit this by sending a large message to exhaust memory and cause a DoS. The Cloud Stream server and the Edge Stream server are under DoS attack in t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed'...
[{'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/security/advisories/GHSA-wrcr-x4qj-j543'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31079'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubeedge/kubeedge'}]
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-11T21:05:32Z', 'nvd_published_at': '2022-07-11T21:15:00Z'}
1.4.0
GHSA-rwvf-c3wm-qm6w
2022-08-06T09:37:25Z
2022-07-26T00:01:06Z
null
['CVE-2020-28435']
ffmpeg-sdk vulnerable to OS Command Injection
A command injection vulnerability affects all versions of package ffmpeg-sdk. The injection point is located in line 9 in index.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ffmpeg-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28435'}, {'type': 'WEB', 'url': 'https://github.com/CubetLabs/ffmpeg-sdk/blob/master/index.js'}, {'type': 'WEB', 'url': 'https://github.com/shajanjp/ffmpeg-sdk/blob/master/index.js'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-FF...
{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:37:25Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-f655-xhvm-cwp4
2022-12-09T20:18:23Z
2022-07-01T00:01:07Z
null
['CVE-2022-34777']
Cross-site Scripting in Jenkins GitLab Plugin
Jenkins GitLab Plugin 1.5.34 and earlier does not escape multiple fields inserted into the description of webhook-triggered builds, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. GitLab Plugin 1.5.35 does not show user-provided fields in the build...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gitlab-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.35'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5.34'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34777'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/gitlab-plugin/commit/24e9a99d8151b5345109ef12cddc1ab323baa4ee'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/gitlab-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:24:25Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-hrgx-p36p-89q4
2022-07-29T22:27:27Z
2022-07-29T22:27:27Z
null
['CVE-2022-31181']
PrestaShop eval injection possible if shop vulnerable to SQL injection
### Impact Eval injection possible if the shop is vulnerable to an SQL injection. ### Patches The problem is fixed in version 1.7.8.7 ### Workarounds Delete the MySQL Smarty cache feature by removing these lines in the file `config/smarty.config.inc.php` lines 43-46 (PrestaShop 1.7) or 40-43 (PrestaShop 1.6): ```php ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0.10'}, {'fixed': '1.7.8.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-hrgx-p36p-89q4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31181'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/b6d96e7c2a4e35a44e96ffbcdfd34439b56af804'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-89', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T22:27:27Z', 'nvd_published_at': '2022-08-01T20:15:00Z'}
1.4.0
GHSA-pgq7-jcj5-xx6h
2022-07-19T20:26:18Z
2022-07-08T00:00:43Z
null
['CVE-2022-28889']
Apache Druid before 0.23.0 vulnerable to clickjacking
In Apache Druid 0.22.1 and earlier, the server did not set appropriate headers to prevent clickjacking. Druid 0.23.0 and later prevent clickjacking using the Content-Security-Policy header.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.druid:druid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28889'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/druid'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/t3nsq4crdr8wqgmj721d2wg6pf26s5cw'}]
{'cwe_ids': ['CWE-1021'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:21:13Z', 'nvd_published_at': '2022-07-07T19:15:00Z'}
1.4.0
GHSA-x3vm-38hw-55wf
2022-07-05T18:29:31Z
2022-07-05T18:29:31Z
null
['CVE-2022-31108']
Possible inject arbitrary `CSS` into the generated graph affecting the container HTML
An attacker is able to inject arbitrary `CSS` into the generated graph allowing them to change the styling of elements outside of the generated graph, and potentially exfiltrate sensitive information by using specially crafted `CSS` selectors. The following example shows how an attacker can exfiltrate the contents of ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'mermaid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '9.1.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mermaid-js/mermaid/security/advisories/GHSA-x3vm-38hw-55wf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31108'}, {'type': 'WEB', 'url': 'https://github.com/mermaid-js/mermaid/commit/0ae1bdb61adff1cd485caff8c62ec6b8ac57b225'}, {'type': 'PACKAGE', '...
{'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T18:29:31Z', 'nvd_published_at': '2022-06-28T19:15:00Z'}
1.4.0
GHSA-h975-r69h-4w9p
2022-07-15T20:46:57Z
2022-07-07T00:00:28Z
null
['CVE-2022-32533']
Insufficient user input in Apache Jetspeed-2
** UNSUPPORTED WHEN ASSIGNED ** Apache Jetspeed-2 does not sufficiently filter untrusted user input by default leading to a number of issues including XSS, CSRF, XXE, and SSRF. Setting the configuration option "xss.filter.post = true" may mitigate these issues. NOTE: Apache Jetspeed is a dormant project of Apache Porta...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.portals.jetspeed-2:jetspeed-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32533'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/d3g248pr03x8rvmh8p2t3xdlw0wn5dz2'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/07/06/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur...
{'cwe_ids': ['CWE-352', 'CWE-611', 'CWE-79', 'CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T17:57:13Z', 'nvd_published_at': '2022-07-06T10:15:00Z'}
1.4.0
GHSA-ww2v-frv5-pj5x
2022-08-10T23:56:27Z
2022-07-26T00:00:28Z
null
['CVE-2022-35131']
Joplin is vulnerable to arbitrary code execution
Joplin v2.8.8 allows attackers to execute arbitrary commands via a crafted payload injected into the Node titles.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'joplin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35131'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/commit/e797ebb864fbf429a49b6d20e5779d0c9aa6c4d5'}, {'type': 'PACKAGE', 'url': 'https://github.com/laurent22/joplin'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/r...
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T22:29:52Z', 'nvd_published_at': '2022-07-25T21:15:00Z'}
1.4.0
GHSA-hgp9-2c4w-x9mh
2022-08-11T15:16:24Z
2022-07-28T00:00:42Z
null
['CVE-2022-36890']
Jenkins Deployer Framework Plugin vulnerable to Path Traversal
Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier does not restrict the name of files in methods implementing form validation, allowing attackers with Item/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:deployer-framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '86.v7b_a_4a_55b_f3ec'}]}], 'database_specific': {'last_known_affected_version_range': '<= 85.v1d1888e8c021'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36890'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2206'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:16:24Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-6wvc-6pww-qr4r
2022-07-11T21:06:28Z
2022-07-11T21:06:28Z
null
['CVE-2022-31080']
DoS in KubeEdge's Websocket Client in package Viaduct
### Impact A large response received by the viaduct WSClient can cause a DoS from memory exhaustion. The entire body of the response is being read into memory which could allow an attacker to send a request that returns a response with a large body. The consequence of the exhaustion is that the process which invokes a ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed'...
[{'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/security/advisories/GHSA-6wvc-6pww-qr4r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31080'}, {'type': 'PACKAGE', 'url': 'github.com/kubeedge/kubeedge'}]
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-11T21:06:28Z', 'nvd_published_at': '2022-07-11T21:15:00Z'}
1.4.0
GHSA-pgp9-x83g-v8x8
2022-12-09T04:55:42Z
2022-07-01T00:01:07Z
null
['CVE-2022-34802']
Plaintext Storage of a Password in Jenkins RocketChat Notifier Plugin
Jenkins RocketChat Notifier Plugin 1.5.2 and earlier stores the login password and webhook token unencrypted in its global configuration file `RocketChatNotifier.xml` on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rocketchatnotifier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34802'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rocketchatnotifier-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2088'}]
{'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T21:24:56Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-p487-39h9-hm84
2022-07-20T01:29:19Z
2022-07-08T00:00:43Z
null
['CVE-2015-5298']
Jenkins Google Login Plugin 1.0 and 1.1 allows anonymous users to authenticate through client-side request modification
The Google Login Plugin (versions 1.0 and 1.1) allows malicious anonymous users to authenticate successfully against Jenkins instances that are supposed to be locked down to a particular Google Apps domain through client-side request modification.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-login'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5298'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/google-login-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2015-10-12/'}, {'type': 'WEB', 'url': 'http://exfiltrated.com/research-CVE-2015-5298.php'}]
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T01:29:19Z', 'nvd_published_at': '2022-07-07T19:15:00Z'}
1.4.0
GHSA-8v7h-cpc2-r8jp
2022-07-21T15:56:46Z
2022-07-13T21:42:45Z
null
['CVE-2022-24800']
October CMS upload process vulnerable to RCE via Race Condition
### Impact This advisory affects plugins that expose the `October\Rain\Database\Attach\File::fromData` as a public interface. This vulnerability does not affect vanilla installations of October CMS since this method is not exposed or used by the system internally or externally. When the developer allows the user to s...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.476'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.12'}]}]}, {'...
[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-8v7h-cpc2-r8jp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24800'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/commit/fe569f3babf3f593be2b1e0a4ae0283506127a83'}, {'type': 'PACKAGE', '...
{'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T21:42:45Z', 'nvd_published_at': '2022-07-12T20:15:00Z'}
1.4.0
GHSA-2v6r-jf2g-j5q5
2022-12-12T18:26:28Z
2022-07-01T00:01:07Z
null
['CVE-2022-34786']
Cross-site Scripting in Jenkins Rich Text Publisher Plugin
Jenkins Rich Text Publisher Plugin 1.4 and earlier does not escape the HTML message set by its post-build step, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure jobs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rich-text-publisher-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34786'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rich-text-publisher-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2332'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:24:49Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-wpqr-jcpx-745r
2022-08-05T13:56:18Z
2022-07-05T21:06:00Z
null
['CVE-2022-31116']
Incorrect handling of invalid surrogate pair characters
### Impact _What kind of vulnerability is it? Who is impacted?_ Anyone parsing JSON from an untrusted source is vulnerable. JSON strings that contain escaped surrogate characters not part of a proper surrogate pair were decoded incorrectly. Besides corrupting strings, this allowed for potential key confusion and valu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ujson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wpqr-jcpx-745r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31116'}, {'type': 'WEB', 'url': 'https://github.com/ultrajson/ultrajson/commit/67ec07183342589d602e0fcf7bb1ff3e19272687'}, {'type': 'PACKAGE',...
{'cwe_ids': ['CWE-670'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T21:06:00Z', 'nvd_published_at': '2022-07-05T18:15:00Z'}
1.4.0
GHSA-mr38-g7q2-x79p
2022-08-11T15:19:16Z
2022-07-28T00:00:42Z
null
['CVE-2022-36913']
Jenkins Openstack Heat Plugin does not perform permission checks in methods implementing form validation
Jenkins Openstack Heat Plugin 1.5 and earlier does not perform permission checks in methods implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:openstack-heat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36913'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2105%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:19:16Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-wppp-xqfv-6cm7
2022-12-09T04:50:15Z
2022-07-01T00:01:08Z
null
['CVE-2022-34808']
Token stored in plain text by Jenkins Cisco Spark Plugin
Cisco Spark Plugin 1.1.1 and earlier stores bearer tokens unencrypted in its global configuration file `org.jenkinsci.plugins.spark.SparkNotifier.xml` on the Jenkins controller as part of its configuration. These bearer tokens can be viewed by users with access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cisco-spark'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34808'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cisco-spark-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2055'}]
{'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:18:41Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-xrf4-39fm-j5f2
2022-08-06T09:34:18Z
2022-07-26T00:01:08Z
null
['CVE-2022-2514']
Fava time and filter parameters vulnerable to reflected XSS before v1.22
The time and filter parameters in Fava prior to v1.22 are vulnerable to reflected cross-site scripting due to the lack of escaping of error messages which contained the parameters in verbatim.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'fava'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2514'}, {'type': 'WEB', 'url': 'https://github.com/beancount/fava/commit/ca9e3882c7b5fbf5273ba52340b9fea6a99f3711'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xrf4-39fm-j5f2'}, {'type': 'WEB', 'url': 'https://github.com/pypa/a...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:34:18Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-5pgm-3j3g-2rc7
2022-07-19T22:31:41Z
2022-07-12T22:15:29Z
null
['CVE-2022-31140']
Valinor error messages leading to potential data exfiltration before v0.12.0
```php <?php namespace My\App; use CuyZ\Valinor\Mapper\MappingError; use CuyZ\Valinor\Mapper\Tree\Node; use CuyZ\Valinor\Mapper\Tree\NodeTraverser; use CuyZ\Valinor\MapperBuilder; require_once __DIR__ . '/Valinor/vendor/autoload.php'; final class Money { private function __construct(public readonly string $amou...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'cuyz/valinor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/CuyZ/Valinor/security/advisories/GHSA-5pgm-3j3g-2rc7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31140'}, {'type': 'PACKAGE', 'url': 'https://github.com/CuyZ/Valinor'}, {'type': 'WEB', 'url': 'https://github.com/CuyZ/Valinor/releases/tag/0.12.0'}...
{'cwe_ids': ['CWE-200', 'CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T22:15:29Z', 'nvd_published_at': '2022-07-11T20:15:00Z'}
1.4.0
GHSA-2463-7265-h8r4
2022-12-09T14:28:53Z
2022-07-01T00:01:07Z
null
['CVE-2022-34788']
Jenkins Matrix Reloaded Plugin vulnerable to Stored XSS
Jenkins Matrix Reloaded Plugin 1.1.3 and earlier does not escape the agent name in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.praqma:matrix-reloaded'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34788'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/matrix-reloaded-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-1926'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T14:28:53Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-pgjx-7f9g-9463
2022-07-06T19:27:45Z
2022-07-06T19:27:45Z
null
['CVE-2022-31127']
Improper handling of email input
### Impact An attacker can pass a compromised input to the e-mail [signin endpoint](https://next-auth.js.org/getting-started/rest-api#post-apiauthsigninprovider) that contains some malicious HTML, tricking the e-mail server to send it to the user, so they can perform a phishing attack. Eg.: `balazs@email.com, <a href=...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.29.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.9.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-pgjx-7f9g-9463'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31127'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/commit/ae834f1e08a4a9915665eecb9479c74c6b039c9c'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:27:45Z', 'nvd_published_at': '2022-07-06T18:15:00Z'}
1.4.0
GHSA-j896-j72w-cr32
2022-08-11T15:15:31Z
2022-07-28T00:00:43Z
null
['CVE-2022-36887']
Jenkins Job Configuration History Plugin does not require POST requests for several HTTP endpoints
A cross-site request forgery (CSRF) vulnerability in Jenkins Job Configuration History Plugin 1155.v28a_46a_cc06a_5 and earlier allows attackers to delete entries from job, agent, and system configuration history, or restore older versions of job, agent, and system configurations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jobConfigHistory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1156.v536a_97b_8d649'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1155.v28a'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36887'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2766'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:15:31Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-6w2f-6wq3-rjvf
2022-07-29T17:55:51Z
2022-07-14T00:00:16Z
null
['CVE-2022-32065']
RuoYi 4.7.3 vulnerable to arbitrary file upload in background management module
An arbitrary file upload vulnerability in the background management module of RuoYi v4.7.3 and below allows attackers to execute arbitrary code via a crafted HTML file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.ruoyi:ruoyi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32065'}, {'type': 'WEB', 'url': 'https://github.com/yangzongzhuan/RuoYi/issues/118'}, {'type': 'WEB', 'url': 'https://github.com/yangzongzhuan/RuoYi/commit/d8b2a9a905fb750fa60e2400238cf4750a77c5e6'}, {'type': 'WEB', 'url': 'https://gitee.com/y_proj...
{'cwe_ids': ['CWE-434', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:14:24Z', 'nvd_published_at': '2022-07-13T15:15:00Z'}
1.4.0
GHSA-8274-h5jp-97vr
2022-08-10T23:52:25Z
2022-07-27T22:05:18Z
null
['CVE-2022-31109']
Diactoros before 2.11.1 vulnerable to HTTP Host Header Attack
### Impact Applications that use Diactoros, and are either not behind a proxy, or can be accessed via untrusted proxies, can potentially have the host, protocol, and/or port of a `Laminas\Diactoros\Uri` instance associated with the incoming server request modified to reflect values from `X-Forwarded-*` headers. Such c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'laminas/laminas-diactoros'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/laminas/laminas-diactoros/security/advisories/GHSA-8274-h5jp-97vr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31109'}, {'type': 'WEB', 'url': 'https://github.com/laminas/laminas-diactoros/commit/25b11d422c2e5dad868f68619888763b30f91e2d'}, {'type'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T22:05:18Z', 'nvd_published_at': '2022-08-01T17:15:00Z'}
1.4.0
GHSA-5mxg-p5qh-2gch
2022-07-12T20:36:23Z
2022-07-01T00:01:07Z
null
['CVE-2022-34796']
Insufficiently Protected Credentials in Jenkins Deployment Dashboard Plugin
A missing permission check in Jenkins Deployment Dashboard Plugin 1.0.10 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ec2-deployment-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34796'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ec2-deployment-dashboard'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2798%20(1)'}]
{'cwe_ids': ['CWE-522', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T20:36:23Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-fjpq-f574-jc45
2022-08-10T18:32:37Z
2022-07-28T00:00:42Z
null
['CVE-2022-36904']
Jenkins Repository Connector Plugin does not perform a permission check in a method implementing form validation
Jenkins Repository Connector Plugin 2.2.0 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:repository-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36904'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2665%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:32:37Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-jxvf-m3x5-mxwq
2022-08-10T23:53:55Z
2022-07-19T14:28:59Z
null
['CVE-2020-28471']
Properties-Reader before v2.2.0 vulnerable to prototype pollution
Properties-Reader prior to version 2.2.0 is vulnerable to prototype pollution. Version 2.2.0 contains a patch for this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'properties-reader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28471'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/properties/issues/40'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/properties/commit/0877cc871db9865f58dd9389ce99e61be05380a5'}, {'type': 'WEB', 'url': 'https://github.com/steveu...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-19T14:28:59Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-xv59-gc3r-rf92
2022-07-15T20:44:19Z
2022-07-06T00:00:30Z
null
['CVE-2022-2306']
Insufficient Session Expiration in Nakama
Old session tokens can be used to authenticate to the application and send authenticated requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/heroiclabs/nakama'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.12.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2306'}, {'type': 'WEB', 'url': 'https://github.com/heroiclabs/nakama/commit/ce8d3921e2acd44ef8b5e6edfe595b6df067b166'}, {'type': 'PACKAGE', 'url': 'https://github.com/heroiclabs/nakama/v3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/35acf2...
{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:58:37Z', 'nvd_published_at': '2022-07-05T09:15:00Z'}
1.4.0
GHSA-5689-v88g-g6rv
2023-07-10T21:31:51Z
2022-07-15T00:00:18Z
null
['CVE-2022-32213']
llhttp allows HTTP Request Smuggling via Flawed Parsing of Transfer-Encoding
The llhttp parser in the http module in Node.js v17.x does not correctly parse and validate Transfer-Encoding headers and can lead to HTTP Request Smuggling (HRS). Impacts: - All versions of the nodejs 18.x, 16.x, and 14.x releases lines. - llhttp v6.0.7 and llhttp v2.1.5 contains the fixes that were updated inside N...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'llhttp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32213'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/llhttp/commit/18a4afc7ffb4e49dc9e2daebc50588199a6d1dbb'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1524555'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcer...
{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T21:31:51Z', 'nvd_published_at': '2022-07-14T15:15:00Z'}
1.4.0
GHSA-78fg-pvgg-6g3r
2022-12-13T13:54:23Z
2022-07-28T00:00:42Z
null
['CVE-2022-36909']
Missing permission check in Jenkins OpenShift Deployer Plugin
OpenShift Deployer Plugin 1.2.0 and earlier does not perform permission checks in methods implementing form validation. This allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system and to upload a SSH key file from the Jenkins co...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:openshift-deployer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36909'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/openshift-deployer-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1375%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T22:41:55Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-m8w5-vwq3-gp8f
2022-08-11T14:36:39Z
2022-07-28T00:00:42Z
null
['CVE-2022-36910']
Lucene-Search Plugin does not perform permission checks in several HTTP endpoints
Jenkins Lucene-Search Plugin 370.v62a5f618cd3a and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to reindex the database and to obtain information about jobs otherwise inaccessible to them.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:lucene-search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '370.v62a5f618cd3a'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36910'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2048'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T14:36:39Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-449w-c77c-vmf6
2022-12-09T20:56:53Z
2022-07-28T00:00:43Z
null
['CVE-2022-36884']
Lack of authentication mechanism in Jenkins Git Plugin webhook
Git Plugin provides a webhook endpoint at `/git/notifyCommit` that can be used to notify Jenkins of changes to an SCM repository. For its most basic functionality, this endpoint receives a repository URL, and Jenkins will schedule polling for all jobs configured with the specified repository. In Git Plugin 4.11.3 and e...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.11.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36884'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284'}, {'type': 'PACKAGE', 'url': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202...
{'cwe_ids': ['CWE-200', 'CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:28:37Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-f2gr-7299-487h
2022-07-06T20:06:56Z
2022-07-06T20:06:56Z
null
[]
DOS and excessive memory usage when passing untrusted user input to to dag import
### Impact go-ipfs nodes crash when trying to import certain malformed CAR files due to an issue in the go-car dependency. This impacts nodes running `ipfs dag import` on untrusted user inputs, for example, pinning services with a car ingest endpoint. This include the corresponding [HTTP RPC API `v0/dag/import`](https:...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-ipfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.13.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ipfs/go-ipfs/security/advisories/GHSA-f2gr-7299-487h'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipfs/go-ipfs'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:06:56Z', 'nvd_published_at': None}
1.4.0
GHSA-95f9-94vc-665h
2023-08-28T23:44:10Z
2022-07-06T00:00:28Z
null
['CVE-2022-31836']
Path Traversal in Beego
The `leafInfo.match()` function in Beego v2.0.3 and below uses `path.join()` to deal with wildcardvalues which can lead to cross directory risk.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego/v2'}, 'ecosystem_specific': {'affected_functi...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31836'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/issues/4961'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/pull/5025'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/pull/5025/commits/ea5ae58d40589d249cf577a053e4...
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:01:19Z', 'nvd_published_at': '2022-07-05T15:15:00Z'}
1.4.0
GHSA-w52j-3457-q9wr
2022-07-19T22:29:12Z
2022-07-11T21:01:31Z
null
['CVE-2022-31074']
KubeEdge Cloud AdmissionController component DoS
### Impact Several endpoints including `/devicemodels`, `/rules`, `/ruleendpoints`, `/offlinemigration` in the Cloud Admissioncontroller may be susceptible to a DoS attack if an HTTP request containing a very large Body is sent to it. Only an authenticated user can cause this issue. It will be affected when users deplo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed'...
[{'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/security/advisories/GHSA-w52j-3457-q9wr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31074'}, {'type': 'PACKAGE', 'url': 'github.com/kubeedge/kubeedge'}]
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-11T21:01:31Z', 'nvd_published_at': '2022-07-11T20:15:00Z'}
1.4.0
GHSA-fjh6-p566-wr6q
2022-07-21T22:35:12Z
2022-07-21T22:35:12Z
null
[]
skylot jadx affected by Incorrect Behavior Order in vulnerable dependency
### Impact Vulnerable library protobuf-java 3.11.4 (CVE-2021-22569) ### Patches Dependency updated in jadx 1.4.3 ### References According to the AquaSecurity report: ![05F1C52A666E4FCC844ABD085BD55124](https://user-images.githubusercontent.com/118523/177364939-087e2144-9a8a-4594-ae90-eb2acb0a2036.png) Also, Maven re...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'io.github.skylot:jadx-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.2'}}]
[{'type': 'WEB', 'url': 'https://github.com/skylot/jadx/security/advisories/GHSA-fjh6-p566-wr6q'}, {'type': 'PACKAGE', 'url': 'https://github.com/skylot/jadx'}, {'type': 'WEB', 'url': 'https://github.com/skylot/jadx/releases/tag/v1.4.3'}]
{'cwe_ids': ['CWE-696'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T22:35:12Z', 'nvd_published_at': None}
1.4.0
GHSA-5m48-c37x-f792
2023-01-26T22:40:32Z
2022-07-01T00:01:11Z
null
['CVE-2013-4170']
Ember.js Potential XSS Exploit When Binding `tagName` to User-Supplied Data
In general, Ember.js escapes or strips any user-supplied content before inserting it in strings that will be sent to innerHTML. However, the `tagName` property of an `Ember.View` was inserted into such a string without being sanitized. This means that if an application assigns a view's `tagName` to user-supplied data, ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0.rc1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0.rc1.0'}}, {'package': {'ecosystem': 'Ruby...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4170'}, {'type': 'PACKAGE', 'url': 'https://github.com/emberjs/ember.js'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ember-source/CVE-2013-4170.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/foru...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T21:27:47Z', 'nvd_published_at': '2022-06-30T13:15:00Z'}
1.4.0
GHSA-hqmp-vxj7-5wpq
2022-12-12T18:28:32Z
2022-07-01T00:01:07Z
null
['CVE-2022-34791']
Cross-site Scripting in Jenkins Validating Email Parameter Plugin
Jenkins Validating Email Parameter Plugin 1.10 and earlier does not escape the name and description of its parameter type. Additionally, it disables the security hardening added in Jenkins 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:validating-email-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34791'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/validating-email-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2165'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:20:00Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-7298-w54j-q7wm
2022-12-09T04:57:07Z
2022-07-01T00:01:07Z
null
['CVE-2022-34801']
Cleartext Storage of Sensitive Information in Jenkins Build Notifications Plugin
Jenkins Build Notifications Plugin 1.5.0 and earlier transmits tokens in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'tools.devnull:build-notifications'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34801'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/build-notifications-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2056'}]
{'cwe_ids': ['CWE-318'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T21:25:20Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-8xwj-2wgh-gprh
2022-12-12T20:53:46Z
2022-07-28T00:00:43Z
null
['CVE-2022-36882']
Lack of authentication mechanism in Jenkins Git Plugin webhook
Git Plugin provides a webhook endpoint at `/git/notifyCommit` that can be used to notify Jenkins of changes to an SCM repository. For its most basic functionality, this endpoint receives a repository URL, and Jenkins will schedule polling for all jobs configured with the specified repository. In Git Plugin 4.11.3 and e...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.11.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36882'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T21:10:33Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-4wf5-vphf-c2xc
2023-03-13T22:43:44Z
2022-07-16T00:00:20Z
null
['CVE-2022-25858']
Terser insecure use of regular expressions leads to ReDoS
The package terser before 4.8.1, from 5.0.0 and before 5.14.2 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure usage of regular expressions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'terser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'terser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.14.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25858'}, {'type': 'WEB', 'url': 'https://github.com/terser/terser/commit/a4da7349fdc92c05094f41d33d06d8cd4e90e76b'}, {'type': 'WEB', 'url': 'https://github.com/terser/terser/commit/d8cc5691be980d663c29cc4d5ce67e852d597012'}, {'type': 'PACKAGE', 'ur...
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T01:21:59Z', 'nvd_published_at': '2022-07-15T20:15:00Z'}
1.4.0
GHSA-hm37-9xh2-q499
2022-07-06T19:24:12Z
2022-07-06T19:24:12Z
null
['CVE-2022-31124']
Possible leak of key's raw field if declared length is incorrect
### Impact If a field of a key is shorter than it is declared to be, the parser raises an error with a message containing the raw field value. An attacker able to modify the declared length of a key's sensitive field can thus expose the raw value of that field. ### Patches Upgrade to version 0.0.6, which no longer inc...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'openssh-key-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/scottcwang/openssh_key_parser/security/advisories/GHSA-hm37-9xh2-q499'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31124'}, {'type': 'WEB', 'url': 'https://github.com/scottcwang/openssh_key_parser/pull/5'}, {'type': 'WEB', 'url': 'https://github.c...
{'cwe_ids': ['CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:24:12Z', 'nvd_published_at': '2022-07-06T18:15:00Z'}
1.4.0
GHSA-pp3f-98qg-5g75
2022-07-21T15:22:31Z
2022-07-13T00:00:41Z
null
['CVE-2022-2385']
aws-iam-authenticator allow-listed IAM identity may be able to modify their username, escalate privileges before v0.5.9
A security issue was discovered in aws-iam-authenticator where an allow-listed IAM identity may be able to modify their username and escalate privileges.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'sigs.k8s.io/aws-iam-authenticator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2385'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes-sigs/aws-iam-authenticator/issues/472'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes-sigs/aws-iam-authenticator/pull/469'}, {'type': 'WEB', 'url': 'https://github.com/kubernete...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:09:47Z', 'nvd_published_at': '2022-07-12T19:15:00Z'}
1.4.0
GHSA-q6mp-562x-ggvv
2022-07-13T18:51:43Z
2022-07-05T00:00:54Z
null
['CVE-2022-2300']
Cross-site Scripting in microweber
Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.19.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2300'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/70b46e231e7b2c113666745a0ab6de9a8b7ef08e'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:51:20Z', 'nvd_published_at': '2022-07-04T11:15:00Z'}
1.4.0
GHSA-rhf5-2378-3w3w
2022-08-10T23:54:16Z
2022-07-19T14:16:06Z
null
['CVE-2020-28459']
markdown-it-decorate vulnerable to cross-site scripting (XSS)
markdown-it-decorate adds attributes, IDs and classes to Markdown, and the most recent version 1.2.2 was published in 2017. All versions are currently vulnerable to cross-site scripting (XSS) and there is no fixed version at this time
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'markdown-it-decorate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28459'}, {'type': 'WEB', 'url': 'https://github.com/rstacruz/markdown-it-decorate/commit/a6b33ce79e9b8cddf6184c754713e6af65253909'}, {'type': 'PACKAGE', 'url': 'https://github.com/rstacruz/markdown-it-decorate'}, {'type': 'WEB', 'url': 'https://sec...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-19T14:16:06Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-c2pj-rr68-pw94
2022-08-10T23:47:27Z
2022-07-23T00:00:15Z
null
['CVE-2022-34112']
Dataease before 1.11.2 access control issue allows attackers to arbitrarily uninstall plugin
An access control issue in the component /api/plugin/uninstall Dataease v1.11.1 allows attackers to arbitrarily uninstall the plugin, a right normally reserved for the administrator. Version 1.11.2 contains a patch for this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.dataease:dataease-plugin-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34112'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/issues/2429'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/commit/5f611d3e3934816e9ad34e3d21807978001e2c8b'}, {'type': 'PACKAGE', 'url': 'https://github.com/data...
{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T22:10:40Z', 'nvd_published_at': '2022-07-22T23:15:00Z'}
1.4.0
GHSA-6954-h5c8-m29f
2022-08-11T15:54:42Z
2022-07-28T00:00:42Z
null
['CVE-2022-36922']
Jenkins Lucene-Search Plugin vulnerable to reflected (XSS) cross-site scripting
Jenkins Lucene-Search Plugin 370.v62a5f618cd3a and earlier does not escape the search query parameter displayed on the 'search' result page, resulting in a reflected cross-site scripting (XSS) vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:lucene-search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '370.v62a5f618cd3a'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36922'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2812'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:54:42Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-q72p-4w56-hx7h
2023-07-11T00:16:48Z
2022-07-22T00:00:37Z
null
['CVE-2022-32430']
Hardcoded JWT Token in Lin CMS Spring Boot
An access control issue in Lin CMS Spring Boot v0.2.1 allows attackers to access the backend information and functions within the application.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.github.talelin:lin-cms-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32430'}, {'type': 'PACKAGE', 'url': 'https://github.com/TaleLin/lin-cms-spring-boot'}, {'type': 'WEB', 'url': 'https://github.com/TaleLin/lin-cms-spring-boot/blob/3fc25bd8c10c73db2e7230809b322127eac554e3/src/main/resources/application.yml#L43'}, {'...
{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T00:16:48Z', 'nvd_published_at': '2022-07-21T16:15:00Z'}
1.4.0
GHSA-5x3f-7m52-9cgf
2022-12-13T14:22:59Z
2022-07-28T00:00:42Z
null
['CVE-2022-36920']
Jenkins Coverity Plugin vulnerable to cross-site request forgery (CSRF)
A cross-site request forgery (CSRF) vulnerability in Jenkins Coverity Plugin 1.11.4 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:coverity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36920'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/coverity-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2790%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:22:18Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-wv8q-r932-8hc7
2023-09-07T00:13:26Z
2022-07-13T00:00:41Z
null
['CVE-2022-25875']
Svelte vulnerable to XSS when using objects during server-side rendering
The package svelte before 3.49.0 is vulnerable to Cross-site Scripting (XSS) due to improper input sanitization and to improper escape of attributes when using objects during SSR (Server-Side Rendering). Exploiting this vulnerability is possible via objects with a custom toString() function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'svelte'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.49.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25875'}, {'type': 'WEB', 'url': 'https://github.com/sveltejs/svelte/pull/7530#23issuecomment-1158575990'}, {'type': 'WEB', 'url': 'https://github.com/sveltejs/svelte/commit/f8605d6acbf66976da9b4547f76e90e163899907'}, {'type': 'PACKAGE', 'url': 'htt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T16:22:17Z', 'nvd_published_at': '2022-07-12T19:15:00Z'}
1.4.0
GHSA-cqhr-jqvc-qw9p
2022-07-20T01:36:35Z
2022-07-20T01:36:35Z
null
['CVE-2016-1000273']
Java Melody vulnerable to cross-site scripting
JavaMelody is a monitoring tool for JavaEE applications. Versions prior to 1.61.0 are vulnerable to a cross-site scripting (XSS) attack. This issue was patched in version 1.61.0, and users are recommended to upgrade to the latest version. There are no known workarounds.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.bull.javamelody:javamelody-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.61.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/javamelody/javamelody/commit/e0497c1980acebd257d3da78dfde29ae9bdffdf6'}, {'type': 'PACKAGE', 'url': 'https://github.com/javamelody/javamelody'}, {'type': 'WEB', 'url': 'https://github.com/javamelody/javamelody/wiki/ReleaseNotes#1620'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T01:36:35Z', 'nvd_published_at': None}
1.4.0
GHSA-2348-ccqj-8p27
2022-12-09T14:31:53Z
2022-07-01T00:01:08Z
null
['CVE-2022-34810']
Jenkins RQM Plugin allows enumerating credentials IDs due to missing permission check
Jenkins RQM Plugin 2.8 and earlier does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.praqma:rqm-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34810'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rqm-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2806'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T14:31:53Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-qh9x-gcfh-pcrw
2022-08-10T23:52:57Z
2022-07-21T22:33:01Z
null
['CVE-2022-31170']
OpenZeppelin Contracts's ERC165Checker may revert instead of returning false
### Impact `ERC165Checker.supportsInterface` is designed to always successfully return a boolean, and under no circumstance revert. However, an incorrect assumption about Solidity 0.8's `abi.decode` allows some cases to revert, given a target contract that doesn't implement EIP-165 as expected, specifically if it retu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed...
[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-qh9x-gcfh-pcrw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31170'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3552'}, {'type': 'PACKAGE', 'url'...
{'cwe_ids': ['CWE-20', 'CWE-252'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T22:33:01Z', 'nvd_published_at': '2022-07-22T04:15:00Z'}
1.4.0
GHSA-6xhf-xx3j-75f5
2022-12-12T18:25:38Z
2022-07-01T00:01:07Z
null
['CVE-2022-34782']
Incorrect Authorization in Jenkins requests-plugin
An incorrect permission check in Jenkins requests-plugin Plugin 2.2.16 and earlier allows attackers with Overall/Read permission to view the list of pending requests. requests-plugin Plugin 2.2.17 requires Overall/Administer permission to view the list of pending requests. This is basically the same vulnerability as [...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:requests'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.17'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.16'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34782'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/requests-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2650'}]
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:29:26Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-273c-fjw8-v2w8
2022-07-12T21:24:32Z
2022-07-01T00:01:08Z
null
['CVE-2022-34803']
Plaintext Storage of a Password in Jenkins OpsGenie Plugin
Jenkins OpsGenie Plugin 1.9 and earlier stores API keys unencrypted in its global configuration file and in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission (config.xml), or access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:opsgenie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34803'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/opsgenie-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-1877'}]
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T21:24:32Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-8rq8-f485-7v8x
2023-09-05T09:35:04Z
2022-07-09T00:00:19Z
null
['CVE-2022-35411']
rpc.py vulnerable to Deserialization of Untrusted Data
rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle. [Per the maintainer](https://github.com/aber...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rpc.py'}, 'ecosystem_specific': {'affected_functions': ['rpcpy.serializers.SERIALIZER_NAMES', 'rpcpy.serializers.SERIALIZER_TYPES']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.2'}, {'last_affected': '0.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35411'}, {'type': 'WEB', 'url': 'https://github.com/abersheeran/rpc.py/issues/22'}, {'type': 'WEB', 'url': 'https://github.com/abersheeran/rpc.py/commit/491e7a841ed9a754796d6ab047a9fb16e23bf8bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/aber...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T17:55:02Z', 'nvd_published_at': '2022-07-08T19:15:00Z'}
1.4.0
GHSA-7ggc-5r84-xf54
2022-07-21T22:35:35Z
2022-07-15T00:00:16Z
null
['CVE-2022-2401']
Mattermost users could access some sensitive information via API call
Unrestricted information disclosure of all users in Mattermost version 6.7.0 and earlier allows team members to access some sensitive information by directly accessing the APIs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2401'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost-server'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}]
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T22:35:35Z', 'nvd_published_at': '2022-07-14T18:15:00Z'}
1.4.0
GHSA-8r94-4h3c-939f
2022-07-15T20:44:32Z
2022-07-06T00:00:26Z
null
['CVE-2022-2321']
Improper Restriction of Excessive Authentication Attempts
Nakama Console does not enforce any limit for the number of unsuccessful login attempts.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/heroiclabs/nakama/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.12.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2321'}, {'type': 'WEB', 'url': 'https://github.com/heroiclabs/nakama/pull/878'}, {'type': 'WEB', 'url': 'https://github.com/heroiclabs/nakama/commit/e2e02fce80ff33ce45f8a6ebc0b7a99ee0b03824'}, {'type': 'PACKAGE', 'url': 'https://github.com/heroicla...
{'cwe_ids': ['CWE-307'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:58:27Z', 'nvd_published_at': '2022-07-05T19:15:00Z'}
1.4.0
GHSA-j5qq-6rpm-qjgh
2022-12-09T20:54:31Z
2022-07-28T00:00:42Z
null
['CVE-2022-36889']
Jenkins Deployer Framework Plugin does not restrict application path of applications when configuring a deployment
Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier does not restrict the application path of the applications when configuring a deployment, allowing attackers with Item/Configure permission to upload arbitrary files from the Jenkins controller file system to the selected service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:deployer-framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '86.v7b_a_4a_55b_f3ec'}]}], 'database_specific': {'last_known_affected_version_range': '<= 85.v1d1888e8c021'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36889'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/deployer-framework-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2764'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-s...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T21:16:12Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-6f85-3f8q-qc94
2022-07-15T19:25:06Z
2022-07-15T19:25:06Z
null
[]
OroCommerce vulnerable to XSS when adding class name to Selector Manager on pages that use GrapeJS editor
# Impact Due to insufficient class name validation in GrapeJS library it's possible to add executable JS code in class name through Selector Manager # Relates to - [https://github.com/artf/grapesjs/issues/4411](https://github.com/artf/grapesjs/issues/4411) # Patch Update GrapeJS dependency to >=[v0.19.5](https://git...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'oro/commerce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.0.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/oroinc/orocommerce/security/advisories/GHSA-6f85-3f8q-qc94'}, {'type': 'WEB', 'url': 'https://github.com/artf/grapesjs/issues/4411'}, {'type': 'PACKAGE', 'url': 'https://github.com/oroinc/orocommerce'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T19:25:06Z', 'nvd_published_at': None}
1.4.0
GHSA-4x9r-j582-cgr8
2023-08-31T00:22:26Z
2022-07-19T00:00:29Z
null
['CVE-2022-33891']
Apache Spark UI can allow impersonation if ACLs enabled
The Apache Spark UI offers the possibility to enable ACLs via the configuration option `spark.acls.enable`. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonatio...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-parent_2.12'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-parent_2.12'}, 'ecosy...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33891'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/spark'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2022-236.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/p847l3k...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T21:40:46Z', 'nvd_published_at': '2022-07-18T07:15:00Z'}
1.4.0
GHSA-227g-7cvv-6ff3
2022-07-22T16:31:43Z
2022-07-14T00:00:23Z
null
['CVE-2022-31781']
Apache Tapestry 5.8.1 vulnerable to ReDoS via Content Types causing catastrophic backtracking
Apache Tapestry up to version 5.8.1 is vulnerable to Regular Expression Denial of Service (ReDoS) in the way it handles Content Types. Specially crafted Content Types may cause catastrophic backtracking, taking exponential time to complete. Specifically, this is about the regular expression used on the parameter of the...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31781'}, {'type': 'WEB', 'url': 'https://github.com/apache/tapestry-5/commit/3c8d6103832eec3bc06029dd2532f06df717431f'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/07/12/3'}]
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:33:51Z', 'nvd_published_at': '2022-07-13T08:15:00Z'}
1.4.0
GHSA-w7f5-jrpr-5c2m
2022-08-06T09:24:30Z
2022-07-29T00:00:44Z
null
['CVE-2022-36364']
Apache Calcite Avatica JDBC driver arbitrary code execution
Apache Calcite Avatica JDBC driver creates HTTP client instances based on class names provided via `httpclient_impl` connection property; however, the driver does not verify if the class implements the expected interface before instantiating it, which can lead to code execution loaded via arbitrary classes and in rare ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.calcite.avatica:avatica-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36364'}, {'type': 'WEB', 'url': 'https://github.com/apache/calcite-avatica/commit/0c097b6a685fc1f97f151505a219976f15ed0c4c'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/calcite-avatica'}, {'type': 'WEB', 'url': 'https://lists.apache.org/...
{'cwe_ids': ['CWE-665'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:24:30Z', 'nvd_published_at': '2022-07-28T09:15:00Z'}
1.4.0
GHSA-8mpp-f3f7-xc28
2022-08-11T21:31:50Z
2022-07-07T20:55:37Z
null
['CVE-2022-2191']
Jetty SslConnection does not release pooled ByteBuffers in case of errors
### Impact `SslConnection` does not release `ByteBuffer`s in case of error code paths. For example, TLS handshakes that require client-auth with clients that send expired certificates will trigger a TLS handshake errors and the `ByteBuffer`s used to process the TLS handshake will be leaked. ### Workarounds Configure e...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'...
[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-8mpp-f3f7-xc28'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2191'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/issues/8161'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclip...
{'cwe_ids': ['CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T20:55:37Z', 'nvd_published_at': '2022-07-07T21:15:00Z'}
1.4.0
GHSA-hpf7-mmqw-g6vq
2022-12-09T04:27:56Z
2022-07-01T00:01:07Z
null
['CVE-2022-34783']
Cross-site Scripting in Jenkins Plot Plugin
Jenkins Plot Plugin 2.1.10 and earlier does not escape plot descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:plot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34783'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/plot-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2220'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:25:50Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-qpqw-mc85-qvm9
2023-01-24T16:38:57Z
2022-07-01T00:01:04Z
null
['CVE-2014-0156']
OS Command Injection in awesome spawn
Awesome spawn prior to version 1.2.0 contains OS command injection vulnerability, which allows execution of additional commands passed to Awesome spawn as arguments. If untrusted input was included in command arguments, attacker could use this flaw to execute arbitrary command.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'awesome_spawn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0156'}, {'type': 'WEB', 'url': 'https://github.com/ManageIQ/awesome_spawn/commit/e524f85f1c6e292ef7d117d7818521307ac269ff'}, {'type': 'PACKAGE', 'url': 'https://github.com/ManageIQ/awesome_spawn'}, {'type': 'WEB', 'url': 'https://rubysec.com/adviso...
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T20:25:02Z', 'nvd_published_at': '2022-06-30T21:15:00Z'}
1.4.0
GHSA-4g63-c64m-25w9
2022-07-21T22:33:37Z
2022-07-21T22:33:37Z
null
['CVE-2022-31172']
OpenZeppelin Contracts's SignatureChecker may revert on invalid EIP-1271 signers
### Impact `SignatureChecker.isValidSignatureNow` is not expected to revert. However, an incorrect assumption about Solidity 0.8's `abi.decode` allows some cases to revert, given a target contract that doesn't implement EIP-1271 as expected. The contracts that may be affected are those that use `SignatureChecker` to ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.7.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed...
[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-4g63-c64m-25w9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31172'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3552'}]
{'cwe_ids': ['CWE-20', 'CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T22:33:37Z', 'nvd_published_at': '2022-07-22T04:15:00Z'}
1.4.0
GHSA-jj8j-6jq7-gmvh
2022-08-11T15:51:47Z
2022-07-28T00:00:42Z
null
['CVE-2022-36914']
Jenkins Files Found Trigger Plugin allows attackers to check for existence of attacker-specified file path on Jenkins controller file system
Jenkins Files Found Trigger Plugin 1.5 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:files-found-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36914'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2210'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:51:47Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}