schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-7r65-pjgv-h2h9 | 2022-07-13T15:44:03Z | 2022-07-01T00:01:08Z | null | ['CVE-2022-34804'] | Cleartext Transmission of Sensitive Information in Jenkins OpsGenie Plugin | Jenkins OpsGenie Plugin 1.9 and earlier transmits API keys in plain text as part of the global Jenkins configuration form and job configuration forms, potentially resulting in their exposure. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:opsgenie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34804'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/opsgenie-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-1877'}] | {'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T15:44:03Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-qv6h-pcf2-2w3g | 2022-08-05T18:57:58Z | 2022-07-23T00:00:16Z | 2022-08-05T18:57:58Z | ['CVE-2022-36408'] | Duplicate Advisory GHSA-hrgx-p36p-89q4 | ## Duplicate Advisory
This advisory is a duplicate of GHSA-hrgx-p36p-89q4. This link is maintained to preserve external references.
## Original Description
PrestaShop 1.6.0.10 through 1.7.x before 1.7.8.2 allows remote attackers to execute arbitrary code, aka a "previously unknown vulnerability chain" related to SQL... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0.10'}, {'fixed': '1.7.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36408'}, {'type': 'WEB', 'url': 'https://build.prestashop.com/news/major-security-vulnerability-on-prestashop-websites/'}, {'type': 'PACKAGE', 'url': 'https://github.com/PrestaShop/PrestaShop'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-05T18:57:58Z', 'nvd_published_at': '2022-07-22T22:15:00Z'} |
1.4.0 | GHSA-qpx3-9565-5xwm | 2022-07-19T22:28:27Z | 2022-07-11T21:04:51Z | null | ['CVE-2022-31078'] | KubeEdge CloudCore Router memory exhaustion vulnerability | ### Impact
The CloudCore Router does not impose a limit on the size of responses to requests made by the REST handler. An attacker could use this weakness to make a request that will return an HTTP response with a large body and cause DoS of CloudCore. In the HTTP Handler API, the rest handler makes a request to a pre-... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed'... | [{'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/security/advisories/GHSA-qpx3-9565-5xwm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31078'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubeedge/kubeedge'}] | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-11T21:04:51Z', 'nvd_published_at': '2022-07-11T21:15:00Z'} |
1.4.0 | GHSA-cp6q-836q-gmj3 | 2022-12-09T16:16:49Z | 2022-07-01T00:01:08Z | null | ['CVE-2022-34817'] | Cross-Site Request Forgery in Jenkins Failed Job Deactivator Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Failed Job Deactivator Plugin 1.2.1 and earlier allows attackers to disable jobs. This CSRF vulnerability is only exploitable in Jenkins 2.286 and earlier, LTS 2.277.1 and earlier. See the [LTS upgrade guide](https://www.jenkins.io/doc/upgrade-guide/2.277/#up... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'de.einsundeins.jenkins.plugins.failedjobdeactivator:failedJobDeactivator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34817'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/failedjobdeactivator-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2061'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:14:08Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-qv56-j8fg-39h6 | 2022-07-12T18:25:33Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34785'] | Missing Authorization in Jenkins build-metrics Plugin | Jenkins build-metrics Plugin 1.3 and earlier does not perform permission checks in multiple HTTP endpoints, allowing attackers with Overall/Read permission to obtain information about jobs otherwise inaccessible to them. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:build-metrics'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34785'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/build-metrics-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2643'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:25:33Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-h5h5-m2mc-j2pv | 2022-12-09T04:51:40Z | 2022-07-01T00:01:08Z | null | ['CVE-2022-34807'] | Plaintext Storage of a Password in Jenkins Elasticsearch Query Plugin | Jenkins Elasticsearch Query Plugin 1.2 and earlier stores a password unencrypted in its global configuration file `org.jenkinsci.plugins.elasticsearchquery.ElasticsearchQueryBuilder.xml` on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:elasticsearch-query'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34807'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/elasticsearch-query-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2073'}] | {'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:19:07Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-v3r8-6vfj-pppf | 2022-12-09T04:58:56Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34800'] | Plaintext Storage of a Password in Jenkins Build Notifications Plugin | Build Notifications Plugin 1.5.0 and earlier stores multiple tokens unencrypted in its global configuration files on the Jenkins controller as part of its configuration:- Pushover Application Token in `tools.devnull.jenkins.plugins.buildnotifications.PushoverNotifier.xml`\n- Slack Bot Token in `tools.devnull.jenkins.pl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'tools.devnull:build-notifications'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34800'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/build-notifications-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2056'}] | {'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T21:25:42Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-h6gj-6jjq-h8g9 | 2022-08-10T22:17:46Z | 2022-07-18T17:07:36Z | null | ['CVE-2022-31160'] | jQuery UI vulnerable to XSS when refreshing a checkboxradio with an HTML-like initial text label | ### Impact
Initializing a checkboxradio widget on an input enclosed within a label makes that parent label contents considered as the input label. If you call `.checkboxradio( "refresh" )` on such a widget and the initial HTML contained encoded HTML entities, they will erroneously get decoded. This can lead to potentia... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:jquery-ui'}, 'ecosystem_specific': {'affected_functions': ['']... | [{'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/security/advisories/GHSA-h6gj-6jjq-h8g9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31160'}, {'type': 'WEB', 'url': 'https://github.com/jquery/jquery-ui/commit/8cc5bae1caa1fcf96bf5862c5646c787020ba3f9'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-18T17:07:36Z', 'nvd_published_at': '2022-07-20T20:15:00Z'} |
1.4.0 | GHSA-7488-6x3r-23w5 | 2023-08-31T00:20:56Z | 2022-07-13T15:43:03Z | null | ['CVE-2022-31507'] | Ganga allows absolute path traversal | The ganga-devs/ganga repository before 8.5.10 on GitHub allows absolute path traversal because the Flask `send_file` function is used unsafely. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ganga'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31507'}, {'type': 'WEB', 'url': 'https://github.com/github/securitylab/issues/669#issuecomment-1117265726'}, {'type': 'WEB', 'url': 'https://github.com/ganga-devs/ganga/commit/730e7aba192407d35eb37dd7938d49071124be8c'}, {'type': 'ADVISORY', 'url': ... | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T15:43:03Z', 'nvd_published_at': '2022-07-11T01:15:00Z'} |
1.4.0 | GHSA-cp5r-xqjr-84gm | 2022-08-10T21:14:37Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36898'] | Jenkins Compuware ISPW Operations Plugin does not perform permission checks in several HTTP endpoints | A missing permission check in Jenkins Compuware ISPW Operations Plugin 1.0.8 and earlier allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-ispw-operations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.8'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36898'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2628'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T21:14:37Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-8294-mv9c-7m5h | 2022-12-12T16:09:13Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36905'] | Stored XSS vulnerability in Jenkins Maven Metadata Plugin for Jenkins CI server plugin | Maven Metadata Plugin for Jenkins CI server Plugin 2.2 and earlier does not perform URL validation for the Repository Base URL of List maven artifact versions parameters. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'eu.markov.jenkins.plugin.mvnmeta:maven-metadata-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36905'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/maven-metadata-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2686'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T16:09:13Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-8mjr-jr5h-q2xr | 2022-07-25T19:25:43Z | 2022-07-15T18:17:19Z | null | ['CVE-2022-31153'] | OpenZeppelin Contracts for Cairo account cannot process transactions on Goerli | ### Impact
This vulnerability affects all accounts (vanilla and ethereum flavors) in the [v0.2.0 release of OpenZeppelin Contracts for Cairo](https://github.com/OpenZeppelin/cairo-contracts/releases/tag/v0.2.0), which are not whitelisted on StarkNet mainnet, so only goerli deployments of v0.2.0 accounts are affected.
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'openzeppelin-cairo-contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/cairo-contracts/security/advisories/GHSA-8mjr-jr5h-q2xr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31153'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/cairo-contracts/issues/386'}, {'type': 'WEB', 'url': 'https://github... | {'cwe_ids': ['CWE-664', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:17:19Z', 'nvd_published_at': '2022-07-15T18:15:00Z'} |
1.4.0 | GHSA-xj57-8qj4-c4m6 | 2022-07-15T20:45:07Z | 2022-07-07T00:00:26Z | null | ['CVE-2022-33980'] | Code injection in Apache Commons Configuration | Apache Commons Configuration performs variable interpolation, allowing properties to be dynamically evaluated and expanded. The standard format for interpolation is "${prefix:name}", where "prefix" is used to locate an instance of org.apache.commons.configuration2.interpol.Lookup that performs the interpolation. Starti... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.commons:commons-configuration2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4'}, {'fixed': '2.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33980'}, {'type': 'WEB', 'url': 'https://commons.apache.org/proper/commons-configuration/changes-report.html#a2.8.0'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/commons-configuration'}, {'type': 'WEB', 'url': 'https://issues.apache.org/... | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T16:56:07Z', 'nvd_published_at': '2022-07-06T13:15:00Z'} |
1.4.0 | GHSA-4828-473v-37gh | 2022-07-13T15:41:23Z | 2022-07-02T00:00:19Z | null | ['CVE-2022-31943'] | Unrestricted Upload of File with Dangerous Type in MCMS | MCMS v5.2.8 was discovered to contain an arbitrary file upload vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'versions': ['5.2.8']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31943'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/95'}, {'type': 'PACKAGE', 'url': 'https://github.com/ming-soft/MCMS'}] | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T15:41:23Z', 'nvd_published_at': '2022-07-01T21:15:00Z'} |
1.4.0 | GHSA-96jv-vj39-x4j6 | 2023-06-27T20:58:57Z | 2022-07-13T00:00:41Z | null | ['CVE-2022-1025'] | Argo CD improper access control bug can allow malicious user to escalate privileges to admin level | # Impact
## Impacts for versions starting with v1.0.0
All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level.
To perform the following exploits, an authorized Argo CD user must have push... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'last_affected': '1.8.7'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixe... | [{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-2f5v-8r3f-8pww'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1025'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/af03b291d4b7e9d3ce9a6580ae9c8141af0e05cf'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-1220', 'CWE-284', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T22:29:13Z', 'nvd_published_at': '2022-07-12T21:15:00Z'} |
1.4.0 | GHSA-qm37-c4w6-h9v9 | 2022-12-12T20:19:02Z | 2022-07-01T00:01:08Z | null | ['CVE-2022-34811'] | Missing Authorization in Jenkins XPath Configuration Viewer Plugin | XPath Configuration Viewer Plugin 1.1.1 and earlier does not perform a permission check in an HTTP endpoint.
This allows attackers with Overall/Read permission to access the XPath Configuration Viewer page. Given appropriate XPath expressions, this page grants access to job configuration XML data to every user with It... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xpath-config-viewer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34811'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2002'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:18:02Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-jxqv-jcvh-7gr4 | 2023-08-30T18:11:47Z | 2022-07-30T00:00:41Z | null | ['CVE-2022-24912'] | Atlantis Events vulnerable to Timing Attack | The package github.com/runatlantis/atlantis/server/controllers/events before 0.19.7 is vulnerable to Timing Attack in the webhook event validator code, which does not use a constant-time comparison function to validate the webhook secret. It can allow an attacker to recover this secret as an attacker and then forge web... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/runatlantis/atlantis'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.19.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24912'}, {'type': 'WEB', 'url': 'https://github.com/runatlantis/atlantis/issues/2391'}, {'type': 'WEB', 'url': 'https://github.com/runatlantis/atlantis/pull/2392'}, {'type': 'WEB', 'url': 'https://github.com/runatlantis/atlantis/commit/48870911974a... | {'cwe_ids': ['CWE-203', 'CWE-208'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:21:43Z', 'nvd_published_at': '2022-07-29T10:15:00Z'} |
1.4.0 | GHSA-36j8-f33j-vjwq | 2022-12-09T16:45:25Z | 2022-07-01T00:01:08Z | null | ['CVE-2022-34816'] | Passwords stored in plain text by Jenkins hpe-network-virtualization plugin | hpe-network-virtualization Plugin 1.0 stores passwords unencrypted in its global configuration file `org.jenkinsci.plugins.nvemulation.plugin.NvEmulationBuilder.xml` on the Jenkins controller as part of its configuration.
These passwords can be viewed by users with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:hpe-network-virtualization'}, 'versions': ['1.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34816'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/hpe-network-virtualization-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2080'}] | {'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T16:45:25Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-fj2w-qmjp-3rjm | 2022-08-10T23:30:32Z | 2022-07-16T00:00:28Z | null | ['CVE-2020-35305'] | Gollum Cross-site Scripting vulnerability via filename parameter to New Page dialog | Cross site scripting (XSS) in gollum 5.0 to 5.1.2 via the filename parameter to the 'New Page' dialog. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'gollum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35305'}, {'type': 'WEB', 'url': 'https://github.com/gollum/gollum/commit/137728cdabc0f60859fcd30404ad2b8fff6ef715'}, {'type': 'WEB', 'url': 'https://github.com/Szarny/'}, {'type': 'WEB', 'url': 'https://github.com/gollum/'}, {'type': 'PACKAGE', 'ur... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T01:25:22Z', 'nvd_published_at': '2022-07-15T14:15:00Z'} |
1.4.0 | GHSA-qq85-8g89-r5rc | 2022-12-09T04:44:44Z | 2022-07-01T00:01:08Z | null | ['CVE-2022-34815'] | Cross-Site Request Forgery in Jenkins Request Rename Or Delete Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Request Rename Or Delete Plugin 1.1.0 and earlier allows attackers to accept pending requests, thereby renaming or deleting jobs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rrod'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34815'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rrod-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2657'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:14:36Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-5fhj-g3p3-pq9g | 2022-08-05T13:56:03Z | 2022-07-20T22:47:13Z | null | ['CVE-2022-31146'] | Wasmtime vulnerable to Use After Free with `externref`s | There is a bug in Wasmtime's code generator, Cranelift, where functions using reference types may be incorrectly missing metadata required for runtime garbage collection (GC). This means that if a GC happens at runtime then the collector will mistakenly think some Wasm stack frames do not have live references to garbag... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.37.0'}, {'fixed': '0.38.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'cranelift-codegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.84.0'}, {'fixed': '0.85.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-5fhj-g3p3-pq9g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31146'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/commit/2ba4bce5cc719e5a74e571a534424614e62ecc41'}, {'type'... | {'cwe_ids': ['CWE-416'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T22:47:13Z', 'nvd_published_at': '2022-07-21T04:15:00Z'} |
1.4.0 | GHSA-4hq8-jgr8-mw9j | 2022-08-05T15:54:03Z | 2022-07-18T00:00:33Z | null | ['CVE-2020-7641'] | grunt-util-property 0.0.2 function call can add/modify properties of Object.prototype using a __proto__ payload | This affects all versions of package grunt-util-property. The function call could be tricked into adding or modifying properties of `Object.prototype` using a `__proto__` payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'grunt-util-property'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-7641'}, {'type': 'PACKAGE', 'url': 'https://github.com/mikaelkaron/grunt-util-property'}, {'type': 'WEB', 'url': 'https://github.com/mikaelkaron/grunt-util-property/blob/master/main.js%23L41'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T21:37:35Z', 'nvd_published_at': '2022-07-17T09:15:00Z'} |
1.4.0 | GHSA-5jgj-h9wp-53fr | 2022-07-19T16:52:22Z | 2022-07-09T00:00:26Z | null | ['CVE-2022-32115'] | Known vulnerable to code execution via SVG file in v1.3.1 | An issue in the isSVG() function of Known v1.3.1 allows attackers to execute arbitrary code via a crafted SVG file.
The researcher report indicates that versions 1.3.1 and prior are vulnerable. Version 1.2.2 is the last version tagged on GitHub and in Packagist, and development related to the 1.3.x branch is currently... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'idno/known'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32115'}, {'type': 'WEB', 'url': 'https://github.com/idno/known/commit/80b716a8392fb71cfce84d03aaf7c045c62f6350'}, {'type': 'WEB', 'url': 'https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/'}, {'type': 'PACKAGE', ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:02:08Z', 'nvd_published_at': '2022-07-08T12:15:00Z'} |
1.4.0 | GHSA-2qh6-hhvv-m2ww | 2022-12-09T17:01:35Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36901'] | Jenkins HTTP Request Plugin stores HTTP Request passwords unencrypted | HTTP Request Plugin 1.15 and earlier stores HTTP Request passwords unencrypted in its global configuration file `jenkins.plugins.http_request.HttpRequest.xml` on the Jenkins controller as part of its configuration when using (deprecated) Basic/Digest Authentication. These passwords can be viewed by users with access to... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:http_request'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36901'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/http-request-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2053'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securit... | {'cwe_ids': ['CWE-256', 'CWE-668'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:30:41Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-wfvx-fx73-3rfj | 2022-08-06T09:35:55Z | 2022-07-26T00:01:05Z | null | ['CVE-2020-28455'] | markdown-it-toc Cross-site Scripting due to title of generated toc and contents of header not being escaped | This affects all versions of package markdown-it-toc. The title of the generated toc and the contents of the header are not escaped. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'markdown-it-toc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28455'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-MARKDOWNITTOC-1044067'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:35:55Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-5pg2-qg87-vmj7 | 2022-07-11T19:27:35Z | 2022-07-02T00:00:29Z | null | ['CVE-2022-2280'] | Cross-site Scripting in microweber | Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.19. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2280'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/9ebbb4dd35da74025ab6965f722829a7f8f86566'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:51:27Z', 'nvd_published_at': '2022-07-01T09:15:00Z'} |
1.4.0 | GHSA-p757-4v3p-j74f | 2022-07-22T16:32:57Z | 2022-07-09T00:00:26Z | null | ['CVE-2022-33011'] | Known vulnerable to account takeover via host header injection attack in v1.3.1 | Known v1.3.1 was discovered to allow attackers to perform an account takeover via a host header injection attack.
The researcher report indicates that versions 1.3.1 and prior are vulnerable. Version 1.2.2 is the last version tagged on GitHub and in Packagist, and development related to the 1.3.x branch is currently o... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'idno/known'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33011'}, {'type': 'WEB', 'url': 'https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/'}, {'type': 'PACKAGE', 'url': 'https://github.com/idno/known'}, {'type': 'WEB', 'url': 'https://github.com/idno/known/blob/dev/c... | {'cwe_ids': ['CWE-74'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:02:05Z', 'nvd_published_at': '2022-07-08T12:15:00Z'} |
1.4.0 | GHSA-m939-vrfp-9v8p | 2022-08-06T09:35:43Z | 2022-07-26T00:01:05Z | null | ['CVE-2020-28461'] | js-ini Prorotype Pollution when malicious INI files submitted to an application that parses it with `parse` | This affects the package js-ini before 1.3.0. If an attacker submits a malicious INI file to an application that parses it with `parse` , they will pollute the prototype on the application. This can be exploited further depending on the context. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'js-ini'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28461'}, {'type': 'WEB', 'url': 'https://github.com/Sdju/js-ini/commit/fa17efb7e3a7c9464508a254838d4c231784931e'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sdju/js-ini'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-JSINI-104... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:35:43Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-m485-79jq-cxx7 | 2022-12-13T14:14:53Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36916'] | CSRF vulnerability in Jenkins Google Cloud Backup Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Google Cloud Backup Plugin 0.6 and earlier does not perform a permission check in an HTTP endpoint.
Additionally, this HTTP endpoint does not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-cloud-backup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36916'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/google-cloud-backup-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2656'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:17:32Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-gq4p-4hxv-5rg9 | 2023-08-18T22:45:46Z | 2022-07-28T00:00:49Z | null | ['CVE-2022-34529'] | WASM3 segmentation fault | WASM3 v0.5.0 was discovered to contain a segmentation fault via the component `Compile_Memory_CopyFill`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pywasm3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'wasm3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34529'}, {'type': 'WEB', 'url': 'https://github.com/wasm3/wasm3/issues/337'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pywasm3/PYSEC-2022-43057.yaml'}] | {'cwe_ids': ['CWE-119', 'CWE-125'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-18T22:45:46Z', 'nvd_published_at': '2022-07-27T14:15:00Z'} |
1.4.0 | GHSA-qp72-96p2-g644 | 2022-07-21T21:36:55Z | 2022-07-12T00:00:58Z | null | ['CVE-2022-31558'] | Tooxie Shiva 0.10.0 allows absolute path traversal because Flask send_file function used unsafely | The tooxie/shiva-server repository through 0.10.0 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'shiva'}, 'ecosystem_specific': {'affected_functions': ['shiva.fileserver.get_absolute_path']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.10.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31558'}, {'type': 'WEB', 'url': 'https://github.com/tooxie/shiva-server/issues/189'}, {'type': 'PACKAGE', 'url': 'https://github.com/tooxie/shiva-server'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T21:36:55Z', 'nvd_published_at': '2022-07-11T01:15:00Z'} |
1.4.0 | GHSA-w257-f7qj-4vrq | 2022-12-09T00:18:16Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34790'] | Cross-site Scripting in Jenkins eXtreme Feedback Panel Plugin | Jenkins eXtreme Feedback Panel Plugin 2.0.1 and earlier does not escape the job names used in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xfpanel'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34790'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xfpanel-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-1939'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:21:02Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-wrcr-x4qj-j543 | 2022-07-19T21:05:39Z | 2022-07-11T21:05:32Z | null | ['CVE-2022-31079'] | KubeEdge Cloud Stream and Edge Stream DoS from large stream message | ### Impact
The Cloud Stream server and the Edge Stream server reads the entire message into memory without imposing a limit on the size of this message. An attacker can exploit this by sending a large message to exhaust memory and cause a DoS. The Cloud Stream server and the Edge Stream server are under DoS attack in t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed'... | [{'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/security/advisories/GHSA-wrcr-x4qj-j543'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31079'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubeedge/kubeedge'}] | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-11T21:05:32Z', 'nvd_published_at': '2022-07-11T21:15:00Z'} |
1.4.0 | GHSA-rwvf-c3wm-qm6w | 2022-08-06T09:37:25Z | 2022-07-26T00:01:06Z | null | ['CVE-2020-28435'] | ffmpeg-sdk vulnerable to OS Command Injection | A command injection vulnerability affects all versions of package ffmpeg-sdk. The injection point is located in line 9 in index.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ffmpeg-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28435'}, {'type': 'WEB', 'url': 'https://github.com/CubetLabs/ffmpeg-sdk/blob/master/index.js'}, {'type': 'WEB', 'url': 'https://github.com/shajanjp/ffmpeg-sdk/blob/master/index.js'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-FF... | {'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:37:25Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-f655-xhvm-cwp4 | 2022-12-09T20:18:23Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34777'] | Cross-site Scripting in Jenkins GitLab Plugin | Jenkins GitLab Plugin 1.5.34 and earlier does not escape multiple fields inserted into the description of webhook-triggered builds, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. GitLab Plugin 1.5.35 does not show user-provided fields in the build... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gitlab-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.35'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5.34'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34777'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/gitlab-plugin/commit/24e9a99d8151b5345109ef12cddc1ab323baa4ee'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/gitlab-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:24:25Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-hrgx-p36p-89q4 | 2022-07-29T22:27:27Z | 2022-07-29T22:27:27Z | null | ['CVE-2022-31181'] | PrestaShop eval injection possible if shop vulnerable to SQL injection | ### Impact
Eval injection possible if the shop is vulnerable to an SQL injection.
### Patches
The problem is fixed in version 1.7.8.7
### Workarounds
Delete the MySQL Smarty cache feature by removing these lines in the file `config/smarty.config.inc.php` lines 43-46 (PrestaShop 1.7) or 40-43 (PrestaShop 1.6):
```php
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'prestashop/prestashop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.6.0.10'}, {'fixed': '1.7.8.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/security/advisories/GHSA-hrgx-p36p-89q4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31181'}, {'type': 'WEB', 'url': 'https://github.com/PrestaShop/PrestaShop/commit/b6d96e7c2a4e35a44e96ffbcdfd34439b56af804'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-89', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T22:27:27Z', 'nvd_published_at': '2022-08-01T20:15:00Z'} |
1.4.0 | GHSA-pgq7-jcj5-xx6h | 2022-07-19T20:26:18Z | 2022-07-08T00:00:43Z | null | ['CVE-2022-28889'] | Apache Druid before 0.23.0 vulnerable to clickjacking | In Apache Druid 0.22.1 and earlier, the server did not set appropriate headers to prevent clickjacking. Druid 0.23.0 and later prevent clickjacking using the Content-Security-Policy header. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.druid:druid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28889'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/druid'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/t3nsq4crdr8wqgmj721d2wg6pf26s5cw'}] | {'cwe_ids': ['CWE-1021'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:21:13Z', 'nvd_published_at': '2022-07-07T19:15:00Z'} |
1.4.0 | GHSA-x3vm-38hw-55wf | 2022-07-05T18:29:31Z | 2022-07-05T18:29:31Z | null | ['CVE-2022-31108'] | Possible inject arbitrary `CSS` into the generated graph affecting the container HTML | An attacker is able to inject arbitrary `CSS` into the generated graph allowing them to change the styling of elements outside of the generated graph, and potentially exfiltrate sensitive information by using specially crafted `CSS` selectors.
The following example shows how an attacker can exfiltrate the contents of ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'mermaid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '9.1.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mermaid-js/mermaid/security/advisories/GHSA-x3vm-38hw-55wf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31108'}, {'type': 'WEB', 'url': 'https://github.com/mermaid-js/mermaid/commit/0ae1bdb61adff1cd485caff8c62ec6b8ac57b225'}, {'type': 'PACKAGE', '... | {'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T18:29:31Z', 'nvd_published_at': '2022-06-28T19:15:00Z'} |
1.4.0 | GHSA-h975-r69h-4w9p | 2022-07-15T20:46:57Z | 2022-07-07T00:00:28Z | null | ['CVE-2022-32533'] | Insufficient user input in Apache Jetspeed-2 | ** UNSUPPORTED WHEN ASSIGNED ** Apache Jetspeed-2 does not sufficiently filter untrusted user input by default leading to a number of issues including XSS, CSRF, XXE, and SSRF. Setting the configuration option "xss.filter.post = true" may mitigate these issues. NOTE: Apache Jetspeed is a dormant project of Apache Porta... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.portals.jetspeed-2:jetspeed-commons'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32533'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/d3g248pr03x8rvmh8p2t3xdlw0wn5dz2'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/07/06/1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur... | {'cwe_ids': ['CWE-352', 'CWE-611', 'CWE-79', 'CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T17:57:13Z', 'nvd_published_at': '2022-07-06T10:15:00Z'} |
1.4.0 | GHSA-ww2v-frv5-pj5x | 2022-08-10T23:56:27Z | 2022-07-26T00:00:28Z | null | ['CVE-2022-35131'] | Joplin is vulnerable to arbitrary code execution | Joplin v2.8.8 allows attackers to execute arbitrary commands via a crafted payload injected into the Node titles. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'joplin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35131'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/commit/e797ebb864fbf429a49b6d20e5779d0c9aa6c4d5'}, {'type': 'PACKAGE', 'url': 'https://github.com/laurent22/joplin'}, {'type': 'WEB', 'url': 'https://github.com/laurent22/joplin/r... | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T22:29:52Z', 'nvd_published_at': '2022-07-25T21:15:00Z'} |
1.4.0 | GHSA-hgp9-2c4w-x9mh | 2022-08-11T15:16:24Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36890'] | Jenkins Deployer Framework Plugin vulnerable to Path Traversal | Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier does not restrict the name of files in methods implementing form validation, allowing attackers with Item/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:deployer-framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '86.v7b_a_4a_55b_f3ec'}]}], 'database_specific': {'last_known_affected_version_range': '<= 85.v1d1888e8c021'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36890'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2206'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:16:24Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-6wvc-6pww-qr4r | 2022-07-11T21:06:28Z | 2022-07-11T21:06:28Z | null | ['CVE-2022-31080'] | DoS in KubeEdge's Websocket Client in package Viaduct | ### Impact
A large response received by the viaduct WSClient can cause a DoS from memory exhaustion. The entire body of the response is being read into memory which could allow an attacker to send a request that returns a response with a large body.
The consequence of the exhaustion is that the process which invokes a ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed'... | [{'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/security/advisories/GHSA-6wvc-6pww-qr4r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31080'}, {'type': 'PACKAGE', 'url': 'github.com/kubeedge/kubeedge'}] | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-11T21:06:28Z', 'nvd_published_at': '2022-07-11T21:15:00Z'} |
1.4.0 | GHSA-pgp9-x83g-v8x8 | 2022-12-09T04:55:42Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34802'] | Plaintext Storage of a Password in Jenkins RocketChat Notifier Plugin | Jenkins RocketChat Notifier Plugin 1.5.2 and earlier stores the login password and webhook token unencrypted in its global configuration file `RocketChatNotifier.xml` on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rocketchatnotifier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34802'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rocketchatnotifier-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2088'}] | {'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T21:24:56Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-p487-39h9-hm84 | 2022-07-20T01:29:19Z | 2022-07-08T00:00:43Z | null | ['CVE-2015-5298'] | Jenkins Google Login Plugin 1.0 and 1.1 allows anonymous users to authenticate through client-side request modification | The Google Login Plugin (versions 1.0 and 1.1) allows malicious anonymous users to authenticate successfully against Jenkins instances that are supposed to be locked down to a particular Google Apps domain through client-side request modification. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-login'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-5298'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/google-login-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2015-10-12/'}, {'type': 'WEB', 'url': 'http://exfiltrated.com/research-CVE-2015-5298.php'}] | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T01:29:19Z', 'nvd_published_at': '2022-07-07T19:15:00Z'} |
1.4.0 | GHSA-8v7h-cpc2-r8jp | 2022-07-21T15:56:46Z | 2022-07-13T21:42:45Z | null | ['CVE-2022-24800'] | October CMS upload process vulnerable to RCE via Race Condition | ### Impact
This advisory affects plugins that expose the `October\Rain\Database\Attach\File::fromData` as a public interface. This vulnerability does not affect vanilla installations of October CMS since this method is not exposed or used by the system internally or externally.
When the developer allows the user to s... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.476'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.12'}]}]}, {'... | [{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-8v7h-cpc2-r8jp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24800'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/library/commit/fe569f3babf3f593be2b1e0a4ae0283506127a83'}, {'type': 'PACKAGE', '... | {'cwe_ids': ['CWE-362'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T21:42:45Z', 'nvd_published_at': '2022-07-12T20:15:00Z'} |
1.4.0 | GHSA-2v6r-jf2g-j5q5 | 2022-12-12T18:26:28Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34786'] | Cross-site Scripting in Jenkins Rich Text Publisher Plugin | Jenkins Rich Text Publisher Plugin 1.4 and earlier does not escape the HTML message set by its post-build step, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure jobs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rich-text-publisher-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34786'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rich-text-publisher-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2332'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:24:49Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-wpqr-jcpx-745r | 2022-08-05T13:56:18Z | 2022-07-05T21:06:00Z | null | ['CVE-2022-31116'] | Incorrect handling of invalid surrogate pair characters | ### Impact
_What kind of vulnerability is it? Who is impacted?_
Anyone parsing JSON from an untrusted source is vulnerable.
JSON strings that contain escaped surrogate characters not part of a proper surrogate pair were decoded incorrectly. Besides corrupting strings, this allowed for potential key confusion and valu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ujson'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ultrajson/ultrajson/security/advisories/GHSA-wpqr-jcpx-745r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31116'}, {'type': 'WEB', 'url': 'https://github.com/ultrajson/ultrajson/commit/67ec07183342589d602e0fcf7bb1ff3e19272687'}, {'type': 'PACKAGE',... | {'cwe_ids': ['CWE-670'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T21:06:00Z', 'nvd_published_at': '2022-07-05T18:15:00Z'} |
1.4.0 | GHSA-mr38-g7q2-x79p | 2022-08-11T15:19:16Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36913'] | Jenkins Openstack Heat Plugin does not perform permission checks in methods implementing form validation | Jenkins Openstack Heat Plugin 1.5 and earlier does not perform permission checks in methods implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:openstack-heat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36913'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2105%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:19:16Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-wppp-xqfv-6cm7 | 2022-12-09T04:50:15Z | 2022-07-01T00:01:08Z | null | ['CVE-2022-34808'] | Token stored in plain text by Jenkins Cisco Spark Plugin | Cisco Spark Plugin 1.1.1 and earlier stores bearer tokens unencrypted in its global configuration file `org.jenkinsci.plugins.spark.SparkNotifier.xml` on the Jenkins controller as part of its configuration. These bearer tokens can be viewed by users with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cisco-spark'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34808'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cisco-spark-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2055'}] | {'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:18:41Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-xrf4-39fm-j5f2 | 2022-08-06T09:34:18Z | 2022-07-26T00:01:08Z | null | ['CVE-2022-2514'] | Fava time and filter parameters vulnerable to reflected XSS before v1.22 | The time and filter parameters in Fava prior to v1.22 are vulnerable to reflected cross-site scripting due to the lack of escaping of error messages which contained the parameters in verbatim. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'fava'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2514'}, {'type': 'WEB', 'url': 'https://github.com/beancount/fava/commit/ca9e3882c7b5fbf5273ba52340b9fea6a99f3711'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-xrf4-39fm-j5f2'}, {'type': 'WEB', 'url': 'https://github.com/pypa/a... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:34:18Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-5pgm-3j3g-2rc7 | 2022-07-19T22:31:41Z | 2022-07-12T22:15:29Z | null | ['CVE-2022-31140'] | Valinor error messages leading to potential data exfiltration before v0.12.0 | ```php
<?php
namespace My\App;
use CuyZ\Valinor\Mapper\MappingError;
use CuyZ\Valinor\Mapper\Tree\Node;
use CuyZ\Valinor\Mapper\Tree\NodeTraverser;
use CuyZ\Valinor\MapperBuilder;
require_once __DIR__ . '/Valinor/vendor/autoload.php';
final class Money
{
private function __construct(public readonly string $amou... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'cuyz/valinor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/CuyZ/Valinor/security/advisories/GHSA-5pgm-3j3g-2rc7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31140'}, {'type': 'PACKAGE', 'url': 'https://github.com/CuyZ/Valinor'}, {'type': 'WEB', 'url': 'https://github.com/CuyZ/Valinor/releases/tag/0.12.0'}... | {'cwe_ids': ['CWE-200', 'CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T22:15:29Z', 'nvd_published_at': '2022-07-11T20:15:00Z'} |
1.4.0 | GHSA-2463-7265-h8r4 | 2022-12-09T14:28:53Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34788'] | Jenkins Matrix Reloaded Plugin vulnerable to Stored XSS | Jenkins Matrix Reloaded Plugin 1.1.3 and earlier does not escape the agent name in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Agent/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.praqma:matrix-reloaded'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34788'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/matrix-reloaded-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-1926'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T14:28:53Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-pgjx-7f9g-9463 | 2022-07-06T19:27:45Z | 2022-07-06T19:27:45Z | null | ['CVE-2022-31127'] | Improper handling of email input | ### Impact
An attacker can pass a compromised input to the e-mail [signin endpoint](https://next-auth.js.org/getting-started/rest-api#post-apiauthsigninprovider) that contains some malicious HTML, tricking the e-mail server to send it to the user, so they can perform a phishing attack. Eg.: `balazs@email.com, <a href=... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.29.8'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'next-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.9.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-pgjx-7f9g-9463'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31127'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/commit/ae834f1e08a4a9915665eecb9479c74c6b039c9c'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:27:45Z', 'nvd_published_at': '2022-07-06T18:15:00Z'} |
1.4.0 | GHSA-j896-j72w-cr32 | 2022-08-11T15:15:31Z | 2022-07-28T00:00:43Z | null | ['CVE-2022-36887'] | Jenkins Job Configuration History Plugin does not require POST requests for several HTTP endpoints | A cross-site request forgery (CSRF) vulnerability in Jenkins Job Configuration History Plugin 1155.v28a_46a_cc06a_5 and earlier allows attackers to delete entries from job, agent, and system configuration history, or restore older versions of job, agent, and system configurations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:jobConfigHistory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1156.v536a_97b_8d649'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1155.v28a'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36887'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2766'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:15:31Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-6w2f-6wq3-rjvf | 2022-07-29T17:55:51Z | 2022-07-14T00:00:16Z | null | ['CVE-2022-32065'] | RuoYi 4.7.3 vulnerable to arbitrary file upload in background management module | An arbitrary file upload vulnerability in the background management module of RuoYi v4.7.3 and below allows attackers to execute arbitrary code via a crafted HTML file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.ruoyi:ruoyi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.7.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32065'}, {'type': 'WEB', 'url': 'https://github.com/yangzongzhuan/RuoYi/issues/118'}, {'type': 'WEB', 'url': 'https://github.com/yangzongzhuan/RuoYi/commit/d8b2a9a905fb750fa60e2400238cf4750a77c5e6'}, {'type': 'WEB', 'url': 'https://gitee.com/y_proj... | {'cwe_ids': ['CWE-434', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:14:24Z', 'nvd_published_at': '2022-07-13T15:15:00Z'} |
1.4.0 | GHSA-8274-h5jp-97vr | 2022-08-10T23:52:25Z | 2022-07-27T22:05:18Z | null | ['CVE-2022-31109'] | Diactoros before 2.11.1 vulnerable to HTTP Host Header Attack | ### Impact
Applications that use Diactoros, and are either not behind a proxy, or can be accessed via untrusted proxies, can potentially have the host, protocol, and/or port of a `Laminas\Diactoros\Uri` instance associated with the incoming server request modified to reflect values from `X-Forwarded-*` headers. Such c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'laminas/laminas-diactoros'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.11.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/laminas/laminas-diactoros/security/advisories/GHSA-8274-h5jp-97vr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31109'}, {'type': 'WEB', 'url': 'https://github.com/laminas/laminas-diactoros/commit/25b11d422c2e5dad868f68619888763b30f91e2d'}, {'type'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T22:05:18Z', 'nvd_published_at': '2022-08-01T17:15:00Z'} |
1.4.0 | GHSA-5mxg-p5qh-2gch | 2022-07-12T20:36:23Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34796'] | Insufficiently Protected Credentials in Jenkins Deployment Dashboard Plugin | A missing permission check in Jenkins Deployment Dashboard Plugin 1.0.10 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ec2-deployment-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34796'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ec2-deployment-dashboard'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2798%20(1)'}] | {'cwe_ids': ['CWE-522', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T20:36:23Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-fjpq-f574-jc45 | 2022-08-10T18:32:37Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36904'] | Jenkins Repository Connector Plugin does not perform a permission check in a method implementing form validation | Jenkins Repository Connector Plugin 2.2.0 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:repository-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36904'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2665%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:32:37Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-jxvf-m3x5-mxwq | 2022-08-10T23:53:55Z | 2022-07-19T14:28:59Z | null | ['CVE-2020-28471'] | Properties-Reader before v2.2.0 vulnerable to prototype pollution | Properties-Reader prior to version 2.2.0 is vulnerable to prototype pollution. Version 2.2.0 contains a patch for this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'properties-reader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28471'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/properties/issues/40'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/properties/commit/0877cc871db9865f58dd9389ce99e61be05380a5'}, {'type': 'WEB', 'url': 'https://github.com/steveu... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-19T14:28:59Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-xv59-gc3r-rf92 | 2022-07-15T20:44:19Z | 2022-07-06T00:00:30Z | null | ['CVE-2022-2306'] | Insufficient Session Expiration in Nakama | Old session tokens can be used to authenticate to the application and send authenticated requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/heroiclabs/nakama'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.12.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2306'}, {'type': 'WEB', 'url': 'https://github.com/heroiclabs/nakama/commit/ce8d3921e2acd44ef8b5e6edfe595b6df067b166'}, {'type': 'PACKAGE', 'url': 'https://github.com/heroiclabs/nakama/v3'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/35acf2... | {'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:58:37Z', 'nvd_published_at': '2022-07-05T09:15:00Z'} |
1.4.0 | GHSA-5689-v88g-g6rv | 2023-07-10T21:31:51Z | 2022-07-15T00:00:18Z | null | ['CVE-2022-32213'] | llhttp allows HTTP Request Smuggling via Flawed Parsing of Transfer-Encoding | The llhttp parser in the http module in Node.js v17.x does not correctly parse and validate Transfer-Encoding headers and can lead to HTTP Request Smuggling (HRS).
Impacts:
- All versions of the nodejs 18.x, 16.x, and 14.x releases lines.
- llhttp v6.0.7 and llhttp v2.1.5 contains the fixes that were updated inside N... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'llhttp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32213'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/llhttp/commit/18a4afc7ffb4e49dc9e2daebc50588199a6d1dbb'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1524555'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcer... | {'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-10T21:31:51Z', 'nvd_published_at': '2022-07-14T15:15:00Z'} |
1.4.0 | GHSA-78fg-pvgg-6g3r | 2022-12-13T13:54:23Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36909'] | Missing permission check in Jenkins OpenShift Deployer Plugin | OpenShift Deployer Plugin 1.2.0 and earlier does not perform permission checks in methods implementing form validation.
This allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system and to upload a SSH key file from the Jenkins co... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:openshift-deployer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36909'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/openshift-deployer-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-1375%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T22:41:55Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-m8w5-vwq3-gp8f | 2022-08-11T14:36:39Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36910'] | Lucene-Search Plugin does not perform permission checks in several HTTP endpoints | Jenkins Lucene-Search Plugin 370.v62a5f618cd3a and earlier does not perform a permission check in several HTTP endpoints, allowing attackers with Overall/Read permission to reindex the database and to obtain information about jobs otherwise inaccessible to them. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:lucene-search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '370.v62a5f618cd3a'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36910'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2048'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T14:36:39Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-449w-c77c-vmf6 | 2022-12-09T20:56:53Z | 2022-07-28T00:00:43Z | null | ['CVE-2022-36884'] | Lack of authentication mechanism in Jenkins Git Plugin webhook | Git Plugin provides a webhook endpoint at `/git/notifyCommit` that can be used to notify Jenkins of changes to an SCM repository. For its most basic functionality, this endpoint receives a repository URL, and Jenkins will schedule polling for all jobs configured with the specified repository. In Git Plugin 4.11.3 and e... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.11.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36884'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284'}, {'type': 'PACKAGE', 'url': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202... | {'cwe_ids': ['CWE-200', 'CWE-306'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:28:37Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-f2gr-7299-487h | 2022-07-06T20:06:56Z | 2022-07-06T20:06:56Z | null | [] | DOS and excessive memory usage when passing untrusted user input to to dag import | ### Impact
go-ipfs nodes crash when trying to import certain malformed CAR files due to an issue in the go-car dependency. This impacts nodes running `ipfs dag import` on untrusted user inputs, for example, pinning services with a car ingest endpoint.
This include the corresponding [HTTP RPC API `v0/dag/import`](https:... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ipfs/go-ipfs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.13.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ipfs/go-ipfs/security/advisories/GHSA-f2gr-7299-487h'}, {'type': 'PACKAGE', 'url': 'https://github.com/ipfs/go-ipfs'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:06:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-95f9-94vc-665h | 2023-08-28T23:44:10Z | 2022-07-06T00:00:28Z | null | ['CVE-2022-31836'] | Path Traversal in Beego | The `leafInfo.match()` function in Beego v2.0.3 and below uses `path.join()` to deal with wildcardvalues which can lead to cross directory risk. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/beego/beego/v2'}, 'ecosystem_specific': {'affected_functi... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31836'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/issues/4961'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/pull/5025'}, {'type': 'WEB', 'url': 'https://github.com/beego/beego/pull/5025/commits/ea5ae58d40589d249cf577a053e4... | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:01:19Z', 'nvd_published_at': '2022-07-05T15:15:00Z'} |
1.4.0 | GHSA-w52j-3457-q9wr | 2022-07-19T22:29:12Z | 2022-07-11T21:01:31Z | null | ['CVE-2022-31074'] | KubeEdge Cloud AdmissionController component DoS | ### Impact
Several endpoints including `/devicemodels`, `/rules`, `/ruleendpoints`, `/offlinemigration` in the Cloud Admissioncontroller may be susceptible to a DoS attack if an HTTP request containing a very large Body is sent to it.
Only an authenticated user can cause this issue. It will be affected when users deplo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed'... | [{'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/security/advisories/GHSA-w52j-3457-q9wr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31074'}, {'type': 'PACKAGE', 'url': 'github.com/kubeedge/kubeedge'}] | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-11T21:01:31Z', 'nvd_published_at': '2022-07-11T20:15:00Z'} |
1.4.0 | GHSA-fjh6-p566-wr6q | 2022-07-21T22:35:12Z | 2022-07-21T22:35:12Z | null | [] | skylot jadx affected by Incorrect Behavior Order in vulnerable dependency | ### Impact
Vulnerable library protobuf-java 3.11.4 (CVE-2021-22569)
### Patches
Dependency updated in jadx 1.4.3
### References
According to the AquaSecurity report:

Also, Maven re... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'io.github.skylot:jadx-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.2'}}] | [{'type': 'WEB', 'url': 'https://github.com/skylot/jadx/security/advisories/GHSA-fjh6-p566-wr6q'}, {'type': 'PACKAGE', 'url': 'https://github.com/skylot/jadx'}, {'type': 'WEB', 'url': 'https://github.com/skylot/jadx/releases/tag/v1.4.3'}] | {'cwe_ids': ['CWE-696'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T22:35:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5m48-c37x-f792 | 2023-01-26T22:40:32Z | 2022-07-01T00:01:11Z | null | ['CVE-2013-4170'] | Ember.js Potential XSS Exploit When Binding `tagName` to User-Supplied Data | In general, Ember.js escapes or strips any user-supplied content before inserting it in strings that will be sent to innerHTML. However, the `tagName` property of an `Ember.View` was inserted into such a string without being sanitized. This means that if an application assigns a view's `tagName` to user-supplied data, ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'ember-source'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0.rc1.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0.rc1.0'}}, {'package': {'ecosystem': 'Ruby... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2013-4170'}, {'type': 'PACKAGE', 'url': 'https://github.com/emberjs/ember.js'}, {'type': 'WEB', 'url': 'https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ember-source/CVE-2013-4170.yml'}, {'type': 'WEB', 'url': 'https://groups.google.com/foru... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T21:27:47Z', 'nvd_published_at': '2022-06-30T13:15:00Z'} |
1.4.0 | GHSA-hqmp-vxj7-5wpq | 2022-12-12T18:28:32Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34791'] | Cross-site Scripting in Jenkins Validating Email Parameter Plugin | Jenkins Validating Email Parameter Plugin 1.10 and earlier does not escape the name and description of its parameter type.
Additionally, it disables the security hardening added in Jenkins 2.44 and LTS 2.32.2 as part of the [SECURITY-353 / CVE-2017-2601](https://www.jenkins.io/security/advisory/2017-02-01/#persisted-... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:validating-email-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34791'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/validating-email-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2165'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:20:00Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-7298-w54j-q7wm | 2022-12-09T04:57:07Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34801'] | Cleartext Storage of Sensitive Information in Jenkins Build Notifications Plugin | Jenkins Build Notifications Plugin 1.5.0 and earlier transmits tokens in plain text as part of the global Jenkins configuration form, potentially resulting in their exposure. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'tools.devnull:build-notifications'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34801'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/build-notifications-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2056'}] | {'cwe_ids': ['CWE-318'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T21:25:20Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-8xwj-2wgh-gprh | 2022-12-12T20:53:46Z | 2022-07-28T00:00:43Z | null | ['CVE-2022-36882'] | Lack of authentication mechanism in Jenkins Git Plugin webhook | Git Plugin provides a webhook endpoint at `/git/notifyCommit` that can be used to notify Jenkins of changes to an SCM repository. For its most basic functionality, this endpoint receives a repository URL, and Jenkins will schedule polling for all jobs configured with the specified repository. In Git Plugin 4.11.3 and e... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.11.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36882'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T21:10:33Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-4wf5-vphf-c2xc | 2023-03-13T22:43:44Z | 2022-07-16T00:00:20Z | null | ['CVE-2022-25858'] | Terser insecure use of regular expressions leads to ReDoS | The package terser before 4.8.1, from 5.0.0 and before 5.14.2 are vulnerable to Regular Expression Denial of Service (ReDoS) due to insecure usage of regular expressions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'terser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'terser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.14.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25858'}, {'type': 'WEB', 'url': 'https://github.com/terser/terser/commit/a4da7349fdc92c05094f41d33d06d8cd4e90e76b'}, {'type': 'WEB', 'url': 'https://github.com/terser/terser/commit/d8cc5691be980d663c29cc4d5ce67e852d597012'}, {'type': 'PACKAGE', 'ur... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T01:21:59Z', 'nvd_published_at': '2022-07-15T20:15:00Z'} |
1.4.0 | GHSA-hm37-9xh2-q499 | 2022-07-06T19:24:12Z | 2022-07-06T19:24:12Z | null | ['CVE-2022-31124'] | Possible leak of key's raw field if declared length is incorrect | ### Impact
If a field of a key is shorter than it is declared to be, the parser raises an error with a message containing the raw field value. An attacker able to modify the declared length of a key's sensitive field can thus expose the raw value of that field.
### Patches
Upgrade to version 0.0.6, which no longer inc... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'openssh-key-parser'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/scottcwang/openssh_key_parser/security/advisories/GHSA-hm37-9xh2-q499'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31124'}, {'type': 'WEB', 'url': 'https://github.com/scottcwang/openssh_key_parser/pull/5'}, {'type': 'WEB', 'url': 'https://github.c... | {'cwe_ids': ['CWE-209'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:24:12Z', 'nvd_published_at': '2022-07-06T18:15:00Z'} |
1.4.0 | GHSA-pp3f-98qg-5g75 | 2022-07-21T15:22:31Z | 2022-07-13T00:00:41Z | null | ['CVE-2022-2385'] | aws-iam-authenticator allow-listed IAM identity may be able to modify their username, escalate privileges before v0.5.9 | A security issue was discovered in aws-iam-authenticator where an allow-listed IAM identity may be able to modify their username and escalate privileges. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'sigs.k8s.io/aws-iam-authenticator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2385'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes-sigs/aws-iam-authenticator/issues/472'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes-sigs/aws-iam-authenticator/pull/469'}, {'type': 'WEB', 'url': 'https://github.com/kubernete... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:09:47Z', 'nvd_published_at': '2022-07-12T19:15:00Z'} |
1.4.0 | GHSA-q6mp-562x-ggvv | 2022-07-13T18:51:43Z | 2022-07-05T00:00:54Z | null | ['CVE-2022-2300'] | Cross-site Scripting in microweber | Cross-site Scripting (XSS) - Stored in GitHub repository microweber/microweber prior to 1.2.19. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2300'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/70b46e231e7b2c113666745a0ab6de9a8b7ef08e'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:51:20Z', 'nvd_published_at': '2022-07-04T11:15:00Z'} |
1.4.0 | GHSA-rhf5-2378-3w3w | 2022-08-10T23:54:16Z | 2022-07-19T14:16:06Z | null | ['CVE-2020-28459'] | markdown-it-decorate vulnerable to cross-site scripting (XSS) | markdown-it-decorate adds attributes, IDs and classes to Markdown, and the most recent version 1.2.2 was published in 2017. All versions are currently vulnerable to cross-site scripting (XSS) and there is no fixed version at this time | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'markdown-it-decorate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28459'}, {'type': 'WEB', 'url': 'https://github.com/rstacruz/markdown-it-decorate/commit/a6b33ce79e9b8cddf6184c754713e6af65253909'}, {'type': 'PACKAGE', 'url': 'https://github.com/rstacruz/markdown-it-decorate'}, {'type': 'WEB', 'url': 'https://sec... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-19T14:16:06Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-c2pj-rr68-pw94 | 2022-08-10T23:47:27Z | 2022-07-23T00:00:15Z | null | ['CVE-2022-34112'] | Dataease before 1.11.2 access control issue allows attackers to arbitrarily uninstall plugin | An access control issue in the component /api/plugin/uninstall Dataease v1.11.1 allows attackers to arbitrarily uninstall the plugin, a right normally reserved for the administrator. Version 1.11.2 contains a patch for this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.dataease:dataease-plugin-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34112'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/issues/2429'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/commit/5f611d3e3934816e9ad34e3d21807978001e2c8b'}, {'type': 'PACKAGE', 'url': 'https://github.com/data... | {'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T22:10:40Z', 'nvd_published_at': '2022-07-22T23:15:00Z'} |
1.4.0 | GHSA-6954-h5c8-m29f | 2022-08-11T15:54:42Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36922'] | Jenkins Lucene-Search Plugin vulnerable to reflected (XSS) cross-site scripting | Jenkins Lucene-Search Plugin 370.v62a5f618cd3a and earlier does not escape the search query parameter displayed on the 'search' result page, resulting in a reflected cross-site scripting (XSS) vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:lucene-search'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '370.v62a5f618cd3a'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36922'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2812'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:54:42Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-q72p-4w56-hx7h | 2023-07-11T00:16:48Z | 2022-07-22T00:00:37Z | null | ['CVE-2022-32430'] | Hardcoded JWT Token in Lin CMS Spring Boot | An access control issue in Lin CMS Spring Boot v0.2.1 allows attackers to access the backend information and functions within the application. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.github.talelin:lin-cms-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32430'}, {'type': 'PACKAGE', 'url': 'https://github.com/TaleLin/lin-cms-spring-boot'}, {'type': 'WEB', 'url': 'https://github.com/TaleLin/lin-cms-spring-boot/blob/3fc25bd8c10c73db2e7230809b322127eac554e3/src/main/resources/application.yml#L43'}, {'... | {'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-07-11T00:16:48Z', 'nvd_published_at': '2022-07-21T16:15:00Z'} |
1.4.0 | GHSA-5x3f-7m52-9cgf | 2022-12-13T14:22:59Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36920'] | Jenkins Coverity Plugin vulnerable to cross-site request forgery (CSRF) | A cross-site request forgery (CSRF) vulnerability in Jenkins Coverity Plugin 1.11.4 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:coverity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36920'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/coverity-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2790%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:22:18Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-wv8q-r932-8hc7 | 2023-09-07T00:13:26Z | 2022-07-13T00:00:41Z | null | ['CVE-2022-25875'] | Svelte vulnerable to XSS when using objects during server-side rendering | The package svelte before 3.49.0 is vulnerable to Cross-site Scripting (XSS) due to improper input sanitization and to improper escape of attributes when using objects during SSR (Server-Side Rendering). Exploiting this vulnerability is possible via objects with a custom toString() function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'svelte'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.49.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25875'}, {'type': 'WEB', 'url': 'https://github.com/sveltejs/svelte/pull/7530#23issuecomment-1158575990'}, {'type': 'WEB', 'url': 'https://github.com/sveltejs/svelte/commit/f8605d6acbf66976da9b4547f76e90e163899907'}, {'type': 'PACKAGE', 'url': 'htt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T16:22:17Z', 'nvd_published_at': '2022-07-12T19:15:00Z'} |
1.4.0 | GHSA-cqhr-jqvc-qw9p | 2022-07-20T01:36:35Z | 2022-07-20T01:36:35Z | null | ['CVE-2016-1000273'] | Java Melody vulnerable to cross-site scripting | JavaMelody is a monitoring tool for JavaEE applications. Versions prior to 1.61.0 are vulnerable to a cross-site scripting (XSS) attack. This issue was patched in version 1.61.0, and users are recommended to upgrade to the latest version. There are no known workarounds. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.bull.javamelody:javamelody-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.61.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/javamelody/javamelody/commit/e0497c1980acebd257d3da78dfde29ae9bdffdf6'}, {'type': 'PACKAGE', 'url': 'https://github.com/javamelody/javamelody'}, {'type': 'WEB', 'url': 'https://github.com/javamelody/javamelody/wiki/ReleaseNotes#1620'}] | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T01:36:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2348-ccqj-8p27 | 2022-12-09T14:31:53Z | 2022-07-01T00:01:08Z | null | ['CVE-2022-34810'] | Jenkins RQM Plugin allows enumerating credentials IDs due to missing permission check | Jenkins RQM Plugin 2.8 and earlier does not perform a permission check in an HTTP endpoint. This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.praqma:rqm-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34810'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rqm-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2806'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T14:31:53Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-qh9x-gcfh-pcrw | 2022-08-10T23:52:57Z | 2022-07-21T22:33:01Z | null | ['CVE-2022-31170'] | OpenZeppelin Contracts's ERC165Checker may revert instead of returning false | ### Impact
`ERC165Checker.supportsInterface` is designed to always successfully return a boolean, and under no circumstance revert. However, an incorrect assumption about Solidity 0.8's `abi.decode` allows some cases to revert, given a target contract that doesn't implement EIP-165 as expected, specifically if it retu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.7.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed... | [{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-qh9x-gcfh-pcrw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31170'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3552'}, {'type': 'PACKAGE', 'url'... | {'cwe_ids': ['CWE-20', 'CWE-252'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T22:33:01Z', 'nvd_published_at': '2022-07-22T04:15:00Z'} |
1.4.0 | GHSA-6xhf-xx3j-75f5 | 2022-12-12T18:25:38Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34782'] | Incorrect Authorization in Jenkins requests-plugin | An incorrect permission check in Jenkins requests-plugin Plugin 2.2.16 and earlier allows attackers with Overall/Read permission to view the list of pending requests. requests-plugin Plugin 2.2.17 requires Overall/Administer permission to view the list of pending requests.
This is basically the same vulnerability as [... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:requests'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.17'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.2.16'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34782'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/requests-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2650'}] | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:29:26Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-273c-fjw8-v2w8 | 2022-07-12T21:24:32Z | 2022-07-01T00:01:08Z | null | ['CVE-2022-34803'] | Plaintext Storage of a Password in Jenkins OpsGenie Plugin | Jenkins OpsGenie Plugin 1.9 and earlier stores API keys unencrypted in its global configuration file and in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission (config.xml), or access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:opsgenie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34803'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/opsgenie-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-1877'}] | {'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T21:24:32Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-8rq8-f485-7v8x | 2023-09-05T09:35:04Z | 2022-07-09T00:00:19Z | null | ['CVE-2022-35411'] | rpc.py vulnerable to Deserialization of Untrusted Data | rpc.py through 0.6.0 allows Remote Code Execution because an unpickle occurs when the "serializer: pickle" HTTP header is sent. In other words, although JSON (not Pickle) is the default data format, an unauthenticated client can cause the data to be processed with unpickle.
[Per the maintainer](https://github.com/aber... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rpc.py'}, 'ecosystem_specific': {'affected_functions': ['rpcpy.serializers.SERIALIZER_NAMES', 'rpcpy.serializers.SERIALIZER_TYPES']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.2'}, {'last_affected': '0.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35411'}, {'type': 'WEB', 'url': 'https://github.com/abersheeran/rpc.py/issues/22'}, {'type': 'WEB', 'url': 'https://github.com/abersheeran/rpc.py/commit/491e7a841ed9a754796d6ab047a9fb16e23bf8bd'}, {'type': 'PACKAGE', 'url': 'https://github.com/aber... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T17:55:02Z', 'nvd_published_at': '2022-07-08T19:15:00Z'} |
1.4.0 | GHSA-7ggc-5r84-xf54 | 2022-07-21T22:35:35Z | 2022-07-15T00:00:16Z | null | ['CVE-2022-2401'] | Mattermost users could access some sensitive information via API call | Unrestricted information disclosure of all users in Mattermost version 6.7.0 and earlier allows team members to access some sensitive information by directly accessing the APIs. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.3.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2401'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost-server'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}] | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T22:35:35Z', 'nvd_published_at': '2022-07-14T18:15:00Z'} |
1.4.0 | GHSA-8r94-4h3c-939f | 2022-07-15T20:44:32Z | 2022-07-06T00:00:26Z | null | ['CVE-2022-2321'] | Improper Restriction of Excessive Authentication Attempts | Nakama Console does not enforce any limit for the number of unsuccessful login attempts. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/heroiclabs/nakama/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.12.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2321'}, {'type': 'WEB', 'url': 'https://github.com/heroiclabs/nakama/pull/878'}, {'type': 'WEB', 'url': 'https://github.com/heroiclabs/nakama/commit/e2e02fce80ff33ce45f8a6ebc0b7a99ee0b03824'}, {'type': 'PACKAGE', 'url': 'https://github.com/heroicla... | {'cwe_ids': ['CWE-307'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:58:27Z', 'nvd_published_at': '2022-07-05T19:15:00Z'} |
1.4.0 | GHSA-j5qq-6rpm-qjgh | 2022-12-09T20:54:31Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36889'] | Jenkins Deployer Framework Plugin does not restrict application path of applications when configuring a deployment | Jenkins Deployer Framework Plugin 85.v1d1888e8c021 and earlier does not restrict the application path of the applications when configuring a deployment, allowing attackers with Item/Configure permission to upload arbitrary files from the Jenkins controller file system to the selected service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:deployer-framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '86.v7b_a_4a_55b_f3ec'}]}], 'database_specific': {'last_known_affected_version_range': '<= 85.v1d1888e8c021'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36889'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/deployer-framework-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2764'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-s... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T21:16:12Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-6f85-3f8q-qc94 | 2022-07-15T19:25:06Z | 2022-07-15T19:25:06Z | null | [] | OroCommerce vulnerable to XSS when adding class name to Selector Manager on pages that use GrapeJS editor | # Impact
Due to insufficient class name validation in GrapeJS library it's possible to add executable JS code in class name through Selector Manager
# Relates to
- [https://github.com/artf/grapesjs/issues/4411](https://github.com/artf/grapesjs/issues/4411)
# Patch
Update GrapeJS dependency to >=[v0.19.5](https://git... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'oro/commerce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '5.0.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/oroinc/orocommerce/security/advisories/GHSA-6f85-3f8q-qc94'}, {'type': 'WEB', 'url': 'https://github.com/artf/grapesjs/issues/4411'}, {'type': 'PACKAGE', 'url': 'https://github.com/oroinc/orocommerce'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T19:25:06Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4x9r-j582-cgr8 | 2023-08-31T00:22:26Z | 2022-07-19T00:00:29Z | null | ['CVE-2022-33891'] | Apache Spark UI can allow impersonation if ACLs enabled | The Apache Spark UI offers the possibility to enable ACLs via the configuration option `spark.acls.enable`. With an authentication filter, this checks whether a user has access permissions to view or modify the application. If ACLs are enabled, a code path in HttpSecurityFilter can allow someone to perform impersonatio... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-parent_2.12'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.spark:spark-parent_2.12'}, 'ecosy... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33891'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/spark'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pyspark/PYSEC-2022-236.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/p847l3k... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T21:40:46Z', 'nvd_published_at': '2022-07-18T07:15:00Z'} |
1.4.0 | GHSA-227g-7cvv-6ff3 | 2022-07-22T16:31:43Z | 2022-07-14T00:00:23Z | null | ['CVE-2022-31781'] | Apache Tapestry 5.8.1 vulnerable to ReDoS via Content Types causing catastrophic backtracking | Apache Tapestry up to version 5.8.1 is vulnerable to Regular Expression Denial of Service (ReDoS) in the way it handles Content Types. Specially crafted Content Types may cause catastrophic backtracking, taking exponential time to complete. Specifically, this is about the regular expression used on the parameter of the... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31781'}, {'type': 'WEB', 'url': 'https://github.com/apache/tapestry-5/commit/3c8d6103832eec3bc06029dd2532f06df717431f'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/07/12/3'}] | {'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:33:51Z', 'nvd_published_at': '2022-07-13T08:15:00Z'} |
1.4.0 | GHSA-w7f5-jrpr-5c2m | 2022-08-06T09:24:30Z | 2022-07-29T00:00:44Z | null | ['CVE-2022-36364'] | Apache Calcite Avatica JDBC driver arbitrary code execution | Apache Calcite Avatica JDBC driver creates HTTP client instances based on class names provided via `httpclient_impl` connection property; however, the driver does not verify if the class implements the expected interface before instantiating it, which can lead to code execution loaded via arbitrary classes and in rare ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.calcite.avatica:avatica-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36364'}, {'type': 'WEB', 'url': 'https://github.com/apache/calcite-avatica/commit/0c097b6a685fc1f97f151505a219976f15ed0c4c'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/calcite-avatica'}, {'type': 'WEB', 'url': 'https://lists.apache.org/... | {'cwe_ids': ['CWE-665'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:24:30Z', 'nvd_published_at': '2022-07-28T09:15:00Z'} |
1.4.0 | GHSA-8mpp-f3f7-xc28 | 2022-08-11T21:31:50Z | 2022-07-07T20:55:37Z | null | ['CVE-2022-2191'] | Jetty SslConnection does not release pooled ByteBuffers in case of errors | ### Impact
`SslConnection` does not release `ByteBuffer`s in case of error code paths.
For example, TLS handshakes that require client-auth with clients that send expired certificates will trigger a TLS handshake errors and the `ByteBuffer`s used to process the TLS handshake will be leaked.
### Workarounds
Configure e... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.0.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty:jetty-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'... | [{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-8mpp-f3f7-xc28'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2191'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/issues/8161'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclip... | {'cwe_ids': ['CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T20:55:37Z', 'nvd_published_at': '2022-07-07T21:15:00Z'} |
1.4.0 | GHSA-hpf7-mmqw-g6vq | 2022-12-09T04:27:56Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34783'] | Cross-site Scripting in Jenkins Plot Plugin | Jenkins Plot Plugin 2.1.10 and earlier does not escape plot descriptions, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:plot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34783'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/plot-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2220'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:25:50Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-qpqw-mc85-qvm9 | 2023-01-24T16:38:57Z | 2022-07-01T00:01:04Z | null | ['CVE-2014-0156'] | OS Command Injection in awesome spawn | Awesome spawn prior to version 1.2.0 contains OS command injection vulnerability, which allows execution of additional commands passed to Awesome spawn as arguments. If untrusted input was included in command arguments, attacker could use this flaw to execute arbitrary command. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'awesome_spawn'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-0156'}, {'type': 'WEB', 'url': 'https://github.com/ManageIQ/awesome_spawn/commit/e524f85f1c6e292ef7d117d7818521307ac269ff'}, {'type': 'PACKAGE', 'url': 'https://github.com/ManageIQ/awesome_spawn'}, {'type': 'WEB', 'url': 'https://rubysec.com/adviso... | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T20:25:02Z', 'nvd_published_at': '2022-06-30T21:15:00Z'} |
1.4.0 | GHSA-4g63-c64m-25w9 | 2022-07-21T22:33:37Z | 2022-07-21T22:33:37Z | null | ['CVE-2022-31172'] | OpenZeppelin Contracts's SignatureChecker may revert on invalid EIP-1271 signers | ### Impact
`SignatureChecker.isValidSignatureNow` is not expected to revert. However, an incorrect assumption about Solidity 0.8's `abi.decode` allows some cases to revert, given a target contract that doesn't implement EIP-1271 as expected.
The contracts that may be affected are those that use `SignatureChecker` to ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed': '4.7.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0'}, {'fixed... | [{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/security/advisories/GHSA-4g63-c64m-25w9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31172'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts/pull/3552'}] | {'cwe_ids': ['CWE-20', 'CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T22:33:37Z', 'nvd_published_at': '2022-07-22T04:15:00Z'} |
1.4.0 | GHSA-jj8j-6jq7-gmvh | 2022-08-11T15:51:47Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36914'] | Jenkins Files Found Trigger Plugin allows attackers to check for existence of attacker-specified file path on Jenkins controller file system | Jenkins Files Found Trigger Plugin 1.5 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:files-found-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36914'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2210'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:51:47Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.