schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-3cvr-822r-rqcc
2022-07-21T20:30:10Z
2022-07-21T20:30:10Z
null
['CVE-2022-31150']
undici before v5.8.0 vulnerable to CRLF injection in request headers
### Impact It is possible to inject CRLF sequences into request headers in Undici. ```js const undici = require('undici') const response = undici.request("http://127.0.0.1:1000", { headers: {'a': "\r\nb"} }) ``` The same applies to `path` and `method` ### Patches Update to v5.8.0 ### Workarounds Sanitize all ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'undici'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nodejs/undici/security/advisories/GHSA-3cvr-822r-rqcc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31150'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/undici/commit/a29a151d0140d095742d21a004023d024fe93259'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T20:30:10Z', 'nvd_published_at': '2022-07-19T21:15:00Z'}
1.4.0
GHSA-3fj7-78h2-w98x
2022-07-12T18:15:48Z
2022-07-01T00:01:08Z
null
['CVE-2022-34813']
Missing Authorization in Jenkins XPath Configuration Viewer Plugin
A missing permission check in Jenkins XPath Configuration Viewer Plugin 1.1.1 and earlier allows attackers with Overall/Read permission to create and delete XPath expressions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xpath-config-viewer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34813'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xpath-config-viewer-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2658'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:15:48Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-c58j-88f5-h53f
2022-07-05T22:08:20Z
2022-07-05T22:08:20Z
null
[]
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pycares
### Impact pycares versions < 4.2.0 are affected by [CVE-2021-3672](https://nvd.nist.gov/vuln/detail/CVE-2021-3672). ### Patches Update to version 4.2.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pycares'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/saghul/pycares/security/advisories/GHSA-c58j-88f5-h53f'}, {'type': 'PACKAGE', 'url': 'https://github.com/saghul/pycares'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:08:20Z', 'nvd_published_at': None}
1.4.0
GHSA-x2pc-fqrw-hc7f
2022-07-21T21:04:52Z
2022-07-12T00:00:57Z
null
['CVE-2022-31506']
SatyaLab opendiamond 10.1.1 vulnerable to path traversal because Flask send_file function used unsafely
The cmusatyalab/opendiamond repository through 10.1.1 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. A patch is available on the `master` branch of the repository.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'opendiamond'}, 'ecosystem_specific': {'affected_functions': ['opendiamond.dataretriever.diamond_store._get_obj_absolute_path', 'opendiamond.dataretriever.diamond_store._get_index_absolute_path', 'opendiamond.dataretriever.mixer_store._get_obj_absolute_path', 'opendiamond.data...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31506'}, {'type': 'WEB', 'url': 'https://github.com/cmusatyalab/opendiamond/issues/52'}, {'type': 'WEB', 'url': 'https://github.com/github/securitylab/issues/669#issuecomment-1117265726'}, {'type': 'WEB', 'url': 'https://github.com/cmusatyalab/open...
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T21:04:52Z', 'nvd_published_at': '2022-07-11T01:15:00Z'}
1.4.0
GHSA-x7w4-vfrh-fc3h
2022-08-10T18:23:02Z
2022-07-28T00:00:42Z
null
['CVE-2022-36919']
Jenkins Coverity Plugin allows attackers with Overall/Read permission to enumerate credentials IDs
A missing permission check in Jenkins Coverity Plugin 1.11.4 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:coverity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36919'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2790%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:23:02Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-6296-mvgp-27hp
2022-07-08T17:53:33Z
2022-07-08T00:00:42Z
null
['CVE-2021-41042']
XML External Entity Reference in Eclipse Lyo
In Eclipse Lyo versions 1.0.0 to 4.1.0, a TransformerFactory is initialized with the defaults that do not restrict DTD loading when working with RDF/XML. This allows an attacker to cause an external DTD to be retrieved.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.lyo:lyo-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '5.0.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41042'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/lyo/commit/a8b15b7f49ca15e55f6699749c39705d21367c6e'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/lyo/'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/lyo/releases/tag/v5...
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T17:53:33Z', 'nvd_published_at': '2022-07-07T21:15:00Z'}
1.4.0
GHSA-768m-5w34-2xf5
2022-07-25T19:25:08Z
2022-07-15T20:55:46Z
null
['CVE-2022-31157']
LTI 1.3 Tool Library's function used to generate random nonces not sufficiently cryptographically complex before v5.0
### Impact The function used to generate random nonces was not sufficiently cryptographically complex. As a result values may be predictable and tokens may be forgable. ### Patches Users should upgrade to version 5.0 immediately ### Workarounds None.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'packbackbooks/lti-1-3-php-library'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/packbackbooks/lti-1-3-php-library/security/advisories/GHSA-768m-5w34-2xf5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31157'}, {'type': 'WEB', 'url': 'https://github.com/packbackbooks/lti-1-3-php-library/commit/de19e8a0b28cdc7750fa3ca98471eeed26b...
{'cwe_ids': ['CWE-327', 'CWE-330'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T20:55:46Z', 'nvd_published_at': '2022-07-15T18:15:00Z'}
1.4.0
GHSA-wc69-rhjr-hc9g
2022-09-14T19:29:44Z
2022-07-06T18:38:49Z
null
['CVE-2022-31129']
Moment.js vulnerable to Inefficient Regular Expression Complexity
### Impact * using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs * noticeable slowdown is observed with inputs above 10k characters * users who pass user-provided strings without sanity length checks to moment construct...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'moment'}, 'ecosystem_specific': {'affected_functions': ['moment']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.18.0'}, {'fixed': '2.29.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Moment.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced'...
[{'type': 'WEB', 'url': 'https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31129'}, {'type': 'WEB', 'url': 'https://github.com/moment/moment/pull/6015#issuecomment-1152961973'}, {'type': 'WEB', 'url': 'https://github.com/mo...
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T18:38:49Z', 'nvd_published_at': '2022-07-06T18:15:00Z'}
1.4.0
GHSA-x3px-2p95-f6jr
2022-07-19T22:28:49Z
2022-07-11T21:04:04Z
null
['CVE-2022-31075']
KubeEdge DoS when signing the CSR from EdgeCore
### Impact EdgeCore may be susceptible to a DoS attack on CloudHub if an attacker was to send a well-crafted HTTP request to `/edge.crt`. If an attacker can send a well-crafted HTTP request to CloudHub, and that request has a very large body, that request could crash the HTTP service through a memory exhaustion vector....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed'...
[{'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/security/advisories/GHSA-x3px-2p95-f6jr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31075'}, {'type': 'PACKAGE', 'url': 'github.com/kubeedge/kubeedge'}]
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-11T21:04:04Z', 'nvd_published_at': '2022-07-11T21:15:00Z'}
1.4.0
GHSA-w8gx-4r6w-3rx9
2022-08-10T21:20:53Z
2022-07-28T00:00:42Z
null
['CVE-2022-36892']
Jenkins rhnpush-plugin does not perform a permission check in a method implementing form validation
Jenkins rhnpush-plugin Plugin 0.5.1 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rhnpush-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.5.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36892'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2402'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T21:20:53Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-m6mg-jvjf-w44x
2022-08-04T21:25:33Z
2022-07-26T00:01:06Z
null
['CVE-2020-28441']
conf-cfg-ini Prototype Pollution via malicious INI file before v1.2.2
This affects the package conf-cfg-ini before 1.2.2. If an attacker submits a malicious INI file to an application that parses it with decode, they will pollute the prototype on the application. This can be exploited further depending on the context.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'conf-cfg-ini'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28441'}, {'type': 'WEB', 'url': 'https://github.com/loge5/conf-cfg-ini/commit/3a88a6c52c31eb6c0f033369eed40aa168a636ea'}, {'type': 'WEB', 'url': 'https://github.com/loge5/conf-cfg-ini/commit/ecd878f8f7398e765739e989c7fe7cc052308947'}, {'type': 'PAC...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-04T21:25:33Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-687h-86vc-5x59
2022-07-21T20:45:59Z
2022-07-12T00:00:58Z
null
['CVE-2022-31573']
ChainerRL Visualizer 0.1.1 vulnerable to Path Traversal via unsafe use of send_file function
The chainer/chainerrl-visualizer repository through 0.1.1 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'chainerrl-visualizer'}, 'ecosystem_specific': {'affected_functions': ['chainerrl_visualizer.web_server.create_app.get_image']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31573'}, {'type': 'WEB', 'url': 'https://github.com/github/securitylab/issues/669#issuecomment-1117265726'}, {'type': 'PACKAGE', 'url': 'https://github.com/chainer/chainerrl-visualizer'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T20:45:59Z', 'nvd_published_at': '2022-07-11T01:15:00Z'}
1.4.0
GHSA-hxf7-9rv9-88v6
2022-08-10T21:11:48Z
2022-07-28T00:00:42Z
null
['CVE-2022-36897']
Jenkins Compuware Xpediter Code Coverage Plugin Missing Authorization
A missing permission check in Jenkins Compuware Xpediter Code Coverage Plugin 1.0.7 and earlier allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-xpediter-code-coverage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36897'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2626'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T21:11:48Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-hv54-cc8f-42jq
2022-12-12T19:42:28Z
2022-07-01T00:01:07Z
null
['CVE-2022-34792']
Cross-Site Request Forgery in Jenkins Recipe Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Recipe Plugin 1.2 and earlier allows attackers to send an HTTP request to an attacker-specified URL and parse the response as XML.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:recipe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34792'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/recipe-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2000'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:20:17Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-v3p8-j597-3xg8
2022-07-22T16:28:26Z
2022-07-17T00:00:45Z
null
['CVE-2021-34538']
Apache Hive before 3.1.3 `CREATE` and `DROP` function operations do not check for necessary authorization.
Apache Hive before 3.1.3 `CREATE` and `DROP` function operations do not check for necessary authorization of involved entities in the query. It was found that an unauthorized user can manipulate an existing UDF without having the privileges to do so. This allowed unauthorized or underprivileged users to drop and recrea...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34538'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hive'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/oqqgnhz4c6nxsfd0xstosnk0g15f7354'}]
{'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T21:37:21Z', 'nvd_published_at': '2022-07-16T07:15:00Z'}
1.4.0
GHSA-72x4-cq6r-jp4p
2022-07-19T19:45:15Z
2022-07-08T17:06:39Z
null
['CVE-2022-31121']
Hyperledger Fabric vulnerable to Improper Input Validation in orderer/common/cluster consensus request
### Impact If a consensus client sends a malformed consensus request to an orderer it may crash the orderer node. This fix checks for the malformed consensus request and returns an error to the consensus client. ### Patches Fixed in v2.2.7 and v2.4.5. ### Workarounds None, users must upgrade to v2.2.7 or v2.4.5. ###...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hyperledger/fabric/orderer/common/cluster'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.7'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hyperledger/fabric/orderer/common/cluster'}, 'ranges': [{'type': 'ECOSYSTEM', 'ev...
[{'type': 'WEB', 'url': 'https://github.com/hyperledger/fabric/security/advisories/GHSA-72x4-cq6r-jp4p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31121'}, {'type': 'WEB', 'url': 'https://github.com/hyperledger/fabric/commit/0f18359493bcbd5f9f9d1a9b05adabfe5da23b06'}, {'type': 'PACKAGE', '...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T17:06:39Z', 'nvd_published_at': '2022-07-07T18:15:00Z'}
1.4.0
GHSA-6xf5-c3cx-67pv
2022-12-09T17:38:17Z
2022-07-28T00:00:42Z
null
['CVE-2022-36894']
Arbitrary file write vulnerability in Jenkins CLIF Performance Testing plugin
An arbitrary file write vulnerability in Jenkins CLIF Performance Testing Plugin 64.vc0d66de1dfb_f and earlier allows attackers with Overall/Read permission to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:clif-performance-testing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '64.vc0d66de1dfb'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36894'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/clif-performance-testing-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2413'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T21:11:21Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-56hc-wf49-2h96
2022-12-09T05:00:15Z
2022-07-01T00:01:07Z
null
['CVE-2022-34799']
Plaintext Storage of a Password in Jenkins Deployment Dashboard Plugin
Deployment Dashboard Plugin 1.0.10 and earlier stores a password unencrypted in its global configuration file `de.codecentric.jenkins.dashboard.DashboardView.xml` on the Jenkins controller as part of its configuration. This password can be viewed by users with access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ec2-deployment-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34799'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ec2-deployment-dashboard'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2070'}]
{'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-11T20:58:44Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-4vq7-8699-4xgc
2022-08-06T05:52:32Z
2022-07-29T00:00:17Z
null
['CVE-2022-34558']
WMAgent arbitrary code execution via a crafted dbs-client package
WMAgent v1.3.3rc2 and 1.3.3rc1, reqmgr2 1.4.1rc5 and 1.4.0rc2, reqmon 1.4.1rc5, and global-workqueue 1.4.1rc5 allows attackers to execute arbitrary code via a crafted dbs-client package.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'wmagent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.3rc1'}, {'fixed': '2.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.3rc2'}}, {'package': {'ecosystem': 'PyPI', 'name': 'reqmgr2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34558'}, {'type': 'WEB', 'url': 'https://github.com/dmwm/WMCore/issues/11188'}, {'type': 'PACKAGE', 'url': 'https://github.com/dmwm/WMCore'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:52:32Z', 'nvd_published_at': '2022-07-28T23:15:00Z'}
1.4.0
GHSA-vp68-fm96-7v79
2022-08-11T15:52:28Z
2022-07-28T00:00:42Z
null
['CVE-2022-36915']
Jenkins Android Signing Plugin allows attackers to check whether attacker-specified file patterns match workspace contents
Jenkins Android Signing Plugin 2.2.5 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:android-signing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36915'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2404'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:52:28Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-fj7c-vg2v-ccrm
2022-09-08T14:21:49Z
2022-07-15T21:07:20Z
null
['CVE-2021-3690']
Undertow vulnerable to memory exhaustion due to buffer leak
Buffer leak on incoming WebSocket PONG message(s) in Undertow before 2.0.40 and 2.2.10 can lead to memory exhaustion and allow a denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.40'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3690'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/commit/c7e84a0b7efced38506d7d1dfea5902366973877'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-3690'}, {'type': 'WEB', 'url': 'https://access.redhat...
{'cwe_ids': ['CWE-400', 'CWE-401'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T21:07:20Z', 'nvd_published_at': '2022-08-23T16:15:00Z'}
1.4.0
GHSA-cfcg-2qgr-v243
2022-07-27T22:11:04Z
2022-07-23T00:00:22Z
null
['CVE-2022-2470']
Microweber before 1.2.21 vulnerable to reflected XSS
Microweber prior to 1.2.21 is vulnerable to reflected cross-site scripting (XSS).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.21'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2470'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/d28655183800b833abb20ccd55e1628f16ff65e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T22:11:04Z', 'nvd_published_at': '2022-07-22T15:15:00Z'}
1.4.0
GHSA-6x93-h9g3-9phr
2022-08-06T09:35:03Z
2022-07-26T00:01:05Z
null
['CVE-2021-23451']
otp-generator before v3.0.0 insecurely generates random one-time passwords
The package otp-generator before 3.0.0 are vulnerable to Insecure Randomness due to insecure generation of random one-time passwords, which may allow a brute-force attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'otp-generator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23451'}, {'type': 'WEB', 'url': 'https://github.com/Maheshkumar-Kakade/otp-generator/issues/12'}, {'type': 'WEB', 'url': 'https://github.com/Maheshkumar-Kakade/otp-generator/commit/b27de1ce439ae7f533cec26677e9698671275b70'}, {'type': 'PACKAGE', 'ur...
{'cwe_ids': ['CWE-330'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:35:03Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-735f-pg76-fxc4
2023-06-13T19:52:47Z
2022-07-02T00:00:29Z
null
['CVE-2022-2274']
openssl-src heap memory corruption with RSA private key operation
The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.8'}, {'fixed': '300.0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2274'}, {'type': 'WEB', 'url': 'https://github.com/openssl/openssl/issues/18625'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=4d8a88c134df634ba610ff8db1eb8478ac5fd345'}, {'type': 'WEB', 'url': 'https://rust...
{'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:42:04Z', 'nvd_published_at': '2022-07-01T08:15:00Z'}
1.4.0
GHSA-mxcc-7h5m-x57r
2022-12-12T20:55:51Z
2022-07-28T00:00:43Z
null
['CVE-2022-36885']
Jenkins GitHub plugin 1.34.4 uses weak webhook signature function
Jenkins GitHub Plugin 1.34.4 and earlier uses a non-constant time comparison function when checking whether the provided and computed webhook signatures are equal, allowing attackers to use statistical methods to obtain a valid webhook signature. GitHub Plugin 1.34.5 uses a constant-time comparison when validating the ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.coravy.hudson.plugins.github:github'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.34.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.34.4'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36885'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/github-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/github-plugin/releases/tag/v1.34.5'}, {'type': 'WEB', 'url': 'https://plugins.jenkins.io/github-issues/'}, {'typ...
{'cwe_ids': ['CWE-208'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-08-24T20:44:20Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-wrxv-2j5q-m38w
2023-09-05T14:53:18Z
2022-07-06T00:00:30Z
null
['CVE-2022-2309']
lxml NULL Pointer Dereference allows attackers to cause a denial of service
NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the appl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'lxml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2309'}, {'type': 'WEB', 'url': 'https://github.com/lxml/lxml/commit/86368e9cf70a0ad23cccd5ee32de847149af0c6f'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wrxv-2j5q-m38w'}, {'type': 'PACKAGE', 'url': 'https://github.com/lxml/lx...
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:14:23Z', 'nvd_published_at': '2022-07-05T10:15:00Z'}
1.4.0
GHSA-3wx7-46ch-7rq2
2022-09-08T14:25:14Z
2022-07-06T19:57:19Z
null
['CVE-2022-2097']
AES OCB fails to encrypt some bytes
AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimized implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was pre-existing in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '111.22.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2097'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-311', 'CWE-326'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:57:19Z', 'nvd_published_at': '2022-07-05T11:15:00Z'}
1.4.0
GHSA-mxvc-fwgx-j778
2022-09-09T02:28:21Z
2022-07-15T15:37:39Z
null
['CVE-2022-25303']
Whoogle Search Cross-site Scripting via string parameter
The package whoogle-search before version 0.7.2 is vulnerable to Cross-site Scripting (XSS) via the query string parameter q. In the case where it does not contain the http string, it is used to build the error_message that is then rendered in the error.html template, using the [flask.render_template](https://flask.pal...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'whoogle-search'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25303'}, {'type': 'WEB', 'url': 'https://github.com/benbusby/whoogle-search/commit/abc30d7da3b5c67be7ce84d4699f327442d44606'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mxvc-fwgx-j778'}, {'type': 'PACKAGE', 'url': 'https://git...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T15:37:39Z', 'nvd_published_at': '2022-07-12T15:15:00Z'}
1.4.0
GHSA-v923-w3x8-wh69
2023-09-11T16:22:17Z
2022-07-02T00:00:19Z
null
['CVE-2022-25896']
Passport vulnerable to session regeneration when a users logs in or out
This affects the package passport before 0.6.0. When a user logs in or logs out, the session is regenerated instead of being closed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'passport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25896'}, {'type': 'WEB', 'url': 'https://github.com/jaredhanson/passport/pull/900'}, {'type': 'WEB', 'url': 'https://github.com/jaredhanson/passport/commit/7e9b9cf4d7be02428e963fc729496a45baeea608'}, {'type': 'PACKAGE', 'url': 'https://github.com/j...
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T21:09:15Z', 'nvd_published_at': '2022-07-01T20:15:00Z'}
1.4.0
GHSA-v42q-78w8-8fcc
2022-08-06T09:34:51Z
2022-07-26T00:01:05Z
null
['CVE-2021-23373']
set-deep-prop Prototype Pollution
All versions of package set-deep-prop are vulnerable to Prototype Pollution via the main functionality.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'set-deep-prop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23373'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SETDEEPPROP-1083231'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:34:51Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-977c-63xq-cgw3
2022-07-21T14:55:44Z
2022-07-05T20:41:26Z
null
['CVE-2022-31115']
opensearch-ruby 2.x before 2.0.2 vulnerable to unsafe YAML deserialization
### Impact A YAML deserialization in opensearch-ruby 2.0.0 can lead to unsafe deserialization using YAML.load if the response is of type YAML. ### Patches The problem has been patched in opensearch-ruby gem version 2.0.2. ### Workarounds No viable workaround. Please upgrade to 2.0.2 ### References https://github.co...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'opensearch-ruby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/opensearch-project/opensearch-ruby/security/advisories/GHSA-977c-63xq-cgw3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31115'}, {'type': 'WEB', 'url': 'https://github.com/opensearch-project/opensearch-ruby/pull/77'}, {'type': 'WEB', 'url': 'https...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T20:41:26Z', 'nvd_published_at': '2022-06-30T22:15:00Z'}
1.4.0
GHSA-6367-p3v8-7mgw
2022-08-06T05:20:37Z
2022-07-26T00:01:06Z
null
['CVE-2020-28436']
google-cloudstorage-commands Command Injection vulnerability
A command injection vulnerability affects all versions of the deprecated package google-cloudstorage-commands.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'google-cloudstorage-commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28436'}, {'type': 'PACKAGE', 'url': 'https://github.com/samradical/google-cloudstorage-commands'}, {'type': 'WEB', 'url': 'https://github.com/samradical/google-cloudstorage-commands/blob/master/index.js%23L11'}, {'type': 'WEB', 'url': 'https://secu...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:20:37Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-8rmv-98m4-g5c6
2022-07-19T20:27:57Z
2022-07-08T00:00:43Z
null
['CVE-2021-44791']
Apache Druid before 0.23.0 vulnerable to reflected XSS via unescaped URL parameters
In Apache Druid 0.22.1 and earlier, certain specially-crafted links result in unescaped URL parameters being sent back in HTML responses. This makes it possible to execute reflected XSS attacks. This issue is patched in version 0.23.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.druid:druid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44791'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/druid'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/lh2kcl4j45q7xj4w6rqf6kwf0mvyp2o6'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:21:04Z', 'nvd_published_at': '2022-07-07T19:15:00Z'}
1.4.0
GHSA-2cpx-6pqp-wf35
2022-08-11T17:05:49Z
2022-07-29T22:24:10Z
null
['CVE-2022-31183']
fs2-io skips mTLS client verification
### Impact When establishing a server-mode `TLSSocket` using `fs2-io` on Node.js, the parameter `requestCert = true` is ignored, peer certificate verification is skipped, and the connection proceeds. The vulnerability is limited to: 1. `fs2-io` running on Node.js. The JVM TLS implementation is completely independent....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'co.fs2:fs2-io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.2.11'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/typelevel/fs2/security/advisories/GHSA-2cpx-6pqp-wf35'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31183'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/node/issues/43994'}, {'type': 'WEB', 'url': 'https://github.com/typelevel/fs2/commit/19ce...
{'cwe_ids': ['CWE-295'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T22:24:10Z', 'nvd_published_at': '2022-08-01T20:15:00Z'}
1.4.0
GHSA-4v4p-87m3-5423
2022-07-20T01:32:06Z
2022-07-09T00:00:26Z
null
['CVE-2022-30852']
Known v1.3.1 contains Insecure Direct Object Reference
Known v1.3.1 was discovered to contain an Insecure Direct Object Reference (IDOR). The researcher report indicates that versions 1.3.1 and prior are vulnerable. Version 1.2.2 is the last version tagged on GitHub and in Packagist, and development related to the 1.3.x branch is currently on the `dev` branch of the idno/...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'idno/known'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30852'}, {'type': 'WEB', 'url': 'https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/'}, {'type': 'PACKAGE', 'url': 'https://github.com/idno/known'}, {'type': 'WEB', 'url': 'https://withknown.com/'}]
{'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T01:32:06Z', 'nvd_published_at': '2022-07-08T12:15:00Z'}
1.4.0
GHSA-hmvw-66jm-h9fh
2022-08-03T03:40:40Z
2022-07-23T00:00:15Z
null
['CVE-2022-34114']
SQL Injection found in Dataease
Dataease v1.11.1 was discovered to contain a SQL injection vulnerability via the parameter `dataSourceId`. Version 1.11.2 contains a fix.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.dataease:dataease-plugin-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34114'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/issues/2430'}, {'type': 'PACKAGE', 'url': 'https://github.com/dataease/dataease'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/releases/tag/v1.11.2'}]
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-03T03:40:40Z', 'nvd_published_at': '2022-07-22T23:15:00Z'}
1.4.0
GHSA-w868-4576-rv24
2022-08-03T03:30:47Z
2022-07-26T00:01:05Z
null
['CVE-2020-28446']
ntesseract vulnerable to Command Injection
The package ntesseract before 0.2.9 is vulnerable to Command Injection via lib/tesseract.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ntesseract'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28446'}, {'type': 'WEB', 'url': 'https://github.com/taoyuan/ntesseract/commit/fcbc36f381798b4362179c0cdf9961b437c7b619'}, {'type': 'PACKAGE', 'url': 'https://github.com/taoyuan/ntesseract'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNY...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-03T03:30:47Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-3hhc-qp5v-9p2j
2022-12-08T15:33:58Z
2022-07-12T19:39:47Z
null
['CVE-2022-32224']
Active Record RCE bug with Serialized Columns
When serialized columns that use YAML (the default) are deserialized, Rails uses YAML.unsafe_load to convert the YAML data in to Ruby objects. If an attacker can manipulate data in the database (via means like SQL injection), then it may be possible for the attacker to escalate to an RCE. There are no feasible workaro...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.3'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSY...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32224'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/611990f1a6c137c2d56b1ba06b27e5d2434dcd6a'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2022-32224-possible-rce-escalation-bug-with-serialized-columns-in-activ...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T19:39:47Z', 'nvd_published_at': '2022-12-05T22:15:00Z'}
1.4.0
GHSA-9xhm-6w5p-335v
2022-08-11T15:18:47Z
2022-07-28T00:00:42Z
null
['CVE-2022-36917']
Jenkins Google Cloud Backup Plugin allows attackers with Overall/Read permission to request a manual backup.
A missing permission check in Jenkins Google Cloud Backup Plugin 0.6 and earlier allows attackers with Overall/Read permission to request a manual backup.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-cloud-backup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36917'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2656'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:18:47Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-25q6-m425-9fqr
2023-07-07T19:02:06Z
2022-07-29T00:00:47Z
null
['CVE-2022-34140']
Feehi CMS Cross-site Scripting
A stored cross-site scripting (XSS) vulnerability in `/index.php?r=site%2Fsignup` of Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username field.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34140'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/61'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/168012/Feehi-CMS-2.1.1-Cross-Site-Scripting.html'}...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:24:41Z', 'nvd_published_at': '2022-07-28T00:15:00Z'}
1.4.0
GHSA-gmh3-x5w7-jg5m
2022-07-20T16:52:28Z
2022-07-10T00:00:47Z
null
['CVE-2022-2353']
Microweber before v1.2.20 vulnerable to cross-site scripting
Prior to Microweber v1.2.20, due to improper neutralization of input, an attacker can steal tokens to perform cross-site request forgery (CSRF), fetch contents from same-site and redirect a user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2353'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/79c6914bab8c9da07ac950fda17648d08c68b130'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7...
{'cwe_ids': ['CWE-352', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T21:28:45Z', 'nvd_published_at': '2022-07-09T09:15:00Z'}
1.4.0
GHSA-74wf-cwjg-9cf2
2022-08-06T09:36:49Z
2022-07-26T00:01:05Z
null
['CVE-2020-28447']
xopen is vulnerable to OS Command Injection in Exported Function xopen(filepath)
A command injection vulnerability affects all versions of package xopen. The injection point is located in line 14 in index.js in the exported function `xopen(filepath)`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'xopen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28447'}, {'type': 'PACKAGE', 'url': 'https://github.com/andrewimm/xopen'}, {'type': 'WEB', 'url': 'https://github.com/andrewimm/xopen/blob/master/index.js'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-XOPEN-1050981'}]
{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:36:49Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-mhxj-85r3-2x55
2022-08-16T15:42:27Z
2022-07-22T00:00:38Z
null
['CVE-2022-36313']
file-type vulnerable to Infinite Loop via malformed MKV file
An issue was discovered in the file-type package from 13.0.0 until 16.5.4 and 17.x before 17.1.3 for Node.js. A malformed MKV file could cause the file type detector to get caught in an infinite loop. This would make the application become unresponsive and could be used to cause a DoS attack when used on a web server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'file-type'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.0.0'}, {'fixed': '16.5.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'file-type'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '17.0.0'}, {'fixed': '17.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36313'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/file-type/commit/2c4d1200c99dffb7d515b9b9951ef43c22bf7e47'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/file-type/commit/8f981c32e2750d2516457e305e502ee2ad715759#diff-c85...
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-22T20:26:05Z', 'nvd_published_at': '2022-07-21T16:15:00Z'}
1.4.0
GHSA-748r-5r8q-273m
2023-09-05T20:16:04Z
2022-07-07T00:00:26Z
null
['CVE-2021-37839']
Apache Superset allows authenticated users to access metadata they have no permission to
Apache Superset up to 1.5.1 allowed for authenticated users to access metadata information related to datasets they have no permission on. This metadata included the dataset name, columns and metrics.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37839'}, {'type': 'WEB', 'url': 'https://github.com/apache/superset/commit/2bd89d1705347da5446902a3f65eb8d0a6353503'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/pwqyxxm...
{'cwe_ids': ['CWE-273'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T21:31:23Z', 'nvd_published_at': '2022-07-06T13:15:00Z'}
1.4.0
GHSA-w82x-xjjr-cjr5
2022-07-21T20:58:41Z
2022-07-08T00:00:42Z
null
['CVE-2022-32060']
Snipe-IT 6.0.2 vulnerable to Cross-site Scripting via arbitrary file upload in Update Branding Settings
An arbitrary file upload vulnerability in the Update Branding Settings component of Snipe-IT v6.0.2 allows attackers to execute arbitrary code via a crafted file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32060'}, {'type': 'WEB', 'url': 'https://github.com/bypazs/CVE-2022-32060'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://grimthereaperteam.medium.com/snipe-it-version-v6-0-2-file-upload-cross-sit...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T20:58:41Z', 'nvd_published_at': '2022-07-07T23:15:00Z'}
1.4.0
GHSA-76pg-mr9v-5vwc
2022-08-10T18:31:15Z
2022-07-28T00:00:42Z
null
['CVE-2022-36903']
Jenkins Repository Connector Plugin allows attackers with Overall/Read permission to enumerate credentials IDs
A missing permission check in Jenkins Repository Connector Plugin 2.2.0 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:repository-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36903'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2665%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:31:15Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-75fc-fv3p-xh82
2022-12-12T22:50:03Z
2022-07-28T00:00:42Z
null
['CVE-2022-36896']
Jenkins Compuware Source Code Download is missing authorization
BMC Compuware Source Code Download for Endevor, PDS, and ISPW Plugin 2.0.12 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins. Those c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-scm-downloader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.12'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36896'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/compuware-scm-downloader-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2621'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T21:13:10Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-xq3c-8gqm-v648
2022-07-29T22:22:27Z
2022-07-29T22:22:27Z
null
[]
async-graphql / async-graphql - @DOS GraphQL Nested Fragments overflow
### Impact Executing deeply nested queries may cause stack overflow. ### Patches Upgrade to `v4.0.6`
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'async-graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/async-graphql/async-graphql/security/advisories/GHSA-xq3c-8gqm-v648'}, {'type': 'WEB', 'url': 'https://github.com/async-graphql/async-graphql/commit/521769b80039fc8043d1c9883e3d6e5b57359072'}, {'type': 'PACKAGE', 'url': 'https://github.com/async-graphql/async-graphql'}, {'typ...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T22:22:27Z', 'nvd_published_at': None}
1.4.0
GHSA-2g86-r6w2-wqqr
2022-07-14T21:36:29Z
2022-07-06T00:00:30Z
null
['CVE-2021-43116']
Use of Hard-coded Credentials in Nacos
An Access Control vulnerability exists in Nacos 2.0.3 in the access prompt page; enter username and password, click on login to capture packets and then change the returned package, which lets a malicious user login.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba.nacos:nacos-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43116'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/issues/7127'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/issues/7182'}, {'type': 'PACKAGE', 'url': 'https://github.com/alibaba/nacos'}, {'type': 'WEB', 'url': 'http://...
{'cwe_ids': ['CWE-287', 'CWE-798'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:01:34Z', 'nvd_published_at': '2022-07-05T14:15:00Z'}
1.4.0
GHSA-pw4g-jcp5-63m9
2022-08-10T22:09:01Z
2022-07-28T00:00:42Z
null
['CVE-2022-36893']
Jenkins rpmsign-plugin before 0.5.1 does not perform a permission check in a method implementing form validation
Jenkins rpmsign-plugin Plugin 0.5.0 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rpmsign-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.5.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36893'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2403'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T22:09:01Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-q768-x9m6-m9qp
2022-07-21T20:31:05Z
2022-07-21T20:31:05Z
null
['CVE-2022-31151']
undici before v5.8.0 vulnerable to uncleared cookies on cross-host / cross-origin redirect
### Impact Authorization headers are already cleared on cross-origin redirect in https://github.com/nodejs/undici/blob/main/lib/handler/redirect.js#L189, based on https://github.com/nodejs/undici/issues/872. However, cookie headers which are sensitive headers and are official headers found in the spec, remain unclear...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'undici'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nodejs/undici/security/advisories/GHSA-q768-x9m6-m9qp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31151'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/undici/issues/872'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/undici/pull/1441'}...
{'cwe_ids': ['CWE-346', 'CWE-601', 'CWE-93'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T20:31:05Z', 'nvd_published_at': '2022-07-21T04:15:00Z'}
1.4.0
GHSA-6rh6-x8ww-9h97
2022-07-29T17:38:35Z
2022-07-21T21:38:28Z
null
['CVE-2022-35912']
Grails framework Remote Code Execution via Data Binding
### Impact A vulnerability has been discovered in the Grails data-binding logic which allows for Remote Code Execution in a Grails application. This exploit requires the application to be running on Java 8, either deployed as a WAR to a servlet container, or an executable JAR. ### Patches Grails framework versions 5...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.grails:grails-databinding'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.10'}, {'fixed': '3.3.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.grails:grails-databinding'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {...
[{'type': 'WEB', 'url': 'https://github.com/grails/grails-core/security/advisories/GHSA-6rh6-x8ww-9h97'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35912'}, {'type': 'WEB', 'url': 'https://github.com/grails/grails-core/issues/12626'}, {'type': 'PACKAGE', 'url': 'https://github.com/grails/gr...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T21:38:28Z', 'nvd_published_at': '2022-07-19T16:15:00Z'}
1.4.0
GHSA-wr4v-3f2h-6hhh
2022-08-06T05:18:26Z
2022-07-26T00:01:05Z
null
['CVE-2020-28443']
sonar-wrapper Command Injection vulnerability
A command injection vulnerability affects all versions of package sonar-wrapper. The injection point is located in lib/sonarRunner.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'sonar-wrapper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28443'}, {'type': 'PACKAGE', 'url': 'https://github.com/llooiicc/sonar-wrapper'}, {'type': 'WEB', 'url': 'https://github.com/llooiicc/sonar-wrapper/blob/master/lib/sonarRunner.js'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SONA...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:18:26Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-q8hg-3vqv-f8v3
2022-08-06T09:34:38Z
2022-07-26T00:01:08Z
null
['CVE-2022-2523']
Fava vulnerable to Reflected Cross-site Scripting before v1.22.2
Cross-site Scripting (XSS) - Reflected in GitHub repository beancount/fava prior to 1.22.2. The `query_string` parameter of Fava is vulnerable to reflected cross-site scripting, for which a attacker can modify any information that the user is able to modify. This issue is fixed in version 1.22.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'fava'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2523'}, {'type': 'WEB', 'url': 'https://github.com/beancount/fava/commit/dccfb6a2f4567f35ce2e9a78e24f92ebf946bc9b'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q8hg-3vqv-f8v3'}, {'type': 'PACKAGE', 'url': 'https://github.com/be...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:34:38Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-jvvx-hmmr-rhgg
2022-12-09T18:17:52Z
2022-07-28T00:00:42Z
null
['CVE-2022-36902']
Stored XSS vulnerability in Jenkins Dynamic Extended Choice Parameter plugin
Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier does not escape several fields of Moded Extended Choice parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.moded.extendedchoiceparameter:dynamic_extended_choice_parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36902'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dynamic-extended-choice-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2682'}, {'type': 'WEB', 'url': 'http://www.openwall....
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T18:17:52Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-fw3v-x4f2-v673
2023-08-08T21:10:31Z
2022-07-26T00:00:27Z
null
['CVE-2022-34749']
Mistune vulnerable to catastrophic backtracking
In Mistune through 2.0.2, support of inline markup is implemented by using regular expressions that can involve a high amount of backtracking on certain edge cases. This behavior is commonly named catastrophic backtracking.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mistune'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34749'}, {'type': 'WEB', 'url': 'https://github.com/lepture/mistune/issues/314#issuecomment-1223972386'}, {'type': 'WEB', 'url': 'https://github.com/lepture/mistune/commit/a6d43215132fe4f3d93f8d7e90ba83b16a0838b2'}, {'type': 'WEB', 'url': 'https://...
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T22:24:56Z', 'nvd_published_at': '2022-07-25T23:15:00Z'}
1.4.0
GHSA-vwm6-qc77-v2rh
2022-07-19T22:30:59Z
2022-07-11T21:00:20Z
null
['CVE-2022-31073']
KubeEdge Edge ServiceBus module DoS
### Impact The ServiceBus server on the edge side may be susceptible to a DoS attack if an HTTP request containing a very large Body is sent to it. It is possible for the node to be exhausted of memory. The consequence of the exhaustion is that other services on the node, e.g. other containers, will be unable to alloca...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed'...
[{'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/security/advisories/GHSA-vwm6-qc77-v2rh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31073'}, {'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/pull/4038'}, {'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-11T21:00:20Z', 'nvd_published_at': '2022-07-11T20:15:00Z'}
1.4.0
GHSA-9339-86wc-4qgf
2023-04-12T21:01:45Z
2022-07-20T00:00:18Z
null
['CVE-2022-34169']
Apache Xalan Java XSLT library integer truncation issue when processing malicious XSLT stylesheets
The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode. A fix for this issue was published in September 2022 as part of an antic...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'xalan:xalan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34169'}, {'type': 'PACKAGE', 'url': 'https://gitbox.apache.org/repos/asf?p=xalan-java.git'}, {'type': 'WEB', 'url': 'https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=2e60d0a9a5b822c4abf9051857973b1c6babfe81'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-681'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T22:28:36Z', 'nvd_published_at': '2022-07-19T18:15:00Z'}
1.4.0
GHSA-cj88-88mr-972w
2023-01-06T03:13:53Z
2022-07-18T17:03:23Z
null
['CVE-2021-35065']
glob-parent 6.0.0 vulnerable to Regular Expression Denial of Service
glob-parent 6.0.0 is vulnerable to Regular Expression Denial of Service (ReDoS). This issue is fixed in version 6.0.1. This vulnerability is separate from [GHSA-ww39-953v-wcq6](https://github.com/advisories/GHSA-ww39-953v-wcq6).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'glob-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.1'}]}], 'versions': ['6.0.0']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35065'}, {'type': 'WEB', 'url': 'https://github.com/opensearch-project/OpenSearch-Dashboards/issues/1103'}, {'type': 'WEB', 'url': 'https://github.com/gulpjs/glob-parent/pull/49'}, {'type': 'WEB', 'url': 'https://github.com/gulpjs/glob-parent/commi...
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-18T17:03:23Z', 'nvd_published_at': '2022-12-26T07:15:00Z'}
1.4.0
GHSA-hm53-hrhh-gwfq
2022-12-13T14:04:44Z
2022-07-28T00:00:42Z
null
['CVE-2022-36912']
Missing permission checks in Jenkins openstack-heat Plugin
openstack-heat Plugin 1.5 and earlier does not perform permission checks in methods implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:openstack-heat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36912'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/openstack-heat-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2105%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T14:48:02Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-7rrx-375m-j6cr
2022-12-12T19:54:35Z
2022-07-01T00:01:07Z
null
['CVE-2022-34795']
Cross-site Scripting in Jenkins Deployment Dashboard Plugin
Jenkins Deployment Dashboard Plugin 1.0.10 and earlier does not escape environment names on its Deployment Dashboard view, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ec2-deployment-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34795'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ec2-deployment-dashboard'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2799'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T20:39:46Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-j33r-cgm6-pv48
2022-12-12T19:53:23Z
2022-07-01T00:01:07Z
null
['CVE-2022-34794']
Missing Authorization in Jenkins Recipe Plugin
Missing permission checks in Jenkins Recipe Plugin 1.2 and earlier allow attackers with Overall/Read permission to send an HTTP request to an attacker-specified URL and parse the response as XML. Additionally, the plugin allows users to export the full configuration of jobs as part of a recipe, granting access to job ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:recipe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34794'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/recipe-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2000'}]
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T20:38:27Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-h7pf-h58r-mv93
2022-12-12T21:33:52Z
2022-07-01T00:01:07Z
null
['CVE-2022-34780']
CSRF vulnerability in Jenkins XebiaLabs XL Release Plugin allow capturing credentials
XebiaLabs XL Release Plugin 22.0.0 and earlier does not perform permission checks in methods implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials s...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.xebialabs.ci:xlrelease-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 22.0.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34780'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xlrelease-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2773%20(2)'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:33:52Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-57f2-52wj-7vj6
2022-12-09T18:16:57Z
2022-07-28T00:00:42Z
null
['CVE-2022-36899']
Agent-to-controller security bypass in Jenkins BMC Compuware ISPW Operations plugin
BMC Compuware ISPW Operations Plugin defines a controller/agent message that retrieves Java system properties. BMC Compuware ISPW Operations Plugin 1.0.8 and earlier does not restrict execution of the controller/agent message to agents. This allows attackers able to control agent processes to retrieve Java system prope...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-ispw-operations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.8'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36899'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/compuware-ispw-operations-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2629'}, {'type': 'WEB', 'url': 'http://www.openwall.com/list...
{'cwe_ids': ['CWE-693'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:19:33Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-64x4-9hc6-r2h6
2022-07-21T22:35:57Z
2022-07-13T00:00:39Z
null
['CVE-2022-30187']
Microsoft: CBC Padding Oracle in Azure Blob Storage Encryption Library
### Summary The Azure Storage Encryption library in Java and other languages is vulnerable to a CBC Padding Oracle attack, similar to CVE-2020-8911. The library is not vulnerable to the equivalent of CVE-2020-8912, but only because it currently only supports AES-CBC as encryption mode. ### Severity Moderate - The v...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Azure.Storage.Queues'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.11.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Azure.Storage.Blobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.13.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/google/security-research/security/advisories/GHSA-6m8q-r22q-vfxh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30187'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187'}, {'type': 'WEB', 'url': 'https://...
{'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T22:35:57Z', 'nvd_published_at': '2022-07-12T23:15:00Z'}
1.4.0
GHSA-wgmr-mf83-7x4j
2022-07-19T19:42:51Z
2022-07-07T20:55:40Z
null
['CVE-2022-2048']
Jetty vulnerable to Invalid HTTP/2 requests that can lead to denial of service
### Description Invalid HTTP/2 requests (for example, invalid URIs) are incorrectly handled by writing a blocking error response directly from the selector thread. If the client manages to exhaust the HTTP/2 flow control window, or TCP congest the connection, the selector thread will be blocked trying to write the erro...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty.http2:http2-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.47'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty.http2:http2-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1...
[{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2048'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-...
{'cwe_ids': ['CWE-400', 'CWE-410'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T20:55:40Z', 'nvd_published_at': '2022-07-07T21:15:00Z'}
1.4.0
GHSA-ffmh-x56j-9rc3
2022-07-22T16:34:21Z
2022-07-05T22:56:58Z
null
['CVE-2022-31147']
jquery-validation Regular Expression Denial of Service due to arbitrary input to url2 method
Summary Incomplete fix of CVE-2021-43306: An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the jquery-validation npm package, when an attacker is able to supply arbitrary input to the url2 method.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'jquery-validation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jquery-validation/jquery-validation/security/advisories/GHSA-ffmh-x56j-9rc3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31147'}, {'type': 'WEB', 'url': 'https://github.com/jquery-validation/jquery-validation/commit/5bbd80d27fc6b607d2f7f106c895220...
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:58Z', 'nvd_published_at': '2022-07-14T20:15:00Z'}
1.4.0
GHSA-xg72-6c83-ghh4
2022-07-29T22:27:38Z
2022-07-23T00:00:25Z
null
['CVE-2022-2495']
Microweber Stored Cross-site Scripting before v1.2.20
Microwerber prior to version 1.2.20 is vulnerable to stored Cross-site Scripting (XSS).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2495'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/d35e691e72d358430abc8e99f5ba9eb374423b9f'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T22:27:38Z', 'nvd_published_at': '2022-07-22T04:15:00Z'}
1.4.0
GHSA-4vm8-j95f-j6v5
2022-08-06T09:34:01Z
2022-07-14T00:00:16Z
null
['CVE-2022-32114']
Strapi 4.1.12 Cross-site Scripting via crafted file
An unrestricted file upload vulnerability in the Add New Assets function of Strapi v4.1.12 allows attackers to execute arbitrary code via a crafted file. After an authenticated attacker uploads a file containing a malicious URL, a victim copies and pastes the malicious URL into a new tab to receive the XSS payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@strapi/strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32114'}, {'type': 'WEB', 'url': 'https://github.com/bypazs/strapi'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://grimthereaperteam.medium.com/strapi-v4-1-12-unrestricted-file-upload-b993bfd07e4e'}...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:34:01Z', 'nvd_published_at': '2022-07-13T21:15:00Z'}
1.4.0
GHSA-qwrj-9hmp-gpxh
2023-02-09T20:22:10Z
2022-07-15T18:10:48Z
null
['CVE-2022-31145']
FlyteAdmin Insufficient AccessToken Expiration Check
### Impact Authenticated users using an external identity provider can continue to use Access Tokens and ID Tokens even after they expire. Using flyteadmin as the OAuth2 Authorization Server is unaffected by this issue. ### Patches 1.1.30 ### Workarounds Rotating signing keys immediately will: * Invalidate all open s...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/flyteorg/flyteadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.31'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/flyteorg/flyteadmin/security/advisories/GHSA-qwrj-9hmp-gpxh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31145'}, {'type': 'WEB', 'url': 'https://github.com/flyteorg/flyteadmin/pull/455'}, {'type': 'WEB', 'url': 'https://github.com/flyteorg/flytea...
{'cwe_ids': ['CWE-298', 'CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:10:48Z', 'nvd_published_at': '2022-07-13T21:15:00Z'}
1.4.0
GHSA-crrq-vr9j-fxxh
2022-07-06T19:52:23Z
2022-07-06T19:52:23Z
null
['CVE-2022-31112']
Protected fields exposed via LiveQuery
### Impact Parse Server LiveQuery does not remove protected fields in classes, passing them to the client. ### Patches The LiveQueryController now removes protected fields from the client response. ### Workarounds Use `Parse.Cloud.afterLiveQueryEvent` to manually remove protected fields. ### References - https://gi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.13'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-crrq-vr9j-fxxh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31112'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/issues/8073'}, {'type': 'WEB', 'url': 'https://githu...
{'cwe_ids': ['CWE-200', 'CWE-212'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:52:23Z', 'nvd_published_at': '2022-06-30T17:15:00Z'}
1.4.0
GHSA-xqcf-hj92-967m
2023-07-25T20:00:40Z
2022-07-24T00:00:33Z
null
['CVE-2018-25045']
Django REST framework XSS Vulnerability
Django REST framework (aka django-rest-framework) before 3.9.1 allows XSS because the default DRF Browsable API view templates disable autoescaping.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django-rest-framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25045'}, {'type': 'WEB', 'url': 'https://github.com/encode/django-rest-framework/pull/6191'}, {'type': 'WEB', 'url': 'https://github.com/encode/django-rest-framework/pull/6330'}, {'type': 'WEB', 'url': 'https://github.com/encode/django-rest-framewo...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T20:00:40Z', 'nvd_published_at': '2022-07-23T02:15:00Z'}
1.4.0
GHSA-rpxg-hg79-h8q9
2022-07-29T18:05:47Z
2022-07-15T15:28:26Z
null
['CVE-2022-35628']
SQL Injection in typo3 extension "LUX - TYPO3 Marketing Automation"
A SQL injection issue was discovered in the lux extension before 17.6.1, and 18.x through 24.x before 24.0.2, for TYPO3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'in2code/lux'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '18.0.0'}, {'fixed': '24.0.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'in2code/lux'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '17.6.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35628'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/in2code/lux/CVE-2022-35628.yaml'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2022-014'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T15:28:26Z', 'nvd_published_at': '2022-07-12T23:15:00Z'}
1.4.0
GHSA-32ff-4g79-vgfc
2022-08-10T23:50:57Z
2022-07-29T22:28:12Z
null
['CVE-2022-31177']
Flask-AppBuilder before v4.1.3 allows inference of sensitive information through query strings
### Impact An authenticated Admin user could craft HTTP requests to filter users by their salted and hashed passwords strings. These filters could be made by using partial hashed password strings. The response would not include the hashed passwords, but an attacker could infer partial password hashes and their respecti...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-AppBuilder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-32ff-4g79-vgfc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31177'}, {'type': 'PACKAGE', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar...
{'cwe_ids': ['CWE-200', 'CWE-916'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T22:28:12Z', 'nvd_published_at': '2022-08-01T19:15:00Z'}
1.4.0
GHSA-477v-w82m-634j
2023-08-29T17:58:25Z
2022-07-16T00:00:20Z
null
['CVE-2022-25891']
Shoutrrr util package DoS via sending 2000, 4000, or 6000 character messages
The package `github.com/containrrr/shoutrrr/pkg/util` before 0.6.0 are vulnerable to Denial of Service (DoS) via the `util.PartitionMessage` function. Exploiting this vulnerability is possible by sending exactly 2000, 4000, or 6000 characters messages.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/containrrr/shoutrrr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25891'}, {'type': 'WEB', 'url': 'https://github.com/containrrr/shoutrrr/issues/240'}, {'type': 'WEB', 'url': 'https://github.com/containrrr/shoutrrr/pull/242'}, {'type': 'WEB', 'url': 'https://github.com/containrrr/shoutrrr/commit/6a27056f9d7522a8b...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T02:45:42Z', 'nvd_published_at': '2022-07-15T20:15:00Z'}
1.4.0
GHSA-42m6-g935-5vmq
2022-08-11T22:04:47Z
2022-07-26T00:01:05Z
null
['CVE-2021-23397']
@ianwalter/merge Prototype Pollution via `merge` function
All versions of package @ianwalter/merge are vulnerable to Prototype Pollution via the main (`merge`) function. @ianwalter/merge is [deprecated](https://github.com/ianwalter/merge/blob/master/README.md) and the maintainer suggests using [@generates/merger](https://github.com/generates/generates/tree/main/packages/merge...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': '@ianwalter/merge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23397'}, {'type': 'PACKAGE', 'url': 'https://github.com/ianwalter/merge'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-IANWALTERMERGE-1311022'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-26T19:37:36Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-7f6x-jwh5-m9r4
2022-07-21T22:34:38Z
2022-07-21T22:34:38Z
null
['CVE-2022-31169']
Cranelift vulnerable to miscompilation of constant values in division on AArch64
### Impact There was a bug in Wasmtime's code generator, Cranelift, for AArch64 targets where constant divisors could result in incorrect division results at runtime. The translation rules for constants did not take into account whether sign- or zero-extension should happen, which resulted in an incorrect value being ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.38.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'cranelift-codegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.85.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-7f6x-jwh5-m9r4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31169'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/commit/2ba4bce5cc719e5a74e571a534424614e62ecc41'}, {'type'...
{'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T22:34:38Z', 'nvd_published_at': '2022-07-22T04:15:00Z'}
1.4.0
GHSA-8gpg-466c-5cpj
2022-08-06T09:39:04Z
2022-07-19T00:00:27Z
null
['CVE-2022-36127']
Apache SkyWalking NodeJS Agent can lose availability if header includes illegal SkyWalking header
A vulnerability in Apache SkyWalking NodeJS Agent prior to 0.5.1. The vulnerability will cause NodeJS services that has this agent installed to be unavailable if the OAP is unhealthy and NodeJS agent can't establish the connection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'skywalking-backend-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36127'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/skywalking-nodejs'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/x238wo4r5goy39dxdjcmlofp6gcdnqr3'}, {'type': 'WEB', 'url': 'https://skywalking.apache.org/events/release-apa...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:39:04Z', 'nvd_published_at': '2022-07-18T12:15:00Z'}
1.4.0
GHSA-fqhm-fjjv-7q8x
2022-12-13T13:57:33Z
2022-07-28T00:00:42Z
null
['CVE-2022-36911']
CSRF vulnerability in Jenkins openstack-heat Plugin
openstack-heat Plugin 1.5 and earlier does not perform permission checks in methods implementing form validation. This form validation methods do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:openstack-heat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36911'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/openstack-heat-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2105%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T17:27:09Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-hwqr-f3v9-hwxr
2022-07-15T21:56:08Z
2022-07-15T21:56:08Z
null
[]
Workers for local Dask clusters mistakenly listened on public interfaces
Versions of `distributed` earlier than `2021.10.0` had a potential security vulnerability relating to single-machine Dask clusters. Clusters started with `dask.distributed.LocalCluster` or `dask.distributed.Client()` (which defaults to using `LocalCluster`) would mistakenly configure their respective Dask workers to l...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'distributed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2021.10.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dask/distributed/security/advisories/GHSA-hwqr-f3v9-hwxr'}, {'type': 'WEB', 'url': 'https://docs.dask.org/en/latest/changelog.html'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j8fq-86c5-5v2r'}, {'type': 'WEB', 'url': 'https://github.com/dask/dask/tags'},...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T21:56:08Z', 'nvd_published_at': None}
1.4.0
GHSA-gvmr-mp5q-9wvw
2022-12-09T04:54:35Z
2022-07-01T00:01:08Z
null
['CVE-2022-34805']
Plaintext Storage of a Password in Jenkins Skype notifier Plugin
Skype notifier Plugin 1.1.0 and earlier stores a password unencrypted in its global configuration file `hudson.plugins.skype.im.transport.SkypePublisher.xml` on the Jenkins controller as part of its configuration. This password can be viewed by users with access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:skype-notifier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34805'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/skype-im-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2160'}]
{'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T15:42:18Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-g688-7j3c-h9f3
2022-07-20T00:02:47Z
2022-07-09T00:00:26Z
null
['CVE-2022-31290']
Known v1.3.1 Cross-site Scripting
A cross-site scripting (XSS) vulnerability in Known v1.3.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Your Name text field. The researcher report indicates that versions 1.3.1 and prior are vulnerable. Version 1.2.2 is the last version tagged on GitH...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'idno/known'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31290'}, {'type': 'WEB', 'url': 'https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/'}, {'type': 'PACKAGE', 'url': 'https://github.com/idno/known'}, {'type': 'WEB', 'url': 'https://withknown.com/'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T00:02:47Z', 'nvd_published_at': '2022-07-08T12:15:00Z'}
1.4.0
GHSA-5xp2-7qfc-fwgc
2022-08-10T18:20:38Z
2022-07-28T00:00:42Z
null
['CVE-2022-36900']
Jenkins Compuware zAdviser API Plugin before 1.0.4 vulnerable to protection mechanism failure
Jenkins Compuware zAdviser API Plugin 1.0.3 and earlier does not restrict execution of a controller/agent message to agents, allowing attackers able to control agent processes to retrieve Java system properties.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-zadviser-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36900'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2630'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:20:38Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-prc3-vjfx-vhm9
2023-09-08T21:19:38Z
2022-07-16T00:00:20Z
null
['CVE-2022-25869']
Angular (deprecated package) Cross-site Scripting
All versions of package angular are vulnerable to Cross-site Scripting (XSS) due to insecure page caching in the Internet Explorer browser, which allows interpolation of `<textarea>` elements. NPM package [angular](https://www.npmjs.com/package/angular) is deprecated. Those who want to receive security updates should ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'angular'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25869'}, {'type': 'WEB', 'url': 'https://glitch.com/edit/%23%21/angular-repro-textarea-xss'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2949783'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGI...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T00:41:18Z', 'nvd_published_at': '2022-07-15T20:15:00Z'}
1.4.0
GHSA-qhmj-29vh-8mjm
2022-12-12T20:19:46Z
2022-07-01T00:01:08Z
null
['CVE-2022-34814']
Incorrect Authorization in Jenkins Request Rename Or Delete Plugin
Jenkins Request Rename Or Delete Plugin 1.1.0 and earlier does not correctly perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to view an administrative configuration page listing pending requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rrod'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34814'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rrod-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-1996'}]
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:16:57Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-5p73-qg2v-383h
2022-07-19T18:26:48Z
2022-07-15T20:55:50Z
null
['CVE-2022-31158']
LTI 1.3 Tool Library's Nonce Claim Value not validated against nonce value sent in Authentication Request before v5.0
### Impact Nonce Claim Value was not being validated against the nonce value sent in the Authentication Request. ### Patches Users should upgrade to version 5.0 immediately ### Workarounds None.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'packbackbooks/lti-1-3-php-library'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/packbackbooks/lti-1-3-php-library/security/advisories/GHSA-5p73-qg2v-383h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31158'}, {'type': 'PACKAGE', 'url': 'https://github.com/packbackbooks/lti-1-3-php-library'}, {'type': 'WEB', 'url': 'https://ope...
{'cwe_ids': ['CWE-294', 'CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T20:55:50Z', 'nvd_published_at': '2022-07-15T18:15:00Z'}
1.4.0
GHSA-2m4x-4q9j-w97g
2022-07-13T20:04:43Z
2022-07-01T00:01:03Z
null
['CVE-2022-33082']
Denial of service in Open Policy Agent
An issue in the AST parser (ast/compile.go) of Open Policy Agent v0.10.2 allows attackers to cause a Denial of Service (DoS) via a crafted input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/open-policy-agent/opa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.42.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33082'}, {'type': 'WEB', 'url': 'https://github.com/open-policy-agent/opa/issues/4761'}, {'type': 'WEB', 'url': 'https://github.com/open-policy-agent/opa/issues/4762'}, {'type': 'WEB', 'url': 'https://github.com/open-policy-agent/opa/pull/4701'}, {...
{'cwe_ids': ['CWE-703'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:52:00Z', 'nvd_published_at': '2022-06-30T22:15:00Z'}
1.4.0
GHSA-vqgr-mfxm-47f3
2022-08-06T05:19:14Z
2022-07-26T00:01:06Z
null
['CVE-2020-28422']
git-archive vulnerable to Command Injection via exports function
All versions of package git-archive are vulnerable to Command Injection via the exports function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'git-archive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28422'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-GITARCHIVE-1050391'}]
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:19:14Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-5834-xv5q-cgfw
2022-08-11T16:34:49Z
2022-07-27T22:06:09Z
null
['CVE-2022-31148']
Shopware vulnerable to persistent cross site scripting (XSS) in customer module
### Impact Persistent XSS in customer module ### Patches We recommend updating to the current version 5.7.14. You can get the update to 5.7.14 regularly via the Auto-Updater or directly via the download overview. For older versions you can use the Security Plugin: https://store.shopware.com/en/swag575294366635f/shop...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.7.0'}, {'fixed': '5.7.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.7.13'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-5834-xv5q-cgfw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31148'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/7875855005648fba7b39371a70816afae2e07daf'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T22:06:09Z', 'nvd_published_at': '2022-08-01T17:15:00Z'}
1.4.0
GHSA-v878-67xw-grw2
2022-12-09T21:10:20Z
2022-07-28T00:00:43Z
null
['CVE-2022-36883']
Lack of authentication mechanism in Jenkins Git Plugin webhook
Git Plugin provides a webhook endpoint at `/git/notifyCommit` that can be used to notify Jenkins of changes to an SCM repository. For its most basic functionality, this endpoint receives a repository URL, and Jenkins will schedule polling for all jobs configured with the specified repository. In Git Plugin 4.11.3 and e...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.11.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36883'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:25:32Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-589f-c66p-hxr4
2022-08-06T09:34:28Z
2022-07-26T00:01:08Z
null
['CVE-2022-21802']
grapesjs before 0.19.5 vulnerable to Cross-site Scripting
The package grapesjs before 0.19.5 is vulnerable to Cross-site Scripting (XSS) due to an improper sanitization of the class name in Selector Manager.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'grapesjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.19.5'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21802'}, {'type': 'WEB', 'url': 'https://github.com/artf/grapesjs/issues/4411%23issuecomment-1167202709'}, {'type': 'WEB', 'url': 'https://github.com/artf/grapesjs/commit/13e85d152d486b968265c4b8017e8901e7d89ff3'}, {'type': 'PACKAGE', 'url': 'https...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:34:28Z', 'nvd_published_at': '2022-07-25T14:15:00Z'}
1.4.0
GHSA-jwvf-28fg-g4xg
2022-07-21T21:40:20Z
2022-07-18T00:00:33Z
null
['CVE-2022-2099']
WooCommerce WordPress plugin before 6.6.0 vulnerable to stored HTML injection
The WooCommerce WordPress plugin before 6.6.0 is vulnerable to stored HTML injection due to lack of escaping and sanitizing in the payment gateway titles
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'woocommerce/woocommerce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2099'}, {'type': 'PACKAGE', 'url': 'https://github.com/woocommerce/woocommerce'}, {'type': 'WEB', 'url': 'https://wpscan.com/vulnerability/0316e5f3-3302-40e3-8ff4-be3423a3be7b'}]
{'cwe_ids': ['CWE-116', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T21:40:20Z', 'nvd_published_at': '2022-07-17T11:15:00Z'}
1.4.0
GHSA-rqph-25q9-9jhp
2022-07-15T18:35:26Z
2022-07-08T00:00:48Z
null
['CVE-2015-3207']
Insecure cookies in Openshift Origin
In Openshift Origin the cookies being set in console have no 'secure', 'HttpOnly' attributes.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/openshift/origin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3207'}, {'type': 'WEB', 'url': 'https://github.com/openshift/origin/pull/2261'}, {'type': 'WEB', 'url': 'https://github.com/openshift/origin/pull/2291'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1221882'}]
{'cwe_ids': ['CWE-311', 'CWE-614'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:20:02Z', 'nvd_published_at': '2022-07-07T13:15:00Z'}
1.4.0
GHSA-5cm2-9h8c-rvfx
2022-08-10T23:48:58Z
2022-07-21T21:39:29Z
null
['CVE-2022-31163']
TZInfo relative path traversal vulnerability allows loading of arbitrary files
### Impact #### Affected versions - 0.3.60 and earlier. - 1.0.0 to 1.2.9 when used with the Ruby data source (tzinfo-data). #### Vulnerability With the Ruby data source (the tzinfo-data gem for tzinfo version 1.0.0 and later and built-in to earlier versions), time zones are defined in Ruby files. There is one ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'tzinfo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.61'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'tzinfo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tzinfo/tzinfo/security/advisories/GHSA-5cm2-9h8c-rvfx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31163'}, {'type': 'WEB', 'url': 'https://github.com/tzinfo/tzinfo/commit/9905ca93abf7bf3e387bd592406e403cd18334c7'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-22', 'CWE-23'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T21:39:29Z', 'nvd_published_at': '2022-07-22T04:15:00Z'}
1.4.0
GHSA-q37h-jhf3-85cj
2022-07-15T21:37:28Z
2022-07-15T21:37:28Z
null
[]
Bypass of CMS Safe Mode Security Feature
### Impact Authenticated users with permissions to create or modify theme template objects through the backend "CMS" editor can exploit this vulnerability to bypass the `cms.enableSafeMode` security feature if enabled (disables modification of PHP code through the web interface when enabled). This is only an issue fo...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'wintercms/winter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.475'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'wintercms/winter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/wintercms/winter/security/advisories/GHSA-q37h-jhf3-85cj'}, {'type': 'PACKAGE', 'url': 'https://github.com/wintercms/winter'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T21:37:28Z', 'nvd_published_at': None}
1.4.0
GHSA-6x63-hrxg-2hjx
2022-08-11T15:15:03Z
2022-07-28T00:00:43Z
null
['CVE-2022-36886']
External Monitor Job Type Plugin does not require POST requests for an HTTP endpoint
A cross-site request forgery (CSRF) vulnerability in Jenkins External Monitor Job Type Plugin 191.v363d0d1efdf8 and earlier allows attackers to create runs of an external job. This can lead to Cross-Site Request Forgery (CSRF).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:external-monitor-job'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '192.ve979ca_8b_3ccd'}]}], 'database_specific': {'last_known_affected_version_range': '<= 191.v363d0d1efdf8'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36886'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2762'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:15:03Z', 'nvd_published_at': '2022-07-27T15:15:00Z'}
1.4.0
GHSA-vjmr-6pmm-rprf
2022-08-06T09:37:44Z
2022-07-23T00:00:15Z
null
['CVE-2022-34115']
Dataease v1.11.1 SQL Injection via parameter dataSourceId
Dataease v1.11.1 was discovered to contain a SQL injection vulnerability via the parameter `dataSourceId`. Version 1.11.2 contains a fix.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.dataease:dataease-plugin-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34115'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/issues/2428'}, {'type': 'PACKAGE', 'url': 'https://github.com/dataease/dataease'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/releases/tag/v1.11.2'}]
{'cwe_ids': ['CWE-434', 'CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:37:44Z', 'nvd_published_at': '2022-07-22T23:15:00Z'}
1.4.0
GHSA-9wqr-9787-p4rf
2022-07-19T18:31:21Z
2022-07-12T00:00:57Z
null
['CVE-2022-2368']
Microweber before 1.2.21 allows attacker to bypass IP detection to brute-force password
In the login API, an IP address will by default be blocked when the user tries to login incorrectly more than 5 times. However, a bypass to this mechanism is possible by abusing a X-Forwarded-For header to bypass IP detection and perform a password brute-force. A patch for this issue is available in Microweber version ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.21'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2368'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/53c000ccd5602536e28b15d9630eb8261b04a302'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a...
{'cwe_ids': ['CWE-290'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T15:47:17Z', 'nvd_published_at': '2022-07-11T08:15:00Z'}
1.4.0
GHSA-3q7f-w8fr-368v
2022-12-09T04:46:09Z
2022-07-01T00:01:08Z
null
['CVE-2022-34812']
Cross-Site Request Forgery in Jenkins XPath Configuration Viewer Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins XPath Configuration Viewer Plugin 1.1.1 and earlier allows attackers to create and delete XPath expressions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xpath-config-viewer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34812'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xpath-config-viewer-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2658'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:17:47Z', 'nvd_published_at': '2022-06-30T18:15:00Z'}
1.4.0
GHSA-cpm5-cqr9-7p79
2022-12-09T20:01:45Z
2022-09-22T00:00:26Z
null
['CVE-2022-41248']
Jenkins BigPanda Notifier Plugin Missing Password Field Masking
BigPanda Notifier Plugin 1.4.0 and earlier stores the BigPanda API key unencrypted in its global configuration file `BigpandaGlobalNotifier.xml` on the Jenkins controller as part of its configuration. This API key can be viewed by users with access to the Jenkins controller file system. Additionally, the global confi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:bigpanda-jenkins'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41248'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/bigpanda-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2243'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20...
{'cwe_ids': ['CWE-549'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:18:08Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}