schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-3cvr-822r-rqcc | 2022-07-21T20:30:10Z | 2022-07-21T20:30:10Z | null | ['CVE-2022-31150'] | undici before v5.8.0 vulnerable to CRLF injection in request headers | ### Impact
It is possible to inject CRLF sequences into request headers in Undici.
```js
const undici = require('undici')
const response = undici.request("http://127.0.0.1:1000", {
headers: {'a': "\r\nb"}
})
```
The same applies to `path` and `method`
### Patches
Update to v5.8.0
### Workarounds
Sanitize all ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'undici'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nodejs/undici/security/advisories/GHSA-3cvr-822r-rqcc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31150'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/undici/commit/a29a151d0140d095742d21a004023d024fe93259'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-93'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T20:30:10Z', 'nvd_published_at': '2022-07-19T21:15:00Z'} |
1.4.0 | GHSA-3fj7-78h2-w98x | 2022-07-12T18:15:48Z | 2022-07-01T00:01:08Z | null | ['CVE-2022-34813'] | Missing Authorization in Jenkins XPath Configuration Viewer Plugin | A missing permission check in Jenkins XPath Configuration Viewer Plugin 1.1.1 and earlier allows attackers with Overall/Read permission to create and delete XPath expressions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xpath-config-viewer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34813'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xpath-config-viewer-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2658'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:15:48Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-c58j-88f5-h53f | 2022-07-05T22:08:20Z | 2022-07-05T22:08:20Z | null | [] | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pycares | ### Impact
pycares versions < 4.2.0 are affected by [CVE-2021-3672](https://nvd.nist.gov/vuln/detail/CVE-2021-3672).
### Patches
Update to version 4.2.0.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pycares'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/saghul/pycares/security/advisories/GHSA-c58j-88f5-h53f'}, {'type': 'PACKAGE', 'url': 'https://github.com/saghul/pycares'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:08:20Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x2pc-fqrw-hc7f | 2022-07-21T21:04:52Z | 2022-07-12T00:00:57Z | null | ['CVE-2022-31506'] | SatyaLab opendiamond 10.1.1 vulnerable to path traversal because Flask send_file function used unsafely | The cmusatyalab/opendiamond repository through 10.1.1 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. A patch is available on the `master` branch of the repository. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'opendiamond'}, 'ecosystem_specific': {'affected_functions': ['opendiamond.dataretriever.diamond_store._get_obj_absolute_path', 'opendiamond.dataretriever.diamond_store._get_index_absolute_path', 'opendiamond.dataretriever.mixer_store._get_obj_absolute_path', 'opendiamond.data... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31506'}, {'type': 'WEB', 'url': 'https://github.com/cmusatyalab/opendiamond/issues/52'}, {'type': 'WEB', 'url': 'https://github.com/github/securitylab/issues/669#issuecomment-1117265726'}, {'type': 'WEB', 'url': 'https://github.com/cmusatyalab/open... | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T21:04:52Z', 'nvd_published_at': '2022-07-11T01:15:00Z'} |
1.4.0 | GHSA-x7w4-vfrh-fc3h | 2022-08-10T18:23:02Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36919'] | Jenkins Coverity Plugin allows attackers with Overall/Read permission to enumerate credentials IDs | A missing permission check in Jenkins Coverity Plugin 1.11.4 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:coverity'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.11.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36919'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2790%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:23:02Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-6296-mvgp-27hp | 2022-07-08T17:53:33Z | 2022-07-08T00:00:42Z | null | ['CVE-2021-41042'] | XML External Entity Reference in Eclipse Lyo | In Eclipse Lyo versions 1.0.0 to 4.1.0, a TransformerFactory is initialized with the defaults that do not restrict DTD loading when working with RDF/XML. This allows an attacker to cause an external DTD to be retrieved. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.lyo:lyo-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '5.0.0.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.1.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41042'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/lyo/commit/a8b15b7f49ca15e55f6699749c39705d21367c6e'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/lyo/'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/lyo/releases/tag/v5... | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T17:53:33Z', 'nvd_published_at': '2022-07-07T21:15:00Z'} |
1.4.0 | GHSA-768m-5w34-2xf5 | 2022-07-25T19:25:08Z | 2022-07-15T20:55:46Z | null | ['CVE-2022-31157'] | LTI 1.3 Tool Library's function used to generate random nonces not sufficiently cryptographically complex before v5.0 | ### Impact
The function used to generate random nonces was not sufficiently cryptographically complex. As a result values may be predictable and tokens may be forgable.
### Patches
Users should upgrade to version 5.0 immediately
### Workarounds
None.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'packbackbooks/lti-1-3-php-library'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/packbackbooks/lti-1-3-php-library/security/advisories/GHSA-768m-5w34-2xf5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31157'}, {'type': 'WEB', 'url': 'https://github.com/packbackbooks/lti-1-3-php-library/commit/de19e8a0b28cdc7750fa3ca98471eeed26b... | {'cwe_ids': ['CWE-327', 'CWE-330'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T20:55:46Z', 'nvd_published_at': '2022-07-15T18:15:00Z'} |
1.4.0 | GHSA-wc69-rhjr-hc9g | 2022-09-14T19:29:44Z | 2022-07-06T18:38:49Z | null | ['CVE-2022-31129'] | Moment.js vulnerable to Inefficient Regular Expression Complexity | ### Impact
* using string-to-date parsing in moment (more specifically rfc2822 parsing, which is tried by default) has quadratic (N^2) complexity on specific inputs
* noticeable slowdown is observed with inputs above 10k characters
* users who pass user-provided strings without sanity length checks to moment construct... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'moment'}, 'ecosystem_specific': {'affected_functions': ['moment']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.18.0'}, {'fixed': '2.29.4'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Moment.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced'... | [{'type': 'WEB', 'url': 'https://github.com/moment/moment/security/advisories/GHSA-wc69-rhjr-hc9g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31129'}, {'type': 'WEB', 'url': 'https://github.com/moment/moment/pull/6015#issuecomment-1152961973'}, {'type': 'WEB', 'url': 'https://github.com/mo... | {'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T18:38:49Z', 'nvd_published_at': '2022-07-06T18:15:00Z'} |
1.4.0 | GHSA-x3px-2p95-f6jr | 2022-07-19T22:28:49Z | 2022-07-11T21:04:04Z | null | ['CVE-2022-31075'] | KubeEdge DoS when signing the CSR from EdgeCore | ### Impact
EdgeCore may be susceptible to a DoS attack on CloudHub if an attacker was to send a well-crafted HTTP request to `/edge.crt`.
If an attacker can send a well-crafted HTTP request to CloudHub, and that request has a very large body, that request could crash the HTTP service through a memory exhaustion vector.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed'... | [{'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/security/advisories/GHSA-x3px-2p95-f6jr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31075'}, {'type': 'PACKAGE', 'url': 'github.com/kubeedge/kubeedge'}] | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-11T21:04:04Z', 'nvd_published_at': '2022-07-11T21:15:00Z'} |
1.4.0 | GHSA-w8gx-4r6w-3rx9 | 2022-08-10T21:20:53Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36892'] | Jenkins rhnpush-plugin does not perform a permission check in a method implementing form validation | Jenkins rhnpush-plugin Plugin 0.5.1 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rhnpush-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.5.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36892'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2402'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T21:20:53Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-m6mg-jvjf-w44x | 2022-08-04T21:25:33Z | 2022-07-26T00:01:06Z | null | ['CVE-2020-28441'] | conf-cfg-ini Prototype Pollution via malicious INI file before v1.2.2 | This affects the package conf-cfg-ini before 1.2.2. If an attacker submits a malicious INI file to an application that parses it with decode, they will pollute the prototype on the application. This can be exploited further depending on the context. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'conf-cfg-ini'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28441'}, {'type': 'WEB', 'url': 'https://github.com/loge5/conf-cfg-ini/commit/3a88a6c52c31eb6c0f033369eed40aa168a636ea'}, {'type': 'WEB', 'url': 'https://github.com/loge5/conf-cfg-ini/commit/ecd878f8f7398e765739e989c7fe7cc052308947'}, {'type': 'PAC... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-04T21:25:33Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-687h-86vc-5x59 | 2022-07-21T20:45:59Z | 2022-07-12T00:00:58Z | null | ['CVE-2022-31573'] | ChainerRL Visualizer 0.1.1 vulnerable to Path Traversal via unsafe use of send_file function | The chainer/chainerrl-visualizer repository through 0.1.1 on GitHub allows absolute path traversal because the Flask send_file function is used unsafely. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'chainerrl-visualizer'}, 'ecosystem_specific': {'affected_functions': ['chainerrl_visualizer.web_server.create_app.get_image']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31573'}, {'type': 'WEB', 'url': 'https://github.com/github/securitylab/issues/669#issuecomment-1117265726'}, {'type': 'PACKAGE', 'url': 'https://github.com/chainer/chainerrl-visualizer'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T20:45:59Z', 'nvd_published_at': '2022-07-11T01:15:00Z'} |
1.4.0 | GHSA-hxf7-9rv9-88v6 | 2022-08-10T21:11:48Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36897'] | Jenkins Compuware Xpediter Code Coverage Plugin Missing Authorization | A missing permission check in Jenkins Compuware Xpediter Code Coverage Plugin 1.0.7 and earlier allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-xpediter-code-coverage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36897'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2626'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T21:11:48Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-hv54-cc8f-42jq | 2022-12-12T19:42:28Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34792'] | Cross-Site Request Forgery in Jenkins Recipe Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Recipe Plugin 1.2 and earlier allows attackers to send an HTTP request to an attacker-specified URL and parse the response as XML. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:recipe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34792'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/recipe-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2000'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:20:17Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-v3p8-j597-3xg8 | 2022-07-22T16:28:26Z | 2022-07-17T00:00:45Z | null | ['CVE-2021-34538'] | Apache Hive before 3.1.3 `CREATE` and `DROP` function operations do not check for necessary authorization. | Apache Hive before 3.1.3 `CREATE` and `DROP` function operations do not check for necessary authorization of involved entities in the query. It was found that an unauthorized user can manipulate an existing UDF without having the privileges to do so. This allowed unauthorized or underprivileged users to drop and recrea... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.hive:hive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-34538'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/hive'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/oqqgnhz4c6nxsfd0xstosnk0g15f7354'}] | {'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T21:37:21Z', 'nvd_published_at': '2022-07-16T07:15:00Z'} |
1.4.0 | GHSA-72x4-cq6r-jp4p | 2022-07-19T19:45:15Z | 2022-07-08T17:06:39Z | null | ['CVE-2022-31121'] | Hyperledger Fabric vulnerable to Improper Input Validation in orderer/common/cluster consensus request | ### Impact
If a consensus client sends a malformed consensus request to an orderer it may crash the orderer node.
This fix checks for the malformed consensus request and returns an error to the consensus client.
### Patches
Fixed in v2.2.7 and v2.4.5.
### Workarounds
None, users must upgrade to v2.2.7 or v2.4.5.
###... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hyperledger/fabric/orderer/common/cluster'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.7'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hyperledger/fabric/orderer/common/cluster'}, 'ranges': [{'type': 'ECOSYSTEM', 'ev... | [{'type': 'WEB', 'url': 'https://github.com/hyperledger/fabric/security/advisories/GHSA-72x4-cq6r-jp4p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31121'}, {'type': 'WEB', 'url': 'https://github.com/hyperledger/fabric/commit/0f18359493bcbd5f9f9d1a9b05adabfe5da23b06'}, {'type': 'PACKAGE', '... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T17:06:39Z', 'nvd_published_at': '2022-07-07T18:15:00Z'} |
1.4.0 | GHSA-6xf5-c3cx-67pv | 2022-12-09T17:38:17Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36894'] | Arbitrary file write vulnerability in Jenkins CLIF Performance Testing plugin | An arbitrary file write vulnerability in Jenkins CLIF Performance Testing Plugin 64.vc0d66de1dfb_f and earlier allows attackers with Overall/Read permission to create or replace arbitrary files on the Jenkins controller file system with attacker-specified content. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:clif-performance-testing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '64.vc0d66de1dfb'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36894'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/clif-performance-testing-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2413'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T21:11:21Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-56hc-wf49-2h96 | 2022-12-09T05:00:15Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34799'] | Plaintext Storage of a Password in Jenkins Deployment Dashboard Plugin | Deployment Dashboard Plugin 1.0.10 and earlier stores a password unencrypted in its global configuration file `de.codecentric.jenkins.dashboard.DashboardView.xml` on the Jenkins controller as part of its configuration. This password can be viewed by users with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ec2-deployment-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34799'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ec2-deployment-dashboard'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2070'}] | {'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-11T20:58:44Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-4vq7-8699-4xgc | 2022-08-06T05:52:32Z | 2022-07-29T00:00:17Z | null | ['CVE-2022-34558'] | WMAgent arbitrary code execution via a crafted dbs-client package | WMAgent v1.3.3rc2 and 1.3.3rc1, reqmgr2 1.4.1rc5 and 1.4.0rc2, reqmon 1.4.1rc5, and global-workqueue 1.4.1rc5 allows attackers to execute arbitrary code via a crafted dbs-client package. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'wmagent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.3rc1'}, {'fixed': '2.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.3rc2'}}, {'package': {'ecosystem': 'PyPI', 'name': 'reqmgr2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34558'}, {'type': 'WEB', 'url': 'https://github.com/dmwm/WMCore/issues/11188'}, {'type': 'PACKAGE', 'url': 'https://github.com/dmwm/WMCore'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:52:32Z', 'nvd_published_at': '2022-07-28T23:15:00Z'} |
1.4.0 | GHSA-vp68-fm96-7v79 | 2022-08-11T15:52:28Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36915'] | Jenkins Android Signing Plugin allows attackers to check whether attacker-specified file patterns match workspace contents | Jenkins Android Signing Plugin 2.2.5 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:android-signing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36915'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2404'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:52:28Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-fj7c-vg2v-ccrm | 2022-09-08T14:21:49Z | 2022-07-15T21:07:20Z | null | ['CVE-2021-3690'] | Undertow vulnerable to memory exhaustion due to buffer leak | Buffer leak on incoming WebSocket PONG message(s) in Undertow before 2.0.40 and 2.2.10 can lead to memory exhaustion and allow a denial of service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.40'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'io.undertow:undertow-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3690'}, {'type': 'WEB', 'url': 'https://github.com/undertow-io/undertow/commit/c7e84a0b7efced38506d7d1dfea5902366973877'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-3690'}, {'type': 'WEB', 'url': 'https://access.redhat... | {'cwe_ids': ['CWE-400', 'CWE-401'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T21:07:20Z', 'nvd_published_at': '2022-08-23T16:15:00Z'} |
1.4.0 | GHSA-cfcg-2qgr-v243 | 2022-07-27T22:11:04Z | 2022-07-23T00:00:22Z | null | ['CVE-2022-2470'] | Microweber before 1.2.21 vulnerable to reflected XSS | Microweber prior to 1.2.21 is vulnerable to reflected cross-site scripting (XSS). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.21'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2470'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/d28655183800b833abb20ccd55e1628f16ff65e4'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T22:11:04Z', 'nvd_published_at': '2022-07-22T15:15:00Z'} |
1.4.0 | GHSA-6x93-h9g3-9phr | 2022-08-06T09:35:03Z | 2022-07-26T00:01:05Z | null | ['CVE-2021-23451'] | otp-generator before v3.0.0 insecurely generates random one-time passwords | The package otp-generator before 3.0.0 are vulnerable to Insecure Randomness due to insecure generation of random one-time passwords, which may allow a brute-force attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'otp-generator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23451'}, {'type': 'WEB', 'url': 'https://github.com/Maheshkumar-Kakade/otp-generator/issues/12'}, {'type': 'WEB', 'url': 'https://github.com/Maheshkumar-Kakade/otp-generator/commit/b27de1ce439ae7f533cec26677e9698671275b70'}, {'type': 'PACKAGE', 'ur... | {'cwe_ids': ['CWE-330'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:35:03Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-735f-pg76-fxc4 | 2023-06-13T19:52:47Z | 2022-07-02T00:00:29Z | null | ['CVE-2022-2274'] | openssl-src heap memory corruption with RSA private key operation | The OpenSSL 3.0.4 release introduced a serious bug in the RSA implementation for X86_64 CPUs supporting the AVX512IFMA instructions. This issue makes the RSA implementation with 2048 bit private keys incorrect on such machines and memory corruption will happen during the computation. As a consequence of the memory corr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.8'}, {'fixed': '300.0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2274'}, {'type': 'WEB', 'url': 'https://github.com/openssl/openssl/issues/18625'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=4d8a88c134df634ba610ff8db1eb8478ac5fd345'}, {'type': 'WEB', 'url': 'https://rust... | {'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:42:04Z', 'nvd_published_at': '2022-07-01T08:15:00Z'} |
1.4.0 | GHSA-mxcc-7h5m-x57r | 2022-12-12T20:55:51Z | 2022-07-28T00:00:43Z | null | ['CVE-2022-36885'] | Jenkins GitHub plugin 1.34.4 uses weak webhook signature function | Jenkins GitHub Plugin 1.34.4 and earlier uses a non-constant time comparison function when checking whether the provided and computed webhook signatures are equal, allowing attackers to use statistical methods to obtain a valid webhook signature. GitHub Plugin 1.34.5 uses a constant-time comparison when validating the ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.coravy.hudson.plugins.github:github'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.34.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.34.4'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36885'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/github-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/github-plugin/releases/tag/v1.34.5'}, {'type': 'WEB', 'url': 'https://plugins.jenkins.io/github-issues/'}, {'typ... | {'cwe_ids': ['CWE-208'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-08-24T20:44:20Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-wrxv-2j5q-m38w | 2023-09-05T14:53:18Z | 2022-07-06T00:00:30Z | null | ['CVE-2022-2309'] | lxml NULL Pointer Dereference allows attackers to cause a denial of service | NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the appl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'lxml'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2309'}, {'type': 'WEB', 'url': 'https://github.com/lxml/lxml/commit/86368e9cf70a0ad23cccd5ee32de847149af0c6f'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-wrxv-2j5q-m38w'}, {'type': 'PACKAGE', 'url': 'https://github.com/lxml/lx... | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:14:23Z', 'nvd_published_at': '2022-07-05T10:15:00Z'} |
1.4.0 | GHSA-3wx7-46ch-7rq2 | 2022-09-08T14:25:14Z | 2022-07-06T19:57:19Z | null | ['CVE-2022-2097'] | AES OCB fails to encrypt some bytes | AES OCB mode for 32-bit x86 platforms using the AES-NI assembly optimized implementation will not encrypt the entirety of the data under some circumstances. This could reveal sixteen bytes of data that was pre-existing in the memory that wasn't written. In the special case of "in place" encryption, sixteen bytes of t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '111.22.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2097'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-332410.pdf'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=919925673d6c9cfed3c1085497f5dfbbed5fc431'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-311', 'CWE-326'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:57:19Z', 'nvd_published_at': '2022-07-05T11:15:00Z'} |
1.4.0 | GHSA-mxvc-fwgx-j778 | 2022-09-09T02:28:21Z | 2022-07-15T15:37:39Z | null | ['CVE-2022-25303'] | Whoogle Search Cross-site Scripting via string parameter | The package whoogle-search before version 0.7.2 is vulnerable to Cross-site Scripting (XSS) via the query string parameter q. In the case where it does not contain the http string, it is used to build the error_message that is then rendered in the error.html template, using the [flask.render_template](https://flask.pal... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'whoogle-search'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25303'}, {'type': 'WEB', 'url': 'https://github.com/benbusby/whoogle-search/commit/abc30d7da3b5c67be7ce84d4699f327442d44606'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-mxvc-fwgx-j778'}, {'type': 'PACKAGE', 'url': 'https://git... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T15:37:39Z', 'nvd_published_at': '2022-07-12T15:15:00Z'} |
1.4.0 | GHSA-v923-w3x8-wh69 | 2023-09-11T16:22:17Z | 2022-07-02T00:00:19Z | null | ['CVE-2022-25896'] | Passport vulnerable to session regeneration when a users logs in or out | This affects the package passport before 0.6.0. When a user logs in or logs out, the session is regenerated instead of being closed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'passport'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25896'}, {'type': 'WEB', 'url': 'https://github.com/jaredhanson/passport/pull/900'}, {'type': 'WEB', 'url': 'https://github.com/jaredhanson/passport/commit/7e9b9cf4d7be02428e963fc729496a45baeea608'}, {'type': 'PACKAGE', 'url': 'https://github.com/j... | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T21:09:15Z', 'nvd_published_at': '2022-07-01T20:15:00Z'} |
1.4.0 | GHSA-v42q-78w8-8fcc | 2022-08-06T09:34:51Z | 2022-07-26T00:01:05Z | null | ['CVE-2021-23373'] | set-deep-prop Prototype Pollution | All versions of package set-deep-prop are vulnerable to Prototype Pollution via the main functionality. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'set-deep-prop'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23373'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SETDEEPPROP-1083231'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:34:51Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-977c-63xq-cgw3 | 2022-07-21T14:55:44Z | 2022-07-05T20:41:26Z | null | ['CVE-2022-31115'] | opensearch-ruby 2.x before 2.0.2 vulnerable to unsafe YAML deserialization | ### Impact
A YAML deserialization in opensearch-ruby 2.0.0 can lead to unsafe deserialization using YAML.load if the response is of type YAML.
### Patches
The problem has been patched in opensearch-ruby gem version 2.0.2.
### Workarounds
No viable workaround. Please upgrade to 2.0.2
### References
https://github.co... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'opensearch-ruby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/opensearch-project/opensearch-ruby/security/advisories/GHSA-977c-63xq-cgw3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31115'}, {'type': 'WEB', 'url': 'https://github.com/opensearch-project/opensearch-ruby/pull/77'}, {'type': 'WEB', 'url': 'https... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T20:41:26Z', 'nvd_published_at': '2022-06-30T22:15:00Z'} |
1.4.0 | GHSA-6367-p3v8-7mgw | 2022-08-06T05:20:37Z | 2022-07-26T00:01:06Z | null | ['CVE-2020-28436'] | google-cloudstorage-commands Command Injection vulnerability | A command injection vulnerability affects all versions of the deprecated package google-cloudstorage-commands. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'google-cloudstorage-commands'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28436'}, {'type': 'PACKAGE', 'url': 'https://github.com/samradical/google-cloudstorage-commands'}, {'type': 'WEB', 'url': 'https://github.com/samradical/google-cloudstorage-commands/blob/master/index.js%23L11'}, {'type': 'WEB', 'url': 'https://secu... | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:20:37Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-8rmv-98m4-g5c6 | 2022-07-19T20:27:57Z | 2022-07-08T00:00:43Z | null | ['CVE-2021-44791'] | Apache Druid before 0.23.0 vulnerable to reflected XSS via unescaped URL parameters | In Apache Druid 0.22.1 and earlier, certain specially-crafted links result in unescaped URL parameters being sent back in HTML responses. This makes it possible to execute reflected XSS attacks. This issue is patched in version 0.23.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.druid:druid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44791'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/druid'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/lh2kcl4j45q7xj4w6rqf6kwf0mvyp2o6'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:21:04Z', 'nvd_published_at': '2022-07-07T19:15:00Z'} |
1.4.0 | GHSA-2cpx-6pqp-wf35 | 2022-08-11T17:05:49Z | 2022-07-29T22:24:10Z | null | ['CVE-2022-31183'] | fs2-io skips mTLS client verification | ### Impact
When establishing a server-mode `TLSSocket` using `fs2-io` on Node.js, the parameter `requestCert = true` is ignored, peer certificate verification is skipped, and the connection proceeds.
The vulnerability is limited to:
1. `fs2-io` running on Node.js. The JVM TLS implementation is completely independent.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'co.fs2:fs2-io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.2.11'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/typelevel/fs2/security/advisories/GHSA-2cpx-6pqp-wf35'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31183'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/node/issues/43994'}, {'type': 'WEB', 'url': 'https://github.com/typelevel/fs2/commit/19ce... | {'cwe_ids': ['CWE-295'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T22:24:10Z', 'nvd_published_at': '2022-08-01T20:15:00Z'} |
1.4.0 | GHSA-4v4p-87m3-5423 | 2022-07-20T01:32:06Z | 2022-07-09T00:00:26Z | null | ['CVE-2022-30852'] | Known v1.3.1 contains Insecure Direct Object Reference | Known v1.3.1 was discovered to contain an Insecure Direct Object Reference (IDOR).
The researcher report indicates that versions 1.3.1 and prior are vulnerable. Version 1.2.2 is the last version tagged on GitHub and in Packagist, and development related to the 1.3.x branch is currently on the `dev` branch of the idno/... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'idno/known'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30852'}, {'type': 'WEB', 'url': 'https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/'}, {'type': 'PACKAGE', 'url': 'https://github.com/idno/known'}, {'type': 'WEB', 'url': 'https://withknown.com/'}] | {'cwe_ids': ['CWE-639'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T01:32:06Z', 'nvd_published_at': '2022-07-08T12:15:00Z'} |
1.4.0 | GHSA-hmvw-66jm-h9fh | 2022-08-03T03:40:40Z | 2022-07-23T00:00:15Z | null | ['CVE-2022-34114'] | SQL Injection found in Dataease | Dataease v1.11.1 was discovered to contain a SQL injection vulnerability via the parameter `dataSourceId`. Version 1.11.2 contains a fix. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.dataease:dataease-plugin-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34114'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/issues/2430'}, {'type': 'PACKAGE', 'url': 'https://github.com/dataease/dataease'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/releases/tag/v1.11.2'}] | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-03T03:40:40Z', 'nvd_published_at': '2022-07-22T23:15:00Z'} |
1.4.0 | GHSA-w868-4576-rv24 | 2022-08-03T03:30:47Z | 2022-07-26T00:01:05Z | null | ['CVE-2020-28446'] | ntesseract vulnerable to Command Injection | The package ntesseract before 0.2.9 is vulnerable to Command Injection via lib/tesseract.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ntesseract'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28446'}, {'type': 'WEB', 'url': 'https://github.com/taoyuan/ntesseract/commit/fcbc36f381798b4362179c0cdf9961b437c7b619'}, {'type': 'PACKAGE', 'url': 'https://github.com/taoyuan/ntesseract'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNY... | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-03T03:30:47Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-3hhc-qp5v-9p2j | 2022-12-08T15:33:58Z | 2022-07-12T19:39:47Z | null | ['CVE-2022-32224'] | Active Record RCE bug with Serialized Columns | When serialized columns that use YAML (the default) are deserialized, Rails uses YAML.unsafe_load to convert the YAML data in to Ruby objects. If an attacker can manipulate data in the database (via means like SQL injection), then it may be possible for the attacker to escalate to an RCE.
There are no feasible workaro... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.0.3.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.0.3'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activerecord'}, 'ranges': [{'type': 'ECOSY... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32224'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/611990f1a6c137c2d56b1ba06b27e5d2434dcd6a'}, {'type': 'WEB', 'url': 'https://discuss.rubyonrails.org/t/cve-2022-32224-possible-rce-escalation-bug-with-serialized-columns-in-activ... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T19:39:47Z', 'nvd_published_at': '2022-12-05T22:15:00Z'} |
1.4.0 | GHSA-9xhm-6w5p-335v | 2022-08-11T15:18:47Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36917'] | Jenkins Google Cloud Backup Plugin allows attackers with Overall/Read permission to request a manual backup. | A missing permission check in Jenkins Google Cloud Backup Plugin 0.6 and earlier allows attackers with Overall/Read permission to request a manual backup. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-cloud-backup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36917'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2656'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:18:47Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-25q6-m425-9fqr | 2023-07-07T19:02:06Z | 2022-07-29T00:00:47Z | null | ['CVE-2022-34140'] | Feehi CMS Cross-site Scripting | A stored cross-site scripting (XSS) vulnerability in `/index.php?r=site%2Fsignup` of Feehi CMS v2.1.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the username field. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34140'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/61'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}, {'type': 'WEB', 'url': 'http://packetstormsecurity.com/files/168012/Feehi-CMS-2.1.1-Cross-Site-Scripting.html'}... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:24:41Z', 'nvd_published_at': '2022-07-28T00:15:00Z'} |
1.4.0 | GHSA-gmh3-x5w7-jg5m | 2022-07-20T16:52:28Z | 2022-07-10T00:00:47Z | null | ['CVE-2022-2353'] | Microweber before v1.2.20 vulnerable to cross-site scripting | Prior to Microweber v1.2.20, due to improper neutralization of input, an attacker can steal tokens to perform cross-site request forgery (CSRF), fetch contents from same-site and redirect a user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2353'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/79c6914bab8c9da07ac950fda17648d08c68b130'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7... | {'cwe_ids': ['CWE-352', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T21:28:45Z', 'nvd_published_at': '2022-07-09T09:15:00Z'} |
1.4.0 | GHSA-74wf-cwjg-9cf2 | 2022-08-06T09:36:49Z | 2022-07-26T00:01:05Z | null | ['CVE-2020-28447'] | xopen is vulnerable to OS Command Injection in Exported Function xopen(filepath) | A command injection vulnerability affects all versions of package xopen. The injection point is located in line 14 in index.js in the exported function `xopen(filepath)`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'xopen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28447'}, {'type': 'PACKAGE', 'url': 'https://github.com/andrewimm/xopen'}, {'type': 'WEB', 'url': 'https://github.com/andrewimm/xopen/blob/master/index.js'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-XOPEN-1050981'}] | {'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:36:49Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-mhxj-85r3-2x55 | 2022-08-16T15:42:27Z | 2022-07-22T00:00:38Z | null | ['CVE-2022-36313'] | file-type vulnerable to Infinite Loop via malformed MKV file | An issue was discovered in the file-type package from 13.0.0 until 16.5.4 and 17.x before 17.1.3 for Node.js. A malformed MKV file could cause the file type detector to get caught in an infinite loop. This would make the application become unresponsive and could be used to cause a DoS attack when used on a web server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'file-type'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '13.0.0'}, {'fixed': '16.5.4'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'file-type'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '17.0.0'}, {'fixed': '17.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36313'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/file-type/commit/2c4d1200c99dffb7d515b9b9951ef43c22bf7e47'}, {'type': 'WEB', 'url': 'https://github.com/sindresorhus/file-type/commit/8f981c32e2750d2516457e305e502ee2ad715759#diff-c85... | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-22T20:26:05Z', 'nvd_published_at': '2022-07-21T16:15:00Z'} |
1.4.0 | GHSA-748r-5r8q-273m | 2023-09-05T20:16:04Z | 2022-07-07T00:00:26Z | null | ['CVE-2021-37839'] | Apache Superset allows authenticated users to access metadata they have no permission to | Apache Superset up to 1.5.1 allowed for authenticated users to access metadata information related to datasets they have no permission on. This metadata included the dataset name, columns and metrics. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-superset'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-37839'}, {'type': 'WEB', 'url': 'https://github.com/apache/superset/commit/2bd89d1705347da5446902a3f65eb8d0a6353503'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/superset'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/pwqyxxm... | {'cwe_ids': ['CWE-273'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T21:31:23Z', 'nvd_published_at': '2022-07-06T13:15:00Z'} |
1.4.0 | GHSA-w82x-xjjr-cjr5 | 2022-07-21T20:58:41Z | 2022-07-08T00:00:42Z | null | ['CVE-2022-32060'] | Snipe-IT 6.0.2 vulnerable to Cross-site Scripting via arbitrary file upload in Update Branding Settings | An arbitrary file upload vulnerability in the Update Branding Settings component of Snipe-IT v6.0.2 allows attackers to execute arbitrary code via a crafted file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32060'}, {'type': 'WEB', 'url': 'https://github.com/bypazs/CVE-2022-32060'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://grimthereaperteam.medium.com/snipe-it-version-v6-0-2-file-upload-cross-sit... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T20:58:41Z', 'nvd_published_at': '2022-07-07T23:15:00Z'} |
1.4.0 | GHSA-76pg-mr9v-5vwc | 2022-08-10T18:31:15Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36903'] | Jenkins Repository Connector Plugin allows attackers with Overall/Read permission to enumerate credentials IDs | A missing permission check in Jenkins Repository Connector Plugin 2.2.0 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:repository-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36903'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2665%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:31:15Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-75fc-fv3p-xh82 | 2022-12-12T22:50:03Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36896'] | Jenkins Compuware Source Code Download is missing authorization | BMC Compuware Source Code Download for Endevor, PDS, and ISPW Plugin 2.0.12 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to enumerate hosts and ports of Compuware configurations and credentials IDs of credentials stored in Jenkins. Those c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-scm-downloader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.0.12'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36896'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/compuware-scm-downloader-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2621'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T21:13:10Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-xq3c-8gqm-v648 | 2022-07-29T22:22:27Z | 2022-07-29T22:22:27Z | null | [] | async-graphql / async-graphql - @DOS GraphQL Nested Fragments overflow | ### Impact
Executing deeply nested queries may cause stack overflow.
### Patches
Upgrade to `v4.0.6`
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'async-graphql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.0.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/async-graphql/async-graphql/security/advisories/GHSA-xq3c-8gqm-v648'}, {'type': 'WEB', 'url': 'https://github.com/async-graphql/async-graphql/commit/521769b80039fc8043d1c9883e3d6e5b57359072'}, {'type': 'PACKAGE', 'url': 'https://github.com/async-graphql/async-graphql'}, {'typ... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T22:22:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2g86-r6w2-wqqr | 2022-07-14T21:36:29Z | 2022-07-06T00:00:30Z | null | ['CVE-2021-43116'] | Use of Hard-coded Credentials in Nacos | An Access Control vulnerability exists in Nacos 2.0.3 in the access prompt page; enter username and password, click on login to capture packets and then change the returned package, which lets a malicious user login. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba.nacos:nacos-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43116'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/issues/7127'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/issues/7182'}, {'type': 'PACKAGE', 'url': 'https://github.com/alibaba/nacos'}, {'type': 'WEB', 'url': 'http://... | {'cwe_ids': ['CWE-287', 'CWE-798'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T20:01:34Z', 'nvd_published_at': '2022-07-05T14:15:00Z'} |
1.4.0 | GHSA-pw4g-jcp5-63m9 | 2022-08-10T22:09:01Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36893'] | Jenkins rpmsign-plugin before 0.5.1 does not perform a permission check in a method implementing form validation | Jenkins rpmsign-plugin Plugin 0.5.0 and earlier does not perform a permission check in a method implementing form validation, allowing attackers with Item/Read permission but without Item/Workspace or Item/Configure permission to check whether attacker-specified file patterns match workspace contents. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rpmsign-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.5.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36893'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2403'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T22:09:01Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-q768-x9m6-m9qp | 2022-07-21T20:31:05Z | 2022-07-21T20:31:05Z | null | ['CVE-2022-31151'] | undici before v5.8.0 vulnerable to uncleared cookies on cross-host / cross-origin redirect | ### Impact
Authorization headers are already cleared on cross-origin redirect in
https://github.com/nodejs/undici/blob/main/lib/handler/redirect.js#L189, based on https://github.com/nodejs/undici/issues/872.
However, cookie headers which are sensitive headers and are official headers found in the spec, remain unclear... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'undici'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nodejs/undici/security/advisories/GHSA-q768-x9m6-m9qp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31151'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/undici/issues/872'}, {'type': 'WEB', 'url': 'https://github.com/nodejs/undici/pull/1441'}... | {'cwe_ids': ['CWE-346', 'CWE-601', 'CWE-93'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T20:31:05Z', 'nvd_published_at': '2022-07-21T04:15:00Z'} |
1.4.0 | GHSA-6rh6-x8ww-9h97 | 2022-07-29T17:38:35Z | 2022-07-21T21:38:28Z | null | ['CVE-2022-35912'] | Grails framework Remote Code Execution via Data Binding | ### Impact
A vulnerability has been discovered in the Grails data-binding logic which allows for Remote Code Execution in a Grails application. This exploit requires the application to be running on Java 8, either deployed as a WAR to a servlet container, or an executable JAR.
### Patches
Grails framework versions 5... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.grails:grails-databinding'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.10'}, {'fixed': '3.3.15'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.grails:grails-databinding'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {... | [{'type': 'WEB', 'url': 'https://github.com/grails/grails-core/security/advisories/GHSA-6rh6-x8ww-9h97'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35912'}, {'type': 'WEB', 'url': 'https://github.com/grails/grails-core/issues/12626'}, {'type': 'PACKAGE', 'url': 'https://github.com/grails/gr... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T21:38:28Z', 'nvd_published_at': '2022-07-19T16:15:00Z'} |
1.4.0 | GHSA-wr4v-3f2h-6hhh | 2022-08-06T05:18:26Z | 2022-07-26T00:01:05Z | null | ['CVE-2020-28443'] | sonar-wrapper Command Injection vulnerability | A command injection vulnerability affects all versions of package sonar-wrapper. The injection point is located in lib/sonarRunner.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'sonar-wrapper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28443'}, {'type': 'PACKAGE', 'url': 'https://github.com/llooiicc/sonar-wrapper'}, {'type': 'WEB', 'url': 'https://github.com/llooiicc/sonar-wrapper/blob/master/lib/sonarRunner.js'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SONA... | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:18:26Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-q8hg-3vqv-f8v3 | 2022-08-06T09:34:38Z | 2022-07-26T00:01:08Z | null | ['CVE-2022-2523'] | Fava vulnerable to Reflected Cross-site Scripting before v1.22.2 | Cross-site Scripting (XSS) - Reflected in GitHub repository beancount/fava prior to 1.22.2.
The `query_string` parameter of Fava is vulnerable to reflected cross-site scripting, for which a attacker can modify any information that the user is able to modify. This issue is fixed in version 1.22.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'fava'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.22.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2523'}, {'type': 'WEB', 'url': 'https://github.com/beancount/fava/commit/dccfb6a2f4567f35ce2e9a78e24f92ebf946bc9b'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-q8hg-3vqv-f8v3'}, {'type': 'PACKAGE', 'url': 'https://github.com/be... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:34:38Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-jvvx-hmmr-rhgg | 2022-12-09T18:17:52Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36902'] | Stored XSS vulnerability in Jenkins Dynamic Extended Choice Parameter plugin | Jenkins Dynamic Extended Choice Parameter Plugin 1.0.1 and earlier does not escape several fields of Moded Extended Choice parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.moded.extendedchoiceparameter:dynamic_extended_choice_parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36902'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dynamic-extended-choice-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2682'}, {'type': 'WEB', 'url': 'http://www.openwall.... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T18:17:52Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-fw3v-x4f2-v673 | 2023-08-08T21:10:31Z | 2022-07-26T00:00:27Z | null | ['CVE-2022-34749'] | Mistune vulnerable to catastrophic backtracking | In Mistune through 2.0.2, support of inline markup is implemented by using regular expressions that can involve a high amount of backtracking on certain edge cases. This behavior is commonly named catastrophic backtracking. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mistune'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34749'}, {'type': 'WEB', 'url': 'https://github.com/lepture/mistune/issues/314#issuecomment-1223972386'}, {'type': 'WEB', 'url': 'https://github.com/lepture/mistune/commit/a6d43215132fe4f3d93f8d7e90ba83b16a0838b2'}, {'type': 'WEB', 'url': 'https://... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T22:24:56Z', 'nvd_published_at': '2022-07-25T23:15:00Z'} |
1.4.0 | GHSA-vwm6-qc77-v2rh | 2022-07-19T22:30:59Z | 2022-07-11T21:00:20Z | null | ['CVE-2022-31073'] | KubeEdge Edge ServiceBus module DoS | ### Impact
The ServiceBus server on the edge side may be susceptible to a DoS attack if an HTTP request containing a very large Body is sent to it.
It is possible for the node to be exhausted of memory. The consequence of the exhaustion is that other services on the node, e.g. other containers, will be unable to alloca... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kubeedge/kubeedge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed'... | [{'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/security/advisories/GHSA-vwm6-qc77-v2rh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31073'}, {'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/pull/4038'}, {'type': 'WEB', 'url': 'https://github.com/kubeedge/kubeedge/... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-11T21:00:20Z', 'nvd_published_at': '2022-07-11T20:15:00Z'} |
1.4.0 | GHSA-9339-86wc-4qgf | 2023-04-12T21:01:45Z | 2022-07-20T00:00:18Z | null | ['CVE-2022-34169'] | Apache Xalan Java XSLT library integer truncation issue when processing malicious XSLT stylesheets | The Apache Xalan Java XSLT library is vulnerable to an integer truncation issue when processing malicious XSLT stylesheets. This can be used to corrupt Java class files generated by the internal XSLTC compiler and execute arbitrary Java bytecode.
A fix for this issue was published in September 2022 as part of an antic... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'xalan:xalan'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34169'}, {'type': 'PACKAGE', 'url': 'https://gitbox.apache.org/repos/asf?p=xalan-java.git'}, {'type': 'WEB', 'url': 'https://gitbox.apache.org/repos/asf?p=xalan-java.git;a=commit;h=2e60d0a9a5b822c4abf9051857973b1c6babfe81'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-681'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T22:28:36Z', 'nvd_published_at': '2022-07-19T18:15:00Z'} |
1.4.0 | GHSA-cj88-88mr-972w | 2023-01-06T03:13:53Z | 2022-07-18T17:03:23Z | null | ['CVE-2021-35065'] | glob-parent 6.0.0 vulnerable to Regular Expression Denial of Service | glob-parent 6.0.0 is vulnerable to Regular Expression Denial of Service (ReDoS). This issue is fixed in version 6.0.1.
This vulnerability is separate from [GHSA-ww39-953v-wcq6](https://github.com/advisories/GHSA-ww39-953v-wcq6). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'glob-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.1'}]}], 'versions': ['6.0.0']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-35065'}, {'type': 'WEB', 'url': 'https://github.com/opensearch-project/OpenSearch-Dashboards/issues/1103'}, {'type': 'WEB', 'url': 'https://github.com/gulpjs/glob-parent/pull/49'}, {'type': 'WEB', 'url': 'https://github.com/gulpjs/glob-parent/commi... | {'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-18T17:03:23Z', 'nvd_published_at': '2022-12-26T07:15:00Z'} |
1.4.0 | GHSA-hm53-hrhh-gwfq | 2022-12-13T14:04:44Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36912'] | Missing permission checks in Jenkins openstack-heat Plugin | openstack-heat Plugin 1.5 and earlier does not perform permission checks in methods implementing form validation.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:openstack-heat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36912'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/openstack-heat-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2105%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T14:48:02Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-7rrx-375m-j6cr | 2022-12-12T19:54:35Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34795'] | Cross-site Scripting in Jenkins Deployment Dashboard Plugin | Jenkins Deployment Dashboard Plugin 1.0.10 and earlier does not escape environment names on its Deployment Dashboard view, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ec2-deployment-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34795'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ec2-deployment-dashboard'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2799'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T20:39:46Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-j33r-cgm6-pv48 | 2022-12-12T19:53:23Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34794'] | Missing Authorization in Jenkins Recipe Plugin | Missing permission checks in Jenkins Recipe Plugin 1.2 and earlier allow attackers with Overall/Read permission to send an HTTP request to an attacker-specified URL and parse the response as XML.
Additionally, the plugin allows users to export the full configuration of jobs as part of a recipe, granting access to job ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:recipe'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34794'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/recipe-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2000'}] | {'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T20:38:27Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-h7pf-h58r-mv93 | 2022-12-12T21:33:52Z | 2022-07-01T00:01:07Z | null | ['CVE-2022-34780'] | CSRF vulnerability in Jenkins XebiaLabs XL Release Plugin allow capturing credentials | XebiaLabs XL Release Plugin 22.0.0 and earlier does not perform permission checks in methods implementing form validation.
This allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials s... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.xebialabs.ci:xlrelease-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 22.0.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34780'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xlrelease-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2773%20(2)'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T21:33:52Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-57f2-52wj-7vj6 | 2022-12-09T18:16:57Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36899'] | Agent-to-controller security bypass in Jenkins BMC Compuware ISPW Operations plugin | BMC Compuware ISPW Operations Plugin defines a controller/agent message that retrieves Java system properties. BMC Compuware ISPW Operations Plugin 1.0.8 and earlier does not restrict execution of the controller/agent message to agents. This allows attackers able to control agent processes to retrieve Java system prope... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-ispw-operations'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.9'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.8'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36899'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/compuware-ispw-operations-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2629'}, {'type': 'WEB', 'url': 'http://www.openwall.com/list... | {'cwe_ids': ['CWE-693'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:19:33Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-64x4-9hc6-r2h6 | 2022-07-21T22:35:57Z | 2022-07-13T00:00:39Z | null | ['CVE-2022-30187'] | Microsoft: CBC Padding Oracle in Azure Blob Storage Encryption Library | ### Summary
The Azure Storage Encryption library in Java and other languages is vulnerable to a CBC Padding Oracle attack, similar to CVE-2020-8911. The library is not vulnerable to the equivalent of CVE-2020-8912, but only because it currently only supports AES-CBC as encryption mode.
### Severity
Moderate - The v... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Azure.Storage.Queues'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.11.0'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Azure.Storage.Blobs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.13.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/google/security-research/security/advisories/GHSA-6m8q-r22q-vfxh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-30187'}, {'type': 'WEB', 'url': 'https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30187'}, {'type': 'WEB', 'url': 'https://... | {'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T22:35:57Z', 'nvd_published_at': '2022-07-12T23:15:00Z'} |
1.4.0 | GHSA-wgmr-mf83-7x4j | 2022-07-19T19:42:51Z | 2022-07-07T20:55:40Z | null | ['CVE-2022-2048'] | Jetty vulnerable to Invalid HTTP/2 requests that can lead to denial of service | ### Description
Invalid HTTP/2 requests (for example, invalid URIs) are incorrectly handled by writing a blocking error response directly from the selector thread.
If the client manages to exhaust the HTTP/2 flow control window, or TCP congest the connection, the selector thread will be blocked trying to write the erro... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty.http2:http2-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.4.47'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.jetty.http2:http2-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1... | [{'type': 'WEB', 'url': 'https://github.com/eclipse/jetty.project/security/advisories/GHSA-wgmr-mf83-7x4j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2048'}, {'type': 'PACKAGE', 'url': 'https://github.com/eclipse/jetty.project'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-... | {'cwe_ids': ['CWE-400', 'CWE-410'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-07T20:55:40Z', 'nvd_published_at': '2022-07-07T21:15:00Z'} |
1.4.0 | GHSA-ffmh-x56j-9rc3 | 2022-07-22T16:34:21Z | 2022-07-05T22:56:58Z | null | ['CVE-2022-31147'] | jquery-validation Regular Expression Denial of Service due to arbitrary input to url2 method | Summary
Incomplete fix of CVE-2021-43306: An exponential ReDoS (Regular Expression Denial of Service) can be triggered in the jquery-validation npm package, when an attacker is able to supply arbitrary input to the url2 method. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'jquery-validation'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jquery-validation/jquery-validation/security/advisories/GHSA-ffmh-x56j-9rc3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31147'}, {'type': 'WEB', 'url': 'https://github.com/jquery-validation/jquery-validation/commit/5bbd80d27fc6b607d2f7f106c895220... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-05T22:56:58Z', 'nvd_published_at': '2022-07-14T20:15:00Z'} |
1.4.0 | GHSA-xg72-6c83-ghh4 | 2022-07-29T22:27:38Z | 2022-07-23T00:00:25Z | null | ['CVE-2022-2495'] | Microweber Stored Cross-site Scripting before v1.2.20 | Microwerber prior to version 1.2.20 is vulnerable to stored Cross-site Scripting (XSS). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2495'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/d35e691e72d358430abc8e99f5ba9eb374423b9f'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T22:27:38Z', 'nvd_published_at': '2022-07-22T04:15:00Z'} |
1.4.0 | GHSA-4vm8-j95f-j6v5 | 2022-08-06T09:34:01Z | 2022-07-14T00:00:16Z | null | ['CVE-2022-32114'] | Strapi 4.1.12 Cross-site Scripting via crafted file | An unrestricted file upload vulnerability in the Add New Assets function of Strapi v4.1.12 allows attackers to execute arbitrary code via a crafted file. After an authenticated attacker uploads a file containing a malicious URL, a victim copies and pastes the malicious URL into a new tab to receive the XSS payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@strapi/strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.1.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32114'}, {'type': 'WEB', 'url': 'https://github.com/bypazs/strapi'}, {'type': 'PACKAGE', 'url': 'https://github.com/strapi/strapi'}, {'type': 'WEB', 'url': 'https://grimthereaperteam.medium.com/strapi-v4-1-12-unrestricted-file-upload-b993bfd07e4e'}... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:34:01Z', 'nvd_published_at': '2022-07-13T21:15:00Z'} |
1.4.0 | GHSA-qwrj-9hmp-gpxh | 2023-02-09T20:22:10Z | 2022-07-15T18:10:48Z | null | ['CVE-2022-31145'] | FlyteAdmin Insufficient AccessToken Expiration Check | ### Impact
Authenticated users using an external identity provider can continue to use Access Tokens and ID Tokens even after they expire.
Using flyteadmin as the OAuth2 Authorization Server is unaffected by this issue.
### Patches
1.1.30
### Workarounds
Rotating signing keys immediately will:
* Invalidate all open s... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/flyteorg/flyteadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.31'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/flyteorg/flyteadmin/security/advisories/GHSA-qwrj-9hmp-gpxh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31145'}, {'type': 'WEB', 'url': 'https://github.com/flyteorg/flyteadmin/pull/455'}, {'type': 'WEB', 'url': 'https://github.com/flyteorg/flytea... | {'cwe_ids': ['CWE-298', 'CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T18:10:48Z', 'nvd_published_at': '2022-07-13T21:15:00Z'} |
1.4.0 | GHSA-crrq-vr9j-fxxh | 2022-07-06T19:52:23Z | 2022-07-06T19:52:23Z | null | ['CVE-2022-31112'] | Protected fields exposed via LiveQuery | ### Impact
Parse Server LiveQuery does not remove protected fields in classes, passing them to the client.
### Patches
The LiveQueryController now removes protected fields from the client response.
### Workarounds
Use `Parse.Cloud.afterLiveQueryEvent` to manually remove protected fields.
### References
- https://gi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.13'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-crrq-vr9j-fxxh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31112'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/issues/8073'}, {'type': 'WEB', 'url': 'https://githu... | {'cwe_ids': ['CWE-200', 'CWE-212'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:52:23Z', 'nvd_published_at': '2022-06-30T17:15:00Z'} |
1.4.0 | GHSA-xqcf-hj92-967m | 2023-07-25T20:00:40Z | 2022-07-24T00:00:33Z | null | ['CVE-2018-25045'] | Django REST framework XSS Vulnerability | Django REST framework (aka django-rest-framework) before 3.9.1 allows XSS because the default DRF Browsable API view templates disable autoescaping. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-rest-framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25045'}, {'type': 'WEB', 'url': 'https://github.com/encode/django-rest-framework/pull/6191'}, {'type': 'WEB', 'url': 'https://github.com/encode/django-rest-framework/pull/6330'}, {'type': 'WEB', 'url': 'https://github.com/encode/django-rest-framewo... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-25T20:00:40Z', 'nvd_published_at': '2022-07-23T02:15:00Z'} |
1.4.0 | GHSA-rpxg-hg79-h8q9 | 2022-07-29T18:05:47Z | 2022-07-15T15:28:26Z | null | ['CVE-2022-35628'] | SQL Injection in typo3 extension "LUX - TYPO3 Marketing Automation" | A SQL injection issue was discovered in the lux extension before 17.6.1, and 18.x through 24.x before 24.0.2, for TYPO3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'in2code/lux'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '18.0.0'}, {'fixed': '24.0.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'in2code/lux'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '17.6.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35628'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/in2code/lux/CVE-2022-35628.yaml'}, {'type': 'WEB', 'url': 'https://typo3.org/security/advisory/typo3-ext-sa-2022-014'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T15:28:26Z', 'nvd_published_at': '2022-07-12T23:15:00Z'} |
1.4.0 | GHSA-32ff-4g79-vgfc | 2022-08-10T23:50:57Z | 2022-07-29T22:28:12Z | null | ['CVE-2022-31177'] | Flask-AppBuilder before v4.1.3 allows inference of sensitive information through query strings | ### Impact
An authenticated Admin user could craft HTTP requests to filter users by their salted and hashed passwords strings. These filters could be made by using partial hashed password strings. The response would not include the hashed passwords, but an attacker could infer partial password hashes and their respecti... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Flask-AppBuilder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-32ff-4g79-vgfc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31177'}, {'type': 'PACKAGE', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar... | {'cwe_ids': ['CWE-200', 'CWE-916'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-29T22:28:12Z', 'nvd_published_at': '2022-08-01T19:15:00Z'} |
1.4.0 | GHSA-477v-w82m-634j | 2023-08-29T17:58:25Z | 2022-07-16T00:00:20Z | null | ['CVE-2022-25891'] | Shoutrrr util package DoS via sending 2000, 4000, or 6000 character messages | The package `github.com/containrrr/shoutrrr/pkg/util` before 0.6.0 are vulnerable to Denial of Service (DoS) via the `util.PartitionMessage` function. Exploiting this vulnerability is possible by sending exactly 2000, 4000, or 6000 characters messages. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/containrrr/shoutrrr'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25891'}, {'type': 'WEB', 'url': 'https://github.com/containrrr/shoutrrr/issues/240'}, {'type': 'WEB', 'url': 'https://github.com/containrrr/shoutrrr/pull/242'}, {'type': 'WEB', 'url': 'https://github.com/containrrr/shoutrrr/commit/6a27056f9d7522a8b... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T02:45:42Z', 'nvd_published_at': '2022-07-15T20:15:00Z'} |
1.4.0 | GHSA-42m6-g935-5vmq | 2022-08-11T22:04:47Z | 2022-07-26T00:01:05Z | null | ['CVE-2021-23397'] | @ianwalter/merge Prototype Pollution via `merge` function | All versions of package @ianwalter/merge are vulnerable to Prototype Pollution via the main (`merge`) function. @ianwalter/merge is [deprecated](https://github.com/ianwalter/merge/blob/master/README.md) and the maintainer suggests using [@generates/merger](https://github.com/generates/generates/tree/main/packages/merge... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': '@ianwalter/merge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '9.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23397'}, {'type': 'PACKAGE', 'url': 'https://github.com/ianwalter/merge'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-IANWALTERMERGE-1311022'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-26T19:37:36Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-7f6x-jwh5-m9r4 | 2022-07-21T22:34:38Z | 2022-07-21T22:34:38Z | null | ['CVE-2022-31169'] | Cranelift vulnerable to miscompilation of constant values in division on AArch64 | ### Impact
There was a bug in Wasmtime's code generator, Cranelift, for AArch64 targets where constant divisors could result in incorrect division results at runtime. The translation rules for constants did not take into account whether sign- or zero-extension should happen, which resulted in an incorrect value being ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'wasmtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.38.2'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'cranelift-codegen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.85.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/security/advisories/GHSA-7f6x-jwh5-m9r4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31169'}, {'type': 'WEB', 'url': 'https://github.com/bytecodealliance/wasmtime/commit/2ba4bce5cc719e5a74e571a534424614e62ecc41'}, {'type'... | {'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T22:34:38Z', 'nvd_published_at': '2022-07-22T04:15:00Z'} |
1.4.0 | GHSA-8gpg-466c-5cpj | 2022-08-06T09:39:04Z | 2022-07-19T00:00:27Z | null | ['CVE-2022-36127'] | Apache SkyWalking NodeJS Agent can lose availability if header includes illegal SkyWalking header | A vulnerability in Apache SkyWalking NodeJS Agent prior to 0.5.1. The vulnerability will cause NodeJS services that has this agent installed to be unavailable if the OAP is unhealthy and NodeJS agent can't establish the connection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'skywalking-backend-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36127'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/skywalking-nodejs'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/x238wo4r5goy39dxdjcmlofp6gcdnqr3'}, {'type': 'WEB', 'url': 'https://skywalking.apache.org/events/release-apa... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:39:04Z', 'nvd_published_at': '2022-07-18T12:15:00Z'} |
1.4.0 | GHSA-fqhm-fjjv-7q8x | 2022-12-13T13:57:33Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36911'] | CSRF vulnerability in Jenkins openstack-heat Plugin | openstack-heat Plugin 1.5 and earlier does not perform permission checks in methods implementing form validation.
This form validation methods do not require POST requests, resulting in a cross-site request forgery (CSRF) vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:openstack-heat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36911'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/openstack-heat-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2105%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T17:27:09Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-hwqr-f3v9-hwxr | 2022-07-15T21:56:08Z | 2022-07-15T21:56:08Z | null | [] | Workers for local Dask clusters mistakenly listened on public interfaces | Versions of `distributed` earlier than `2021.10.0` had a potential security vulnerability relating to single-machine Dask clusters.
Clusters started with `dask.distributed.LocalCluster` or `dask.distributed.Client()` (which defaults to using `LocalCluster`) would mistakenly configure their respective Dask workers to l... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'distributed'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2021.10.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/dask/distributed/security/advisories/GHSA-hwqr-f3v9-hwxr'}, {'type': 'WEB', 'url': 'https://docs.dask.org/en/latest/changelog.html'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-j8fq-86c5-5v2r'}, {'type': 'WEB', 'url': 'https://github.com/dask/dask/tags'},... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T21:56:08Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gvmr-mp5q-9wvw | 2022-12-09T04:54:35Z | 2022-07-01T00:01:08Z | null | ['CVE-2022-34805'] | Plaintext Storage of a Password in Jenkins Skype notifier Plugin | Skype notifier Plugin 1.1.0 and earlier stores a password unencrypted in its global configuration file `hudson.plugins.skype.im.transport.SkypePublisher.xml` on the Jenkins controller as part of its configuration. This password can be viewed by users with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:skype-notifier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34805'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/skype-im-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2160'}] | {'cwe_ids': ['CWE-256'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T15:42:18Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-g688-7j3c-h9f3 | 2022-07-20T00:02:47Z | 2022-07-09T00:00:26Z | null | ['CVE-2022-31290'] | Known v1.3.1 Cross-site Scripting | A cross-site scripting (XSS) vulnerability in Known v1.3.1 allows authenticated attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Your Name text field.
The researcher report indicates that versions 1.3.1 and prior are vulnerable. Version 1.2.2 is the last version tagged on GitH... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'idno/known'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31290'}, {'type': 'WEB', 'url': 'https://blog.jitendrapatro.me/multiple-vulnerabilities-in-idno-known-php-cms-software/'}, {'type': 'PACKAGE', 'url': 'https://github.com/idno/known'}, {'type': 'WEB', 'url': 'https://withknown.com/'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T00:02:47Z', 'nvd_published_at': '2022-07-08T12:15:00Z'} |
1.4.0 | GHSA-5xp2-7qfc-fwgc | 2022-08-10T18:20:38Z | 2022-07-28T00:00:42Z | null | ['CVE-2022-36900'] | Jenkins Compuware zAdviser API Plugin before 1.0.4 vulnerable to protection mechanism failure | Jenkins Compuware zAdviser API Plugin 1.0.3 and earlier does not restrict execution of a controller/agent message to agents, allowing attackers able to control agent processes to retrieve Java system properties. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-zadviser-api'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36900'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2630'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-693'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:20:38Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-prc3-vjfx-vhm9 | 2023-09-08T21:19:38Z | 2022-07-16T00:00:20Z | null | ['CVE-2022-25869'] | Angular (deprecated package) Cross-site Scripting | All versions of package angular are vulnerable to Cross-site Scripting (XSS) due to insecure page caching in the Internet Explorer browser, which allows interpolation of `<textarea>` elements.
NPM package [angular](https://www.npmjs.com/package/angular) is deprecated. Those who want to receive security updates should ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'angular'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25869'}, {'type': 'WEB', 'url': 'https://glitch.com/edit/%23%21/angular-repro-textarea-xss'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWER-2949783'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-ORGWEBJARSBOWERGI... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-20T00:41:18Z', 'nvd_published_at': '2022-07-15T20:15:00Z'} |
1.4.0 | GHSA-qhmj-29vh-8mjm | 2022-12-12T20:19:46Z | 2022-07-01T00:01:08Z | null | ['CVE-2022-34814'] | Incorrect Authorization in Jenkins Request Rename Or Delete Plugin | Jenkins Request Rename Or Delete Plugin 1.1.0 and earlier does not correctly perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to view an administrative configuration page listing pending requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rrod'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34814'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rrod-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-1996'}] | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:16:57Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-5p73-qg2v-383h | 2022-07-19T18:26:48Z | 2022-07-15T20:55:50Z | null | ['CVE-2022-31158'] | LTI 1.3 Tool Library's Nonce Claim Value not validated against nonce value sent in Authentication Request before v5.0 | ### Impact
Nonce Claim Value was not being validated against the nonce value sent in the Authentication Request.
### Patches
Users should upgrade to version 5.0 immediately
### Workarounds
None.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'packbackbooks/lti-1-3-php-library'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/packbackbooks/lti-1-3-php-library/security/advisories/GHSA-5p73-qg2v-383h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31158'}, {'type': 'PACKAGE', 'url': 'https://github.com/packbackbooks/lti-1-3-php-library'}, {'type': 'WEB', 'url': 'https://ope... | {'cwe_ids': ['CWE-294', 'CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T20:55:50Z', 'nvd_published_at': '2022-07-15T18:15:00Z'} |
1.4.0 | GHSA-2m4x-4q9j-w97g | 2022-07-13T20:04:43Z | 2022-07-01T00:01:03Z | null | ['CVE-2022-33082'] | Denial of service in Open Policy Agent | An issue in the AST parser (ast/compile.go) of Open Policy Agent v0.10.2 allows attackers to cause a Denial of Service (DoS) via a crafted input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/open-policy-agent/opa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.42.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33082'}, {'type': 'WEB', 'url': 'https://github.com/open-policy-agent/opa/issues/4761'}, {'type': 'WEB', 'url': 'https://github.com/open-policy-agent/opa/issues/4762'}, {'type': 'WEB', 'url': 'https://github.com/open-policy-agent/opa/pull/4701'}, {... | {'cwe_ids': ['CWE-703'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-06T19:52:00Z', 'nvd_published_at': '2022-06-30T22:15:00Z'} |
1.4.0 | GHSA-vqgr-mfxm-47f3 | 2022-08-06T05:19:14Z | 2022-07-26T00:01:06Z | null | ['CVE-2020-28422'] | git-archive vulnerable to Command Injection via exports function | All versions of package git-archive are vulnerable to Command Injection via the exports function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'git-archive'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28422'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-GITARCHIVE-1050391'}] | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T05:19:14Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-5834-xv5q-cgfw | 2022-08-11T16:34:49Z | 2022-07-27T22:06:09Z | null | ['CVE-2022-31148'] | Shopware vulnerable to persistent cross site scripting (XSS) in customer module | ### Impact
Persistent XSS in customer module
### Patches
We recommend updating to the current version 5.7.14. You can get the update to 5.7.14 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag575294366635f/shop... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.7.0'}, {'fixed': '5.7.14'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.7.13'}}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-5834-xv5q-cgfw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31148'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/7875855005648fba7b39371a70816afae2e07daf'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-27T22:06:09Z', 'nvd_published_at': '2022-08-01T17:15:00Z'} |
1.4.0 | GHSA-v878-67xw-grw2 | 2022-12-09T21:10:20Z | 2022-07-28T00:00:43Z | null | ['CVE-2022-36883'] | Lack of authentication mechanism in Jenkins Git Plugin webhook | Git Plugin provides a webhook endpoint at `/git/notifyCommit` that can be used to notify Jenkins of changes to an SCM repository. For its most basic functionality, this endpoint receives a repository URL, and Jenkins will schedule polling for all jobs configured with the specified repository. In Git Plugin 4.11.3 and e... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.11.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36883'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/git-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-284'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-10T18:25:32Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-589f-c66p-hxr4 | 2022-08-06T09:34:28Z | 2022-07-26T00:01:08Z | null | ['CVE-2022-21802'] | grapesjs before 0.19.5 vulnerable to Cross-site Scripting | The package grapesjs before 0.19.5 is vulnerable to Cross-site Scripting (XSS) due to an improper sanitization of the class name in Selector Manager. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'grapesjs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.19.5'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21802'}, {'type': 'WEB', 'url': 'https://github.com/artf/grapesjs/issues/4411%23issuecomment-1167202709'}, {'type': 'WEB', 'url': 'https://github.com/artf/grapesjs/commit/13e85d152d486b968265c4b8017e8901e7d89ff3'}, {'type': 'PACKAGE', 'url': 'https... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:34:28Z', 'nvd_published_at': '2022-07-25T14:15:00Z'} |
1.4.0 | GHSA-jwvf-28fg-g4xg | 2022-07-21T21:40:20Z | 2022-07-18T00:00:33Z | null | ['CVE-2022-2099'] | WooCommerce WordPress plugin before 6.6.0 vulnerable to stored HTML injection | The WooCommerce WordPress plugin before 6.6.0 is vulnerable to stored HTML injection due to lack of escaping and sanitizing in the payment gateway titles | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'woocommerce/woocommerce'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2099'}, {'type': 'PACKAGE', 'url': 'https://github.com/woocommerce/woocommerce'}, {'type': 'WEB', 'url': 'https://wpscan.com/vulnerability/0316e5f3-3302-40e3-8ff4-be3423a3be7b'}] | {'cwe_ids': ['CWE-116', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T21:40:20Z', 'nvd_published_at': '2022-07-17T11:15:00Z'} |
1.4.0 | GHSA-rqph-25q9-9jhp | 2022-07-15T18:35:26Z | 2022-07-08T00:00:48Z | null | ['CVE-2015-3207'] | Insecure cookies in Openshift Origin | In Openshift Origin the cookies being set in console have no 'secure', 'HttpOnly' attributes. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/openshift/origin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-3207'}, {'type': 'WEB', 'url': 'https://github.com/openshift/origin/pull/2261'}, {'type': 'WEB', 'url': 'https://github.com/openshift/origin/pull/2291'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1221882'}] | {'cwe_ids': ['CWE-311', 'CWE-614'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-08T19:20:02Z', 'nvd_published_at': '2022-07-07T13:15:00Z'} |
1.4.0 | GHSA-5cm2-9h8c-rvfx | 2022-08-10T23:48:58Z | 2022-07-21T21:39:29Z | null | ['CVE-2022-31163'] | TZInfo relative path traversal vulnerability allows loading of arbitrary files | ### Impact
#### Affected versions
- 0.3.60 and earlier.
- 1.0.0 to 1.2.9 when used with the Ruby data source (tzinfo-data).
#### Vulnerability
With the Ruby data source (the tzinfo-data gem for tzinfo version 1.0.0 and later and built-in to earlier versions), time zones are defined in Ruby files. There is one ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'tzinfo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.61'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'tzinfo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.10'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tzinfo/tzinfo/security/advisories/GHSA-5cm2-9h8c-rvfx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31163'}, {'type': 'WEB', 'url': 'https://github.com/tzinfo/tzinfo/commit/9905ca93abf7bf3e387bd592406e403cd18334c7'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-22', 'CWE-23'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-07-21T21:39:29Z', 'nvd_published_at': '2022-07-22T04:15:00Z'} |
1.4.0 | GHSA-q37h-jhf3-85cj | 2022-07-15T21:37:28Z | 2022-07-15T21:37:28Z | null | [] | Bypass of CMS Safe Mode Security Feature | ### Impact
Authenticated users with permissions to create or modify theme template objects through the backend "CMS" editor can exploit this vulnerability to bypass the `cms.enableSafeMode` security feature if enabled (disables modification of PHP code through the web interface when enabled).
This is only an issue fo... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'wintercms/winter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.475'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'wintercms/winter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/wintercms/winter/security/advisories/GHSA-q37h-jhf3-85cj'}, {'type': 'PACKAGE', 'url': 'https://github.com/wintercms/winter'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-15T21:37:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6x63-hrxg-2hjx | 2022-08-11T15:15:03Z | 2022-07-28T00:00:43Z | null | ['CVE-2022-36886'] | External Monitor Job Type Plugin does not require POST requests for an HTTP endpoint | A cross-site request forgery (CSRF) vulnerability in Jenkins External Monitor Job Type Plugin 191.v363d0d1efdf8 and earlier allows attackers to create runs of an external job. This can lead to Cross-Site Request Forgery (CSRF). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:external-monitor-job'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '192.ve979ca_8b_3ccd'}]}], 'database_specific': {'last_known_affected_version_range': '<= 191.v363d0d1efdf8'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36886'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-07-27/#SECURITY-2762'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/07/27/1'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-08-11T15:15:03Z', 'nvd_published_at': '2022-07-27T15:15:00Z'} |
1.4.0 | GHSA-vjmr-6pmm-rprf | 2022-08-06T09:37:44Z | 2022-07-23T00:00:15Z | null | ['CVE-2022-34115'] | Dataease v1.11.1 SQL Injection via parameter dataSourceId | Dataease v1.11.1 was discovered to contain a SQL injection vulnerability via the parameter `dataSourceId`. Version 1.11.2 contains a fix. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.dataease:dataease-plugin-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34115'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/issues/2428'}, {'type': 'PACKAGE', 'url': 'https://github.com/dataease/dataease'}, {'type': 'WEB', 'url': 'https://github.com/dataease/dataease/releases/tag/v1.11.2'}] | {'cwe_ids': ['CWE-434', 'CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-08-06T09:37:44Z', 'nvd_published_at': '2022-07-22T23:15:00Z'} |
1.4.0 | GHSA-9wqr-9787-p4rf | 2022-07-19T18:31:21Z | 2022-07-12T00:00:57Z | null | ['CVE-2022-2368'] | Microweber before 1.2.21 allows attacker to bypass IP detection to brute-force password | In the login API, an IP address will by default be blocked when the user tries to login incorrectly more than 5 times. However, a bypass to this mechanism is possible by abusing a X-Forwarded-For header to bypass IP detection and perform a password brute-force. A patch for this issue is available in Microweber version ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.21'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2368'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/53c000ccd5602536e28b15d9630eb8261b04a302'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a... | {'cwe_ids': ['CWE-290'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-13T15:47:17Z', 'nvd_published_at': '2022-07-11T08:15:00Z'} |
1.4.0 | GHSA-3q7f-w8fr-368v | 2022-12-09T04:46:09Z | 2022-07-01T00:01:08Z | null | ['CVE-2022-34812'] | Cross-Site Request Forgery in Jenkins XPath Configuration Viewer Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins XPath Configuration Viewer Plugin 1.1.1 and earlier allows attackers to create and delete XPath expressions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xpath-config-viewer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34812'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/xpath-config-viewer-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-06-30/#SECURITY-2658'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-07-12T18:17:47Z', 'nvd_published_at': '2022-06-30T18:15:00Z'} |
1.4.0 | GHSA-cpm5-cqr9-7p79 | 2022-12-09T20:01:45Z | 2022-09-22T00:00:26Z | null | ['CVE-2022-41248'] | Jenkins BigPanda Notifier Plugin Missing Password Field Masking | BigPanda Notifier Plugin 1.4.0 and earlier stores the BigPanda API key unencrypted in its global configuration file `BigpandaGlobalNotifier.xml` on the Jenkins controller as part of its configuration.
This API key can be viewed by users with access to the Jenkins controller file system.
Additionally, the global confi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:bigpanda-jenkins'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41248'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/bigpanda-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2243'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20... | {'cwe_ids': ['CWE-549'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:18:08Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.