schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-x27m-9w8j-5vcw
2023-01-02T21:50:43Z
2022-09-17T00:00:41Z
null
['CVE-2022-40150']
Jettison memory exhaustion
Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by Out of memory. This effect may support a denial of service attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.jettison:jettison'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40150'}, {'type': 'WEB', 'url': 'https://github.com/jettison-json/jettison/issues/45'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46549'}, {'type': 'PACKAGE', 'url': 'https://github.com/jettison-json/jettison'}, ...
{'cwe_ids': ['CWE-400', 'CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:20:42Z', 'nvd_published_at': '2022-09-16T10:15:00Z'}
1.4.0
GHSA-r48r-j8fx-mq2c
2022-10-03T19:46:42Z
2022-09-30T00:41:24Z
null
['CVE-2022-39251']
matrix-js-sdk subject to user spoofing via Olm/Megolm protocol confusion
### Impact An attacker cooperating with a malicious homeserver can construct messages that legitimately appear to have come from another person, without any indication such as a grey shield. Additionally, a sophisticated attacker cooperating with a malicious homeserver could employ this vulnerability to perform a tar...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'matrix-js-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.7.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-r48r-j8fx-mq2c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39251'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76'}, {'type': ...
{'cwe_ids': ['CWE-287', 'CWE-322'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T00:41:24Z', 'nvd_published_at': '2022-09-28T20:15:00Z'}
1.4.0
GHSA-9jjv-524m-jm98
2022-09-28T03:32:53Z
2022-09-21T21:42:01Z
null
['CVE-2022-39239']
@netlify/ipx vulnerable to Full Response SSRF and Stored XSS via Cache Poisoning and Improper Host Validation
### Impact By sending specially crafted headers an attacker can bypass the source image domain allowlist, causing the handler to load and return arbitrary images. Because the response is cached globally, this image will then be served to visitors without requiring those headers to be set. XSS can be achieved by reques...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@netlify/ipx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/netlify/netlify-ipx/security/advisories/GHSA-9jjv-524m-jm98'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39239'}, {'type': 'WEB', 'url': 'https://github.com/netlify/netlify-ipx/pull/61'}, {'type': 'WEB', 'url': 'https://github.com/netlify/netlify-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:42:01Z', 'nvd_published_at': '2022-09-23T08:15:00Z'}
1.4.0
GHSA-936v-cg49-m2g5
2022-09-15T03:33:26Z
2022-09-09T00:00:57Z
null
['CVE-2022-25914']
com.google.cloud.tools:jib-core vulnerable to Remote Code Execution (RCE)
The package com.google.cloud.tools:jib-core before 0.22.0 are vulnerable to Remote Code Execution (RCE) via the isDockerInstalled function, due to attempting to execute input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.google.cloud.tools:jib-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.22.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25914'}, {'type': 'WEB', 'url': 'https://github.com/GoogleContainerTools/jib/pull/3744'}, {'type': 'WEB', 'url': 'https://github.com/GoogleContainerTools/jib/commit/67fa40bc2c484da0546333914ea07a89fe44eaaf'}, {'type': 'PACKAGE', 'url': 'https://git...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:33:26Z', 'nvd_published_at': '2022-09-08T05:15:00Z'}
1.4.0
GHSA-xr6m-2p4m-jvqf
2022-09-16T17:22:28Z
2022-09-16T17:22:28Z
null
['CVE-2022-36099']
XWiki Platform Wiki UI Main Wiki Eval Injection vulnerability
### Impact It's possible to inject arbitrary wiki syntax including Groovy, Python and Velocity script macros via the request (URL parameter) using the `XWikiServerClassSheet` if the user has view access to this sheet and another page that has been saved with programming rights, a standard condition on a public read-onl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-wiki-ui-mainwiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3-milestone-2'}, {'fixed': '13.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-wiki-ui-mainwiki'}, 'ranges': [{'type'...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xr6m-2p4m-jvqf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36099'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/fc77f9f53bc65a4a9bfae3d5686615309c0c76cc'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-116', 'CWE-94', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:22:28Z', 'nvd_published_at': '2022-09-08T21:15:00Z'}
1.4.0
GHSA-p7hr-f446-x6qf
2022-09-19T19:10:21Z
2022-09-16T19:25:36Z
null
['CVE-2022-35997']
TensorFlow vulnerable to `CHECK` fail in `tf.sparse.cross`
### Impact If `tf.sparse.cross` receives an input `separator` that is not a scalar, it gives a `CHECK` fail that can be used to trigger a denial of service attack. ```python import tensorflow as tf tf.sparse.cross(inputs=[],name='a',separator=tf.constant(['a', 'b'],dtype=tf.string)) ``` ### Patches We have patched th...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p7hr-f446-x6qf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35997'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/83dcb4dbfa094e33db084e97c4d0531a559e0ebf'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:25:36Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-8f8g-9j73-7p82
2022-09-21T21:07:43Z
2022-09-16T00:00:36Z
null
['CVE-2022-37264']
steal vulnerable to Prototype Pollution via optionName variable
Prototype pollution vulnerability in stealjs steal 2.2.4 via the optionName variable in main.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'steal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37264'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/issues/1533'}, {'type': 'PACKAGE', 'url': 'https://github.com/stealjs/steal'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:07:43Z', 'nvd_published_at': '2022-09-15T16:15:00Z'}
1.4.0
GHSA-q8h9-pqcx-59hw
2022-09-16T17:13:45Z
2022-09-03T00:00:25Z
null
['CVE-2022-38170']
Apache Airflow exposes arbitrary file content
In Apache Airflow prior to 2.3.4, an insecure umask was configured for numerous Airflow components when running with the `--daemon` flag which could result in a race condition giving world-writable files in the Airflow home directory and allowing local users to expose arbitrary file contents via the webserver.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38170'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2022-261.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/threa...
{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:13:45Z', 'nvd_published_at': '2022-09-02T07:15:00Z'}
1.4.0
GHSA-phr4-94xx-259m
2022-12-06T15:43:14Z
2022-09-22T00:00:28Z
null
['CVE-2022-41232']
Jenkins build-publisher plugin vulnerable to cross-site request forgery
A cross-site request forgery (CSRF) vulnerability in Jenkins Build-Publisher Plugin 1.22 and earlier allows attackers to replace any `config.xml` file on the Jenkins controller file system with an empty file by providing a crafted file name to an API endpoint. There is currently no workaround or patch as this plugin ha...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:build-publisher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41232'}, {'type': 'WEB', 'url': 'https://github.com/jenkins-infra/update-center2/pull/644'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2139'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T15:43:14Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-p5hr-rf6w-3vvh
2022-12-12T13:00:14Z
2022-09-22T00:00:28Z
null
['CVE-2022-41246']
CSRF vulnerability and mM
Worksoft Execution Manager Plugin 10.0.3.503 and earlier does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentia...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ws-execution-manager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '10.0.3.503'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41246'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ws-execution-manager-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2237'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T13:00:14Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-83qx-288m-72w4
2022-09-23T21:00:25Z
2022-09-23T00:00:46Z
null
['CVE-2022-39975']
Liferay Portal Missing Authorization vulnerability
The Layout module in Liferay Portal v7.3.3 through v7.4.3.34, and Liferay DXP 7.3 before update 10, and 7.4 before update 35 does not check user permission before showing the preview of a "Content Page" type page, allowing attackers to view unpublished "Content Page" pages via URL manipulation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.3.3'}, {'fixed': '7.4.3.35'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39975'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-39975'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T21:00:25Z', 'nvd_published_at': '2022-09-22T00:15:00Z'}
1.4.0
GHSA-6cvr-rvpm-9wx4
2022-12-09T20:08:33Z
2022-09-22T00:00:26Z
null
['CVE-2022-41249']
Jenkins SCM HttpClient Plugin vulnerable to Cross-Site Request Forgery
SCM HttpClient Plugin 1.5 and earlier does not perform permission check in a method implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.meowlomo.jenkins:scm-httpclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41249'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/scm-httpclient-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2708'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:20:06Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-rf3f-3p37-2qh4
2022-09-16T18:34:47Z
2022-09-02T00:01:08Z
null
['CVE-2022-2996']
python-scciclient vulnerable to Man-in-the-middle (MITM) attacks
A flaw was found in the python-scciclient when making an HTTPS connection to a server where the server's certificate would not be verified. This issue opens up the connection to possible Man-in-the-middle (MITM) attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'python-scciclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2996'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/11/msg00006.html'}, {'type': 'WEB', 'url': 'https://opendev.org/x/python-scciclient/commit/274dca0344b65b4ac113d3271d21c17e970a636c'}]
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:34:47Z', 'nvd_published_at': '2022-09-01T18:15:00Z'}
1.4.0
GHSA-5c6q-f783-h888
2022-10-13T18:05:09Z
2022-09-30T00:00:20Z
null
[]
AWS Redshift JDBC Driver fails to validate class type during object instantiation
In Amazon AWS Redshift JDBC Driver (aka amazon-redshift-jdbc-driver or redshift-jdbc42) before 2.1.0.8, the Object Factory does not check the class type when instantiating an object from a class name. This issue has been fixed in version 2.1.0.8.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.amazon.redshift:redshift-jdbc42'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/aws/amazon-redshift-jdbc-driver/security/advisories/GHSA-jc69-hjw2-fm86'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41828'}, {'type': 'WEB', 'url': 'https://github.com/aws/amazon-redshift-jdbc-driver/commit/40b143b4698faf90c788ffa89f2d4d8d2ad068b...
{'cwe_ids': ['CWE-704'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T23:02:26Z', 'nvd_published_at': '2022-09-29T21:15:00Z'}
1.4.0
GHSA-h7ff-cfc9-wmmh
2022-09-19T19:51:34Z
2022-09-16T22:15:21Z
null
['CVE-2022-35990']
TensorFlow vulnerable to `CHECK` fail in `FakeQuantWithMinMaxVarsPerChannelGradient`
### Impact When `tf.quantization.fake_quant_with_min_max_vars_per_channel_gradient` receives input `min` or `max` of rank other than 1, it gives a `CHECK` fail that can trigger a denial of service attack. ```python import tensorflow as tf arg_0=tf.random.uniform(shape=(1,1), dtype=tf.float32, maxval=None) arg_1=tf.rand...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h7ff-cfc9-wmmh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35990'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f3cf67ac5705f4f04721d15e485e192bb319feed'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:15:21Z', 'nvd_published_at': '2022-09-16T22:15:00Z'}
1.4.0
GHSA-4jfq-4fqc-5j9c
2022-12-06T15:33:59Z
2022-09-22T00:00:28Z
null
['CVE-2022-41233']
Jenkins Rundeck Plugin Missing Authorization vulnerability
Jenkins Rundeck Plugin 3.6.11 and earlier does not perform Run/Artifacts permission checks in multiple HTTP endpoints, allowing attackers with Item/Read permission to obtain information about build artifacts of a given job, if the optional Run/Artifacts permission is enabled.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rundeck'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41233'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/rundeck-plugin/commit/032b3bb9eafee5f83e3ddeb023eb34d0eeae19b7'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rundeck-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.i...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:39:39Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-9rwj-9j2h-fhvm
2022-09-23T20:32:29Z
2022-09-23T00:00:29Z
null
['CVE-2022-23458']
Toast UI Grid vulnerable to Cross-site Scripting
Toast UI Grid is a component to display and edit data. Versions prior to 4.21.3 are vulnerable to cross-site scripting attacks when pasting specially crafted content into editable cells. This issue was fixed in version 4.21.3. There are no known workarounds.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'tui-grid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.21.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23458'}, {'type': 'WEB', 'url': 'https://github.com/nhn/tui.grid/commit/e9db5968675ae113c07efc091cce210f2b26854f'}, {'type': 'PACKAGE', 'url': 'https://github.com/nhn/tui.grid'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisorie...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:32:29Z', 'nvd_published_at': '2022-09-22T22:15:00Z'}
1.4.0
GHSA-c5v8-2q4r-5w9v
2022-09-16T17:36:44Z
2022-09-16T17:36:44Z
null
['CVE-2022-36098']
XWiki Platform Mentions UI vulnerable to Cross-site Scripting
### Impact It's possible to store Javascript or groovy scripts in an mention macro anchor or reference field. The stored code is executed by anyone visiting the page with the mention. For example, the example below will create a file at `/tmp/exploit.txt`: ``` {{mention reference="XWiki.Translation" anchor="{{/html~}...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-mentions-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.5-rc-1'}, {'fixed': '13.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-mentions-ui'}, 'ranges': [{'type': 'ECOSYSTEM', '...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c5v8-2q4r-5w9v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36098'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/4032dc896857597efd169966dc9e2752a9fdd459#diff-4fe22885f772e47...
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:36:44Z', 'nvd_published_at': '2022-09-08T21:15:00Z'}
1.4.0
GHSA-fq2h-r2h9-pj8r
2022-12-06T13:56:58Z
2022-09-22T00:00:28Z
null
['CVE-2022-41229']
Jenkins NS-ND Integration Performance Publisher Plugin vulnerable to Cross-site Scripting
Jenkins NS-ND Integration Performance Publisher Plugin prior to version 4.8.0.147 does not escape configuration options of the Execute NetStorm/NetCloud Test build step, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:cavisson-ns-nd-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.0.147'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41229'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin/commit/d77c6c7a279da002178f8244f37093773dd6aee5'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin'}, {'type'...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:40:49Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-qgv4-7jhx-c72q
2022-12-08T21:00:27Z
2022-09-22T00:00:28Z
null
['CVE-2022-41234']
Missing webhook endpoint authorization in Jenkins Rundeck Plugin
Jenkins Rundeck Plugin 3.6.11 and earlier does not protect access to the `/plugin/rundeck/webhook/` endpoint, allowing users with Overall/Read permission to trigger jobs that are configured to be triggerable via Rundeck.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rundeck'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41234'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rundeck-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2169'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:38:06Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-mh3m-62v7-68xg
2022-09-19T19:07:30Z
2022-09-16T22:06:35Z
null
['CVE-2022-36002']
TensorFlow vulnerable to `CHECK` fail in `Unbatch`
### Impact When `Unbatch` receives a nonscalar input `id`, it gives a `CHECK` fail that can trigger a denial of service attack. ```python import tensorflow as tf import numpy as np arg_0=tf.constant(value=np.random.random(size=(3, 3, 1)), dtype=tf.float64) arg_1=tf.constant(value=np.random.randint(0,100,size=(3, 3, 1))...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mh3m-62v7-68xg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36002'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/4419d10d576adefa36b0e0a9425d2569f7c0189f'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:06:35Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-47m6-46mj-p235
2022-09-16T18:50:12Z
2022-09-16T18:50:12Z
null
['CVE-2022-36020']
TYPO3 HTML Sanitizer Bypasses Cross-Site Scripting Protection
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.7) ### Problem Due to a parsing issue in upstream package [`masterminds/html5`](https://packagist.org/packages/masterminds/html5), malicious markup used in a sequence with special HTML comments cannot be filtered and sanitized. This a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2....
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/html-sanitizer/security/advisories/GHSA-47m6-46mj-p235'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36020'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/html-sanitizer/commit/60bfdc7f9b394d0236e16ee4cea8372a7defa493'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:50:12Z', 'nvd_published_at': '2022-09-13T17:15:00Z'}
1.4.0
GHSA-ghq7-85hp-fh76
2022-12-06T22:45:05Z
2022-09-22T00:00:28Z
null
['CVE-2022-41245']
CSRF vulnerability in Jenkins Worksoft Execution Manager Plugin allows capturing credentials
Worksoft Execution Manager Plugin 10.0.3.503 and earlier does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credential...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ws-execution-manager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 10.0.3.503'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41245'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ws-execution-manager-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2237'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T22:45:05Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-2m6g-crv8-p3c6
2022-09-21T19:21:12Z
2022-09-16T21:17:44Z
null
['CVE-2022-36079']
Parse Server vulnerable to brute force guessing of user sensitive data via search patterns
### Impact Internal fields (keys used internally by Parse Server, prefixed by `_`) and protected fields (user defined) can be used as query constraints. Internal and protected fields are removed by Parse Server from query results and are only returned to the client using a valid master key. However, using query constr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.14'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-2m6g-crv8-p3c6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36079'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/issues/8143'}, {'type': 'WEB', 'url': 'https://githu...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:17:44Z', 'nvd_published_at': '2022-09-07T21:15:00Z'}
1.4.0
GHSA-4wjj-jwc9-2x96
2022-09-16T21:56:51Z
2022-09-14T00:00:48Z
null
['CVE-2022-2989']
Podman's incorrect handling of the supplementary groups may lead to data disclosure, modification
An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/podman/v4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containers/podman/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2989'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/pull/15618'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/pull/15677'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/pull/15696'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-842', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:23:59Z', 'nvd_published_at': '2022-09-13T14:15:00Z'}
1.4.0
GHSA-xx9w-464f-7h6f
2023-04-03T18:56:08Z
2022-09-16T20:27:13Z
null
['CVE-2022-31667']
Harbor fails to validate the user permissions when updating a robot account
### Impact Harbor fails to validate the user permissions when updating a robot account that belongs to a project that the authenticated user doesn’t have access to. API call: PUT /robots/{robot_id} By sending a request that attempts to update a robot account, and specifying a robot account id and robot account name t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.10.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.12'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges'...
[{'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories/GHSA-xx9w-464f-7h6f'}, {'type': 'PACKAGE', 'url': 'https://github.com/goharbor/harbor'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T20:27:13Z', 'nvd_published_at': None}
1.4.0
GHSA-f524-rf33-2jjr
2023-02-15T19:25:47Z
2022-09-16T17:42:47Z
null
['CVE-2022-36085']
OPA Compiler: Bypass of WithUnsafeBuiltins using "with" keyword to mock functions
### Impact The Rego compiler provides a (deprecated) `WithUnsafeBuiltins` function, which allows users to provide a set of built-in functions that should be deemed unsafe — and as such rejected — by the compiler if encountered in the policy compilation stage. A bypass of this protection has been found, where the use o...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/open-policy-agent/opa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.40.0'}, {'fixed': '0.43.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/open-policy-agent/opa/security/advisories/GHSA-f524-rf33-2jjr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36085'}, {'type': 'WEB', 'url': 'https://github.com/open-policy-agent/opa/pull/4540'}, {'type': 'WEB', 'url': 'https://github.com/open-polic...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:42:47Z', 'nvd_published_at': '2022-09-08T14:15:00Z'}
1.4.0
GHSA-hwq7-5vv9-c6cf
2022-09-16T21:59:38Z
2022-09-16T00:00:39Z
null
['CVE-2018-25047']
Smarty Cross-site Scripting vulnerability in pages that use smarty_function_mailto
In Smarty before 3.1.47 and 4.x before 4.2.1, `libs/plugins/function.mailto.php` allows cross-site scripting. A web page that uses `smarty_function_mailto`, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.47'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25047'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/issues/454'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/commit/55ea25d1f50f0406fb1ccedd212c527977793fc9'}, {'type': 'WEB', 'url': 'https://bugs.gentoo.org/8701...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:59:38Z', 'nvd_published_at': '2022-09-15T00:15:00Z'}
1.4.0
GHSA-4rxr-27mm-mxq9
2022-09-30T05:31:32Z
2022-09-30T05:31:32Z
null
['CVE-2022-39263']
Upstash Adapter missing token verification
### Impact Applications that use `next-auth` Email Provider and `@next-auth/upstash-redis-adapter` before v3.0.2 are affected. ### Description The Upstash Redis adapter implementation did not check for both the identifier (email) and the token, but only checking for the identifier when verifying the token in the email...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@next-auth/upstash-redis-adapter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-4rxr-27mm-mxq9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39263'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/commit/d16e04848ee703cf797724194d4ad2907fe125a9'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T05:31:32Z', 'nvd_published_at': '2022-09-28T21:15:00Z'}
1.4.0
GHSA-j9fq-vwqv-2fm2
2023-06-21T18:10:04Z
2022-09-15T00:00:24Z
null
['CVE-2022-2900']
Server-Side Request Forgery (SSRF) in GitHub repository ionicabizau/parse-url
Server-Side Request Forgery (SSRF) in GitHub repository ionicabizau/parse-url prior to 8.1.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2900'}, {'type': 'WEB', 'url': 'https://github.com/ionicabizau/parse-url/commit/b88c81df8f4c5168af454eaa4f92afa9349e4e13'}, {'type': 'PACKAGE', 'url': 'https://github.com/IonicaBizau/parse-url'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1...
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T16:17:41Z', 'nvd_published_at': '2022-09-14T11:15:00Z'}
1.4.0
GHSA-r947-2crg-xc39
2022-09-19T20:19:16Z
2022-09-15T00:00:17Z
null
['CVE-2022-40365']
ouqiang gocron Cross-site scripting vulnerability
Cross site scripting (XSS) vulnerability in ouqiang gocron through 1.5.3, allows attackers to execute arbitrary code via scope.row.hostname in web/vue/src/pages/taskLog/list.vue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ouqiang/gocron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40365'}, {'type': 'WEB', 'url': 'https://github.com/ouqiang/gocron/issues/362'}, {'type': 'PACKAGE', 'url': 'https://github.com/ouqiang/gocron'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:09:07Z', 'nvd_published_at': '2022-09-14T21:15:00Z'}
1.4.0
GHSA-28v4-jf82-jvj8
2022-09-21T21:07:52Z
2022-09-16T00:00:36Z
null
['CVE-2022-37262']
steal vulnerable to Regular Expression Denial of Service via source and sourceWithComments
A Regular Expression Denial of Service (ReDoS) flaw was found in stealjs steal via the source and sourceWithComments variable in main.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'steal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37262'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/issues/1531'}, {'type': 'PACKAGE', 'url': 'https://github.com/stealjs/steal'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/...
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:07:52Z', 'nvd_published_at': '2022-09-15T16:15:00Z'}
1.4.0
GHSA-54qx-8p8w-xhg8
2022-09-16T21:05:28Z
2022-09-16T21:05:28Z
null
['CVE-2022-36071']
SFTPGo vulnerable to recovery codes abuse
### Impact SFTPGo WebAdmin and WebClient support login using TOTP (Time-based One Time Passwords) as a seconday authentication factor. Because TOTPs are often configured on mobile devices that can be lost, stolen or damaged, SFTPGo also supports recovery codes. These are a set of one time use codes that can be used in...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/drakkan/sftpgo/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.3.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/drakkan/sftpgo/security/advisories/GHSA-54qx-8p8w-xhg8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36071'}, {'type': 'WEB', 'url': 'https://github.com/drakkan/sftpgo/issues/965'}, {'type': 'PACKAGE', 'url': 'https://github.com/drakkan/sftpgo'}]
{'cwe_ids': ['CWE-287', 'CWE-916'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:05:28Z', 'nvd_published_at': '2022-09-02T18:15:00Z'}
1.4.0
GHSA-qcqv-38jg-2r43
2022-09-15T17:56:13Z
2022-09-15T03:21:41Z
null
[]
Pageflow vulnerable to insecure direct object reference in membership update endpoint
### Impact Pageflow has a membership edit feature which allows users to edit the roles of user memberships associated with an account that they have the `manager` role to (including their own). While the `Entity` dropdown select field is greyed out in the UI, an attacker can use tools which allow sending arbitrary HTT...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'pageflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.5.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'pageflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '15.7.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/codevise/pageflow/security/advisories/GHSA-qcqv-38jg-2r43'}, {'type': 'WEB', 'url': 'https://github.com/codevise/pageflow/pull/1862'}, {'type': 'PACKAGE', 'url': 'https://github.com/codevise/pageflow'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:21:41Z', 'nvd_published_at': None}
1.4.0
GHSA-gmj8-84r4-h46j
2022-09-23T20:38:52Z
2022-09-23T00:00:31Z
null
['CVE-2022-3274']
rdiffweb Cross-Site Request Forgery vulnerability can lead to user email ID being changed
rdiffwen prior to version 2.4.7 is vulnerable to Cross-Site Request Forgery (CSRF). An attacker can change a user's email ID. Version 2.4.7 has a fix for this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3274'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/e974df75bdbcff3996ad70bd1b4424ec1485ea3f'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8834c356-4d...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:38:52Z', 'nvd_published_at': '2022-09-22T19:15:00Z'}
1.4.0
GHSA-gp7f-rwcx-9369
2022-11-04T20:35:22Z
2022-09-01T22:14:57Z
null
['CVE-2022-36033']
jsoup may not sanitize code injection XSS attempts if SafeList.preserveRelativeLinks is enabled
jsoup may incorrectly sanitize HTML including `javascript:` URL expressions, which could allow cross-site scripting (XSS) attacks when a reader subsequently clicks that link. If the non-default `SafeList.preserveRelativeLinks` option is enabled, HTML including `javascript:` URLs that have been crafted with control char...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jsoup:jsoup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jhy/jsoup/security/advisories/GHSA-gp7f-rwcx-9369'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36033'}, {'type': 'PACKAGE', 'url': 'https://github.com/jhy/jsoup'}, {'type': 'WEB', 'url': 'https://github.com/jhy/jsoup/releases/tag/jsoup-1.15.3'}, {...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:14:57Z', 'nvd_published_at': '2022-08-29T17:15:00Z'}
1.4.0
GHSA-mrgp-mrhc-5jrq
2022-09-28T13:09:01Z
2022-09-28T13:09:01Z
null
['CVE-2022-36067']
vm2 vulnerable to Sandbox Escape resulting in Remote Code Execution on host
### Impact A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox. ### Patches This vulnerability was patched in the release of version `3.9.11` of `vm2` ### Workarounds None. ### References Github Issue - https://github.com/patriksimek/vm2/issues/467 ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'vm2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.11'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/security/advisories/GHSA-mrgp-mrhc-5jrq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36067'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/issues/467'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/commi...
{'cwe_ids': ['CWE-913'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-28T13:09:01Z', 'nvd_published_at': '2022-09-06T22:15:00Z'}
1.4.0
GHSA-97p7-w86h-vcf9
2022-09-19T19:50:05Z
2022-09-16T20:51:55Z
null
['CVE-2022-35935']
TensorFlow vulnerable to `CHECK` failure in `SobolSample` via missing validation
### Impact The implementation of SobolSampleOp is vulnerable to a denial of service via CHECK-failure (assertion failure) caused by assuming `input(0)`, `input(1)`, and `input(2)` to be scalar. ```python import tensorflow as tf tf.raw_ops.SobolSample(dim=tf.constant([1,0]), num_results=tf.constant([1]), skip=tf.constan...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-97p7-w86h-vcf9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35935'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c65c67f88ad770662e8f191269a907bf2b94b1bf'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T20:51:55Z', 'nvd_published_at': '2022-09-16T20:15:00Z'}
1.4.0
GHSA-9cr2-8pwr-fhfq
2022-09-19T19:51:14Z
2022-09-16T21:15:36Z
null
['CVE-2022-36026']
TensorFlow vulnerable to `CHECK` fail in `QuantizeAndDequantizeV3`
### Impact If `QuantizeAndDequantizeV3` is given a nonscalar `num_bits` input tensor, it results in a `CHECK` fail that can be used to trigger a denial of service attack. ```python import tensorflow as tf signed_input = True range_given = False narrow_range = False axis = -1 input = tf.constant(-3.5, shape=[1], dtype=...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9cr2-8pwr-fhfq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36026'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f3f9cb38ecfe5a8a703f2c4a8fead434ef291713'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:15:36Z', 'nvd_published_at': '2022-09-16T22:15:00Z'}
1.4.0
GHSA-4w68-4x85-mjj9
2022-09-19T19:26:18Z
2022-09-16T22:15:49Z
null
['CVE-2022-35966']
TensorFlow vulnerable to segfault in `QuantizedAvgPool`
### Impact If `QuantizedAvgPool` is given `min_input` or `max_input` tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack. ```python import tensorflow as tf ksize = [1, 2, 2, 1] strides = [1, 2, 2, 1] padding = "SAME" input = tf.constant(1, shape=[1,4,4,2], dtype=t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4w68-4x85-mjj9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35966'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/7cdf9d4d2083b739ec81cfdace546b0c99f50622'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:15:49Z', 'nvd_published_at': '2022-09-16T21:15:00Z'}
1.4.0
GHSA-462r-wxvm-jvxh
2022-09-15T03:24:31Z
2022-09-10T00:00:24Z
null
['CVE-2022-38639']
Markdown-Nice v1.8.22 vulnerable to Cross-site Scripting
A cross-site scripting (XSS) vulnerability in Markdown-Nice v1.8.22 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Community Posting field.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'markdown-nice'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38639'}, {'type': 'WEB', 'url': 'https://github.com/mdnice/markdown-nice/issues/327'}, {'type': 'PACKAGE', 'url': 'https://github.com/mdnice/markdown-nice'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:24:31Z', 'nvd_published_at': '2022-09-09T19:15:00Z'}
1.4.0
GHSA-hrj7-f62f-j7x7
2022-09-30T04:41:04Z
2022-09-27T00:00:22Z
null
['CVE-2022-3295']
rdiffweb allows unlimited length of root directory name, which could result in DoS
rdiffweb prior to 2.4.8 has no limit in length of root directory names. Allowing users to enter long strings may result in a DOS attack or memory corruption. Version 2.4.8 defines a field limit for username, email, and root directory.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3295'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab...
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:41:04Z', 'nvd_published_at': '2022-09-26T13:15:00Z'}
1.4.0
GHSA-9vqj-64pv-w55c
2022-09-19T19:38:15Z
2022-09-16T22:28:41Z
null
['CVE-2022-35988']
TensorFlow vulnerable to `CHECK` fail in `tf.linalg.matrix_rank`
### Impact When `tf.linalg.matrix_rank` receives an empty input `a`, the GPU kernel gives a `CHECK` fail that can be used to trigger a denial of service attack. ```python import tensorflow as tf a = tf.constant([], shape=[0, 1, 1], dtype=tf.float32) tf.linalg.matrix_rank(a=a) ``` ### Patches We have patched the issue...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9vqj-64pv-w55c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35988'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c55b476aa0e0bd4ee99d0f3ad18d9d706cd1260a'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:28:41Z', 'nvd_published_at': '2022-09-16T22:15:00Z'}
1.4.0
GHSA-mv8m-8x97-937q
2022-09-19T19:05:55Z
2022-09-16T21:23:11Z
null
['CVE-2022-36004']
TensorFlow vulnerable to `CHECK` fail in `tf.random.gamma`
### Impact When `tf.random.gamma` receives large input shape and rates, it gives a `CHECK` fail that can trigger a denial of service attack. ```python import tensorflow as tf arg_0=tf.random.uniform(shape=(4,), dtype=tf.int32, maxval=65536) arg_1=tf.random.uniform(shape=(4, 4), dtype=tf.float64, maxval=None) arg_2=tf.r...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mv8m-8x97-937q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36004'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/552bfced6ce4809db5f3ca305f60ff80dd40c5a3'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:23:11Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-6vfq-jmxg-g58r
2022-09-16T21:02:55Z
2022-09-16T21:02:55Z
null
['CVE-2022-36101']
Shopware contains sensitive data in backend customer module
### Impact The request for the customer detail view in the backend administration contained sensitive data like the hashed password and the session ID. ### Patches We recommend updating to the current version 5.7.15. You can get the update to 5.7.15 regularly via the Auto-Updater or directly via the download overview....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.7.14'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-6vfq-jmxg-g58r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36101'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/af5cdbc81d60f21b728e1433aeb8837f25938d2a'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-200', 'CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:02:55Z', 'nvd_published_at': '2022-09-12T20:15:00Z'}
1.4.0
GHSA-j8xr-2279-88qj
2022-12-06T19:41:02Z
2022-09-22T00:00:28Z
null
['CVE-2022-41241']
Jenkins RQM Plugin vulnerable to Improper Restriction of XML External Entity Reference
Jenkins RQM Plugin 2.8 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to provide crafted API responses from Rational Quality Manager to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.praqma:rqm-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41241'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rqm-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2805'}]
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:36:52Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-hc94-9v26-gxwv
2022-09-16T17:41:00Z
2022-09-07T00:01:50Z
null
['CVE-2022-36663']
Gluu Oxauth before v4.4.1 vulnerable to Server-Side Request Forgery attacks via a crafted request_uri parameter
Gluu Oxauth before v4.4.1 allows attackers to execute blind SSRF (Server-Side Request Forgery) attacks via a crafted request_uri parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.gluu:oxauth-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36663'}, {'type': 'WEB', 'url': 'https://github.com/GluuFederation/oxAuth/commit/58c4ac9bbf2addf4b419bf155de99db57a202f5c'}, {'type': 'PACKAGE', 'url': 'https://github.com/GluuFederation/oxAuth'}, {'type': 'WEB', 'url': 'https://github.com/GluuFede...
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:41:00Z', 'nvd_published_at': '2022-09-06T21:15:00Z'}
1.4.0
GHSA-qf8g-vpwp-6579
2022-09-16T19:26:04Z
2022-09-01T00:00:26Z
null
['CVE-2022-37022']
Apache Geode versions deserialization of untrusted datawhen using JMX over RMI on Java 11
Apache Geode versions up to 1.12.2 and 1.13.2 are vulnerable to a deserialization of untrusted data flaw when using JMX over RMI on Java 11. Any user wishing to protect against deserialization attacks involving JMX or RMI should upgrade to Apache Geode 1.15. Use of 1.15 on Java 11 will automatically protect JMX over RM...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37022'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/kr1y4l9752g1ww1shnmh8dbfjq785k4m'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:26:04Z', 'nvd_published_at': '2022-08-31T07:15:00Z'}
1.4.0
GHSA-232p-59mg-f98p
2022-09-21T21:36:27Z
2022-09-21T00:00:52Z
null
['CVE-2022-3242']
Microweber Cross-site Scripting can result in redirection to a malicious site
Microweber versions 1.3.1 and prior are vulnerable to HTML injection that an attacker can use to redirect someone to a malicious site. A patch is available at commit 68f0721571653db865a5fa01c7986642c82e919c and expected to be part of version 1.3.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3242'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/68f0721571653db865a5fa01c7986642c82e919c'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:36:27Z', 'nvd_published_at': '2022-09-20T11:15:00Z'}
1.4.0
GHSA-gwc9-m7rh-j2ww
2023-08-30T13:46:25Z
2022-09-07T00:01:52Z
null
['CVE-2021-43565']
x/crypto/ssh vulnerable to panic via malformed packets
The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto allows an unauthenticated attacker to panic an SSH server. When using AES-GCM or ChaCha20Poly1305, consuming a malformed packet which contains an empty plaintext causes a panic.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/crypto'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20211202192323-5770296d904e'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43565'}, {'type': 'WEB', 'url': 'https://go.dev/cl/368814/'}, {'type': 'WEB', 'url': 'https://go.dev/issues/49932'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/golang-announce'}, {'type': 'WEB', 'url': 'https://groups.google.co...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:40:34Z', 'nvd_published_at': '2022-09-06T18:15:00Z'}
1.4.0
GHSA-gvjw-8mmr-8f6g
2022-09-23T13:44:49Z
2022-09-17T00:00:30Z
null
['CVE-2022-37258']
steal vulnerable to Prototype Pollution
Prototype pollution vulnerability in function convertLater in npm-convert.js in stealjs steal 2.2.4 via the packageName variable in npm-convert.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'steal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37258'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/issues/1527'}, {'type': 'PACKAGE', 'url': 'https://github.com/stealjs/steal'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:44:49Z', 'nvd_published_at': '2022-09-16T22:15:00Z'}
1.4.0
GHSA-26m4-qjp9-xmc6
2022-09-21T21:11:29Z
2022-09-21T00:00:46Z
null
['CVE-2022-40955']
Apache InLong vulnerable to Deserialization of Untrusted Data
In versions of Apache InLong prior to 1.3.0, an attacker with sufficient privileges to specify MySQL JDBC connection URL parameters and to write arbitrary data to the MySQL database, could cause this data to be deserialized by Apache InLong, potentially leading to Remote Code Execution on the Apache InLong server. User...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:inlong-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40955'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/r1r34y7bchrpmp9jhfdoohzdmk7pj1q1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/09/22/5'}]
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:11:29Z', 'nvd_published_at': '2022-09-20T14:15:00Z'}
1.4.0
GHSA-qwc8-vjh3-gm2j
2022-09-21T21:24:44Z
2022-09-21T00:00:52Z
null
['CVE-2022-3004']
YetiForce CRM vulnerable to stored Cross-site Scripting via WorkFlow module
YetiForce CRM versions 6.4.0 and prior are vulnerable to cross-site scripting via the `WorkFlow` module. A patch is available at commit cd82ecce44d83f1f6c10c7766bf36f3026de024a.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3004'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/cd82ecce44d83f1f6c10c7766bf36f3026de024a'}, {'type': 'PACKAGE', 'url': 'https://github.com/YetiForceCompany/YetiForceCRM'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:24:44Z', 'nvd_published_at': '2022-09-20T10:15:00Z'}
1.4.0
GHSA-mjw4-xvx6-3grg
2022-09-16T21:35:41Z
2022-09-14T00:00:51Z
null
['CVE-2022-3174']
rdiffweb 2.4.1 vulnerable to Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
rdiffweb version 2.4.1 is vulnerable to Sensitive Cookie in HTTPS Session Without 'Secure' Attribute. This makes it so that a user's cookies can be sent to the server with an unencrypted request over the HTTP protocol. Version 2.4.2 contains a fix for the issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.1'}, {'fixed': '2.4.2'}]}], 'versions': ['2.4.1']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3174'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/f2de2371c5e13ce1c6fd6f9a1ed3e5d46b93cd7e'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab...
{'cwe_ids': ['CWE-311', 'CWE-614'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:22:39Z', 'nvd_published_at': '2022-09-13T10:15:00Z'}
1.4.0
GHSA-fjjw-82xw-vfc2
2023-07-25T16:46:14Z
2022-09-02T00:01:09Z
null
['CVE-2022-37435']
Apache ShenYu Admin has insecure permissions
Apache ShenYu Admin has insecure permissions, which may allow low-privilege administrators to modify high-privilege administrator's passwords. This issue affects Apache ShenYu 2.4.2 and 2.4.3. Version 2.5.0 contains a patch for this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shenyu:shenyu-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.2'}, {'fixed': '2.5.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37435'}, {'type': 'WEB', 'url': 'https://github.com/apache/shenyu/pull/3658'}, {'type': 'WEB', 'url': 'https://github.com/apache/shenyu/releases/tag/v2.5.0'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ndblyxr2fdrvjtgbs1bogxgv2cgk7t28'...
{'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:31:15Z', 'nvd_published_at': '2022-09-01T14:15:00Z'}
1.4.0
GHSA-v62j-cxhh-fq22
2022-09-16T21:00:08Z
2022-09-13T00:00:39Z
null
['CVE-2022-37734']
graphql-java vulnerable to Denial of Service via GraphQL query that consumes CPU resources
graphql-java before 19.0, 18.3, and 17.4 is vulnerable to Denial of Service. An attacker send a malicious GraphQL query that consumes CPU resources. The fixed versions are 19.0, 18.3, and 17.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.graphql-java:graphql-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '17.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.graphql-java:graphql-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '18.0'}, {'fixed':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37734'}, {'type': 'WEB', 'url': 'https://github.com/graphql-java/graphql-java/issues/2888'}, {'type': 'WEB', 'url': 'https://github.com/graphql-java/graphql-java/pull/2892'}, {'type': 'PACKAGE', 'url': 'https://github.com/graphql-java/graphql-java'...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:00:08Z', 'nvd_published_at': '2022-09-12T14:15:00Z'}
1.4.0
GHSA-5rp4-749p-vx26
2022-09-22T22:40:27Z
2022-09-22T22:40:27Z
null
['CVE-2022-40604']
Apache Airflow vulnerable to Use of Externally-Controlled Format String
In Apache Airflow 2.3.0 through 2.3.4, part of a url was unnecessarily formatted, allowing for possible information extraction.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.4.0b1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40604'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/26337'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/18386026c28939fa6d91d198c5489c295a05dcd2'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-d...
{'cwe_ids': ['CWE-134'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-22T22:40:27Z', 'nvd_published_at': '2022-09-21T08:15:00Z'}
1.4.0
GHSA-6xm7-3cc5-47f9
2022-09-16T17:19:30Z
2022-09-08T00:00:30Z
null
['CVE-2022-37189']
MEI2Volpiano is vulnerable to XML External Entity (XXE), leading to a Denial of Service (DoS)
DDMAL MEI2Volpiano 0.8.2 is vulnerable to XML External Entity (XXE), leading to a Denial of Service. This occurs due to the usage of the unsafe 'xml.etree' library to parse untrusted XML input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mei2volpiano'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37189'}, {'type': 'WEB', 'url': 'https://docs.python.org/3/library/xml.html#xml-vulnerabilities'}, {'type': 'PACKAGE', 'url': 'https://github.com/DDMAL/MEI2Volpiano/'}, {'type': 'WEB', 'url': 'https://github.com/DDMAL/MEI2Volpiano/blob/987b70fff991...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:19:30Z', 'nvd_published_at': '2022-09-07T13:15:00Z'}
1.4.0
GHSA-p2f7-9cv7-jjf6
2022-09-19T20:25:28Z
2022-09-12T00:00:33Z
null
['CVE-2022-26049']
Goomph before 3.37.2 allows malicious zip file to write contents to arbitrary locations
This affects the package com.diffplug.gradle:goomph before 3.37.2. It allows a malicious zip file to potentially break out of the expected destination directory, writing contents into arbitrary locations on the file system. Overwriting certain files/directories could allow an attacker to achieve remote code execution o...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.diffplug.gradle:goomph'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.37.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26049'}, {'type': 'WEB', 'url': 'https://github.com/diffplug/goomph/pull/198'}, {'type': 'WEB', 'url': 'https://github.com/diffplug/goomph/commit/25f04f67ba62d9a14104bee13a0a0f2517afb8c8'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:28:31Z', 'nvd_published_at': '2022-09-11T14:15:00Z'}
1.4.0
GHSA-q3f4-9h4p-vgr3
2022-09-29T10:09:03Z
2022-09-25T00:00:15Z
null
['CVE-2022-41340']
secp256k1-js implements ECDSA without required r and s validation, leading to signature forgery
The secp256k1-js package before 1.1.0 for Node.js implements ECDSA without required r and s validation, leading to signature forgery.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@lionello/secp256k1-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41340'}, {'type': 'WEB', 'url': 'https://github.com/lionello/secp256k1-js/issues/11'}, {'type': 'WEB', 'url': 'https://github.com/lionello/secp256k1-js/commit/302800f0370b42e360a33774bb808274ac729c2e'}, {'type': 'PACKAGE', 'url': 'https://github.co...
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-27T22:34:59Z', 'nvd_published_at': '2022-09-24T19:15:00Z'}
1.4.0
GHSA-vv7x-7w4m-q72f
2022-09-27T06:12:12Z
2022-09-21T20:36:50Z
null
['CVE-2022-39230']
fhir-works-on-aws-authz-smart handles permissions improperly
### Impact This issue allows a client of the API to retrieve more information than the client’s OAuth scope permits when making “search-type” requests. This issue would not allow a client to retrieve information about individuals other than those the client was already authorized to access. ### Patches We recommend ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'fhir-works-on-aws-authz-smart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.1'}, {'fixed': '3.1.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/awslabs/fhir-works-on-aws-authz-smart/security/advisories/GHSA-vv7x-7w4m-q72f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39230'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/fhir-works-on-aws-authz-smart/commit/203bbc0dd17de748c36b33c68b8...
{'cwe_ids': ['CWE-200', 'CWE-281'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T20:36:50Z', 'nvd_published_at': '2022-09-23T07:15:00Z'}
1.4.0
GHSA-crf8-h2wq-2h9x
2023-08-08T21:19:03Z
2022-09-21T00:00:38Z
null
['CVE-2022-39974']
WASM3 Improper Input Validation vulnerability
WASM3 v0.5.0 was discovered to contain a segmentation fault via the component `op_Select_i32_srs` in `wasm3/source/m3_exec.h`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pywasm3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'wasm3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39974'}, {'type': 'WEB', 'url': 'https://github.com/wasm3/wasm3/issues/344'}, {'type': 'WEB', 'url': 'https://github.com/wasm3/wasm3/issues/379'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pywasm3/PYSEC-2022-...
{'cwe_ids': ['CWE-119', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:10:20Z', 'nvd_published_at': '2022-09-20T18:15:00Z'}
1.4.0
GHSA-cw2v-wv4g-w4p6
2022-09-22T17:20:09Z
2022-09-18T00:00:30Z
null
['CVE-2022-3232']
rdiffweb CSRF vulnerability in admin area can lead to deletion of repositories and users
rdiffweb prior to 2.4.5 is vulnerable to Cross-Site Request Forgery (CSRF). An attacker exploiting this vulnerability can use it to delete repositories and users.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3232'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/422791ea45713aaaa865bdca74addb9fffd93a71'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:29:23Z', 'nvd_published_at': '2022-09-17T20:15:00Z'}
1.4.0
GHSA-c86f-9grv-pmqf
2022-09-15T03:31:34Z
2022-09-06T00:00:27Z
null
['CVE-2022-38370']
Apache IoTDB grafana-connector contains an interface without authorization
Apache IoTDB grafana-connector version 0.13.0 contains an interface without authorization, which may expose the internal structure of a database. Users should upgrade to version 0.13.1, which addresses this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.iotdb:iotdb-grafana-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38370'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/iotdb'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/kcpqgstvgf8sxy9ktxm1836nlwc8xy3j'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/09/05/2'}]
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:31:34Z', 'nvd_published_at': '2022-09-05T10:15:00Z'}
1.4.0
GHSA-9vm3-r8gq-cr6x
2022-09-16T22:00:39Z
2022-09-10T00:00:23Z
null
['CVE-2022-38638']
Casdoor arbitrary file write vulnerability
Casdoor v1.97.3 was discovered to contain an arbitrary file write vulnerability via the fullFilePath parameter at /api/upload-resource.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/casdoor/casdoor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.103.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38638'}, {'type': 'WEB', 'url': 'https://github.com/casdoor/casdoor/issues/1035'}, {'type': 'WEB', 'url': 'https://github.com/casdoor/casdoor/issues/1063'}, {'type': 'WEB', 'url': 'https://github.com/casdoor/casdoor/commit/411d76798d73446fff4a0244f...
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:32:58Z', 'nvd_published_at': '2022-09-09T20:15:00Z'}
1.4.0
GHSA-fpgf-pjjv-2qgm
2022-09-30T04:37:39Z
2022-09-30T04:37:39Z
null
['CVE-2022-39248']
matrix-android-sdk2 vulnerable to Olm/Megolm protocol confusion
### Impact An attacker cooperating with a malicious homeserver can construct messages that legitimately appear to have come from another person, without any indication such as a grey shield. Additionally, a sophisticated attacker cooperating with a malicious homeserver could employ this vulnerability to perform a tar...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.matrix.android:matrix-android-sdk2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.36'}}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-android-sdk2/security/advisories/GHSA-fpgf-pjjv-2qgm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39248'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-android-sdk2/commit/77df720a238d17308deab83ecaa37f7a4740a17e'...
{'cwe_ids': ['CWE-287', 'CWE-322'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:37:39Z', 'nvd_published_at': '2022-09-28T20:15:00Z'}
1.4.0
GHSA-jx7c-7mj5-9438
2022-10-06T18:20:05Z
2022-09-29T00:00:25Z
null
['CVE-2021-43980']
Apache Tomcat Race Condition vulnerability
The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.78'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-M1'}, {'fixed':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43980'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/3jjqbsp6j88b198x5rmg99b1qr8ht3g3'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/10/msg000...
{'cwe_ids': ['CWE-362'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T06:30:10Z', 'nvd_published_at': '2022-09-28T14:15:00Z'}
1.4.0
GHSA-wxjj-cgcx-r3vq
2022-09-19T19:36:05Z
2022-09-16T22:11:00Z
null
['CVE-2022-35959']
TensorFlow vulnerable to `CHECK` failures in `AvgPool3DGrad`
### Impact The implementation of `AvgPool3DGradOp` does not fully validate the input `orig_input_shape`. This results in an overflow that results in a `CHECK` failure which can be used to trigger a denial of service attack: ```python import tensorflow as tf ksize = [1, 1, 1, 1, 1] strides = [1, 1, 1, 1, 1] padding = ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wxjj-cgcx-r3vq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35959'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/9178ac9d6389bdc54638ab913ea0e419234d14eb'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:11:00Z', 'nvd_published_at': '2022-09-16T20:15:00Z'}
1.4.0
GHSA-q4q5-c5cv-2p68
2022-09-21T20:58:44Z
2022-09-19T00:00:28Z
null
['CVE-2022-25873']
Vuetify Cross-site Scripting vulnerability
The package vuetify from 2.0.0-beta.4 and before 2.6.10 are vulnerable to Cross-site Scripting (XSS) due to improper input sanitization in the 'eventName' function within the VCalendar component.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'vuetify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-beta.4'}, {'fixed': '2.6.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:vuetify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-beta.4'}, {'fixed': '2.6.10'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25873'}, {'type': 'WEB', 'url': 'https://github.com/vuetifyjs/vuetify/issues/15757'}, {'type': 'WEB', 'url': 'https://github.com/vuetifyjs/vuetify/commit/ade1434927f55a0eccf3d54f900f24c5fa85a176'}, {'type': 'WEB', 'url': 'https://codepen.io/5v3n-08...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T20:58:44Z', 'nvd_published_at': '2022-09-18T15:15:00Z'}
1.4.0
GHSA-w4pr-4vjg-hffh
2022-09-30T22:56:17Z
2022-09-30T22:56:17Z
null
['CVE-2022-39254']
When matrix-nio receives forwarded room keys, the receiver doesn't check if it requested the key from the forwarder
When matrix-nio before 0.20 requests a room key from our devices, it correctly accepts key forwards only if they are a response to a previous request. However, it doesn't check that the device that responded matches the device the key was requested from. This allows a malicious homeserver to insert room keys of questi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'matrix-nio'}, 'ecosystem_specific': {'affected_functions': ['nio.crypto.olm_machine.Olm._handle_forwarded_room_key_event']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.20'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/poljar/matrix-nio/security/advisories/GHSA-w4pr-4vjg-hffh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39254'}, {'type': 'WEB', 'url': 'https://github.com/poljar/matrix-nio/commit/b1cbf234a831daa160673defd596e6450e9c29f0'}, {'type': 'PACKAGE', 'ur...
{'cwe_ids': ['CWE-287', 'CWE-322'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T22:56:17Z', 'nvd_published_at': '2022-09-29T15:15:00Z'}
1.4.0
GHSA-9r9j-57rf-f6vj
2022-09-16T17:39:08Z
2022-09-16T17:39:08Z
null
['CVE-2022-36097']
XWiki Platform Attachment UI vulnerable to cross-site scripting in the move attachment form
### Impact It's possible to store JavaScript in an attachment name, which will be executed by anyone trying to move the corresponding attachment. For example, an attachment with name `><img src=1 onerror=alert(1)>.jpg` will execute the alert. ### Patches This issue has been patched in XWiki 14.4RC1. ### Workarounds...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-attachment-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4-rc-1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9r9j-57rf-f6vj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36097'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/fbc4bfbae4f6ce8109addb281de86a03acdb9277'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:39:08Z', 'nvd_published_at': '2022-09-08T21:15:00Z'}
1.4.0
GHSA-pfw4-xjgm-267c
2022-09-15T03:28:01Z
2022-09-15T03:28:01Z
null
['CVE-2022-39200']
Dendrite signature checks not applied to some retrieved missing events
### Impact Events retrieved from a remote homeserver using `/get_missing_events` did not have their signatures verified correctly. This could potentially allow a remote homeserver to provide invalid/modified events to Dendrite via this endpoint. Note that this does not apply to events retrieved through other endpoint...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/matrix-org/dendrite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/dendrite/security/advisories/GHSA-pfw4-xjgm-267c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39200'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/dendrite/commit/2792d0490f3771488bad346981b8c26479a872c3'}, {'type': 'PACKAGE',...
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:28:01Z', 'nvd_published_at': '2022-09-12T20:15:00Z'}
1.4.0
GHSA-4v5m-vwvp-p7w8
2022-09-22T22:45:45Z
2022-09-21T00:00:39Z
null
['CVE-2022-38916']
Pagekit vulnerable to Unrestricted Upload of File with Dangerous Type
A file upload vulnerability exists in the storage feature of pagekit 1.0.18, which allows an attacker to upload malicious files
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pagekit/pagekit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38916'}, {'type': 'WEB', 'url': 'https://github.com/pagekit/pagekit/issues/970'}, {'type': 'PACKAGE', 'url': 'https://github.com/pagekit/pagekit'}]
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-22T22:45:45Z', 'nvd_published_at': '2022-09-20T17:15:00Z'}
1.4.0
GHSA-gg53-wf5x-r3r6
2022-09-20T21:18:43Z
2022-09-20T21:18:43Z
null
['CVE-2022-31167']
XWiki Platform Security Parent POM vulnerable to overwriting of security rules of a page with a final page having the same reference
### Impact A bug in the security cache is storing rules associated to document Page1.Page2 and space Page1.Page2 in the same cache entry. That means that it's possible to overwrite the rights of a space or a document by creating the page of the space with the same name and checking the right of the new one first so t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '12.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gg53-wf5x-r3r6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31167'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-1...
{'cwe_ids': ['CWE-285', 'CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:18:43Z', 'nvd_published_at': '2022-09-07T14:15:00Z'}
1.4.0
GHSA-397c-5g2j-qxpv
2022-09-19T19:41:13Z
2022-09-16T22:27:28Z
null
['CVE-2022-35982']
TensorFlow vulnerable to segfault in `SparseBincount`
### Impact If `SparseBincount` is given inputs for `indices`, `values`, and `dense_shape` that do not make a valid sparse tensor, it results in a segfault that can be used to trigger a denial of service attack. ```python import tensorflow as tf binary_output = True indices = tf.random.uniform(shape=[], minval=-10000, m...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-397c-5g2j-qxpv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35982'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/40adbe4dd15b582b0210dfbf40c243a62f5119fa'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:27:28Z', 'nvd_published_at': '2022-09-16T22:15:00Z'}
1.4.0
GHSA-p6fh-xc6r-g5hw
2022-09-27T15:45:09Z
2022-09-27T15:45:09Z
null
['CVE-2022-39219']
Brokercap Bifrost subject to authentication bypass when using HTTP basic authentication
Bifrost is a middleware package which can synchronize MySQL/MariaDB binlog data to other types of databases. Versions 1.8.6-release and prior are vulnerable to authentication bypass when using HTTP basic authentication. This may allow group members who only have read permissions to write requests when they are normally...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/brokercap/Bifrost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.7-release'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.6-release'}}]
[{'type': 'WEB', 'url': 'https://github.com/brokercap/Bifrost/security/advisories/GHSA-p6fh-xc6r-g5hw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39219'}, {'type': 'WEB', 'url': 'https://github.com/brokercap/Bifrost/issues/200'}, {'type': 'PACKAGE', 'url': 'https://github.com/brokercap/Bif...
{'cwe_ids': ['CWE-287', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-27T15:45:09Z', 'nvd_published_at': '2022-09-26T14:15:00Z'}
1.4.0
GHSA-q5jv-m6qw-5g37
2022-09-19T19:10:43Z
2022-09-16T22:11:10Z
null
['CVE-2022-35996']
TensorFlow vulnerable to floating point exception in `Conv2D`
### Impact If `Conv2D` is given empty `input` and the `filter` and `padding` sizes are valid, the output is all-zeros. This causes division-by-zero floating point exceptions that can be used to trigger a denial of service attack. ```python import tensorflow as tf import numpy as np with tf.device("CPU"): # also can be ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q5jv-m6qw-5g37'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35996'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/611d80db29dd7b0cfb755772c69d60ae5bca05f9'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:11:10Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-phjr-8j92-w5v7
2022-09-22T17:22:56Z
2022-09-20T00:00:22Z
null
['CVE-2022-2995']
CRI-O incorrect handling of supplementary groups may lead to sensitive information disclosure
Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.25.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2995'}, {'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/pull/6159'}, {'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/commit/db3b399a8d7dabf7f073db73894bee98311d7909'}, {'type': 'PACKAGE', 'url': 'https://github.com/cri-o/cri-o'}, {'ty...
{'cwe_ids': ['CWE-284', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T17:46:18Z', 'nvd_published_at': '2022-09-19T20:15:00Z'}
1.4.0
GHSA-wrrw-crp8-979q
2022-09-15T17:56:25Z
2022-09-15T03:21:00Z
null
[]
Pageflow vulnerable to sensitive user data extraction via Ransack query injection
### Impact The attack allows extracting sensitive properties of database objects that are associated with users or entries belonging to an account that the attacker has access to. Pageflow uses the `ActiveAdmin` Ruby library to provide some management features to its users. `ActiveAdmin` relies on the `Ransack` libra...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'pageflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.5.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'pageflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '15.7.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/codevise/pageflow/security/advisories/GHSA-wrrw-crp8-979q'}, {'type': 'WEB', 'url': 'https://github.com/codevise/pageflow/pull/1862'}, {'type': 'PACKAGE', 'url': 'https://github.com/codevise/pageflow'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:21:00Z', 'nvd_published_at': None}
1.4.0
GHSA-2p5h-hpj4-fxgg
2022-09-20T22:06:57Z
2022-09-14T00:00:42Z
null
['CVE-2022-38497']
LIEF contains a segmentation violation
LIEF commit 365a16a was discovered to contain a segmentation violation via the component `CoreFile.tcc:69`. A patch is available at commit ca938740264f1fcb18f91cba8e4039c518ecb75b.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'lief'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38497'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/issues/766'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/commit/ca938740264f1fcb18f91cba8e4039c518ecb75b'}, {'type': 'PACKAGE', 'url': 'https://github.com/lief-...
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T22:05:34Z', 'nvd_published_at': '2022-09-13T21:15:00Z'}
1.4.0
GHSA-h5vq-gw2c-pq47
2022-09-19T19:42:48Z
2022-09-16T22:12:59Z
null
['CVE-2022-35952']
TensorFlow vulnerable to `CHECK` failures in `UnbatchGradOp`
### Impact The [`UnbatchGradOp`](https://github.com/tensorflow/tensorflow/blob/769eddaf479c8debead9a59a72617d6ed6f0fe10/tensorflow/core/kernels/batch_kernels.cc#L891) function takes an argument `id` that is assumed to be a scalar. A nonscalar `id` can trigger a `CHECK` failure and crash the program. ```python import nu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h5vq-gw2c-pq47'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35952'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/5f945fc6409a3c1e90d6970c9292f805f6e6ddf2'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:12:59Z', 'nvd_published_at': '2022-09-16T20:15:00Z'}
1.4.0
GHSA-5v95-j4rr-6f3c
2022-09-30T00:51:30Z
2022-09-27T00:00:17Z
null
['CVE-2022-3290']
rdiffweb's unlimited username field length can lead to DoS
rdiffweb prior to 2.4.8 is vulnerable to a potential Dos attack via an unlimited length "username" field. This can result in excess memory consumption, or memory corruption, leading to a Denial of Service (DoS). This issue is patched in version 2.4.8. There are no known workarounds.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3290'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab...
{'cwe_ids': ['CWE-130'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T00:51:30Z', 'nvd_published_at': '2022-09-26T19:15:00Z'}
1.4.0
GHSA-x989-q2pq-4q5x
2022-09-19T19:56:31Z
2022-09-16T22:12:41Z
null
['CVE-2022-35940']
TensorFlow vulnerable to Int overflow in `RaggedRangeOp`
### Impact The [`RaggedRangOp`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/kernels/ragged_range_op.cc#L74-L88) function takes an argument `limits` that is eventually used to construct a `TensorShape` as an `int64`. If `limits` is a very large float, it can ove...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x989-q2pq-4q5x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35940'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/37cefa91bee4eace55715eeef43720b958a01192'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:12:41Z', 'nvd_published_at': '2022-09-16T20:15:00Z'}
1.4.0
GHSA-hhxh-qphc-v423
2022-09-28T03:30:26Z
2022-09-25T00:00:15Z
null
['CVE-2022-23464']
Nepxion Discovery vulnerable to potential Information Disclosure due to Server-Side Request Forgery
Nepxion Discovery is a solution for Spring Cloud. Discovery is vulnerable to a potential Server-Side Request Forgery (SSRF). RouterResourceImpl uses RestTemplate’s getForEntity to retrieve the contents of a URL containing user-controlled input, potentially resulting in Information Disclosure. There is no patch availabl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.nepxion:discovery'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.16.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23464'}, {'type': 'PACKAGE', 'url': 'https://github.com/Nepxion/Discovery'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2022-033_GHSL-2022-034_Discovery/'}]
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-28T03:30:26Z', 'nvd_published_at': '2022-09-24T05:15:00Z'}
1.4.0
GHSA-j3q4-gmj4-mj95
2022-09-29T15:19:51Z
2022-09-25T00:00:27Z
null
['CVE-2022-3269']
rdiffweb vulnerable to account access via session fixation
rdiffweb prior to 2.4.7 fails to invalidate session cookies on logout, leading to session fixation and allowing an attacker to access a users account. After logging in and logging out, the application continues to use the preauthentication cookies. The cookies remain the same after closing the browser and after passwor...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3269'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/39e7dcd4a1f44d2a7bd92b79d78a800910b1b22b'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab...
{'cwe_ids': ['CWE-384'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-29T15:19:51Z', 'nvd_published_at': '2022-09-23T10:15:00Z'}
1.4.0
GHSA-m6cv-4fmf-66xf
2022-09-19T19:50:41Z
2022-09-16T21:14:10Z
null
['CVE-2022-36018']
TensorFlow vulnerable to `CHECK` fail in `RaggedTensorToVariant`
### Impact If `RaggedTensorToVariant` is given a `rt_nested_splits` list that contains tensors of ranks other than one, it results in a `CHECK` fail that can be used to trigger a denial of service attack. ```python import tensorflow as tf batched_input = True rt_nested_splits = tf.constant([0,32,64], shape=[3], dtype=...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m6cv-4fmf-66xf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36018'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/88f93dfe691563baa4ae1e80ccde2d5c7a143821'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:14:10Z', 'nvd_published_at': '2022-09-16T22:15:00Z'}
1.4.0
GHSA-p37p-wg92-2fc4
2022-12-06T00:51:24Z
2022-09-22T00:00:26Z
null
['CVE-2022-41252']
Missing permission checks in Jenkins CONS3RT Plugin allow enumerating credentials IDs
CONS3RT Plugin 1.0.0 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cons3rt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41252'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cons3rt-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2752'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T00:51:24Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-8qv5-68g4-248j
2022-09-28T14:10:01Z
2022-09-25T00:00:20Z
null
['CVE-2022-36944']
Scala subject to file deletion, code execution due to Java deserialization chain with LazyList object deserialization
Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with LazyList object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or poss...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.scala-lang:scala-library'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13.0'}, {'fixed': '2.13.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36944'}, {'type': 'WEB', 'url': 'https://github.com/scala/scala/pull/10118'}, {'type': 'WEB', 'url': 'https://discuss.lightbend.com/t/impact-of-cve-2022-36944-on-akka-cluster-akka-actor-akka-remote/10007/2'}, {'type': 'PACKAGE', 'url': 'https://git...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-28T14:10:01Z', 'nvd_published_at': '2022-09-23T18:15:00Z'}
1.4.0
GHSA-fj2m-w3wv-x9pr
2022-09-16T22:02:34Z
2022-09-12T00:00:34Z
null
['CVE-2022-39135']
Apache Calcite before 1.32.0 vulnerable to potential XML External Entity (XXE) attack
In Apache Calcite prior to version 1.32.0 the SQL operators EXISTS_NODE, EXTRACT_XML, XML_TRANSFORM and EXTRACT_VALUE do not restrict XML External Entity references in their configuration, which makes them vulnerable to a potential XML External Entity (XXE) attack. Therefore any client exposing these operators, typical...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.calcite:calcite-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.32.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39135'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ohdnhlgm6jvt3srw8l7spkm2d5vwm082'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/11/21/3'}]
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:28:19Z', 'nvd_published_at': '2022-09-11T12:15:00Z'}
1.4.0
GHSA-8wxf-c45w-g66g
2022-10-01T15:54:07Z
2022-09-30T00:00:47Z
null
['CVE-2022-3326']
rdiffweb vulnerable to password complexity bypass leading to weak passwords
ikus060/rdiffweb prior to 2.4.9 allows a user to set there password to all spaces. While rdiffweb has a password policy requiring passwords to be between 8 and 128 characters, it does not validate the password entropy, allowing users to bypass password complexity requirements with weak passwords. This issue has been fi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3326'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/ee98e5af78ec60db8a17fef6ea0ca250e3f31eec'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab...
{'cwe_ids': ['CWE-521'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-01T15:54:07Z', 'nvd_published_at': '2022-09-29T00:15:00Z'}
1.4.0
GHSA-933x-5g7r-773q
2022-12-06T16:03:37Z
2022-09-22T00:00:28Z
null
['CVE-2022-41236']
CSRF vulnerability in Jenkins Security Inspector plugin
Security Inspector Plugin 117.v6eecc36919c2 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to replace the generated report stored in a per-session cache and displayed to authorized users at the `…​/repo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:security-inspector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '17.v6eecc36919c2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41236'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/security-inspector-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2051'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T16:03:37Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-9j4v-pp28-mxv7
2022-09-19T19:50:58Z
2022-09-16T21:13:43Z
null
['CVE-2022-36019']
TensorFlow vulnerable to `CHECK` fail in `FakeQuantWithMinMaxVarsPerChannel`
### Impact If `FakeQuantWithMinMaxVarsPerChannel` is given `min` or `max` tensors of a rank other than one, it results in a `CHECK` fail that can be used to trigger a denial of service attack. ```python import tensorflow as tf num_bits = 8 narrow_range = False inputs = tf.constant(0, shape=[4], dtype=tf.float32) min =...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9j4v-pp28-mxv7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36019'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/785d67a78a1d533759fcd2f5e8d6ef778de849e0'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:13:43Z', 'nvd_published_at': '2022-09-16T22:15:00Z'}
1.4.0
GHSA-mv8x-668m-53fg
2022-09-16T21:21:43Z
2022-09-16T21:21:43Z
null
['CVE-2022-36061']
Elrond-go has improper initialization
### Impact Read only calls between contracts can generate smart contracts results. For example, if contract A calls in read only mode contract B and the called function will make changes upon the contract's B state, the state will be altered for contract B as if the call was not made in the read-only mode. This can lea...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ElrondNetwork/elrond-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.35'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.34'}}]
[{'type': 'WEB', 'url': 'https://github.com/ElrondNetwork/elrond-go/security/advisories/GHSA-mv8x-668m-53fg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36061'}, {'type': 'PACKAGE', 'url': 'https://github.com/ElrondNetwork/elrond-go'}, {'type': 'WEB', 'url': 'https://github.com/ElrondNetwor...
{'cwe_ids': ['CWE-665'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:21:43Z', 'nvd_published_at': '2022-09-06T21:15:00Z'}
1.4.0
GHSA-49wm-4fp6-h59c
2022-09-23T13:58:49Z
2022-09-22T00:00:32Z
null
['CVE-2022-2872']
OctoPrint vulnerable to Unrestricted Upload of File with Dangerous Type
OctoPrint prior to version 1.8.3 is vulnerable to Unrestricted Upload of File with Dangerous Type. Due to misconfiguration in move file functionality, an attacker could easily change the file extension of an uploaded malicious file disguised as a `.gcode` file. Version 1.8.3 contains a patch.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'OctoPrint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2872'}, {'type': 'WEB', 'url': 'https://github.com/octoprint/octoprint/commit/3e3c11811e216fb371a33e28412df83f9701e5b0'}, {'type': 'PACKAGE', 'url': 'https://github.com/octoprint/octoprint'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory...
{'cwe_ids': ['CWE-434'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:58:49Z', 'nvd_published_at': '2022-09-21T10:15:00Z'}
1.4.0
GHSA-x2xx-jw5m-5j86
2022-09-20T22:06:28Z
2022-09-14T00:00:42Z
null
['CVE-2022-38307']
LIEF contains segmentation violation
LIEF commit 5d1d643 was discovered to contain a segmentation violation via the function `LIEF::MachO::SegmentCommand::file_offset()` at `/MachO/SegmentCommand.cpp`. Commit 7acf0bc4224081d4f425fcc8b2e361b95291d878 contains a patch.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'lief'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38307'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/issues/764'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/commit/7acf0bc4224081d4f425fcc8b2e361b95291d878'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advi...
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T22:06:28Z', 'nvd_published_at': '2022-09-13T21:15:00Z'}
1.4.0
GHSA-5m2h-7rf2-rpx6
2022-09-19T20:25:06Z
2022-09-15T00:00:14Z
null
['CVE-2022-40734']
UniSharp Laravel Filemanager directory traversal vulnerability
UniSharp laravel-filemanager (aka Laravel Filemanager) through 2.5.1 allows download?working_dir=%2F.. directory traversal to read arbitrary files, as exploited in the wild in June 2022.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'unisharp/laravel-filemanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40734'}, {'type': 'WEB', 'url': 'https://github.com/UniSharp/laravel-filemanager/issues/1150'}, {'type': 'PACKAGE', 'url': 'https://github.com/UniSharp/laravel-filemanager'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:08:22Z', 'nvd_published_at': '2022-09-14T23:15:00Z'}
1.4.0
GHSA-828c-5j5q-vrjq
2022-09-19T19:04:11Z
2022-09-16T22:01:12Z
null
['CVE-2022-36013']
TensorFlow vulnerable to null-dereference in `mlir::tfg::GraphDefImporter::ConvertNodeDef`
### Impact When [`mlir::tfg::GraphDefImporter::ConvertNodeDef`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/ir/importexport/graphdef_import.cc) tries to convert NodeDefs without an op name, it crashes. ```cpp Status GraphDefImporter::ConvertNodeDef(OpBuilder &builder, ConversionState &s, ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-828c-5j5q-vrjq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36013'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a0f0b9a21c9270930457095092f558fbad4c03e5'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:01:12Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-4fg5-j4mm-wfpg
2023-08-30T23:30:06Z
2022-09-22T22:39:52Z
null
['CVE-2022-40754']
Apache Airflow contains open redirect
In Apache Airflow 2.3.0 through 2.3.4, there was an open redirect in the webserver's `/confirm` endpoint.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.4.0b1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40754'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/26409'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/56e7555c42f013f789a4b718676ff09b4a9d5135'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-d...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-22T22:39:52Z', 'nvd_published_at': '2022-09-21T08:15:00Z'}
1.4.0
GHSA-cxgf-v2p8-7ph7
2022-09-30T04:29:11Z
2022-09-30T04:29:11Z
null
['CVE-2022-39243']
NuProcess vulnerable to command-line injection through insertion of NUL character(s)
### Impact In all the versions of NuProcess where it forks processes by using the JVM's Java_java_lang_UNIXProcess_forkAndExec method (1.2.0+), attackers can use NUL characters in their strings to perform command line injection. Java's ProcessBuilder isn't vulnerable because of a check in ProcessBuilder.start. NuProces...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.zaxxer:nuprocess'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '2.0.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/brettwooldridge/NuProcess/security/advisories/GHSA-cxgf-v2p8-7ph7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39243'}, {'type': 'WEB', 'url': 'https://github.com/brettwooldridge/NuProcess/pull/143'}, {'type': 'WEB', 'url': 'https://github.com/bre...
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:29:11Z', 'nvd_published_at': '2022-09-26T14:15:00Z'}
1.4.0
GHSA-mwhw-6p27-4crc
2022-09-16T17:41:19Z
2022-09-01T00:00:23Z
null
['CVE-2022-2466']
Quarkus does not terminate HTTP requests header context
Quarkus is a Cloud Native, (Linux) Container First framework for writing Java applications. It was found that Quarkus 2.10.x does not terminate HTTP requests header context which may lead to unpredictable behavior. This issue was fixed in version 2.10.4Final.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-core-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2466'}, {'type': 'WEB', 'url': 'https://github.com/quarkusio/quarkus/issues/26748'}, {'type': 'PACKAGE', 'url': 'https://github.com/quarkusio/quarkus'}, {'type': 'WEB', 'url': 'https://github.com/quarkusio/quarkus/releases/tag/2.10.4.Final'}]
{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:41:19Z', 'nvd_published_at': '2022-08-31T16:15:00Z'}