schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-x27m-9w8j-5vcw | 2023-01-02T21:50:43Z | 2022-09-17T00:00:41Z | null | ['CVE-2022-40150'] | Jettison memory exhaustion | Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by Out of memory. This effect may support a denial of service attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.jettison:jettison'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40150'}, {'type': 'WEB', 'url': 'https://github.com/jettison-json/jettison/issues/45'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=46549'}, {'type': 'PACKAGE', 'url': 'https://github.com/jettison-json/jettison'}, ... | {'cwe_ids': ['CWE-400', 'CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:20:42Z', 'nvd_published_at': '2022-09-16T10:15:00Z'} |
1.4.0 | GHSA-r48r-j8fx-mq2c | 2022-10-03T19:46:42Z | 2022-09-30T00:41:24Z | null | ['CVE-2022-39251'] | matrix-js-sdk subject to user spoofing via Olm/Megolm protocol confusion | ### Impact
An attacker cooperating with a malicious homeserver can construct messages that legitimately appear to have come from another person, without any indication such as a grey shield.
Additionally, a sophisticated attacker cooperating with a malicious homeserver could employ this vulnerability to perform a tar... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'matrix-js-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.7.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-r48r-j8fx-mq2c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39251'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76'}, {'type': ... | {'cwe_ids': ['CWE-287', 'CWE-322'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T00:41:24Z', 'nvd_published_at': '2022-09-28T20:15:00Z'} |
1.4.0 | GHSA-9jjv-524m-jm98 | 2022-09-28T03:32:53Z | 2022-09-21T21:42:01Z | null | ['CVE-2022-39239'] | @netlify/ipx vulnerable to Full Response SSRF and Stored XSS via Cache Poisoning and Improper Host Validation | ### Impact
By sending specially crafted headers an attacker can bypass the source image domain allowlist, causing the handler to load and return arbitrary images. Because the response is cached globally, this image will then be served to visitors without requiring those headers to be set. XSS can be achieved by reques... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@netlify/ipx'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/netlify/netlify-ipx/security/advisories/GHSA-9jjv-524m-jm98'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39239'}, {'type': 'WEB', 'url': 'https://github.com/netlify/netlify-ipx/pull/61'}, {'type': 'WEB', 'url': 'https://github.com/netlify/netlify-... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:42:01Z', 'nvd_published_at': '2022-09-23T08:15:00Z'} |
1.4.0 | GHSA-936v-cg49-m2g5 | 2022-09-15T03:33:26Z | 2022-09-09T00:00:57Z | null | ['CVE-2022-25914'] | com.google.cloud.tools:jib-core vulnerable to Remote Code Execution (RCE) | The package com.google.cloud.tools:jib-core before 0.22.0 are vulnerable to Remote Code Execution (RCE) via the isDockerInstalled function, due to attempting to execute input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.google.cloud.tools:jib-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.22.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25914'}, {'type': 'WEB', 'url': 'https://github.com/GoogleContainerTools/jib/pull/3744'}, {'type': 'WEB', 'url': 'https://github.com/GoogleContainerTools/jib/commit/67fa40bc2c484da0546333914ea07a89fe44eaaf'}, {'type': 'PACKAGE', 'url': 'https://git... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:33:26Z', 'nvd_published_at': '2022-09-08T05:15:00Z'} |
1.4.0 | GHSA-xr6m-2p4m-jvqf | 2022-09-16T17:22:28Z | 2022-09-16T17:22:28Z | null | ['CVE-2022-36099'] | XWiki Platform Wiki UI Main Wiki Eval Injection vulnerability | ### Impact
It's possible to inject arbitrary wiki syntax including Groovy, Python and Velocity script macros via the request (URL parameter) using the `XWikiServerClassSheet` if the user has view access to this sheet and another page that has been saved with programming rights, a standard condition on a public read-onl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-wiki-ui-mainwiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.3-milestone-2'}, {'fixed': '13.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-wiki-ui-mainwiki'}, 'ranges': [{'type'... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-xr6m-2p4m-jvqf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36099'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/fc77f9f53bc65a4a9bfae3d5686615309c0c76cc'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-116', 'CWE-94', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:22:28Z', 'nvd_published_at': '2022-09-08T21:15:00Z'} |
1.4.0 | GHSA-p7hr-f446-x6qf | 2022-09-19T19:10:21Z | 2022-09-16T19:25:36Z | null | ['CVE-2022-35997'] | TensorFlow vulnerable to `CHECK` fail in `tf.sparse.cross` | ### Impact
If `tf.sparse.cross` receives an input `separator` that is not a scalar, it gives a `CHECK` fail that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
tf.sparse.cross(inputs=[],name='a',separator=tf.constant(['a', 'b'],dtype=tf.string))
```
### Patches
We have patched th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p7hr-f446-x6qf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35997'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/83dcb4dbfa094e33db084e97c4d0531a559e0ebf'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:25:36Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-8f8g-9j73-7p82 | 2022-09-21T21:07:43Z | 2022-09-16T00:00:36Z | null | ['CVE-2022-37264'] | steal vulnerable to Prototype Pollution via optionName variable | Prototype pollution vulnerability in stealjs steal 2.2.4 via the optionName variable in main.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'steal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37264'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/issues/1533'}, {'type': 'PACKAGE', 'url': 'https://github.com/stealjs/steal'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:07:43Z', 'nvd_published_at': '2022-09-15T16:15:00Z'} |
1.4.0 | GHSA-q8h9-pqcx-59hw | 2022-09-16T17:13:45Z | 2022-09-03T00:00:25Z | null | ['CVE-2022-38170'] | Apache Airflow exposes arbitrary file content | In Apache Airflow prior to 2.3.4, an insecure umask was configured for numerous Airflow components when running with the `--daemon` flag which could result in a race condition giving world-writable files in the Airflow home directory and allowing local users to expose arbitrary file contents via the webserver. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38170'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/airflow'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2022-261.yaml'}, {'type': 'WEB', 'url': 'https://lists.apache.org/threa... | {'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:13:45Z', 'nvd_published_at': '2022-09-02T07:15:00Z'} |
1.4.0 | GHSA-phr4-94xx-259m | 2022-12-06T15:43:14Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41232'] | Jenkins build-publisher plugin vulnerable to cross-site request forgery | A cross-site request forgery (CSRF) vulnerability in Jenkins Build-Publisher Plugin 1.22 and earlier allows attackers to replace any `config.xml` file on the Jenkins controller file system with an empty file by providing a crafted file name to an API endpoint. There is currently no workaround or patch as this plugin ha... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:build-publisher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41232'}, {'type': 'WEB', 'url': 'https://github.com/jenkins-infra/update-center2/pull/644'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2139'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T15:43:14Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-p5hr-rf6w-3vvh | 2022-12-12T13:00:14Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41246'] | CSRF vulnerability and mM | Worksoft Execution Manager Plugin 10.0.3.503 and earlier does not perform a permission check in a method implementing form validation.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentia... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ws-execution-manager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '10.0.3.503'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41246'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ws-execution-manager-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2237'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T13:00:14Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-83qx-288m-72w4 | 2022-09-23T21:00:25Z | 2022-09-23T00:00:46Z | null | ['CVE-2022-39975'] | Liferay Portal Missing Authorization vulnerability | The Layout module in Liferay Portal v7.3.3 through v7.4.3.34, and Liferay DXP 7.3 before update 10, and 7.4 before update 35 does not check user permission before showing the preview of a "Content Page" type page, allowing attackers to view unpublished "Content Page" pages via URL manipulation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.liferay.portal:release.portal.bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.3.3'}, {'fixed': '7.4.3.35'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39975'}, {'type': 'PACKAGE', 'url': 'https://github.com/liferay/liferay-portal'}, {'type': 'WEB', 'url': 'https://portal.liferay.dev/learn/security/known-vulnerabilities/-/asset_publisher/HbL5mxmVrnXW/content/cve-2022-39975'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T21:00:25Z', 'nvd_published_at': '2022-09-22T00:15:00Z'} |
1.4.0 | GHSA-6cvr-rvpm-9wx4 | 2022-12-09T20:08:33Z | 2022-09-22T00:00:26Z | null | ['CVE-2022-41249'] | Jenkins SCM HttpClient Plugin vulnerable to Cross-Site Request Forgery | SCM HttpClient Plugin 1.5 and earlier does not perform permission check in a method implementing form validation.
This allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.meowlomo.jenkins:scm-httpclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41249'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/scm-httpclient-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2708'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:20:06Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-rf3f-3p37-2qh4 | 2022-09-16T18:34:47Z | 2022-09-02T00:01:08Z | null | ['CVE-2022-2996'] | python-scciclient vulnerable to Man-in-the-middle (MITM) attacks | A flaw was found in the python-scciclient when making an HTTPS connection to a server where the server's certificate would not be verified. This issue opens up the connection to possible Man-in-the-middle (MITM) attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-scciclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2996'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/11/msg00006.html'}, {'type': 'WEB', 'url': 'https://opendev.org/x/python-scciclient/commit/274dca0344b65b4ac113d3271d21c17e970a636c'}] | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:34:47Z', 'nvd_published_at': '2022-09-01T18:15:00Z'} |
1.4.0 | GHSA-5c6q-f783-h888 | 2022-10-13T18:05:09Z | 2022-09-30T00:00:20Z | null | [] | AWS Redshift JDBC Driver fails to validate class type during object instantiation | In Amazon AWS Redshift JDBC Driver (aka amazon-redshift-jdbc-driver or redshift-jdbc42) before 2.1.0.8, the Object Factory does not check the class type when instantiating an object from a class name. This issue has been fixed in version 2.1.0.8. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.amazon.redshift:redshift-jdbc42'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/aws/amazon-redshift-jdbc-driver/security/advisories/GHSA-jc69-hjw2-fm86'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41828'}, {'type': 'WEB', 'url': 'https://github.com/aws/amazon-redshift-jdbc-driver/commit/40b143b4698faf90c788ffa89f2d4d8d2ad068b... | {'cwe_ids': ['CWE-704'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T23:02:26Z', 'nvd_published_at': '2022-09-29T21:15:00Z'} |
1.4.0 | GHSA-h7ff-cfc9-wmmh | 2022-09-19T19:51:34Z | 2022-09-16T22:15:21Z | null | ['CVE-2022-35990'] | TensorFlow vulnerable to `CHECK` fail in `FakeQuantWithMinMaxVarsPerChannelGradient` | ### Impact
When `tf.quantization.fake_quant_with_min_max_vars_per_channel_gradient` receives input `min` or `max` of rank other than 1, it gives a `CHECK` fail that can trigger a denial of service attack.
```python
import tensorflow as tf
arg_0=tf.random.uniform(shape=(1,1), dtype=tf.float32, maxval=None)
arg_1=tf.rand... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h7ff-cfc9-wmmh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35990'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f3cf67ac5705f4f04721d15e485e192bb319feed'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:15:21Z', 'nvd_published_at': '2022-09-16T22:15:00Z'} |
1.4.0 | GHSA-4jfq-4fqc-5j9c | 2022-12-06T15:33:59Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41233'] | Jenkins Rundeck Plugin Missing Authorization vulnerability | Jenkins Rundeck Plugin 3.6.11 and earlier does not perform Run/Artifacts permission checks in multiple HTTP endpoints, allowing attackers with Item/Read permission to obtain information about build artifacts of a given job, if the optional Run/Artifacts permission is enabled. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rundeck'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41233'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/rundeck-plugin/commit/032b3bb9eafee5f83e3ddeb023eb34d0eeae19b7'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rundeck-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.i... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:39:39Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-9rwj-9j2h-fhvm | 2022-09-23T20:32:29Z | 2022-09-23T00:00:29Z | null | ['CVE-2022-23458'] | Toast UI Grid vulnerable to Cross-site Scripting | Toast UI Grid is a component to display and edit data. Versions prior to 4.21.3 are vulnerable to cross-site scripting attacks when pasting specially crafted content into editable cells. This issue was fixed in version 4.21.3. There are no known workarounds. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'tui-grid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.21.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23458'}, {'type': 'WEB', 'url': 'https://github.com/nhn/tui.grid/commit/e9db5968675ae113c07efc091cce210f2b26854f'}, {'type': 'PACKAGE', 'url': 'https://github.com/nhn/tui.grid'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisorie... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:32:29Z', 'nvd_published_at': '2022-09-22T22:15:00Z'} |
1.4.0 | GHSA-c5v8-2q4r-5w9v | 2022-09-16T17:36:44Z | 2022-09-16T17:36:44Z | null | ['CVE-2022-36098'] | XWiki Platform Mentions UI vulnerable to Cross-site Scripting | ### Impact
It's possible to store Javascript or groovy scripts in an mention macro anchor or reference field. The stored code is executed by anyone visiting the page with the mention.
For example, the example below will create a file at `/tmp/exploit.txt`:
```
{{mention reference="XWiki.Translation" anchor="{{/html~}... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-mentions-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '12.5-rc-1'}, {'fixed': '13.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-mentions-ui'}, 'ranges': [{'type': 'ECOSYSTEM', '... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-c5v8-2q4r-5w9v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36098'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/4032dc896857597efd169966dc9e2752a9fdd459#diff-4fe22885f772e47... | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:36:44Z', 'nvd_published_at': '2022-09-08T21:15:00Z'} |
1.4.0 | GHSA-fq2h-r2h9-pj8r | 2022-12-06T13:56:58Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41229'] | Jenkins NS-ND Integration Performance Publisher Plugin vulnerable to Cross-site Scripting | Jenkins NS-ND Integration Performance Publisher Plugin prior to version 4.8.0.147 does not escape configuration options of the Execute NetStorm/NetCloud Test build step, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:cavisson-ns-nd-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.0.147'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41229'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin/commit/d77c6c7a279da002178f8244f37093773dd6aee5'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin'}, {'type'... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:40:49Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-qgv4-7jhx-c72q | 2022-12-08T21:00:27Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41234'] | Missing webhook endpoint authorization in Jenkins Rundeck Plugin | Jenkins Rundeck Plugin 3.6.11 and earlier does not protect access to the `/plugin/rundeck/webhook/` endpoint, allowing users with Overall/Read permission to trigger jobs that are configured to be triggerable via Rundeck. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rundeck'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41234'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rundeck-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2169'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:38:06Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-mh3m-62v7-68xg | 2022-09-19T19:07:30Z | 2022-09-16T22:06:35Z | null | ['CVE-2022-36002'] | TensorFlow vulnerable to `CHECK` fail in `Unbatch` | ### Impact
When `Unbatch` receives a nonscalar input `id`, it gives a `CHECK` fail that can trigger a denial of service attack.
```python
import tensorflow as tf
import numpy as np
arg_0=tf.constant(value=np.random.random(size=(3, 3, 1)), dtype=tf.float64)
arg_1=tf.constant(value=np.random.randint(0,100,size=(3, 3, 1))... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mh3m-62v7-68xg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36002'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/4419d10d576adefa36b0e0a9425d2569f7c0189f'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:06:35Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-47m6-46mj-p235 | 2022-09-16T18:50:12Z | 2022-09-16T18:50:12Z | null | ['CVE-2022-36020'] | TYPO3 HTML Sanitizer Bypasses Cross-Site Scripting Protection | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.7)
### Problem
Due to a parsing issue in upstream package [`masterminds/html5`](https://packagist.org/packages/masterminds/html5), malicious markup used in a sequence with special HTML comments cannot be filtered and sanitized. This a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.0.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.... | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/html-sanitizer/security/advisories/GHSA-47m6-46mj-p235'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36020'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/html-sanitizer/commit/60bfdc7f9b394d0236e16ee4cea8372a7defa493'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:50:12Z', 'nvd_published_at': '2022-09-13T17:15:00Z'} |
1.4.0 | GHSA-ghq7-85hp-fh76 | 2022-12-06T22:45:05Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41245'] | CSRF vulnerability in Jenkins Worksoft Execution Manager Plugin allows capturing credentials | Worksoft Execution Manager Plugin 10.0.3.503 and earlier does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credential... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ws-execution-manager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_known_affected_version_range': '< 10.0.3.503'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41245'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ws-execution-manager-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2237'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T22:45:05Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-2m6g-crv8-p3c6 | 2022-09-21T19:21:12Z | 2022-09-16T21:17:44Z | null | ['CVE-2022-36079'] | Parse Server vulnerable to brute force guessing of user sensitive data via search patterns | ### Impact
Internal fields (keys used internally by Parse Server, prefixed by `_`) and protected fields (user defined) can be used as query constraints. Internal and protected fields are removed by Parse Server from query results and are only returned to the client using a valid master key. However, using query constr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.14'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-2m6g-crv8-p3c6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36079'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/issues/8143'}, {'type': 'WEB', 'url': 'https://githu... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:17:44Z', 'nvd_published_at': '2022-09-07T21:15:00Z'} |
1.4.0 | GHSA-4wjj-jwc9-2x96 | 2022-09-16T21:56:51Z | 2022-09-14T00:00:48Z | null | ['CVE-2022-2989'] | Podman's incorrect handling of the supplementary groups may lead to data disclosure, modification | An incorrect handling of the supplementary groups in the Podman container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/podman/v4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containers/podman/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2989'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/pull/15618'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/pull/15677'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/pull/15696'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-842', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:23:59Z', 'nvd_published_at': '2022-09-13T14:15:00Z'} |
1.4.0 | GHSA-xx9w-464f-7h6f | 2023-04-03T18:56:08Z | 2022-09-16T20:27:13Z | null | ['CVE-2022-31667'] | Harbor fails to validate the user permissions when updating a robot account | ### Impact
Harbor fails to validate the user permissions when updating a robot account that
belongs to a project that the authenticated user doesn’t have access to. API call:
PUT /robots/{robot_id}
By sending a request that attempts to update a robot account, and specifying a robot
account id and robot account name t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.10.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.12'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges'... | [{'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories/GHSA-xx9w-464f-7h6f'}, {'type': 'PACKAGE', 'url': 'https://github.com/goharbor/harbor'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T20:27:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f524-rf33-2jjr | 2023-02-15T19:25:47Z | 2022-09-16T17:42:47Z | null | ['CVE-2022-36085'] | OPA Compiler: Bypass of WithUnsafeBuiltins using "with" keyword to mock functions | ### Impact
The Rego compiler provides a (deprecated) `WithUnsafeBuiltins` function, which allows users to provide a set of built-in functions that should be deemed unsafe — and as such rejected — by the compiler if encountered in the policy compilation stage. A bypass of this protection has been found, where the use o... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/open-policy-agent/opa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.40.0'}, {'fixed': '0.43.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/open-policy-agent/opa/security/advisories/GHSA-f524-rf33-2jjr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36085'}, {'type': 'WEB', 'url': 'https://github.com/open-policy-agent/opa/pull/4540'}, {'type': 'WEB', 'url': 'https://github.com/open-polic... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:42:47Z', 'nvd_published_at': '2022-09-08T14:15:00Z'} |
1.4.0 | GHSA-hwq7-5vv9-c6cf | 2022-09-16T21:59:38Z | 2022-09-16T00:00:39Z | null | ['CVE-2018-25047'] | Smarty Cross-site Scripting vulnerability in pages that use smarty_function_mailto | In Smarty before 3.1.47 and 4.x before 4.2.1, `libs/plugins/function.mailto.php` allows cross-site scripting. A web page that uses `smarty_function_mailto`, and that could be parameterized using GET or POST input parameters, could allow injection of JavaScript code by a user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.47'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'smarty/smarty'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25047'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/issues/454'}, {'type': 'WEB', 'url': 'https://github.com/smarty-php/smarty/commit/55ea25d1f50f0406fb1ccedd212c527977793fc9'}, {'type': 'WEB', 'url': 'https://bugs.gentoo.org/8701... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:59:38Z', 'nvd_published_at': '2022-09-15T00:15:00Z'} |
1.4.0 | GHSA-4rxr-27mm-mxq9 | 2022-09-30T05:31:32Z | 2022-09-30T05:31:32Z | null | ['CVE-2022-39263'] | Upstash Adapter missing token verification | ### Impact
Applications that use `next-auth` Email Provider and `@next-auth/upstash-redis-adapter` before v3.0.2 are affected.
### Description
The Upstash Redis adapter implementation did not check for both the identifier (email) and the token, but only checking for the identifier when verifying the token in the email... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@next-auth/upstash-redis-adapter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/security/advisories/GHSA-4rxr-27mm-mxq9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39263'}, {'type': 'WEB', 'url': 'https://github.com/nextauthjs/next-auth/commit/d16e04848ee703cf797724194d4ad2907fe125a9'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T05:31:32Z', 'nvd_published_at': '2022-09-28T21:15:00Z'} |
1.4.0 | GHSA-j9fq-vwqv-2fm2 | 2023-06-21T18:10:04Z | 2022-09-15T00:00:24Z | null | ['CVE-2022-2900'] | Server-Side Request Forgery (SSRF) in GitHub repository ionicabizau/parse-url | Server-Side Request Forgery (SSRF) in GitHub repository ionicabizau/parse-url prior to 8.1.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2900'}, {'type': 'WEB', 'url': 'https://github.com/ionicabizau/parse-url/commit/b88c81df8f4c5168af454eaa4f92afa9349e4e13'}, {'type': 'PACKAGE', 'url': 'https://github.com/IonicaBizau/parse-url'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1... | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T16:17:41Z', 'nvd_published_at': '2022-09-14T11:15:00Z'} |
1.4.0 | GHSA-r947-2crg-xc39 | 2022-09-19T20:19:16Z | 2022-09-15T00:00:17Z | null | ['CVE-2022-40365'] | ouqiang gocron Cross-site scripting vulnerability | Cross site scripting (XSS) vulnerability in ouqiang gocron through 1.5.3, allows attackers to execute arbitrary code via scope.row.hostname in web/vue/src/pages/taskLog/list.vue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ouqiang/gocron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40365'}, {'type': 'WEB', 'url': 'https://github.com/ouqiang/gocron/issues/362'}, {'type': 'PACKAGE', 'url': 'https://github.com/ouqiang/gocron'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:09:07Z', 'nvd_published_at': '2022-09-14T21:15:00Z'} |
1.4.0 | GHSA-28v4-jf82-jvj8 | 2022-09-21T21:07:52Z | 2022-09-16T00:00:36Z | null | ['CVE-2022-37262'] | steal vulnerable to Regular Expression Denial of Service via source and sourceWithComments | A Regular Expression Denial of Service (ReDoS) flaw was found in stealjs steal via the source and sourceWithComments variable in main.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'steal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37262'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/issues/1531'}, {'type': 'PACKAGE', 'url': 'https://github.com/stealjs/steal'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:07:52Z', 'nvd_published_at': '2022-09-15T16:15:00Z'} |
1.4.0 | GHSA-54qx-8p8w-xhg8 | 2022-09-16T21:05:28Z | 2022-09-16T21:05:28Z | null | ['CVE-2022-36071'] | SFTPGo vulnerable to recovery codes abuse | ### Impact
SFTPGo WebAdmin and WebClient support login using TOTP (Time-based One Time Passwords) as a seconday authentication factor. Because TOTPs are often configured on mobile devices that can be lost, stolen or damaged, SFTPGo also supports recovery codes. These are a set of one time use codes that can be used in... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/drakkan/sftpgo/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.3.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/drakkan/sftpgo/security/advisories/GHSA-54qx-8p8w-xhg8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36071'}, {'type': 'WEB', 'url': 'https://github.com/drakkan/sftpgo/issues/965'}, {'type': 'PACKAGE', 'url': 'https://github.com/drakkan/sftpgo'}] | {'cwe_ids': ['CWE-287', 'CWE-916'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:05:28Z', 'nvd_published_at': '2022-09-02T18:15:00Z'} |
1.4.0 | GHSA-qcqv-38jg-2r43 | 2022-09-15T17:56:13Z | 2022-09-15T03:21:41Z | null | [] | Pageflow vulnerable to insecure direct object reference in membership update endpoint | ### Impact
Pageflow has a membership edit feature which allows users to edit the roles of user memberships associated with an account that they have the `manager` role to (including their own). While the `Entity` dropdown select field is greyed out in the UI, an attacker can use tools which allow sending arbitrary HTT... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'pageflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.5.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'pageflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '15.7.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/codevise/pageflow/security/advisories/GHSA-qcqv-38jg-2r43'}, {'type': 'WEB', 'url': 'https://github.com/codevise/pageflow/pull/1862'}, {'type': 'PACKAGE', 'url': 'https://github.com/codevise/pageflow'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:21:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gmj8-84r4-h46j | 2022-09-23T20:38:52Z | 2022-09-23T00:00:31Z | null | ['CVE-2022-3274'] | rdiffweb Cross-Site Request Forgery vulnerability can lead to user email ID being changed | rdiffwen prior to version 2.4.7 is vulnerable to Cross-Site Request Forgery (CSRF). An attacker can change a user's email ID. Version 2.4.7 has a fix for this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3274'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/e974df75bdbcff3996ad70bd1b4424ec1485ea3f'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8834c356-4d... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:38:52Z', 'nvd_published_at': '2022-09-22T19:15:00Z'} |
1.4.0 | GHSA-gp7f-rwcx-9369 | 2022-11-04T20:35:22Z | 2022-09-01T22:14:57Z | null | ['CVE-2022-36033'] | jsoup may not sanitize code injection XSS attempts if SafeList.preserveRelativeLinks is enabled | jsoup may incorrectly sanitize HTML including `javascript:` URL expressions, which could allow cross-site scripting (XSS) attacks when a reader subsequently clicks that link. If the non-default `SafeList.preserveRelativeLinks` option is enabled, HTML including `javascript:` URLs that have been crafted with control char... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jsoup:jsoup'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jhy/jsoup/security/advisories/GHSA-gp7f-rwcx-9369'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36033'}, {'type': 'PACKAGE', 'url': 'https://github.com/jhy/jsoup'}, {'type': 'WEB', 'url': 'https://github.com/jhy/jsoup/releases/tag/jsoup-1.15.3'}, {... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:14:57Z', 'nvd_published_at': '2022-08-29T17:15:00Z'} |
1.4.0 | GHSA-mrgp-mrhc-5jrq | 2022-09-28T13:09:01Z | 2022-09-28T13:09:01Z | null | ['CVE-2022-36067'] | vm2 vulnerable to Sandbox Escape resulting in Remote Code Execution on host | ### Impact
A threat actor can bypass the sandbox protections to gain remote code execution rights on the host running the sandbox.
### Patches
This vulnerability was patched in the release of version `3.9.11` of `vm2`
### Workarounds
None.
### References
Github Issue - https://github.com/patriksimek/vm2/issues/467
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'vm2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.9.11'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/security/advisories/GHSA-mrgp-mrhc-5jrq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36067'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/issues/467'}, {'type': 'WEB', 'url': 'https://github.com/patriksimek/vm2/commi... | {'cwe_ids': ['CWE-913'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-28T13:09:01Z', 'nvd_published_at': '2022-09-06T22:15:00Z'} |
1.4.0 | GHSA-97p7-w86h-vcf9 | 2022-09-19T19:50:05Z | 2022-09-16T20:51:55Z | null | ['CVE-2022-35935'] | TensorFlow vulnerable to `CHECK` failure in `SobolSample` via missing validation | ### Impact
The implementation of SobolSampleOp is vulnerable to a denial of service via CHECK-failure (assertion failure) caused by assuming `input(0)`, `input(1)`, and `input(2)` to be scalar.
```python
import tensorflow as tf
tf.raw_ops.SobolSample(dim=tf.constant([1,0]), num_results=tf.constant([1]), skip=tf.constan... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-97p7-w86h-vcf9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35935'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c65c67f88ad770662e8f191269a907bf2b94b1bf'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T20:51:55Z', 'nvd_published_at': '2022-09-16T20:15:00Z'} |
1.4.0 | GHSA-9cr2-8pwr-fhfq | 2022-09-19T19:51:14Z | 2022-09-16T21:15:36Z | null | ['CVE-2022-36026'] | TensorFlow vulnerable to `CHECK` fail in `QuantizeAndDequantizeV3` | ### Impact
If `QuantizeAndDequantizeV3` is given a nonscalar `num_bits` input tensor, it results in a `CHECK` fail that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
signed_input = True
range_given = False
narrow_range = False
axis = -1
input = tf.constant(-3.5, shape=[1], dtype=... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9cr2-8pwr-fhfq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36026'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f3f9cb38ecfe5a8a703f2c4a8fead434ef291713'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:15:36Z', 'nvd_published_at': '2022-09-16T22:15:00Z'} |
1.4.0 | GHSA-4w68-4x85-mjj9 | 2022-09-19T19:26:18Z | 2022-09-16T22:15:49Z | null | ['CVE-2022-35966'] | TensorFlow vulnerable to segfault in `QuantizedAvgPool` | ### Impact
If `QuantizedAvgPool` is given `min_input` or `max_input` tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
ksize = [1, 2, 2, 1]
strides = [1, 2, 2, 1]
padding = "SAME"
input = tf.constant(1, shape=[1,4,4,2], dtype=t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4w68-4x85-mjj9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35966'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/7cdf9d4d2083b739ec81cfdace546b0c99f50622'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:15:49Z', 'nvd_published_at': '2022-09-16T21:15:00Z'} |
1.4.0 | GHSA-462r-wxvm-jvxh | 2022-09-15T03:24:31Z | 2022-09-10T00:00:24Z | null | ['CVE-2022-38639'] | Markdown-Nice v1.8.22 vulnerable to Cross-site Scripting | A cross-site scripting (XSS) vulnerability in Markdown-Nice v1.8.22 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Community Posting field. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'markdown-nice'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.8.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38639'}, {'type': 'WEB', 'url': 'https://github.com/mdnice/markdown-nice/issues/327'}, {'type': 'PACKAGE', 'url': 'https://github.com/mdnice/markdown-nice'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:24:31Z', 'nvd_published_at': '2022-09-09T19:15:00Z'} |
1.4.0 | GHSA-hrj7-f62f-j7x7 | 2022-09-30T04:41:04Z | 2022-09-27T00:00:22Z | null | ['CVE-2022-3295'] | rdiffweb allows unlimited length of root directory name, which could result in DoS | rdiffweb prior to 2.4.8 has no limit in length of root directory names. Allowing users to enter long strings may result in a DOS attack or memory corruption. Version 2.4.8 defines a field limit for username, email, and root directory. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3295'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab... | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:41:04Z', 'nvd_published_at': '2022-09-26T13:15:00Z'} |
1.4.0 | GHSA-9vqj-64pv-w55c | 2022-09-19T19:38:15Z | 2022-09-16T22:28:41Z | null | ['CVE-2022-35988'] | TensorFlow vulnerable to `CHECK` fail in `tf.linalg.matrix_rank` | ### Impact
When `tf.linalg.matrix_rank` receives an empty input `a`, the GPU kernel gives a `CHECK` fail that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
a = tf.constant([], shape=[0, 1, 1], dtype=tf.float32)
tf.linalg.matrix_rank(a=a)
```
### Patches
We have patched the issue... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9vqj-64pv-w55c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35988'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c55b476aa0e0bd4ee99d0f3ad18d9d706cd1260a'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:28:41Z', 'nvd_published_at': '2022-09-16T22:15:00Z'} |
1.4.0 | GHSA-mv8m-8x97-937q | 2022-09-19T19:05:55Z | 2022-09-16T21:23:11Z | null | ['CVE-2022-36004'] | TensorFlow vulnerable to `CHECK` fail in `tf.random.gamma` | ### Impact
When `tf.random.gamma` receives large input shape and rates, it gives a `CHECK` fail that can trigger a denial of service attack.
```python
import tensorflow as tf
arg_0=tf.random.uniform(shape=(4,), dtype=tf.int32, maxval=65536)
arg_1=tf.random.uniform(shape=(4, 4), dtype=tf.float64, maxval=None)
arg_2=tf.r... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mv8m-8x97-937q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36004'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/552bfced6ce4809db5f3ca305f60ff80dd40c5a3'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:23:11Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-6vfq-jmxg-g58r | 2022-09-16T21:02:55Z | 2022-09-16T21:02:55Z | null | ['CVE-2022-36101'] | Shopware contains sensitive data in backend customer module | ### Impact
The request for the customer detail view in the backend administration contained sensitive data like the hashed password and the session ID.
### Patches
We recommend updating to the current version 5.7.15. You can get the update to 5.7.15 regularly via the Auto-Updater or directly via the download overview.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.7.14'}}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-6vfq-jmxg-g58r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36101'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/af5cdbc81d60f21b728e1433aeb8837f25938d2a'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-200', 'CWE-312'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:02:55Z', 'nvd_published_at': '2022-09-12T20:15:00Z'} |
1.4.0 | GHSA-j8xr-2279-88qj | 2022-12-06T19:41:02Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41241'] | Jenkins RQM Plugin vulnerable to Improper Restriction of XML External Entity Reference | Jenkins RQM Plugin 2.8 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to provide crafted API responses from Rational Quality Manager to have Jenkins parse a crafted XML document that uses external entities for extraction of secrets from the Jenkins... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.praqma:rqm-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41241'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rqm-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2805'}] | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:36:52Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-hc94-9v26-gxwv | 2022-09-16T17:41:00Z | 2022-09-07T00:01:50Z | null | ['CVE-2022-36663'] | Gluu Oxauth before v4.4.1 vulnerable to Server-Side Request Forgery attacks via a crafted request_uri parameter | Gluu Oxauth before v4.4.1 allows attackers to execute blind SSRF (Server-Side Request Forgery) attacks via a crafted request_uri parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.gluu:oxauth-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36663'}, {'type': 'WEB', 'url': 'https://github.com/GluuFederation/oxAuth/commit/58c4ac9bbf2addf4b419bf155de99db57a202f5c'}, {'type': 'PACKAGE', 'url': 'https://github.com/GluuFederation/oxAuth'}, {'type': 'WEB', 'url': 'https://github.com/GluuFede... | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:41:00Z', 'nvd_published_at': '2022-09-06T21:15:00Z'} |
1.4.0 | GHSA-qf8g-vpwp-6579 | 2022-09-16T19:26:04Z | 2022-09-01T00:00:26Z | null | ['CVE-2022-37022'] | Apache Geode versions deserialization of untrusted datawhen using JMX over RMI on Java 11 | Apache Geode versions up to 1.12.2 and 1.13.2 are vulnerable to a deserialization of untrusted data flaw when using JMX over RMI on Java 11. Any user wishing to protect against deserialization attacks involving JMX or RMI should upgrade to Apache Geode 1.15. Use of 1.15 on Java 11 will automatically protect JMX over RM... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37022'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/kr1y4l9752g1ww1shnmh8dbfjq785k4m'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:26:04Z', 'nvd_published_at': '2022-08-31T07:15:00Z'} |
1.4.0 | GHSA-232p-59mg-f98p | 2022-09-21T21:36:27Z | 2022-09-21T00:00:52Z | null | ['CVE-2022-3242'] | Microweber Cross-site Scripting can result in redirection to a malicious site | Microweber versions 1.3.1 and prior are vulnerable to HTML injection that an attacker can use to redirect someone to a malicious site. A patch is available at commit 68f0721571653db865a5fa01c7986642c82e919c and expected to be part of version 1.3.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3242'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/68f0721571653db865a5fa01c7986642c82e919c'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:36:27Z', 'nvd_published_at': '2022-09-20T11:15:00Z'} |
1.4.0 | GHSA-gwc9-m7rh-j2ww | 2023-08-30T13:46:25Z | 2022-09-07T00:01:52Z | null | ['CVE-2021-43565'] | x/crypto/ssh vulnerable to panic via malformed packets | The x/crypto/ssh package before 0.0.0-20211202192323-5770296d904e of golang.org/x/crypto allows an unauthenticated attacker to panic an SSH server. When using AES-GCM or ChaCha20Poly1305, consuming a malformed packet which contains an empty plaintext causes a panic. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/crypto'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20211202192323-5770296d904e'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43565'}, {'type': 'WEB', 'url': 'https://go.dev/cl/368814/'}, {'type': 'WEB', 'url': 'https://go.dev/issues/49932'}, {'type': 'WEB', 'url': 'https://groups.google.com/forum/#!forum/golang-announce'}, {'type': 'WEB', 'url': 'https://groups.google.co... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:40:34Z', 'nvd_published_at': '2022-09-06T18:15:00Z'} |
1.4.0 | GHSA-gvjw-8mmr-8f6g | 2022-09-23T13:44:49Z | 2022-09-17T00:00:30Z | null | ['CVE-2022-37258'] | steal vulnerable to Prototype Pollution | Prototype pollution vulnerability in function convertLater in npm-convert.js in stealjs steal 2.2.4 via the packageName variable in npm-convert.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'steal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37258'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/issues/1527'}, {'type': 'PACKAGE', 'url': 'https://github.com/stealjs/steal'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:44:49Z', 'nvd_published_at': '2022-09-16T22:15:00Z'} |
1.4.0 | GHSA-26m4-qjp9-xmc6 | 2022-09-21T21:11:29Z | 2022-09-21T00:00:46Z | null | ['CVE-2022-40955'] | Apache InLong vulnerable to Deserialization of Untrusted Data | In versions of Apache InLong prior to 1.3.0, an attacker with sufficient privileges to specify MySQL JDBC connection URL parameters and to write arbitrary data to the MySQL database, could cause this data to be deserialized by Apache InLong, potentially leading to Remote Code Execution on the Apache InLong server. User... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.inlong:inlong-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40955'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/inlong'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/r1r34y7bchrpmp9jhfdoohzdmk7pj1q1'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/09/22/5'}] | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:11:29Z', 'nvd_published_at': '2022-09-20T14:15:00Z'} |
1.4.0 | GHSA-qwc8-vjh3-gm2j | 2022-09-21T21:24:44Z | 2022-09-21T00:00:52Z | null | ['CVE-2022-3004'] | YetiForce CRM vulnerable to stored Cross-site Scripting via WorkFlow module | YetiForce CRM versions 6.4.0 and prior are vulnerable to cross-site scripting via the `WorkFlow` module. A patch is available at commit cd82ecce44d83f1f6c10c7766bf36f3026de024a. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3004'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/cd82ecce44d83f1f6c10c7766bf36f3026de024a'}, {'type': 'PACKAGE', 'url': 'https://github.com/YetiForceCompany/YetiForceCRM'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:24:44Z', 'nvd_published_at': '2022-09-20T10:15:00Z'} |
1.4.0 | GHSA-mjw4-xvx6-3grg | 2022-09-16T21:35:41Z | 2022-09-14T00:00:51Z | null | ['CVE-2022-3174'] | rdiffweb 2.4.1 vulnerable to Sensitive Cookie in HTTPS Session Without 'Secure' Attribute | rdiffweb version 2.4.1 is vulnerable to Sensitive Cookie in HTTPS Session Without 'Secure' Attribute. This makes it so that a user's cookies can be sent to the server with an unencrypted request over the HTTP protocol. Version 2.4.2 contains a fix for the issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.1'}, {'fixed': '2.4.2'}]}], 'versions': ['2.4.1']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3174'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/f2de2371c5e13ce1c6fd6f9a1ed3e5d46b93cd7e'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab... | {'cwe_ids': ['CWE-311', 'CWE-614'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:22:39Z', 'nvd_published_at': '2022-09-13T10:15:00Z'} |
1.4.0 | GHSA-fjjw-82xw-vfc2 | 2023-07-25T16:46:14Z | 2022-09-02T00:01:09Z | null | ['CVE-2022-37435'] | Apache ShenYu Admin has insecure permissions | Apache ShenYu Admin has insecure permissions, which may allow low-privilege administrators to modify high-privilege administrator's passwords. This issue affects Apache ShenYu 2.4.2 and 2.4.3. Version 2.5.0 contains a patch for this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.shenyu:shenyu-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.2'}, {'fixed': '2.5.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.4.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37435'}, {'type': 'WEB', 'url': 'https://github.com/apache/shenyu/pull/3658'}, {'type': 'WEB', 'url': 'https://github.com/apache/shenyu/releases/tag/v2.5.0'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ndblyxr2fdrvjtgbs1bogxgv2cgk7t28'... | {'cwe_ids': ['CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:31:15Z', 'nvd_published_at': '2022-09-01T14:15:00Z'} |
1.4.0 | GHSA-v62j-cxhh-fq22 | 2022-09-16T21:00:08Z | 2022-09-13T00:00:39Z | null | ['CVE-2022-37734'] | graphql-java vulnerable to Denial of Service via GraphQL query that consumes CPU resources | graphql-java before 19.0, 18.3, and 17.4 is vulnerable to Denial of Service. An attacker send a malicious GraphQL query that consumes CPU resources. The fixed versions are 19.0, 18.3, and 17.4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.graphql-java:graphql-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '17.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.graphql-java:graphql-java'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '18.0'}, {'fixed':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37734'}, {'type': 'WEB', 'url': 'https://github.com/graphql-java/graphql-java/issues/2888'}, {'type': 'WEB', 'url': 'https://github.com/graphql-java/graphql-java/pull/2892'}, {'type': 'PACKAGE', 'url': 'https://github.com/graphql-java/graphql-java'... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:00:08Z', 'nvd_published_at': '2022-09-12T14:15:00Z'} |
1.4.0 | GHSA-5rp4-749p-vx26 | 2022-09-22T22:40:27Z | 2022-09-22T22:40:27Z | null | ['CVE-2022-40604'] | Apache Airflow vulnerable to Use of Externally-Controlled Format String | In Apache Airflow 2.3.0 through 2.3.4, part of a url was unnecessarily formatted, allowing for possible information extraction. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.4.0b1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40604'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/26337'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/18386026c28939fa6d91d198c5489c295a05dcd2'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-d... | {'cwe_ids': ['CWE-134'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-22T22:40:27Z', 'nvd_published_at': '2022-09-21T08:15:00Z'} |
1.4.0 | GHSA-6xm7-3cc5-47f9 | 2022-09-16T17:19:30Z | 2022-09-08T00:00:30Z | null | ['CVE-2022-37189'] | MEI2Volpiano is vulnerable to XML External Entity (XXE), leading to a Denial of Service (DoS) | DDMAL MEI2Volpiano 0.8.2 is vulnerable to XML External Entity (XXE), leading to a Denial of Service. This occurs due to the usage of the unsafe 'xml.etree' library to parse untrusted XML input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mei2volpiano'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37189'}, {'type': 'WEB', 'url': 'https://docs.python.org/3/library/xml.html#xml-vulnerabilities'}, {'type': 'PACKAGE', 'url': 'https://github.com/DDMAL/MEI2Volpiano/'}, {'type': 'WEB', 'url': 'https://github.com/DDMAL/MEI2Volpiano/blob/987b70fff991... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:19:30Z', 'nvd_published_at': '2022-09-07T13:15:00Z'} |
1.4.0 | GHSA-p2f7-9cv7-jjf6 | 2022-09-19T20:25:28Z | 2022-09-12T00:00:33Z | null | ['CVE-2022-26049'] | Goomph before 3.37.2 allows malicious zip file to write contents to arbitrary locations | This affects the package com.diffplug.gradle:goomph before 3.37.2. It allows a malicious zip file to potentially break out of the expected destination directory, writing contents into arbitrary locations on the file system. Overwriting certain files/directories could allow an attacker to achieve remote code execution o... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.diffplug.gradle:goomph'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.37.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26049'}, {'type': 'WEB', 'url': 'https://github.com/diffplug/goomph/pull/198'}, {'type': 'WEB', 'url': 'https://github.com/diffplug/goomph/commit/25f04f67ba62d9a14104bee13a0a0f2517afb8c8'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:28:31Z', 'nvd_published_at': '2022-09-11T14:15:00Z'} |
1.4.0 | GHSA-q3f4-9h4p-vgr3 | 2022-09-29T10:09:03Z | 2022-09-25T00:00:15Z | null | ['CVE-2022-41340'] | secp256k1-js implements ECDSA without required r and s validation, leading to signature forgery | The secp256k1-js package before 1.1.0 for Node.js implements ECDSA without required r and s validation, leading to signature forgery. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@lionello/secp256k1-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41340'}, {'type': 'WEB', 'url': 'https://github.com/lionello/secp256k1-js/issues/11'}, {'type': 'WEB', 'url': 'https://github.com/lionello/secp256k1-js/commit/302800f0370b42e360a33774bb808274ac729c2e'}, {'type': 'PACKAGE', 'url': 'https://github.co... | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-27T22:34:59Z', 'nvd_published_at': '2022-09-24T19:15:00Z'} |
1.4.0 | GHSA-vv7x-7w4m-q72f | 2022-09-27T06:12:12Z | 2022-09-21T20:36:50Z | null | ['CVE-2022-39230'] | fhir-works-on-aws-authz-smart handles permissions improperly | ### Impact
This issue allows a client of the API to retrieve more information than the client’s OAuth scope permits when making “search-type” requests. This issue would not allow a client to retrieve information about individuals other than those the client was already authorized to access.
### Patches
We recommend ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'fhir-works-on-aws-authz-smart'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.1'}, {'fixed': '3.1.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/awslabs/fhir-works-on-aws-authz-smart/security/advisories/GHSA-vv7x-7w4m-q72f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39230'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/fhir-works-on-aws-authz-smart/commit/203bbc0dd17de748c36b33c68b8... | {'cwe_ids': ['CWE-200', 'CWE-281'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T20:36:50Z', 'nvd_published_at': '2022-09-23T07:15:00Z'} |
1.4.0 | GHSA-crf8-h2wq-2h9x | 2023-08-08T21:19:03Z | 2022-09-21T00:00:38Z | null | ['CVE-2022-39974'] | WASM3 Improper Input Validation vulnerability | WASM3 v0.5.0 was discovered to contain a segmentation fault via the component `op_Select_i32_srs` in `wasm3/source/m3_exec.h`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pywasm3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'wasm3'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39974'}, {'type': 'WEB', 'url': 'https://github.com/wasm3/wasm3/issues/344'}, {'type': 'WEB', 'url': 'https://github.com/wasm3/wasm3/issues/379'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/pywasm3/PYSEC-2022-... | {'cwe_ids': ['CWE-119', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:10:20Z', 'nvd_published_at': '2022-09-20T18:15:00Z'} |
1.4.0 | GHSA-cw2v-wv4g-w4p6 | 2022-09-22T17:20:09Z | 2022-09-18T00:00:30Z | null | ['CVE-2022-3232'] | rdiffweb CSRF vulnerability in admin area can lead to deletion of repositories and users | rdiffweb prior to 2.4.5 is vulnerable to Cross-Site Request Forgery (CSRF). An attacker exploiting this vulnerability can use it to delete repositories and users. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3232'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/422791ea45713aaaa865bdca74addb9fffd93a71'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:29:23Z', 'nvd_published_at': '2022-09-17T20:15:00Z'} |
1.4.0 | GHSA-c86f-9grv-pmqf | 2022-09-15T03:31:34Z | 2022-09-06T00:00:27Z | null | ['CVE-2022-38370'] | Apache IoTDB grafana-connector contains an interface without authorization | Apache IoTDB grafana-connector version 0.13.0 contains an interface without authorization, which may expose the internal structure of a database. Users should upgrade to version 0.13.1, which addresses this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.iotdb:iotdb-grafana-connector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38370'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/iotdb'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/kcpqgstvgf8sxy9ktxm1836nlwc8xy3j'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/09/05/2'}] | {'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:31:34Z', 'nvd_published_at': '2022-09-05T10:15:00Z'} |
1.4.0 | GHSA-9vm3-r8gq-cr6x | 2022-09-16T22:00:39Z | 2022-09-10T00:00:23Z | null | ['CVE-2022-38638'] | Casdoor arbitrary file write vulnerability | Casdoor v1.97.3 was discovered to contain an arbitrary file write vulnerability via the fullFilePath parameter at /api/upload-resource. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/casdoor/casdoor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.103.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38638'}, {'type': 'WEB', 'url': 'https://github.com/casdoor/casdoor/issues/1035'}, {'type': 'WEB', 'url': 'https://github.com/casdoor/casdoor/issues/1063'}, {'type': 'WEB', 'url': 'https://github.com/casdoor/casdoor/commit/411d76798d73446fff4a0244f... | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:32:58Z', 'nvd_published_at': '2022-09-09T20:15:00Z'} |
1.4.0 | GHSA-fpgf-pjjv-2qgm | 2022-09-30T04:37:39Z | 2022-09-30T04:37:39Z | null | ['CVE-2022-39248'] | matrix-android-sdk2 vulnerable to Olm/Megolm protocol confusion | ### Impact
An attacker cooperating with a malicious homeserver can construct messages that legitimately appear to have come from another person, without any indication such as a grey shield.
Additionally, a sophisticated attacker cooperating with a malicious homeserver could employ this vulnerability to perform a tar... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.matrix.android:matrix-android-sdk2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.36'}}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-android-sdk2/security/advisories/GHSA-fpgf-pjjv-2qgm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39248'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-android-sdk2/commit/77df720a238d17308deab83ecaa37f7a4740a17e'... | {'cwe_ids': ['CWE-287', 'CWE-322'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:37:39Z', 'nvd_published_at': '2022-09-28T20:15:00Z'} |
1.4.0 | GHSA-jx7c-7mj5-9438 | 2022-10-06T18:20:05Z | 2022-09-29T00:00:25Z | null | ['CVE-2021-43980'] | Apache Tomcat Race Condition vulnerability | The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing (but extremely hard to trigger) concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.5.0'}, {'fixed': '8.5.78'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tomcat:tomcat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0-M1'}, {'fixed':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43980'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/tomcat'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/3jjqbsp6j88b198x5rmg99b1qr8ht3g3'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-lts-announce/2022/10/msg000... | {'cwe_ids': ['CWE-362'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T06:30:10Z', 'nvd_published_at': '2022-09-28T14:15:00Z'} |
1.4.0 | GHSA-wxjj-cgcx-r3vq | 2022-09-19T19:36:05Z | 2022-09-16T22:11:00Z | null | ['CVE-2022-35959'] | TensorFlow vulnerable to `CHECK` failures in `AvgPool3DGrad` | ### Impact
The implementation of `AvgPool3DGradOp` does not fully validate the input `orig_input_shape`. This results in an overflow that results in a `CHECK` failure which can be used to trigger a denial of service attack:
```python
import tensorflow as tf
ksize = [1, 1, 1, 1, 1]
strides = [1, 1, 1, 1, 1]
padding = ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wxjj-cgcx-r3vq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35959'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/9178ac9d6389bdc54638ab913ea0e419234d14eb'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:11:00Z', 'nvd_published_at': '2022-09-16T20:15:00Z'} |
1.4.0 | GHSA-q4q5-c5cv-2p68 | 2022-09-21T20:58:44Z | 2022-09-19T00:00:28Z | null | ['CVE-2022-25873'] | Vuetify Cross-site Scripting vulnerability | The package vuetify from 2.0.0-beta.4 and before 2.6.10 are vulnerable to Cross-site Scripting (XSS) due to improper input sanitization in the 'eventName' function within the VCalendar component. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'vuetify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-beta.4'}, {'fixed': '2.6.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:vuetify'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0-beta.4'}, {'fixed': '2.6.10'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25873'}, {'type': 'WEB', 'url': 'https://github.com/vuetifyjs/vuetify/issues/15757'}, {'type': 'WEB', 'url': 'https://github.com/vuetifyjs/vuetify/commit/ade1434927f55a0eccf3d54f900f24c5fa85a176'}, {'type': 'WEB', 'url': 'https://codepen.io/5v3n-08... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T20:58:44Z', 'nvd_published_at': '2022-09-18T15:15:00Z'} |
1.4.0 | GHSA-w4pr-4vjg-hffh | 2022-09-30T22:56:17Z | 2022-09-30T22:56:17Z | null | ['CVE-2022-39254'] | When matrix-nio receives forwarded room keys, the receiver doesn't check if it requested the key from the forwarder | When matrix-nio before 0.20 requests a room key from our devices, it correctly accepts key forwards only if they are a response to a previous request. However, it doesn't check that the device that responded matches the device the key was requested from.
This allows a malicious homeserver to insert room keys of questi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'matrix-nio'}, 'ecosystem_specific': {'affected_functions': ['nio.crypto.olm_machine.Olm._handle_forwarded_room_key_event']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.20'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/poljar/matrix-nio/security/advisories/GHSA-w4pr-4vjg-hffh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39254'}, {'type': 'WEB', 'url': 'https://github.com/poljar/matrix-nio/commit/b1cbf234a831daa160673defd596e6450e9c29f0'}, {'type': 'PACKAGE', 'ur... | {'cwe_ids': ['CWE-287', 'CWE-322'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T22:56:17Z', 'nvd_published_at': '2022-09-29T15:15:00Z'} |
1.4.0 | GHSA-9r9j-57rf-f6vj | 2022-09-16T17:39:08Z | 2022-09-16T17:39:08Z | null | ['CVE-2022-36097'] | XWiki Platform Attachment UI vulnerable to cross-site scripting in the move attachment form | ### Impact
It's possible to store JavaScript in an attachment name, which will be executed by anyone trying to move the corresponding attachment.
For example, an attachment with name `><img src=1 onerror=alert(1)>.jpg` will execute the alert.
### Patches
This issue has been patched in XWiki 14.4RC1.
### Workarounds... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-attachment-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0-rc-1'}, {'fixed': '14.4-rc-1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-9r9j-57rf-f6vj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36097'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/fbc4bfbae4f6ce8109addb281de86a03acdb9277'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:39:08Z', 'nvd_published_at': '2022-09-08T21:15:00Z'} |
1.4.0 | GHSA-pfw4-xjgm-267c | 2022-09-15T03:28:01Z | 2022-09-15T03:28:01Z | null | ['CVE-2022-39200'] | Dendrite signature checks not applied to some retrieved missing events | ### Impact
Events retrieved from a remote homeserver using `/get_missing_events` did not have their signatures verified correctly. This could potentially allow a remote homeserver to provide invalid/modified events to Dendrite via this endpoint.
Note that this does not apply to events retrieved through other endpoint... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/matrix-org/dendrite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/dendrite/security/advisories/GHSA-pfw4-xjgm-267c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39200'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/dendrite/commit/2792d0490f3771488bad346981b8c26479a872c3'}, {'type': 'PACKAGE',... | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:28:01Z', 'nvd_published_at': '2022-09-12T20:15:00Z'} |
1.4.0 | GHSA-4v5m-vwvp-p7w8 | 2022-09-22T22:45:45Z | 2022-09-21T00:00:39Z | null | ['CVE-2022-38916'] | Pagekit vulnerable to Unrestricted Upload of File with Dangerous Type | A file upload vulnerability exists in the storage feature of pagekit 1.0.18, which allows an attacker to upload malicious files | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pagekit/pagekit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38916'}, {'type': 'WEB', 'url': 'https://github.com/pagekit/pagekit/issues/970'}, {'type': 'PACKAGE', 'url': 'https://github.com/pagekit/pagekit'}] | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-22T22:45:45Z', 'nvd_published_at': '2022-09-20T17:15:00Z'} |
1.4.0 | GHSA-gg53-wf5x-r3r6 | 2022-09-20T21:18:43Z | 2022-09-20T21:18:43Z | null | ['CVE-2022-31167'] | XWiki Platform Security Parent POM vulnerable to overwriting of security rules of a page with a final page having the same reference | ### Impact
A bug in the security cache is storing rules associated to document Page1.Page2 and space Page1.Page2 in the same cache entry.
That means that it's possible to overwrite the rights of a space or a document by creating the page of the space with the same name and checking the right of the new one first so t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0'}, {'fixed': '12.10.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-security'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gg53-wf5x-r3r6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31167'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-1... | {'cwe_ids': ['CWE-285', 'CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:18:43Z', 'nvd_published_at': '2022-09-07T14:15:00Z'} |
1.4.0 | GHSA-397c-5g2j-qxpv | 2022-09-19T19:41:13Z | 2022-09-16T22:27:28Z | null | ['CVE-2022-35982'] | TensorFlow vulnerable to segfault in `SparseBincount` | ### Impact
If `SparseBincount` is given inputs for `indices`, `values`, and `dense_shape` that do not make a valid sparse tensor, it results in a segfault that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
binary_output = True
indices = tf.random.uniform(shape=[], minval=-10000, m... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-397c-5g2j-qxpv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35982'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/40adbe4dd15b582b0210dfbf40c243a62f5119fa'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:27:28Z', 'nvd_published_at': '2022-09-16T22:15:00Z'} |
1.4.0 | GHSA-p6fh-xc6r-g5hw | 2022-09-27T15:45:09Z | 2022-09-27T15:45:09Z | null | ['CVE-2022-39219'] | Brokercap Bifrost subject to authentication bypass when using HTTP basic authentication | Bifrost is a middleware package which can synchronize MySQL/MariaDB binlog data to other types of databases. Versions 1.8.6-release and prior are vulnerable to authentication bypass when using HTTP basic authentication. This may allow group members who only have read permissions to write requests when they are normally... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/brokercap/Bifrost'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.7-release'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.8.6-release'}}] | [{'type': 'WEB', 'url': 'https://github.com/brokercap/Bifrost/security/advisories/GHSA-p6fh-xc6r-g5hw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39219'}, {'type': 'WEB', 'url': 'https://github.com/brokercap/Bifrost/issues/200'}, {'type': 'PACKAGE', 'url': 'https://github.com/brokercap/Bif... | {'cwe_ids': ['CWE-287', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-27T15:45:09Z', 'nvd_published_at': '2022-09-26T14:15:00Z'} |
1.4.0 | GHSA-q5jv-m6qw-5g37 | 2022-09-19T19:10:43Z | 2022-09-16T22:11:10Z | null | ['CVE-2022-35996'] | TensorFlow vulnerable to floating point exception in `Conv2D` | ### Impact
If `Conv2D` is given empty `input` and the `filter` and `padding` sizes are valid, the output is all-zeros. This causes division-by-zero floating point exceptions that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
import numpy as np
with tf.device("CPU"): # also can be ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q5jv-m6qw-5g37'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35996'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/611d80db29dd7b0cfb755772c69d60ae5bca05f9'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-369'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:11:10Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-phjr-8j92-w5v7 | 2022-09-22T17:22:56Z | 2022-09-20T00:00:22Z | null | ['CVE-2022-2995'] | CRI-O incorrect handling of supplementary groups may lead to sensitive information disclosure | Incorrect handling of the supplementary groups in the CRI-O container engine might lead to sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.25.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2995'}, {'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/pull/6159'}, {'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/commit/db3b399a8d7dabf7f073db73894bee98311d7909'}, {'type': 'PACKAGE', 'url': 'https://github.com/cri-o/cri-o'}, {'ty... | {'cwe_ids': ['CWE-284', 'CWE-732'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T17:46:18Z', 'nvd_published_at': '2022-09-19T20:15:00Z'} |
1.4.0 | GHSA-wrrw-crp8-979q | 2022-09-15T17:56:25Z | 2022-09-15T03:21:00Z | null | [] | Pageflow vulnerable to sensitive user data extraction via Ransack query injection | ### Impact
The attack allows extracting sensitive properties of database objects that are associated with users or entries belonging to an account that the attacker has access to.
Pageflow uses the `ActiveAdmin` Ruby library to provide some management features to its users. `ActiveAdmin` relies on the `Ransack` libra... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'pageflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.5.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'pageflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '15.7.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/codevise/pageflow/security/advisories/GHSA-wrrw-crp8-979q'}, {'type': 'WEB', 'url': 'https://github.com/codevise/pageflow/pull/1862'}, {'type': 'PACKAGE', 'url': 'https://github.com/codevise/pageflow'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:21:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2p5h-hpj4-fxgg | 2022-09-20T22:06:57Z | 2022-09-14T00:00:42Z | null | ['CVE-2022-38497'] | LIEF contains a segmentation violation | LIEF commit 365a16a was discovered to contain a segmentation violation via the component `CoreFile.tcc:69`. A patch is available at commit ca938740264f1fcb18f91cba8e4039c518ecb75b. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'lief'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38497'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/issues/766'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/commit/ca938740264f1fcb18f91cba8e4039c518ecb75b'}, {'type': 'PACKAGE', 'url': 'https://github.com/lief-... | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T22:05:34Z', 'nvd_published_at': '2022-09-13T21:15:00Z'} |
1.4.0 | GHSA-h5vq-gw2c-pq47 | 2022-09-19T19:42:48Z | 2022-09-16T22:12:59Z | null | ['CVE-2022-35952'] | TensorFlow vulnerable to `CHECK` failures in `UnbatchGradOp` | ### Impact
The [`UnbatchGradOp`](https://github.com/tensorflow/tensorflow/blob/769eddaf479c8debead9a59a72617d6ed6f0fe10/tensorflow/core/kernels/batch_kernels.cc#L891) function takes an argument `id` that is assumed to be a scalar. A nonscalar `id` can trigger a `CHECK` failure and crash the program.
```python
import nu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-h5vq-gw2c-pq47'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35952'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/5f945fc6409a3c1e90d6970c9292f805f6e6ddf2'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:12:59Z', 'nvd_published_at': '2022-09-16T20:15:00Z'} |
1.4.0 | GHSA-5v95-j4rr-6f3c | 2022-09-30T00:51:30Z | 2022-09-27T00:00:17Z | null | ['CVE-2022-3290'] | rdiffweb's unlimited username field length can lead to DoS | rdiffweb prior to 2.4.8 is vulnerable to a potential Dos attack via an unlimited length "username" field. This can result in excess memory consumption, or memory corruption, leading to a Denial of Service (DoS). This issue is patched in version 2.4.8. There are no known workarounds. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3290'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab... | {'cwe_ids': ['CWE-130'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T00:51:30Z', 'nvd_published_at': '2022-09-26T19:15:00Z'} |
1.4.0 | GHSA-x989-q2pq-4q5x | 2022-09-19T19:56:31Z | 2022-09-16T22:12:41Z | null | ['CVE-2022-35940'] | TensorFlow vulnerable to Int overflow in `RaggedRangeOp` | ### Impact
The [`RaggedRangOp`](https://github.com/tensorflow/tensorflow/blob/0b6b491d21d6a4eb5fbab1cca565bc1e94ca9543/tensorflow/core/kernels/ragged_range_op.cc#L74-L88) function takes an argument `limits` that is eventually used to construct a `TensorShape` as an `int64`. If `limits` is a very large float, it can ove... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-x989-q2pq-4q5x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35940'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/37cefa91bee4eace55715eeef43720b958a01192'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-190'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:12:41Z', 'nvd_published_at': '2022-09-16T20:15:00Z'} |
1.4.0 | GHSA-hhxh-qphc-v423 | 2022-09-28T03:30:26Z | 2022-09-25T00:00:15Z | null | ['CVE-2022-23464'] | Nepxion Discovery vulnerable to potential Information Disclosure due to Server-Side Request Forgery | Nepxion Discovery is a solution for Spring Cloud. Discovery is vulnerable to a potential Server-Side Request Forgery (SSRF). RouterResourceImpl uses RestTemplate’s getForEntity to retrieve the contents of a URL containing user-controlled input, potentially resulting in Information Disclosure. There is no patch availabl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.nepxion:discovery'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.16.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23464'}, {'type': 'PACKAGE', 'url': 'https://github.com/Nepxion/Discovery'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2022-033_GHSL-2022-034_Discovery/'}] | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-28T03:30:26Z', 'nvd_published_at': '2022-09-24T05:15:00Z'} |
1.4.0 | GHSA-j3q4-gmj4-mj95 | 2022-09-29T15:19:51Z | 2022-09-25T00:00:27Z | null | ['CVE-2022-3269'] | rdiffweb vulnerable to account access via session fixation | rdiffweb prior to 2.4.7 fails to invalidate session cookies on logout, leading to session fixation and allowing an attacker to access a users account. After logging in and logging out, the application continues to use the preauthentication cookies. The cookies remain the same after closing the browser and after passwor... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3269'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/39e7dcd4a1f44d2a7bd92b79d78a800910b1b22b'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab... | {'cwe_ids': ['CWE-384'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-29T15:19:51Z', 'nvd_published_at': '2022-09-23T10:15:00Z'} |
1.4.0 | GHSA-m6cv-4fmf-66xf | 2022-09-19T19:50:41Z | 2022-09-16T21:14:10Z | null | ['CVE-2022-36018'] | TensorFlow vulnerable to `CHECK` fail in `RaggedTensorToVariant` | ### Impact
If `RaggedTensorToVariant` is given a `rt_nested_splits` list that contains tensors of ranks other than one, it results in a `CHECK` fail that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
batched_input = True
rt_nested_splits = tf.constant([0,32,64], shape=[3], dtype=... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m6cv-4fmf-66xf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36018'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/88f93dfe691563baa4ae1e80ccde2d5c7a143821'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:14:10Z', 'nvd_published_at': '2022-09-16T22:15:00Z'} |
1.4.0 | GHSA-p37p-wg92-2fc4 | 2022-12-06T00:51:24Z | 2022-09-22T00:00:26Z | null | ['CVE-2022-41252'] | Missing permission checks in Jenkins CONS3RT Plugin allow enumerating credentials IDs | CONS3RT Plugin 1.0.0 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cons3rt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41252'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cons3rt-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2752'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T00:51:24Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-8qv5-68g4-248j | 2022-09-28T14:10:01Z | 2022-09-25T00:00:20Z | null | ['CVE-2022-36944'] | Scala subject to file deletion, code execution due to Java deserialization chain with LazyList object deserialization | Scala 2.13.x before 2.13.9 has a Java deserialization chain in its JAR file. On its own, it cannot be exploited. There is only a risk in conjunction with LazyList object deserialization within an application. In such situations, it allows attackers to erase contents of arbitrary files, make network connections, or poss... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.scala-lang:scala-library'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13.0'}, {'fixed': '2.13.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36944'}, {'type': 'WEB', 'url': 'https://github.com/scala/scala/pull/10118'}, {'type': 'WEB', 'url': 'https://discuss.lightbend.com/t/impact-of-cve-2022-36944-on-akka-cluster-akka-actor-akka-remote/10007/2'}, {'type': 'PACKAGE', 'url': 'https://git... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-28T14:10:01Z', 'nvd_published_at': '2022-09-23T18:15:00Z'} |
1.4.0 | GHSA-fj2m-w3wv-x9pr | 2022-09-16T22:02:34Z | 2022-09-12T00:00:34Z | null | ['CVE-2022-39135'] | Apache Calcite before 1.32.0 vulnerable to potential XML External Entity (XXE) attack | In Apache Calcite prior to version 1.32.0 the SQL operators EXISTS_NODE, EXTRACT_XML, XML_TRANSFORM and EXTRACT_VALUE do not restrict XML External Entity references in their configuration, which makes them vulnerable to a potential XML External Entity (XXE) attack. Therefore any client exposing these operators, typical... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.calcite:calcite-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.32.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39135'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ohdnhlgm6jvt3srw8l7spkm2d5vwm082'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/11/21/3'}] | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:28:19Z', 'nvd_published_at': '2022-09-11T12:15:00Z'} |
1.4.0 | GHSA-8wxf-c45w-g66g | 2022-10-01T15:54:07Z | 2022-09-30T00:00:47Z | null | ['CVE-2022-3326'] | rdiffweb vulnerable to password complexity bypass leading to weak passwords | ikus060/rdiffweb prior to 2.4.9 allows a user to set there password to all spaces. While rdiffweb has a password policy requiring passwords to be between 8 and 128 characters, it does not validate the password entropy, allowing users to bypass password complexity requirements with weak passwords. This issue has been fi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3326'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/ee98e5af78ec60db8a17fef6ea0ca250e3f31eec'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab... | {'cwe_ids': ['CWE-521'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-01T15:54:07Z', 'nvd_published_at': '2022-09-29T00:15:00Z'} |
1.4.0 | GHSA-933x-5g7r-773q | 2022-12-06T16:03:37Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41236'] | CSRF vulnerability in Jenkins Security Inspector plugin | Security Inspector Plugin 117.v6eecc36919c2 and earlier does not require POST requests for an HTTP endpoint, resulting in a cross-site request forgery (CSRF) vulnerability. This vulnerability allows attackers to replace the generated report stored in a per-session cache and displayed to authorized users at the `…/repo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:security-inspector'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '17.v6eecc36919c2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41236'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/security-inspector-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2051'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T16:03:37Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-9j4v-pp28-mxv7 | 2022-09-19T19:50:58Z | 2022-09-16T21:13:43Z | null | ['CVE-2022-36019'] | TensorFlow vulnerable to `CHECK` fail in `FakeQuantWithMinMaxVarsPerChannel` | ### Impact
If `FakeQuantWithMinMaxVarsPerChannel` is given `min` or `max` tensors of a rank other than one, it results in a `CHECK` fail that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
num_bits = 8
narrow_range = False
inputs = tf.constant(0, shape=[4], dtype=tf.float32)
min =... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9j4v-pp28-mxv7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36019'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/785d67a78a1d533759fcd2f5e8d6ef778de849e0'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:13:43Z', 'nvd_published_at': '2022-09-16T22:15:00Z'} |
1.4.0 | GHSA-mv8x-668m-53fg | 2022-09-16T21:21:43Z | 2022-09-16T21:21:43Z | null | ['CVE-2022-36061'] | Elrond-go has improper initialization | ### Impact
Read only calls between contracts can generate smart contracts results. For example, if contract A calls in read only mode contract B and the called function will make changes upon the contract's B state, the state will be altered for contract B as if the call was not made in the read-only mode. This can lea... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ElrondNetwork/elrond-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.35'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.34'}}] | [{'type': 'WEB', 'url': 'https://github.com/ElrondNetwork/elrond-go/security/advisories/GHSA-mv8x-668m-53fg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36061'}, {'type': 'PACKAGE', 'url': 'https://github.com/ElrondNetwork/elrond-go'}, {'type': 'WEB', 'url': 'https://github.com/ElrondNetwor... | {'cwe_ids': ['CWE-665'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:21:43Z', 'nvd_published_at': '2022-09-06T21:15:00Z'} |
1.4.0 | GHSA-49wm-4fp6-h59c | 2022-09-23T13:58:49Z | 2022-09-22T00:00:32Z | null | ['CVE-2022-2872'] | OctoPrint vulnerable to Unrestricted Upload of File with Dangerous Type | OctoPrint prior to version 1.8.3 is vulnerable to Unrestricted Upload of File with Dangerous Type. Due to misconfiguration in move file functionality, an attacker could easily change the file extension of an uploaded malicious file disguised as a `.gcode` file. Version 1.8.3 contains a patch. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'OctoPrint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2872'}, {'type': 'WEB', 'url': 'https://github.com/octoprint/octoprint/commit/3e3c11811e216fb371a33e28412df83f9701e5b0'}, {'type': 'PACKAGE', 'url': 'https://github.com/octoprint/octoprint'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory... | {'cwe_ids': ['CWE-434'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:58:49Z', 'nvd_published_at': '2022-09-21T10:15:00Z'} |
1.4.0 | GHSA-x2xx-jw5m-5j86 | 2022-09-20T22:06:28Z | 2022-09-14T00:00:42Z | null | ['CVE-2022-38307'] | LIEF contains segmentation violation | LIEF commit 5d1d643 was discovered to contain a segmentation violation via the function `LIEF::MachO::SegmentCommand::file_offset()` at `/MachO/SegmentCommand.cpp`. Commit 7acf0bc4224081d4f425fcc8b2e361b95291d878 contains a patch. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'lief'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38307'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/issues/764'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/commit/7acf0bc4224081d4f425fcc8b2e361b95291d878'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advi... | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T22:06:28Z', 'nvd_published_at': '2022-09-13T21:15:00Z'} |
1.4.0 | GHSA-5m2h-7rf2-rpx6 | 2022-09-19T20:25:06Z | 2022-09-15T00:00:14Z | null | ['CVE-2022-40734'] | UniSharp Laravel Filemanager directory traversal vulnerability | UniSharp laravel-filemanager (aka Laravel Filemanager) through 2.5.1 allows download?working_dir=%2F.. directory traversal to read arbitrary files, as exploited in the wild in June 2022. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'unisharp/laravel-filemanager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40734'}, {'type': 'WEB', 'url': 'https://github.com/UniSharp/laravel-filemanager/issues/1150'}, {'type': 'PACKAGE', 'url': 'https://github.com/UniSharp/laravel-filemanager'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:08:22Z', 'nvd_published_at': '2022-09-14T23:15:00Z'} |
1.4.0 | GHSA-828c-5j5q-vrjq | 2022-09-19T19:04:11Z | 2022-09-16T22:01:12Z | null | ['CVE-2022-36013'] | TensorFlow vulnerable to null-dereference in `mlir::tfg::GraphDefImporter::ConvertNodeDef` | ### Impact
When [`mlir::tfg::GraphDefImporter::ConvertNodeDef`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/ir/importexport/graphdef_import.cc) tries to convert NodeDefs without an op name, it crashes.
```cpp
Status GraphDefImporter::ConvertNodeDef(OpBuilder &builder, ConversionState &s,
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-828c-5j5q-vrjq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36013'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/a0f0b9a21c9270930457095092f558fbad4c03e5'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:01:12Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-4fg5-j4mm-wfpg | 2023-08-30T23:30:06Z | 2022-09-22T22:39:52Z | null | ['CVE-2022-40754'] | Apache Airflow contains open redirect | In Apache Airflow 2.3.0 through 2.3.4, there was an open redirect in the webserver's `/confirm` endpoint. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.3.0'}, {'fixed': '2.4.0b1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40754'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/pull/26409'}, {'type': 'WEB', 'url': 'https://github.com/apache/airflow/commit/56e7555c42f013f789a4b718676ff09b4a9d5135'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-d... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-22T22:39:52Z', 'nvd_published_at': '2022-09-21T08:15:00Z'} |
1.4.0 | GHSA-cxgf-v2p8-7ph7 | 2022-09-30T04:29:11Z | 2022-09-30T04:29:11Z | null | ['CVE-2022-39243'] | NuProcess vulnerable to command-line injection through insertion of NUL character(s) | ### Impact
In all the versions of NuProcess where it forks processes by using the JVM's Java_java_lang_UNIXProcess_forkAndExec method (1.2.0+), attackers can use NUL characters in their strings to perform command line injection. Java's ProcessBuilder isn't vulnerable because of a check in ProcessBuilder.start. NuProces... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.zaxxer:nuprocess'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.2.0'}, {'fixed': '2.0.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/brettwooldridge/NuProcess/security/advisories/GHSA-cxgf-v2p8-7ph7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39243'}, {'type': 'WEB', 'url': 'https://github.com/brettwooldridge/NuProcess/pull/143'}, {'type': 'WEB', 'url': 'https://github.com/bre... | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:29:11Z', 'nvd_published_at': '2022-09-26T14:15:00Z'} |
1.4.0 | GHSA-mwhw-6p27-4crc | 2022-09-16T17:41:19Z | 2022-09-01T00:00:23Z | null | ['CVE-2022-2466'] | Quarkus does not terminate HTTP requests header context | Quarkus is a Cloud Native, (Linux) Container First framework for writing Java applications. It was found that Quarkus 2.10.x does not terminate HTTP requests header context which may lead to unpredictable behavior. This issue was fixed in version 2.10.4Final. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.quarkus:quarkus-core-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2466'}, {'type': 'WEB', 'url': 'https://github.com/quarkusio/quarkus/issues/26748'}, {'type': 'PACKAGE', 'url': 'https://github.com/quarkusio/quarkus'}, {'type': 'WEB', 'url': 'https://github.com/quarkusio/quarkus/releases/tag/2.10.4.Final'}] | {'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:41:19Z', 'nvd_published_at': '2022-08-31T16:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.