schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-jqhq-pfg3-fg5p | 2022-09-16T17:18:14Z | 2022-09-08T00:00:30Z | null | ['CVE-2022-35513'] | Blink1Control2 uses weak password encryption | The Blink1Control2 application <= 2.2.7 uses weak password encryption and an insecure method of storage. Version 2.2.9 fixes the issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'Blink1Control2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35513'}, {'type': 'WEB', 'url': 'https://github.com/todbot/Blink1Control2/issues/175'}, {'type': 'WEB', 'url': 'https://github.com/todbot/Blink1Control2/commit/74827462aba3a26d7bf157522f69eec999d7ba85'}, {'type': 'WEB', 'url': 'https://github.com/t... | {'cwe_ids': ['CWE-326'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:18:14Z', 'nvd_published_at': '2022-09-07T14:15:00Z'} |
1.4.0 | GHSA-ggf6-638m-vqmg | 2023-06-27T22:21:05Z | 2022-09-15T03:34:21Z | null | ['CVE-2022-36110'] | Netmaker vulnerable to Insufficient Granularity of Access Control | ### Impact
Improper Authorization functions leads to non-privileged users running privileged API calls. If you have added users to your Netmaker platform who whould not have admin privileges, they could use their auth token to run admin-level functions via the API.
In addition, differing response codes based on functi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/security/advisories/GHSA-ggf6-638m-vqmg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36110'}, {'type': 'PACKAGE', 'url': 'https://github.com/gravitl/netmaker'}, {'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/releases/... | {'cwe_ids': ['CWE-1220', 'CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:34:21Z', 'nvd_published_at': '2022-09-09T20:15:00Z'} |
1.4.0 | GHSA-3633-5h82-39pq | 2023-08-30T00:15:27Z | 2022-09-16T17:17:13Z | null | [] | Go-tuf Improperly handles multiple key IDs for the same public keys in attacker-controlled metadata | ### Issue
If an attacker is able to control a threshold of keys to insert the same public key more than once with different key IDs into signed, trusted metadata on a TUF repository, then go-tuf [clients](https://github.com/theupdateframework/go-tuf#client) < [0.3.2](https://github.com/theupdateframework/go-tuf/releas... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/theupdateframework/go-tuf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/theupdateframework/go-tuf/security/advisories/GHSA-3633-5h82-39pq'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/go-tuf/pull/369'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3633-5h82-39pq'}, {'type': 'PACKAGE', 'url': 'https://github.c... | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:17:13Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jjch-7g85-4m72 | 2022-12-05T22:15:31Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41227'] | Jenkins NS-ND Integration Performance Publisher Plugin vulnerable to Cross-Site Request Forgery | A cross-site request forgery (CSRF) vulnerability in Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.129 and earlier allows attackers to connect to an attacker-specified webserver using attacker-specified credentials. Version 4.8.0.130 requires POST requests and Overall/Administer permission for the affect... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:cavisson-ns-nd-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.0.130'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.8.0.129'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41227'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2737'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:44:21Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-42hx-vrxx-5r6v | 2022-09-27T22:48:53Z | 2022-09-25T00:00:15Z | null | ['CVE-2022-23461'] | Jodit Editor vulnerable to Cross-site Scripting | Jodit Editor is a WYSIWYG editor written in pure TypeScript without the use of additional libraries. Jodit Editor is vulnerable to XSS attacks when pasting specially constructed input. This issue has not been fully patched. There are no known workarounds. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'jodit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.24.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23461'}, {'type': 'PACKAGE', 'url': 'https://github.com/xdan/jodit'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2022-030_xdan_jodit/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-27T22:48:53Z', 'nvd_published_at': '2022-09-24T03:15:00Z'} |
1.4.0 | GHSA-9c6w-55cp-5w25 | 2022-09-16T17:15:57Z | 2022-09-16T17:15:57Z | null | ['CVE-2022-36107'] | TYPO3 CMS Stored Cross-Site Scripting via FileDumpController | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.0)
### Problem
It has been discovered that the `FileDumpController` (backend and frontend context) is vulnerable to cross-site scripting when malicious files are displayed using this component. A valid backend user account is needed t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.6.58'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.48'}]}]},... | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-9c6w-55cp-5w25'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36107'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/546208428c861a09d62b86cde141eb19a81fae66'}, {'type': 'WEB', 'url': 'https://git... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:15:57Z', 'nvd_published_at': '2022-09-13T18:15:00Z'} |
1.4.0 | GHSA-vh4m-mw8w-g4w8 | 2022-09-15T03:20:14Z | 2022-09-07T00:01:54Z | null | ['CVE-2022-2714'] | RosarioSIS before 10.1 vulnerable to Improper Handling of Length Parameter Inconsistency | RosarioSIS Student Information System prior to version 10.1 is vulnerable to Improper Handling of Length Parameter Inconsistency. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2714'}, {'type': 'WEB', 'url': 'https://github.com/francoisjacquet/rosariosis/commit/4022954c3f41462bf6225c302a28b0429f6f4df3'}, {'type': 'PACKAGE', 'url': 'https://github.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://huntr.dev/... | {'cwe_ids': ['CWE-130'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:20:14Z', 'nvd_published_at': '2022-09-06T11:15:00Z'} |
1.4.0 | GHSA-9mc6-vgmq-x6xf | 2022-12-06T22:31:23Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41238'] | Lack of authentication mechanism in Jenkins DotCi Plugin webhook | DotCi Plugin provides a webhook endpoint at `/githook/` that can be used to trigger builds of the job for a GitHub repository.
In DotCi Plugin 2.40.00 and earlier, this endpoint can be accessed without authentication.
This allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specif... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.groupon.jenkins-ci.plugins:DotCi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.40.00'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41238'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/DotCi'}, {'type': 'WEB', 'url': 'https://plugins.jenkins.io/DotCi/'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2867'}, {'type': 'WEB', 'u... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T22:31:23Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-mcvg-g9wx-v5vx | 2022-09-23T17:07:38Z | 2022-09-20T00:00:20Z | null | ['CVE-2022-38545'] | Valine code injection vulnerability | Valine was discovered to contain a remote code execution (RCE) vulnerability which allows attackers to execute arbitrary code via a crafted POST request. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'valine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38545'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/issues/400'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/commit/c40826c5816c98d797a6b1ed8b62bddf73ed4f65'}, {'type': 'PACKAGE', 'url': 'https://github.com/xCss/Valine'}, {'... | {'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T17:43:24Z', 'nvd_published_at': '2022-09-19T23:15:00Z'} |
1.4.0 | GHSA-2qf8-h7pr-x2r8 | 2022-09-21T21:32:00Z | 2022-09-21T00:00:52Z | null | ['CVE-2022-2924'] | YetiForce CRM vulnerable to stored Cross-site Scripting via WidgetsManagement module | YetiForce CRM versions 6.4.0 and prior are vulnerable to cross-site scripting via the `WidgetsManagement` module. A patch is available at commit b716ecea340783b842498425faa029800bd30420. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2924'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/b716ecea340783b842498425faa029800bd30420'}, {'type': 'PACKAGE', 'url': 'https://github.com/YetiForceCompany/YetiForceCRM'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:32:00Z', 'nvd_published_at': '2022-09-20T06:15:00Z'} |
1.4.0 | GHSA-j7xv-fc46-hgpg | 2022-12-09T16:15:18Z | 2022-09-22T00:00:29Z | null | ['CVE-2022-41247'] | Jenkins BigPanda Notifier Plugin stores BigPanda API key unencrypted | BigPanda Notifier Plugin 1.4.0 and earlier stores the BigPanda API key unencrypted in its global configuration file `BigpandaGlobalNotifier.xml` on the Jenkins controller as part of its configuration. This API key can be viewed by users with access to the Jenkins controller file system. Additionally, the global configu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:bigpanda-jenkins'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41247'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/bigpanda-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2243'}] | {'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:26:53Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-8gw7-4j42-w388 | 2022-09-16T19:13:13Z | 2022-09-16T19:13:13Z | null | ['CVE-2022-36056'] | Cosign bundle can be crafted to successfully verify a blob even if the embedded rekorBundle does not reference the given signature | ## Summary
A number of vulnerabilities have been found in `cosign verify-blob`, where Cosign would successfully verify an artifact when verification should have failed.
## Vulnerability 1: Bundle mismatch causes invalid verification.
### Summary
A cosign bundle can be crafted to successfully verify a blob even if th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/sigstore/cosign'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/sigstore/cosign/security/advisories/GHSA-8gw7-4j42-w388'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36056'}, {'type': 'WEB', 'url': 'https://github.com/sigstore/cosign/commit/80b79ed8b4d28ccbce3d279fd273606b5cddcc25'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:13:13Z', 'nvd_published_at': '2022-09-14T20:15:00Z'} |
1.4.0 | GHSA-f7r5-q7cx-h668 | 2022-09-19T19:27:26Z | 2022-09-16T22:14:00Z | null | ['CVE-2022-35964'] | TensorFlow vulnerable to segfault in `BlockLSTMGradV2` | ### Impact
The implementation of `BlockLSTMGradV2` does not fully validate its inputs.
- `wci`, `wcf`, `wco`, `b` must be rank 1
- `w`, cs_prev`, `h_prev` must be rank 2
- `x` must be rank 3
This results in a a segfault that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
use_pe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f7r5-q7cx-h668'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35964'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/2a458fc4866505be27c62f81474ecb2b870498fa'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:14:00Z', 'nvd_published_at': '2022-09-16T21:15:00Z'} |
1.4.0 | GHSA-c439-chv8-8g2j | 2022-09-02T22:29:41Z | 2022-09-02T22:29:41Z | null | [] | `os_socketaddr` invalidly assumes the memory layout of std::net::SocketAddr | The [`os_socketaddr`](https://crates.io/crates/os_socketaddr) crate has assumed `std::net::SocketAddrV4` and `std::net::SocketAddrV6` have the same memory layout as the system C representation `sockaddr`. It has simply casted the pointers to convert the socket addresses to the system representation.
These layout were ... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'os_socketaddr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/a-ba/os_socketaddr/issues/3'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/rust/pull/78802'}, {'type': 'WEB', 'url': 'https://github.com/a-ba/os_socketaddr/commit/1bc7f71d40de069727993a18fdada33eb0b4c94f'}, {'type': 'PACKAGE', 'url': 'https://github.com/a-ba/os_socke... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-02T22:29:41Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4xh4-v2pq-jvhm | 2023-01-11T18:59:09Z | 2022-09-19T22:47:29Z | null | ['CVE-2023-22963'] | personnummer/dart vulnerable to Improper Input Validation | This vulnerability was reported to the personnummer team in June 2020. The slow response was due to locked ownership of some of the affected packages, which caused delays to update packages prior to disclosure.
The vulnerability is determined to be low severity.
### Impact
This vulnerability impacts users who rely o... | [] | [{'package': {'ecosystem': 'Pub', 'name': 'personnummer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/personnummer/dart/security/advisories/GHSA-4xh4-v2pq-jvhm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22963'}, {'type': 'PACKAGE', 'url': 'https://github.com/personnummer/dart'}, {'type': 'WEB', 'url': 'https://pub.dev/packages/personnummer'}] | {'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-19T22:47:29Z', 'nvd_published_at': None} |
1.4.0 | GHSA-vfv3-9w6v-23jp | 2022-09-16T17:13:21Z | 2022-09-16T17:13:21Z | null | [] | typemap is Unmaintained | The maintainer seems unreachable. The crate may or may not be usable as-is despite no maintenance and may not work in future versions of Rust. The last release seems to have been seven years ago. | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'typemap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/reem/rust-typemap/issues/45'}, {'type': 'PACKAGE', 'url': 'https://github.com/reem/rust-typemap'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0039.html'}] | {'cwe_ids': ['CWE-1104'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:13:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fmq9-r4p2-8272 | 2023-06-27T20:52:17Z | 2022-09-22T00:00:26Z | null | ['CVE-2022-41255'] | API token stored in plain text by Jenkins CONS3RT Plugin | Jenkins CONS3RT Plugin 1.0.0 and earlier stores Cons3rt API token unencrypted in job `config.xml` files on the Jenkins controller as part of its configuration.
This API token can be viewed by users with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cons3rt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41255'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cons3rt-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2759'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202... | {'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T00:39:13Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-rv5q-72p2-2q24 | 2022-09-30T06:28:12Z | 2022-09-27T00:00:20Z | null | ['CVE-2022-40044'] | Centreon contains cross-site scripting vulnerability via esc_name parameter | Centreon v20.10.18 was discovered to contain a cross-site scripting (XSS) vulnerability via the `esc_name` (Escalation Name) parameter at `Configuration/Notifications/Escalations`. This vulnerability allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload. Versions 21.04.16, 21.10.8, a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.04.16'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '21.10.0'}, {'fixed': '21.10.8... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40044'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/commit/1a6ee0e9a003ac4f07dc8c370aec6e8911279358'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/commit/76fdfba312515656419a1311a83adfb11a73199f'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T06:28:12Z', 'nvd_published_at': '2022-09-26T16:15:00Z'} |
1.4.0 | GHSA-gm8c-w9cm-c445 | 2022-09-23T17:07:18Z | 2022-09-21T00:00:46Z | null | ['CVE-2022-3245'] | Microweber vulnerable to HTML Injection in create tag functionality | HTML injection attack is closely related to Cross-site Scripting (XSS). HTML injection uses HTML to deface the page. XSS, as the name implies, injects JavaScript into the page. Both attacks exploit insufficient validation of user input. A patch is available on commit f20abf30a1d9c1426c5fb757ac63998dc5b92bfc and is anti... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3245'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/f20abf30a1d9c1426c5fb757ac63998dc5b92bfc'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7... | {'cwe_ids': ['CWE-79', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:14:01Z', 'nvd_published_at': '2022-09-20T14:15:00Z'} |
1.4.0 | GHSA-28q9-9c3g-v3f9 | 2022-09-23T15:13:14Z | 2022-09-23T15:13:14Z | null | [] | lakeFS vulnerable to authenticated users deleting files they are not authorized to delete | ### Impact
Authenticated users can send a request to delete-objects through the s3 gateway and delete files they are not authorized to delete.
### Patches
lakeFS v0.82.0 and later
### Workarounds
Drop specific request to the lakeFS listen port. Any request with "Authorization" header and value that starts with "AW... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/treeverse/lakefs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.82.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/treeverse/lakeFS/security/advisories/GHSA-28q9-9c3g-v3f9'}, {'type': 'WEB', 'url': 'https://github.com/treeverse/lakeFS/commit/81182bf9c0cf57f3cec3c893cf739b2069305e37'}, {'type': 'PACKAGE', 'url': 'https://github.com/treeverse/lakeFS'}] | {'cwe_ids': ['CWE-281', 'CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T15:13:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-gwp4-mcv4-w95j | 2022-09-21T16:58:31Z | 2022-09-21T16:58:31Z | null | ['CVE-2022-3102'] | jwcrypto token substitution can lead to authentication bypass | The JWT code can auto-detect the type of token being provided, and this can lead the application to incorrect conclusions about the trustworthiness of the token.
Quoting the private disclosure we received : "Under certain circumstances, it is possible to substitute a [..] signed JWS with a JWE that is encrypted with th... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'jwcrypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/latchset/jwcrypto/security/advisories/GHSA-gwp4-mcv4-w95j'}, {'type': 'WEB', 'url': 'https://github.com/latchset/jwcrypto/commit/f4e912f83cb578e2cd47f8a9398bf15f680bf558'}, {'type': 'PACKAGE', 'url': 'https://github.com/latchset/jwcrypto'}, {'type': 'WEB', 'url': 'https://git... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T16:58:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4p6f-m4f9-ch88 | 2022-09-16T21:25:03Z | 2022-09-16T21:25:03Z | null | ['CVE-2022-36078'] | Binary vulnerable to Slice Memory Allocation with Excessive Size Value | ### Impact
> _What kind of vulnerability is it? Who is impacted?_
The vulnerability is a memory allocation vulnerability that can be exploited to allocate slices in memory with (arbitrary) excessive size value, which can either exhaust available memory or crash the whole program.
When using `github.com/gagliardetto/b... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/gagliardetto/binary'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gagliardetto/binary/security/advisories/GHSA-4p6f-m4f9-ch88'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36078'}, {'type': 'WEB', 'url': 'https://github.com/gagliardetto/binary/pull/7'}, {'type': 'PACKAGE', 'url': 'https://github.com/gagliardetto/... | {'cwe_ids': ['CWE-400', 'CWE-789'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:25:03Z', 'nvd_published_at': '2022-09-02T13:15:00Z'} |
1.4.0 | GHSA-9fwf-46g9-45rx | 2022-12-06T13:41:12Z | 2022-09-17T00:00:41Z | 2022-12-06T13:41:12Z | ['CVE-2022-40154'] | Denial of Service via stack overflow | ## Withdrawn
This advisory has been withdrawn because it has been found to be a duplicate. Please see the issue [here](https://github.com/x-stream/xstream/issues/304#issuecomment-1293654236) for more information.
## Original Despcription
Those using FasterXML/woodstox to serialise XML data may be vulnerable to Deni... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.woodstox:woodstox-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.woodstox:woodstox-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40154'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/woodstox/issues/157'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/woodstox/issues/160'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/issues/304'}, {'type': 'WEB... | {'cwe_ids': ['CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T20:50:31Z', 'nvd_published_at': '2022-09-16T10:15:00Z'} |
1.4.0 | GHSA-pp8r-vv2j-9j5v | 2022-09-16T17:12:59Z | 2022-09-16T17:12:59Z | null | [] | traitobject is Unmaintained | Crate `traitobject` has not had a release for over five years.
In addition there is an existing security advisory that has not been addressed:
- [RUSTSEC-2020-0027](https://rustsec.org/advisories/RUSTSEC-2020-0027)
## Possible Alternative(s)
The below list has not been vetted in any way and may or may not contain... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'traitobject'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/reem/rust-traitobject/issues/7'}, {'type': 'PACKAGE', 'url': 'https://github.com/reem/rust-traitobject'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0144.html'}] | {'cwe_ids': ['CWE-1104'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:12:59Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9q5j-jm53-v7vr | 2022-09-01T22:24:55Z | 2022-09-01T22:24:55Z | null | [] | lz4-sys vulnerable to memory corruption via issue in liblz4 | lz4-sys up to v1.9.3 bundles a version of liblz4 that is vulnerable to
[CVE-2021-3520](https://nvd.nist.gov/vuln/detail/CVE-2021-3520).
Attackers could craft a payload that triggers an integer overflow upon
decompression, causing an out-of-bounds write.
The flaw has been corrected in version v1.9.4 of liblz4, which i... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'lz4-sys'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/lz4/lz4/pull/972'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0051.html'}] | {'cwe_ids': ['CWE-190', 'CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:24:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-93q5-3xpc-8vg3 | 2022-09-21T21:08:13Z | 2022-09-16T00:00:39Z | null | ['CVE-2022-37257'] | steal vulnerable to Prototype Pollution via requestedVersion variable | Prototype pollution vulnerability in function convertLater in npm-convert.js in stealjs steal via the requestedVersion variable in the npm-convert.js file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'steal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37257'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/issues/1526'}, {'type': 'PACKAGE', 'url': 'https://github.com/stealjs/steal'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:08:13Z', 'nvd_published_at': '2022-09-15T13:15:00Z'} |
1.4.0 | GHSA-wqr6-57qm-hhr5 | 2022-09-23T13:56:46Z | 2022-09-22T00:00:30Z | null | ['CVE-2022-3255'] | Pimcore vulnerable to cross site scripting | If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. Amongst other things, the attacker can perform any action within the application that the user can perform; view any information that the user is able to view; modify any information that th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.5.6'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3255'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/1e916e7d668c9e47b217e20cc0ea4812f466201b'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0ea45cf9-b256... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:56:46Z', 'nvd_published_at': '2022-09-21T13:15:00Z'} |
1.4.0 | GHSA-m7w4-q5vg-5xfp | 2022-09-28T14:14:03Z | 2022-09-25T00:00:21Z | null | ['CVE-2022-3257'] | Mattermost subject to Denial of Service via upload of special GIF | Mattermost version 7.1.x and earlier fails to sufficiently process a specifically crafted GIF file when it is uploaded while drafting a post, which allows authenticated users to cause resource exhaustion while processing the file, resulting in server-side Denial of Service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3257'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1620170'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost-server'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}] | {'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-28T14:14:03Z', 'nvd_published_at': '2022-09-23T15:15:00Z'} |
1.4.0 | GHSA-mqh9-5jp9-6799 | 2022-09-21T21:29:05Z | 2022-09-21T00:00:52Z | null | ['CVE-2022-3000'] | YetiForce CRM vulnerable to stored Cross-site Scripting via LayoutEditor module | YetiForce CRM versions 6.4.0 and prior are vulnerable to cross-site scripting via the `LayoutEditor` module. A patch is available at commit eebc12601495ada38495076bec12841b2477516b. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3000'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/eebc12601495ada38495076bec12841b2477516b'}, {'type': 'PACKAGE', 'url': 'https://github.com/YetiForceCompany/YetiForceCRM'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:29:05Z', 'nvd_published_at': '2022-09-20T07:15:00Z'} |
1.4.0 | GHSA-j2mj-g8jp-gjfm | 2022-12-05T22:26:07Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41228'] | Jenkins NS-ND Integration Performance Publisher Plugin vulnerable to Missing Authorization | A missing permission check in Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.129 and earlier allows attackers with Overall/Read permissions to connect to an attacker-specified webserver using attacker-specified credentials. Version 4.8.0.130 requires POST requests and Overall/Administer permission for the... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:cavisson-ns-nd-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.0.130'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.8.0.129'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41228'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2737'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:43:08Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-w3w9-vrf5-8mx8 | 2022-09-16T18:48:53Z | 2022-09-16T18:48:53Z | null | ['CVE-2022-36032'] | ReactPHP's HTTP server parses encoded cookie names so malicious `__Host-` and `__Secure-` cookies can be sent | ### Impact
In ReactPHP's HTTP server component versions below v1.7.0, when ReactPHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like `__Host-` and `__Secure-` confused with cookies that decode to such prefix, thus leading to an attacker being able... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'react/http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '1.7.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/reactphp/http/security/advisories/GHSA-w3w9-vrf5-8mx8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36032'}, {'type': 'WEB', 'url': 'https://github.com/reactphp/http/pull/175'}, {'type': 'WEB', 'url': 'https://github.com/reactphp/http/commit/663c9a... | {'cwe_ids': ['CWE-20', 'CWE-565'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:48:53Z', 'nvd_published_at': '2022-09-06T19:15:00Z'} |
1.4.0 | GHSA-6263-x97c-c4gg | 2022-11-01T13:25:08Z | 2022-09-30T00:40:35Z | null | ['CVE-2022-39249'] | matrix-js-sdk subject to impersonated messages due to permissive key forwarding | ## Impact
An attacker cooperating with a malicious homeserver can construct messages appearing to have come from another person. Such messages will be marked with a grey shield on some platforms, but this may be missing in others.
This attack is possible due to the matrix-js-sdk implementing a too permissive [key for... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'matrix-js-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.7.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-6263-x97c-c4gg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39249'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-spec-proposals/pull/3061'}, {'type': 'WEB', 'url': 'https://github.... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T00:40:35Z', 'nvd_published_at': '2022-09-28T20:15:00Z'} |
1.4.0 | GHSA-74w3-p89x-ffgh | 2022-09-19T14:25:17Z | 2022-09-16T21:03:19Z | 2022-09-19T14:25:17Z | [] | ansi_term is Unmaintained | ## Withdrawn Advisory
This advisory has been withdrawn because it does not discuss a particular vulnerability in the code of `ansi_term`.
## Original Description
The maintainer has adviced this crate is deprecated and will not receive any maintenance.
The crate does not seem to have much dependencies and may or may n... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'ansi_term'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ogham/rust-ansi-term/issues/72'}, {'type': 'PACKAGE', 'url': 'https://github.com/ogham/rust-ansi-term/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0139.html'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:03:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xg8p-34w2-j49j | 2022-09-16T17:41:33Z | 2022-09-16T17:41:33Z | null | ['CVE-2022-36086'] | linked_list_allocator vulnerable to out-of-bound writes on `Heap` initialization and `Heap::extend` | ## Impact
_What kind of vulnerability is it? Who is impacted?_
This vulnerability impacts all the initialization functions on the `Heap` and `LockedHeap` types, including `Heap::new`, `Heap::init`, `Heap::init_from_slice`, and `LockedHeap::new`. It also affects multiple uses of the `Heap::extend` method.
### Initiali... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'linked_list_allocator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.10.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/rust-osdev/linked-list-allocator/security/advisories/GHSA-xg8p-34w2-j49j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36086'}, {'type': 'WEB', 'url': 'https://github.com/rust-osdev/linked-list-allocator/commit/013b0758643943e8df5b17bbb495460ff47e8... | {'cwe_ids': ['CWE-119', 'CWE-1284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:41:33Z', 'nvd_published_at': '2022-09-07T23:15:00Z'} |
1.4.0 | GHSA-pxrw-j2fv-hx3h | 2022-09-19T19:42:12Z | 2022-09-16T21:04:10Z | null | ['CVE-2022-35937'] | TensorFlow vulnerable to OOB read in `Gather_nd` in TF Lite | ### Impact
The [`GatherNd`](https://github.com/tensorflow/tensorflow/blob/f463040eb3997e42e60a2ffc6dc72de7ef11dbb4/tensorflow/lite/kernels/gather_nd.cc#L105-L111) function takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pxrw-j2fv-hx3h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35937'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/595a65a3e224a0362d7e68c2213acfc2b499a196'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:04:10Z', 'nvd_published_at': '2022-09-16T20:15:00Z'} |
1.4.0 | GHSA-rc23-xxgq-x27g | 2022-09-16T17:18:28Z | 2022-09-16T17:18:28Z | null | [] | wee_alloc is Unmaintained | Two of the maintainers have indicated that the crate may not be maintained.
The crate has open issues including memory leaks and may not be suitable for production use.
It may be best to switch to the default Rust standard allocator on wasm32 targets.
Last release seems to have been three years ago. | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'wee_alloc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rustwasm/wee_alloc/issues/107'}, {'type': 'PACKAGE', 'url': 'https://github.com/rustwasm/wee_alloc'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0054.html'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:18:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-wxx5-w9jc-48wx | 2022-09-16T22:02:16Z | 2022-09-13T00:00:39Z | null | ['CVE-2022-37767'] | Pebble Templates protection mechanism bypass can lead to arbitrary code execution | Pebble Templates 3.1.5 allows attackers to bypass a protection mechanism and implement arbitrary code execution with springbok. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.pebbletemplates:pebble'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37767'}, {'type': 'WEB', 'url': 'https://github.com/PebbleTemplates/pebble/issues/625#issuecomment-1282138635'}, {'type': 'WEB', 'url': 'https://github.com/Y4tacker/Web-Security/issues/3'}] | {'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:27:25Z', 'nvd_published_at': '2022-09-12T14:15:00Z'} |
1.4.0 | GHSA-8r89-x93x-mjq2 | 2022-09-20T21:35:09Z | 2022-09-17T00:00:36Z | null | ['CVE-2022-37250'] | Craft CMS Stored Cross-site Scripting in User Addresses Title | Craft CMS 4.2.0.1 suffers from Stored Cross Site Scripting (XSS) in `/admin/myaccount`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC1'}, {'fixed': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37250'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/cdc9cb66d0716c9552e4113c8e426fd1a31f9516'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/3.7.55.1... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:35:09Z', 'nvd_published_at': '2022-09-16T15:15:00Z'} |
1.4.0 | GHSA-c4r9-r8fh-9vj2 | 2022-09-15T03:27:43Z | 2022-09-06T00:00:27Z | null | ['CVE-2022-38749'] | snakeYAML before 1.31 vulnerable to Denial of Service due to Out-of-bounds Write | Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.yaml:snakeyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.31'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'be.cylab:snakeyaml'}, 'versions': ['1.25.1']}, {'package': {'ecosystem': 'Maven', 'name': 'com.alipay.sofa.acts:acts-comm... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38749'}, {'type': 'WEB', 'url': 'https://arxiv.org/pdf/2306.05534.pdf'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/issues/525/got-stackoverflowerror-fo... | {'cwe_ids': ['CWE-121', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:27:43Z', 'nvd_published_at': '2022-09-05T10:15:00Z'} |
1.4.0 | GHSA-5hc5-c3m9-8vcj | 2022-12-06T13:41:51Z | 2022-09-17T00:00:41Z | 2022-12-06T13:41:51Z | ['CVE-2022-40155'] | Denial of Service via stack overflow | ## Withdrawn
This advisory has been withdrawn because it has been found to be a duplicate. Please see the issue [here](https://github.com/x-stream/xstream/issues/304#issuecomment-1293654236) for more information.
## Original Despcription
Those using FasterXML/woodstox to serialise XML data may be vulnerable to Deni... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.woodstox:woodstox-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.woodstox:woodstox-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40155'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/woodstox/issues/157'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/woodstox/issues/160'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/issues/304'}, {'type': 'WEB... | {'cwe_ids': ['CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T20:50:28Z', 'nvd_published_at': '2022-09-16T10:15:00Z'} |
1.4.0 | GHSA-5mqq-7g25-r4wx | 2022-10-05T14:03:39Z | 2022-09-30T00:00:43Z | null | ['CVE-2022-40408'] | FeehiCMS vulnerable to Cross-Site scripting via crafted payload | FeehiCMS versions 2.0.1.1 and prior contain a cross-site scripting (XSS) vulnerability via a crafted payload injected into the Comment box under the Single Page module. There are no patches and no known workarounds for this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'feehi/feehicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40408'}, {'type': 'WEB', 'url': 'https://github.com/liufee/feehicms/issues/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/feehicms'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-01T15:53:32Z', 'nvd_published_at': '2022-09-29T14:15:00Z'} |
1.4.0 | GHSA-c429-5p7v-vgjp | 2022-09-29T14:13:31Z | 2022-09-25T00:00:27Z | null | ['CVE-2020-36604'] | hoek subject to prototype pollution via the clone function. | hoek versions prior to 8.5.1, and 9.x prior to 9.0.3 are vulnerable to prototype pollution in the clone function. If an object with the __proto__ key is passed to clone() the key is converted to a prototype. This issue has been patched in version 9.0.3, and backported to 8.5.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@hapi/hoek'}, 'ecosystem_specific': {'affected_functions': ['@hapi/hoek.clone']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@hapi/hoek'}, 'ecosystem_specific': {'affected_functions': ['@ha... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36604'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/hoek/issues/352'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/hoek/commit/4d0804bc6135ad72afdc5e1ec002b935b2f5216a'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/hoek/commit/94... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-29T14:13:31Z', 'nvd_published_at': '2022-09-23T06:15:00Z'} |
1.4.0 | GHSA-m379-x4xc-38x9 | 2022-09-16T17:08:07Z | 2022-09-09T00:00:56Z | null | ['CVE-2022-3167'] | rdiffweb vulnerable to Improper Restriction of Rendered UI Layers or Frames | rdiffweb prior to 2.4.1 is vulnerable to Improper Restriction of Rendered UI Layers or Frames. This allows attackers to perform clickjacking attacks that can trick victims into performing actions such as entering passwords, liking or deleting posts, and/or initiating an account deletion. This issue has been patched in ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3167'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/7294bb7466532762c93d711211e5958940c1b428'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab... | {'cwe_ids': ['CWE-1021'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:08:07Z', 'nvd_published_at': '2022-09-08T19:15:00Z'} |
1.4.0 | GHSA-fhvv-p968-6vvj | 2022-09-22T17:28:56Z | 2022-09-18T00:00:30Z | null | ['CVE-2022-3173'] | Snipe-IT vulnerable to Improper Authentication | Snipe-IT prior to 6.0.10 is vulnerable to Improper Authentication. A user without the `View and Modify License Files` permission may access files uploaded to licenses as long as they have the `View` permission for licenses. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3173'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/dcab1381e7ee0b7fd1df3a34750dbff4b79185b2'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6d8ffcc6-c6e3-4... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T18:19:21Z', 'nvd_published_at': '2022-09-17T07:15:00Z'} |
1.4.0 | GHSA-4rv7-wj6m-6c6r | 2022-12-06T13:39:44Z | 2022-09-17T00:00:41Z | 2022-12-06T13:39:44Z | ['CVE-2022-40156'] | Denial of Service due to parser crash | ## Withdrawn
This advisory has been withdrawn because it has been found to be a duplicate. Please see the issue [here](https://github.com/x-stream/xstream/issues/304#issuecomment-1293654236) for more information.
## Original Despcription
Those using FasterXML/woodstox to seralize XML data may be vulnerable to Denia... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.woodstox:woodstox-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.woodstox:woodstox-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40156'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/woodstox/issues/157'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/woodstox/issues/160'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/issues/304'}, {'type': 'WEB... | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:20:12Z', 'nvd_published_at': '2022-09-16T10:15:00Z'} |
1.4.0 | GHSA-q4q3-r45f-7gwg | 2023-03-10T23:21:38Z | 2022-09-01T00:00:26Z | null | ['CVE-2022-37021'] | Apache Geode vulnerable to Deserialization of Untrusted Data | Apache Geode versions up to 1.12.5, 1.13.4 and 1.14.0 are vulnerable to a deserialization of untrusted data flaw when using JMX over RMI on Java 8. Any user still on Java 8 who wishes to protect against deserialization attacks involving JMX or RMI should upgrade to Apache Geode 1.15 and Java 11. If upgrading to Java 11... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37021'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/qrvhmytsshsk5xcb68pwccw3y6m8o8nr'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-10T23:21:38Z', 'nvd_published_at': '2022-08-31T07:15:00Z'} |
1.4.0 | GHSA-2pvj-p485-cp3m | 2022-09-30T04:33:00Z | 2022-09-30T04:33:00Z | null | ['CVE-2022-39246'] | matrix-android-sdk2 vulnerable to impersonation via forwarded Megolm sessions | ### Impact
An attacker cooperating with a malicious homeserver can construct messages appearing to have come from another person. Such messages will be marked with a grey shield on some platforms, but this may be missing in others.
This attack is possible due to the matrix-android-sdk2 implementing a too permissive [k... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.matrix.android:matrix-android-sdk2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.36'}}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-android-sdk2/security/advisories/GHSA-2pvj-p485-cp3m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39246'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-spec-proposals/pull/3061'}, {'type': 'WEB', 'url': 'https://g... | {'cwe_ids': ['CWE-287', 'CWE-322'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:33:00Z', 'nvd_published_at': '2022-09-28T20:15:00Z'} |
1.4.0 | GHSA-6w4q-23cf-j9jp | 2022-09-21T18:32:01Z | 2022-09-21T18:32:01Z | null | ['CVE-2022-39225'] | parse-server's session object properties can be updated by foreign user if object ID is known | ### Impact
A foreign user can write to the session object of another user if the session object ID is known. For example, a foreign user can assign the session object to their own user by writing to the `user` field and then read any custom fields of that session object.
Note that assigning a session to a foreign use... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.15'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-6w4q-23cf-j9jp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39225'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/37fed3062ccc3ef1dfd49a9fc53318e72b3e4aff'}, {... | {'cwe_ids': ['CWE-276', 'CWE-669'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T18:32:01Z', 'nvd_published_at': '2022-09-23T07:15:00Z'} |
1.4.0 | GHSA-53jm-3hc9-fqqc | 2022-09-23T20:57:47Z | 2022-09-23T00:00:40Z | null | ['CVE-2022-38648'] | Apache Batik vulnerable to Server-Side Request Forgery | Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to fetch external resources. This issue affects Apache XML Graphics Batik 1.14. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38648'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/xmlgraphics-batik'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/BATIK-1333'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/gfsktxvj7jtwyovmhhbrw0bs13wfjd7b... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:57:47Z', 'nvd_published_at': '2022-09-22T15:15:00Z'} |
1.4.0 | GHSA-hvw3-p9px-gpc9 | 2022-09-16T22:02:43Z | 2022-09-12T00:00:33Z | null | ['CVE-2022-25295'] | Gophish before 0.12.0 vulnerable to Open Redirect | This affects the package github.com/gophish/gophish before 0.12.0. The Open Redirect vulnerability exists in the next query parameter. The application uses url.Parse(r.FormValue("next")) to extract path and eventually redirect user to a relative URL, but if next parameter starts with multiple backslashes like \\\\\\exa... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/gophish/gophish'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25295'}, {'type': 'WEB', 'url': 'https://github.com/gophish/gophish/pull/2262'}, {'type': 'WEB', 'url': 'https://github.com/gophish/gophish/commit/2a452bda89ffdb85f929fa78290bce1f456881dc'}, {'type': 'PACKAGE', 'url': 'https://github.com/gophish/go... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:28:46Z', 'nvd_published_at': '2022-09-11T14:15:00Z'} |
1.4.0 | GHSA-xv7r-9vq4-9wrq | 2022-09-20T20:14:03Z | 2022-09-15T00:00:17Z | null | ['CVE-2022-37724'] | Project Wonder WebObjects vulnerable to Arbitrary HTTP Header Injection and Cross-site Scripting | Project Wonder WebObjects 1.0 through 7.3 is vulnerable to Arbitrary HTTP Header injection and URL- or Header-based XSS reflection in all web-server adaptor interfaces. A patch for this issue is available at commit number b0d2d74f13203268ea254b02552600850f28014b. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'wonder:wonder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'last_affected': '7.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37724'}, {'type': 'WEB', 'url': 'https://github.com/wocommunity/wonder/pull/992'}, {'type': 'WEB', 'url': 'https://github.com/wocommunity/wonder/commit/b0d2d74f13203268ea254b02552600850f28014b'}, {'type': 'PACKAGE', 'url': 'https://github.com/wocom... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:08:43Z', 'nvd_published_at': '2022-09-14T21:15:00Z'} |
1.4.0 | GHSA-v57h-6hmh-g2p4 | 2022-09-23T23:39:17Z | 2022-09-23T22:07:10Z | null | ['CVE-2022-39242'] | Weight not properly refunded after EVM execution | ### Impact
Previously, the worst case weight was always accounted as the block weight for all cases. In case of large EVM gas refunds, this can lead to block spamming attacks -- the adversary can construct blocks with transactions that have large amount of refunds or unused gases with reverts, and as a result inflate ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'frontier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/security/advisories/GHSA-v57h-6hmh-g2p4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39242'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/pull/851'}, {'type': 'PACKAGE', 'url': 'https://github.com/paritytech/... | {'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T22:07:10Z', 'nvd_published_at': '2022-09-24T02:15:00Z'} |
1.4.0 | GHSA-7f3x-2wcx-hww8 | 2023-09-07T18:49:54Z | 2022-09-16T00:00:31Z | null | ['CVE-2022-37260'] | steal vulnerable to Regular Expression Denial of Service via input variable | A Regular Expression Denial of Service (ReDoS) flaw was found in stealjs steal via the input variable in main.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'steal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37260'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/issues/1529'}, {'type': 'PACKAGE', 'url': 'https://github.com/stealjs/steal'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:07:36Z', 'nvd_published_at': '2022-09-15T19:15:00Z'} |
1.4.0 | GHSA-m392-235j-9r7r | 2022-09-16T17:16:28Z | 2022-09-16T17:16:28Z | null | ['CVE-2022-36105'] | TYPO3 CMS vulnerable to User Enumeration via Response Timing | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C` (4.9)
### Problem
It has been discovered that observing response time during user authentication (backend and frontend) can be used to distinguish between existing and non-existing user accounts.
Extension authors of 3rd party TYPO3 ext... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.6.58'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.48'}]}]},... | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-m392-235j-9r7r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36105'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/f0fc9c4cd7c38207c30dd158de53ee5d9d6f41a2'}, {'type': 'WEB', 'url': 'https://git... | {'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:16:28Z', 'nvd_published_at': '2022-09-13T18:15:00Z'} |
1.4.0 | GHSA-9vxf-mcm6-5m42 | 2022-09-22T22:43:34Z | 2022-09-22T00:00:21Z | null | ['CVE-2022-3233'] | rdiffweb CSRF could lead to disabling notifications in user profile | rdiffweb prior to 2.4.6 is vulnerable to Cross-Site Request Forgery (CSRF), which could lead to disabling notifications in a user's profile. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3233'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/18a5aabd48fa6d2d2771a25f95610c28a1a097ca'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5ec206e0-ec... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-22T22:43:34Z', 'nvd_published_at': '2022-09-21T20:15:00Z'} |
1.4.0 | GHSA-fm6m-fg23-67jq | 2022-09-21T21:01:14Z | 2022-09-14T00:00:41Z | null | ['CVE-2021-36568'] | Moodle Cross-site Scripting vulnerability | In certain Moodle products after creating a course, it is possible to add in a arbitrary "Topic" a resource, in this case a "Database" with the type "Text" where its values "Field name" and "Field description" are vulnerable to Cross Site Scripting Stored(XSS). This affects Moodle 3.11.x prior to 3.11.10, Moodle 3.10.4... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.9.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'last_affected': '3.1... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36568'}, {'type': 'WEB', 'url': 'https://blog.hackingforce.com.br/en/cve-2021-36568/'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2126857'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:01:14Z', 'nvd_published_at': '2022-09-13T22:15:00Z'} |
1.4.0 | GHSA-7fqm-jm52-f9vc | 2022-09-30T05:37:28Z | 2022-09-29T00:00:19Z | null | ['CVE-2022-3292'] | rdiffweb vulnerable to Use of Cache Containing Sensitive Information | rdiffweb prior to version 2.4.9 is vulnerable to Use of Cache Containing Sensitive Information. Due to improper cache control, an attacker can view sensitive information even if they are not logged into an account. Version 2.4.9 contains a patch for this issue. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3292'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/2406780831618405a13113377a784f3102465f40'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e9309018-e9... | {'cwe_ids': ['CWE-524'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T05:37:28Z', 'nvd_published_at': '2022-09-28T21:15:00Z'} |
1.4.0 | GHSA-x92g-49gh-63qm | 2023-08-03T16:41:39Z | 2022-09-17T00:00:34Z | null | ['CVE-2022-3225'] | Budibase Improper Access Control vulnerability | Improper Access Control in GitHub repository budibase/budibase prior to 1.3.20. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@budibase/worker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.20'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@budibase/builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.20'}]}]}, {'package': {'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3225'}, {'type': 'WEB', 'url': 'https://github.com/budibase/budibase/commit/d35864be0854216693a01307f81ffcabf6d549df'}, {'type': 'WEB', 'url': 'https://github.com/Budibase/budibase/releases/tag/v1.3.20'}, {'type': 'PACKAGE', 'url': 'https://github.... | {'cwe_ids': ['CWE-284', 'CWE-913'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:41:39Z', 'nvd_published_at': '2022-09-16T17:15:00Z'} |
1.4.0 | GHSA-m6vp-8q9j-whx4 | 2022-09-19T19:40:44Z | 2022-09-16T22:31:14Z | null | ['CVE-2022-35983'] | TensorFlow vulnerable to `CHECK` fail in `Save` and `SaveSlices` | ### Impact
If `Save` or `SaveSlices` is run over tensors of an unsupported `dtype`, it results in a `CHECK` fail that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
filename = tf.constant("")
tensor_names = tf.constant("")
# Save
data = tf.cast(tf.random.uniform(shape=[1], minval=-... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m6vp-8q9j-whx4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35983'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/5dd7b86b84a864b834c6fa3d7f9f51c87efa99d4'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:31:14Z', 'nvd_published_at': '2022-09-16T22:15:00Z'} |
1.4.0 | GHSA-xvqg-mv25-rwvw | 2022-10-07T16:25:29Z | 2022-09-15T03:26:10Z | null | ['CVE-2022-39203'] | Parsing issue in matrix-org/node-irc leading to room takeovers | ### Impact
Attackers can specify a specific string of characters, which would confuse the bridge into combining an attacker-owned channel and an existing channel, allowing them to grant themselves permissions in the channel.
### Patched
The vulnerability has been patched in matrix-appservice-irc 0.35.0.
### Workaro... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'matrix-appservice-irc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.35.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-xvqg-mv25-rwvw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39203'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-appservice-irc'}, {'type': 'WEB', 'url': 'https://matri... | {'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:26:10Z', 'nvd_published_at': '2022-09-13T19:15:00Z'} |
1.4.0 | GHSA-hvv8-5v86-r45x | 2022-09-29T14:36:38Z | 2022-09-29T14:36:38Z | null | ['CVE-2022-39236'] | Improper beacon events in matrix-js-sdk can result in availability issues | ### Impact
Improperly formed beacon events (from [MSC3488](https://github.com/matrix-org/matrix-spec-proposals/pull/3488)) can disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normal... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'matrix-js-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '17.1.0-rc.1'}, {'fixed': '19.7.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-hvv8-5v86-r45x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39236'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-spec-proposals/pull/3488'}, {'type': 'WEB', 'url': 'https://github.... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-29T14:36:38Z', 'nvd_published_at': '2022-09-28T17:15:00Z'} |
1.4.0 | GHSA-hhhw-99gj-p3c3 | 2022-09-16T21:17:07Z | 2022-09-06T00:00:27Z | null | ['CVE-2022-38750'] | snakeYAML before 1.31 vulnerable to Denial of Service due to Out-of-bounds Write | Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.yaml:snakeyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.31'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38750'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/issues/526/stackoverflow-oss-fuzz-47027'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-f... | {'cwe_ids': ['CWE-121', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:17:07Z', 'nvd_published_at': '2022-09-05T10:15:00Z'} |
1.4.0 | GHSA-74x9-fhc2-p79f | 2022-12-06T00:41:57Z | 2022-09-22T00:00:26Z | null | ['CVE-2022-41254'] | Missing permission checks in Jenkins CONS3RT Plugin allow capturing credentials | CONS3RT Plugin 1.0.0 and earlier does not perform permission checks in methods implementing form validation.
This allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenki... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cons3rt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41254'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cons3rt-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2751'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T00:41:57Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-xpvp-h73c-m9rq | 2022-12-05T23:20:13Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41224'] | Jenkins vulnerable to stored cross site scripting in the I:helpIcon component | Jenkins 2.367 through 2.369 (both inclusive) does not escape tooltips of the `l:helpIcon` UI component used for some help icons on the Jenkins web UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control tooltips for this component.
As of publication, the Jenkins secu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.367'}, {'fixed': '2.370'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41224'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2886'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:20:13Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-fqxc-pvf8-2w9v | 2022-09-21T19:33:21Z | 2022-09-16T22:09:36Z | null | ['CVE-2022-36000'] | TensorFlow vulnerable to null dereference on MLIR on empty function attributes | ### Impact
`Eig` can be fed an incorrect `Tout` input, resulting in a `CHECK` fail that can trigger a denial of service attack.
```python
import tensorflow as tf
import numpy as np
arg_0=tf.constant(value=np.random.random(size=(2, 2)), shape=(2, 2), dtype=tf.float32)
arg_1=tf.complex128
arg_2=True
arg_3=''
tf.raw_ops.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fqxc-pvf8-2w9v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36000'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/aed36912609fc07229b4d0a7b44f3f48efc00fd0'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:09:36Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-3f7h-mf4q-vrm4 | 2023-07-05T22:37:39Z | 2022-09-17T00:00:41Z | null | ['CVE-2022-40152'] | Denial of Service due to parser crash | Those using FasterXML/woodstox to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
This vulnerability is only rele... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.woodstox:woodstox-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.woodstox:woodstox-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40152'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/woodstox/issues/157'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/woodstox/issues/160'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/issues/304'}, {'type': 'WEB... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:21:07Z', 'nvd_published_at': '2022-09-16T10:15:00Z'} |
1.4.0 | GHSA-937f-qh3w-6g87 | 2022-09-23T19:41:15Z | 2022-09-22T00:00:31Z | null | ['CVE-2022-2888'] | OctoPrint vulnerable to Insufficient Session Expiration. | If an attacker comes into the possession of a victim's OctoPrint session cookie through whatever means, the attacker can use this cookie to authenticate as long as the victim's account exists. This issue is fixed in version 1.8.3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'OctoPrint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2888'}, {'type': 'WEB', 'url': 'https://github.com/octoprint/octoprint/commit/40e6217ac1a85cc5ed592873ae49db01d3005da4'}, {'type': 'PACKAGE', 'url': 'https://github.com/octoprint/octoprint'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory... | {'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T19:41:15Z', 'nvd_published_at': '2022-09-21T12:15:00Z'} |
1.4.0 | GHSA-rh87-q4vg-m45j | 2022-09-16T21:20:28Z | 2022-09-16T21:20:28Z | null | ['CVE-2022-36015'] | TensorFlow vulnerable to integer overflow in math ops | ### Impact
When [`RangeSize`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/ops/math_ops.cc) receives values that do not fit into an `int64_t`, it crashes.
```cpp
auto size = (std::is_integral<T>::value
? ((Eigen::numext::abs(limit - start) +
Eigen::num... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rh87-q4vg-m45j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36015'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/37e64539cd29fcfb814c4451152a60f5d107b0f0'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-190'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:20:28Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-fg25-gq9g-32mx | 2022-09-23T18:10:51Z | 2022-09-21T00:00:44Z | null | ['CVE-2022-32167'] | Cross site scripting in Cloudreve | Cloudreve versions v1.0.0 through v3.5.3 are vulnerable to Stored Cross-Site Scripting (XSS), via the file upload functionality. A low privileged user will be able to share a file with an admin user, which could lead to privilege escalation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/HFO4/cloudreve'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'last_affected': '2.0.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cloudreve/Cloudreve/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32167'}, {'type': 'WEB', 'url': 'https://github.com/cloudreve/Cloudreve/commit/4b85541d73949969f41ad46d1e00544c9f1a7538'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudreve/Cloudreve'}, {'type': 'WEB', 'url': 'https://github.com/cloudreve/Cl... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T18:10:51Z', 'nvd_published_at': '2022-09-20T15:15:00Z'} |
1.4.0 | GHSA-jr8j-2jhp-m67v | 2022-09-16T17:17:56Z | 2022-09-16T17:17:56Z | null | [] | nftables binding to an already bound chain | ### Impact
An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel. A denial of service can occur upon binding to an already bound chain.
Affected by this vulnerability is the function nft_verdict_init of the file net/netfilter/nf_tables_api.c. The manipulation with an unknown input leads to a den... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/siderolabs/talos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/siderolabs/talos/security/advisories/GHSA-jr8j-2jhp-m67v'}, {'type': 'PACKAGE', 'url': 'https://github.com/siderolabs/talos'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:17:56Z', 'nvd_published_at': None} |
1.4.0 | GHSA-88cv-mj24-8w3q | 2022-09-21T17:00:12Z | 2022-09-21T17:00:12Z | null | ['CVE-2022-39224'] | arr-pm vulnerable to arbitrary shell execution when extracting or listing files contained in a malicious rpm. | ### Impact
Arbitrary shell execution is possible when using RPM::File#files and RPM::File#extract if the RPM contains a malicious "payload compressor" field.
This vulnerability impacts the `extract` and `files` methods of the `RPM::File` class in the affected versions of this library.
### Patches
Version 0.0.12 is ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'arr-pm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.12'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jordansissel/ruby-arr-pm/security/advisories/GHSA-88cv-mj24-8w3q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39224'}, {'type': 'WEB', 'url': 'https://github.com/jordansissel/ruby-arr-pm/pull/14'}, {'type': 'WEB', 'url': 'https://github.com/jordan... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T17:00:12Z', 'nvd_published_at': '2022-09-21T23:15:00Z'} |
1.4.0 | GHSA-mrf6-4gw6-65v3 | 2022-09-23T13:32:15Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41242'] | Jenkins extreme-feedback Plugin vulnerable to Missing Authorization | A missing permission check in Jenkins extreme-feedback Plugin 1.7 and earlier allows attackers with Overall/Read permission to discover information about job names attached to lamps, discover MAC and IP addresses of existing lamps, and rename lamps. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:extreme-feedback'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41242'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/extreme-feedback-plugin/'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2001'}] | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:32:15Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-g468-qj8g-vcjc | 2022-09-16T21:22:51Z | 2022-09-16T21:22:51Z | null | ['CVE-2022-36016'] | TensorFlow vulnerable to `CHECK`-fail in `tensorflow::full_type::SubstituteFromAttrs` | ### Impact
When [`tensorflow::full_type::SubstituteFromAttrs`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/ops/math_ops.cc) receives a `FullTypeDef& t` that is not exactly three args, it triggers a `CHECK`-fail instead of returning a status.
```cpp
Status SubstituteForEach(AttrMap& attrs, FullT... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g468-qj8g-vcjc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36016'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/6104f0d4091c260ce9352f9155f7e9b725eab012'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:22:51Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-7qpm-vmwv-hq7h | 2022-12-06T22:42:20Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41240'] | Stored XSS vulnerability in Jenkins Walti plugin | Jenkins Walti Plugin 1.0.1 and earlier does not escape the information provided by the Walti API, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide malicious API responses from Walti. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:walti'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41240'}, {'type': 'WEB', 'url': 'https://github.com/jenkins-infra/update-center2/pull/644'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/walti-plugin'}, {'type': 'WEB', 'url': 'https://plugins.jenkins.io/walti/'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T22:42:20Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-m748-hjqg-rpp8 | 2022-09-27T05:43:47Z | 2022-09-22T00:00:24Z | null | ['CVE-2022-3250'] | rdiffweb has insecure HTTP cookies | In rdiffweb prior to version 2.4.6, the `cookie` session_id does not have a secure attribute when the URL is invalid. Version 2.4.6 contains a fix for the issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3250'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/ac334dd27ceadac0661b1e2e059a8423433c3fee'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab... | {'cwe_ids': ['CWE-311', 'CWE-614'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-22T22:52:16Z', 'nvd_published_at': '2022-09-21T17:15:00Z'} |
1.4.0 | GHSA-48q3-5297-wmmx | 2022-12-06T00:50:17Z | 2022-09-22T00:00:26Z | null | ['CVE-2022-41253'] | CSRF vulnerability in Jenkins CONS3RT Plugin allow capturing credentials | CONS3RT Plugin 1.0.0 and earlier does not perform permission checks in methods implementing form validation.
This allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenki... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cons3rt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41253'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cons3rt-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2751'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T00:50:17Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-9w7j-q3xw-p9vh | 2022-09-28T14:12:31Z | 2022-09-25T00:00:26Z | null | ['CVE-2022-35253'] | Hyperledger Fabric subject to Denial of Service via non-validated request | A vulnerability exists in Hyperledger Fabric < 2.4 could allow an attacker to construct a non-validated request that could cause a denial of service attack. The peer gateway service tries to extract channel and chaincode information from the signed proposal, but it doesn't check the proposal fields for validity. There... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hyperledger/fabric'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35253'}, {'type': 'WEB', 'url': 'https://github.com/hyperledger/fabric/pull/3572'}, {'type': 'WEB', 'url': 'https://github.com/hyperledger/fabric/pull/3576'}, {'type': 'WEB', 'url': 'https://github.com/hyperledger/fabric/pull/3577'}, {'type': 'PACK... | {'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-28T14:12:31Z', 'nvd_published_at': '2022-09-23T14:15:00Z'} |
1.4.0 | GHSA-jv3g-j58f-9mq9 | 2022-09-16T17:44:42Z | 2022-09-16T17:44:42Z | null | ['CVE-2022-36083'] | JOSE vulnerable to resource exhaustion via specifically crafted JWE | The PBKDF2-based JWE key management algorithms expect a JOSE Header Parameter named `p2c` ([PBES2 Count](https://www.rfc-editor.org/rfc/rfc7518.html#section-4.8.1.2)), which determines how many PBKDF2 iterations must be executed in order to derive a CEK wrapping key. The purpose of this parameter is to intentionally sl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.28.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.28.1'}}, {'package': {'ecosystem': 'npm', 'name': 'jose-browser-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'ev... | [{'type': 'WEB', 'url': 'https://github.com/panva/jose/security/advisories/GHSA-jv3g-j58f-9mq9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36083'}, {'type': 'WEB', 'url': 'https://github.com/panva/jose/commit/03d6d013bf6e070e85adfe5731f526978e3e8e4d'}, {'type': 'PACKAGE', 'url': 'https://g... | {'cwe_ids': ['CWE-400', 'CWE-834'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:44:42Z', 'nvd_published_at': '2022-09-07T22:15:00Z'} |
1.4.0 | GHSA-p2g7-xwvr-rrw3 | 2022-09-16T18:49:48Z | 2022-09-16T18:49:48Z | null | ['CVE-2022-36049'] | Helm Controller denial of service | Helm controller is tightly integrated with the Helm SDK. [A vulnerability](https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh) found in the Helm SDK allows for specific data inputs to cause high memory consumption, which in some platforms could cause the controller to panic and stop processing reconci... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/fluxcd/helm-controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.4'}, {'fixed': '0.23.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/fluxcd/flux2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.17'}, {'fixed':... | [{'type': 'WEB', 'url': 'https://github.com/fluxcd/flux2/security/advisories/GHSA-p2g7-xwvr-rrw3'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36049'}, {'type': 'WEB', 'url': 'https://bugs.chromiu... | {'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:49:48Z', 'nvd_published_at': '2022-09-07T21:15:00Z'} |
1.4.0 | GHSA-72x9-48mc-phh6 | 2022-09-16T18:48:16Z | 2022-09-01T00:00:26Z | null | ['CVE-2022-37023'] | Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data | Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data flaw when using REST API on Java 8 or Java 11. Any user wishing to protect against deserialization attacks involving REST APIs should upgrade to Apache Geode 1.15 and follow the documentation for details on enabling "validate-se... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37023'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/6js89pbqrp52zlpwgry5fsdn76gxbbfj'}] | {'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:48:16Z', 'nvd_published_at': '2022-08-31T07:15:00Z'} |
1.4.0 | GHSA-f7fq-wp2x-jc25 | 2022-12-09T19:51:09Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41235'] | Jenkins WildFly Deployer Plugin vulnerable to path traversal | Jenkins WildFly Deployer Plugin 1.0.2 and earlier implements functionality that allows agent processes to read arbitrary files on the Jenkins controller file system.
This vulnerability is only exploitable in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier. See the [LTS upgrade guide](https://www.jenkins.io/doc/upgr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:wildfly-deployer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41235'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/wildfly-deployer-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2645'}] | {'cwe_ids': ['CWE-22', 'CWE-693'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:28:20Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-jrqh-c9v8-ccx9 | 2022-12-06T14:28:30Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41231'] | Path traversal in Jenkins build-publisher Plugin | Jenkins Build-Publisher Plugin 1.22 and earlier allows attackers with Item/Configure permission to create or replace any `config.xml` file on the Jenkins controller file system by providing a crafted file name to an API endpoint. Additionally, this endpoint does not require POST requests, resulting in a cross-site requ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:build-publisher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41231'}, {'type': 'WEB', 'url': 'https://github.com/jenkins-infra/update-center2/pull/644'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2139'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T14:28:30Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-qrqm-574x-q7f2 | 2022-09-29T19:06:17Z | 2022-09-22T00:00:22Z | null | ['CVE-2022-38073'] | Awesome Support vulnerable to persistent cross-site scripting | Multiple Authenticated (custom specific plugin role) Persistent Cross-Site Scripting (XSS) vulnerability in Awesome Support plugin <= 6.0.7 at WordPress. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'awesome-support/awesome-support'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38073'}, {'type': 'WEB', 'url': 'https://github.com/Awesome-Support/Awesome-Support/commit/85f460be88b81fbdd9a990f474a1252297902faf'}, {'type': 'WEB', 'url': 'https://github.com/Awesome-Support/Awesome-Support/commit/b2e831d7f831a3869cfd83eb79a398a... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-29T19:06:17Z', 'nvd_published_at': '2022-09-21T20:15:00Z'} |
1.4.0 | GHSA-m4vx-ccrf-w399 | 2022-09-20T18:15:00Z | 2022-09-14T00:00:43Z | null | ['CVE-2022-3029'] | NLnet Labs Routinator has Reachable Assertion vulnerability | In NLnet Labs Routinator 0.9.0 up to and including 0.11.2, due to a mistake in error handling, data in RRDP snapshot and delta files which are not correctly base 64 encoded are treated as a fatal error and causes Routinator to exit. Worst case impact of this vulnerability is denial of service for the RPKI data that Rou... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'routinator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.11.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3029'}, {'type': 'WEB', 'url': 'https://github.com/NLnetLabs/routinator/pull/781/commits/c2e2476f28f09ea5ffb22d172d84fb4f8384d496'}, {'type': 'PACKAGE', 'url': 'https://github.com/NLnetLabs/routinator'}, {'type': 'WEB', 'url': 'https://github.com/N... | {'cwe_ids': ['CWE-617'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T18:15:00Z', 'nvd_published_at': '2022-09-13T16:15:00Z'} |
1.4.0 | GHSA-3mq5-fq9h-gj7j | 2023-03-03T23:04:23Z | 2022-09-17T00:00:41Z | 2023-03-03T23:04:23Z | [] | Duplicate Advisory: Denial of Service due to parser crash | ## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of [GHSA-f8cc-g7j8-xxpm](https://github.com/advisories/GHSA-f8cc-g7j8-xxpm). This link is maintained to preserve external references.
## Original Description
Those using Xstream to seralize XML data may be vulnerable to Denial of Service ... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.19'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40151'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/issues/304'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/issues/314'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47367'}, {'ty... | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:21:26Z', 'nvd_published_at': '2022-09-16T10:15:00Z'} |
1.4.0 | GHSA-gjmq-x5x7-wc36 | 2022-09-16T17:39:32Z | 2022-09-16T17:39:32Z | null | ['CVE-2022-36096'] | XWiki Platform vulnerable to Cross-site Scripting in the deleted attachments list | ### Impact
It's possible to store a JavaScript which will be executed by anyone viewing the deleted attachments index with an attachment containing javascript in its name.
For example, attachment a file with name `><img src=1 onerror=alert(1)>.jpg` will execute the alert.
### Patches
This issue has been patched in ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-index-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2-milestone-1'}, {'fixed': '13.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-index-ui'}, 'ranges': [{'type': 'ECOSYSTEM', '... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gjmq-x5x7-wc36'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36096'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/6705b0cd0289d1c90ed354bd4ecc1508c4b25745'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:39:32Z', 'nvd_published_at': '2022-09-08T21:15:00Z'} |
1.4.0 | GHSA-34vw-m4rh-r36p | 2022-09-16T17:17:37Z | 2022-09-16T17:17:37Z | null | [] | Talos vulnerable dependency due to race condition in Linux kernel's IP framework XFRM | ### Impact
A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bound... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/talos-systems/talos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/siderolabs/talos/security/advisories/GHSA-34vw-m4rh-r36p'}, {'type': 'PACKAGE', 'url': 'https://github.com/siderolabs/talos'}] | {'cwe_ids': ['CWE-362', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:17:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jj62-mc3m-j769 | 2022-09-15T03:30:14Z | 2022-09-07T00:01:50Z | null | ['CVE-2020-21516'] | FeehiCMS has an arbitrary file upload vulnerability | There is an arbitrary file upload vulnerability in FeehiCMS 2.0.8.1 at the head image upload, that allows attackers to execute relevant PHP code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-21516'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/46'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}, {'type... | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:30:14Z', 'nvd_published_at': '2022-09-06T19:15:00Z'} |
1.4.0 | GHSA-rc4r-wh2q-q6c4 | 2022-09-16T21:00:46Z | 2022-09-16T21:00:46Z | null | ['CVE-2022-36109'] | Moby supplementary group permissions not set up properly, allowing attackers to bypass primary group restrictions | Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where supplementary groups are not set up properly. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/moby/moby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.10.18'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36109'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/commit/de7af816e76a7fd3fbf06bffa6832959289fba32'}, {'type': 'PACKAGE', 'url': 'https://git... | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:00:46Z', 'nvd_published_at': '2022-09-09T18:15:00Z'} |
1.4.0 | GHSA-qq29-5vjh-vxwr | 2022-09-30T04:44:55Z | 2022-09-27T00:00:22Z | null | ['CVE-2022-3301'] | rdiffweb vulnerable to Improper Cleanup on Thrown Exception | rdiffweb prior to version 2.4.8 is vulnerable to Improper Cleanup on Thrown Exception. This could allow an attacker to display a message of their choice onto a web page. Version 2.4.8 contains a fix for this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3301'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/5ac38b2a75becbab9f948bd5e37ecbcd9f0b362e'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab... | {'cwe_ids': ['CWE-460'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:44:55Z', 'nvd_published_at': '2022-09-26T11:15:00Z'} |
1.4.0 | GHSA-8gq9-2x98-w8hf | 2023-04-27T15:52:04Z | 2022-09-23T20:31:15Z | null | ['CVE-2022-1941'] | protobuf-cpp and protobuf-python have potential Denial of Service issue | ### Summary
A message parsing and memory management vulnerability in ProtocolBuffer’s C++ and Python implementations can trigger an out of memory (OOM) failure when processing a specially crafted message, which could lead to a denial of service (DoS) on services using the libraries.
Reporter: [ClusterFuzz](https://go... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'protobuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.18.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'protobuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.19.0'}, {'fixed': '3.19.5'}]}]}, {'package': {'ecosystem'... | [{'type': 'WEB', 'url': 'https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1941'}, {'type': 'WEB', 'url': 'https://cloud.google.com/support/bulletins#GCP-2022-019'}, {'type': 'PACKAGE', 'url': 'https://github.com... | {'cwe_ids': ['CWE-119', 'CWE-1286'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:31:15Z', 'nvd_published_at': '2022-09-22T15:15:00Z'} |
1.4.0 | GHSA-rhwx-hjx2-x4qr | 2023-01-26T22:41:07Z | 2022-09-10T00:00:32Z | null | ['CVE-2022-25765'] | PDFKit vulnerable to Command Injection | The package pdfkit is vulnerable to Command Injection where the URL is not properly sanitized.
Note: This issue was patched in 0.8.7.2, but the patch was discovered to be ineffective. The updated patch version is 0.8.7.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'pdfkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25765'}, {'type': 'WEB', 'url': 'https://github.com/pdfkit/pdfkit/issues/517'}, {'type': 'WEB', 'url': 'https://github.com/pdfkit/pdfkit/pull/519'}, {'type': 'PACKAGE', 'url': 'https://github.com/pdfkit/pdfkit'}, {'type': 'WEB', 'url': 'https://git... | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:30:40Z', 'nvd_published_at': '2022-09-09T05:15:00Z'} |
1.4.0 | GHSA-pxp5-g66h-wpv2 | 2022-12-06T19:54:53Z | 2022-09-22T00:00:29Z | null | ['CVE-2022-41244'] | Missing hostname validation in Jenkins View26 Test-Reporting Plugin | Jenkins View26 Test-Reporting Plugin 1.0.7 and earlier does not perform hostname validation when connecting to the configured View26 server that could be abused using a man-in-the-middle attack to intercept these connections. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:view26'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41244'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/view26-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2069'}] | {'cwe_ids': ['CWE-297'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:30:36Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-4r4f-jrvw-h727 | 2023-07-07T19:01:25Z | 2022-09-15T00:00:19Z | null | ['CVE-2022-38796'] | Feehi CMS host header injection vulnerability | A Host Header Injection vulnerability in Feehi CMS 2.1.1 may allow an attacker to spoof a particular header. This can be exploited by abusing password reset emails. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38796'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=k8dp0FJnSsI'}] | {'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:07:41Z', 'nvd_published_at': '2022-09-14T15:15:00Z'} |
1.4.0 | GHSA-q2c3-jpmc-gfjx | 2022-09-19T19:29:32Z | 2022-09-16T22:17:17Z | null | ['CVE-2022-35969'] | TensorFlow vulnerable to `CHECK` fail in `Conv2DBackpropInput` | ### Impact
The implementation of `Conv2DBackpropInput` requires `input_sizes` to be 4-dimensional. Otherwise, it gives a `CHECK` failure which can be used to trigger a denial of service attack:
```python
import tensorflow as tf
strides = [1, 1, 1, 1]
padding = "SAME"
use_cudnn_on_gpu = True
explicit_paddings = []
data... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q2c3-jpmc-gfjx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35969'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/50156d547b9a1da0144d7babe665cf690305b33c'}, {'type': 'PACKA... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:17:17Z', 'nvd_published_at': '2022-09-16T21:15:00Z'} |
1.4.0 | GHSA-599v-w48h-rjrm | 2022-09-16T17:39:46Z | 2022-09-16T17:39:46Z | null | ['CVE-2022-36091'] | XWiki Platform Web Templates vulnerable to Missing Authorization, Exposure of Private Personal Information to Unauthorized Actor | ### Impact
Through the suggestion feature, string and list properties of objects the user shouldn't have access to can be accessed. This includes private personal information like email addresses and salted password hashes of registered users but also other information stored in properties of objects. Sensitive configu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3'}, {'fixed': '13.10.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-599v-w48h-rjrm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36091'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-1... | {'cwe_ids': ['CWE-359', 'CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:39:46Z', 'nvd_published_at': '2022-09-08T16:15:00Z'} |
1.4.0 | GHSA-vxv8-r8q2-63xw | 2022-09-19T19:33:04Z | 2022-09-16T22:26:57Z | null | ['CVE-2022-35981'] | TensorFlow vulnerable to `CHECK` fail in `FractionalMaxPoolGrad` | ### Impact
`FractionalMaxPoolGrad` validates its inputs with `CHECK` failures instead of with returning errors. If it gets incorrectly sized inputs, the `CHECK` failure can be used to trigger a denial of service attack:
```python
import tensorflow as tf
overlapping = True
orig_input = tf.constant(.453409232, shape=[1,... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vxv8-r8q2-63xw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35981'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8741e57d163a079db05a7107a7609af70931def4'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:26:57Z', 'nvd_published_at': '2022-09-16T22:15:00Z'} |
1.4.0 | GHSA-xhw9-4wqq-x67v | 2022-09-30T01:29:25Z | 2022-09-27T00:00:16Z | null | ['CVE-2022-3298'] | rdiffweb vulnerable to potential DoS via memory consumption | rdiffweb prior to 2.4.8 is vulnerable to a potential Dos attack via an unlimited length "title" field when adding an SSH key.
This can result in excess memory consumption, leading to a Denial of Service (DoS). This issue is patched in version 2.4.8. There are no known workarounds. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3298'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/626cca1b75b6c587afd4241a9692e8929b1921a5'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab... | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T01:29:25Z', 'nvd_published_at': '2022-09-26T22:15:00Z'} |
1.4.0 | GHSA-pwq7-f7f9-cm2j | 2022-10-04T15:28:51Z | 2022-09-30T00:00:34Z | null | ['CVE-2022-40931'] | Dutchoders transfer.sh contains an XSS vulnerability via malicious file upload | dutchcoders Transfer.sh versions 1.4.0 and prior are vulnerable to Cross Site Scripting (XSS) via a malicious document uploaded in transfer.sh. There is a fix commit merged into [main](https://github.com/dutchcoders/transfer.sh/commit/31ad4e01e158497519f8680c187e1ceb8594c59d) for this issue, but an updated version has... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/dutchcoders/transfer.sh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40931'}, {'type': 'WEB', 'url': 'https://github.com/dutchcoders/transfer.sh/issues/500'}, {'type': 'WEB', 'url': 'https://github.com/dutchcoders/transfer.sh/pull/501'}, {'type': 'PACKAGE', 'url': 'https://github.com/dutchcoders/transfer.sh'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-01T01:01:50Z', 'nvd_published_at': '2022-09-29T16:15:00Z'} |
1.4.0 | GHSA-3cvm-7wrh-qrf9 | 2022-09-23T13:53:34Z | 2022-09-17T00:00:30Z | null | ['CVE-2022-37247'] | Craft CMS vulnerable to stored Cross-site Scripting via /admin/settings/fields page | Craft CMS 4.2.0.1 is vulnerable to stored a cross-site scripting (XSS) via /admin/settings/fields page. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC1'}, {'fixed': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37247'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/cedeba0609e4b173cd584dae7f33c5f713f19627'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/3.7.55.2... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:53:34Z', 'nvd_published_at': '2022-09-16T22:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.