schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-jqhq-pfg3-fg5p
2022-09-16T17:18:14Z
2022-09-08T00:00:30Z
null
['CVE-2022-35513']
Blink1Control2 uses weak password encryption
The Blink1Control2 application <= 2.2.7 uses weak password encryption and an insecure method of storage. Version 2.2.9 fixes the issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'Blink1Control2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35513'}, {'type': 'WEB', 'url': 'https://github.com/todbot/Blink1Control2/issues/175'}, {'type': 'WEB', 'url': 'https://github.com/todbot/Blink1Control2/commit/74827462aba3a26d7bf157522f69eec999d7ba85'}, {'type': 'WEB', 'url': 'https://github.com/t...
{'cwe_ids': ['CWE-326'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:18:14Z', 'nvd_published_at': '2022-09-07T14:15:00Z'}
1.4.0
GHSA-ggf6-638m-vqmg
2023-06-27T22:21:05Z
2022-09-15T03:34:21Z
null
['CVE-2022-36110']
Netmaker vulnerable to Insufficient Granularity of Access Control
### Impact Improper Authorization functions leads to non-privileged users running privileged API calls. If you have added users to your Netmaker platform who whould not have admin privileges, they could use their auth token to run admin-level functions via the API. In addition, differing response codes based on functi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gravitl/netmaker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/security/advisories/GHSA-ggf6-638m-vqmg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36110'}, {'type': 'PACKAGE', 'url': 'https://github.com/gravitl/netmaker'}, {'type': 'WEB', 'url': 'https://github.com/gravitl/netmaker/releases/...
{'cwe_ids': ['CWE-1220', 'CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:34:21Z', 'nvd_published_at': '2022-09-09T20:15:00Z'}
1.4.0
GHSA-3633-5h82-39pq
2023-08-30T00:15:27Z
2022-09-16T17:17:13Z
null
[]
Go-tuf Improperly handles multiple key IDs for the same public keys in attacker-controlled metadata
### Issue If an attacker is able to control a threshold of keys to insert the same public key more than once with different key IDs into signed, trusted metadata on a TUF repository, then go-tuf [clients](https://github.com/theupdateframework/go-tuf#client) < [0.3.2](https://github.com/theupdateframework/go-tuf/releas...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/theupdateframework/go-tuf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/theupdateframework/go-tuf/security/advisories/GHSA-3633-5h82-39pq'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/go-tuf/pull/369'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-3633-5h82-39pq'}, {'type': 'PACKAGE', 'url': 'https://github.c...
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:17:13Z', 'nvd_published_at': None}
1.4.0
GHSA-jjch-7g85-4m72
2022-12-05T22:15:31Z
2022-09-22T00:00:28Z
null
['CVE-2022-41227']
Jenkins NS-ND Integration Performance Publisher Plugin vulnerable to Cross-Site Request Forgery
A cross-site request forgery (CSRF) vulnerability in Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.129 and earlier allows attackers to connect to an attacker-specified webserver using attacker-specified credentials. Version 4.8.0.130 requires POST requests and Overall/Administer permission for the affect...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:cavisson-ns-nd-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.0.130'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.8.0.129'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41227'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2737'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:44:21Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-42hx-vrxx-5r6v
2022-09-27T22:48:53Z
2022-09-25T00:00:15Z
null
['CVE-2022-23461']
Jodit Editor vulnerable to Cross-site Scripting
Jodit Editor is a WYSIWYG editor written in pure TypeScript without the use of additional libraries. Jodit Editor is vulnerable to XSS attacks when pasting specially constructed input. This issue has not been fully patched. There are no known workarounds.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'jodit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.24.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23461'}, {'type': 'PACKAGE', 'url': 'https://github.com/xdan/jodit'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2022-030_xdan_jodit/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-27T22:48:53Z', 'nvd_published_at': '2022-09-24T03:15:00Z'}
1.4.0
GHSA-9c6w-55cp-5w25
2022-09-16T17:15:57Z
2022-09-16T17:15:57Z
null
['CVE-2022-36107']
TYPO3 CMS Stored Cross-Site Scripting via FileDumpController
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.0) ### Problem It has been discovered that the `FileDumpController` (backend and frontend context) is vulnerable to cross-site scripting when malicious files are displayed using this component. A valid backend user account is needed t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.6.58'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.48'}]}]},...
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-9c6w-55cp-5w25'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36107'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/546208428c861a09d62b86cde141eb19a81fae66'}, {'type': 'WEB', 'url': 'https://git...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:15:57Z', 'nvd_published_at': '2022-09-13T18:15:00Z'}
1.4.0
GHSA-vh4m-mw8w-g4w8
2022-09-15T03:20:14Z
2022-09-07T00:01:54Z
null
['CVE-2022-2714']
RosarioSIS before 10.1 vulnerable to Improper Handling of Length Parameter Inconsistency
RosarioSIS Student Information System prior to version 10.1 is vulnerable to Improper Handling of Length Parameter Inconsistency.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2714'}, {'type': 'WEB', 'url': 'https://github.com/francoisjacquet/rosariosis/commit/4022954c3f41462bf6225c302a28b0429f6f4df3'}, {'type': 'PACKAGE', 'url': 'https://github.com/francoisjacquet/rosariosis'}, {'type': 'WEB', 'url': 'https://huntr.dev/...
{'cwe_ids': ['CWE-130'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:20:14Z', 'nvd_published_at': '2022-09-06T11:15:00Z'}
1.4.0
GHSA-9mc6-vgmq-x6xf
2022-12-06T22:31:23Z
2022-09-22T00:00:28Z
null
['CVE-2022-41238']
Lack of authentication mechanism in Jenkins DotCi Plugin webhook
DotCi Plugin provides a webhook endpoint at `/githook/` that can be used to trigger builds of the job for a GitHub repository. In DotCi Plugin 2.40.00 and earlier, this endpoint can be accessed without authentication. This allows unauthenticated attackers to trigger builds of jobs corresponding to the attacker-specif...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.groupon.jenkins-ci.plugins:DotCi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.40.00'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41238'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/DotCi'}, {'type': 'WEB', 'url': 'https://plugins.jenkins.io/DotCi/'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2867'}, {'type': 'WEB', 'u...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T22:31:23Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-mcvg-g9wx-v5vx
2022-09-23T17:07:38Z
2022-09-20T00:00:20Z
null
['CVE-2022-38545']
Valine code injection vulnerability
Valine was discovered to contain a remote code execution (RCE) vulnerability which allows attackers to execute arbitrary code via a crafted POST request.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'valine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38545'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/issues/400'}, {'type': 'WEB', 'url': 'https://github.com/xCss/Valine/commit/c40826c5816c98d797a6b1ed8b62bddf73ed4f65'}, {'type': 'PACKAGE', 'url': 'https://github.com/xCss/Valine'}, {'...
{'cwe_ids': ['CWE-74', 'CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T17:43:24Z', 'nvd_published_at': '2022-09-19T23:15:00Z'}
1.4.0
GHSA-2qf8-h7pr-x2r8
2022-09-21T21:32:00Z
2022-09-21T00:00:52Z
null
['CVE-2022-2924']
YetiForce CRM vulnerable to stored Cross-site Scripting via WidgetsManagement module
YetiForce CRM versions 6.4.0 and prior are vulnerable to cross-site scripting via the `WidgetsManagement` module. A patch is available at commit b716ecea340783b842498425faa029800bd30420.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2924'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/b716ecea340783b842498425faa029800bd30420'}, {'type': 'PACKAGE', 'url': 'https://github.com/YetiForceCompany/YetiForceCRM'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:32:00Z', 'nvd_published_at': '2022-09-20T06:15:00Z'}
1.4.0
GHSA-j7xv-fc46-hgpg
2022-12-09T16:15:18Z
2022-09-22T00:00:29Z
null
['CVE-2022-41247']
Jenkins BigPanda Notifier Plugin stores BigPanda API key unencrypted
BigPanda Notifier Plugin 1.4.0 and earlier stores the BigPanda API key unencrypted in its global configuration file `BigpandaGlobalNotifier.xml` on the Jenkins controller as part of its configuration. This API key can be viewed by users with access to the Jenkins controller file system. Additionally, the global configu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:bigpanda-jenkins'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41247'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/bigpanda-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2243'}]
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:26:53Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-8gw7-4j42-w388
2022-09-16T19:13:13Z
2022-09-16T19:13:13Z
null
['CVE-2022-36056']
Cosign bundle can be crafted to successfully verify a blob even if the embedded rekorBundle does not reference the given signature
## Summary A number of vulnerabilities have been found in `cosign verify-blob`, where Cosign would successfully verify an artifact when verification should have failed. ## Vulnerability 1: Bundle mismatch causes invalid verification. ### Summary A cosign bundle can be crafted to successfully verify a blob even if th...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sigstore/cosign'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.11.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/sigstore/cosign/security/advisories/GHSA-8gw7-4j42-w388'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36056'}, {'type': 'WEB', 'url': 'https://github.com/sigstore/cosign/commit/80b79ed8b4d28ccbce3d279fd273606b5cddcc25'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:13:13Z', 'nvd_published_at': '2022-09-14T20:15:00Z'}
1.4.0
GHSA-f7r5-q7cx-h668
2022-09-19T19:27:26Z
2022-09-16T22:14:00Z
null
['CVE-2022-35964']
TensorFlow vulnerable to segfault in `BlockLSTMGradV2`
### Impact The implementation of `BlockLSTMGradV2` does not fully validate its inputs. - `wci`, `wcf`, `wco`, `b` must be rank 1 - `w`, cs_prev`, `h_prev` must be rank 2 - `x` must be rank 3 This results in a a segfault that can be used to trigger a denial of service attack. ```python import tensorflow as tf use_pe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f7r5-q7cx-h668'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35964'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/2a458fc4866505be27c62f81474ecb2b870498fa'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:14:00Z', 'nvd_published_at': '2022-09-16T21:15:00Z'}
1.4.0
GHSA-c439-chv8-8g2j
2022-09-02T22:29:41Z
2022-09-02T22:29:41Z
null
[]
`os_socketaddr` invalidly assumes the memory layout of std::net::SocketAddr
The [`os_socketaddr`](https://crates.io/crates/os_socketaddr) crate has assumed `std::net::SocketAddrV4` and `std::net::SocketAddrV6` have the same memory layout as the system C representation `sockaddr`. It has simply casted the pointers to convert the socket addresses to the system representation. These layout were ...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'os_socketaddr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/a-ba/os_socketaddr/issues/3'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/rust/pull/78802'}, {'type': 'WEB', 'url': 'https://github.com/a-ba/os_socketaddr/commit/1bc7f71d40de069727993a18fdada33eb0b4c94f'}, {'type': 'PACKAGE', 'url': 'https://github.com/a-ba/os_socke...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-02T22:29:41Z', 'nvd_published_at': None}
1.4.0
GHSA-4xh4-v2pq-jvhm
2023-01-11T18:59:09Z
2022-09-19T22:47:29Z
null
['CVE-2023-22963']
personnummer/dart vulnerable to Improper Input Validation
This vulnerability was reported to the personnummer team in June 2020. The slow response was due to locked ownership of some of the affected packages, which caused delays to update packages prior to disclosure. The vulnerability is determined to be low severity. ### Impact This vulnerability impacts users who rely o...
[]
[{'package': {'ecosystem': 'Pub', 'name': 'personnummer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/personnummer/dart/security/advisories/GHSA-4xh4-v2pq-jvhm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2023-22963'}, {'type': 'PACKAGE', 'url': 'https://github.com/personnummer/dart'}, {'type': 'WEB', 'url': 'https://pub.dev/packages/personnummer'}]
{'cwe_ids': ['CWE-20'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-19T22:47:29Z', 'nvd_published_at': None}
1.4.0
GHSA-vfv3-9w6v-23jp
2022-09-16T17:13:21Z
2022-09-16T17:13:21Z
null
[]
typemap is Unmaintained
The maintainer seems unreachable. The crate may or may not be usable as-is despite no maintenance and may not work in future versions of Rust. The last release seems to have been seven years ago.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'typemap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/reem/rust-typemap/issues/45'}, {'type': 'PACKAGE', 'url': 'https://github.com/reem/rust-typemap'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2019-0039.html'}]
{'cwe_ids': ['CWE-1104'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:13:21Z', 'nvd_published_at': None}
1.4.0
GHSA-fmq9-r4p2-8272
2023-06-27T20:52:17Z
2022-09-22T00:00:26Z
null
['CVE-2022-41255']
API token stored in plain text by Jenkins CONS3RT Plugin
Jenkins CONS3RT Plugin 1.0.0 and earlier stores Cons3rt API token unencrypted in job `config.xml` files on the Jenkins controller as part of its configuration. This API token can be viewed by users with access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cons3rt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41255'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cons3rt-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2759'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202...
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T00:39:13Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-rv5q-72p2-2q24
2022-09-30T06:28:12Z
2022-09-27T00:00:20Z
null
['CVE-2022-40044']
Centreon contains cross-site scripting vulnerability via esc_name parameter
Centreon v20.10.18 was discovered to contain a cross-site scripting (XSS) vulnerability via the `esc_name` (Escalation Name) parameter at `Configuration/Notifications/Escalations`. This vulnerability allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload. Versions 21.04.16, 21.10.8, a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.04.16'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '21.10.0'}, {'fixed': '21.10.8...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40044'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/commit/1a6ee0e9a003ac4f07dc8c370aec6e8911279358'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/commit/76fdfba312515656419a1311a83adfb11a73199f'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T06:28:12Z', 'nvd_published_at': '2022-09-26T16:15:00Z'}
1.4.0
GHSA-gm8c-w9cm-c445
2022-09-23T17:07:18Z
2022-09-21T00:00:46Z
null
['CVE-2022-3245']
Microweber vulnerable to HTML Injection in create tag functionality
HTML injection attack is closely related to Cross-site Scripting (XSS). HTML injection uses HTML to deface the page. XSS, as the name implies, injects JavaScript into the page. Both attacks exploit insufficient validation of user input. A patch is available on commit f20abf30a1d9c1426c5fb757ac63998dc5b92bfc and is anti...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3245'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/f20abf30a1d9c1426c5fb757ac63998dc5b92bfc'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7...
{'cwe_ids': ['CWE-79', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:14:01Z', 'nvd_published_at': '2022-09-20T14:15:00Z'}
1.4.0
GHSA-28q9-9c3g-v3f9
2022-09-23T15:13:14Z
2022-09-23T15:13:14Z
null
[]
lakeFS vulnerable to authenticated users deleting files they are not authorized to delete
### Impact Authenticated users can send a request to delete-objects through the s3 gateway and delete files they are not authorized to delete. ### Patches lakeFS v0.82.0 and later ### Workarounds Drop specific request to the lakeFS listen port. Any request with "Authorization" header and value that starts with "AW...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/treeverse/lakefs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.82.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/treeverse/lakeFS/security/advisories/GHSA-28q9-9c3g-v3f9'}, {'type': 'WEB', 'url': 'https://github.com/treeverse/lakeFS/commit/81182bf9c0cf57f3cec3c893cf739b2069305e37'}, {'type': 'PACKAGE', 'url': 'https://github.com/treeverse/lakeFS'}]
{'cwe_ids': ['CWE-281', 'CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T15:13:14Z', 'nvd_published_at': None}
1.4.0
GHSA-gwp4-mcv4-w95j
2022-09-21T16:58:31Z
2022-09-21T16:58:31Z
null
['CVE-2022-3102']
jwcrypto token substitution can lead to authentication bypass
The JWT code can auto-detect the type of token being provided, and this can lead the application to incorrect conclusions about the trustworthiness of the token. Quoting the private disclosure we received : "Under certain circumstances, it is possible to substitute a [..] signed JWS with a JWE that is encrypted with th...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'jwcrypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/latchset/jwcrypto/security/advisories/GHSA-gwp4-mcv4-w95j'}, {'type': 'WEB', 'url': 'https://github.com/latchset/jwcrypto/commit/f4e912f83cb578e2cd47f8a9398bf15f680bf558'}, {'type': 'PACKAGE', 'url': 'https://github.com/latchset/jwcrypto'}, {'type': 'WEB', 'url': 'https://git...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T16:58:31Z', 'nvd_published_at': None}
1.4.0
GHSA-4p6f-m4f9-ch88
2022-09-16T21:25:03Z
2022-09-16T21:25:03Z
null
['CVE-2022-36078']
Binary vulnerable to Slice Memory Allocation with Excessive Size Value
### Impact > _What kind of vulnerability is it? Who is impacted?_ The vulnerability is a memory allocation vulnerability that can be exploited to allocate slices in memory with (arbitrary) excessive size value, which can either exhaust available memory or crash the whole program. When using `github.com/gagliardetto/b...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gagliardetto/binary'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gagliardetto/binary/security/advisories/GHSA-4p6f-m4f9-ch88'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36078'}, {'type': 'WEB', 'url': 'https://github.com/gagliardetto/binary/pull/7'}, {'type': 'PACKAGE', 'url': 'https://github.com/gagliardetto/...
{'cwe_ids': ['CWE-400', 'CWE-789'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:25:03Z', 'nvd_published_at': '2022-09-02T13:15:00Z'}
1.4.0
GHSA-9fwf-46g9-45rx
2022-12-06T13:41:12Z
2022-09-17T00:00:41Z
2022-12-06T13:41:12Z
['CVE-2022-40154']
Denial of Service via stack overflow
## Withdrawn This advisory has been withdrawn because it has been found to be a duplicate. Please see the issue [here](https://github.com/x-stream/xstream/issues/304#issuecomment-1293654236) for more information. ## Original Despcription Those using FasterXML/woodstox to serialise XML data may be vulnerable to Deni...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.woodstox:woodstox-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.woodstox:woodstox-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40154'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/woodstox/issues/157'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/woodstox/issues/160'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/issues/304'}, {'type': 'WEB...
{'cwe_ids': ['CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T20:50:31Z', 'nvd_published_at': '2022-09-16T10:15:00Z'}
1.4.0
GHSA-pp8r-vv2j-9j5v
2022-09-16T17:12:59Z
2022-09-16T17:12:59Z
null
[]
traitobject is Unmaintained
Crate `traitobject` has not had a release for over five years. In addition there is an existing security advisory that has not been addressed: - [RUSTSEC-2020-0027](https://rustsec.org/advisories/RUSTSEC-2020-0027) ## Possible Alternative(s) The below list has not been vetted in any way and may or may not contain...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'traitobject'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/reem/rust-traitobject/issues/7'}, {'type': 'PACKAGE', 'url': 'https://github.com/reem/rust-traitobject'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0144.html'}]
{'cwe_ids': ['CWE-1104'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:12:59Z', 'nvd_published_at': None}
1.4.0
GHSA-9q5j-jm53-v7vr
2022-09-01T22:24:55Z
2022-09-01T22:24:55Z
null
[]
lz4-sys vulnerable to memory corruption via issue in liblz4
lz4-sys up to v1.9.3 bundles a version of liblz4 that is vulnerable to [CVE-2021-3520](https://nvd.nist.gov/vuln/detail/CVE-2021-3520). Attackers could craft a payload that triggers an integer overflow upon decompression, causing an out-of-bounds write. The flaw has been corrected in version v1.9.4 of liblz4, which i...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'lz4-sys'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/lz4/lz4/pull/972'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0051.html'}]
{'cwe_ids': ['CWE-190', 'CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:24:55Z', 'nvd_published_at': None}
1.4.0
GHSA-93q5-3xpc-8vg3
2022-09-21T21:08:13Z
2022-09-16T00:00:39Z
null
['CVE-2022-37257']
steal vulnerable to Prototype Pollution via requestedVersion variable
Prototype pollution vulnerability in function convertLater in npm-convert.js in stealjs steal via the requestedVersion variable in the npm-convert.js file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'steal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37257'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/issues/1526'}, {'type': 'PACKAGE', 'url': 'https://github.com/stealjs/steal'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:08:13Z', 'nvd_published_at': '2022-09-15T13:15:00Z'}
1.4.0
GHSA-wqr6-57qm-hhr5
2022-09-23T13:56:46Z
2022-09-22T00:00:30Z
null
['CVE-2022-3255']
Pimcore vulnerable to cross site scripting
If an attacker can control a script that is executed in the victim's browser, then they can typically fully compromise that user. Amongst other things, the attacker can perform any action within the application that the user can perform; view any information that the user is able to view; modify any information that th...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.5.6'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3255'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/1e916e7d668c9e47b217e20cc0ea4812f466201b'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0ea45cf9-b256...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:56:46Z', 'nvd_published_at': '2022-09-21T13:15:00Z'}
1.4.0
GHSA-m7w4-q5vg-5xfp
2022-09-28T14:14:03Z
2022-09-25T00:00:21Z
null
['CVE-2022-3257']
Mattermost subject to Denial of Service via upload of special GIF
Mattermost version 7.1.x and earlier fails to sufficiently process a specifically crafted GIF file when it is uploaded while drafting a post, which allows authenticated users to cause resource exhaustion while processing the file, resulting in server-side Denial of Service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mattermost/mattermost-server/v6'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.1.0'}, {'fixed': '7.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3257'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1620170'}, {'type': 'PACKAGE', 'url': 'https://github.com/mattermost/mattermost-server'}, {'type': 'WEB', 'url': 'https://mattermost.com/security-updates/'}]
{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-28T14:14:03Z', 'nvd_published_at': '2022-09-23T15:15:00Z'}
1.4.0
GHSA-mqh9-5jp9-6799
2022-09-21T21:29:05Z
2022-09-21T00:00:52Z
null
['CVE-2022-3000']
YetiForce CRM vulnerable to stored Cross-site Scripting via LayoutEditor module
YetiForce CRM versions 6.4.0 and prior are vulnerable to cross-site scripting via the `LayoutEditor` module. A patch is available at commit eebc12601495ada38495076bec12841b2477516b.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3000'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/eebc12601495ada38495076bec12841b2477516b'}, {'type': 'PACKAGE', 'url': 'https://github.com/YetiForceCompany/YetiForceCRM'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:29:05Z', 'nvd_published_at': '2022-09-20T07:15:00Z'}
1.4.0
GHSA-j2mj-g8jp-gjfm
2022-12-05T22:26:07Z
2022-09-22T00:00:28Z
null
['CVE-2022-41228']
Jenkins NS-ND Integration Performance Publisher Plugin vulnerable to Missing Authorization
A missing permission check in Jenkins NS-ND Integration Performance Publisher Plugin 4.8.0.129 and earlier allows attackers with Overall/Read permissions to connect to an attacker-specified webserver using attacker-specified credentials. Version 4.8.0.130 requires POST requests and Overall/Administer permission for the...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:cavisson-ns-nd-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.0.130'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.8.0.129'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41228'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cavisson-ns-nd-integration-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2737'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:43:08Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-w3w9-vrf5-8mx8
2022-09-16T18:48:53Z
2022-09-16T18:48:53Z
null
['CVE-2022-36032']
ReactPHP's HTTP server parses encoded cookie names so malicious `__Host-` and `__Secure-` cookies can be sent
### Impact In ReactPHP's HTTP server component versions below v1.7.0, when ReactPHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like `__Host-` and `__Secure-` confused with cookies that decode to such prefix, thus leading to an attacker being able...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'react/http'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.7.0'}, {'fixed': '1.7.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/reactphp/http/security/advisories/GHSA-w3w9-vrf5-8mx8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36032'}, {'type': 'WEB', 'url': 'https://github.com/reactphp/http/pull/175'}, {'type': 'WEB', 'url': 'https://github.com/reactphp/http/commit/663c9a...
{'cwe_ids': ['CWE-20', 'CWE-565'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:48:53Z', 'nvd_published_at': '2022-09-06T19:15:00Z'}
1.4.0
GHSA-6263-x97c-c4gg
2022-11-01T13:25:08Z
2022-09-30T00:40:35Z
null
['CVE-2022-39249']
matrix-js-sdk subject to impersonated messages due to permissive key forwarding
## Impact An attacker cooperating with a malicious homeserver can construct messages appearing to have come from another person. Such messages will be marked with a grey shield on some platforms, but this may be missing in others. This attack is possible due to the matrix-js-sdk implementing a too permissive [key for...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'matrix-js-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.7.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-6263-x97c-c4gg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39249'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-spec-proposals/pull/3061'}, {'type': 'WEB', 'url': 'https://github....
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T00:40:35Z', 'nvd_published_at': '2022-09-28T20:15:00Z'}
1.4.0
GHSA-74w3-p89x-ffgh
2022-09-19T14:25:17Z
2022-09-16T21:03:19Z
2022-09-19T14:25:17Z
[]
ansi_term is Unmaintained
## Withdrawn Advisory This advisory has been withdrawn because it does not discuss a particular vulnerability in the code of `ansi_term`. ## Original Description The maintainer has adviced this crate is deprecated and will not receive any maintenance. The crate does not seem to have much dependencies and may or may n...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'ansi_term'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ogham/rust-ansi-term/issues/72'}, {'type': 'PACKAGE', 'url': 'https://github.com/ogham/rust-ansi-term/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2021-0139.html'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:03:19Z', 'nvd_published_at': None}
1.4.0
GHSA-xg8p-34w2-j49j
2022-09-16T17:41:33Z
2022-09-16T17:41:33Z
null
['CVE-2022-36086']
linked_list_allocator vulnerable to out-of-bound writes on `Heap` initialization and `Heap::extend`
## Impact _What kind of vulnerability is it? Who is impacted?_ This vulnerability impacts all the initialization functions on the `Heap` and `LockedHeap` types, including `Heap::new`, `Heap::init`, `Heap::init_from_slice`, and `LockedHeap::new`. It also affects multiple uses of the `Heap::extend` method. ### Initiali...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'linked_list_allocator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.10.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/rust-osdev/linked-list-allocator/security/advisories/GHSA-xg8p-34w2-j49j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36086'}, {'type': 'WEB', 'url': 'https://github.com/rust-osdev/linked-list-allocator/commit/013b0758643943e8df5b17bbb495460ff47e8...
{'cwe_ids': ['CWE-119', 'CWE-1284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:41:33Z', 'nvd_published_at': '2022-09-07T23:15:00Z'}
1.4.0
GHSA-pxrw-j2fv-hx3h
2022-09-19T19:42:12Z
2022-09-16T21:04:10Z
null
['CVE-2022-35937']
TensorFlow vulnerable to OOB read in `Gather_nd` in TF Lite
### Impact The [`GatherNd`](https://github.com/tensorflow/tensorflow/blob/f463040eb3997e42e60a2ffc6dc72de7ef11dbb4/tensorflow/lite/kernels/gather_nd.cc#L105-L111) function takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-pxrw-j2fv-hx3h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35937'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/595a65a3e224a0362d7e68c2213acfc2b499a196'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:04:10Z', 'nvd_published_at': '2022-09-16T20:15:00Z'}
1.4.0
GHSA-rc23-xxgq-x27g
2022-09-16T17:18:28Z
2022-09-16T17:18:28Z
null
[]
wee_alloc is Unmaintained
Two of the maintainers have indicated that the crate may not be maintained. The crate has open issues including memory leaks and may not be suitable for production use. It may be best to switch to the default Rust standard allocator on wasm32 targets. Last release seems to have been three years ago.
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'wee_alloc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rustwasm/wee_alloc/issues/107'}, {'type': 'PACKAGE', 'url': 'https://github.com/rustwasm/wee_alloc'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0054.html'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:18:28Z', 'nvd_published_at': None}
1.4.0
GHSA-wxx5-w9jc-48wx
2022-09-16T22:02:16Z
2022-09-13T00:00:39Z
null
['CVE-2022-37767']
Pebble Templates protection mechanism bypass can lead to arbitrary code execution
Pebble Templates 3.1.5 allows attackers to bypass a protection mechanism and implement arbitrary code execution with springbok.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.pebbletemplates:pebble'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37767'}, {'type': 'WEB', 'url': 'https://github.com/PebbleTemplates/pebble/issues/625#issuecomment-1282138635'}, {'type': 'WEB', 'url': 'https://github.com/Y4tacker/Web-Security/issues/3'}]
{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:27:25Z', 'nvd_published_at': '2022-09-12T14:15:00Z'}
1.4.0
GHSA-8r89-x93x-mjq2
2022-09-20T21:35:09Z
2022-09-17T00:00:36Z
null
['CVE-2022-37250']
Craft CMS Stored Cross-site Scripting in User Addresses Title
Craft CMS 4.2.0.1 suffers from Stored Cross Site Scripting (XSS) in `/admin/myaccount`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC1'}, {'fixed': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37250'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/cdc9cb66d0716c9552e4113c8e426fd1a31f9516'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/3.7.55.1...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:35:09Z', 'nvd_published_at': '2022-09-16T15:15:00Z'}
1.4.0
GHSA-c4r9-r8fh-9vj2
2022-09-15T03:27:43Z
2022-09-06T00:00:27Z
null
['CVE-2022-38749']
snakeYAML before 1.31 vulnerable to Denial of Service due to Out-of-bounds Write
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.yaml:snakeyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.31'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'be.cylab:snakeyaml'}, 'versions': ['1.25.1']}, {'package': {'ecosystem': 'Maven', 'name': 'com.alipay.sofa.acts:acts-comm...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38749'}, {'type': 'WEB', 'url': 'https://arxiv.org/pdf/2306.05534.pdf'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/issues/525/got-stackoverflowerror-fo...
{'cwe_ids': ['CWE-121', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:27:43Z', 'nvd_published_at': '2022-09-05T10:15:00Z'}
1.4.0
GHSA-5hc5-c3m9-8vcj
2022-12-06T13:41:51Z
2022-09-17T00:00:41Z
2022-12-06T13:41:51Z
['CVE-2022-40155']
Denial of Service via stack overflow
## Withdrawn This advisory has been withdrawn because it has been found to be a duplicate. Please see the issue [here](https://github.com/x-stream/xstream/issues/304#issuecomment-1293654236) for more information. ## Original Despcription Those using FasterXML/woodstox to serialise XML data may be vulnerable to Deni...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.woodstox:woodstox-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.woodstox:woodstox-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40155'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/woodstox/issues/157'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/woodstox/issues/160'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/issues/304'}, {'type': 'WEB...
{'cwe_ids': ['CWE-787'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T20:50:28Z', 'nvd_published_at': '2022-09-16T10:15:00Z'}
1.4.0
GHSA-5mqq-7g25-r4wx
2022-10-05T14:03:39Z
2022-09-30T00:00:43Z
null
['CVE-2022-40408']
FeehiCMS vulnerable to Cross-Site scripting via crafted payload
FeehiCMS versions 2.0.1.1 and prior contain a cross-site scripting (XSS) vulnerability via a crafted payload injected into the Comment box under the Single Page module. There are no patches and no known workarounds for this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/feehicms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.0.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40408'}, {'type': 'WEB', 'url': 'https://github.com/liufee/feehicms/issues/3'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/feehicms'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-01T15:53:32Z', 'nvd_published_at': '2022-09-29T14:15:00Z'}
1.4.0
GHSA-c429-5p7v-vgjp
2022-09-29T14:13:31Z
2022-09-25T00:00:27Z
null
['CVE-2020-36604']
hoek subject to prototype pollution via the clone function.
hoek versions prior to 8.5.1, and 9.x prior to 9.0.3 are vulnerable to prototype pollution in the clone function. If an object with the __proto__ key is passed to clone() the key is converted to a prototype. This issue has been patched in version 9.0.3, and backported to 8.5.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@hapi/hoek'}, 'ecosystem_specific': {'affected_functions': ['@hapi/hoek.clone']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.5.1'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@hapi/hoek'}, 'ecosystem_specific': {'affected_functions': ['@ha...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36604'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/hoek/issues/352'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/hoek/commit/4d0804bc6135ad72afdc5e1ec002b935b2f5216a'}, {'type': 'WEB', 'url': 'https://github.com/hapijs/hoek/commit/94...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-29T14:13:31Z', 'nvd_published_at': '2022-09-23T06:15:00Z'}
1.4.0
GHSA-m379-x4xc-38x9
2022-09-16T17:08:07Z
2022-09-09T00:00:56Z
null
['CVE-2022-3167']
rdiffweb vulnerable to Improper Restriction of Rendered UI Layers or Frames
rdiffweb prior to 2.4.1 is vulnerable to Improper Restriction of Rendered UI Layers or Frames. This allows attackers to perform clickjacking attacks that can trick victims into performing actions such as entering passwords, liking or deleting posts, and/or initiating an account deletion. This issue has been patched in ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3167'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/7294bb7466532762c93d711211e5958940c1b428'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab...
{'cwe_ids': ['CWE-1021'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:08:07Z', 'nvd_published_at': '2022-09-08T19:15:00Z'}
1.4.0
GHSA-fhvv-p968-6vvj
2022-09-22T17:28:56Z
2022-09-18T00:00:30Z
null
['CVE-2022-3173']
Snipe-IT vulnerable to Improper Authentication
Snipe-IT prior to 6.0.10 is vulnerable to Improper Authentication. A user without the `View and Modify License Files` permission may access files uploaded to licenses as long as they have the `View` permission for licenses.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3173'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/dcab1381e7ee0b7fd1df3a34750dbff4b79185b2'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6d8ffcc6-c6e3-4...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T18:19:21Z', 'nvd_published_at': '2022-09-17T07:15:00Z'}
1.4.0
GHSA-4rv7-wj6m-6c6r
2022-12-06T13:39:44Z
2022-09-17T00:00:41Z
2022-12-06T13:39:44Z
['CVE-2022-40156']
Denial of Service due to parser crash
## Withdrawn This advisory has been withdrawn because it has been found to be a duplicate. Please see the issue [here](https://github.com/x-stream/xstream/issues/304#issuecomment-1293654236) for more information. ## Original Despcription Those using FasterXML/woodstox to seralize XML data may be vulnerable to Denia...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.woodstox:woodstox-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.woodstox:woodstox-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40156'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/woodstox/issues/157'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/woodstox/issues/160'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/issues/304'}, {'type': 'WEB...
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:20:12Z', 'nvd_published_at': '2022-09-16T10:15:00Z'}
1.4.0
GHSA-q4q3-r45f-7gwg
2023-03-10T23:21:38Z
2022-09-01T00:00:26Z
null
['CVE-2022-37021']
Apache Geode vulnerable to Deserialization of Untrusted Data
Apache Geode versions up to 1.12.5, 1.13.4 and 1.14.0 are vulnerable to a deserialization of untrusted data flaw when using JMX over RMI on Java 8. Any user still on Java 8 who wishes to protect against deserialization attacks involving JMX or RMI should upgrade to Apache Geode 1.15 and Java 11. If upgrading to Java 11...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.16'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.0'}, {'fixed'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37021'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/qrvhmytsshsk5xcb68pwccw3y6m8o8nr'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-03-10T23:21:38Z', 'nvd_published_at': '2022-08-31T07:15:00Z'}
1.4.0
GHSA-2pvj-p485-cp3m
2022-09-30T04:33:00Z
2022-09-30T04:33:00Z
null
['CVE-2022-39246']
matrix-android-sdk2 vulnerable to impersonation via forwarded Megolm sessions
### Impact An attacker cooperating with a malicious homeserver can construct messages appearing to have come from another person. Such messages will be marked with a grey shield on some platforms, but this may be missing in others. This attack is possible due to the matrix-android-sdk2 implementing a too permissive [k...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.matrix.android:matrix-android-sdk2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.36'}}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-android-sdk2/security/advisories/GHSA-2pvj-p485-cp3m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39246'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-spec-proposals/pull/3061'}, {'type': 'WEB', 'url': 'https://g...
{'cwe_ids': ['CWE-287', 'CWE-322'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:33:00Z', 'nvd_published_at': '2022-09-28T20:15:00Z'}
1.4.0
GHSA-6w4q-23cf-j9jp
2022-09-21T18:32:01Z
2022-09-21T18:32:01Z
null
['CVE-2022-39225']
parse-server's session object properties can be updated by foreign user if object ID is known
### Impact A foreign user can write to the session object of another user if the session object ID is known. For example, a foreign user can assign the session object to their own user by writing to the `user` field and then read any custom fields of that session object. Note that assigning a session to a foreign use...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.15'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-6w4q-23cf-j9jp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39225'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/37fed3062ccc3ef1dfd49a9fc53318e72b3e4aff'}, {...
{'cwe_ids': ['CWE-276', 'CWE-669'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T18:32:01Z', 'nvd_published_at': '2022-09-23T07:15:00Z'}
1.4.0
GHSA-53jm-3hc9-fqqc
2022-09-23T20:57:47Z
2022-09-23T00:00:40Z
null
['CVE-2022-38648']
Apache Batik vulnerable to Server-Side Request Forgery
Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to fetch external resources. This issue affects Apache XML Graphics Batik 1.14.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38648'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/xmlgraphics-batik'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/BATIK-1333'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/gfsktxvj7jtwyovmhhbrw0bs13wfjd7b...
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:57:47Z', 'nvd_published_at': '2022-09-22T15:15:00Z'}
1.4.0
GHSA-hvw3-p9px-gpc9
2022-09-16T22:02:43Z
2022-09-12T00:00:33Z
null
['CVE-2022-25295']
Gophish before 0.12.0 vulnerable to Open Redirect
This affects the package github.com/gophish/gophish before 0.12.0. The Open Redirect vulnerability exists in the next query parameter. The application uses url.Parse(r.FormValue("next")) to extract path and eventually redirect user to a relative URL, but if next parameter starts with multiple backslashes like \\\\\\exa...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gophish/gophish'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25295'}, {'type': 'WEB', 'url': 'https://github.com/gophish/gophish/pull/2262'}, {'type': 'WEB', 'url': 'https://github.com/gophish/gophish/commit/2a452bda89ffdb85f929fa78290bce1f456881dc'}, {'type': 'PACKAGE', 'url': 'https://github.com/gophish/go...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:28:46Z', 'nvd_published_at': '2022-09-11T14:15:00Z'}
1.4.0
GHSA-xv7r-9vq4-9wrq
2022-09-20T20:14:03Z
2022-09-15T00:00:17Z
null
['CVE-2022-37724']
Project Wonder WebObjects vulnerable to Arbitrary HTTP Header Injection and Cross-site Scripting
Project Wonder WebObjects 1.0 through 7.3 is vulnerable to Arbitrary HTTP Header injection and URL- or Header-based XSS reflection in all web-server adaptor interfaces. A patch for this issue is available at commit number b0d2d74f13203268ea254b02552600850f28014b.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'wonder:wonder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'last_affected': '7.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37724'}, {'type': 'WEB', 'url': 'https://github.com/wocommunity/wonder/pull/992'}, {'type': 'WEB', 'url': 'https://github.com/wocommunity/wonder/commit/b0d2d74f13203268ea254b02552600850f28014b'}, {'type': 'PACKAGE', 'url': 'https://github.com/wocom...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:08:43Z', 'nvd_published_at': '2022-09-14T21:15:00Z'}
1.4.0
GHSA-v57h-6hmh-g2p4
2022-09-23T23:39:17Z
2022-09-23T22:07:10Z
null
['CVE-2022-39242']
Weight not properly refunded after EVM execution
### Impact Previously, the worst case weight was always accounted as the block weight for all cases. In case of large EVM gas refunds, this can lead to block spamming attacks -- the adversary can construct blocks with transactions that have large amount of refunds or unused gases with reverts, and as a result inflate ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'frontier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/security/advisories/GHSA-v57h-6hmh-g2p4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39242'}, {'type': 'WEB', 'url': 'https://github.com/paritytech/frontier/pull/851'}, {'type': 'PACKAGE', 'url': 'https://github.com/paritytech/...
{'cwe_ids': ['CWE-682'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T22:07:10Z', 'nvd_published_at': '2022-09-24T02:15:00Z'}
1.4.0
GHSA-7f3x-2wcx-hww8
2023-09-07T18:49:54Z
2022-09-16T00:00:31Z
null
['CVE-2022-37260']
steal vulnerable to Regular Expression Denial of Service via input variable
A Regular Expression Denial of Service (ReDoS) flaw was found in stealjs steal via the input variable in main.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'steal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37260'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/issues/1529'}, {'type': 'PACKAGE', 'url': 'https://github.com/stealjs/steal'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/...
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:07:36Z', 'nvd_published_at': '2022-09-15T19:15:00Z'}
1.4.0
GHSA-m392-235j-9r7r
2022-09-16T17:16:28Z
2022-09-16T17:16:28Z
null
['CVE-2022-36105']
TYPO3 CMS vulnerable to User Enumeration via Response Timing
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:F/RL:O/RC:C` (4.9) ### Problem It has been discovered that observing response time during user authentication (backend and frontend) can be used to distinguish between existing and non-existing user accounts. Extension authors of 3rd party TYPO3 ext...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.6.58'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.0.0'}, {'fixed': '8.7.48'}]}]},...
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-m392-235j-9r7r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36105'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/f0fc9c4cd7c38207c30dd158de53ee5d9d6f41a2'}, {'type': 'WEB', 'url': 'https://git...
{'cwe_ids': ['CWE-203'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:16:28Z', 'nvd_published_at': '2022-09-13T18:15:00Z'}
1.4.0
GHSA-9vxf-mcm6-5m42
2022-09-22T22:43:34Z
2022-09-22T00:00:21Z
null
['CVE-2022-3233']
rdiffweb CSRF could lead to disabling notifications in user profile
rdiffweb prior to 2.4.6 is vulnerable to Cross-Site Request Forgery (CSRF), which could lead to disabling notifications in a user's profile.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3233'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/18a5aabd48fa6d2d2771a25f95610c28a1a097ca'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5ec206e0-ec...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-22T22:43:34Z', 'nvd_published_at': '2022-09-21T20:15:00Z'}
1.4.0
GHSA-fm6m-fg23-67jq
2022-09-21T21:01:14Z
2022-09-14T00:00:41Z
null
['CVE-2021-36568']
Moodle Cross-site Scripting vulnerability
In certain Moodle products after creating a course, it is possible to add in a arbitrary "Topic" a resource, in this case a "Database" with the type "Text" where its values "Field name" and "Field description" are vulnerable to Cross Site Scripting Stored(XSS). This affects Moodle 3.11.x prior to 3.11.10, Moodle 3.10.4...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.9.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'last_affected': '3.1...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36568'}, {'type': 'WEB', 'url': 'https://blog.hackingforce.com.br/en/cve-2021-36568/'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2126857'}, {'type': 'PACKAGE', 'url': 'https://github.com/moodle/moodle'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:01:14Z', 'nvd_published_at': '2022-09-13T22:15:00Z'}
1.4.0
GHSA-7fqm-jm52-f9vc
2022-09-30T05:37:28Z
2022-09-29T00:00:19Z
null
['CVE-2022-3292']
rdiffweb vulnerable to Use of Cache Containing Sensitive Information
rdiffweb prior to version 2.4.9 is vulnerable to Use of Cache Containing Sensitive Information. Due to improper cache control, an attacker can view sensitive information even if they are not logged into an account. Version 2.4.9 contains a patch for this issue.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3292'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/2406780831618405a13113377a784f3102465f40'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e9309018-e9...
{'cwe_ids': ['CWE-524'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T05:37:28Z', 'nvd_published_at': '2022-09-28T21:15:00Z'}
1.4.0
GHSA-x92g-49gh-63qm
2023-08-03T16:41:39Z
2022-09-17T00:00:34Z
null
['CVE-2022-3225']
Budibase Improper Access Control vulnerability
Improper Access Control in GitHub repository budibase/budibase prior to 1.3.20.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@budibase/worker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.20'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@budibase/builder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.20'}]}]}, {'package': {'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3225'}, {'type': 'WEB', 'url': 'https://github.com/budibase/budibase/commit/d35864be0854216693a01307f81ffcabf6d549df'}, {'type': 'WEB', 'url': 'https://github.com/Budibase/budibase/releases/tag/v1.3.20'}, {'type': 'PACKAGE', 'url': 'https://github....
{'cwe_ids': ['CWE-284', 'CWE-913'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-08-03T16:41:39Z', 'nvd_published_at': '2022-09-16T17:15:00Z'}
1.4.0
GHSA-m6vp-8q9j-whx4
2022-09-19T19:40:44Z
2022-09-16T22:31:14Z
null
['CVE-2022-35983']
TensorFlow vulnerable to `CHECK` fail in `Save` and `SaveSlices`
### Impact If `Save` or `SaveSlices` is run over tensors of an unsupported `dtype`, it results in a `CHECK` fail that can be used to trigger a denial of service attack. ```python import tensorflow as tf filename = tf.constant("") tensor_names = tf.constant("") # Save data = tf.cast(tf.random.uniform(shape=[1], minval=-...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-m6vp-8q9j-whx4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35983'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/5dd7b86b84a864b834c6fa3d7f9f51c87efa99d4'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:31:14Z', 'nvd_published_at': '2022-09-16T22:15:00Z'}
1.4.0
GHSA-xvqg-mv25-rwvw
2022-10-07T16:25:29Z
2022-09-15T03:26:10Z
null
['CVE-2022-39203']
Parsing issue in matrix-org/node-irc leading to room takeovers
### Impact Attackers can specify a specific string of characters, which would confuse the bridge into combining an attacker-owned channel and an existing channel, allowing them to grant themselves permissions in the channel. ### Patched The vulnerability has been patched in matrix-appservice-irc 0.35.0. ### Workaro...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'matrix-appservice-irc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.35.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-xvqg-mv25-rwvw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39203'}, {'type': 'PACKAGE', 'url': 'https://github.com/matrix-org/matrix-appservice-irc'}, {'type': 'WEB', 'url': 'https://matri...
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:26:10Z', 'nvd_published_at': '2022-09-13T19:15:00Z'}
1.4.0
GHSA-hvv8-5v86-r45x
2022-09-29T14:36:38Z
2022-09-29T14:36:38Z
null
['CVE-2022-39236']
Improper beacon events in matrix-js-sdk can result in availability issues
### Impact Improperly formed beacon events (from [MSC3488](https://github.com/matrix-org/matrix-spec-proposals/pull/3488)) can disrupt or impede the matrix-js-sdk from functioning properly, potentially impacting the consumer's ability to process data safely. Note that the matrix-js-sdk can appear to be operating normal...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'matrix-js-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '17.1.0-rc.1'}, {'fixed': '19.7.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-hvv8-5v86-r45x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39236'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-spec-proposals/pull/3488'}, {'type': 'WEB', 'url': 'https://github....
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-29T14:36:38Z', 'nvd_published_at': '2022-09-28T17:15:00Z'}
1.4.0
GHSA-hhhw-99gj-p3c3
2022-09-16T21:17:07Z
2022-09-06T00:00:27Z
null
['CVE-2022-38750']
snakeYAML before 1.31 vulnerable to Denial of Service due to Out-of-bounds Write
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.yaml:snakeyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.31'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38750'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/issues/526/stackoverflow-oss-fuzz-47027'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-f...
{'cwe_ids': ['CWE-121', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:17:07Z', 'nvd_published_at': '2022-09-05T10:15:00Z'}
1.4.0
GHSA-74x9-fhc2-p79f
2022-12-06T00:41:57Z
2022-09-22T00:00:26Z
null
['CVE-2022-41254']
Missing permission checks in Jenkins CONS3RT Plugin allow capturing credentials
CONS3RT Plugin 1.0.0 and earlier does not perform permission checks in methods implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenki...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cons3rt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41254'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cons3rt-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2751'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T00:41:57Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-xpvp-h73c-m9rq
2022-12-05T23:20:13Z
2022-09-22T00:00:28Z
null
['CVE-2022-41224']
Jenkins vulnerable to stored cross site scripting in the I:helpIcon component
Jenkins 2.367 through 2.369 (both inclusive) does not escape tooltips of the `l:helpIcon` UI component used for some help icons on the Jenkins web UI, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control tooltips for this component. As of publication, the Jenkins secu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.main:jenkins-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.367'}, {'fixed': '2.370'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41224'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/jenkins'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2886'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:20:13Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-fqxc-pvf8-2w9v
2022-09-21T19:33:21Z
2022-09-16T22:09:36Z
null
['CVE-2022-36000']
TensorFlow vulnerable to null dereference on MLIR on empty function attributes
### Impact `Eig` can be fed an incorrect `Tout` input, resulting in a `CHECK` fail that can trigger a denial of service attack. ```python import tensorflow as tf import numpy as np arg_0=tf.constant(value=np.random.random(size=(2, 2)), shape=(2, 2), dtype=tf.float32) arg_1=tf.complex128 arg_2=True arg_3='' tf.raw_ops....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fqxc-pvf8-2w9v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36000'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/aed36912609fc07229b4d0a7b44f3f48efc00fd0'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:09:36Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-3f7h-mf4q-vrm4
2023-07-05T22:37:39Z
2022-09-17T00:00:41Z
null
['CVE-2022-40152']
Denial of Service due to parser crash
Those using FasterXML/woodstox to seralize XML data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. This vulnerability is only rele...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.woodstox:woodstox-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.woodstox:woodstox-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40152'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/woodstox/issues/157'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/woodstox/issues/160'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/issues/304'}, {'type': 'WEB...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:21:07Z', 'nvd_published_at': '2022-09-16T10:15:00Z'}
1.4.0
GHSA-937f-qh3w-6g87
2022-09-23T19:41:15Z
2022-09-22T00:00:31Z
null
['CVE-2022-2888']
OctoPrint vulnerable to Insufficient Session Expiration.
If an attacker comes into the possession of a victim's OctoPrint session cookie through whatever means, the attacker can use this cookie to authenticate as long as the victim's account exists. This issue is fixed in version 1.8.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'OctoPrint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2888'}, {'type': 'WEB', 'url': 'https://github.com/octoprint/octoprint/commit/40e6217ac1a85cc5ed592873ae49db01d3005da4'}, {'type': 'PACKAGE', 'url': 'https://github.com/octoprint/octoprint'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory...
{'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T19:41:15Z', 'nvd_published_at': '2022-09-21T12:15:00Z'}
1.4.0
GHSA-rh87-q4vg-m45j
2022-09-16T21:20:28Z
2022-09-16T21:20:28Z
null
['CVE-2022-36015']
TensorFlow vulnerable to integer overflow in math ops
### Impact When [`RangeSize`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/ops/math_ops.cc) receives values that do not fit into an `int64_t`, it crashes. ```cpp auto size = (std::is_integral<T>::value ? ((Eigen::numext::abs(limit - start) + Eigen::num...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-rh87-q4vg-m45j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36015'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/37e64539cd29fcfb814c4451152a60f5d107b0f0'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-190'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:20:28Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-fg25-gq9g-32mx
2022-09-23T18:10:51Z
2022-09-21T00:00:44Z
null
['CVE-2022-32167']
Cross site scripting in Cloudreve
Cloudreve versions v1.0.0 through v3.5.3 are vulnerable to Stored Cross-Site Scripting (XSS), via the file upload functionality. A low privileged user will be able to share a file with an admin user, which could lead to privilege escalation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/HFO4/cloudreve'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'last_affected': '2.0.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cloudreve/Cloudreve/v3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32167'}, {'type': 'WEB', 'url': 'https://github.com/cloudreve/Cloudreve/commit/4b85541d73949969f41ad46d1e00544c9f1a7538'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudreve/Cloudreve'}, {'type': 'WEB', 'url': 'https://github.com/cloudreve/Cl...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T18:10:51Z', 'nvd_published_at': '2022-09-20T15:15:00Z'}
1.4.0
GHSA-jr8j-2jhp-m67v
2022-09-16T17:17:56Z
2022-09-16T17:17:56Z
null
[]
nftables binding to an already bound chain
### Impact An issue was discovered in net/netfilter/nf_tables_api.c in the Linux kernel. A denial of service can occur upon binding to an already bound chain. Affected by this vulnerability is the function nft_verdict_init of the file net/netfilter/nf_tables_api.c. The manipulation with an unknown input leads to a den...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/siderolabs/talos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/siderolabs/talos/security/advisories/GHSA-jr8j-2jhp-m67v'}, {'type': 'PACKAGE', 'url': 'https://github.com/siderolabs/talos'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:17:56Z', 'nvd_published_at': None}
1.4.0
GHSA-88cv-mj24-8w3q
2022-09-21T17:00:12Z
2022-09-21T17:00:12Z
null
['CVE-2022-39224']
arr-pm vulnerable to arbitrary shell execution when extracting or listing files contained in a malicious rpm.
### Impact Arbitrary shell execution is possible when using RPM::File#files and RPM::File#extract if the RPM contains a malicious "payload compressor" field. This vulnerability impacts the `extract` and `files` methods of the `RPM::File` class in the affected versions of this library. ### Patches Version 0.0.12 is ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'arr-pm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.12'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jordansissel/ruby-arr-pm/security/advisories/GHSA-88cv-mj24-8w3q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39224'}, {'type': 'WEB', 'url': 'https://github.com/jordansissel/ruby-arr-pm/pull/14'}, {'type': 'WEB', 'url': 'https://github.com/jordan...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T17:00:12Z', 'nvd_published_at': '2022-09-21T23:15:00Z'}
1.4.0
GHSA-mrf6-4gw6-65v3
2022-09-23T13:32:15Z
2022-09-22T00:00:28Z
null
['CVE-2022-41242']
Jenkins extreme-feedback Plugin vulnerable to Missing Authorization
A missing permission check in Jenkins extreme-feedback Plugin 1.7 and earlier allows attackers with Overall/Read permission to discover information about job names attached to lamps, discover MAC and IP addresses of existing lamps, and rename lamps.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:extreme-feedback'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41242'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/extreme-feedback-plugin/'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2001'}]
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:32:15Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-g468-qj8g-vcjc
2022-09-16T21:22:51Z
2022-09-16T21:22:51Z
null
['CVE-2022-36016']
TensorFlow vulnerable to `CHECK`-fail in `tensorflow::full_type::SubstituteFromAttrs`
### Impact When [`tensorflow::full_type::SubstituteFromAttrs`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/ops/math_ops.cc) receives a `FullTypeDef& t` that is not exactly three args, it triggers a `CHECK`-fail instead of returning a status. ```cpp Status SubstituteForEach(AttrMap& attrs, FullT...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g468-qj8g-vcjc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36016'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/6104f0d4091c260ce9352f9155f7e9b725eab012'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:22:51Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-7qpm-vmwv-hq7h
2022-12-06T22:42:20Z
2022-09-22T00:00:28Z
null
['CVE-2022-41240']
Stored XSS vulnerability in Jenkins Walti plugin
Jenkins Walti Plugin 1.0.1 and earlier does not escape the information provided by the Walti API, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to provide malicious API responses from Walti.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:walti'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41240'}, {'type': 'WEB', 'url': 'https://github.com/jenkins-infra/update-center2/pull/644'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/walti-plugin'}, {'type': 'WEB', 'url': 'https://plugins.jenkins.io/walti/'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T22:42:20Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-m748-hjqg-rpp8
2022-09-27T05:43:47Z
2022-09-22T00:00:24Z
null
['CVE-2022-3250']
rdiffweb has insecure HTTP cookies
In rdiffweb prior to version 2.4.6, the `cookie` session_id does not have a secure attribute when the URL is invalid. Version 2.4.6 contains a fix for the issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3250'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/ac334dd27ceadac0661b1e2e059a8423433c3fee'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab...
{'cwe_ids': ['CWE-311', 'CWE-614'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-22T22:52:16Z', 'nvd_published_at': '2022-09-21T17:15:00Z'}
1.4.0
GHSA-48q3-5297-wmmx
2022-12-06T00:50:17Z
2022-09-22T00:00:26Z
null
['CVE-2022-41253']
CSRF vulnerability in Jenkins CONS3RT Plugin allow capturing credentials
CONS3RT Plugin 1.0.0 and earlier does not perform permission checks in methods implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenki...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:cons3rt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41253'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/cons3rt-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2751'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T00:50:17Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-9w7j-q3xw-p9vh
2022-09-28T14:12:31Z
2022-09-25T00:00:26Z
null
['CVE-2022-35253']
Hyperledger Fabric subject to Denial of Service via non-validated request
A vulnerability exists in Hyperledger Fabric < 2.4 could allow an attacker to construct a non-validated request that could cause a denial of service attack. The peer gateway service tries to extract channel and chaincode information from the signed proposal, but it doesn't check the proposal fields for validity. There...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hyperledger/fabric'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35253'}, {'type': 'WEB', 'url': 'https://github.com/hyperledger/fabric/pull/3572'}, {'type': 'WEB', 'url': 'https://github.com/hyperledger/fabric/pull/3576'}, {'type': 'WEB', 'url': 'https://github.com/hyperledger/fabric/pull/3577'}, {'type': 'PACK...
{'cwe_ids': ['CWE-20', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-28T14:12:31Z', 'nvd_published_at': '2022-09-23T14:15:00Z'}
1.4.0
GHSA-jv3g-j58f-9mq9
2022-09-16T17:44:42Z
2022-09-16T17:44:42Z
null
['CVE-2022-36083']
JOSE vulnerable to resource exhaustion via specifically crafted JWE
The PBKDF2-based JWE key management algorithms expect a JOSE Header Parameter named `p2c` ([PBES2 Count](https://www.rfc-editor.org/rfc/rfc7518.html#section-4.8.1.2)), which determines how many PBKDF2 iterations must be executed in order to derive a CEK wrapping key. The purpose of this parameter is to intentionally sl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'jose'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.28.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.28.1'}}, {'package': {'ecosystem': 'npm', 'name': 'jose-browser-runtime'}, 'ranges': [{'type': 'ECOSYSTEM', 'ev...
[{'type': 'WEB', 'url': 'https://github.com/panva/jose/security/advisories/GHSA-jv3g-j58f-9mq9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36083'}, {'type': 'WEB', 'url': 'https://github.com/panva/jose/commit/03d6d013bf6e070e85adfe5731f526978e3e8e4d'}, {'type': 'PACKAGE', 'url': 'https://g...
{'cwe_ids': ['CWE-400', 'CWE-834'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:44:42Z', 'nvd_published_at': '2022-09-07T22:15:00Z'}
1.4.0
GHSA-p2g7-xwvr-rrw3
2022-09-16T18:49:48Z
2022-09-16T18:49:48Z
null
['CVE-2022-36049']
Helm Controller denial of service
Helm controller is tightly integrated with the Helm SDK. [A vulnerability](https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh) found in the Helm SDK allows for specific data inputs to cause high memory consumption, which in some platforms could cause the controller to panic and stop processing reconci...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/fluxcd/helm-controller'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.4'}, {'fixed': '0.23.0'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/fluxcd/flux2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.17'}, {'fixed':...
[{'type': 'WEB', 'url': 'https://github.com/fluxcd/flux2/security/advisories/GHSA-p2g7-xwvr-rrw3'}, {'type': 'WEB', 'url': 'https://github.com/helm/helm/security/advisories/GHSA-7hfp-qfw3-5jxh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36049'}, {'type': 'WEB', 'url': 'https://bugs.chromiu...
{'cwe_ids': ['CWE-400', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:49:48Z', 'nvd_published_at': '2022-09-07T21:15:00Z'}
1.4.0
GHSA-72x9-48mc-phh6
2022-09-16T18:48:16Z
2022-09-01T00:00:26Z
null
['CVE-2022-37023']
Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data
Apache Geode versions prior to 1.15.0 are vulnerable to a deserialization of untrusted data flaw when using REST API on Java 8 or Java 11. Any user wishing to protect against deserialization attacks involving REST APIs should upgrade to Apache Geode 1.15 and follow the documentation for details on enabling "validate-se...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.geode:geode-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37023'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/6js89pbqrp52zlpwgry5fsdn76gxbbfj'}]
{'cwe_ids': ['CWE-502'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:48:16Z', 'nvd_published_at': '2022-08-31T07:15:00Z'}
1.4.0
GHSA-f7fq-wp2x-jc25
2022-12-09T19:51:09Z
2022-09-22T00:00:28Z
null
['CVE-2022-41235']
Jenkins WildFly Deployer Plugin vulnerable to path traversal
Jenkins WildFly Deployer Plugin 1.0.2 and earlier implements functionality that allows agent processes to read arbitrary files on the Jenkins controller file system. This vulnerability is only exploitable in Jenkins 2.318 and earlier, LTS 2.303.2 and earlier. See the [LTS upgrade guide](https://www.jenkins.io/doc/upgr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:wildfly-deployer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41235'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/wildfly-deployer-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2645'}]
{'cwe_ids': ['CWE-22', 'CWE-693'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:28:20Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-jrqh-c9v8-ccx9
2022-12-06T14:28:30Z
2022-09-22T00:00:28Z
null
['CVE-2022-41231']
Path traversal in Jenkins build-publisher Plugin
Jenkins Build-Publisher Plugin 1.22 and earlier allows attackers with Item/Configure permission to create or replace any `config.xml` file on the Jenkins controller file system by providing a crafted file name to an API endpoint. Additionally, this endpoint does not require POST requests, resulting in a cross-site requ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:build-publisher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41231'}, {'type': 'WEB', 'url': 'https://github.com/jenkins-infra/update-center2/pull/644'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2139'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T14:28:30Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-qrqm-574x-q7f2
2022-09-29T19:06:17Z
2022-09-22T00:00:22Z
null
['CVE-2022-38073']
Awesome Support vulnerable to persistent cross-site scripting
Multiple Authenticated (custom specific plugin role) Persistent Cross-Site Scripting (XSS) vulnerability in Awesome Support plugin <= 6.0.7 at WordPress.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'awesome-support/awesome-support'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38073'}, {'type': 'WEB', 'url': 'https://github.com/Awesome-Support/Awesome-Support/commit/85f460be88b81fbdd9a990f474a1252297902faf'}, {'type': 'WEB', 'url': 'https://github.com/Awesome-Support/Awesome-Support/commit/b2e831d7f831a3869cfd83eb79a398a...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-29T19:06:17Z', 'nvd_published_at': '2022-09-21T20:15:00Z'}
1.4.0
GHSA-m4vx-ccrf-w399
2022-09-20T18:15:00Z
2022-09-14T00:00:43Z
null
['CVE-2022-3029']
NLnet Labs Routinator has Reachable Assertion vulnerability
In NLnet Labs Routinator 0.9.0 up to and including 0.11.2, due to a mistake in error handling, data in RRDP snapshot and delta files which are not correctly base 64 encoded are treated as a fatal error and causes Routinator to exit. Worst case impact of this vulnerability is denial of service for the RPKI data that Rou...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'routinator'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.9.0'}, {'fixed': '0.11.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3029'}, {'type': 'WEB', 'url': 'https://github.com/NLnetLabs/routinator/pull/781/commits/c2e2476f28f09ea5ffb22d172d84fb4f8384d496'}, {'type': 'PACKAGE', 'url': 'https://github.com/NLnetLabs/routinator'}, {'type': 'WEB', 'url': 'https://github.com/N...
{'cwe_ids': ['CWE-617'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T18:15:00Z', 'nvd_published_at': '2022-09-13T16:15:00Z'}
1.4.0
GHSA-3mq5-fq9h-gj7j
2023-03-03T23:04:23Z
2022-09-17T00:00:41Z
2023-03-03T23:04:23Z
[]
Duplicate Advisory: Denial of Service due to parser crash
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of [GHSA-f8cc-g7j8-xxpm](https://github.com/advisories/GHSA-f8cc-g7j8-xxpm). This link is maintained to preserve external references. ## Original Description Those using Xstream to seralize XML data may be vulnerable to Denial of Service ...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.19'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40151'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/issues/304'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/issues/314'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=47367'}, {'ty...
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:21:26Z', 'nvd_published_at': '2022-09-16T10:15:00Z'}
1.4.0
GHSA-gjmq-x5x7-wc36
2022-09-16T17:39:32Z
2022-09-16T17:39:32Z
null
['CVE-2022-36096']
XWiki Platform vulnerable to Cross-site Scripting in the deleted attachments list
### Impact It's possible to store a JavaScript which will be executed by anyone viewing the deleted attachments index with an attachment containing javascript in its name. For example, attachment a file with name `><img src=1 onerror=alert(1)>.jpg` will execute the alert. ### Patches This issue has been patched in ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-index-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2-milestone-1'}, {'fixed': '13.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-index-ui'}, 'ranges': [{'type': 'ECOSYSTEM', '...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-gjmq-x5x7-wc36'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36096'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/6705b0cd0289d1c90ed354bd4ecc1508c4b25745'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:39:32Z', 'nvd_published_at': '2022-09-08T21:15:00Z'}
1.4.0
GHSA-34vw-m4rh-r36p
2022-09-16T17:17:37Z
2022-09-16T17:17:37Z
null
[]
Talos vulnerable dependency due to race condition in Linux kernel's IP framework XFRM
### Impact A race condition was found in the Linux kernel's IP framework for transforming packets (XFRM subsystem) when multiple calls to xfrm_probe_algs occurred simultaneously. This flaw could allow a local attacker to potentially trigger an out-of-bounds write or leak kernel heap memory by performing an out-of-bound...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/talos-systems/talos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/siderolabs/talos/security/advisories/GHSA-34vw-m4rh-r36p'}, {'type': 'PACKAGE', 'url': 'https://github.com/siderolabs/talos'}]
{'cwe_ids': ['CWE-362', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:17:37Z', 'nvd_published_at': None}
1.4.0
GHSA-jj62-mc3m-j769
2022-09-15T03:30:14Z
2022-09-07T00:01:50Z
null
['CVE-2020-21516']
FeehiCMS has an arbitrary file upload vulnerability
There is an arbitrary file upload vulnerability in FeehiCMS 2.0.8.1 at the head image upload, that allows attackers to execute relevant PHP code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-21516'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/issues/46'}, {'type': 'WEB', 'url': 'https://github.com/liufee/cms/commit/ecbfb0ca77874ead5b6e79b96a5e1f94e67475a9'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}, {'type...
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:30:14Z', 'nvd_published_at': '2022-09-06T19:15:00Z'}
1.4.0
GHSA-rc4r-wh2q-q6c4
2022-09-16T21:00:46Z
2022-09-16T21:00:46Z
null
['CVE-2022-36109']
Moby supplementary group permissions not set up properly, allowing attackers to bypass primary group restrictions
Moby is an open-source project created by Docker to enable software containerization. A bug was found in Moby (Docker Engine) where supplementary groups are not set up properly. If an attacker has direct access to a container and manipulates their supplementary group access, they may be able to use supplementary group ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/moby/moby'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '20.10.18'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/moby/moby/security/advisories/GHSA-rc4r-wh2q-q6c4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36109'}, {'type': 'WEB', 'url': 'https://github.com/moby/moby/commit/de7af816e76a7fd3fbf06bffa6832959289fba32'}, {'type': 'PACKAGE', 'url': 'https://git...
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:00:46Z', 'nvd_published_at': '2022-09-09T18:15:00Z'}
1.4.0
GHSA-qq29-5vjh-vxwr
2022-09-30T04:44:55Z
2022-09-27T00:00:22Z
null
['CVE-2022-3301']
rdiffweb vulnerable to Improper Cleanup on Thrown Exception
rdiffweb prior to version 2.4.8 is vulnerable to Improper Cleanup on Thrown Exception. This could allow an attacker to display a message of their choice onto a web page. Version 2.4.8 contains a fix for this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3301'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/5ac38b2a75becbab9f948bd5e37ecbcd9f0b362e'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab...
{'cwe_ids': ['CWE-460'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:44:55Z', 'nvd_published_at': '2022-09-26T11:15:00Z'}
1.4.0
GHSA-8gq9-2x98-w8hf
2023-04-27T15:52:04Z
2022-09-23T20:31:15Z
null
['CVE-2022-1941']
protobuf-cpp and protobuf-python have potential Denial of Service issue
### Summary A message parsing and memory management vulnerability in ProtocolBuffer’s C++ and Python implementations can trigger an out of memory (OOM) failure when processing a specially crafted message, which could lead to a denial of service (DoS) on services using the libraries. Reporter: [ClusterFuzz](https://go...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'protobuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.18.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'protobuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.19.0'}, {'fixed': '3.19.5'}]}]}, {'package': {'ecosystem'...
[{'type': 'WEB', 'url': 'https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-8gq9-2x98-w8hf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1941'}, {'type': 'WEB', 'url': 'https://cloud.google.com/support/bulletins#GCP-2022-019'}, {'type': 'PACKAGE', 'url': 'https://github.com...
{'cwe_ids': ['CWE-119', 'CWE-1286'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:31:15Z', 'nvd_published_at': '2022-09-22T15:15:00Z'}
1.4.0
GHSA-rhwx-hjx2-x4qr
2023-01-26T22:41:07Z
2022-09-10T00:00:32Z
null
['CVE-2022-25765']
PDFKit vulnerable to Command Injection
The package pdfkit is vulnerable to Command Injection where the URL is not properly sanitized. Note: This issue was patched in 0.8.7.2, but the patch was discovered to be ineffective. The updated patch version is 0.8.7.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'pdfkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25765'}, {'type': 'WEB', 'url': 'https://github.com/pdfkit/pdfkit/issues/517'}, {'type': 'WEB', 'url': 'https://github.com/pdfkit/pdfkit/pull/519'}, {'type': 'PACKAGE', 'url': 'https://github.com/pdfkit/pdfkit'}, {'type': 'WEB', 'url': 'https://git...
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:30:40Z', 'nvd_published_at': '2022-09-09T05:15:00Z'}
1.4.0
GHSA-pxp5-g66h-wpv2
2022-12-06T19:54:53Z
2022-09-22T00:00:29Z
null
['CVE-2022-41244']
Missing hostname validation in Jenkins View26 Test-Reporting Plugin
Jenkins View26 Test-Reporting Plugin 1.0.7 and earlier does not perform hostname validation when connecting to the configured View26 server that could be abused using a man-in-the-middle attack to intercept these connections.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:view26'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41244'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/view26-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2069'}]
{'cwe_ids': ['CWE-297'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:30:36Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-4r4f-jrvw-h727
2023-07-07T19:01:25Z
2022-09-15T00:00:19Z
null
['CVE-2022-38796']
Feehi CMS host header injection vulnerability
A Host Header Injection vulnerability in Feehi CMS 2.1.1 may allow an attacker to spoof a particular header. This can be exploited by abusing password reset emails.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'feehi/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38796'}, {'type': 'PACKAGE', 'url': 'https://github.com/liufee/cms'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=k8dp0FJnSsI'}]
{'cwe_ids': ['CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:07:41Z', 'nvd_published_at': '2022-09-14T15:15:00Z'}
1.4.0
GHSA-q2c3-jpmc-gfjx
2022-09-19T19:29:32Z
2022-09-16T22:17:17Z
null
['CVE-2022-35969']
TensorFlow vulnerable to `CHECK` fail in `Conv2DBackpropInput`
### Impact The implementation of `Conv2DBackpropInput` requires `input_sizes` to be 4-dimensional. Otherwise, it gives a `CHECK` failure which can be used to trigger a denial of service attack: ```python import tensorflow as tf strides = [1, 1, 1, 1] padding = "SAME" use_cudnn_on_gpu = True explicit_paddings = [] data...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-q2c3-jpmc-gfjx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35969'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/50156d547b9a1da0144d7babe665cf690305b33c'}, {'type': 'PACKA...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:17:17Z', 'nvd_published_at': '2022-09-16T21:15:00Z'}
1.4.0
GHSA-599v-w48h-rjrm
2022-09-16T17:39:46Z
2022-09-16T17:39:46Z
null
['CVE-2022-36091']
XWiki Platform Web Templates vulnerable to Missing Authorization, Exposure of Private Personal Information to Unauthorized Actor
### Impact Through the suggestion feature, string and list properties of objects the user shouldn't have access to can be accessed. This includes private personal information like email addresses and salted password hashes of registered users but also other information stored in properties of objects. Sensitive configu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3'}, {'fixed': '13.10.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-599v-w48h-rjrm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36091'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xwiki-platform'}, {'type': 'WEB', 'url': 'https://jira.xwiki.org/browse/XWIKI-1...
{'cwe_ids': ['CWE-359', 'CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:39:46Z', 'nvd_published_at': '2022-09-08T16:15:00Z'}
1.4.0
GHSA-vxv8-r8q2-63xw
2022-09-19T19:33:04Z
2022-09-16T22:26:57Z
null
['CVE-2022-35981']
TensorFlow vulnerable to `CHECK` fail in `FractionalMaxPoolGrad`
### Impact `FractionalMaxPoolGrad` validates its inputs with `CHECK` failures instead of with returning errors. If it gets incorrectly sized inputs, the `CHECK` failure can be used to trigger a denial of service attack: ```python import tensorflow as tf overlapping = True orig_input = tf.constant(.453409232, shape=[1,...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vxv8-r8q2-63xw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35981'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/8741e57d163a079db05a7107a7609af70931def4'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:26:57Z', 'nvd_published_at': '2022-09-16T22:15:00Z'}
1.4.0
GHSA-xhw9-4wqq-x67v
2022-09-30T01:29:25Z
2022-09-27T00:00:16Z
null
['CVE-2022-3298']
rdiffweb vulnerable to potential DoS via memory consumption
rdiffweb prior to 2.4.8 is vulnerable to a potential Dos attack via an unlimited length "title" field when adding an SSH key. This can result in excess memory consumption, leading to a Denial of Service (DoS). This issue is patched in version 2.4.8. There are no known workarounds.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3298'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/626cca1b75b6c587afd4241a9692e8929b1921a5'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab...
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T01:29:25Z', 'nvd_published_at': '2022-09-26T22:15:00Z'}
1.4.0
GHSA-pwq7-f7f9-cm2j
2022-10-04T15:28:51Z
2022-09-30T00:00:34Z
null
['CVE-2022-40931']
Dutchoders transfer.sh contains an XSS vulnerability via malicious file upload
dutchcoders Transfer.sh versions 1.4.0 and prior are vulnerable to Cross Site Scripting (XSS) via a malicious document uploaded in transfer.sh. There is a fix commit merged into [main](https://github.com/dutchcoders/transfer.sh/commit/31ad4e01e158497519f8680c187e1ceb8594c59d) for this issue, but an updated version has...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/dutchcoders/transfer.sh'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40931'}, {'type': 'WEB', 'url': 'https://github.com/dutchcoders/transfer.sh/issues/500'}, {'type': 'WEB', 'url': 'https://github.com/dutchcoders/transfer.sh/pull/501'}, {'type': 'PACKAGE', 'url': 'https://github.com/dutchcoders/transfer.sh'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-01T01:01:50Z', 'nvd_published_at': '2022-09-29T16:15:00Z'}
1.4.0
GHSA-3cvm-7wrh-qrf9
2022-09-23T13:53:34Z
2022-09-17T00:00:30Z
null
['CVE-2022-37247']
Craft CMS vulnerable to stored Cross-site Scripting via /admin/settings/fields page
Craft CMS 4.2.0.1 is vulnerable to stored a cross-site scripting (XSS) via /admin/settings/fields page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC1'}, {'fixed': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37247'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/cedeba0609e4b173cd584dae7f33c5f713f19627'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/3.7.55.2...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:53:34Z', 'nvd_published_at': '2022-09-16T22:15:00Z'}