schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-2gg5-7c4v-6xx2 | 2022-09-19T20:19:08Z | 2022-09-15T00:00:19Z | 2022-09-16T20:59:09Z | [] | Duplicate of GHSA-m77f-652q-wwp4 | ## Duplicate advisory
This advisory is a duplicate of [GHSA-m77f-652q-wwp4](https://github.com/advisories/GHSA-m77f-652q-wwp4). This link is maintained to preserve external references.
## Original Description
<bytes::Bytes as axum_core::extract::FromRequest>::from_request would not, by default, set a limit for the siz... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'axum-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.8'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'axum-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0-rc.1'}, {'fixed': '0.3.0-rc.2'}]}], 'versi... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3212'}, {'type': 'WEB', 'url': 'https://research.jfrog.com/vulnerabilities/axum-core-dos/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0055.html'}] | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T20:59:09Z', 'nvd_published_at': '2022-09-14T16:15:00Z'} |
1.4.0 | GHSA-mw37-wx8p-gp45 | 2022-09-26T19:38:08Z | 2022-09-17T00:00:30Z | null | ['CVE-2022-37251'] | Craft CMS vulnerable to Cross-site Scripting via entry revisions and drafts | Craft CMS `3.70-RC1`–`3.7.55.1` and `4.0.0-RC1`–`4.2.0.1` are vulnerable to Cross Site Scripting (XSS) via entry revisions and drafts. Versions `3.7.55.2` and `4.2.1` contain patches for this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0-beta.1'}, {'fixed': '3.7.55.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC1'}, {'fixed': '4.2.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37251'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/7139213dbd9e177a3528aac8e2db8de91830f118'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/919c9074ff8596bf30a629b0888c529793e9a903'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T17:14:36Z', 'nvd_published_at': '2022-09-16T22:15:00Z'} |
1.4.0 | GHSA-98wm-3w3q-mw94 | 2022-09-16T17:45:10Z | 2022-09-06T00:00:27Z | null | ['CVE-2022-38751'] | snakeYAML before 1.31 vulnerable to Denial of Service due to Out-of-bounds Write | Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.yaml:snakeyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.31'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38751'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/issues/530/stackoverflow-oss-fuzz-47039'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/s... | {'cwe_ids': ['CWE-121', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:45:10Z', 'nvd_published_at': '2022-09-05T10:15:00Z'} |
1.4.0 | GHSA-r9x7-2xmr-v8fw | 2022-11-23T00:54:29Z | 2022-09-16T17:45:28Z | null | ['CVE-2022-36082'] | mangadex-downloader vulnerable to unauthorized file reading | ### Impact
When using `file:<location>` command and `<location>` is web URL location (http, https). mangadex-downloader will try to open and read a file in local disk if the content from online file is exist-as-a-file in victim computer
So far, the app only read the files and not execute it. But still, when someone r... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mangadex-downloader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.7.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mansuf/mangadex-downloader/security/advisories/GHSA-r9x7-2xmr-v8fw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36082'}, {'type': 'WEB', 'url': 'https://github.com/mansuf/mangadex-downloader/commit/439cc2825198ebc12b3310c95c39a8c7710c9b42'}, {'typ... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:45:28Z', 'nvd_published_at': '2022-09-07T22:15:00Z'} |
1.4.0 | GHSA-vwhq-pm3r-fjm9 | 2022-09-21T21:08:01Z | 2022-09-16T00:00:39Z | null | ['CVE-2022-37266'] | steal vulnerable to Prototype Pollution via key variable in babel.js | Prototype pollution vulnerability in function extend in babel.js in stealjs steal via the key variable in babel.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'steal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37266'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/issues/1535'}, {'type': 'PACKAGE', 'url': 'https://github.com/stealjs/steal'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:08:01Z', 'nvd_published_at': '2022-09-15T13:15:00Z'} |
1.4.0 | GHSA-v973-fxgf-6xhp | 2022-09-16T17:20:25Z | 2022-09-16T17:20:25Z | null | ['CVE-2022-40023'] | mako is vulnerable to Regular Expression Denial of Service | Sqlalchemy mako before 1.2.2 is vulnerable to Regular expression Denial of Service when using the Lexer class to parse. This also affects babelplugin and linguaplugin. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mako'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40023'}, {'type': 'WEB', 'url': 'https://github.com/sqlalchemy/mako/issues/366'}, {'type': 'WEB', 'url': 'https://github.com/sqlalchemy/mako/commit/925760291d6efec64fda6e9dd1fd9cfbd5be068c'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:20:25Z', 'nvd_published_at': '2022-09-07T13:15:00Z'} |
1.4.0 | GHSA-wf7g-7h6h-678v | 2022-09-23T16:32:32Z | 2022-09-23T16:32:32Z | null | ['CVE-2022-2668'] | Keycloak SAML javascript protocol mapper: Uploading of scripts through admin console | An issue was discovered in Keycloak allows arbitrary Javascript to be uploaded for the SAML protocol mapper even if the `UPLOAD_SCRIPTS` feature is disabled | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-wf7g-7h6h-678v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2668'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/e2ae7eef39b27e48ffa4764995d558555f02838c'}, {'type': 'WEB', 'url': '... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T16:32:32Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7jwg-hq85-c6m6 | 2022-12-06T19:50:46Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41243'] | Jenkins SmallTest Plugin missing hostname validation | Jenkins SmallTest Plugin 1.0.4 and earlier does not perform hostname validation when connecting to the configured View26 server that could be abused using a man-in-the-middle attack to intercept these connections. There is currently no known workaround or fix for this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.smalltest:smalltest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41243'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/smalltest-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2068'}] | {'cwe_ids': ['CWE-297'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:31:37Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-v7vw-577f-vp8x | 2022-09-19T19:33:51Z | 2022-09-16T22:26:12Z | null | ['CVE-2022-35979'] | TensorFlow vulnerable to segfault in `QuantizedRelu` and `QuantizedRelu6` | ### Impact
If `QuantizedRelu` or `QuantizedRelu6` are given nonscalar inputs for `min_features` or `max_features`, it results in a segfault that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
out_type = tf.quint8
features = tf.constant(28, shape=[4,2], dtype=tf.quint8)
min_feature... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v7vw-577f-vp8x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35979'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/49b3824d83af706df0ad07e4e677d88659756d89'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:26:12Z', 'nvd_published_at': '2022-09-16T22:15:00Z'} |
1.4.0 | GHSA-5p8v-58qm-c7fp | 2022-09-21T21:33:22Z | 2022-09-21T21:33:22Z | null | ['CVE-2022-39227'] | python-jwt vulnerable to token forgery with new claims | ### Impact
An attacker who obtains a JWT can arbitrarily forge its contents without knowing the secret key. Depending on the application, this may for example enable the attacker to spoof other user's identities, hijack their sessions, or bypass authentication.
### Patches
Users should upgrade to version 3.3.4
Fixed b... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'python-jwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/davedoesdev/python-jwt/security/advisories/GHSA-5p8v-58qm-c7fp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39227'}, {'type': 'WEB', 'url': 'https://github.com/davedoesdev/python-jwt/commit/6c5075469847b9e8b6e5336077d989d77a4d2bf1'}, {'type': 'WEB... | {'cwe_ids': ['CWE-290'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:33:22Z', 'nvd_published_at': '2022-09-23T07:15:00Z'} |
1.4.0 | GHSA-ch4c-278q-5654 | 2022-09-16T21:35:08Z | 2022-09-14T00:00:51Z | null | ['CVE-2022-3175'] | rdiffweb 2.4.1 Missing Custom Error Page | rdiffweb version 2.4.1 is set to a default and leaks error information. Version 2.4.2 fixes this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.1'}, {'fixed': '2.4.2'}]}], 'versions': ['2.4.1']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3175'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/233befc33bdc45d4838c773d5aed4408720504c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/bl... | {'cwe_ids': ['CWE-755', 'CWE-756'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:23:16Z', 'nvd_published_at': '2022-09-13T10:15:00Z'} |
1.4.0 | GHSA-wxvf-839f-jqmh | 2022-09-20T21:32:03Z | 2022-09-17T00:00:36Z | null | ['CVE-2022-37248'] | Craft CMS Cross site Scripting vulnerability | Craft CMS 4.2.0.1 is vulnerable to Cross Site Scripting (XSS) via `src/helpers/Cp.php`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC1'}, {'fixed': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37248'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/cedeba0609e4b173cd584dae7f33c5f713f19627'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/3.7.55.1... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:32:03Z', 'nvd_published_at': '2022-09-16T16:15:00Z'} |
1.4.0 | GHSA-fv7x-v67w-cvqv | 2022-09-22T22:55:29Z | 2022-09-22T00:00:24Z | null | ['CVE-2022-31679'] | Spring Data REST can expose hidden entity attributes | Applications that allow HTTP PATCH access to resources exposed by Spring Data REST in versions 3.6.0 - 3.6.6, 3.7.0 - 3.7.2, and older unsupported versions, if an attacker knows about the structure of the underlying domain model, they can craft HTTP requests that expose hidden entity attributes. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-rest-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-rest-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'even... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31679'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-data-rest/commit/2ad081f75b4baabfbc139f0dc2b75c54889b4053'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-data-rest/commit/bf37590b25a0c066f67547b39fb4d... | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-22T22:55:29Z', 'nvd_published_at': '2022-09-21T18:15:00Z'} |
1.4.0 | GHSA-v6h3-348g-6h5x | 2022-09-19T19:26:01Z | 2022-09-16T22:16:30Z | null | ['CVE-2022-35967'] | TensorFlow vulnerable to segfault in `QuantizedAdd` | ### Impact
If `QuantizedAdd` is given `min_input` or `max_input` tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
Toutput = tf.qint32
x = tf.constant(140, shape=[1], dtype=tf.quint8)
y = tf.constant(26, shape=[10], dtype=tf.qu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v6h3-348g-6h5x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35967'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/49b3824d83af706df0ad07e4e677d88659756d89'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:16:30Z', 'nvd_published_at': '2022-09-16T21:15:00Z'} |
1.4.0 | GHSA-5959-4x58-r8c2 | 2022-09-16T17:16:11Z | 2022-09-16T17:16:11Z | null | ['CVE-2022-36106'] | TYPO3 CMS missing check for expiration time of password reset token for backend users | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.0)
### Problem
It has been discovered that the expiration time of a password reset link for TYPO3 backend users has never been evaluated. As a result, a password reset link could be used to perform a password reset even if the default... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.4.0'}, {'fixed': '10.4.32'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.16'}]... | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-5959-4x58-r8c2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36106'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/00b52a443b21baaaab35f8606dbb0ce427261bb5'}, {'type': 'WEB', 'url': 'https://git... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:16:11Z', 'nvd_published_at': '2022-09-13T18:15:00Z'} |
1.4.0 | GHSA-f2j5-w76m-3rqh | 2022-12-05T22:10:11Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41225'] | Jenkins Anchore Container Image Scanner Plugin vulnerable to cross site scripting | Jenkins Anchore Container Image Scanner Plugin 1.0.24 and earlier does not escape content provided by the Anchore engine API, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control API responses by Anchore engine. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:anchore-container-scanner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.24'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41225'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/anchore-container-scanner-plugin/commit/1b1a62ab8ab86b409274e755860ab4e7fcc11800'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/anchore-container-scanner-plugin'}, {'type': ... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:27:10Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-mxf2-4r22-5hq9 | 2022-09-16T17:05:12Z | 2022-09-16T17:05:12Z | null | ['CVE-2022-36094'] | XWiki Platform Web Parent POM vulnerable to XSS in the attachment history | ### Impact
It's possible to store a JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name.
For example, attachment a file with name `><img src=1 onerror=alert(1)>.jpg` will execute the alert.
### Patches
This issue has been patched in XWiki 13.10.6 and 14... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '13.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mxf2-4r22-5hq9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36094'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/047ce9fa4a7c13f3883438aaf54fc50f287a7e8e'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:05:12Z', 'nvd_published_at': '2022-09-08T20:15:00Z'} |
1.4.0 | GHSA-25gv-wg6f-6frp | 2022-09-30T06:23:59Z | 2022-09-27T00:00:20Z | null | ['CVE-2022-40043'] | Centreon SQL Injection vulnerability via esc_name parameter | Centreon v20.10.18 was discovered to contain a SQL injection vulnerability via the `esc_name` (Escalation Name) parameter at `Configuration/Notifications/Escalations`. Versions 21.04.16, 21.10.8, and 22.04.2 contain patches. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.04.16'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '21.10.0'}, {'fixed': '21.10.8... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40043'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/commit/1a6ee0e9a003ac4f07dc8c370aec6e8911279358'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/commit/76fdfba312515656419a1311a83adfb11a73199f'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T06:23:59Z', 'nvd_published_at': '2022-09-26T16:15:00Z'} |
1.4.0 | GHSA-6hrg-qmvc-2xh8 | 2023-07-06T19:33:37Z | 2022-09-27T00:00:22Z | null | ['CVE-2022-21797'] | joblib vulnerable to arbitrary code execution | The package joblib from 0 and before 1.2.0 is vulnerable to Arbitrary Code Execution via the `pre_dispatch` flag in `Parallel()` class due to the `eval()` statement. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'joblib'}, 'ecosystem_specific': {'affected_functions': ['joblib._utils.eval_expr']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21797'}, {'type': 'WEB', 'url': 'https://github.com/joblib/joblib/issues/1128'}, {'type': 'WEB', 'url': 'https://github.com/joblib/joblib/pull/1321'}, {'type': 'WEB', 'url': 'https://github.com/joblib/joblib/pull/1327'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:44:04Z', 'nvd_published_at': '2022-09-26T05:15:00Z'} |
1.4.0 | GHSA-qjjj-7g7h-54v3 | 2022-09-16T21:28:29Z | 2022-09-16T00:00:39Z | null | ['CVE-2022-38352'] | ThinkPHP deserialization vulnerability | ThinkPHP v6.0.13 was discovered to contain a deserialization vulnerability via the component `League\Flysystem\Cached\Storage\Psr6Cache`. This vulnerability allows attackers to execute arbitrary code via a crafted payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38352'}, {'type': 'WEB', 'url': 'https://github.com/top-think/framework/issues/2749'}, {'type': 'PACKAGE', 'url': 'https://github.com/top-think/framework'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:28:29Z', 'nvd_published_at': '2022-09-15T02:15:00Z'} |
1.4.0 | GHSA-g7j7-h4q8-8w2f | 2022-09-23T18:11:28Z | 2022-09-23T18:11:28Z | null | ['CVE-2021-36782'] | Rancher API and cluster.management.cattle.io object vulnerable to plaintext storage and exposure of credentials | ### Impact
An issue was discovered in Rancher versions up to and including 2.5.15 and 2.6.6 where sensitive fields, like passwords, API keys and Rancher's service account token (used to provision clusters), were stored in plaintext directly on Kubernetes objects like `Clusters`, for example `cluster.management.cattle.i... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.16'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6... | [{'type': 'WEB', 'url': 'https://github.com/rancher/rancher/security/advisories/GHSA-g7j7-h4q8-8w2f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36782'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1193988'}, {'type': 'PACKAGE', 'url': 'https://github.com/rancher/ranch... | {'cwe_ids': ['CWE-312'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T18:11:28Z', 'nvd_published_at': '2022-09-07T09:15:00Z'} |
1.4.0 | GHSA-vq4h-xrwc-m639 | 2022-09-16T21:56:47Z | 2022-09-16T00:00:39Z | null | ['CVE-2022-3221'] | rdiffweb CSRF vulnerability in profile's SSH keys can lead to unauthorized access | rdiffweb prior to 2.4.3 is vulnerable to Cross-Site Request Forgery (CSRF). While adding SSH public keys to the profile, the server accepts the GET request, which results in adding an SSH public key to the profile and leads to unauthorized access to the system and backups. Version 2.4.3 contains a patch for this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3221'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/9125f5a2d918fed0f3fc1c86fa94cd1779ed9f73'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:56:47Z', 'nvd_published_at': '2022-09-15T09:15:00Z'} |
1.4.0 | GHSA-689c-r7h2-fv9v | 2022-09-19T19:35:12Z | 2022-09-16T22:22:27Z | null | ['CVE-2022-35973'] | TensorFlow vulnerable to segfault in `QuantizedMatMul` | ### Impact
If `QuantizedMatMul` is given nonscalar input for:
- `min_a`
- `max_a`
- `min_b`
- `max_b`
It gives a segfault that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
Toutput = tf.qint32
transpose_a = False
transpose_b = False
Tactivation = tf.quint8
a = tf.constant(7, ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-689c-r7h2-fv9v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35973'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/aca766ac7693bf29ed0df55ad6bfcc78f35e7f48'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:22:27Z', 'nvd_published_at': '2022-09-16T21:15:00Z'} |
1.4.0 | GHSA-3mg9-m3f6-v7fq | 2022-09-28T03:28:50Z | 2022-09-25T00:00:18Z | null | ['CVE-2022-24280'] | Proxy component of Apache Pulsar subject to abuse as Denial of Service endpoint | Improper Input Validation vulnerability in Proxy component of Apache Pulsar allows an attacker to make TCP/IP connection attempts that originate from the Pulsar Proxy's IP address. When the Apache Pulsar Proxy component is used, it is possible to attempt to open TCP/IP connections to any IP address and port that the Pu... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.3'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24280'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/pulsar'}, {'type': 'WEB', 'url': 'https://github.com/apache/pulsar/wiki/CVE-2022-24280'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ghs9jtjfbpy4c6xcftyvkl6swznlom1v'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-28T03:28:50Z', 'nvd_published_at': '2022-09-23T10:15:00Z'} |
1.4.0 | GHSA-g4h6-qp44-wqvx | 2022-09-20T21:19:52Z | 2022-09-20T21:19:52Z | null | ['CVE-2022-31166'] | XWiki.WebHome vulnerable to Improper Privilege Management in XWiki resolving groups | ### Impact
It's possible to exploit a bug in XWikiRights resolution of groups to obtain privilege escalation.
More specifically, editing a right with the object editor leads to adding a supplementary empty value to groups which is then resolved as a reference to XWiki.WebHome page. Adding an XWikiGroup xobject to th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.3.7'}, {'fixed': '13.10.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g4h6-qp44-wqvx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31166'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/pull/1800'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xw... | {'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:19:52Z', 'nvd_published_at': '2022-09-07T14:15:00Z'} |
1.4.0 | GHSA-cf7g-cm7q-rq7f | 2022-09-23T17:07:44Z | 2022-09-20T21:22:55Z | null | ['CVE-2022-39220'] | SFTPGo WebClient vulnerable to Cross-site Scripting | ### Impact
Cross-site scripting (XSS) vulnerabilities have been reported to affect SFTPGo WebClient. If exploited, this vulnerability allows remote attackers to inject malicious code.
### Patches
Fixed in v2.3.5.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/drakkan/sftpgo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/drakkan/sftpgo/security/advisories/GHSA-cf7g-cm7q-rq7f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39220'}, {'type': 'WEB', 'url': 'https://github.com/drakkan/sftpgo/commit/cbef217cfa92478ee8e00ba1a5fb074f8a8aeee0'}, {'type': 'PACKAGE', 'url': 'h... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:22:55Z', 'nvd_published_at': '2022-09-20T22:15:00Z'} |
1.4.0 | GHSA-gfhp-jgp6-838j | 2022-11-01T12:56:34Z | 2022-09-30T04:54:06Z | null | ['CVE-2022-39256'] | Orckestra C1 CMS's deserialization of untrusted data allows for arbitrary code execution. | ### Impact
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Orckestra C1 CMS.
Authentication is required to exploit this vulnerability.
The authenticated user may perform the actions unknowingly by visiting a specially crafted site.
### Patches
Patched in C1 CMS v6.13... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'CompositeC1.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.13'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Orckestra/C1-CMS-Foundation/security/advisories/GHSA-gfhp-jgp6-838j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39256'}, {'type': 'WEB', 'url': 'https://github.com/Orckestra/C1-CMS-Foundation/pull/814'}, {'type': 'WEB', 'url': 'https://github.com... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:54:06Z', 'nvd_published_at': '2022-09-27T15:15:00Z'} |
1.4.0 | GHSA-fmq7-gh8v-mjvc | 2022-09-16T21:59:13Z | 2022-09-14T00:00:48Z | null | ['CVE-2022-1278'] | WildFly vulnerable to Insecure Default Initialization of Resource | A flaw was found in WildFly, where an attacker can see deployment names, endpoints, and any other data the trace payload may contain. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.bom:wildfly'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0.Beta1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1278'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2073401'}, {'type': 'PACKAGE', 'url': 'https://github.com/wildfly/boms'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/WFLY-16238'}] | {'cwe_ids': ['CWE-1188'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:23:37Z', 'nvd_published_at': '2022-09-13T14:15:00Z'} |
1.4.0 | GHSA-f4w6-h4f5-wx45 | 2022-09-19T19:50:23Z | 2022-09-16T20:56:02Z | null | ['CVE-2022-35934'] | TensorFlow vulnerable to `CHECK` failure in tf.reshape via overflows | ### Impact
The implementation of tf.reshape op in TensorFlow is vulnerable to a denial of service via CHECK-failure (assertion failure) caused by overflowing the number of elements in a tensor:
```python
import tensorflow as tf
tf.reshape(tensor=[[1]],shape=tf.constant([0 for i in range(255)], dtype=tf.int64))
```
Thi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f4w6-h4f5-wx45'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35934'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/61f0f9b94df8c0411f0ad0ecc2fec2d3f3c33555'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T20:56:02Z', 'nvd_published_at': '2022-09-16T20:15:00Z'} |
1.4.0 | GHSA-2jv3-v37p-65w3 | 2023-09-11T22:15:22Z | 2022-09-14T00:00:45Z | null | ['CVE-2022-40634'] | CrafterCMS Crafter Studio Improperly Controls Dynamically-Managed Code Resources | Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via FreeMarker SSTI. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.23'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40634'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2022051601'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftercms/studio'}] | {'cwe_ids': ['CWE-78', 'CWE-913'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T18:04:54Z', 'nvd_published_at': '2022-09-13T19:15:00Z'} |
1.4.0 | GHSA-v8gq-5grq-9728 | 2022-09-16T21:03:43Z | 2022-09-16T21:03:43Z | null | [] | mozjpeg DecompressScanlines::read_scanlines is Unsound | This issue and vector is similar to [RUSTSEC-2020-0029] of `rgb` crate which `mozjpeg` depends on.
Affected versions of `mozjpeg` crate allow creating instances of any type `T` from bytes,
and do not correctly constrain `T` to the types for which it is safe to do so.
Examples of safety violation possible for a type `... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'mozjpeg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.19'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ImageOptim/mozjpeg-rust/issues/10'}, {'type': 'PACKAGE', 'url': 'https://github.com/ImageOptim/mozjpeg-rust'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0165.html'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:03:43Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h4qg-p7r2-cpg3 | 2022-09-23T20:57:17Z | 2022-09-23T00:00:40Z | null | ['CVE-2022-40146'] | Apache Batik vulnerable to Server-Side Request Forgery | Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to access files using a Jar url. This issue affects Apache XML Graphics Batik 1.14. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40146'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/xmlgraphics-batik'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/BATIK-1335'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/hxtddqjty2sbs12y97c8g7xfh17jzxsx... | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:57:17Z', 'nvd_published_at': '2022-09-22T15:15:00Z'} |
1.4.0 | GHSA-q979-9m39-23mq | 2022-09-28T03:30:11Z | 2022-09-25T00:00:15Z | null | ['CVE-2022-23463'] | Nepxion Discovery vulnerable to SpEL Injection leading to Remote Code Execution | Nepxion Discovery is a solution for Spring Cloud. Discovery is vulnerable to SpEL Injection in discovery-commons. DiscoveryExpressionResolver’s eval method is evaluating expression with a StandardEvaluationContext, allowing the expression to reach and interact with Java classes such as java.lang.Runtime, leading to Rem... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.nepxion:discovery'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.16.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23463'}, {'type': 'PACKAGE', 'url': 'https://github.com/Nepxion/Discovery'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2022-033_GHSL-2022-034_Discovery/'}] | {'cwe_ids': ['CWE-917'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-28T03:30:11Z', 'nvd_published_at': '2022-09-24T05:15:00Z'} |
1.4.0 | GHSA-jvf3-mfxv-jcqr | 2022-09-30T00:09:24Z | 2022-09-25T00:00:27Z | null | ['CVE-2022-33682'] | Apache Pulsar Broker, Proxy, and WebSocket Proxy vulnerable to Improper Certificate Validation | TLS hostname verification cannot be enabled in the Pulsar Broker's Java Client, the Pulsar Broker's Java Admin Client, the Pulsar WebSocket Proxy's Java Client, and the Pulsar Proxy's Admin Client leaving intra-cluster connections and geo-replication connections vulnerable to man in the middle attacks, which could leak... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar-broker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33682'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/l0ynfl161qghwfcgbbl8ld9hzbl9t3yx'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T00:09:24Z', 'nvd_published_at': '2022-09-23T10:15:00Z'} |
1.4.0 | GHSA-5ff8-7639-6v6g | 2022-09-15T03:32:38Z | 2022-09-03T00:00:25Z | null | ['CVE-2022-38054'] | Apache Airflow Session Fixation vulnerability | In Apache Airflow versions 2.2.4 through 2.3.3, the `database` webserver session backend was susceptible to session fixation. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.4'}, {'fixed': '2.3.4rc1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38054'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5ff8-7639-6v6g'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2022-263.yaml'}, {'type': 'WEB', 'url': 'https://lists... | {'cwe_ids': ['CWE-384'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:32:38Z', 'nvd_published_at': '2022-09-02T07:15:00Z'} |
1.4.0 | GHSA-q9j5-2mjx-8x28 | 2022-12-09T20:14:11Z | 2022-09-22T00:00:26Z | null | ['CVE-2022-41250'] | Missing permission check in Jenkins SCM HttpClient Plugin allow capturing credentials | SCM HttpClient Plugin 1.5 and earlier does not perform permission check in a method implementing form validation.
This allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.meowlomo.jenkins:scm-httpclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41250'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/scm-httpclient-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2708'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T12:57:46Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-q9g4-9fx4-v533 | 2022-12-06T22:40:16Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41239'] | Stored XSS vulnerability in Jenkins DotCi Plugin | DotCi Plugin 2.40.00 and earlier does not escape the GitHub user name parameter provided to commit notifications when displaying them in a build cause.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to submit crafted commit notifications to the `/githook/` endpoint (see... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.groupon.jenkins-ci.plugins:DotCi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.40.00'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41239'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/DotCi'}, {'type': 'WEB', 'url': 'https://plugins.jenkins.io/DotCi/'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2884'}, {'type': 'WEB', 'u... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T22:40:16Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-74j6-3hh4-w3f5 | 2022-09-23T20:36:29Z | 2022-09-23T00:00:30Z | null | ['CVE-2022-3267'] | rdiffweb Cross-Site Request Forgery vulnerability | rdiffweb prior to 2.4.6 is vulnerable to cross-site request forgery on the repository settings. A malicious user can change the settings of a repository by sending a URL to the victim. This issue is fixed in version 2.4.6.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3267'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/20fc0d304412cc569b21f31e52cb8b94094d6314'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:36:29Z', 'nvd_published_at': '2022-09-22T10:15:00Z'} |
1.4.0 | GHSA-6h2x-4gjf-jc5w | 2022-09-21T21:42:05Z | 2022-09-21T21:42:05Z | null | [] | autogluon.multimodal vulnerable to unsafe YAML deserialization | ### Impact
A potential unsafe deserialization issue exists within the `autogluon.multimodal` module, where YAML files are loaded via `yaml.load()` instead of `yaml.safe_load()`. The deserialization of untrusted data may allow an unprivileged third party to cause remote code execution, denial of service, and impact to ... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'autogluon.multimodal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'autogluon.multimodal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.5.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/awslabs/autogluon/security/advisories/GHSA-6h2x-4gjf-jc5w'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/autogluon/pull/1987'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/autogluon/commit/23a37e74e58d03055c84a1b89c5af6c3db296b5e'}, {'type': 'PACKAGE', 'url': 'h... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:42:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-ffjm-4qwc-7cmf | 2022-09-19T19:56:51Z | 2022-09-16T21:04:23Z | null | ['CVE-2022-35939'] | TensorFlow vulnerable to OOB write in `scatter_nd` in TF Lite | ### Impact
The [`ScatterNd`](https://github.com/tensorflow/tensorflow/blob/266558ac4c1f361e9a178ee9d3f0ce2e648ae499/tensorflow/lite/kernels/internal/reference/reference_ops.h#L659-L698) function takes an input argument that determines the indices of of the output tensor. An input index greater than the output tensor or... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-ffjm-4qwc-7cmf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35939'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/b4d4b4cb019bd7240a52daa4ba61e3cc814f0384'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:04:23Z', 'nvd_published_at': '2022-09-16T20:15:00Z'} |
1.4.0 | GHSA-52xx-r3g2-p8jm | 2022-09-20T22:07:20Z | 2022-09-14T00:00:42Z | null | ['CVE-2022-38306'] | LIEF vulnerable to heap based buffer overflow | LIEF commit 5d1d643 was discovered to contain a heap-buffer overflow in the component `/core/CorePrPsInfo.tcc`. Commit 53bf680ef494a835e2c4a5de328ca85416a03a5a contains a patch. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'lief'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38306'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/issues/763'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/commit/53bf680ef494a835e2c4a5de328ca85416a03a5a'}, {'type': 'PACKAGE', 'url': 'https://github.com/lief-... | {'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T22:05:46Z', 'nvd_published_at': '2022-09-13T21:15:00Z'} |
1.4.0 | GHSA-634p-93h9-92vh | 2022-09-19T20:20:23Z | 2022-09-16T22:06:55Z | null | ['CVE-2022-39217'] | ghas-to-csv vulnerable to Improper Neutralization of Formula Elements in a CSV File | ### Impact
This GitHub Action creates a CSV file without sanitizing the output of the APIs. If an alert is dismissed or any other custom field contains executable code / formulas, it might be run when an endpoint opens that CSV file in a spreadsheet program. The data flow looks like this 👇🏻
```mermaid
graph TD
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'GitHub Actions', 'name': 'some-natalie/ghas-to-csv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/some-natalie/ghas-to-csv/security/advisories/GHSA-634p-93h9-92vh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39217'}, {'type': 'WEB', 'url': 'https://github.com/some-natalie/ghas-to-csv/issues/19'}, {'type': 'WEB', 'url': 'https://github.com/some... | {'cwe_ids': ['CWE-1236', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:06:55Z', 'nvd_published_at': '2022-09-17T00:15:00Z'} |
1.4.0 | GHSA-8c6p-v837-77f6 | 2023-04-03T19:09:32Z | 2022-09-16T19:38:12Z | null | ['CVE-2022-31669'] | Harbor fails to validate the user permissions when updating tag immutability policies | ### Impact
Harbor fails to validate the user permissions when updating tag immutability policies - API call:
PUT /projects/{project_name_or_id}/immutabletagrules/{immutable_rule_id}
By sending a request to update a tag immutability policy with an id that belongs to a
project that the currently authenticated user do... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.10.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.12'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges'... | [{'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories/GHSA-8c6p-v837-77f6'}, {'type': 'PACKAGE', 'url': 'https://github.com/goharbor/harbor'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:38:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-w45j-f5g5-w94x | 2022-09-15T03:33:49Z | 2022-09-09T00:00:57Z | null | ['CVE-2022-28220'] | Apache James vulnerable to buffering attack | Apache James prior to release 3.6.3 and 3.7.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. Fix of CVE-2021-38542, which solved similar problem fron Apache James 3.6.1, is subject to a parser differential and do not take into account concurrent requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28220'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/james-project'}, {'type': 'WEB', 'url': 'https://james.apache.org/james/update/2022/08/26/james-3.7.1.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/09/... | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:33:49Z', 'nvd_published_at': '2022-09-08T08:15:00Z'} |
1.4.0 | GHSA-grjp-4jmr-mjcw | 2022-09-30T04:42:55Z | 2022-09-27T00:00:22Z | null | ['CVE-2022-21169'] | express-xss-sanitizer vulnerable to Prototype Pollution via allowedTags attribute | The package express-xss-sanitizer before 1.1.3 is vulnerable to Prototype Pollution via the `allowedTags` attribute, allowing the attacker to bypass xss sanitization. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'express-xss-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21169'}, {'type': 'WEB', 'url': 'https://github.com/AhmedAdelFahim/express-xss-sanitizer/issues/4'}, {'type': 'WEB', 'url': 'https://github.com/AhmedAdelFahim/express-xss-sanitizer/commit/3bf8aaaf4dbb1c209dcb8d87a82711a54c1ab39a'}, {'type': 'PACKAG... | {'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:42:55Z', 'nvd_published_at': '2022-09-26T05:15:00Z'} |
1.4.0 | GHSA-4849-x3jx-45qr | 2022-09-19T20:25:02Z | 2022-09-16T00:00:39Z | null | ['CVE-2022-3211'] | Pimcore vulnerable to stored stored Cross-site Scripting via`properties` when creating new users | Pimcore prior to 10.5.6 is vulnerable to stored cross-site scripting. This occurs when an attacker injects a payload when adding properties for a new user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3211'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/13129'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/0508c491c6a4f3d119ec8dcf444e52ff25028c36'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pi... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:15:32Z', 'nvd_published_at': '2022-09-15T14:15:00Z'} |
1.4.0 | GHSA-6x28-7h8c-chx4 | 2022-09-30T04:31:01Z | 2022-09-26T00:00:23Z | null | ['CVE-2022-41343'] | Dompdf allows remote file inclusion because URI validation failure does not halt font registration | `registerFont` in `FontMetrics.php` in Dompdf before 2.0.1 allows remote file inclusion because a URI validation failure does not halt font registration, as demonstrated by a `@font-face` rule. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dompdf/dompdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41343'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/issues/2994'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/pull/2995'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/commit/66431c58017d5b1bdb9f6f772b9fbbc5e... | {'cwe_ids': ['CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:31:01Z', 'nvd_published_at': '2022-09-25T19:15:00Z'} |
1.4.0 | GHSA-56h3-78gp-v83r | 2022-10-18T17:26:21Z | 2022-09-17T00:00:41Z | null | ['CVE-2022-40149'] | Jettison parser crash by stackoverflow | Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.jettison:jettison'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40149'}, {'type': 'WEB', 'url': 'https://github.com/jettison-json/jettison/issues/45'}, {'type': 'WEB', 'url': 'https://github.com/jettison-json/jettison/pull/49/files'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id... | {'cwe_ids': ['CWE-121', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:22:04Z', 'nvd_published_at': '2022-09-16T10:15:00Z'} |
1.4.0 | GHSA-rp4v-hhm6-rcv9 | 2022-09-08T13:55:41Z | 2022-09-01T22:24:05Z | null | ['CVE-2022-31677'] | Pinniped Supervisor Insufficient Session Expiration vulnerability | ### Impact
A user authenticating to Kubernetes clusters via the Pinniped Supervisor could potentially use their access token to continue their session beyond what proper use of their refresh token might allow.
Access tokens issued by the Pinniped Supervisor have an intended expiration lifetime of approximately two mi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'go.pinniped.dev'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.19.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vmware-tanzu/pinniped/security/advisories/GHSA-rp4v-hhm6-rcv9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31677'}, {'type': 'WEB', 'url': 'https://github.com/vmware-tanzu/pinniped/pull/1264'}, {'type': 'PACKAGE', 'url': 'https://github.com/vmware... | {'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:24:05Z', 'nvd_published_at': '2022-08-29T15:15:00Z'} |
1.4.0 | GHSA-pqw5-jmp5-px4v | 2022-09-19T20:25:17Z | 2022-09-16T00:00:39Z | null | ['CVE-2022-3224'] | parse-url parses http URLs incorrectly, making it vulnerable to host name spoofing | parse-url prior to 8.1.0 is vulnerable to Misinterpretation of Input. parse-url parses certain http or https URLs incorrectly, identifying the URL's protocol as ssh. It may also parse the host name incorrectly. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3224'}, {'type': 'WEB', 'url': 'https://github.com/ionicabizau/parse-url/commit/9cacf38de02db0fb1358bd6ec04543e523cd6a8e'}, {'type': 'PACKAGE', 'url': 'https://github.com/ionicabizau/parse-url'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3... | {'cwe_ids': ['CWE-115'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:21:19Z', 'nvd_published_at': '2022-09-15T12:15:00Z'} |
1.4.0 | GHSA-8h89-34w2-jpfm | 2022-09-16T17:06:38Z | 2022-09-16T17:06:38Z | null | ['CVE-2022-36092'] | XWiki Platform Old Core vulnerable to Authentication Bypass Using the Login Action | ### Impact
All rights checks that would normally prevent a user from viewing a document on a wiki can be bypassed using the login action and directly specified templates. This exposes title, content and comments of any document and properties of objects (class and property name must be known, though). This is also expl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.10.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8h89-34w2-jpfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36092'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/71a6d0bb6f8ab718fcfaae0e9b8c16c2d69cd4bb'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:06:38Z', 'nvd_published_at': '2022-09-08T18:15:00Z'} |
1.4.0 | GHSA-jgc8-gvcx-9vfx | 2022-09-16T17:40:00Z | 2022-09-16T17:40:00Z | null | ['CVE-2022-36090'] | XWiki Platform Improper Authorization check for inactive users | ### Impact
Some resources are missing a check for inactive (not yet activated or disabled) users in XWiki, including the REST service: so a disabled user can enable themselves using a REST call. On the same way some resources handler created by extensions are not protected by default: so an inactive users could perfor... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1'}, {'fixed': '13.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'in... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jgc8-gvcx-9vfx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36090'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/e074d226d9b2b96a0a1ba4349d1b73a802842986'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:40:00Z', 'nvd_published_at': '2022-09-08T15:15:00Z'} |
1.4.0 | GHSA-r26c-679w-mrjm | 2022-09-19T19:03:43Z | 2022-09-16T21:28:06Z | null | ['CVE-2022-36005'] | TensorFlow vulnerable to `CHECK` fail in `FakeQuantWithMinMaxVarsGradient` | ### Impact
When `tf.quantization.fake_quant_with_min_max_vars_gradient` receives input `min` or `max` that is nonscalar, it gives a `CHECK` fail that can trigger a denial of service attack.
```python
import tensorflow as tf
import numpy as np
arg_0=tf.constant(value=np.random.random(size=(2, 2)), shape=(2, 2), dtype=t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r26c-679w-mrjm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36005'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f3cf67ac5705f4f04721d15e485e192bb319feed'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:28:06Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-m54f-rp6r-rrrm | 2022-09-30T06:23:00Z | 2022-09-29T00:00:22Z | null | ['CVE-2022-40929'] | XXL-JOB contains a Command execution vulnerability in background tasks | XXL-JOB versions 2.2.0 and prior contain a Command execution vulnerability in background tasks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-job-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40929'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-job/issues/2979'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-job'}] | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T06:23:00Z', 'nvd_published_at': '2022-09-28T18:15:00Z'} |
1.4.0 | GHSA-fv22-xp26-mm9w | 2022-12-06T13:40:35Z | 2022-09-17T00:00:41Z | 2022-12-06T13:40:35Z | ['CVE-2022-40153'] | Denial of Service due to parser crash | ## Withdrawn
This advisory has been withdrawn because it has been found to be a duplicate. Please see the issue [here](https://github.com/x-stream/xstream/issues/304#issuecomment-1293654236) for more information.
## Original Despcription
Those using FasterXML/woodstox to seralize XML data may be vulnerable to Denia... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.woodstox:woodstox-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.woodstox:woodstox-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40153'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/woodstox/issues/157'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/woodstox/issues/160'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/issues/304'}, {'type': 'WEB... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:20:01Z', 'nvd_published_at': '2022-09-16T10:15:00Z'} |
1.4.0 | GHSA-fph9-f5r6-vhqf | 2022-09-15T03:35:46Z | 2022-09-15T03:35:46Z | null | ['CVE-2022-25897'] | Eclipse Milo vulnerable to Resource Exhaustion (Denial of Service) | ### Impact
Denial of Service
### Details
OPC UA specification describes a concept named _Subscriptions_. _Subscriptions_ monitor a set of _Monitored Items_ for _Notifications_ and return them to the _Client_ in response to _Publish_ requests. The server notifies the client about changes only in case the value is cha... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.milo:sdk-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/eclipse/milo/security/advisories/GHSA-fph9-f5r6-vhqf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25897'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/milo/issues/1030'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/milo/pull/1031'}, ... | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:35:46Z', 'nvd_published_at': '2022-09-08T05:15:00Z'} |
1.4.0 | GHSA-r7vq-6425-j94w | 2022-09-15T03:35:12Z | 2022-09-15T03:35:12Z | null | [] | Python-TUF vulnerable to incorrect threshold signature computation for new root metadata | ### Impact
The function `_verify_root_self_signed()`, introduced in [v0.14.0](https://github.com/theupdateframework/tuf/releases/tag/v0.14.0), and which verifies self-signatures in a new root metadata file, counted multiple signatures by any new root key towards the new threshold. That is, any single new root key coul... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'tuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.16.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.15.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-pwqf-9h7j-7mv8'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-r7vq-6425-j94w'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/python-tuf/pull/1218'}, {... | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:35:12Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9942-r22v-78cp | 2022-09-19T19:39:32Z | 2022-09-16T22:29:52Z | null | ['CVE-2022-35985'] | TensorFlow vulnerable to `CHECK` fail in `LRNGrad` | ### Impact
If `LRNGrad` is given an `output_image` input tensor that is not 4-D, it results in a `CHECK` fail that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
depth_radius = 1
bias = 1.59018219
alpha = 0.117728651
beta = 0.404427052
input_grads = tf.random.uniform(shape=[4, 4, 4... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9942-r22v-78cp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35985'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/bd90b3efab4ec958b228cd7cfe9125be1c0cf255'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:29:52Z', 'nvd_published_at': '2022-09-16T22:15:00Z'} |
1.4.0 | GHSA-p2jg-q8hw-p7gc | 2022-09-15T03:22:08Z | 2022-09-07T00:01:53Z | null | ['CVE-2022-23451'] | Barbican authorization flaw before v14.0.0 | An authorization flaw was found in openstack-barbican. The default policy rules for the secret metadata API allowed any authenticated user to add, modify, or delete metadata from any secret regardless of ownership. This flaw allows an attacker on the network to modify or delete protected data, causing a denial of servi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'barbican'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23451'}, {'type': 'WEB', 'url': 'https://github.com/openstack/barbican/commit/7d270bacbe29a90a10f1855abc3b50dac0f08022'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2022:5114'}, {'type': 'WEB', 'url': 'https://access.redhat.com/e... | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:22:08Z', 'nvd_published_at': '2022-09-06T18:15:00Z'} |
1.4.0 | GHSA-3pgj-pg6c-r5p7 | 2023-02-06T20:32:38Z | 2022-09-16T21:02:52Z | null | ['CVE-2022-36087'] | OAuthLib vulnerable to DoS when attacker provides malicious IPV6 URI | ### Impact
- Attacker providing malicious redirect uri can cause DoS to oauthlib's web application.
- Attacker can also leverage usage of `uri_validate` functions depending where it is used.
_What kind of vulnerability is it? Who is impacted?_
Oauthlib applications using OAuth2.0 provider support or use directly `uri... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'oauthlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.1'}, {'fixed': '3.2.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/oauthlib/oauthlib/security/advisories/GHSA-3pgj-pg6c-r5p7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36087'}, {'type': 'WEB', 'url': 'https://github.com/oauthlib/oauthlib/commit/2e40b412c844ecc4673c3fa3f72181f228bdbacd'}, {'type': 'PACKAGE', 'ur... | {'cwe_ids': ['CWE-20', 'CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:02:52Z', 'nvd_published_at': '2022-09-09T21:15:00Z'} |
1.4.0 | GHSA-r8m2-4x37-6592 | 2022-09-15T03:25:36Z | 2022-09-15T03:25:36Z | null | ['CVE-2022-38013'] | .NET Denial of Service Vulnerability | Microsoft is releasing this security advisory to provide information about a vulnerability in .NET Core 3.1 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability.
A denial of service vulnerability exists in ASP.NET Core 3.1 and .NET 6.0 w... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.29'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': ... | [{'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-r8m2-4x37-6592'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38013'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/aspnetcore'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/li... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:25:36Z', 'nvd_published_at': '2022-09-13T19:15:00Z'} |
1.4.0 | GHSA-fhfc-2q7x-929f | 2022-09-19T19:13:10Z | 2022-09-16T22:11:58Z | null | ['CVE-2022-35994'] | TensorFlow vulnerable to `CHECK` fail in `CollectiveGather` | ### Impact
When `CollectiveGather` receives an scalar input `input`, it gives a `CHECK` fails that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
arg_0=1
arg_1=1
arg_2=1
arg_3=1
arg_4=(3, 3,3)
arg_5='auto'
arg_6=0
arg_7=''
tf.raw_ops.CollectiveGather(input=arg_0, group_size=arg_1, ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fhfc-2q7x-929f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35994'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c1f491817dec39a26be3c574e86a88c30f3c4770'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:11:58Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-qj9p-jvmw-82rh | 2022-09-29T14:37:12Z | 2022-09-25T00:00:26Z | null | ['CVE-2022-26112'] | Apache Pinot has Groovy Function support enabled by default | Pinot allows you to run any function using Apache Groovy scripts. In versions prior to 0.10.0, Pinot query endpoint and realtime ingestion layer has a vulnerability in unprotected environments due to groovy function support being enabled by default. This issue has been fixed by making function support disabled by defau... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pinot:pinot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26112'}, {'type': 'WEB', 'url': 'https://github.com/apache/pinot/pull/8711'}, {'type': 'WEB', 'url': 'https://docs.pinot.apache.org/basics/releases/0.11.0'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/pinot'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-29T14:37:12Z', 'nvd_published_at': '2022-09-23T08:15:00Z'} |
1.4.0 | GHSA-g6vm-3ch8-c6jq | 2022-09-15T03:32:13Z | 2022-09-06T00:00:27Z | null | ['CVE-2022-38369'] | Apache IoTDB Session Fixation vulnerability | Apache IoTDB version 0.13.0 is vulnerable to session id attack. Users should upgrade to version 0.13.1 which addresses this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.iotdb:iotdb-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-iotdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38369'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/iotdb'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/7nk03ywvx3t3yjbcxzt7zy4nyc89y9b0'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/09/05/1'}] | {'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:32:13Z', 'nvd_published_at': '2022-09-05T10:15:00Z'} |
1.4.0 | GHSA-cq7q-5c67-w39w | 2022-10-07T16:25:42Z | 2022-09-15T03:26:25Z | null | ['CVE-2022-39202'] | matrix-appservice-irc vulnerable to IRC mode parameter confusion | ### Impact
IRC allows you to specify multiple modes in a single mode command. Due to a bug in the underlying matrix-org/node-irc library, affected versions of matrix-appservice-irc perform parsing of such modes incorrectly, potentially resulting in the wrong user being given permissions.
Mode commands can only be exe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'matrix-appservice-irc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.35.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-cq7q-5c67-w39w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39202'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/commit/5f87dbed87b4b6dc49b7965ff152ee8535719... | {'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:26:25Z', 'nvd_published_at': '2022-09-13T18:15:00Z'} |
1.4.0 | GHSA-37jf-mjv6-xfqw | 2022-09-19T19:09:33Z | 2022-09-16T19:24:49Z | null | ['CVE-2022-35999'] | TensorFlow vulnerable to `CHECK` fail in `Conv2DBackpropInput` | ### Impact
When `Conv2DBackpropInput` receives empty `out_backprop` inputs (e.g. `[3, 1, 0, 1]`), the current CPU/GPU kernels `CHECK` fail (one with dnnl, the other with cudnn). This can be used to trigger a denial of service attack.
```python
import tensorflow as tf
import numpy as np
input_sizes = [3, 1, 1, 2]
filter... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-37jf-mjv6-xfqw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35999'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/27a65a43cf763897fecfa5cdb5cc653fc5dd0346'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:24:49Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-r6v9-p59m-gj2p | 2022-09-14T20:37:26Z | 2022-09-02T21:55:20Z | null | ['CVE-2022-31020'] | Indy's NODE_UPGRADE transaction vulnerable to remote code execution | ### Impact
The `pool-upgrade` request handler in Indy-Node `<=1.12.4` allows an improperly authenticated attacker to remotely execute code on nodes within the network.
Network operators are strongly encouraged to upgrade to the latest Indy-Node release `>=1.12.5` as soon as possible.
### Patches
The `pool-upgrade` ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'indy-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.5rc1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/hyperledger/indy-node/security/advisories/GHSA-r6v9-p59m-gj2p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31020'}, {'type': 'WEB', 'url': 'https://github.com/hyperledger/indy-node/commit/fe507474f77084faef4539101e2bbb4d508a97f5'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-02T21:55:20Z', 'nvd_published_at': '2022-09-06T17:15:00Z'} |
1.4.0 | GHSA-5w8r-8pgj-5jmf | 2022-11-01T13:24:57Z | 2022-09-30T22:46:50Z | null | ['CVE-2022-39250'] | matrix-js-sdk subject to user impersonation due to key/device identifier confusion in SAS verification | ## Impact
An attacker cooperating with a malicious homeserver could interfere with the verification flow between two users, injecting its own cross-signing user identity in place of one of the users’ identities, leading to the other device trusting/verifying the user identity under the control of the homeserver instea... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'matrix-js-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.7.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-5w8r-8pgj-5jmf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39250'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76'}, {'type': ... | {'cwe_ids': ['CWE-287', 'CWE-322'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T22:46:50Z', 'nvd_published_at': '2022-09-29T13:15:00Z'} |
1.4.0 | GHSA-36jr-mh4h-2g58 | 2022-09-29T14:12:55Z | 2022-09-29T14:12:55Z | null | [] | d3-color vulnerable to ReDoS | The d3-color module provides representations for various color spaces in the browser. Versions prior to 3.1.0 are vulnerable to a Regular expression Denial of Service. This issue has been patched in version 3.1.0. There are no known workarounds. | [] | [{'package': {'ecosystem': 'npm', 'name': 'd3-color'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/d3/d3-color/pull/100'}, {'type': 'PACKAGE', 'url': 'https://github.com/d3/d3-color'}, {'type': 'WEB', 'url': 'https://github.com/d3/d3-color/releases/tag/v3.1.0'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-D3COLOR-1076592'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-29T14:12:55Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j6x3-3jqq-m922 | 2022-09-20T17:41:27Z | 2022-09-14T00:00:45Z | null | ['CVE-2022-40635'] | CrafterCMS OS Command Injection vulnerability | Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via Groovy Sandbox Bypass. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:craftercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.23'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40635'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2022051602'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftercms/craftercms'}] | {'cwe_ids': ['CWE-78', 'CWE-913'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T17:41:27Z', 'nvd_published_at': '2022-09-13T19:15:00Z'} |
1.4.0 | GHSA-j43h-pgmg-5hjq | 2022-09-19T19:37:49Z | 2022-09-16T22:28:06Z | null | ['CVE-2022-35989'] | TensorFlow vulnerable to `CHECK` fail in `MaxPool` | ### Impact
When `MaxPool` receives a window size input array `ksize` with dimensions greater than its input tensor `input`, the GPU kernel gives a `CHECK` fail that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
import numpy as np
input = np.ones([1, 1, 1, 1])
ksize = [1, 1, 2, 2]... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j43h-pgmg-5hjq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35989'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/32d7bd3defd134f21a4e344c8dfd40099aaf6b18'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:28:06Z', 'nvd_published_at': '2022-09-16T22:15:00Z'} |
1.4.0 | GHSA-qc43-pgwq-3q2q | 2022-09-16T21:01:29Z | 2022-09-16T21:01:29Z | null | ['CVE-2022-36102'] | Shopware access control list bypassed via crafted specific URLs | ### Impact
If backend admin controllers are called with a certain notation, the ACL could be bypassed. Users could execute actions, which they are normally not able to do.
### Patches
We recommend updating to the current version 5.7.15. You can get the update to 5.7.15 regularly via the Auto-Updater or directly via th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.7.14'}}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-qc43-pgwq-3q2q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36102'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/de92d3a78279119a5bbe203054f8fa1d25126af6'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-281'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:01:29Z', 'nvd_published_at': '2022-09-12T20:15:00Z'} |
1.4.0 | GHSA-vm7x-4qhj-rrcq | 2022-09-19T19:55:20Z | 2022-09-16T22:15:05Z | null | ['CVE-2022-35991'] | TensorFlow vulnerable to `CHECK` fail in `TensorListScatter` and `TensorListScatterV2` | ### Impact
When `TensorListScatter` and `TensorListScatterV2` receive an `element_shape` of a rank greater than one, they give a `CHECK` fail that can trigger a denial of service attack.
```python
import tensorflow as tf
arg_0=tf.random.uniform(shape=(2, 2, 2), dtype=tf.float16, maxval=None)
arg_1=tf.random.uniform(sha... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vm7x-4qhj-rrcq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35991'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/bb03fdf4aae944ab2e4b35c7daa051068a8b7f61'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:15:05Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-4456-w38r-m53x | 2022-09-23T20:24:21Z | 2022-09-23T20:24:21Z | null | ['CVE-2022-36025'] | Besu VM vulnerable to gas allocation error in CALL operations | ### Impact
An error in 32 bit signed and unsigned types in the calculation of available gas in the CALL operations (including DELEGATECALL) results in incorrect gas being passed into called contracts and incorrect gas being returned after call execution. Where the amount of gas makes a difference in the success or fai... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.hyperledger.besu:evm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '22.4.0-RC1'}, {'fixed': '22.7.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/hyperledger/besu/security/advisories/GHSA-4456-w38r-m53x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36025'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyperledger/besu'}] | {'cwe_ids': ['CWE-196', 'CWE-681'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:24:21Z', 'nvd_published_at': '2022-09-24T02:15:00Z'} |
1.4.0 | GHSA-fv2m-9249-qx85 | 2022-09-16T17:14:27Z | 2022-09-16T17:14:27Z | null | ['CVE-2022-36108'] | TYPO3 CMS vulnerable to Cross-Site Scripting in <f:asset.css> view helper | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (4.1)
### Problem
It has been discovered that the `f:asset.css` view helper is vulnerable to cross-site scripting when user input is passed as variables to the CSS.
### Solution
Update to TYPO3 version 10.4.32 or 11.5.16 that fix the p... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.3.0'}, {'fixed': '10.4.32'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.16'}]... | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-fv2m-9249-qx85'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36108'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/6863f73818c36b0b88c677ba533765c8074907b4'}, {'type': 'WEB', 'url': 'https://git... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:14:27Z', 'nvd_published_at': '2022-09-13T18:15:00Z'} |
1.4.0 | GHSA-9v8w-xmr4-wgxp | 2022-09-19T19:53:42Z | 2022-09-16T22:14:20Z | null | ['CVE-2022-35992'] | TensorFlow vulnerable to `CHECK` fail in `TensorListFromTensor` | ### Impact
When `TensorListFromTensor` receives an `element_shape` of a rank greater than one, it gives a `CHECK` fail that can trigger a denial of service attack.
```python
import tensorflow as tf
arg_0=tf.random.uniform(shape=(6, 6, 2), dtype=tf.bfloat16, maxval=None)
arg_1=tf.random.uniform(shape=(6, 9, 1, 3), dtype... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9v8w-xmr4-wgxp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35992'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3db59a042a38f4338aa207922fa2f476e000a6ee'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:14:20Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-rgqx-226f-2xp4 | 2022-09-23T17:08:13Z | 2022-09-21T00:00:38Z | null | ['CVE-2022-37259'] | steal Inefficient Regular Expression Complexity vulnerability via string variable | A Regular Expression Denial of Service (ReDoS) flaw was found in stealjs steal 2.2.4 via the string variable in babel.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'steal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37259'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/issues/1528'}, {'type': 'PACKAGE', 'url': 'https://github.com/stealjs/steal'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:08:23Z', 'nvd_published_at': '2022-09-20T18:15:00Z'} |
1.4.0 | GHSA-x3jj-rgw9-7r5g | 2022-12-06T21:30:50Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41237'] | RCE vulnerability in Jenkins DotCi Plugin | DotCi Plugin 2.40.00 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types.
This results in a remote code execution (RCE) vulnerability exploitable by attackers able to modify `.ci.yml` files in SCM. This plugin has been suspended. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.groupon.jenkins-ci.plugins:DotCi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.40.00'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41237'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/DotCi'}, {'type': 'WEB', 'url': 'https://plugins.jenkins.io/DotCi/'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-1737'}, {'type': 'WEB', 'u... | {'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:30:50Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-5rc4-v5mj-g8c4 | 2022-10-04T21:42:30Z | 2022-09-29T00:00:27Z | null | ['CVE-2022-32169'] | Bytebase does not restrict low privilege user to access admin issues | The `Bytebase` application does not restrict low privilege user to access `admin issues` for which an unauthorized user can view the `OPEN` and `CLOSED` issues by `Admin` and the affected endpoint is `/issue`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/bytebase/bytebase'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'last_affected': '1.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32169'}, {'type': 'PACKAGE', 'url': 'https://github.com/bytebase/bytebase'}, {'type': 'WEB', 'url': 'https://github.com/bytebase/bytebase/blob/1.0.4/frontend/src/store/modules/issue.ts#L108-#L187'}, {'type': 'WEB', 'url': 'https://www.mend.io/vulne... | {'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:42:30Z', 'nvd_published_at': '2022-09-28T10:15:00Z'} |
1.4.0 | GHSA-52v4-wxrx-gjjm | 2022-09-23T13:22:26Z | 2022-09-22T00:00:26Z | null | ['CVE-2022-41251'] | Jenkins Apprenda Plugin has Missing Authorization vulnerability | A missing permission check in Jenkins Apprenda Plugin 2.2.0 and earlier allows users with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:apprenda'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41251'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/apprenda-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2710'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:22:26Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-crxj-hrmp-4rwf | 2022-09-30T06:31:20Z | 2022-09-29T00:00:26Z | null | ['CVE-2022-40083'] | Labstack Echo Open Redirect vulnerability | Labstack Echo v4.8.0 was discovered to contain an open redirect vulnerability via the Static Handler component. This vulnerability can be leveraged by attackers to cause a Server-Side Request Forgery (SSRF). Version 4.9.0 contains a patch for the issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/labstack/echo/v4'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40083'}, {'type': 'WEB', 'url': 'https://github.com/labstack/echo/issues/2259'}, {'type': 'WEB', 'url': 'https://github.com/labstack/echo/pull/2260'}, {'type': 'WEB', 'url': 'https://github.com/labstack/echo/pull/2260/commits/3154abd1401554fe4d1c09... | {'cwe_ids': ['CWE-601'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T06:31:20Z', 'nvd_published_at': '2022-09-28T14:15:00Z'} |
1.4.0 | GHSA-4phg-hpqm-c3j4 | 2022-10-03T19:45:15Z | 2022-09-28T00:00:17Z | null | ['CVE-2022-31367'] | Strapi mishandles hidden attributes within admin API responses | Strapi before 3.6.10 and 4.x before 4.1.10 mishandles hidden attributes within admin API responses. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.10'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@strapi/strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-next.0'}, {'fixed': '4.1.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31367'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/13185'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/13189'}, {'type': 'WEB', 'url': 'https://github.com/kos0ng/CVEs/tree/main/CVE-2022-31367'}, {'type': 'PACK... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T05:17:55Z', 'nvd_published_at': '2022-09-27T23:15:00Z'} |
1.4.0 | GHSA-9xgj-fcgf-x6mw | 2022-10-11T18:36:17Z | 2022-09-16T19:26:59Z | null | ['CVE-2022-36069'] | Poetry Argument Injection can lead to Local Code Execution | ### Observation
When handling dependencies that come from a Git repository instead of a registry, Poetry uses various commands, such as `git clone`. These commands are being constructed using user input (e.g. the repository URL). When building the commands, Poetry correctly avoids Command Injection vulnerabilities by ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'poetry'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/python-poetry/poetry/security/advisories/GHSA-9xgj-fcgf-x6mw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36069'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/poetry/PYSEC-2022-266.yaml'}, {'type': 'PACKAGE', ... | {'cwe_ids': ['CWE-88', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:26:59Z', 'nvd_published_at': '2022-09-07T19:15:00Z'} |
1.4.0 | GHSA-2mh7-qxcw-q39g | 2022-09-16T18:41:43Z | 2022-09-02T00:01:09Z | null | ['CVE-2022-3072'] | francoisjacquet/rosariosis vulnerable to Cross-Site Scripting (XSS) | Cross-site Scripting (XSS) - Stored in GitHub repository francoisjacquet/rosariosis prior to 8.9.3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.9.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3072'}, {'type': 'WEB', 'url': 'https://github.com/francoisjacquet/rosariosis/commit/dcd3b86156bf9e981944e1a9e01ea23d8ad7c83a'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/blob/mobile/CHANGES.md#changes-in-893'}, {'type':... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:41:43Z', 'nvd_published_at': '2022-09-01T08:15:00Z'} |
1.4.0 | GHSA-7hgc-php5-77qq | 2022-09-19T20:23:28Z | 2022-09-16T17:21:09Z | null | ['CVE-2022-36103'] | Talos worker join token can be used to get elevated access level to the Talos API | ### Impact
Talos worker nodes use a join token to get accepted into the Talos cluster. A misconfigured Kubernetes environment may allow workloads to access the join token of the worker node. A malicious workload could then use the join token to construct a Talos CSR (certificate signing request). Due to improper valid... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/talos-systems/talos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/siderolabs/talos/security/advisories/GHSA-7hgc-php5-77qq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36103'}, {'type': 'WEB', 'url': 'https://github.com/siderolabs/talos/commit/9eaf33f3f274e746ca1b442c0a1a0dae0cec088f'}, {'type': 'PACKAGE', 'url'... | {'cwe_ids': ['CWE-732', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:21:09Z', 'nvd_published_at': '2022-09-13T17:15:00Z'} |
1.4.0 | GHSA-jq8c-j47c-vvwm | 2022-09-27T22:14:56Z | 2022-09-23T00:00:46Z | null | ['CVE-2022-40705'] | Apache SOAP's RPCRouterServlet allows reading of arbitrary files over HTTP | An Improper Restriction of XML External Entity Reference vulnerability in RPCRouterServlet of Apache SOAP allows an attacker to read arbitrary files over HTTP. This issue affects Apache SOAP version 2.2 and later versions. It is unknown whether previous versions are also affected. NOTE: This vulnerability only affects ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'soap:soap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'last_affected': '2.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40705'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/02yo04w93rdjmllz4454lvodn5xzhwhl'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/09/22/1'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-27T22:14:56Z', 'nvd_published_at': '2022-09-22T09:15:00Z'} |
1.4.0 | GHSA-xwf3-6rgv-939r | 2022-09-01T22:15:35Z | 2022-09-01T22:15:35Z | null | ['CVE-2022-36035'] | Flux CLI Workload Injection | Flux CLI allows users to deploy Flux components into a Kubernetes cluster via command-line. The vulnerability allows other applications to replace the Flux deployment information with arbitrary content which is deployed into the target Kubernetes cluster instead.
The vulnerability is due to the improper handling of us... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/fluxcd/flux2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.21.0'}, {'fixed': '0.32.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/fluxcd/flux2/security/advisories/GHSA-xwf3-6rgv-939r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36035'}, {'type': 'PACKAGE', 'url': 'https://github.com/fluxcd/flux2'}, {'type': 'WEB', 'url': 'https://github.com/fluxcd/flux2/releases/tag/v0.32.0'... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:15:35Z', 'nvd_published_at': '2022-08-31T15:15:00Z'} |
1.4.0 | GHSA-mp5p-g2jv-r8qw | 2022-09-16T21:36:30Z | 2022-09-14T00:00:43Z | null | ['CVE-2022-3179'] | rdiffweb 2.4.1 contains Weak Password Requirements | rdiffweb version 2.4.1 has no password policy or password checking, which could make users vulnerable to brute force password guessing attacks. Version 2.4.2 enforces minimum and maximum password lengths. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.1'}, {'fixed': '2.4.2'}]}], 'versions': ['2.4.1']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3179'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/233befc33bdc45d4838c773d5aed4408720504c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab... | {'cwe_ids': ['CWE-521'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:24:48Z', 'nvd_published_at': '2022-09-13T17:15:00Z'} |
1.4.0 | GHSA-h5j3-5x63-p8jv | 2022-09-16T17:05:55Z | 2022-09-16T17:05:55Z | null | ['CVE-2022-36093'] | XWiki Platform Web Templates vulnerable to Unauthorized User Registration Through the Distribution Wizard | ### Impact
By passing a template of the distribution wizard to the xpart template, user accounts can be created even when user registration is disabled. This also circumvents any email verification. Before versions 14.2 and 13.10.4, this can also be exploited on a private wiki, thus potentially giving the attacker acce... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'in... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h5j3-5x63-p8jv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36093'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/70c64c23f4404f33289458df2a08f7c4be022755'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-287', 'CWE-288'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:05:55Z', 'nvd_published_at': '2022-09-08T18:15:00Z'} |
1.4.0 | GHSA-3jp6-q9cg-rvgj | 2022-12-06T14:26:48Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41230'] | Missing permission check in Jenkins build-publisher Plugin | Jenkins Build-Publisher Plugin 1.22 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain names and URLs of Jenkins servers that the plugin is configured to publish builds to, as well as builds pending for publication to those Jenkins servers. At ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:build-publisher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.22'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41230'}, {'type': 'WEB', 'url': 'https://github.com/jenkins-infra/update-center2/pull/644'}, {'type': 'WEB', 'url': 'https://plugins.jenkins.io/build-publisher/'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURIT... | {'cwe_ids': ['CWE-862', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T14:26:48Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-2p75-q37p-f852 | 2022-09-23T18:49:07Z | 2022-09-22T00:00:31Z | null | ['CVE-2022-3068'] | OctoPrint Improper Privilege Management vulnerability | OctoPrint prior to 1.8.3 allows a user with read access only to access a privileged user's account and functionality. Version 1.8.3 contains a patch for this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'OctoPrint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3068'}, {'type': 'WEB', 'url': 'https://github.com/octoprint/octoprint/commit/ef95ef1c101b79394f134e8fce000e6bae046571'}, {'type': 'PACKAGE', 'url': 'https://github.com/octoprint/octoprint'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory... | {'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T18:49:07Z', 'nvd_published_at': '2022-09-21T12:15:00Z'} |
1.4.0 | GHSA-9fpg-838v-wpv7 | 2022-09-19T19:36:24Z | 2022-09-16T22:20:09Z | null | ['CVE-2022-35971'] | TensorFlow vulnerable to `CHECK` fail in `FakeQuantWithMinMaxVars` | ### Impact
If `FakeQuantWithMinMaxVars` is given `min` or `max` tensors of a nonzero rank, it results in a `CHECK` fail that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
num_bits = 8
narrow_range = False
inputs = tf.constant(0, shape=[2,3], dtype=tf.float32)
min = tf.constant(0,... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9fpg-838v-wpv7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35971'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/785d67a78a1d533759fcd2f5e8d6ef778de849e0'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:20:09Z', 'nvd_published_at': '2022-09-16T21:15:00Z'} |
1.4.0 | GHSA-v5xg-3q2c-c2r4 | 2022-09-19T19:35:30Z | 2022-09-16T22:11:18Z | null | ['CVE-2022-35960'] | TensorFlow vulnerable to `CHECK` failure in `TensorListReserve` via missing validation | ### Impact
In [`core/kernels/list_kernels.cc's TensorListReserve`](https://github.com/tensorflow/tensorflow/blob/c8ba76d48567aed347508e0552a257641931024d/tensorflow/core/kernels/list_kernels.cc#L322-L325), `num_elements` is assumed to be a tensor of size 1. When a `num_elements` of more than 1 element is provided, then... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v5xg-3q2c-c2r4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35960'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/b5f6fbfba76576202b72119897561e3bd4f179c7'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:11:18Z', 'nvd_published_at': '2022-09-16T20:15:00Z'} |
1.4.0 | GHSA-vp68-2wrm-69qm | 2022-09-30T22:51:57Z | 2022-09-30T22:51:57Z | null | ['CVE-2022-39252'] | matrix-sdk-crypto contains potential impersonation via room key forward responses | ### Impact
When matrix-rust-sdk before 0.6 requests a room key from our devices, it correctly accepts key forwards only if they are a response to a previous request. However, it doesn't check that the device that responded matches the device the key was requested from.
This allows a malicious homeserver to insert roo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'matrix-sdk-crypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-rust-sdk/security/advisories/GHSA-vp68-2wrm-69qm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39252'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-rust-sdk/commit/093fb5d0aa21c0b5eaea6ec96b477f1075271cbb'}, {'typ... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T22:51:57Z', 'nvd_published_at': '2022-09-29T15:15:00Z'} |
1.4.0 | GHSA-8fg9-p83m-x5pq | 2022-10-06T17:10:50Z | 2022-09-27T15:28:00Z | null | ['CVE-2022-39280'] | ReDoS issue in dparse | ### Impact
dparse versions prior to 0.5.1 contain a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service).
All users parsing index server URLs with dparse are impacted by this vulnerability.
### Pat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'dparse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pyupio/dparse/security/advisories/GHSA-8fg9-p83m-x5pq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39280'}, {'type': 'WEB', 'url': 'https://github.com/pyupio/dparse/commit/8c990170bbd6c0cf212f1151e9025486556062d5'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-27T15:28:00Z', 'nvd_published_at': '2022-10-06T18:16:00Z'} |
1.4.0 | GHSA-79h2-q768-fpxr | 2022-09-19T19:00:53Z | 2022-09-16T21:06:31Z | null | ['CVE-2022-36027'] | TensorFlow segfault TFLite converter on per-channel quantized transposed convolutions | ### Impact
When converting transposed convolutions using per-channel weight quantization the converter segfaults and crashes the Python process.
```python
import tensorflow as tf
class QuantConv2DTransposed(tf.keras.layers.Layer):
def build(self, input_shape):
self.kernel = self.add_weight("kernel", [3, 3,... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-79h2-q768-fpxr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36027'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/53767'}, {'type': 'WEB', 'url': 'https://github.com/tensorf... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:06:31Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-wq6q-6m32-9rv9 | 2022-09-19T19:52:54Z | 2022-09-16T22:14:09Z | null | ['CVE-2022-35993'] | TensorFlow vulnerable to `CHECK` fail in `SetSize` | ### Impact
When `SetSize` receives an input `set_shape` that is not a 1D tensor, it gives a `CHECK` fails that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
arg_0=1
arg_1=[1,1]
arg_2=1
arg_3=True
arg_4=''
tf.raw_ops.SetSize(set_indices=arg_0, set_values=arg_1, set_shape=arg_2,
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wq6q-6m32-9rv9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35993'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/cf70b79d2662c0d3c6af74583641e345fc939467'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:14:09Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-jvhc-5hhr-w3v5 | 2022-09-19T19:06:13Z | 2022-09-16T21:19:48Z | null | ['CVE-2022-36012'] | TensorFlow vulnerable to assertion fail on MLIR empty edge names | ### Impact
When [`mlir::tfg::ConvertGenericFunctionToFunctionDef`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/ir/importexport/functiondef_import.cc) is given empty function attributes, it crashes.
```cpp
// We pre-allocate the array of operands and populate it using the
// `output_name_to_posi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jvhc-5hhr-w3v5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36012'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ad069af92392efee1418c48ff561fd3070a03d7b'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:19:48Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-42vg-2q93-fj6j | 2022-09-20T22:06:04Z | 2022-09-14T00:00:42Z | null | ['CVE-2022-38495'] | LIEF vulnerable to heap based buffer overflow via print_binary function | LIEF commit 365a16a was discovered to contain a heap-buffer overflow via the function `print_binary` at `/c/macho_reader.c`. Commit 0033b6312fd311b2e45e379c04a83d77c1e58578 contains a patch. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'lief'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38495'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/issues/767'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/commit/0033b6312fd311b2e45e379c04a83d77c1e58578'}, {'type': 'PACKAGE', 'url': 'https://github.com/lief-... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T22:06:04Z', 'nvd_published_at': '2022-09-13T21:15:00Z'} |
1.4.0 | GHSA-fvf5-xp83-vrqp | 2022-09-27T08:33:34Z | 2022-09-23T00:00:31Z | null | ['CVE-2022-34026'] | ICEcoder vulnerable to Path Traversal | ICEcoder v8.1 allows attackers to execute a directory traversal. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'icecoder/icecoder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '8.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34026'}, {'type': 'WEB', 'url': 'https://gist.github.com/enferas/85cdbadf5cba32ec7c8db6ea9e6833bf'}, {'type': 'PACKAGE', 'url': 'https://github.com/icecoder/ICEcoder'}, {'type': 'WEB', 'url': 'https://github.com/icecoder/ICEcoder/blob/master/classe... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:39:50Z', 'nvd_published_at': '2022-09-22T18:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.