schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-2gg5-7c4v-6xx2
2022-09-19T20:19:08Z
2022-09-15T00:00:19Z
2022-09-16T20:59:09Z
[]
Duplicate of GHSA-m77f-652q-wwp4
## Duplicate advisory This advisory is a duplicate of [GHSA-m77f-652q-wwp4](https://github.com/advisories/GHSA-m77f-652q-wwp4). This link is maintained to preserve external references. ## Original Description <bytes::Bytes as axum_core::extract::FromRequest>::from_request would not, by default, set a limit for the siz...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'axum-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.8'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'axum-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0-rc.1'}, {'fixed': '0.3.0-rc.2'}]}], 'versi...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3212'}, {'type': 'WEB', 'url': 'https://research.jfrog.com/vulnerabilities/axum-core-dos/'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0055.html'}]
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T20:59:09Z', 'nvd_published_at': '2022-09-14T16:15:00Z'}
1.4.0
GHSA-mw37-wx8p-gp45
2022-09-26T19:38:08Z
2022-09-17T00:00:30Z
null
['CVE-2022-37251']
Craft CMS vulnerable to Cross-site Scripting via entry revisions and drafts
Craft CMS `3.70-RC1`–`3.7.55.1` and `4.0.0-RC1`–`4.2.0.1` are vulnerable to Cross Site Scripting (XSS) via entry revisions and drafts. Versions `3.7.55.2` and `4.2.1` contain patches for this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0-beta.1'}, {'fixed': '3.7.55.2'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC1'}, {'fixed': '4.2....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37251'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/7139213dbd9e177a3528aac8e2db8de91830f118'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/919c9074ff8596bf30a629b0888c529793e9a903'}, {'type': 'WEB', 'url': 'h...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T17:14:36Z', 'nvd_published_at': '2022-09-16T22:15:00Z'}
1.4.0
GHSA-98wm-3w3q-mw94
2022-09-16T17:45:10Z
2022-09-06T00:00:27Z
null
['CVE-2022-38751']
snakeYAML before 1.31 vulnerable to Denial of Service due to Out-of-bounds Write
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.yaml:snakeyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.31'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38751'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/issues/530/stackoverflow-oss-fuzz-47039'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/s...
{'cwe_ids': ['CWE-121', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:45:10Z', 'nvd_published_at': '2022-09-05T10:15:00Z'}
1.4.0
GHSA-r9x7-2xmr-v8fw
2022-11-23T00:54:29Z
2022-09-16T17:45:28Z
null
['CVE-2022-36082']
mangadex-downloader vulnerable to unauthorized file reading
### Impact When using `file:<location>` command and `<location>` is web URL location (http, https). mangadex-downloader will try to open and read a file in local disk if the content from online file is exist-as-a-file in victim computer So far, the app only read the files and not execute it. But still, when someone r...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mangadex-downloader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '1.7.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mansuf/mangadex-downloader/security/advisories/GHSA-r9x7-2xmr-v8fw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36082'}, {'type': 'WEB', 'url': 'https://github.com/mansuf/mangadex-downloader/commit/439cc2825198ebc12b3310c95c39a8c7710c9b42'}, {'typ...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:45:28Z', 'nvd_published_at': '2022-09-07T22:15:00Z'}
1.4.0
GHSA-vwhq-pm3r-fjm9
2022-09-21T21:08:01Z
2022-09-16T00:00:39Z
null
['CVE-2022-37266']
steal vulnerable to Prototype Pollution via key variable in babel.js
Prototype pollution vulnerability in function extend in babel.js in stealjs steal via the key variable in babel.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'steal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37266'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/issues/1535'}, {'type': 'PACKAGE', 'url': 'https://github.com/stealjs/steal'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:08:01Z', 'nvd_published_at': '2022-09-15T13:15:00Z'}
1.4.0
GHSA-v973-fxgf-6xhp
2022-09-16T17:20:25Z
2022-09-16T17:20:25Z
null
['CVE-2022-40023']
mako is vulnerable to Regular Expression Denial of Service
Sqlalchemy mako before 1.2.2 is vulnerable to Regular expression Denial of Service when using the Lexer class to parse. This also affects babelplugin and linguaplugin.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mako'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40023'}, {'type': 'WEB', 'url': 'https://github.com/sqlalchemy/mako/issues/366'}, {'type': 'WEB', 'url': 'https://github.com/sqlalchemy/mako/commit/925760291d6efec64fda6e9dd1fd9cfbd5be068c'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory...
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:20:25Z', 'nvd_published_at': '2022-09-07T13:15:00Z'}
1.4.0
GHSA-wf7g-7h6h-678v
2022-09-23T16:32:32Z
2022-09-23T16:32:32Z
null
['CVE-2022-2668']
Keycloak SAML javascript protocol mapper: Uploading of scripts through admin console
An issue was discovered in Keycloak allows arbitrary Javascript to be uploaded for the SAML protocol mapper even if the `UPLOAD_SCRIPTS` feature is disabled
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-wf7g-7h6h-678v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2668'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/e2ae7eef39b27e48ffa4764995d558555f02838c'}, {'type': 'WEB', 'url': '...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T16:32:32Z', 'nvd_published_at': None}
1.4.0
GHSA-7jwg-hq85-c6m6
2022-12-06T19:50:46Z
2022-09-22T00:00:28Z
null
['CVE-2022-41243']
Jenkins SmallTest Plugin missing hostname validation
Jenkins SmallTest Plugin 1.0.4 and earlier does not perform hostname validation when connecting to the configured View26 server that could be abused using a man-in-the-middle attack to intercept these connections. There is currently no known workaround or fix for this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.smalltest:smalltest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41243'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/smalltest-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2068'}]
{'cwe_ids': ['CWE-297'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:31:37Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-v7vw-577f-vp8x
2022-09-19T19:33:51Z
2022-09-16T22:26:12Z
null
['CVE-2022-35979']
TensorFlow vulnerable to segfault in `QuantizedRelu` and `QuantizedRelu6`
### Impact If `QuantizedRelu` or `QuantizedRelu6` are given nonscalar inputs for `min_features` or `max_features`, it results in a segfault that can be used to trigger a denial of service attack. ```python import tensorflow as tf out_type = tf.quint8 features = tf.constant(28, shape=[4,2], dtype=tf.quint8) min_feature...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v7vw-577f-vp8x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35979'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/49b3824d83af706df0ad07e4e677d88659756d89'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:26:12Z', 'nvd_published_at': '2022-09-16T22:15:00Z'}
1.4.0
GHSA-5p8v-58qm-c7fp
2022-09-21T21:33:22Z
2022-09-21T21:33:22Z
null
['CVE-2022-39227']
python-jwt vulnerable to token forgery with new claims
### Impact An attacker who obtains a JWT can arbitrarily forge its contents without knowing the secret key. Depending on the application, this may for example enable the attacker to spoof other user's identities, hijack their sessions, or bypass authentication. ### Patches Users should upgrade to version 3.3.4 Fixed b...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'python-jwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/davedoesdev/python-jwt/security/advisories/GHSA-5p8v-58qm-c7fp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39227'}, {'type': 'WEB', 'url': 'https://github.com/davedoesdev/python-jwt/commit/6c5075469847b9e8b6e5336077d989d77a4d2bf1'}, {'type': 'WEB...
{'cwe_ids': ['CWE-290'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:33:22Z', 'nvd_published_at': '2022-09-23T07:15:00Z'}
1.4.0
GHSA-ch4c-278q-5654
2022-09-16T21:35:08Z
2022-09-14T00:00:51Z
null
['CVE-2022-3175']
rdiffweb 2.4.1 Missing Custom Error Page
rdiffweb version 2.4.1 is set to a default and leaks error information. Version 2.4.2 fixes this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.1'}, {'fixed': '2.4.2'}]}], 'versions': ['2.4.1']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3175'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/233befc33bdc45d4838c773d5aed4408720504c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/bl...
{'cwe_ids': ['CWE-755', 'CWE-756'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:23:16Z', 'nvd_published_at': '2022-09-13T10:15:00Z'}
1.4.0
GHSA-wxvf-839f-jqmh
2022-09-20T21:32:03Z
2022-09-17T00:00:36Z
null
['CVE-2022-37248']
Craft CMS Cross site Scripting vulnerability
Craft CMS 4.2.0.1 is vulnerable to Cross Site Scripting (XSS) via `src/helpers/Cp.php`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC1'}, {'fixed': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37248'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/cedeba0609e4b173cd584dae7f33c5f713f19627'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/3.7.55.1...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:32:03Z', 'nvd_published_at': '2022-09-16T16:15:00Z'}
1.4.0
GHSA-fv7x-v67w-cvqv
2022-09-22T22:55:29Z
2022-09-22T00:00:24Z
null
['CVE-2022-31679']
Spring Data REST can expose hidden entity attributes
Applications that allow HTTP PATCH access to resources exposed by Spring Data REST in versions 3.6.0 - 3.6.6, 3.7.0 - 3.7.2, and older unsupported versions, if an attacker knows about the structure of the underlying domain model, they can craft HTTP requests that expose hidden entity attributes.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-rest-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.data:spring-data-rest-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'even...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31679'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-data-rest/commit/2ad081f75b4baabfbc139f0dc2b75c54889b4053'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-data-rest/commit/bf37590b25a0c066f67547b39fb4d...
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-22T22:55:29Z', 'nvd_published_at': '2022-09-21T18:15:00Z'}
1.4.0
GHSA-v6h3-348g-6h5x
2022-09-19T19:26:01Z
2022-09-16T22:16:30Z
null
['CVE-2022-35967']
TensorFlow vulnerable to segfault in `QuantizedAdd`
### Impact If `QuantizedAdd` is given `min_input` or `max_input` tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack. ```python import tensorflow as tf Toutput = tf.qint32 x = tf.constant(140, shape=[1], dtype=tf.quint8) y = tf.constant(26, shape=[10], dtype=tf.qu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v6h3-348g-6h5x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35967'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/49b3824d83af706df0ad07e4e677d88659756d89'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:16:30Z', 'nvd_published_at': '2022-09-16T21:15:00Z'}
1.4.0
GHSA-5959-4x58-r8c2
2022-09-16T17:16:11Z
2022-09-16T17:16:11Z
null
['CVE-2022-36106']
TYPO3 CMS missing check for expiration time of password reset token for backend users
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.0) ### Problem It has been discovered that the expiration time of a password reset link for TYPO3 backend users has never been evaluated. As a result, a password reset link could be used to perform a password reset even if the default...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.4.0'}, {'fixed': '10.4.32'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.16'}]...
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-5959-4x58-r8c2'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36106'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/00b52a443b21baaaab35f8606dbb0ce427261bb5'}, {'type': 'WEB', 'url': 'https://git...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:16:11Z', 'nvd_published_at': '2022-09-13T18:15:00Z'}
1.4.0
GHSA-f2j5-w76m-3rqh
2022-12-05T22:10:11Z
2022-09-22T00:00:28Z
null
['CVE-2022-41225']
Jenkins Anchore Container Image Scanner Plugin vulnerable to cross site scripting
Jenkins Anchore Container Image Scanner Plugin 1.0.24 and earlier does not escape content provided by the Anchore engine API, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to control API responses by Anchore engine.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:anchore-container-scanner'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.25'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.24'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41225'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/anchore-container-scanner-plugin/commit/1b1a62ab8ab86b409274e755860ab4e7fcc11800'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/anchore-container-scanner-plugin'}, {'type': ...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:27:10Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-mxf2-4r22-5hq9
2022-09-16T17:05:12Z
2022-09-16T17:05:12Z
null
['CVE-2022-36094']
XWiki Platform Web Parent POM vulnerable to XSS in the attachment history
### Impact It's possible to store a JavaScript which will be executed by anyone viewing the history of an attachment containing javascript in its name. For example, attachment a file with name `><img src=1 onerror=alert(1)>.jpg` will execute the alert. ### Patches This issue has been patched in XWiki 13.10.6 and 14...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '13.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-mxf2-4r22-5hq9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36094'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/047ce9fa4a7c13f3883438aaf54fc50f287a7e8e'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-79', 'CWE-80'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:05:12Z', 'nvd_published_at': '2022-09-08T20:15:00Z'}
1.4.0
GHSA-25gv-wg6f-6frp
2022-09-30T06:23:59Z
2022-09-27T00:00:20Z
null
['CVE-2022-40043']
Centreon SQL Injection vulnerability via esc_name parameter
Centreon v20.10.18 was discovered to contain a SQL injection vulnerability via the `esc_name` (Escalation Name) parameter at `Configuration/Notifications/Escalations`. Versions 21.04.16, 21.10.8, and 22.04.2 contain patches.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.04.16'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'centreon/centreon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '21.10.0'}, {'fixed': '21.10.8...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40043'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/commit/1a6ee0e9a003ac4f07dc8c370aec6e8911279358'}, {'type': 'WEB', 'url': 'https://github.com/centreon/centreon/commit/76fdfba312515656419a1311a83adfb11a73199f'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T06:23:59Z', 'nvd_published_at': '2022-09-26T16:15:00Z'}
1.4.0
GHSA-6hrg-qmvc-2xh8
2023-07-06T19:33:37Z
2022-09-27T00:00:22Z
null
['CVE-2022-21797']
joblib vulnerable to arbitrary code execution
The package joblib from 0 and before 1.2.0 is vulnerable to Arbitrary Code Execution via the `pre_dispatch` flag in `Parallel()` class due to the `eval()` statement.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'joblib'}, 'ecosystem_specific': {'affected_functions': ['joblib._utils.eval_expr']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21797'}, {'type': 'WEB', 'url': 'https://github.com/joblib/joblib/issues/1128'}, {'type': 'WEB', 'url': 'https://github.com/joblib/joblib/pull/1321'}, {'type': 'WEB', 'url': 'https://github.com/joblib/joblib/pull/1327'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:44:04Z', 'nvd_published_at': '2022-09-26T05:15:00Z'}
1.4.0
GHSA-qjjj-7g7h-54v3
2022-09-16T21:28:29Z
2022-09-16T00:00:39Z
null
['CVE-2022-38352']
ThinkPHP deserialization vulnerability
ThinkPHP v6.0.13 was discovered to contain a deserialization vulnerability via the component `League\Flysystem\Cached\Storage\Psr6Cache`. This vulnerability allows attackers to execute arbitrary code via a crafted payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.0.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38352'}, {'type': 'WEB', 'url': 'https://github.com/top-think/framework/issues/2749'}, {'type': 'PACKAGE', 'url': 'https://github.com/top-think/framework'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:28:29Z', 'nvd_published_at': '2022-09-15T02:15:00Z'}
1.4.0
GHSA-g7j7-h4q8-8w2f
2022-09-23T18:11:28Z
2022-09-23T18:11:28Z
null
['CVE-2021-36782']
Rancher API and cluster.management.cattle.io object vulnerable to plaintext storage and exposure of credentials
### Impact An issue was discovered in Rancher versions up to and including 2.5.15 and 2.6.6 where sensitive fields, like passwords, API keys and Rancher's service account token (used to provision clusters), were stored in plaintext directly on Kubernetes objects like `Clusters`, for example `cluster.management.cattle.i...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.5.16'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/rancher/rancher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.6.0'}, {'fixed': '2.6...
[{'type': 'WEB', 'url': 'https://github.com/rancher/rancher/security/advisories/GHSA-g7j7-h4q8-8w2f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36782'}, {'type': 'WEB', 'url': 'https://bugzilla.suse.com/show_bug.cgi?id=1193988'}, {'type': 'PACKAGE', 'url': 'https://github.com/rancher/ranch...
{'cwe_ids': ['CWE-312'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T18:11:28Z', 'nvd_published_at': '2022-09-07T09:15:00Z'}
1.4.0
GHSA-vq4h-xrwc-m639
2022-09-16T21:56:47Z
2022-09-16T00:00:39Z
null
['CVE-2022-3221']
rdiffweb CSRF vulnerability in profile's SSH keys can lead to unauthorized access
rdiffweb prior to 2.4.3 is vulnerable to Cross-Site Request Forgery (CSRF). While adding SSH public keys to the profile, the server accepts the GET request, which results in adding an SSH public key to the profile and leads to unauthorized access to the system and backups. Version 2.4.3 contains a patch for this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3221'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/9125f5a2d918fed0f3fc1c86fa94cd1779ed9f73'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:56:47Z', 'nvd_published_at': '2022-09-15T09:15:00Z'}
1.4.0
GHSA-689c-r7h2-fv9v
2022-09-19T19:35:12Z
2022-09-16T22:22:27Z
null
['CVE-2022-35973']
TensorFlow vulnerable to segfault in `QuantizedMatMul`
### Impact If `QuantizedMatMul` is given nonscalar input for: - `min_a` - `max_a` - `min_b` - `max_b` It gives a segfault that can be used to trigger a denial of service attack. ```python import tensorflow as tf Toutput = tf.qint32 transpose_a = False transpose_b = False Tactivation = tf.quint8 a = tf.constant(7, ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-689c-r7h2-fv9v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35973'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/aca766ac7693bf29ed0df55ad6bfcc78f35e7f48'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:22:27Z', 'nvd_published_at': '2022-09-16T21:15:00Z'}
1.4.0
GHSA-3mg9-m3f6-v7fq
2022-09-28T03:28:50Z
2022-09-25T00:00:18Z
null
['CVE-2022-24280']
Proxy component of Apache Pulsar subject to abuse as Denial of Service endpoint
Improper Input Validation vulnerability in Proxy component of Apache Pulsar allows an attacker to make TCP/IP connection attempts that originate from the Pulsar Proxy's IP address. When the Apache Pulsar Proxy component is used, it is possible to attempt to open TCP/IP connections to any IP address and port that the Pu...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.3'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24280'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/pulsar'}, {'type': 'WEB', 'url': 'https://github.com/apache/pulsar/wiki/CVE-2022-24280'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/ghs9jtjfbpy4c6xcftyvkl6swznlom1v'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-28T03:28:50Z', 'nvd_published_at': '2022-09-23T10:15:00Z'}
1.4.0
GHSA-g4h6-qp44-wqvx
2022-09-20T21:19:52Z
2022-09-20T21:19:52Z
null
['CVE-2022-31166']
XWiki.WebHome vulnerable to Improper Privilege Management in XWiki resolving groups
### Impact It's possible to exploit a bug in XWikiRights resolution of groups to obtain privilege escalation. More specifically, editing a right with the object editor leads to adding a supplementary empty value to groups which is then resolved as a reference to XWiki.WebHome page. Adding an XWikiGroup xobject to th...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.3.7'}, {'fixed': '13.10.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-g4h6-qp44-wqvx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31166'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/pull/1800'}, {'type': 'PACKAGE', 'url': 'https://github.com/xwiki/xw...
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:19:52Z', 'nvd_published_at': '2022-09-07T14:15:00Z'}
1.4.0
GHSA-cf7g-cm7q-rq7f
2022-09-23T17:07:44Z
2022-09-20T21:22:55Z
null
['CVE-2022-39220']
SFTPGo WebClient vulnerable to Cross-site Scripting
### Impact Cross-site scripting (XSS) vulnerabilities have been reported to affect SFTPGo WebClient. If exploited, this vulnerability allows remote attackers to inject malicious code. ### Patches Fixed in v2.3.5.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/drakkan/sftpgo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.3.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/drakkan/sftpgo/security/advisories/GHSA-cf7g-cm7q-rq7f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39220'}, {'type': 'WEB', 'url': 'https://github.com/drakkan/sftpgo/commit/cbef217cfa92478ee8e00ba1a5fb074f8a8aeee0'}, {'type': 'PACKAGE', 'url': 'h...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:22:55Z', 'nvd_published_at': '2022-09-20T22:15:00Z'}
1.4.0
GHSA-gfhp-jgp6-838j
2022-11-01T12:56:34Z
2022-09-30T04:54:06Z
null
['CVE-2022-39256']
Orckestra C1 CMS's deserialization of untrusted data allows for arbitrary code execution.
### Impact This vulnerability allows remote attackers to execute arbitrary code on affected installations of Orckestra C1 CMS. Authentication is required to exploit this vulnerability. The authenticated user may perform the actions unknowingly by visiting a specially crafted site. ### Patches Patched in C1 CMS v6.13...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'CompositeC1.Core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.13'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Orckestra/C1-CMS-Foundation/security/advisories/GHSA-gfhp-jgp6-838j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39256'}, {'type': 'WEB', 'url': 'https://github.com/Orckestra/C1-CMS-Foundation/pull/814'}, {'type': 'WEB', 'url': 'https://github.com...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:54:06Z', 'nvd_published_at': '2022-09-27T15:15:00Z'}
1.4.0
GHSA-fmq7-gh8v-mjvc
2022-09-16T21:59:13Z
2022-09-14T00:00:48Z
null
['CVE-2022-1278']
WildFly vulnerable to Insecure Default Initialization of Resource
A flaw was found in WildFly, where an attacker can see deployment names, endpoints, and any other data the trace payload may contain.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.wildfly.bom:wildfly'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '27.0.0.Beta1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1278'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2073401'}, {'type': 'PACKAGE', 'url': 'https://github.com/wildfly/boms'}, {'type': 'WEB', 'url': 'https://issues.redhat.com/browse/WFLY-16238'}]
{'cwe_ids': ['CWE-1188'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:23:37Z', 'nvd_published_at': '2022-09-13T14:15:00Z'}
1.4.0
GHSA-f4w6-h4f5-wx45
2022-09-19T19:50:23Z
2022-09-16T20:56:02Z
null
['CVE-2022-35934']
TensorFlow vulnerable to `CHECK` failure in tf.reshape via overflows
### Impact The implementation of tf.reshape op in TensorFlow is vulnerable to a denial of service via CHECK-failure (assertion failure) caused by overflowing the number of elements in a tensor: ```python import tensorflow as tf tf.reshape(tensor=[[1]],shape=tf.constant([0 for i in range(255)], dtype=tf.int64)) ``` Thi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-f4w6-h4f5-wx45'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35934'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/61f0f9b94df8c0411f0ad0ecc2fec2d3f3c33555'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T20:56:02Z', 'nvd_published_at': '2022-09-16T20:15:00Z'}
1.4.0
GHSA-2jv3-v37p-65w3
2023-09-11T22:15:22Z
2022-09-14T00:00:45Z
null
['CVE-2022-40634']
CrafterCMS Crafter Studio Improperly Controls Dynamically-Managed Code Resources
Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via FreeMarker SSTI.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:crafter-studio'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.23'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40634'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2022051601'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftercms/studio'}]
{'cwe_ids': ['CWE-78', 'CWE-913'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T18:04:54Z', 'nvd_published_at': '2022-09-13T19:15:00Z'}
1.4.0
GHSA-v8gq-5grq-9728
2022-09-16T21:03:43Z
2022-09-16T21:03:43Z
null
[]
mozjpeg DecompressScanlines::read_scanlines is Unsound
This issue and vector is similar to [RUSTSEC-2020-0029] of `rgb` crate which `mozjpeg` depends on. Affected versions of `mozjpeg` crate allow creating instances of any type `T` from bytes, and do not correctly constrain `T` to the types for which it is safe to do so. Examples of safety violation possible for a type `...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'mozjpeg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.19'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ImageOptim/mozjpeg-rust/issues/10'}, {'type': 'PACKAGE', 'url': 'https://github.com/ImageOptim/mozjpeg-rust'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0165.html'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:03:43Z', 'nvd_published_at': None}
1.4.0
GHSA-h4qg-p7r2-cpg3
2022-09-23T20:57:17Z
2022-09-23T00:00:40Z
null
['CVE-2022-40146']
Apache Batik vulnerable to Server-Side Request Forgery
Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to access files using a Jar url. This issue affects Apache XML Graphics Batik 1.14.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40146'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/xmlgraphics-batik'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/BATIK-1335'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/hxtddqjty2sbs12y97c8g7xfh17jzxsx...
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:57:17Z', 'nvd_published_at': '2022-09-22T15:15:00Z'}
1.4.0
GHSA-q979-9m39-23mq
2022-09-28T03:30:11Z
2022-09-25T00:00:15Z
null
['CVE-2022-23463']
Nepxion Discovery vulnerable to SpEL Injection leading to Remote Code Execution
Nepxion Discovery is a solution for Spring Cloud. Discovery is vulnerable to SpEL Injection in discovery-commons. DiscoveryExpressionResolver’s eval method is evaluating expression with a StandardEvaluationContext, allowing the expression to reach and interact with Java classes such as java.lang.Runtime, leading to Rem...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.nepxion:discovery'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.16.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23463'}, {'type': 'PACKAGE', 'url': 'https://github.com/Nepxion/Discovery'}, {'type': 'ADVISORY', 'url': 'https://securitylab.github.com/advisories/GHSL-2022-033_GHSL-2022-034_Discovery/'}]
{'cwe_ids': ['CWE-917'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-28T03:30:11Z', 'nvd_published_at': '2022-09-24T05:15:00Z'}
1.4.0
GHSA-jvf3-mfxv-jcqr
2022-09-30T00:09:24Z
2022-09-25T00:00:27Z
null
['CVE-2022-33682']
Apache Pulsar Broker, Proxy, and WebSocket Proxy vulnerable to Improper Certificate Validation
TLS hostname verification cannot be enabled in the Pulsar Broker's Java Client, the Pulsar Broker's Java Admin Client, the Pulsar WebSocket Proxy's Java Client, and the Pulsar Proxy's Admin Client leaving intra-cluster connections and geo-replication connections vulnerable to man in the middle attacks, which could leak...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar-broker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33682'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/l0ynfl161qghwfcgbbl8ld9hzbl9t3yx'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T00:09:24Z', 'nvd_published_at': '2022-09-23T10:15:00Z'}
1.4.0
GHSA-5ff8-7639-6v6g
2022-09-15T03:32:38Z
2022-09-03T00:00:25Z
null
['CVE-2022-38054']
Apache Airflow Session Fixation vulnerability
In Apache Airflow versions 2.2.4 through 2.3.3, the `database` webserver session backend was susceptible to session fixation.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'apache-airflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.4'}, {'fixed': '2.3.4rc1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38054'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-5ff8-7639-6v6g'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-airflow/PYSEC-2022-263.yaml'}, {'type': 'WEB', 'url': 'https://lists...
{'cwe_ids': ['CWE-384'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:32:38Z', 'nvd_published_at': '2022-09-02T07:15:00Z'}
1.4.0
GHSA-q9j5-2mjx-8x28
2022-12-09T20:14:11Z
2022-09-22T00:00:26Z
null
['CVE-2022-41250']
Missing permission check in Jenkins SCM HttpClient Plugin allow capturing credentials
SCM HttpClient Plugin 1.5 and earlier does not perform permission check in a method implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified HTTP server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.meowlomo.jenkins:scm-httpclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41250'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/scm-httpclient-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2708'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T12:57:46Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-q9g4-9fx4-v533
2022-12-06T22:40:16Z
2022-09-22T00:00:28Z
null
['CVE-2022-41239']
Stored XSS vulnerability in Jenkins DotCi Plugin
DotCi Plugin 2.40.00 and earlier does not escape the GitHub user name parameter provided to commit notifications when displaying them in a build cause. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to submit crafted commit notifications to the `/githook/` endpoint (see...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.groupon.jenkins-ci.plugins:DotCi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.40.00'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41239'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/DotCi'}, {'type': 'WEB', 'url': 'https://plugins.jenkins.io/DotCi/'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2884'}, {'type': 'WEB', 'u...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T22:40:16Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-74j6-3hh4-w3f5
2022-09-23T20:36:29Z
2022-09-23T00:00:30Z
null
['CVE-2022-3267']
rdiffweb Cross-Site Request Forgery vulnerability
rdiffweb prior to 2.4.6 is vulnerable to cross-site request forgery on the repository settings. A malicious user can change the settings of a repository by sending a URL to the victim. This issue is fixed in version 2.4.6.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3267'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/20fc0d304412cc569b21f31e52cb8b94094d6314'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:36:29Z', 'nvd_published_at': '2022-09-22T10:15:00Z'}
1.4.0
GHSA-6h2x-4gjf-jc5w
2022-09-21T21:42:05Z
2022-09-21T21:42:05Z
null
[]
autogluon.multimodal vulnerable to unsafe YAML deserialization
### Impact A potential unsafe deserialization issue exists within the `autogluon.multimodal` module, where YAML files are loaded via `yaml.load()` instead of `yaml.safe_load()`. The deserialization of untrusted data may allow an unprivileged third party to cause remote code execution, denial of service, and impact to ...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'autogluon.multimodal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.4.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'autogluon.multimodal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '0.5.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/awslabs/autogluon/security/advisories/GHSA-6h2x-4gjf-jc5w'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/autogluon/pull/1987'}, {'type': 'WEB', 'url': 'https://github.com/awslabs/autogluon/commit/23a37e74e58d03055c84a1b89c5af6c3db296b5e'}, {'type': 'PACKAGE', 'url': 'h...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:42:05Z', 'nvd_published_at': None}
1.4.0
GHSA-ffjm-4qwc-7cmf
2022-09-19T19:56:51Z
2022-09-16T21:04:23Z
null
['CVE-2022-35939']
TensorFlow vulnerable to OOB write in `scatter_nd` in TF Lite
### Impact The [`ScatterNd`](https://github.com/tensorflow/tensorflow/blob/266558ac4c1f361e9a178ee9d3f0ce2e648ae499/tensorflow/lite/kernels/internal/reference/reference_ops.h#L659-L698) function takes an input argument that determines the indices of of the output tensor. An input index greater than the output tensor or...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-ffjm-4qwc-7cmf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35939'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/b4d4b4cb019bd7240a52daa4ba61e3cc814f0384'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:04:23Z', 'nvd_published_at': '2022-09-16T20:15:00Z'}
1.4.0
GHSA-52xx-r3g2-p8jm
2022-09-20T22:07:20Z
2022-09-14T00:00:42Z
null
['CVE-2022-38306']
LIEF vulnerable to heap based buffer overflow
LIEF commit 5d1d643 was discovered to contain a heap-buffer overflow in the component `/core/CorePrPsInfo.tcc`. Commit 53bf680ef494a835e2c4a5de328ca85416a03a5a contains a patch.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'lief'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38306'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/issues/763'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/commit/53bf680ef494a835e2c4a5de328ca85416a03a5a'}, {'type': 'PACKAGE', 'url': 'https://github.com/lief-...
{'cwe_ids': ['CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T22:05:46Z', 'nvd_published_at': '2022-09-13T21:15:00Z'}
1.4.0
GHSA-634p-93h9-92vh
2022-09-19T20:20:23Z
2022-09-16T22:06:55Z
null
['CVE-2022-39217']
ghas-to-csv vulnerable to Improper Neutralization of Formula Elements in a CSV File
### Impact This GitHub Action creates a CSV file without sanitizing the output of the APIs. If an alert is dismissed or any other custom field contains executable code / formulas, it might be run when an endpoint opens that CSV file in a spreadsheet program. The data flow looks like this 👇🏻 ```mermaid graph TD ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'GitHub Actions', 'name': 'some-natalie/ghas-to-csv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/some-natalie/ghas-to-csv/security/advisories/GHSA-634p-93h9-92vh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39217'}, {'type': 'WEB', 'url': 'https://github.com/some-natalie/ghas-to-csv/issues/19'}, {'type': 'WEB', 'url': 'https://github.com/some...
{'cwe_ids': ['CWE-1236', 'CWE-74'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:06:55Z', 'nvd_published_at': '2022-09-17T00:15:00Z'}
1.4.0
GHSA-8c6p-v837-77f6
2023-04-03T19:09:32Z
2022-09-16T19:38:12Z
null
['CVE-2022-31669']
Harbor fails to validate the user permissions when updating tag immutability policies
### Impact Harbor fails to validate the user permissions when updating tag immutability policies - API call: PUT /projects/{project_name_or_id}/immutabletagrules/{immutable_rule_id} By sending a request to update a tag immutability policy with an id that belongs to a project that the currently authenticated user do...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.10.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.12'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges'...
[{'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories/GHSA-8c6p-v837-77f6'}, {'type': 'PACKAGE', 'url': 'https://github.com/goharbor/harbor'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:38:12Z', 'nvd_published_at': None}
1.4.0
GHSA-w45j-f5g5-w94x
2022-09-15T03:33:49Z
2022-09-09T00:00:57Z
null
['CVE-2022-28220']
Apache James vulnerable to buffering attack
Apache James prior to release 3.6.3 and 3.7.1 is vulnerable to a buffering attack relying on the use of the STARTTLS command. Fix of CVE-2021-38542, which solved similar problem fron Apache James 3.6.1, is subject to a parser differential and do not take into account concurrent requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.3'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.james:james-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28220'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/james-project'}, {'type': 'WEB', 'url': 'https://james.apache.org/james/update/2022/08/26/james-3.7.1.html'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/09/...
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:33:49Z', 'nvd_published_at': '2022-09-08T08:15:00Z'}
1.4.0
GHSA-grjp-4jmr-mjcw
2022-09-30T04:42:55Z
2022-09-27T00:00:22Z
null
['CVE-2022-21169']
express-xss-sanitizer vulnerable to Prototype Pollution via allowedTags attribute
The package express-xss-sanitizer before 1.1.3 is vulnerable to Prototype Pollution via the `allowedTags` attribute, allowing the attacker to bypass xss sanitization.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'express-xss-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21169'}, {'type': 'WEB', 'url': 'https://github.com/AhmedAdelFahim/express-xss-sanitizer/issues/4'}, {'type': 'WEB', 'url': 'https://github.com/AhmedAdelFahim/express-xss-sanitizer/commit/3bf8aaaf4dbb1c209dcb8d87a82711a54c1ab39a'}, {'type': 'PACKAG...
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:42:55Z', 'nvd_published_at': '2022-09-26T05:15:00Z'}
1.4.0
GHSA-4849-x3jx-45qr
2022-09-19T20:25:02Z
2022-09-16T00:00:39Z
null
['CVE-2022-3211']
Pimcore vulnerable to stored stored Cross-site Scripting via`properties` when creating new users
Pimcore prior to 10.5.6 is vulnerable to stored cross-site scripting. This occurs when an attacker injects a payload when adding properties for a new user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.5.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3211'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/13129'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/0508c491c6a4f3d119ec8dcf444e52ff25028c36'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pi...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:15:32Z', 'nvd_published_at': '2022-09-15T14:15:00Z'}
1.4.0
GHSA-6x28-7h8c-chx4
2022-09-30T04:31:01Z
2022-09-26T00:00:23Z
null
['CVE-2022-41343']
Dompdf allows remote file inclusion because URI validation failure does not halt font registration
`registerFont` in `FontMetrics.php` in Dompdf before 2.0.1 allows remote file inclusion because a URI validation failure does not halt font registration, as demonstrated by a `@font-face` rule.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dompdf/dompdf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41343'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/issues/2994'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/pull/2995'}, {'type': 'WEB', 'url': 'https://github.com/dompdf/dompdf/commit/66431c58017d5b1bdb9f6f772b9fbbc5e...
{'cwe_ids': ['CWE-552'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:31:01Z', 'nvd_published_at': '2022-09-25T19:15:00Z'}
1.4.0
GHSA-56h3-78gp-v83r
2022-10-18T17:26:21Z
2022-09-17T00:00:41Z
null
['CVE-2022-40149']
Jettison parser crash by stackoverflow
Those using Jettison to parse untrusted XML or JSON data may be vulnerable to Denial of Service attacks (DOS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stackoverflow. This effect may support a denial of service attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.codehaus.jettison:jettison'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40149'}, {'type': 'WEB', 'url': 'https://github.com/jettison-json/jettison/issues/45'}, {'type': 'WEB', 'url': 'https://github.com/jettison-json/jettison/pull/49/files'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-fuzz/issues/detail?id...
{'cwe_ids': ['CWE-121', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:22:04Z', 'nvd_published_at': '2022-09-16T10:15:00Z'}
1.4.0
GHSA-rp4v-hhm6-rcv9
2022-09-08T13:55:41Z
2022-09-01T22:24:05Z
null
['CVE-2022-31677']
Pinniped Supervisor Insufficient Session Expiration vulnerability
### Impact A user authenticating to Kubernetes clusters via the Pinniped Supervisor could potentially use their access token to continue their session beyond what proper use of their refresh token might allow. Access tokens issued by the Pinniped Supervisor have an intended expiration lifetime of approximately two mi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'go.pinniped.dev'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0'}, {'fixed': '0.19.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vmware-tanzu/pinniped/security/advisories/GHSA-rp4v-hhm6-rcv9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31677'}, {'type': 'WEB', 'url': 'https://github.com/vmware-tanzu/pinniped/pull/1264'}, {'type': 'PACKAGE', 'url': 'https://github.com/vmware...
{'cwe_ids': ['CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:24:05Z', 'nvd_published_at': '2022-08-29T15:15:00Z'}
1.4.0
GHSA-pqw5-jmp5-px4v
2022-09-19T20:25:17Z
2022-09-16T00:00:39Z
null
['CVE-2022-3224']
parse-url parses http URLs incorrectly, making it vulnerable to host name spoofing
parse-url prior to 8.1.0 is vulnerable to Misinterpretation of Input. parse-url parses certain http or https URLs incorrectly, identifying the URL's protocol as ssh. It may also parse the host name incorrectly.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3224'}, {'type': 'WEB', 'url': 'https://github.com/ionicabizau/parse-url/commit/9cacf38de02db0fb1358bd6ec04543e523cd6a8e'}, {'type': 'PACKAGE', 'url': 'https://github.com/ionicabizau/parse-url'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3...
{'cwe_ids': ['CWE-115'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:21:19Z', 'nvd_published_at': '2022-09-15T12:15:00Z'}
1.4.0
GHSA-8h89-34w2-jpfm
2022-09-16T17:06:38Z
2022-09-16T17:06:38Z
null
['CVE-2022-36092']
XWiki Platform Old Core vulnerable to Authentication Bypass Using the Login Action
### Impact All rights checks that would normally prevent a user from viewing a document on a wiki can be bypassed using the login action and directly specified templates. This exposes title, content and comments of any document and properties of objects (class and property name must be known, though). This is also expl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.10.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-8h89-34w2-jpfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36092'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/71a6d0bb6f8ab718fcfaae0e9b8c16c2d69cd4bb'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:06:38Z', 'nvd_published_at': '2022-09-08T18:15:00Z'}
1.4.0
GHSA-jgc8-gvcx-9vfx
2022-09-16T17:40:00Z
2022-09-16T17:40:00Z
null
['CVE-2022-36090']
XWiki Platform Improper Authorization check for inactive users
### Impact Some resources are missing a check for inactive (not yet activated or disabled) users in XWiki, including the REST service: so a disabled user can enable themselves using a REST call. On the same way some resources handler created by extensions are not protected by default: so an inactive users could perfor...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1'}, {'fixed': '13.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-oldcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'in...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-jgc8-gvcx-9vfx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36090'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/e074d226d9b2b96a0a1ba4349d1b73a802842986'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-285'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:40:00Z', 'nvd_published_at': '2022-09-08T15:15:00Z'}
1.4.0
GHSA-r26c-679w-mrjm
2022-09-19T19:03:43Z
2022-09-16T21:28:06Z
null
['CVE-2022-36005']
TensorFlow vulnerable to `CHECK` fail in `FakeQuantWithMinMaxVarsGradient`
### Impact When `tf.quantization.fake_quant_with_min_max_vars_gradient` receives input `min` or `max` that is nonscalar, it gives a `CHECK` fail that can trigger a denial of service attack. ```python import tensorflow as tf import numpy as np arg_0=tf.constant(value=np.random.random(size=(2, 2)), shape=(2, 2), dtype=t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-r26c-679w-mrjm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36005'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/f3cf67ac5705f4f04721d15e485e192bb319feed'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:28:06Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-m54f-rp6r-rrrm
2022-09-30T06:23:00Z
2022-09-29T00:00:22Z
null
['CVE-2022-40929']
XXL-JOB contains a Command execution vulnerability in background tasks
XXL-JOB versions 2.2.0 and prior contain a Command execution vulnerability in background tasks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.xuxueli:xxl-job-core'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40929'}, {'type': 'WEB', 'url': 'https://github.com/xuxueli/xxl-job/issues/2979'}, {'type': 'PACKAGE', 'url': 'https://github.com/xuxueli/xxl-job'}]
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T06:23:00Z', 'nvd_published_at': '2022-09-28T18:15:00Z'}
1.4.0
GHSA-fv22-xp26-mm9w
2022-12-06T13:40:35Z
2022-09-17T00:00:41Z
2022-12-06T13:40:35Z
['CVE-2022-40153']
Denial of Service due to parser crash
## Withdrawn This advisory has been withdrawn because it has been found to be a duplicate. Please see the issue [here](https://github.com/x-stream/xstream/issues/304#issuecomment-1293654236) for more information. ## Original Despcription Those using FasterXML/woodstox to seralize XML data may be vulnerable to Denia...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.woodstox:woodstox-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.4.0'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.woodstox:woodstox-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40153'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/woodstox/issues/157'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/woodstox/issues/160'}, {'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/issues/304'}, {'type': 'WEB...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T21:20:01Z', 'nvd_published_at': '2022-09-16T10:15:00Z'}
1.4.0
GHSA-fph9-f5r6-vhqf
2022-09-15T03:35:46Z
2022-09-15T03:35:46Z
null
['CVE-2022-25897']
Eclipse Milo vulnerable to Resource Exhaustion (Denial of Service)
### Impact Denial of Service ### Details OPC UA specification describes a concept named _Subscriptions_. _Subscriptions_ monitor a set of _Monitored Items_ for _Notifications_ and return them to the _Client_ in response to _Publish_ requests. The server notifies the client about changes only in case the value is cha...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.eclipse.milo:sdk-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/eclipse/milo/security/advisories/GHSA-fph9-f5r6-vhqf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25897'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/milo/issues/1030'}, {'type': 'WEB', 'url': 'https://github.com/eclipse/milo/pull/1031'}, ...
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:35:46Z', 'nvd_published_at': '2022-09-08T05:15:00Z'}
1.4.0
GHSA-r7vq-6425-j94w
2022-09-15T03:35:12Z
2022-09-15T03:35:12Z
null
[]
Python-TUF vulnerable to incorrect threshold signature computation for new root metadata
### Impact The function `_verify_root_self_signed()`, introduced in [v0.14.0](https://github.com/theupdateframework/tuf/releases/tag/v0.14.0), and which verifies self-signatures in a new root metadata file, counted multiple signatures by any new root key towards the new threshold. That is, any single new root key coul...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'tuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.14.0'}, {'fixed': '0.16.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.15.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-pwqf-9h7j-7mv8'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/python-tuf/security/advisories/GHSA-r7vq-6425-j94w'}, {'type': 'WEB', 'url': 'https://github.com/theupdateframework/python-tuf/pull/1218'}, {...
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:35:12Z', 'nvd_published_at': None}
1.4.0
GHSA-9942-r22v-78cp
2022-09-19T19:39:32Z
2022-09-16T22:29:52Z
null
['CVE-2022-35985']
TensorFlow vulnerable to `CHECK` fail in `LRNGrad`
### Impact If `LRNGrad` is given an `output_image` input tensor that is not 4-D, it results in a `CHECK` fail that can be used to trigger a denial of service attack. ```python import tensorflow as tf depth_radius = 1 bias = 1.59018219 alpha = 0.117728651 beta = 0.404427052 input_grads = tf.random.uniform(shape=[4, 4, 4...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9942-r22v-78cp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35985'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/bd90b3efab4ec958b228cd7cfe9125be1c0cf255'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:29:52Z', 'nvd_published_at': '2022-09-16T22:15:00Z'}
1.4.0
GHSA-p2jg-q8hw-p7gc
2022-09-15T03:22:08Z
2022-09-07T00:01:53Z
null
['CVE-2022-23451']
Barbican authorization flaw before v14.0.0
An authorization flaw was found in openstack-barbican. The default policy rules for the secret metadata API allowed any authenticated user to add, modify, or delete metadata from any secret regardless of ownership. This flaw allows an attacker on the network to modify or delete protected data, causing a denial of servi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'barbican'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '14.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23451'}, {'type': 'WEB', 'url': 'https://github.com/openstack/barbican/commit/7d270bacbe29a90a10f1855abc3b50dac0f08022'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2022:5114'}, {'type': 'WEB', 'url': 'https://access.redhat.com/e...
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:22:08Z', 'nvd_published_at': '2022-09-06T18:15:00Z'}
1.4.0
GHSA-3pgj-pg6c-r5p7
2023-02-06T20:32:38Z
2022-09-16T21:02:52Z
null
['CVE-2022-36087']
OAuthLib vulnerable to DoS when attacker provides malicious IPV6 URI
### Impact - Attacker providing malicious redirect uri can cause DoS to oauthlib's web application. - Attacker can also leverage usage of `uri_validate` functions depending where it is used. _What kind of vulnerability is it? Who is impacted?_ Oauthlib applications using OAuth2.0 provider support or use directly `uri...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'oauthlib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.1'}, {'fixed': '3.2.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/oauthlib/oauthlib/security/advisories/GHSA-3pgj-pg6c-r5p7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36087'}, {'type': 'WEB', 'url': 'https://github.com/oauthlib/oauthlib/commit/2e40b412c844ecc4673c3fa3f72181f228bdbacd'}, {'type': 'PACKAGE', 'ur...
{'cwe_ids': ['CWE-20', 'CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:02:52Z', 'nvd_published_at': '2022-09-09T21:15:00Z'}
1.4.0
GHSA-r8m2-4x37-6592
2022-09-15T03:25:36Z
2022-09-15T03:25:36Z
null
['CVE-2022-38013']
.NET Denial of Service Vulnerability
Microsoft is releasing this security advisory to provide information about a vulnerability in .NET Core 3.1 and .NET 6.0. This advisory also provides guidance on what developers can do to update their applications to remove this vulnerability. A denial of service vulnerability exists in ASP.NET Core 3.1 and .NET 6.0 w...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.29'}]}]}, {'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.AspNetCore.App.Runtime.linux-arm64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': ...
[{'type': 'WEB', 'url': 'https://github.com/dotnet/aspnetcore/security/advisories/GHSA-r8m2-4x37-6592'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38013'}, {'type': 'PACKAGE', 'url': 'https://github.com/dotnet/aspnetcore'}, {'type': 'WEB', 'url': 'https://lists.fedoraproject.org/archives/li...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:25:36Z', 'nvd_published_at': '2022-09-13T19:15:00Z'}
1.4.0
GHSA-fhfc-2q7x-929f
2022-09-19T19:13:10Z
2022-09-16T22:11:58Z
null
['CVE-2022-35994']
TensorFlow vulnerable to `CHECK` fail in `CollectiveGather`
### Impact When `CollectiveGather` receives an scalar input `input`, it gives a `CHECK` fails that can be used to trigger a denial of service attack. ```python import tensorflow as tf arg_0=1 arg_1=1 arg_2=1 arg_3=1 arg_4=(3, 3,3) arg_5='auto' arg_6=0 arg_7='' tf.raw_ops.CollectiveGather(input=arg_0, group_size=arg_1, ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fhfc-2q7x-929f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35994'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c1f491817dec39a26be3c574e86a88c30f3c4770'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:11:58Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-qj9p-jvmw-82rh
2022-09-29T14:37:12Z
2022-09-25T00:00:26Z
null
['CVE-2022-26112']
Apache Pinot has Groovy Function support enabled by default
Pinot allows you to run any function using Apache Groovy scripts. In versions prior to 0.10.0, Pinot query endpoint and realtime ingestion layer has a vulnerability in unprotected environments due to groovy function support being enabled by default. This issue has been fixed by making function support disabled by defau...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pinot:pinot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26112'}, {'type': 'WEB', 'url': 'https://github.com/apache/pinot/pull/8711'}, {'type': 'WEB', 'url': 'https://docs.pinot.apache.org/basics/releases/0.11.0'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/pinot'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-29T14:37:12Z', 'nvd_published_at': '2022-09-23T08:15:00Z'}
1.4.0
GHSA-g6vm-3ch8-c6jq
2022-09-15T03:32:13Z
2022-09-06T00:00:27Z
null
['CVE-2022-38369']
Apache IoTDB Session Fixation vulnerability
Apache IoTDB version 0.13.0 is vulnerable to session id attack. Users should upgrade to version 0.13.1 which addresses this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.iotdb:iotdb-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-iotdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.13.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38369'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/iotdb'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/7nk03ywvx3t3yjbcxzt7zy4nyc89y9b0'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/09/05/1'}]
{'cwe_ids': ['CWE-384'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:32:13Z', 'nvd_published_at': '2022-09-05T10:15:00Z'}
1.4.0
GHSA-cq7q-5c67-w39w
2022-10-07T16:25:42Z
2022-09-15T03:26:25Z
null
['CVE-2022-39202']
matrix-appservice-irc vulnerable to IRC mode parameter confusion
### Impact IRC allows you to specify multiple modes in a single mode command. Due to a bug in the underlying matrix-org/node-irc library, affected versions of matrix-appservice-irc perform parsing of such modes incorrectly, potentially resulting in the wrong user being given permissions. Mode commands can only be exe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'matrix-appservice-irc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.35.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/security/advisories/GHSA-cq7q-5c67-w39w'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39202'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-appservice-irc/commit/5f87dbed87b4b6dc49b7965ff152ee8535719...
{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:26:25Z', 'nvd_published_at': '2022-09-13T18:15:00Z'}
1.4.0
GHSA-37jf-mjv6-xfqw
2022-09-19T19:09:33Z
2022-09-16T19:24:49Z
null
['CVE-2022-35999']
TensorFlow vulnerable to `CHECK` fail in `Conv2DBackpropInput`
### Impact When `Conv2DBackpropInput` receives empty `out_backprop` inputs (e.g. `[3, 1, 0, 1]`), the current CPU/GPU kernels `CHECK` fail (one with dnnl, the other with cudnn). This can be used to trigger a denial of service attack. ```python import tensorflow as tf import numpy as np input_sizes = [3, 1, 1, 2] filter...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-37jf-mjv6-xfqw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35999'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/27a65a43cf763897fecfa5cdb5cc653fc5dd0346'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:24:49Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-r6v9-p59m-gj2p
2022-09-14T20:37:26Z
2022-09-02T21:55:20Z
null
['CVE-2022-31020']
Indy's NODE_UPGRADE transaction vulnerable to remote code execution
### Impact The `pool-upgrade` request handler in Indy-Node `<=1.12.4` allows an improperly authenticated attacker to remotely execute code on nodes within the network. Network operators are strongly encouraged to upgrade to the latest Indy-Node release `>=1.12.5` as soon as possible. ### Patches The `pool-upgrade` ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'indy-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.5rc1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/hyperledger/indy-node/security/advisories/GHSA-r6v9-p59m-gj2p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31020'}, {'type': 'WEB', 'url': 'https://github.com/hyperledger/indy-node/commit/fe507474f77084faef4539101e2bbb4d508a97f5'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-02T21:55:20Z', 'nvd_published_at': '2022-09-06T17:15:00Z'}
1.4.0
GHSA-5w8r-8pgj-5jmf
2022-11-01T13:24:57Z
2022-09-30T22:46:50Z
null
['CVE-2022-39250']
matrix-js-sdk subject to user impersonation due to key/device identifier confusion in SAS verification
## Impact An attacker cooperating with a malicious homeserver could interfere with the verification flow between two users, injecting its own cross-signing user identity in place of one of the users’ identities, leading to the other device trusting/verifying the user identity under the control of the homeserver instea...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'matrix-js-sdk'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.7.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/security/advisories/GHSA-5w8r-8pgj-5jmf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39250'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-js-sdk/commit/a587d7c36026fe1fcf93dfff63588abee359be76'}, {'type': ...
{'cwe_ids': ['CWE-287', 'CWE-322'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T22:46:50Z', 'nvd_published_at': '2022-09-29T13:15:00Z'}
1.4.0
GHSA-36jr-mh4h-2g58
2022-09-29T14:12:55Z
2022-09-29T14:12:55Z
null
[]
d3-color vulnerable to ReDoS
The d3-color module provides representations for various color spaces in the browser. Versions prior to 3.1.0 are vulnerable to a Regular expression Denial of Service. This issue has been patched in version 3.1.0. There are no known workarounds.
[]
[{'package': {'ecosystem': 'npm', 'name': 'd3-color'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/d3/d3-color/pull/100'}, {'type': 'PACKAGE', 'url': 'https://github.com/d3/d3-color'}, {'type': 'WEB', 'url': 'https://github.com/d3/d3-color/releases/tag/v3.1.0'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-D3COLOR-1076592'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-29T14:12:55Z', 'nvd_published_at': None}
1.4.0
GHSA-j6x3-3jqq-m922
2022-09-20T17:41:27Z
2022-09-14T00:00:45Z
null
['CVE-2022-40635']
CrafterCMS OS Command Injection vulnerability
Improper Control of Dynamically-Managed Code Resources vulnerability in Crafter Studio of Crafter CMS allows authenticated developers to execute OS commands via Groovy Sandbox Bypass.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.craftercms:craftercms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.23'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40635'}, {'type': 'WEB', 'url': 'https://docs.craftercms.org/en/3.1/security/advisory.html#cv-2022051602'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftercms/craftercms'}]
{'cwe_ids': ['CWE-78', 'CWE-913'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T17:41:27Z', 'nvd_published_at': '2022-09-13T19:15:00Z'}
1.4.0
GHSA-j43h-pgmg-5hjq
2022-09-19T19:37:49Z
2022-09-16T22:28:06Z
null
['CVE-2022-35989']
TensorFlow vulnerable to `CHECK` fail in `MaxPool`
### Impact When `MaxPool` receives a window size input array `ksize` with dimensions greater than its input tensor `input`, the GPU kernel gives a `CHECK` fail that can be used to trigger a denial of service attack. ```python import tensorflow as tf import numpy as np input = np.ones([1, 1, 1, 1]) ksize = [1, 1, 2, 2]...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-j43h-pgmg-5hjq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35989'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/32d7bd3defd134f21a4e344c8dfd40099aaf6b18'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:28:06Z', 'nvd_published_at': '2022-09-16T22:15:00Z'}
1.4.0
GHSA-qc43-pgwq-3q2q
2022-09-16T21:01:29Z
2022-09-16T21:01:29Z
null
['CVE-2022-36102']
Shopware access control list bypassed via crafted specific URLs
### Impact If backend admin controllers are called with a certain notation, the ACL could be bypassed. Users could execute actions, which they are normally not able to do. ### Patches We recommend updating to the current version 5.7.15. You can get the update to 5.7.15 regularly via the Auto-Updater or directly via th...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.7.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.7.14'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-qc43-pgwq-3q2q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36102'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/de92d3a78279119a5bbe203054f8fa1d25126af6'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-281'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:01:29Z', 'nvd_published_at': '2022-09-12T20:15:00Z'}
1.4.0
GHSA-vm7x-4qhj-rrcq
2022-09-19T19:55:20Z
2022-09-16T22:15:05Z
null
['CVE-2022-35991']
TensorFlow vulnerable to `CHECK` fail in `TensorListScatter` and `TensorListScatterV2`
### Impact When `TensorListScatter` and `TensorListScatterV2` receive an `element_shape` of a rank greater than one, they give a `CHECK` fail that can trigger a denial of service attack. ```python import tensorflow as tf arg_0=tf.random.uniform(shape=(2, 2, 2), dtype=tf.float16, maxval=None) arg_1=tf.random.uniform(sha...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vm7x-4qhj-rrcq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35991'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/bb03fdf4aae944ab2e4b35c7daa051068a8b7f61'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:15:05Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-4456-w38r-m53x
2022-09-23T20:24:21Z
2022-09-23T20:24:21Z
null
['CVE-2022-36025']
Besu VM vulnerable to gas allocation error in CALL operations
### Impact An error in 32 bit signed and unsigned types in the calculation of available gas in the CALL operations (including DELEGATECALL) results in incorrect gas being passed into called contracts and incorrect gas being returned after call execution. Where the amount of gas makes a difference in the success or fai...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.hyperledger.besu:evm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '22.4.0-RC1'}, {'fixed': '22.7.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/hyperledger/besu/security/advisories/GHSA-4456-w38r-m53x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36025'}, {'type': 'PACKAGE', 'url': 'https://github.com/hyperledger/besu'}]
{'cwe_ids': ['CWE-196', 'CWE-681'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:24:21Z', 'nvd_published_at': '2022-09-24T02:15:00Z'}
1.4.0
GHSA-fv2m-9249-qx85
2022-09-16T17:14:27Z
2022-09-16T17:14:27Z
null
['CVE-2022-36108']
TYPO3 CMS vulnerable to Cross-Site Scripting in <f:asset.css> view helper
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (4.1) ### Problem It has been discovered that the `f:asset.css` view helper is vulnerable to cross-site scripting when user input is passed as variables to the CSS. ### Solution Update to TYPO3 version 10.4.32 or 11.5.16 that fix the p...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.3.0'}, {'fixed': '10.4.32'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}, {'fixed': '11.5.16'}]...
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-fv2m-9249-qx85'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36108'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/6863f73818c36b0b88c677ba533765c8074907b4'}, {'type': 'WEB', 'url': 'https://git...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:14:27Z', 'nvd_published_at': '2022-09-13T18:15:00Z'}
1.4.0
GHSA-9v8w-xmr4-wgxp
2022-09-19T19:53:42Z
2022-09-16T22:14:20Z
null
['CVE-2022-35992']
TensorFlow vulnerable to `CHECK` fail in `TensorListFromTensor`
### Impact When `TensorListFromTensor` receives an `element_shape` of a rank greater than one, it gives a `CHECK` fail that can trigger a denial of service attack. ```python import tensorflow as tf arg_0=tf.random.uniform(shape=(6, 6, 2), dtype=tf.bfloat16, maxval=None) arg_1=tf.random.uniform(shape=(6, 9, 1, 3), dtype...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9v8w-xmr4-wgxp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35992'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3db59a042a38f4338aa207922fa2f476e000a6ee'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:14:20Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-rgqx-226f-2xp4
2022-09-23T17:08:13Z
2022-09-21T00:00:38Z
null
['CVE-2022-37259']
steal Inefficient Regular Expression Complexity vulnerability via string variable
A Regular Expression Denial of Service (ReDoS) flaw was found in stealjs steal 2.2.4 via the string variable in babel.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'steal'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37259'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/issues/1528'}, {'type': 'PACKAGE', 'url': 'https://github.com/stealjs/steal'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/...
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:08:23Z', 'nvd_published_at': '2022-09-20T18:15:00Z'}
1.4.0
GHSA-x3jj-rgw9-7r5g
2022-12-06T21:30:50Z
2022-09-22T00:00:28Z
null
['CVE-2022-41237']
RCE vulnerability in Jenkins DotCi Plugin
DotCi Plugin 2.40.00 and earlier does not configure its YAML parser to prevent the instantiation of arbitrary types. This results in a remote code execution (RCE) vulnerability exploitable by attackers able to modify `.ci.yml` files in SCM. This plugin has been suspended.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.groupon.jenkins-ci.plugins:DotCi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.40.00'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41237'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/DotCi'}, {'type': 'WEB', 'url': 'https://plugins.jenkins.io/DotCi/'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-1737'}, {'type': 'WEB', 'u...
{'cwe_ids': ['CWE-502'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T21:30:50Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-5rc4-v5mj-g8c4
2022-10-04T21:42:30Z
2022-09-29T00:00:27Z
null
['CVE-2022-32169']
Bytebase does not restrict low privilege user to access admin issues
The `Bytebase` application does not restrict low privilege user to access `admin issues` for which an unauthorized user can view the `OPEN` and `CLOSED` issues by `Admin` and the affected endpoint is `/issue`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/bytebase/bytebase'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1.0'}, {'last_affected': '1.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32169'}, {'type': 'PACKAGE', 'url': 'https://github.com/bytebase/bytebase'}, {'type': 'WEB', 'url': 'https://github.com/bytebase/bytebase/blob/1.0.4/frontend/src/store/modules/issue.ts#L108-#L187'}, {'type': 'WEB', 'url': 'https://www.mend.io/vulne...
{'cwe_ids': ['CWE-732'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-04T21:42:30Z', 'nvd_published_at': '2022-09-28T10:15:00Z'}
1.4.0
GHSA-52v4-wxrx-gjjm
2022-09-23T13:22:26Z
2022-09-22T00:00:26Z
null
['CVE-2022-41251']
Jenkins Apprenda Plugin has Missing Authorization vulnerability
A missing permission check in Jenkins Apprenda Plugin 2.2.0 and earlier allows users with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:apprenda'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41251'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/apprenda-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURITY-2710'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:22:26Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-crxj-hrmp-4rwf
2022-09-30T06:31:20Z
2022-09-29T00:00:26Z
null
['CVE-2022-40083']
Labstack Echo Open Redirect vulnerability
Labstack Echo v4.8.0 was discovered to contain an open redirect vulnerability via the Static Handler component. This vulnerability can be leveraged by attackers to cause a Server-Side Request Forgery (SSRF). Version 4.9.0 contains a patch for the issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/labstack/echo/v4'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40083'}, {'type': 'WEB', 'url': 'https://github.com/labstack/echo/issues/2259'}, {'type': 'WEB', 'url': 'https://github.com/labstack/echo/pull/2260'}, {'type': 'WEB', 'url': 'https://github.com/labstack/echo/pull/2260/commits/3154abd1401554fe4d1c09...
{'cwe_ids': ['CWE-601'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T06:31:20Z', 'nvd_published_at': '2022-09-28T14:15:00Z'}
1.4.0
GHSA-4phg-hpqm-c3j4
2022-10-03T19:45:15Z
2022-09-28T00:00:17Z
null
['CVE-2022-31367']
Strapi mishandles hidden attributes within admin API responses
Strapi before 3.6.10 and 4.x before 4.1.10 mishandles hidden attributes within admin API responses.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.10'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@strapi/strapi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-next.0'}, {'fixed': '4.1.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31367'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/13185'}, {'type': 'WEB', 'url': 'https://github.com/strapi/strapi/pull/13189'}, {'type': 'WEB', 'url': 'https://github.com/kos0ng/CVEs/tree/main/CVE-2022-31367'}, {'type': 'PACK...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T05:17:55Z', 'nvd_published_at': '2022-09-27T23:15:00Z'}
1.4.0
GHSA-9xgj-fcgf-x6mw
2022-10-11T18:36:17Z
2022-09-16T19:26:59Z
null
['CVE-2022-36069']
Poetry Argument Injection can lead to Local Code Execution
### Observation When handling dependencies that come from a Git repository instead of a registry, Poetry uses various commands, such as `git clone`. These commands are being constructed using user input (e.g. the repository URL). When building the commands, Poetry correctly avoids Command Injection vulnerabilities by ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'poetry'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/python-poetry/poetry/security/advisories/GHSA-9xgj-fcgf-x6mw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36069'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/poetry/PYSEC-2022-266.yaml'}, {'type': 'PACKAGE', ...
{'cwe_ids': ['CWE-88', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:26:59Z', 'nvd_published_at': '2022-09-07T19:15:00Z'}
1.4.0
GHSA-2mh7-qxcw-q39g
2022-09-16T18:41:43Z
2022-09-02T00:01:09Z
null
['CVE-2022-3072']
francoisjacquet/rosariosis vulnerable to Cross-Site Scripting (XSS)
Cross-site Scripting (XSS) - Stored in GitHub repository francoisjacquet/rosariosis prior to 8.9.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'francoisjacquet/rosariosis'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.9.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3072'}, {'type': 'WEB', 'url': 'https://github.com/francoisjacquet/rosariosis/commit/dcd3b86156bf9e981944e1a9e01ea23d8ad7c83a'}, {'type': 'WEB', 'url': 'https://gitlab.com/francoisjacquet/rosariosis/blob/mobile/CHANGES.md#changes-in-893'}, {'type':...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:41:43Z', 'nvd_published_at': '2022-09-01T08:15:00Z'}
1.4.0
GHSA-7hgc-php5-77qq
2022-09-19T20:23:28Z
2022-09-16T17:21:09Z
null
['CVE-2022-36103']
Talos worker join token can be used to get elevated access level to the Talos API
### Impact Talos worker nodes use a join token to get accepted into the Talos cluster. A misconfigured Kubernetes environment may allow workloads to access the join token of the worker node. A malicious workload could then use the join token to construct a Talos CSR (certificate signing request). Due to improper valid...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/talos-systems/talos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/siderolabs/talos/security/advisories/GHSA-7hgc-php5-77qq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36103'}, {'type': 'WEB', 'url': 'https://github.com/siderolabs/talos/commit/9eaf33f3f274e746ca1b442c0a1a0dae0cec088f'}, {'type': 'PACKAGE', 'url'...
{'cwe_ids': ['CWE-732', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:21:09Z', 'nvd_published_at': '2022-09-13T17:15:00Z'}
1.4.0
GHSA-jq8c-j47c-vvwm
2022-09-27T22:14:56Z
2022-09-23T00:00:46Z
null
['CVE-2022-40705']
Apache SOAP's RPCRouterServlet allows reading of arbitrary files over HTTP
An Improper Restriction of XML External Entity Reference vulnerability in RPCRouterServlet of Apache SOAP allows an attacker to read arbitrary files over HTTP. This issue affects Apache SOAP version 2.2 and later versions. It is unknown whether previous versions are also affected. NOTE: This vulnerability only affects ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'soap:soap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2'}, {'last_affected': '2.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40705'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/02yo04w93rdjmllz4454lvodn5xzhwhl'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/09/22/1'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-27T22:14:56Z', 'nvd_published_at': '2022-09-22T09:15:00Z'}
1.4.0
GHSA-xwf3-6rgv-939r
2022-09-01T22:15:35Z
2022-09-01T22:15:35Z
null
['CVE-2022-36035']
Flux CLI Workload Injection
Flux CLI allows users to deploy Flux components into a Kubernetes cluster via command-line. The vulnerability allows other applications to replace the Flux deployment information with arbitrary content which is deployed into the target Kubernetes cluster instead. The vulnerability is due to the improper handling of us...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/fluxcd/flux2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.21.0'}, {'fixed': '0.32.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/fluxcd/flux2/security/advisories/GHSA-xwf3-6rgv-939r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36035'}, {'type': 'PACKAGE', 'url': 'https://github.com/fluxcd/flux2'}, {'type': 'WEB', 'url': 'https://github.com/fluxcd/flux2/releases/tag/v0.32.0'...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:15:35Z', 'nvd_published_at': '2022-08-31T15:15:00Z'}
1.4.0
GHSA-mp5p-g2jv-r8qw
2022-09-16T21:36:30Z
2022-09-14T00:00:43Z
null
['CVE-2022-3179']
rdiffweb 2.4.1 contains Weak Password Requirements
rdiffweb version 2.4.1 has no password policy or password checking, which could make users vulnerable to brute force password guessing attacks. Version 2.4.2 enforces minimum and maximum password lengths.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.4.1'}, {'fixed': '2.4.2'}]}], 'versions': ['2.4.1']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3179'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/233befc33bdc45d4838c773d5aed4408720504c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab...
{'cwe_ids': ['CWE-521'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:24:48Z', 'nvd_published_at': '2022-09-13T17:15:00Z'}
1.4.0
GHSA-h5j3-5x63-p8jv
2022-09-16T17:05:55Z
2022-09-16T17:05:55Z
null
['CVE-2022-36093']
XWiki Platform Web Templates vulnerable to Unauthorized User Registration Through the Distribution Wizard
### Impact By passing a template of the distribution wizard to the xpart template, user accounts can be created even when user registration is disabled. This also circumvents any email verification. Before versions 14.2 and 13.10.4, this can also be exploited on a private wiki, thus potentially giving the attacker acce...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'in...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-h5j3-5x63-p8jv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36093'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/70c64c23f4404f33289458df2a08f7c4be022755'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-287', 'CWE-288'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:05:55Z', 'nvd_published_at': '2022-09-08T18:15:00Z'}
1.4.0
GHSA-3jp6-q9cg-rvgj
2022-12-06T14:26:48Z
2022-09-22T00:00:28Z
null
['CVE-2022-41230']
Missing permission check in Jenkins build-publisher Plugin
Jenkins Build-Publisher Plugin 1.22 and earlier does not perform a permission check in an HTTP endpoint, allowing attackers with Overall/Read permission to obtain names and URLs of Jenkins servers that the plugin is configured to publish builds to, as well as builds pending for publication to those Jenkins servers. At ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:build-publisher'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.22'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41230'}, {'type': 'WEB', 'url': 'https://github.com/jenkins-infra/update-center2/pull/644'}, {'type': 'WEB', 'url': 'https://plugins.jenkins.io/build-publisher/'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-09-21/#SECURIT...
{'cwe_ids': ['CWE-862', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-06T14:26:48Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-2p75-q37p-f852
2022-09-23T18:49:07Z
2022-09-22T00:00:31Z
null
['CVE-2022-3068']
OctoPrint Improper Privilege Management vulnerability
OctoPrint prior to 1.8.3 allows a user with read access only to access a privileged user's account and functionality. Version 1.8.3 contains a patch for this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'OctoPrint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3068'}, {'type': 'WEB', 'url': 'https://github.com/octoprint/octoprint/commit/ef95ef1c101b79394f134e8fce000e6bae046571'}, {'type': 'PACKAGE', 'url': 'https://github.com/octoprint/octoprint'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory...
{'cwe_ids': ['CWE-269'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T18:49:07Z', 'nvd_published_at': '2022-09-21T12:15:00Z'}
1.4.0
GHSA-9fpg-838v-wpv7
2022-09-19T19:36:24Z
2022-09-16T22:20:09Z
null
['CVE-2022-35971']
TensorFlow vulnerable to `CHECK` fail in `FakeQuantWithMinMaxVars`
### Impact If `FakeQuantWithMinMaxVars` is given `min` or `max` tensors of a nonzero rank, it results in a `CHECK` fail that can be used to trigger a denial of service attack. ```python import tensorflow as tf num_bits = 8 narrow_range = False inputs = tf.constant(0, shape=[2,3], dtype=tf.float32) min = tf.constant(0,...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-9fpg-838v-wpv7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35971'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/785d67a78a1d533759fcd2f5e8d6ef778de849e0'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:20:09Z', 'nvd_published_at': '2022-09-16T21:15:00Z'}
1.4.0
GHSA-v5xg-3q2c-c2r4
2022-09-19T19:35:30Z
2022-09-16T22:11:18Z
null
['CVE-2022-35960']
TensorFlow vulnerable to `CHECK` failure in `TensorListReserve` via missing validation
### Impact In [`core/kernels/list_kernels.cc's TensorListReserve`](https://github.com/tensorflow/tensorflow/blob/c8ba76d48567aed347508e0552a257641931024d/tensorflow/core/kernels/list_kernels.cc#L322-L325), `num_elements` is assumed to be a tensor of size 1. When a `num_elements` of more than 1 element is provided, then...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-v5xg-3q2c-c2r4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35960'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/b5f6fbfba76576202b72119897561e3bd4f179c7'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:11:18Z', 'nvd_published_at': '2022-09-16T20:15:00Z'}
1.4.0
GHSA-vp68-2wrm-69qm
2022-09-30T22:51:57Z
2022-09-30T22:51:57Z
null
['CVE-2022-39252']
matrix-sdk-crypto contains potential impersonation via room key forward responses
### Impact When matrix-rust-sdk before 0.6 requests a room key from our devices, it correctly accepts key forwards only if they are a response to a previous request. However, it doesn't check that the device that responded matches the device the key was requested from. This allows a malicious homeserver to insert roo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'matrix-sdk-crypto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-rust-sdk/security/advisories/GHSA-vp68-2wrm-69qm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39252'}, {'type': 'WEB', 'url': 'https://github.com/matrix-org/matrix-rust-sdk/commit/093fb5d0aa21c0b5eaea6ec96b477f1075271cbb'}, {'typ...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T22:51:57Z', 'nvd_published_at': '2022-09-29T15:15:00Z'}
1.4.0
GHSA-8fg9-p83m-x5pq
2022-10-06T17:10:50Z
2022-09-27T15:28:00Z
null
['CVE-2022-39280']
ReDoS issue in dparse
### Impact dparse versions prior to 0.5.1 contain a regular expression that is vulnerable to [ReDoS](https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS) (Regular Expression Denial of Service). All users parsing index server URLs with dparse are impacted by this vulnerability. ### Pat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'dparse'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pyupio/dparse/security/advisories/GHSA-8fg9-p83m-x5pq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39280'}, {'type': 'WEB', 'url': 'https://github.com/pyupio/dparse/commit/8c990170bbd6c0cf212f1151e9025486556062d5'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-27T15:28:00Z', 'nvd_published_at': '2022-10-06T18:16:00Z'}
1.4.0
GHSA-79h2-q768-fpxr
2022-09-19T19:00:53Z
2022-09-16T21:06:31Z
null
['CVE-2022-36027']
TensorFlow segfault TFLite converter on per-channel quantized transposed convolutions
### Impact When converting transposed convolutions using per-channel weight quantization the converter segfaults and crashes the Python process. ```python import tensorflow as tf class QuantConv2DTransposed(tf.keras.layers.Layer): def build(self, input_shape): self.kernel = self.add_weight("kernel", [3, 3,...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-79h2-q768-fpxr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36027'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/issues/53767'}, {'type': 'WEB', 'url': 'https://github.com/tensorf...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:06:31Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-wq6q-6m32-9rv9
2022-09-19T19:52:54Z
2022-09-16T22:14:09Z
null
['CVE-2022-35993']
TensorFlow vulnerable to `CHECK` fail in `SetSize`
### Impact When `SetSize` receives an input `set_shape` that is not a 1D tensor, it gives a `CHECK` fails that can be used to trigger a denial of service attack. ```python import tensorflow as tf arg_0=1 arg_1=[1,1] arg_2=1 arg_3=True arg_4='' tf.raw_ops.SetSize(set_indices=arg_0, set_values=arg_1, set_shape=arg_2, ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wq6q-6m32-9rv9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35993'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/cf70b79d2662c0d3c6af74583641e345fc939467'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:14:09Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-jvhc-5hhr-w3v5
2022-09-19T19:06:13Z
2022-09-16T21:19:48Z
null
['CVE-2022-36012']
TensorFlow vulnerable to assertion fail on MLIR empty edge names
### Impact When [`mlir::tfg::ConvertGenericFunctionToFunctionDef`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/ir/importexport/functiondef_import.cc) is given empty function attributes, it crashes. ```cpp // We pre-allocate the array of operands and populate it using the // `output_name_to_posi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jvhc-5hhr-w3v5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36012'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ad069af92392efee1418c48ff561fd3070a03d7b'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:19:48Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-42vg-2q93-fj6j
2022-09-20T22:06:04Z
2022-09-14T00:00:42Z
null
['CVE-2022-38495']
LIEF vulnerable to heap based buffer overflow via print_binary function
LIEF commit 365a16a was discovered to contain a heap-buffer overflow via the function `print_binary` at `/c/macho_reader.c`. Commit 0033b6312fd311b2e45e379c04a83d77c1e58578 contains a patch.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'lief'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38495'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/issues/767'}, {'type': 'WEB', 'url': 'https://github.com/lief-project/LIEF/commit/0033b6312fd311b2e45e379c04a83d77c1e58578'}, {'type': 'PACKAGE', 'url': 'https://github.com/lief-...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T22:06:04Z', 'nvd_published_at': '2022-09-13T21:15:00Z'}
1.4.0
GHSA-fvf5-xp83-vrqp
2022-09-27T08:33:34Z
2022-09-23T00:00:31Z
null
['CVE-2022-34026']
ICEcoder vulnerable to Path Traversal
ICEcoder v8.1 allows attackers to execute a directory traversal.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'icecoder/icecoder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '8.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34026'}, {'type': 'WEB', 'url': 'https://gist.github.com/enferas/85cdbadf5cba32ec7c8db6ea9e6833bf'}, {'type': 'PACKAGE', 'url': 'https://github.com/icecoder/ICEcoder'}, {'type': 'WEB', 'url': 'https://github.com/icecoder/ICEcoder/blob/master/classe...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:39:50Z', 'nvd_published_at': '2022-09-22T18:15:00Z'}