schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-7cgv-v83v-rr87
2022-09-27T08:12:04Z
2022-09-23T00:00:46Z
null
['CVE-2022-40186']
HashiCorp Vault vulnerable to incorrect metadata access
An issue was discovered in HashiCorp Vault and Vault Enterprise before 1.11.3. A vulnerability in the Identity Engine was found where, in a deployment where an entity has multiple mount accessors with shared alias names, Vault may overwrite metadata to the wrong alias due to an issue with checking the proper alias assi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40186'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-18-vault-entity-alias-metadata-may-leak-between-aliases-with-the-same-name-assigned-to-the-same-entity/44550'}, {'t...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:58:54Z', 'nvd_published_at': '2022-09-22T01:15:00Z'}
1.4.0
GHSA-wqmc-pm8c-2jhc
2022-09-21T19:15:28Z
2022-09-16T21:57:05Z
null
['CVE-2022-36017']
TensorFlow vulnerable to segfault in `Requantize`
### Impact If `Requantize` is given `input_min`, `input_max`, `requested_output_min`, `requested_output_max` tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack. ```python import tensorflow as tf out_type = tf.quint8 input = tf.constant([1], shape=[3], dtype=tf.qi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wqmc-pm8c-2jhc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36017'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/785d67a78a1d533759fcd2f5e8d6ef778de849e0'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:57:05Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-cmr8-5w4c-44v8
2022-09-21T19:22:40Z
2022-09-20T20:45:10Z
null
['CVE-2022-39218']
Fastly Compute@Edge JS Runtime has fixed random number seed during compilation
### Impact `Math.random` and `crypto.getRandomValues` methods failed to use sufficiently random values. The initial value to seed the CSPRNG (cryptographically secure pseudorandom number generator) was baked-in to the final WebAssembly module meaning the sequence of numbers generated was predictable for that specific ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@fastly/js-compute'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.5.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/fastly/js-compute-runtime/security/advisories/GHSA-cmr8-5w4c-44v8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39218'}, {'type': 'WEB', 'url': 'https://github.com/fastly/js-compute-runtime/commit/65524ffc962644e9fc39f4b368a326b6253912a9'}, {'type'...
{'cwe_ids': ['CWE-330', 'CWE-335'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T20:45:10Z', 'nvd_published_at': '2022-09-20T20:15:00Z'}
1.4.0
GHSA-r657-33vp-gp22
2022-09-21T20:43:57Z
2022-09-21T20:43:57Z
null
['CVE-2022-39231']
parse-server auth adapter app ID validation can be circumvented
### Impact Validation of the authentication adapter app ID for _Facebook_ and _Spotify_ may be circumvented. This fixes a vulnerability that affects configurations which allow users to authenticate using the Parse Server authentication adapter for _Facebook_ or _Spotify_ and where the server-side authentication adapt...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.16'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-r657-33vp-gp22'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39231'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/8c8ec715739e0f851338cfed794409ebac66c51b'}, {...
{'cwe_ids': ['CWE-287'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T20:43:57Z', 'nvd_published_at': '2022-09-23T08:15:00Z'}
1.4.0
GHSA-84jm-4cf3-9jfm
2022-09-19T19:27:43Z
2022-09-16T22:13:23Z
null
['CVE-2022-35963']
TensorFlow vulnerable to `CHECK` failures in `FractionalAvgPoolGrad`
### Impact The implementation of `FractionalAvgPoolGrad` does not fully validate the input `orig_input_tensor_shape`. This results in an overflow that results in a `CHECK` failure which can be used to trigger a denial of service attack. ```python import tensorflow as tf overlapping = True orig_input_tensor_shape = tf...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-84jm-4cf3-9jfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35963'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/03a659d7be9a1154fdf5eeac221e5950fec07dad'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:13:23Z', 'nvd_published_at': '2022-09-16T20:15:00Z'}
1.4.0
GHSA-c9qr-f6c8-rgxf
2022-09-30T23:07:07Z
2022-09-29T00:00:26Z
null
['CVE-2022-40082']
Hertz contains path traversal via normalizePath function
Hertz is a a high-performance and strong-extensibility Go HTTP framework that helps developers build microservices. Versions of Hertz prior to 0.3.1 contain a path traversal vulnerability via the normalizePath function. This issue has been patched in 0.3.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudwego/hertz'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40082'}, {'type': 'WEB', 'url': 'https://github.com/cloudwego/hertz/issues/228'}, {'type': 'WEB', 'url': 'https://github.com/cloudwego/hertz/pull/229'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudwego/hertz'}, {'type': 'WEB', 'url': 'https...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T23:07:07Z', 'nvd_published_at': '2022-09-28T14:15:00Z'}
1.4.0
GHSA-p75v-367r-2v23
2022-09-16T21:08:19Z
2022-09-16T21:08:19Z
null
[]
`cell-project` used incorrect variance when projecting through `&Cell<T>`
## Overview The issue lies in the implementation of the `cell_project` macro which used `field as *const _` instead of `field as *mut _`. The problem being that `*const T` is covariant in `T` while `*mut T` is invariant in `T`. Keep in mind that `&Cell<T>` is invariant in `T`, so casting to `*const T` relaxed the vari...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'cell-project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/RustyYato/cell-project/issues/3'}, {'type': 'WEB', 'url': 'https://github.com/RustyYato/cell-project/pull/4'}, {'type': 'PACKAGE', 'url': 'https://github.com/RustyYato/cell-project'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0164.html'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:08:19Z', 'nvd_published_at': None}
1.4.0
GHSA-g9h5-vr8m-x2h4
2022-09-19T19:12:50Z
2022-09-16T21:25:53Z
null
['CVE-2022-35995']
TensorFlow vulnerable to `CHECK` fail in `AudioSummaryV2`
### Impact When `AudioSummaryV2` receives an input `sample_rate` with more than one element, it gives a `CHECK` fails that can be used to trigger a denial of service attack. ```python import tensorflow as tf arg_0='' arg_1=tf.random.uniform(shape=(1,1), dtype=tf.float32, maxval=None) arg_2=tf.random.uniform(shape=(2,1)...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g9h5-vr8m-x2h4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35995'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/bf6b45244992e2ee543c258e519489659c99fb7f'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:25:53Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-m69r-9g56-7mv8
2023-09-06T18:54:15Z
2022-09-25T00:00:27Z
null
['CVE-2022-40716']
HashiCorp Consul vulnerable to authorization bypass
HashiCorp Consul and Consul Enterprise versions prior to 1.11.9, 1.12.5, and 1.13.2 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. A specially crafted CSR sent directly to Consul’s internal server agent RPC endpoi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40716'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/pull/14579'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/8f6fb4f6fe9488b8ec37da71ac503081d7d3760b'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com'...
{'cwe_ids': ['CWE-252'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-29T14:39:58Z', 'nvd_published_at': '2022-09-23T12:15:00Z'}
1.4.0
GHSA-fffr-7x4x-f98q
2022-09-16T17:16:46Z
2022-09-16T17:16:46Z
null
['CVE-2022-36104']
TYPO3 CMS vulnerable to Denial of Service in Page Error Handling
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C` (5.5) ### Problem Requesting invalid or non-existing resources via HTTP triggers the page error handler which again could retrieve content to be shown as an error message from another page. This leads to a scenario in which the applicat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.4.0'}, {'fixed': '11.5.16'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.4.0'}, {'fixed': '11.5.16'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-fffr-7x4x-f98q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36104'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/179dd7cd78947081d573fee2050e197faa556f13'}, {'type': 'WEB', 'url': 'https://git...
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:16:46Z', 'nvd_published_at': '2022-09-13T18:15:00Z'}
1.4.0
GHSA-wr9v-g9vf-c74v
2022-09-19T19:39:16Z
2022-09-16T22:29:01Z
null
['CVE-2022-35986']
TensorFlow vulnerable to segfault in `RaggedBincount`
### Impact If `RaggedBincount` is given an empty input tensor `splits`, it results in a segfault that can be used to trigger a denial of service attack. ```python import tensorflow as tf binary_output = True splits = tf.random.uniform(shape=[0], minval=-10000, maxval=10000, dtype=tf.int64, seed=-7430) values = tf.rando...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wr9v-g9vf-c74v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35986'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/7a4591fd4f065f4fa903593bc39b2f79530a74b8'}, {'type': 'PACKA...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:29:01Z', 'nvd_published_at': '2022-09-16T22:15:00Z'}
1.4.0
GHSA-28r9-pq4c-wp3c
2022-09-21T15:36:11Z
2022-09-21T15:36:11Z
null
[]
personnummer/rust vulnerable to Improper Input Validation
This vulnerability was reported to the personnummer team in June 2020. The slow response was due to locked ownership of some of the affected packages, which caused delays to update packages prior to disclosure. The vulnerability is determined to be low severity. ### Impact This vulnerability impacts users who rely o...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'personnummer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/personnummer/rust/security/advisories/GHSA-28r9-pq4c-wp3c'}, {'type': 'WEB', 'url': 'https://github.com/personnummer/rust/pull/4'}, {'type': 'WEB', 'url': 'https://github.com/personnummer/rust/commit/11c3b0491b70449fb790056585ad3251b0e23acb'}, {'type': 'WEB', 'url': 'https://...
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T15:36:11Z', 'nvd_published_at': None}
1.4.0
GHSA-c5fp-x2h5-vjv7
2022-09-30T00:00:47Z
2022-09-25T00:00:27Z
null
['CVE-2022-33681']
Apache Pulsar Java Client vulnerable to Improper Certificate Validation
Delayed TLS hostname verification in the Pulsar Java Client and the Pulsar Proxy make each client vulnerable to a man in the middle attack. Connections from the Pulsar Java Client to the Pulsar Broker/Proxy and connections from the Pulsar Proxy to the Pulsar Broker are vulnerable. Authentication data is sent before ver...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'f...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33681'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/pulsar/tree/db26073728bf86fc80deecaece2dc02b50bbb9b5/pulsar-client'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/fpo6x10trvn20hlk0dmnr5vlz5v4kl3d'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T00:00:47Z', 'nvd_published_at': '2022-09-23T10:15:00Z'}
1.4.0
GHSA-wc4x-qmr2-rj8h
2022-09-23T17:08:11Z
2022-09-21T00:00:38Z
null
['CVE-2022-37265']
steal vulnerable to Prototype Pollution via alias variable
Prototype pollution vulnerability in stealjs steal via the alias variable in babel.js.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'steal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37265'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/issues/1534'}, {'type': 'PACKAGE', 'url': 'https://github.com/stealjs/steal'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:08:31Z', 'nvd_published_at': '2022-09-20T18:15:00Z'}
1.4.0
GHSA-f546-v666-559x
2022-09-23T20:50:54Z
2022-09-22T00:00:28Z
null
['CVE-2022-37246']
Craft CMS Cross-site Scripting vulnerability
Craft CMS 4.2.0.1 is affected by Cross Site Scripting (XSS) in the file src/web/assets/cp/src/js/BaseElementSelectInput.js and in specific on the line `label: elementInfo.label`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC1'}, {'fixed': '4.2.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.39'}, {'fixed': '3.7.51'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37246'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/1d5fdba23c84d6d09a8a980c7b6fc52fb93b679b'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/ecefe7f0afe0a6c4d1097a570cba82753d33f681'}, {'type': 'PACKAGE', 'url'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:50:54Z', 'nvd_published_at': '2022-09-21T15:15:00Z'}
1.4.0
GHSA-vgvh-2pf4-jr2x
2022-09-19T19:34:49Z
2022-09-16T22:23:45Z
null
['CVE-2022-35974']
TensorFlow vulnerable to segfault in `QuantizeDownAndShrinkRange`
### Impact If `QuantizeDownAndShrinkRange` is given nonscalar inputs for `input_min` or `input_max`, it results in a segfault that can be used to trigger a denial of service attack. ```python import tensorflow as tf out_type = tf.quint8 input = tf.constant([1], shape=[3], dtype=tf.qint32) input_min = tf.constant([], s...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vgvh-2pf4-jr2x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35974'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/73ad1815ebcfeb7c051f9c2f7ab5024380ca8613'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:23:45Z', 'nvd_published_at': '2022-09-16T21:15:00Z'}
1.4.0
GHSA-w8v7-c7pm-7wfr
2022-09-23T16:29:56Z
2022-09-02T00:01:02Z
2022-09-23T16:29:56Z
[]
Duplicate Advisory: Keycloak vulnerable to Cross-Site Scripting (XSS)
## Duplicate Advisory This advisory is a duplicate of [GHSA-w9mf-83w3-fv49](https://github.com/advisories/GHSA-w9mf-83w3-fv49). This link is maintained to preserve external references. ## Original Description A stored Cross-site scripting (XSS) vulnerability was found in keycloak as shipped in Red Hat Single Sign-On 7...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '19.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-w9mf-83w3-fv49'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2256'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2101942'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/k...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:36:54Z', 'nvd_published_at': '2022-09-01T21:15:00Z'}
1.4.0
GHSA-xmgg-fx9p-prq6
2022-09-16T18:38:45Z
2022-09-16T18:38:45Z
null
['CVE-2022-36076']
NodeBB account takeover via SSO plugins
_This is a historical security advisory, pertaining to a vulnerability that was reported, patched, and published in 2021. It is listed here for completeness and for CVE tracking purposes._ ### Impact Due to an unnecessarily strict conditional in the code handling the first step of the SSO process, the pre-existing log...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.17.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-xmgg-fx9p-prq6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36076'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/a2400f6baff44cb2996487bcd0cc6e2acc74b3d4'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:38:45Z', 'nvd_published_at': '2022-09-02T13:15:00Z'}
1.4.0
GHSA-fxwr-4vq9-9vhj
2022-09-16T21:04:25Z
2022-09-16T21:04:25Z
null
['CVE-2022-36095']
XWiki Cross-Site Request Forgery (CSRF) for actions on tags
### Impact It's possible to perform a CSRF attack for adding or removing tags on XWiki pages. ### Patches The problem has been patched in XWiki 13.10.5 and 14.3. ### Workarounds It's possible to fix the issue without upgrading by locally modifying the documentTags.vm template in your filesystem, to apply the change...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0-milestone-1'}, {'fixed': '13.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECO...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-fxwr-4vq9-9vhj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36095'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/7ca56e40cf79a468cea54d3480b6b403f259f9ae'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:04:25Z', 'nvd_published_at': '2022-09-08T21:15:00Z'}
1.4.0
GHSA-69cg-p879-7622
2023-01-18T00:05:31Z
2022-09-07T00:01:51Z
null
['CVE-2022-27664']
golang.org/x/net/http2 Denial of Service vulnerability
In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20220906165146-f3363e06e74c'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net/http2'}, 'ecosystem_specific': ...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27664'}, {'type': 'PACKAGE', 'url': 'https://cs.opensource.google/go/x/net'}, {'type': 'WEB', 'url': 'https://go.dev/cl/428735'}, {'type': 'WEB', 'url': 'https://go.dev/issue/54658'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-annou...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T00:05:31Z', 'nvd_published_at': '2022-09-06T18:15:00Z'}
1.4.0
GHSA-2jjq-x548-rhpv
2023-08-24T22:25:36Z
2022-09-30T22:59:03Z
null
['CVE-2022-39266']
isolated-vm has vulnerable CachedDataOptions in API
### Impact If the untrusted v8 cached data is passed to the API through CachedDataOptions, the attackers can bypass the sandbox and run arbitrary code in the nodejs process. Version 4.3.7 changes the documentation to warn users that they should not accept `cachedData` payloads from a user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'isolated-vm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3.6'}}]
[{'type': 'WEB', 'url': 'https://github.com/laverdet/isolated-vm/security/advisories/GHSA-2jjq-x548-rhpv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39266'}, {'type': 'WEB', 'url': 'https://github.com/laverdet/isolated-vm/issues/379'}, {'type': 'WEB', 'url': 'https://github.com/laverdet/is...
{'cwe_ids': ['CWE-20', 'CWE-287', 'CWE-693'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T22:59:03Z', 'nvd_published_at': '2022-09-29T18:15:00Z'}
1.4.0
GHSA-4pc4-m9mj-v2r9
2022-09-19T19:35:48Z
2022-09-16T22:20:36Z
null
['CVE-2022-35972']
TensorFlow vulnerable to segfault in `QuantizedBiasAdd`
### Impact If `QuantizedBiasAdd` is given `min_input`, `max_input`, `min_bias`, `max_bias` tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack. ```python import tensorflow as tf out_type = tf.qint32 input = tf.constant([85,170,255], shape=[3], dtype=tf.quint8) bia...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4pc4-m9mj-v2r9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35972'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/785d67a78a1d533759fcd2f5e8d6ef778de849e0'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:20:36Z', 'nvd_published_at': '2022-09-16T21:15:00Z'}
1.4.0
GHSA-w9mf-83w3-fv49
2022-10-18T17:19:11Z
2022-09-23T16:32:51Z
null
['CVE-2022-2256']
Keycloak vulnerable to Stored Cross site Scripting (XSS) when loading default roles
A Stored XSS vulnerability was reported in the Keycloak Security mailing list, affecting all the versions of Keycloak, including the latest release (18.0.1). The vulnerability allows a privileged attacker to execute malicious scripts in the admin console, abusing of the default roles functionality. ### CVSS 3.1 - **3...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-w9mf-83w3-fv49'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2256'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/8e705a65ab2aa2b079374ec859ee7a75fad5a7d9'}, {'type': 'WEB', 'url': '...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T16:32:51Z', 'nvd_published_at': None}
1.4.0
GHSA-jqm7-m5q7-3hm5
2022-09-19T19:08:05Z
2022-09-16T22:08:58Z
null
['CVE-2022-36001']
TensorFlow vulnerable to `CHECK` fail in `DrawBoundingBoxes`
### Impact When `DrawBoundingBoxes` receives an input `boxes` that is not of dtype `float`, it gives a `CHECK` fail that can trigger a denial of service attack. ```python import tensorflow as tf import numpy as np arg_0=tf.constant(value=np.random.random(size=(1, 3, 2, 3)), shape=(1, 3, 2, 3), dtype=tf.half) arg_1=tf.c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jqm7-m5q7-3hm5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36001'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/da0d65cdc1270038e72157ba35bf74b85d9bda11'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:08:58Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-2475-53vw-vp25
2022-09-19T19:24:49Z
2022-09-16T22:16:52Z
null
['CVE-2022-35968']
TensorFlow vulnerable to `CHECK` fail in `AvgPoolGrad`
### Impact The implementation of `AvgPoolGrad` does not fully validate the input `orig_input_shape`. This results in a `CHECK` failure which can be used to trigger a denial of service attack: ```python import tensorflow as tf ksize = [1, 2, 2, 1] strides = [1, 2, 2, 1] padding = "VALID" data_format = "NHWC" orig_input...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2475-53vw-vp25'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35968'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3a6ac52664c6c095aa2b114e742b0aa17fdce78f'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:16:52Z', 'nvd_published_at': '2022-09-16T21:15:00Z'}
1.4.0
GHSA-gmhj-xjfh-cf6m
2022-09-23T21:37:21Z
2022-09-23T21:37:21Z
null
[]
Caddy-SSH vulnerable to Authorization Bypass due to incorrect usage of PAM library
Not invoking a call to `pam_acct_mgmt` after a call to `pam_authenticate` to check the validity of a login can lead to an authorization bypass. ### Impact #### Exploitability The attack can be carried over the network. A complex non-standard configuration or a specialized condition is required for the attack to be s...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mohammed90/caddy-ssh'}, 'versions': ['0.0.1']}]
[{'type': 'WEB', 'url': 'https://github.com/mohammed90/caddy-ssh/security/advisories/GHSA-gmhj-xjfh-cf6m'}, {'type': 'WEB', 'url': 'https://github.com/mohammed90/caddy-ssh/commit/4b3e639d64c55f91152ffb51a4af35a8845c95a3'}, {'type': 'PACKAGE', 'url': 'https://github.com/mohammed90/caddy-ssh'}]
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T21:37:21Z', 'nvd_published_at': None}
1.4.0
GHSA-52m2-vc4m-jj33
2022-09-30T05:29:36Z
2022-09-30T05:29:36Z
null
['CVE-2022-39261']
Twig may load a template outside a configured directory when using the filesystem loader
# Description When using the filesystem loader to load templates for which the name is a user input, it is possible to use the `source` or `include` statement to read arbitrary files from outside the templates directory when using a namespace like `@somewhere/../some.file` (in such a case, validation is bypassed). # ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'twig/twig'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.44.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'twig/twig'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.15.3'}]}]}, {'package...
[{'type': 'WEB', 'url': 'https://github.com/twigphp/Twig/security/advisories/GHSA-52m2-vc4m-jj33'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39261'}, {'type': 'WEB', 'url': 'https://github.com/twigphp/Twig/commit/35f3035c5deb0041da7b84daf02dea074ddc7a0b'}, {'type': 'WEB', 'url': 'https://g...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T05:29:36Z', 'nvd_published_at': '2022-09-28T14:15:00Z'}
1.4.0
GHSA-vx3x-hwph-grvw
2022-09-21T21:29:23Z
2022-09-21T00:00:52Z
null
['CVE-2022-3005']
YetiForce CRM vulnerable to stored Cross-site Scripting via SlaPolicy module
YetiForce CRM versions 6.4.0 and prior are vulnerable to cross-site scripting via the `SlaPolicy` module. A patch is available at commit e55886781509fe39951fc7528347696474a17884.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3005'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/e55886781509fe39951fc7528347696474a17884'}, {'type': 'PACKAGE', 'url': 'https://github.com/YetiForceCompany/YetiForceCRM'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:22:01Z', 'nvd_published_at': '2022-09-20T11:15:00Z'}
1.4.0
GHSA-c9h3-c6qj-hh7q
2022-09-23T17:08:42Z
2022-09-21T00:00:52Z
null
['CVE-2022-34917']
Apache Kafka vulnerability can lead to brokers hitting OutOfMemoryException, causing Denial of Service
A security vulnerability has been identified in Apache Kafka. It affects all releases since 2.8.0. The vulnerability allows malicious unauthenticated clients to allocate large amounts of memory on brokers. This can lead to brokers hitting OutOfMemoryException and causing denial of service. Example scenarios: - Kafka cl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34917'}, {'type': 'WEB', 'url': 'https://kafka.apache.org/cve-list'}]
{'cwe_ids': ['CWE-400', 'CWE-770', 'CWE-789'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:15:52Z', 'nvd_published_at': '2022-09-20T09:15:00Z'}
1.4.0
GHSA-fqfg-c577-2vc3
2022-09-30T23:04:02Z
2022-09-30T00:00:20Z
null
['CVE-2022-3364']
rdiffweb's unlimited length Fullname field can lead to DoS
rdiffweb prior to 2.5.0a3 does not validate email length, allowing users to insert an email longer than 255 characters. If a user signs up with an email with a length of 1 million or more characters and logs in, withdraws, or changes their email, the server may cause denial of service due to overload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0a3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3364'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/b62c479ff6979563c7c23e7182942bc4f460a2c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab...
{'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T23:04:02Z', 'nvd_published_at': '2022-09-29T21:15:00Z'}
1.4.0
GHSA-3637-v6vq-xqqw
2023-04-03T19:11:55Z
2022-09-16T19:29:31Z
null
['CVE-2022-31670']
Harbor fails to validate the user permissions when updating tag retention policies
### Impact Harbor fails to validate the user permissions when updating tag retention policies. API call: PUT /retentions/{id} By sending a request to update a tag retention policy with an id that belongs to a project that the currently authenticated user doesn’t have access to, the attacker could modify tag retent...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.10.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.12'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges'...
[{'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories/GHSA-3637-v6vq-xqqw'}, {'type': 'PACKAGE', 'url': 'https://github.com/goharbor/harbor'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:29:31Z', 'nvd_published_at': None}
1.4.0
GHSA-j3qw-g67q-7m64
2022-09-30T04:26:00Z
2022-09-25T00:00:27Z
null
['CVE-2022-33683']
Apache Pulsar Brokers and Proxies vulnerable to Improper Certificate Validation
Apache Pulsar Brokers and Proxies create an internal Pulsar Admin Client that does not verify peer TLS certificates, even when tlsAllowInsecureConnection is disabled via configuration. The Pulsar Admin Client's intra-cluster and geo-replication HTTPS connections are vulnerable to man in the middle attacks, which could ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar-broker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33683'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/42v5rsxj36r3nhfxhmhb2x12r5jmvx3x'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:26:00Z', 'nvd_published_at': '2022-09-23T10:15:00Z'}
1.4.0
GHSA-4qw4-jpp4-8gvp
2022-09-21T18:18:05Z
2022-09-21T18:18:05Z
null
[]
Unbounded resource exhaustion in cmark-gfm autolink extension may lead to denial of service
### Impact CommonMarker uses `cmark-gfm` for rendering [Github Flavored Markdown](https://github.github.com/gfm/). A polynomial time complexity issue in cmark-gfm's autolink extension may lead to unbounded resource exhaustion and subsequent denial of service. ### Patches This vulnerability has been patched in the fo...
[]
[{'package': {'ecosystem': 'RubyGems', 'name': 'commonmarker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gjtorikian/commonmarker/security/advisories/GHSA-4qw4-jpp4-8gvp'}, {'type': 'WEB', 'url': 'https://github.com/gjtorikian/commonmarker/pull/190'}, {'type': 'PACKAGE', 'url': 'https://github.com/gjtorikian/commonmarker'}, {'type': 'WEB', 'url': 'https://github.com/gjtorikian/co...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T18:18:05Z', 'nvd_published_at': None}
1.4.0
GHSA-2g5c-228j-p52x
2022-09-16T17:21:25Z
2022-09-16T17:21:25Z
null
['CVE-2022-36100']
XWiki Platform Applications Tag and XWiki Platform Tag UI vulnerable to Eval Injection
### Impact The tags document `Main.Tags` in XWiki didn't sanitize user inputs properly, allowing users with view rights on the document (default in a public wiki or for authenticated users on private wikis) to execute arbitrary Groovy, Python and Velocity code with programming rights. This allows bypassing all rights c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-tag-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform.applications:xwiki-application-tag'}, 'ranges': [{'type': 'ECOSYSTEM', 'event...
[{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2g5c-228j-p52x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36100'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/604868033ebd191cf2d1e94db336f0c4d9096427'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-116', 'CWE-94', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:21:25Z', 'nvd_published_at': '2022-09-08T21:15:00Z'}
1.4.0
GHSA-q76q-q8hw-hmpw
2023-09-27T13:16:00Z
2022-09-09T19:47:03Z
null
['CVE-2022-31671']
Harbor fails to validate the user permissions when reading job execution logs through the P2P preheat execution logs
### Impact Harbor fails to validate the user permissions when reading job execution logs through the P2P preheat execution logs - API call   GET /projects/{project_name}/preheat/policies/{preheat_policy_name}/executions/{execution_id}/tasks/{task_id}/logs By sending a request that attempts to read P2P preheat executi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.10.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.12'}}, {'package': {'ecosystem': '...
[{'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories/GHSA-q76q-q8hw-hmpw'}, {'type': 'PACKAGE', 'url': 'https://github.com/goharbor/harbor'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-09T19:47:03Z', 'nvd_published_at': None}
1.4.0
GHSA-qf7j-25g9-r63f
2022-09-10T02:26:45Z
2022-09-01T22:24:26Z
null
['CVE-2022-36058']
elrond-go MultiESDTNFTTransfer call on a SC address with missing function name
### Impact Anyone who uses elrond-go to process blocks (historical or actual) that contains a transaction like this: `MultiESDTNFTTransfer@01@54444558544b4b5955532d323631626138@00@0793afc18c8da2ca@` (mind the missing function name after the last `@`) Basic functionality like p2p messaging, storage, API requests and suc...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ElrondNetwork/elrond-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.34'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.33'}}]
[{'type': 'WEB', 'url': 'https://github.com/ElrondNetwork/elrond-go/security/advisories/GHSA-qf7j-25g9-r63f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36058'}, {'type': 'WEB', 'url': 'https://github.com/ElrondNetwork/elrond-go/commit/cb487fd7be2a2077638eb34ae771a73630c870c7'}, {'type': 'P...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:24:26Z', 'nvd_published_at': '2022-09-06T20:15:00Z'}
1.4.0
GHSA-7j3m-8g3c-9qqq
2022-09-19T19:03:26Z
2022-09-16T21:20:58Z
null
['CVE-2022-36014']
TensorFlow vulnerable to null-dereference in `mlir::tfg::TFOp::nameAttr`
### Impact When [`mlir::tfg::TFOp::nameAttr`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/ir/importexport/graphdef_import.cc) receives null type list attributes, it crashes. ```cpp StatusOr<unsigned> GraphDefImporter::ArgNumType(const NamedAttrList &attrs, ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7j3m-8g3c-9qqq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36014'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3a754740d5414e362512ee981eefba41561a63a6'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:20:58Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-237r-mx84-7x8c
2022-09-19T20:22:27Z
2022-09-16T17:11:31Z
null
['CVE-2022-36436']
VNCAuthProxy authentication bypass vulnerability
OSU Open Source Lab VNCAuthProxy through 1.1.1 is affected by an vncap/vnc/protocol.py VNCServerAuthenticator authentication-bypass vulnerability that could allow a malicious actor to gain unauthorized access to a VNC session or to disconnect a legitimate user from a VNC session. A remote attacker with network access t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'vncauthproxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36436'}, {'type': 'WEB', 'url': 'https://github.com/osuosl/twisted_vncauthproxy/commit/edc149af29242178091b2d6fcd42c3ef0851644b'}, {'type': 'WEB', 'url': 'https://cert.grnet.gr/en/blog/cve-2022-36436-twisted-vnc-authentication-proxy-authentication-...
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:11:31Z', 'nvd_published_at': '2022-09-14T11:15:00Z'}
1.4.0
GHSA-qm4w-4995-vg7f
2022-09-16T17:43:10Z
2022-09-16T17:43:10Z
null
['CVE-2022-36084']
cruddl vulnerable to ArangoDB Query Language (AQL) injection through flexSearch
### Impact If a vunerable version of cruddl is used to generate a schema that uses `@flexSearchFulltext`, users of that schema may be able to inject arbitrary AQL queries that will be forwarded to and executed by ArangoDB. Schemas that do not use `@flexSearchFulltext` are not affected. The attacker needs to have `RE...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'cruddl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'cruddl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '2.7.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/AEB-labs/cruddl/security/advisories/GHSA-qm4w-4995-vg7f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36084'}, {'type': 'WEB', 'url': 'https://github.com/AEB-labs/cruddl/pull/253'}, {'type': 'WEB', 'url': 'https://github.com/AEB-labs/cruddl/commit/...
{'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:43:10Z', 'nvd_published_at': '2022-09-08T22:15:00Z'}
1.4.0
GHSA-w62h-8xjm-fv49
2022-09-19T19:38:33Z
2022-09-16T21:19:15Z
null
['CVE-2022-35987']
TensorFlow vulnerable to `CHECK` fail in `DenseBincount`
### Impact `DenseBincount` assumes its input tensor `weights` to either have the same shape as its input tensor `input` or to be length-0. A different `weights` shape will trigger a `CHECK` fail that can be used to trigger a denial of service attack. ```python import tensorflow as tf binary_output = True input = tf.ran...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w62h-8xjm-fv49'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35987'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/bf4c14353c2328636a18bfad1e151052c81d5f43'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:19:15Z', 'nvd_published_at': '2022-09-16T22:15:00Z'}
1.4.0
GHSA-3jh2-wmv7-m932
2022-09-22T17:28:49Z
2022-09-18T00:00:30Z
null
['CVE-2022-3231']
LibreNMS stored Cross-site Scripting via Schedule Maintenance `Title` parameter
LibreNMS versions 22.8.0 and prior allow attackers to execute arbitrary JavaScript code via the Schedule Maintenance `Title` parameter. A patch is available and anticipated to be part of version 22.9.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 22.8.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3231'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/14360'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/08050020861230ff96a6507b309cc172a9e70af8'}, {'type': 'PACKAGE', 'url': 'https://github.com/libren...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T18:50:11Z', 'nvd_published_at': '2022-09-17T17:15:00Z'}
1.4.0
GHSA-xhmf-mmv2-4hhx
2022-09-16T20:59:43Z
2022-09-16T20:59:43Z
null
['CVE-2022-39213']
Go-CVSS has Out-of-bounds Read vulnerability in ParseVector function
### Impact When a full CVSS v2.0 vector string is parsed using `ParseVector`, an Out-of-Bounds Read is possible due to a lack of tests. The Go module will then panic. ### Patches The problem is patched in tag `v0.4.0`, by the commit `d9d478ff0c13b8b09ace030db9262f3c2fe031f4`. ### Workarounds The only way to avoid it ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pandatix/go-cvss'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pandatix/go-cvss/security/advisories/GHSA-xhmf-mmv2-4hhx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39213'}, {'type': 'WEB', 'url': 'https://github.com/pandatix/go-cvss/commit/d9d478ff0c13b8b09ace030db9262f3c2fe031f4'}, {'type': 'PACKAGE', 'url'...
{'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T20:59:43Z', 'nvd_published_at': '2022-09-15T22:15:00Z'}
1.4.0
GHSA-f36p-42jv-8rh2
2022-10-05T22:00:04Z
2022-09-30T04:53:37Z
null
[]
Lithium vulnerable to Cross Site Scripting in provided Swagger-UI
### Impact A XSS vulnerability in the provided (outdated) Swagger-UI is exploitable in applications using lithium with Swagger-UI enabled. This allows an attacker gain Remote Code Execution (RCE) and potentially exfiltrate secrets in the context of this swagger session. ### Patches The used swagger-ui was updated by...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.wire:lithium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.wire.bots:lithium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_k...
[{'type': 'WEB', 'url': 'https://github.com/wireapp/lithium/security/advisories/GHSA-f36p-42jv-8rh2'}, {'type': 'WEB', 'url': 'https://github.com/wireapp/lithium/commit/8b9b406d608fe482ec0e7adf8705834bca92d7df'}, {'type': 'PACKAGE', 'url': 'https://github.com/wireapp/lithium'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:53:37Z', 'nvd_published_at': None}
1.4.0
GHSA-28m8-9j7v-x499
2022-09-22T17:28:05Z
2022-09-16T19:28:49Z
null
['CVE-2022-39215']
Tauri's readDir Endpoint Scope can be Bypassed With Symbolic Links
### Impact Due to missing canonicalization when `readDir` is called recursively, it was possible to display directory listings outside of the defined `fs` scope. This required a crafted symbolic link or junction folder inside an allowed path of the `fs` scope. No arbitrary file content could be leaked. ### Patches Th...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'tauri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/security/advisories/GHSA-28m8-9j7v-x499'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39215'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/issues/4882'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/p...
{'cwe_ids': ['CWE-22', 'CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:28:49Z', 'nvd_published_at': '2022-09-15T22:15:00Z'}
1.4.0
GHSA-fjm8-m7m6-2fjp
2022-09-16T21:39:13Z
2022-09-14T00:00:48Z
null
['CVE-2022-2990']
Buildah's incorrect handling of the supplementary groups may lead to data disclosure, modification
An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/buildah'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.27.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2990'}, {'type': 'WEB', 'url': 'https://github.com/containers/buildah/pull/4200'}, {'type': 'WEB', 'url': 'https://github.com/containers/buildah/commit/4a8bf740e862f2438279c6feee2ea59ddf0cda0b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/se...
{'cwe_ids': ['CWE-842', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:24:17Z', 'nvd_published_at': '2022-09-13T14:15:00Z'}
1.4.0
GHSA-g43x-pcc9-f472
2022-12-05T22:12:31Z
2022-09-22T00:00:28Z
null
['CVE-2022-41226']
Jenkins Compuware Common Configuration Plugin vulnerable to Improper Restriction of XML External Entity Reference
Jenkins Compuware Common Configuration Plugin 1.0.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to change the contents of the Topaz Workbench CLI home directory on agents to have Jenkins parse a crafted file that uses external entities for ext...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-common-configuration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.14'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41226'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/compuware-common-configuration-plugin/pull/24'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/compuware-common-configuration-plugin/commit/351a46798cdc10479cb6966f05a51bc2174806a...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:29:17Z', 'nvd_published_at': '2022-09-21T16:15:00Z'}
1.4.0
GHSA-g35r-369w-3fqp
2022-09-19T19:24:30Z
2022-09-16T22:17:57Z
null
['CVE-2022-35970']
TensorFlow vulnerable to segfault in `QuantizedInstanceNorm`
### Impact If `QuantizedInstanceNorm` is given `x_min` or `x_max` tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack. ```python import tensorflow as tf output_range_given = False given_y_min = 0 given_y_max = 0 variance_epsilon = 1e-05 min_separation = 0.001 x = ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g35r-369w-3fqp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35970'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/785d67a78a1d533759fcd2f5e8d6ef778de849e0'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:17:57Z', 'nvd_published_at': '2022-09-16T21:15:00Z'}
1.4.0
GHSA-cv2p-32v3-vhwq
2022-09-19T19:09:56Z
2022-09-16T21:39:10Z
null
['CVE-2022-36003']
TensorFlow vulnerable to `CHECK` fail in `RandomPoissonV2`
### Impact When `RandomPoissonV2` receives large input shape and rates, it gives a `CHECK` fail that can trigger a denial of service attack. ```python import tensorflow as tf arg_0=tf.random.uniform(shape=(4,), dtype=tf.int32, maxval=65536) arg_1=tf.random.uniform(shape=(4, 4, 4, 4, 4), dtype=tf.float32, maxval=None) a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cv2p-32v3-vhwq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36003'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/552bfced6ce4809db5f3ca305f60ff80dd40c5a3'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:39:10Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-jf8p-3vjh-pq94
2023-04-03T19:21:49Z
2022-09-16T19:35:47Z
null
['CVE-2022-31666']
Harbor fails to validate the user permissions when viewing Webhook policies
### Impact Harbor fails to validate the user permissions to view Webhook policies including relevant credentials configured in different projects the user doesn’t have access to, resulting in malicious users being able to read Webhook policies of other users/projects. API call is   GET /projects/{project_name_or_id}/w...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.10.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.12'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges'...
[{'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories/GHSA-jf8p-3vjh-pq94'}, {'type': 'PACKAGE', 'url': 'https://github.com/goharbor/harbor'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:35:47Z', 'nvd_published_at': None}
1.4.0
GHSA-j95r-86hx-xwxg
2022-09-16T13:42:41Z
2022-09-10T00:00:27Z
null
['CVE-2022-36376']
Rank Math SEO plugin vulnerable to Server-Side Request Forgery
Server-Side Request Forgery (SSRF) vulnerability in Rank Math SEO plugin <= 1.0.95 at WordPress.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'rankmath/seo-by-rank-math'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.95'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36376'}, {'type': 'PACKAGE', 'url': 'https://github.com/rankmath/seo-by-rank-math'}, {'type': 'WEB', 'url': 'https://patchstack.com/database/vulnerability/seo-by-rank-math/wordpress-rank-math-seo-plugin-1-0-95-server-side-request-forgery-ssrf-vulne...
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T13:42:41Z', 'nvd_published_at': '2022-09-09T15:15:00Z'}
1.4.0
GHSA-9w3m-gqgf-c4p9
2022-09-13T21:29:45Z
2022-09-06T00:00:27Z
null
['CVE-2022-38752']
snakeYAML before 1.32 vulnerable to Denial of Service due to Out-of-bounds Write
Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DoS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.yaml:snakeyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.32'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38752'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/issues/531/stackoverflow-oss-fuzz-47081'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-f...
{'cwe_ids': ['CWE-121', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-13T21:29:45Z', 'nvd_published_at': '2022-09-05T10:15:00Z'}
1.4.0
GHSA-mgmh-g2v6-mqw5
2022-09-19T19:55:57Z
2022-09-16T21:18:42Z
null
['CVE-2022-35941']
TensorFlow vulnerable to `CHECK` failure in `AvgPoolOp`
### Impact The [`AvgPoolOp`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/avgpooling_op.cc#L56-L98) function takes an argument `ksize` that must be positive but is not checked. A negative `ksize` can trigger a `CHECK` failure and crash the program. ```py...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mgmh-g2v6-mqw5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35941'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3a6ac52664c6c095aa2b114e742b0aa17fdce78f'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:18:42Z', 'nvd_published_at': '2022-09-16T20:15:00Z'}
1.4.0
GHSA-62g7-fpv9-v95f
2022-10-03T22:14:32Z
2022-09-30T00:00:45Z
null
['CVE-2022-3355']
Inventree vulnerable to Stored Cross-site Scripting
Inventree prior to 0.8.3 is vulnerable to stored cross-site scripting by uploading SVG files. Version 0.8.3 contains a patch for this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'inventree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3355'}, {'type': 'WEB', 'url': 'https://github.com/inventree/inventree/commit/5a08ef908dd5344b4433436a4679d122f7f99e41'}, {'type': 'WEB', 'url': 'https://github.com/inventree/InvenTree/releases/tag/0.8.3'}, {'type': 'PACKAGE', 'url': 'https://githu...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-03T22:14:32Z', 'nvd_published_at': '2022-09-29T10:15:00Z'}
1.4.0
GHSA-p2xf-8hgm-hpw5
2022-09-19T19:40:01Z
2022-09-16T22:30:29Z
null
['CVE-2022-35984']
TensorFlow vulnerable to `CHECK` fail in `ParameterizedTruncatedNormal`
### Impact `ParameterizedTruncatedNormal` assumes `shape` is of type `int32`. A valid `shape` of type `int64` results in a mismatched type `CHECK` fail that can be used to trigger a denial of service attack. ```python import tensorflow as tf seed = 1618 seed2 = 0 shape = tf.random.uniform(shape=[3], minval=-10000, maxv...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p2xf-8hgm-hpw5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35984'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/72180be03447a10810edca700cbc9af690dfeb51'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:30:29Z', 'nvd_published_at': '2022-09-16T22:15:00Z'}
1.4.0
GHSA-gqqf-g5r7-84vf
2022-09-15T03:26:51Z
2022-09-15T03:26:51Z
null
[]
TYPO3 HTML Sanitizer Bypasses Cross-Site Scripting Protection
> ### Meta > * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.7) ### Problem Due to a parsing issue in upstream package [`masterminds/html5`](https://packagist.org/packages/masterminds/html5), malicious markup used in a sequence with special HTML comments cannot be filtered and sanitized. This a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.6.58'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.6.57'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': ...
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-gqqf-g5r7-84vf'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/d4f260570abd934fcf3819370a135bef33d729b7'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:26:51Z', 'nvd_published_at': None}
1.4.0
GHSA-x996-7qh9-7ff7
2022-10-10T17:04:26Z
2022-09-16T20:28:39Z
null
['CVE-2022-31006']
Hyperledger indy-node vulnerable to denial of service
### Impact An attacker can max out the number of client connections allowed by the ledger that was deployed using guidance provided in the indy-node repository, leaving the ledger unable to be used for its intended purpose. The ledger content will not be impacted by the attack, and the ledger will resume servicing va...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'indy-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.12.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/hyperledger/indy-node/security/advisories/GHSA-x996-7qh9-7ff7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31006'}, {'type': 'WEB', 'url': 'https://github.com/hyperledger/indy-node/commit/53a2a1bf1a26cb8ba710fd6adc8bcf275186a4b3'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T20:28:39Z', 'nvd_published_at': '2022-09-09T19:15:00Z'}
1.4.0
GHSA-c5xv-qc8p-mh2v
2022-09-23T20:52:26Z
2022-09-23T00:00:39Z
null
['CVE-2022-38398']
Apache Batik Server-Side Request Forgery
Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to load a url thru the jar protocol. This issue affects Apache XML Graphics Batik 1.14.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38398'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/xmlgraphics-batik'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/BATIK-1331'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/712c9xwtmyghyokzrm2ml6sps4xlmbsx...
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:52:26Z', 'nvd_published_at': '2022-09-22T15:15:00Z'}
1.4.0
GHSA-m77f-652q-wwp4
2022-09-19T19:22:47Z
2022-09-15T03:25:15Z
null
['CVE-2022-3212']
axum-core has no default limit put on request bodies
`<bytes::Bytes as axum_core::extract::FromRequest>::from_request` would not, by default, set a limit for the size of the request body. That meant if a malicious peer would send a very large (or infinite) body your server might run out of memory and crash. This also applies to these extractors which used `Bytes::from_r...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'axum-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.8'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'axum-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0-rc.1'}, {'fixed': '0.3.0-rc.2'}]}], 'versi...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3212'}, {'type': 'WEB', 'url': 'https://github.com/tokio-rs/axum/pull/1346'}, {'type': 'PACKAGE', 'url': 'https://github.com/tokio-rs/axum'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0055.html'}]
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:25:15Z', 'nvd_published_at': None}
1.4.0
GHSA-rfj2-q3h3-hm5j
2022-09-21T19:53:20Z
2022-09-16T17:12:30Z
null
['CVE-2022-36113']
Cargo extracting malicious crates can corrupt arbitrary files
The Rust Security Response WG was notified that Cargo did not prevent extracting some malformed packages downloaded from alternate registries. An attacker able to upload packages to an alternate registry could corrupt arbitary files when Cargo downloaded the package. The severity of this vulnerability is "low" for use...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'cargo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.65.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'cargo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [...
[{'type': 'WEB', 'url': 'https://github.com/rust-lang/cargo/security/advisories/GHSA-rfj2-q3h3-hm5j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36113'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/cargo/commit/15f1e4b0bf4b4fc20369e0a85d9b77957c4dd52a'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-22', 'CWE-59'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:12:30Z', 'nvd_published_at': '2022-09-14T18:15:00Z'}
1.4.0
GHSA-fv43-93gv-vm8f
2022-09-19T19:07:12Z
2022-09-16T21:59:08Z
null
['CVE-2022-36011']
TensorFlow vulnerable to null dereference on MLIR on empty function attributes
### Impact When [`mlir::tfg::ConvertGenericFunctionToFunctionDef`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/ir/importexport/functiondef_import.cc) is given empty function attributes, it gives a null dereference. ```cpp // Import the function attributes with a `tf.` prefix to match the curren...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fv43-93gv-vm8f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36011'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1cf45b831eeb0cab8655c9c7c5d06ec6f45fc41b'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:59:08Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-qrj3-hrgj-fm7r
2022-09-30T04:39:38Z
2022-09-27T00:00:17Z
null
['CVE-2022-3272']
rdiffweb's unlimited length email field can lead to DoS
rdiffweb prior to 2.4.8 does not validate email length, allowing users to insert an email longer than 255 characters. If a user signs up with an email with a length of 1 million or more characters and logs in, withdraws, or changes their email, the server may cause denial of service due to overload. Version 2.4.8 sets ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3272'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:39:38Z', 'nvd_published_at': '2022-09-26T17:16:00Z'}
1.4.0
GHSA-qxpx-j395-pw36
2022-09-19T19:26:56Z
2022-09-16T22:14:39Z
null
['CVE-2022-35965']
TensorFlow vulnerable to segfault in `LowerBound` and `UpperBound`
### Impact If `LowerBound` or `UpperBound` is given an empty`sorted_inputs` input, it results in a `nullptr` dereference, leading to a segfault that can be used to trigger a denial of service attack. ```python import tensorflow as tf out_type = tf.int32 sorted_inputs = tf.constant([], shape=[10,0], dtype=tf.float32) v...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qxpx-j395-pw36'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35965'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/bce3717eaef4f769019fd18e990464ca4a2efeea'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:14:39Z', 'nvd_published_at': '2022-09-16T21:15:00Z'}
1.4.0
GHSA-2hvr-h6gw-qrxp
2022-09-21T19:54:59Z
2022-09-16T17:12:05Z
null
['CVE-2022-36114']
Cargo extracting malicious crates can fill the file system
The Rust Security Response WG was notified that Cargo did not prevent extracting some malformed packages downloaded from alternate registries. An attacker able to upload packages to an alternate registry could fill the file system when Cargo downloaded the package. The severity of this vulnerability is "low" for users...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'cargo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.65.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'cargo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [...
[{'type': 'WEB', 'url': 'https://github.com/rust-lang/cargo/security/advisories/GHSA-2hvr-h6gw-qrxp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36114'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/cargo/commit/2b68d3c07a4a056264dc006ecb9f1354a0679cd3'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:12:05Z', 'nvd_published_at': '2022-09-14T18:15:00Z'}
1.4.0
GHSA-qhw4-wwr7-gjc5
2022-09-19T19:13:56Z
2022-09-16T22:09:57Z
null
['CVE-2022-35998']
TensorFlow vulnerable to `CHECK` fail in `EmptyTensorList`
### Impact If `EmptyTensorList` receives an input `element_shape` with more than one dimension, it gives a `CHECK` fail that can be used to trigger a denial of service attack. ```python import tensorflow as tf tf.raw_ops.EmptyTensorList(element_shape=tf.ones(dtype=tf.int32, shape=[1, 0]), max_num_elements=tf.constant(...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qhw4-wwr7-gjc5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35998'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c8ba76d48567aed347508e0552a257641931024d'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:09:57Z', 'nvd_published_at': '2022-09-16T23:15:00Z'}
1.4.0
GHSA-qv98-3369-g364
2022-09-15T03:20:35Z
2022-09-15T03:20:35Z
null
[]
KubeVirt vulnerable to arbitrary file read on host
### Impact Users with the permission to create VMIs can construct VMI specs which allow them to read arbitrary files on the host. There are three main attack vectors: 1. Some path fields on the VMI spec were not properly validated and allowed passing in relative paths which would have been mounted into the virt-launc...
[]
[{'package': {'ecosystem': 'Go', 'name': 'kubevirt.io/kubevirt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.20.0'}, {'fixed': '0.55.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/google/security-research/security/advisories/GHSA-cvx8-ppmc-78hm'}, {'type': 'WEB', 'url': 'https://github.com/kubevirt/kubevirt/security/advisories/GHSA-qv98-3369-g364'}, {'type': 'WEB', 'url': 'https://github.com/kubevirt/kubevirt/pull/8198'}, {'type': 'WEB', 'url': 'https:...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:20:35Z', 'nvd_published_at': None}
1.4.0
GHSA-hhqj-cfjx-vj25
2022-03-10T16:00:14Z
2022-03-02T00:00:20Z
null
['CVE-2022-0776']
Cross site scripting in reveal.js
The onmessage event listener in /plugin/notes/speaker-view.html does not check the origin of postMessage before adding the content to the webpage. The vulnerable code allows any origin to postMessage on the browser window and feeds attacker's input to parts using which attacker can execute arbitrary javascript code on ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'reveal.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0776'}, {'type': 'WEB', 'url': 'https://github.com/hakimel/reveal.js/commit/32cdd3b1872ba8e2267c9e87ae216cb55f40f4d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/hakimel/reveal.js'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/be2b7ee4-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-02T21:28:45Z', 'nvd_published_at': '2022-03-01T09:15:00Z'}
1.4.0
GHSA-r5hc-wm3g-hjw6
2022-03-18T20:42:54Z
2022-03-01T22:01:30Z
null
['CVE-2022-0768']
Server-Side Request Forgery (SSRF) in rudloff/alltube
### Impact Releases prior to 3.0.2 are vulnerable to a Server-Side Request Forgery vulnerability that allows an attacker to send a request to an internal hostname. ### Patches 3.0.2 contains a fix for this vulnerability. (The 1.x and 2.x releases are not maintained anymore.) Part of the fix requires applying [a patch...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'rudloff/alltube'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Rudloff/alltube/security/advisories/GHSA-r5hc-wm3g-hjw6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0768'}, {'type': 'WEB', 'url': 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d'}, {'type': 'WEB', 'url': 'http...
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:01:30Z', 'nvd_published_at': '2022-02-28T10:15:00Z'}
1.4.0
GHSA-pcwq-7wrw-r8jv
2022-03-14T23:02:20Z
2022-03-05T00:00:45Z
null
['CVE-2020-18325']
Cross-site Scripting in intelliants/subrion
Multilple Cross Site Scripting (XSS) vulnerability exists in Intelliants Subrion CMS v4.2.1 in the Configuration panel.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-18325'}, {'type': 'WEB', 'url': 'https://github.com/hamm0nz/CVE-2020-18325'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:02:20Z', 'nvd_published_at': '2022-03-04T15:15:00Z'}
1.4.0
GHSA-fh5v-5f35-2rv2
2022-06-29T12:15:59Z
2022-03-17T00:00:44Z
null
['CVE-2021-20180']
Insertion of Sensitive Information into Log File in ansible
A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentia...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0a1'}, {'fixed': '2.8.19'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0b1'}, {'fixed': '2.9.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20180'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/73242'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/73243'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1915808'}, {'type': 'PACK...
{'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T12:15:59Z', 'nvd_published_at': '2022-03-16T15:15:00Z'}
1.4.0
GHSA-w6cx-qg2q-rvq8
2022-03-10T15:58:38Z
2022-03-01T22:09:18Z
null
['CVE-2022-24718']
Path Traversal in @finastra/ssr-pages
A path traversal issue can occur when providing untrusted input to the `svg` property as an argument to the `build(MessagePageOptions)` function. ### References - https://github.com/Finastra/ssr-pages/pull/1 - https://github.com/Finastra/ssr-pages/pull/1/commits/c3e4c563384ae3ba3892f37dd190218577620780
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': '@finastra/ssr-pages'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Finastra/ssr-pages/security/advisories/GHSA-w6cx-qg2q-rvq8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24718'}, {'type': 'WEB', 'url': 'https://github.com/Finastra/ssr-pages/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/Finastra/ssr-pages/...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:09:18Z', 'nvd_published_at': '2022-03-01T19:15:00Z'}
1.4.0
GHSA-9988-f88m-mr42
2022-03-28T22:34:41Z
2022-03-12T00:00:37Z
null
['CVE-2022-25512']
Exposure of Sensitive Information to an Unauthorized Actor in FreeTAKServer-UI
FreeTAKServer-UI v1.9.8 was discovered to leak sensitive API and Websocket keys.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'FreeTAKServer-UI'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25512'}, {'type': 'WEB', 'url': 'https://github.com/FreeTAKTeam/UI/issues/26'}, {'type': 'PACKAGE', 'url': 'https://github.com/FreeTAKTeam/UI'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:14:56Z', 'nvd_published_at': '2022-03-11T00:15:00Z'}
1.4.0
GHSA-g795-4hxx-qqwm
2022-03-28T20:39:40Z
2022-03-16T00:00:47Z
null
['CVE-2022-0893']
Cross-site Scripting in Pimcore
Pimcore prior to 10.4.0 is vulnerable to stored cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0893'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/11447'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pi...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T20:39:40Z', 'nvd_published_at': '2022-03-15T11:15:00Z'}
1.4.0
GHSA-pr9q-v585-qv2w
2022-03-30T20:03:55Z
2022-03-19T00:01:00Z
null
['CVE-2022-24637']
Improper Privilege Management in Open Web Analytics
Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '<?php (instead of the intended "<?php sequence) aren't handled by the PHP interpreter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'open-web-analytics/open-web-analytics'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24637'}, {'type': 'WEB', 'url': 'https://devel0pment.de/?p=2494'}, {'type': 'PACKAGE', 'url': 'https://github.com/Open-Web-Analytics/Open-Web-Analytics'}, {'type': 'WEB', 'url': 'https://github.com/Open-Web-Analytics/Open-Web-Analytics/releases/tag...
{'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T20:03:55Z', 'nvd_published_at': '2022-03-18T16:15:00Z'}
1.4.0
GHSA-qmfc-6www-fjqw
2022-03-18T17:57:04Z
2022-03-18T17:57:04Z
null
['CVE-2021-30181']
Code injection in Apache Dubbo
Apache Dubbo prior to 2.6.9 and 2.7.10 supports Script routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these rules, Dubbo customers use ScriptEngine and run the rule provided by t...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.6.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.7.10'}]}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30181'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re22410dc704a09bc7032ddf15140cf5e7df3e8ece390fc9032ff5587%40%3Cdev.dubbo.apache.org%3E'}]
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T20:15:20Z', 'nvd_published_at': '2021-06-01T14:15:00Z'}
1.4.0
GHSA-cm9w-c4rj-r2cf
2022-03-11T20:08:41Z
2022-03-02T22:24:05Z
null
['CVE-2022-24722']
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in view_component
This is an XSS vulnerability that has the potential to impact anyone using translations with the view_component gem. Data received via user input and passed as an interpolation argument to the `translate` method is not properly sanitized before display. Versions 2.29.1 and 2.49.1 have been released and fully mitigate ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'view_component'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.31.0'}, {'fixed': '2.31.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'view_component'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.32.0'}, {'fixed': '2.49.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/github/view_component/security/advisories/GHSA-cm9w-c4rj-r2cf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24722'}, {'type': 'WEB', 'url': 'https://github.com/github/view_component/commit/3f82a6e62578ff6f361aba24a1feb2caccf83ff9'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-02T22:24:05Z', 'nvd_published_at': '2022-03-02T23:15:00Z'}
1.4.0
GHSA-5mpf-hw8f-86w9
2022-11-30T20:44:33Z
2022-03-16T00:00:45Z
null
['CVE-2022-27195']
Sensitive parameter values captured in build metadata files by Jenkins Parameterized Trigger Plugin
Jenkins Parameterized Trigger Plugin 2.43 and earlier captures environment variables passed to builds triggered using Jenkins Parameterized Trigger Plugin, including password parameter values, in their `build.xml` files. These values are stored unencrypted and can be viewed by users with access to the Jenkins controlle...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:parameterized-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.43.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27195'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/parameterized-trigger-plugin/commit/6b7cd2272cbd9f97416bff7ea19132b9aad0898d'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/parameterized-trigger-plugin'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-532'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:44:33Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-jc4v-vvg6-xg78
2022-04-01T17:14:52Z
2022-03-29T00:01:16Z
null
['CVE-2021-26599']
SQL Injection in ImpressCMS
ImpressCMS before 1.4.3 allows include/findusers.php groups SQL Injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26599'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1081145'}, {'type': 'PACKAGE', 'url': 'https://github.com/ImpressCMS/impresscms'}, {'type': 'WEB', 'url': 'https://github.com/ImpressCMS/impresscms/releases/tag/v1.4.3'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T17:14:52Z', 'nvd_published_at': '2022-03-28T01:15:00Z'}
1.4.0
GHSA-p94q-9q2m-pfh2
2022-09-08T00:00:35Z
2022-03-04T00:00:17Z
null
['CVE-2022-23898']
SQL injection in net.mingsoft:ms-mcms
MCMS v5.2.5 was discovered to contain a SQL injection vulnerability via the categoryId parameter in the file IContentDao.xml.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23898'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/62'}, {'type': 'PACKAGE', 'url': 'https://github.com/ming-soft/MCMS'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-08T00:00:35Z', 'nvd_published_at': '2022-03-03T19:15:00Z'}
1.4.0
GHSA-wj78-8xrx-phr7
2022-11-30T20:13:37Z
2022-03-16T00:00:43Z
null
['CVE-2022-27207']
Stored Cross-site Scripting vulnerability in Jenkins global-build-stats Plugin
Jenkins global-build-stats Plugin 1.5 and earlier does not escape multiple fields in the chart configuration on the 'Global Build Stats' page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:global-build-stats'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27207'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/global-build-stats-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-1886'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-s...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:13:37Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-8p4x-fq8v-xhv4
2022-11-29T23:22:23Z
2022-03-30T00:00:26Z
null
['CVE-2022-28146']
Arbitrary file read vulnerability in Jenkins Continuous Integration with Toad Edge Plugin
Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Item/Configure permission to read arbitrary files on the Jenkins controller by specifying an input folder on the Jenkins controller as a parameter to its build steps.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ci-with-toad-edge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28146'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ci-with-toad-edge-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2633'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T23:22:23Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-ghm8-mmx7-xvg2
2022-03-18T17:53:58Z
2022-03-18T17:53:58Z
null
['CVE-2021-30638']
Information Exposure in Apache Tapestry
Information Exposure vulnerability in context asset handling of Apache Tapestry allows an attacker to download files inside WEB-INF if using a specially-constructed URL. This was caused by an incomplete fix for CVE-2020-13953. This issue affects Apache Tapestry Apache Tapestry 5.4.0 version to Apache Tapestry 5.6.3; Ap...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0'}, {'fixed': '5.6.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.7....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30638'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r37dab61fc7f7088d4311e7f995ef4117d58d86a675f0256caa6991eb%40%3Cusers.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0004/'},...
{'cwe_ids': ['CWE-200', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T22:06:22Z', 'nvd_published_at': '2021-04-27T19:15:00Z'}
1.4.0
GHSA-h6h5-6fmq-rh28
2022-03-24T00:12:46Z
2022-03-24T00:12:46Z
null
['CVE-2022-24731']
Path traversal allows leaking out-of-bound files from Argo CD repo-server
### Impact All unpatched versions of Argo CD starting with v1.5.0 are vulnerable to a path traversal vulnerability allowing a malicious user with read/write access to leak sensitive files from Argo CD's repo-server. A malicious Argo CD user who has been granted [`create` or `update` access to Applications](https://ar...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '2.1.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2...
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-h6h5-6fmq-rh28'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24731'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}]
{'cwe_ids': ['CWE-22', 'CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-24T00:12:46Z', 'nvd_published_at': '2022-03-23T21:15:00Z'}
1.4.0
GHSA-phrq-v4q2-hmq6
2023-09-21T20:00:55Z
2022-03-26T00:15:22Z
null
['CVE-2020-13756']
Sabberworm PHP CSS Parser Code injection vulnerability in allSelectors()
Sabberworm PHP CSS Parser before 8.3.1 calls eval on uncontrolled data, possibly leading to remote code execution if the function allSelectors() or getSelectorsBySpecificity() is called with input from an attacker.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'sabberworm/php-css-parser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.3.0'}, {'fixed': '8.3.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sabberworm/php-css-parser'}, 'ecosystem_specific'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13756'}, {'type': 'WEB', 'url': 'https://github.com/sabberworm/PHP-CSS-Parser/commit/2ebf59e8bfbf6cfc1653a5f0ed743b95062c62a4'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sabberworm/php-css-parser/CVE-2...
{'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:15:22Z', 'nvd_published_at': None}
1.4.0
GHSA-5w9c-rv96-fr7g
2022-03-22T20:33:40Z
2022-03-22T19:28:24Z
null
[]
Removal of functional code in faker.js
Faker.js helps users create large amounts of data for testing and development. The maintainer deliberately removed the functional code from this package. This appears to be a purposeful and successful attempt to make the package unusable. This is related to the colors.js [CVE-2021-23567](https://github.com/advisories/G...
[]
[{'package': {'ecosystem': 'npm', 'name': 'faker'}, 'versions': ['6.6.6']}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23567'}, {'type': 'WEB', 'url': 'https://github.com/Marak/colors.js/issues/285'}, {'type': 'WEB', 'url': 'https://github.com/Marak/colors.js/issues/285%23issuecomment-1008212640'}, {'type': 'WEB', 'url': 'https://github.com/Marak/colors.js/commit/0...
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-22T19:28:24Z', 'nvd_published_at': None}
1.4.0
GHSA-fpxq-w7p9-r924
2022-11-30T20:10:36Z
2022-03-16T00:00:42Z
null
['CVE-2022-27208']
Arbitrary file read vulnerability in Jenkins kubernetes-cd Plugin
Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows users with Credentials/Create permission to read arbitrary files on the Jenkins controller.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:kubernetes-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27208'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2096'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/15/2'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:10:36Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-hqq7-2q2v-82xq
2022-03-21T17:20:05Z
2022-03-17T00:00:24Z
null
['CVE-2021-23648']
Cross-site Scripting in sanitize-url
The package `@braintree/sanitize-url` before 6.0.0 is vulnerable to Cross-site Scripting (XSS) due to improper sanitization in the `sanitizeUrl` function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@braintree/sanitize-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23648'}, {'type': 'WEB', 'url': 'https://github.com/braintree/sanitize-url/pull/40'}, {'type': 'WEB', 'url': 'https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183'}, {'type': 'PACKAGE', 'url': 'https://...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-19T00:01:56Z', 'nvd_published_at': '2022-03-16T16:15:00Z'}
1.4.0
GHSA-p4v2-r99v-wjc2
2023-09-05T19:58:23Z
2022-03-16T00:00:38Z
null
['CVE-2021-45848']
Nicotine+ DoS on Null Character in Download Request
Denial of service (DoS) vulnerability in Nicotine+ starting with version 3.0.3 and prior to version 3.2.1 allows a user with a modified Soulseek client to crash Nicotine+ by sending a file download request with a file path containing a null character.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'nicotine-plus'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.3'}, {'fixed': '3.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45848'}, {'type': 'WEB', 'url': 'https://github.com/nicotine-plus/nicotine-plus/issues/1777'}, {'type': 'WEB', 'url': 'https://github.com/nicotine-plus/nicotine-plus/commit/0e3e2fac27a518f0a84330f1ddf1193424522045'}, {'type': 'PACKAGE', 'url': 'htt...
{'cwe_ids': ['CWE-116'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T15:19:03Z', 'nvd_published_at': '2022-03-15T19:15:00Z'}
1.4.0
GHSA-22hc-47cc-7x6f
2022-03-28T21:38:55Z
2022-03-16T00:00:48Z
null
['CVE-2022-0894']
Cross-site Scripting in Pimcore
Pimcore prior to 10.4.0 is vulnerable to stored cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.4.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0894'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/11447'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pi...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T21:38:55Z', 'nvd_published_at': '2022-03-15T11:15:00Z'}
1.4.0
GHSA-q7rv-6hp3-vh96
2023-04-13T13:57:05Z
2022-03-25T19:26:33Z
null
['CVE-2022-24775']
Improper Input Validation in guzzlehttp/psr7
### Impact Improper header parsing. An attacker could sneak in a carriage return character (`\r`) and pass untrusted values in both the header names and values. ### Patches The issue is patched in 1.8.4 and 2.1.1. ### Workarounds There are no known workarounds. ### References * https://www.rfc-editor.org/rfc/rfc...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/psr7'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/psr7'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24775'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1'}, {'type': 'WEB', 'url': 'h...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-25T19:26:33Z', 'nvd_published_at': '2022-03-21T19:15:00Z'}
1.4.0
GHSA-p737-p57g-4cpr
2022-03-25T19:20:39Z
2022-03-25T19:20:39Z
null
['CVE-2022-24757']
Insertion of Sensitive Information into Log File in Jupyter notebook
### Impact _What kind of vulnerability is it?_ Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter Server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'jupyter-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-p737-p57g-4cpr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24757'}, {'type': 'WEB', 'url': 'https://github.com/jupyter-server/jupyter_server/commit/a5683aca0b0e412672ac6218d09f74d44ca0de5a'},...
{'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-25T19:20:39Z', 'nvd_published_at': '2022-03-23T21:15:00Z'}
1.4.0
GHSA-29rv-fqx2-4c9f
2022-09-07T23:58:29Z
2022-03-18T00:01:10Z
null
['CVE-2022-0749']
Deserialization of Untrusted Data in SinGooCMS.Utility
This affects all versions of package SinGooCMS.Utility. The socket client in the package can pass in the payload via the user-controllable input after it has been established, because this socket client transmission does not have the appropriate restrictions or type bindings for the BinaryFormatter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'SinGooCMS.Utility'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0749'}, {'type': 'WEB', 'url': 'https://github.com/SinGooCMS/SinGooCMSUtility/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/SinGooCMS/SinGooCMSUtility/blob/master/SinGooCMS.Utility/Net/SocketClient.cs'}, {'type': 'WEB', 'url': 'https://sny...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-07T23:58:29Z', 'nvd_published_at': '2022-03-17T12:15:00Z'}
1.4.0
GHSA-3qr6-qrqm-8v86
2022-03-30T20:02:35Z
2022-03-23T00:00:23Z
null
['CVE-2022-1036']
Integer Overflow or Wraparound in Microweber
In Microweber prior to 1.2.12, a user can create an account with a password thousands of characters in length, leading to memory corruption/integer overflow. Version 1.2.2 sets maximum password length at 500 characters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1036'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/82be4f0b4729be870ccefdae99a04833f134aa6a'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d...
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T20:00:03Z', 'nvd_published_at': '2022-03-22T13:15:00Z'}
1.4.0
GHSA-65f3-3278-7m65
2023-06-30T22:10:59Z
2022-03-12T00:00:34Z
2023-06-30T22:10:59Z
[]
Duplicate Advisory: Improper Authorization in Gogs
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-gw5h-h6hj-f56g. This link is maintained to preserve external references. ## Original Description ### Impact Expired PAM accounts and accounts with expired passwords are continued to be seen as valid. Installations use PAM as auth...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0871'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/64102be2c90e1b47dbdd379873ba76c80d4b0e78'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0...
{'cwe_ids': ['CWE-285', 'CWE-862', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:58:34Z', 'nvd_published_at': '2022-03-11T12:15:00Z'}
1.4.0
GHSA-q9qc-pp5x-mc8c
2022-03-14T21:01:04Z
2022-03-10T00:00:40Z
null
['CVE-2022-0896']
Improper Neutralization of Special Elements Used in a Template Engine in microweber
Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository microweber/microweber prior to 1.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0896'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/e0224462b3dd6b1f7c6ec1197413afc6019bc3b5'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1...
{'cwe_ids': ['CWE-1336', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T21:46:29Z', 'nvd_published_at': '2022-03-09T12:15:00Z'}
1.4.0
GHSA-r6hh-5g3q-wwgc
2022-03-28T22:27:36Z
2022-03-16T00:00:45Z
null
['CVE-2022-0970']
Stored Cross-site Scripting in grav
Grav prior to 1.7.31 is vulnerable to stored cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.31'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0970'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/f19297d5f70476e7bedae9f2acef6b43615538b8'}, {'type': 'PACKAGE', 'url': 'https://github.com/getgrav/grav'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/dd436c44-cbf4-48ac-...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:28:09Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-69p3-xp37-f692
2022-04-08T21:45:06Z
2022-03-26T00:00:29Z
null
['CVE-2022-0759']
Improper Certificate Validation in kubeclient
A flaw was found in all versions of kubeclient up to (but not including) v4.9.3, the Ruby client for Kubernetes REST API, in the way it parsed kubeconfig files. When the kubeconfig file does not configure custom CA to verify certs, kubeclient ends up accepting any certificate (it wrongly returns VERIFY_NONE). Ruby appl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'kubeclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0759'}, {'type': 'WEB', 'url': 'https://github.com/ManageIQ/kubeclient/issues/554'}, {'type': 'WEB', 'url': 'https://github.com/ManageIQ/kubeclient/issues/555'}, {'type': 'WEB', 'url': 'https://github.com/ManageIQ/kubeclient/pull/556'}, {'type': 'W...
{'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T13:12:44Z', 'nvd_published_at': '2022-03-25T19:15:00Z'}
1.4.0
GHSA-4fx9-vc88-q2xc
2022-03-11T23:39:27Z
2022-03-11T23:39:27Z
null
[]
Infinite loop in Pillow
JpegImagePlugin may append an EOF marker to the end of a truncated file, so that the last segment of the data will still be processed by the decoder. If the EOF marker is not detected as such however, this could lead to an infinite loop where JpegImagePlugin keeps trying to end the file.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/baae9ec4b67c68e3adaf1208cf54e8de5e38a6fd'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#ensure-jpegimageplugin-stops-at-the-end-of-a-...
{'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T23:39:27Z', 'nvd_published_at': None}
1.4.0
GHSA-f8xq-q7px-wg8c
2022-03-18T23:11:43Z
2022-03-18T23:11:43Z
null
['CVE-2022-24770']
Improper Neutralization of Formula Elements in a CSV File in Gradio Flagging
### Impact The `gradio` library has a flagging functionality which saves input/output data into a CSV file on the developer's computer. This can allow a user to save arbitrary text into the CSV file, such as commands. If a program like MS Excel opens such a file, then it automatically runs these commands, which could l...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'gradio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.11'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/security/advisories/GHSA-f8xq-q7px-wg8c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24770'}, {'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/pull/817'}, {'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/c...
{'cwe_ids': ['CWE-1236'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:11:43Z', 'nvd_published_at': '2022-03-17T21:15:00Z'}
1.4.0
GHSA-mh27-rxmr-8q4c
2022-04-07T21:57:01Z
2022-03-30T00:00:23Z
null
['CVE-2022-28153']
Cross-site Scripting in Jenkins SiteMonitor Plugin
Jenkins SiteMonitor Plugin 0.6 and earlier does not escape URLs of sites to monitor in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:sitemonitor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28153'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/sitemonitor-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1932'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T21:57:01Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-w4f3-7f7c-x652
2022-03-18T17:49:01Z
2022-03-18T17:49:01Z
null
['CVE-2021-26830']
SQL Injection in tribalsystems/zenario
SQL Injection in Tribalsystems Zenario CMS 8.8.52729 and prior allows remote attackers to access the database or delete the plugin. This is accomplished via the `ID` input field of ajax.php in the `Pugin library - delete` module.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.8.53370'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26830'}, {'type': 'WEB', 'url': 'https://github.com/TribalSystems/Zenario/commit/2c82a4d126c8446106347ef603b157f2d4175fd1'}, {'type': 'WEB', 'url': 'https://edhunter484.medium.com/blind-sql-injection-on-zenario-cms-b58b6820c32d'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T22:39:06Z', 'nvd_published_at': '2021-04-16T18:15:00Z'}