schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-7cgv-v83v-rr87 | 2022-09-27T08:12:04Z | 2022-09-23T00:00:46Z | null | ['CVE-2022-40186'] | HashiCorp Vault vulnerable to incorrect metadata access | An issue was discovered in HashiCorp Vault and Vault Enterprise before 1.11.3. A vulnerability in the Identity Engine was found where, in a deployment where an entity has multiple mount accessors with shared alias names, Vault may overwrite metadata to the wrong alias due to an issue with checking the proper alias assi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/vault'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40186'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2022-18-vault-entity-alias-metadata-may-leak-between-aliases-with-the-same-name-assigned-to-the-same-entity/44550'}, {'t... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:58:54Z', 'nvd_published_at': '2022-09-22T01:15:00Z'} |
1.4.0 | GHSA-wqmc-pm8c-2jhc | 2022-09-21T19:15:28Z | 2022-09-16T21:57:05Z | null | ['CVE-2022-36017'] | TensorFlow vulnerable to segfault in `Requantize` | ### Impact
If `Requantize` is given `input_min`, `input_max`, `requested_output_min`, `requested_output_max` tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
out_type = tf.quint8
input = tf.constant([1], shape=[3], dtype=tf.qi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wqmc-pm8c-2jhc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36017'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/785d67a78a1d533759fcd2f5e8d6ef778de849e0'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:57:05Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-cmr8-5w4c-44v8 | 2022-09-21T19:22:40Z | 2022-09-20T20:45:10Z | null | ['CVE-2022-39218'] | Fastly Compute@Edge JS Runtime has fixed random number seed during compilation | ### Impact
`Math.random` and `crypto.getRandomValues` methods failed to use sufficiently random values. The initial value to seed the CSPRNG (cryptographically secure pseudorandom number generator) was baked-in to the final WebAssembly module meaning the sequence of numbers generated was predictable for that specific ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@fastly/js-compute'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.4.0'}, {'fixed': '0.5.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/fastly/js-compute-runtime/security/advisories/GHSA-cmr8-5w4c-44v8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39218'}, {'type': 'WEB', 'url': 'https://github.com/fastly/js-compute-runtime/commit/65524ffc962644e9fc39f4b368a326b6253912a9'}, {'type'... | {'cwe_ids': ['CWE-330', 'CWE-335'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T20:45:10Z', 'nvd_published_at': '2022-09-20T20:15:00Z'} |
1.4.0 | GHSA-r657-33vp-gp22 | 2022-09-21T20:43:57Z | 2022-09-21T20:43:57Z | null | ['CVE-2022-39231'] | parse-server auth adapter app ID validation can be circumvented | ### Impact
Validation of the authentication adapter app ID for _Facebook_ and _Spotify_ may be circumvented.
This fixes a vulnerability that affects configurations which allow users to authenticate using the Parse Server authentication adapter for _Facebook_ or _Spotify_ and where the server-side authentication adapt... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.16'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-r657-33vp-gp22'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39231'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/8c8ec715739e0f851338cfed794409ebac66c51b'}, {... | {'cwe_ids': ['CWE-287'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T20:43:57Z', 'nvd_published_at': '2022-09-23T08:15:00Z'} |
1.4.0 | GHSA-84jm-4cf3-9jfm | 2022-09-19T19:27:43Z | 2022-09-16T22:13:23Z | null | ['CVE-2022-35963'] | TensorFlow vulnerable to `CHECK` failures in `FractionalAvgPoolGrad` | ### Impact
The implementation of `FractionalAvgPoolGrad` does not fully validate the input `orig_input_tensor_shape`. This results in an overflow that results in a `CHECK` failure which can be used to trigger a denial of service attack.
```python
import tensorflow as tf
overlapping = True
orig_input_tensor_shape = tf... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-84jm-4cf3-9jfm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35963'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/03a659d7be9a1154fdf5eeac221e5950fec07dad'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:13:23Z', 'nvd_published_at': '2022-09-16T20:15:00Z'} |
1.4.0 | GHSA-c9qr-f6c8-rgxf | 2022-09-30T23:07:07Z | 2022-09-29T00:00:26Z | null | ['CVE-2022-40082'] | Hertz contains path traversal via normalizePath function | Hertz is a a high-performance and strong-extensibility Go HTTP framework that helps developers build microservices. Versions of Hertz prior to 0.3.1 contain a path traversal vulnerability via the normalizePath function. This issue has been patched in 0.3.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudwego/hertz'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40082'}, {'type': 'WEB', 'url': 'https://github.com/cloudwego/hertz/issues/228'}, {'type': 'WEB', 'url': 'https://github.com/cloudwego/hertz/pull/229'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudwego/hertz'}, {'type': 'WEB', 'url': 'https... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T23:07:07Z', 'nvd_published_at': '2022-09-28T14:15:00Z'} |
1.4.0 | GHSA-p75v-367r-2v23 | 2022-09-16T21:08:19Z | 2022-09-16T21:08:19Z | null | [] | `cell-project` used incorrect variance when projecting through `&Cell<T>` | ## Overview
The issue lies in the implementation of the `cell_project` macro which used `field as *const _` instead of `field as *mut _`.
The problem being that `*const T` is covariant in `T` while `*mut T` is invariant in `T`. Keep in mind that `&Cell<T>` is invariant in `T`,
so casting to `*const T` relaxed the vari... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'cell-project'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/RustyYato/cell-project/issues/3'}, {'type': 'WEB', 'url': 'https://github.com/RustyYato/cell-project/pull/4'}, {'type': 'PACKAGE', 'url': 'https://github.com/RustyYato/cell-project'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2020-0164.html'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:08:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-g9h5-vr8m-x2h4 | 2022-09-19T19:12:50Z | 2022-09-16T21:25:53Z | null | ['CVE-2022-35995'] | TensorFlow vulnerable to `CHECK` fail in `AudioSummaryV2` | ### Impact
When `AudioSummaryV2` receives an input `sample_rate` with more than one element, it gives a `CHECK` fails that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
arg_0=''
arg_1=tf.random.uniform(shape=(1,1), dtype=tf.float32, maxval=None)
arg_2=tf.random.uniform(shape=(2,1)... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g9h5-vr8m-x2h4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35995'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/bf6b45244992e2ee543c258e519489659c99fb7f'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:25:53Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-m69r-9g56-7mv8 | 2023-09-06T18:54:15Z | 2022-09-25T00:00:27Z | null | ['CVE-2022-40716'] | HashiCorp Consul vulnerable to authorization bypass | HashiCorp Consul and Consul Enterprise versions prior to 1.11.9, 1.12.5, and 1.13.2 do not check for multiple SAN URI values in a CSR on the internal RPC endpoint, enabling leverage of privileged access to bypass service mesh intentions. A specially crafted CSR sent directly to Consul’s internal server agent RPC endpoi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.9'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/hashicorp/consul'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.12.0'}, {'fixed': '1.12... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40716'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/pull/14579'}, {'type': 'WEB', 'url': 'https://github.com/hashicorp/consul/commit/8f6fb4f6fe9488b8ec37da71ac503081d7d3760b'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com'... | {'cwe_ids': ['CWE-252'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-29T14:39:58Z', 'nvd_published_at': '2022-09-23T12:15:00Z'} |
1.4.0 | GHSA-fffr-7x4x-f98q | 2022-09-16T17:16:46Z | 2022-09-16T17:16:46Z | null | ['CVE-2022-36104'] | TYPO3 CMS vulnerable to Denial of Service in Page Error Handling | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H/E:F/RL:O/RC:C` (5.5)
### Problem
Requesting invalid or non-existing resources via HTTP triggers the page error handler which again could retrieve content to be shown as an error message from another page. This leads to a scenario in which the applicat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.4.0'}, {'fixed': '11.5.16'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.4.0'}, {'fixed': '11.5.16'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-fffr-7x4x-f98q'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36104'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/179dd7cd78947081d573fee2050e197faa556f13'}, {'type': 'WEB', 'url': 'https://git... | {'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:16:46Z', 'nvd_published_at': '2022-09-13T18:15:00Z'} |
1.4.0 | GHSA-wr9v-g9vf-c74v | 2022-09-19T19:39:16Z | 2022-09-16T22:29:01Z | null | ['CVE-2022-35986'] | TensorFlow vulnerable to segfault in `RaggedBincount` | ### Impact
If `RaggedBincount` is given an empty input tensor `splits`, it results in a segfault that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
binary_output = True
splits = tf.random.uniform(shape=[0], minval=-10000, maxval=10000, dtype=tf.int64, seed=-7430)
values = tf.rando... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-wr9v-g9vf-c74v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35986'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/7a4591fd4f065f4fa903593bc39b2f79530a74b8'}, {'type': 'PACKA... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:29:01Z', 'nvd_published_at': '2022-09-16T22:15:00Z'} |
1.4.0 | GHSA-28r9-pq4c-wp3c | 2022-09-21T15:36:11Z | 2022-09-21T15:36:11Z | null | [] | personnummer/rust vulnerable to Improper Input Validation | This vulnerability was reported to the personnummer team in June 2020. The slow response was due to locked ownership of some of the affected packages, which caused delays to update packages prior to disclosure.
The vulnerability is determined to be low severity.
### Impact
This vulnerability impacts users who rely o... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'personnummer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/personnummer/rust/security/advisories/GHSA-28r9-pq4c-wp3c'}, {'type': 'WEB', 'url': 'https://github.com/personnummer/rust/pull/4'}, {'type': 'WEB', 'url': 'https://github.com/personnummer/rust/commit/11c3b0491b70449fb790056585ad3251b0e23acb'}, {'type': 'WEB', 'url': 'https://... | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T15:36:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-c5fp-x2h5-vjv7 | 2022-09-30T00:00:47Z | 2022-09-25T00:00:27Z | null | ['CVE-2022-33681'] | Apache Pulsar Java Client vulnerable to Improper Certificate Validation | Delayed TLS hostname verification in the Pulsar Java Client and the Pulsar Proxy make each client vulnerable to a man in the middle attack. Connections from the Pulsar Java Client to the Pulsar Broker/Proxy and connections from the Pulsar Proxy to the Pulsar Broker are vulnerable. Authentication data is sent before ver... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'f... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33681'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/pulsar/tree/db26073728bf86fc80deecaece2dc02b50bbb9b5/pulsar-client'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/fpo6x10trvn20hlk0dmnr5vlz5v4kl3d'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T00:00:47Z', 'nvd_published_at': '2022-09-23T10:15:00Z'} |
1.4.0 | GHSA-wc4x-qmr2-rj8h | 2022-09-23T17:08:11Z | 2022-09-21T00:00:38Z | null | ['CVE-2022-37265'] | steal vulnerable to Prototype Pollution via alias variable | Prototype pollution vulnerability in stealjs steal via the alias variable in babel.js. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'steal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37265'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/issues/1534'}, {'type': 'PACKAGE', 'url': 'https://github.com/stealjs/steal'}, {'type': 'WEB', 'url': 'https://github.com/stealjs/steal/blob/c9dd1eb19ed3f97aeb93cf9dcea5d68ad5d0ced9/... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:08:31Z', 'nvd_published_at': '2022-09-20T18:15:00Z'} |
1.4.0 | GHSA-f546-v666-559x | 2022-09-23T20:50:54Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-37246'] | Craft CMS Cross-site Scripting vulnerability | Craft CMS 4.2.0.1 is affected by Cross Site Scripting (XSS) in the file src/web/assets/cp/src/js/BaseElementSelectInput.js and in specific on the line `label: elementInfo.label`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0-RC1'}, {'fixed': '4.2.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.39'}, {'fixed': '3.7.51'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37246'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/1d5fdba23c84d6d09a8a980c7b6fc52fb93b679b'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/ecefe7f0afe0a6c4d1097a570cba82753d33f681'}, {'type': 'PACKAGE', 'url'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:50:54Z', 'nvd_published_at': '2022-09-21T15:15:00Z'} |
1.4.0 | GHSA-vgvh-2pf4-jr2x | 2022-09-19T19:34:49Z | 2022-09-16T22:23:45Z | null | ['CVE-2022-35974'] | TensorFlow vulnerable to segfault in `QuantizeDownAndShrinkRange` | ### Impact
If `QuantizeDownAndShrinkRange` is given nonscalar inputs for `input_min` or `input_max`, it results in a segfault that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
out_type = tf.quint8
input = tf.constant([1], shape=[3], dtype=tf.qint32)
input_min = tf.constant([], s... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-vgvh-2pf4-jr2x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35974'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/73ad1815ebcfeb7c051f9c2f7ab5024380ca8613'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:23:45Z', 'nvd_published_at': '2022-09-16T21:15:00Z'} |
1.4.0 | GHSA-w8v7-c7pm-7wfr | 2022-09-23T16:29:56Z | 2022-09-02T00:01:02Z | 2022-09-23T16:29:56Z | [] | Duplicate Advisory: Keycloak vulnerable to Cross-Site Scripting (XSS) | ## Duplicate Advisory
This advisory is a duplicate of [GHSA-w9mf-83w3-fv49](https://github.com/advisories/GHSA-w9mf-83w3-fv49). This link is maintained to preserve external references.
## Original Description
A stored Cross-site scripting (XSS) vulnerability was found in keycloak as shipped in Red Hat Single Sign-On 7... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '19.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-w9mf-83w3-fv49'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2256'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2101942'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/k... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:36:54Z', 'nvd_published_at': '2022-09-01T21:15:00Z'} |
1.4.0 | GHSA-xmgg-fx9p-prq6 | 2022-09-16T18:38:45Z | 2022-09-16T18:38:45Z | null | ['CVE-2022-36076'] | NodeBB account takeover via SSO plugins | _This is a historical security advisory, pertaining to a vulnerability that was reported, patched, and published in 2021. It is listed here for completeness and for CVE tracking purposes._
### Impact
Due to an unnecessarily strict conditional in the code handling the first step of the SSO process, the pre-existing log... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'nodebb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.17.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.17.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/security/advisories/GHSA-xmgg-fx9p-prq6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36076'}, {'type': 'WEB', 'url': 'https://github.com/NodeBB/NodeBB/commit/a2400f6baff44cb2996487bcd0cc6e2acc74b3d4'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T18:38:45Z', 'nvd_published_at': '2022-09-02T13:15:00Z'} |
1.4.0 | GHSA-fxwr-4vq9-9vhj | 2022-09-16T21:04:25Z | 2022-09-16T21:04:25Z | null | ['CVE-2022-36095'] | XWiki Cross-Site Request Forgery (CSRF) for actions on tags | ### Impact
It's possible to perform a CSRF attack for adding or removing tags on XWiki pages.
### Patches
The problem has been patched in XWiki 13.10.5 and 14.3.
### Workarounds
It's possible to fix the issue without upgrading by locally modifying the documentTags.vm template in your filesystem, to apply the change... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0-milestone-1'}, {'fixed': '13.10.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-web-templates'}, 'ranges': [{'type': 'ECO... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-fxwr-4vq9-9vhj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36095'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/7ca56e40cf79a468cea54d3480b6b403f259f9ae'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:04:25Z', 'nvd_published_at': '2022-09-08T21:15:00Z'} |
1.4.0 | GHSA-69cg-p879-7622 | 2023-01-18T00:05:31Z | 2022-09-07T00:01:51Z | null | ['CVE-2022-27664'] | golang.org/x/net/http2 Denial of Service vulnerability | In net/http in Go before 1.18.6 and 1.19.x before 1.19.1, attackers can cause a denial of service because an HTTP/2 connection can hang during closing if shutdown were preempted by a fatal error. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20220906165146-f3363e06e74c'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'golang.org/x/net/http2'}, 'ecosystem_specific': ... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27664'}, {'type': 'PACKAGE', 'url': 'https://cs.opensource.google/go/x/net'}, {'type': 'WEB', 'url': 'https://go.dev/cl/428735'}, {'type': 'WEB', 'url': 'https://go.dev/issue/54658'}, {'type': 'WEB', 'url': 'https://groups.google.com/g/golang-annou... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-01-18T00:05:31Z', 'nvd_published_at': '2022-09-06T18:15:00Z'} |
1.4.0 | GHSA-2jjq-x548-rhpv | 2023-08-24T22:25:36Z | 2022-09-30T22:59:03Z | null | ['CVE-2022-39266'] | isolated-vm has vulnerable CachedDataOptions in API | ### Impact
If the untrusted v8 cached data is passed to the API through CachedDataOptions, the attackers can bypass the sandbox and run arbitrary code in the nodejs process. Version 4.3.7 changes the documentation to warn users that they should not accept `cachedData` payloads from a user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'isolated-vm'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.7'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.3.6'}}] | [{'type': 'WEB', 'url': 'https://github.com/laverdet/isolated-vm/security/advisories/GHSA-2jjq-x548-rhpv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39266'}, {'type': 'WEB', 'url': 'https://github.com/laverdet/isolated-vm/issues/379'}, {'type': 'WEB', 'url': 'https://github.com/laverdet/is... | {'cwe_ids': ['CWE-20', 'CWE-287', 'CWE-693'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T22:59:03Z', 'nvd_published_at': '2022-09-29T18:15:00Z'} |
1.4.0 | GHSA-4pc4-m9mj-v2r9 | 2022-09-19T19:35:48Z | 2022-09-16T22:20:36Z | null | ['CVE-2022-35972'] | TensorFlow vulnerable to segfault in `QuantizedBiasAdd` | ### Impact
If `QuantizedBiasAdd` is given `min_input`, `max_input`, `min_bias`, `max_bias` tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
out_type = tf.qint32
input = tf.constant([85,170,255], shape=[3], dtype=tf.quint8)
bia... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-4pc4-m9mj-v2r9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35972'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/785d67a78a1d533759fcd2f5e8d6ef778de849e0'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:20:36Z', 'nvd_published_at': '2022-09-16T21:15:00Z'} |
1.4.0 | GHSA-w9mf-83w3-fv49 | 2022-10-18T17:19:11Z | 2022-09-23T16:32:51Z | null | ['CVE-2022-2256'] | Keycloak vulnerable to Stored Cross site Scripting (XSS) when loading default roles | A Stored XSS vulnerability was reported in the Keycloak Security mailing list, affecting all the versions of Keycloak, including the latest release (18.0.1). The vulnerability allows a privileged attacker to execute malicious scripts in the admin console, abusing of the default roles functionality.
### CVSS 3.1 - **3... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/security/advisories/GHSA-w9mf-83w3-fv49'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2256'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/8e705a65ab2aa2b079374ec859ee7a75fad5a7d9'}, {'type': 'WEB', 'url': '... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T16:32:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-jqm7-m5q7-3hm5 | 2022-09-19T19:08:05Z | 2022-09-16T22:08:58Z | null | ['CVE-2022-36001'] | TensorFlow vulnerable to `CHECK` fail in `DrawBoundingBoxes` | ### Impact
When `DrawBoundingBoxes` receives an input `boxes` that is not of dtype `float`, it gives a `CHECK` fail that can trigger a denial of service attack.
```python
import tensorflow as tf
import numpy as np
arg_0=tf.constant(value=np.random.random(size=(1, 3, 2, 3)), shape=(1, 3, 2, 3), dtype=tf.half)
arg_1=tf.c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-jqm7-m5q7-3hm5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36001'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/da0d65cdc1270038e72157ba35bf74b85d9bda11'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:08:58Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-2475-53vw-vp25 | 2022-09-19T19:24:49Z | 2022-09-16T22:16:52Z | null | ['CVE-2022-35968'] | TensorFlow vulnerable to `CHECK` fail in `AvgPoolGrad` | ### Impact
The implementation of `AvgPoolGrad` does not fully validate the input `orig_input_shape`. This results in a `CHECK` failure which can be used to trigger a denial of service attack:
```python
import tensorflow as tf
ksize = [1, 2, 2, 1]
strides = [1, 2, 2, 1]
padding = "VALID"
data_format = "NHWC"
orig_input... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-2475-53vw-vp25'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35968'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3a6ac52664c6c095aa2b114e742b0aa17fdce78f'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:16:52Z', 'nvd_published_at': '2022-09-16T21:15:00Z'} |
1.4.0 | GHSA-gmhj-xjfh-cf6m | 2022-09-23T21:37:21Z | 2022-09-23T21:37:21Z | null | [] | Caddy-SSH vulnerable to Authorization Bypass due to incorrect usage of PAM library | Not invoking a call to `pam_acct_mgmt` after a call to `pam_authenticate` to check the validity of a login can lead to an authorization bypass.
### Impact
#### Exploitability
The attack can be carried over the network. A complex non-standard configuration or a specialized condition is required for the attack to be s... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/mohammed90/caddy-ssh'}, 'versions': ['0.0.1']}] | [{'type': 'WEB', 'url': 'https://github.com/mohammed90/caddy-ssh/security/advisories/GHSA-gmhj-xjfh-cf6m'}, {'type': 'WEB', 'url': 'https://github.com/mohammed90/caddy-ssh/commit/4b3e639d64c55f91152ffb51a4af35a8845c95a3'}, {'type': 'PACKAGE', 'url': 'https://github.com/mohammed90/caddy-ssh'}] | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T21:37:21Z', 'nvd_published_at': None} |
1.4.0 | GHSA-52m2-vc4m-jj33 | 2022-09-30T05:29:36Z | 2022-09-30T05:29:36Z | null | ['CVE-2022-39261'] | Twig may load a template outside a configured directory when using the filesystem loader | # Description
When using the filesystem loader to load templates for which the name is a user input, it is possible to use the `source` or `include` statement to read arbitrary files from outside the templates directory when using a namespace like `@somewhere/../some.file` (in such a case, validation is bypassed).
# ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'twig/twig'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.44.7'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'twig/twig'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.15.3'}]}]}, {'package... | [{'type': 'WEB', 'url': 'https://github.com/twigphp/Twig/security/advisories/GHSA-52m2-vc4m-jj33'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39261'}, {'type': 'WEB', 'url': 'https://github.com/twigphp/Twig/commit/35f3035c5deb0041da7b84daf02dea074ddc7a0b'}, {'type': 'WEB', 'url': 'https://g... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T05:29:36Z', 'nvd_published_at': '2022-09-28T14:15:00Z'} |
1.4.0 | GHSA-vx3x-hwph-grvw | 2022-09-21T21:29:23Z | 2022-09-21T00:00:52Z | null | ['CVE-2022-3005'] | YetiForce CRM vulnerable to stored Cross-site Scripting via SlaPolicy module | YetiForce CRM versions 6.4.0 and prior are vulnerable to cross-site scripting via the `SlaPolicy` module. A patch is available at commit e55886781509fe39951fc7528347696474a17884. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yetiforce/yetiforce-crm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '6.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3005'}, {'type': 'WEB', 'url': 'https://github.com/yetiforcecompany/yetiforcecrm/commit/e55886781509fe39951fc7528347696474a17884'}, {'type': 'PACKAGE', 'url': 'https://github.com/YetiForceCompany/YetiForceCRM'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:22:01Z', 'nvd_published_at': '2022-09-20T11:15:00Z'} |
1.4.0 | GHSA-c9h3-c6qj-hh7q | 2022-09-23T17:08:42Z | 2022-09-21T00:00:52Z | null | ['CVE-2022-34917'] | Apache Kafka vulnerability can lead to brokers hitting OutOfMemoryException, causing Denial of Service | A security vulnerability has been identified in Apache Kafka. It affects all releases since 2.8.0. The vulnerability allows malicious unauthenticated clients to allocate large amounts of memory on brokers. This can lead to brokers hitting OutOfMemoryException and causing denial of service. Example scenarios: - Kafka cl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.kafka:kafka'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-34917'}, {'type': 'WEB', 'url': 'https://kafka.apache.org/cve-list'}] | {'cwe_ids': ['CWE-400', 'CWE-770', 'CWE-789'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T21:15:52Z', 'nvd_published_at': '2022-09-20T09:15:00Z'} |
1.4.0 | GHSA-fqfg-c577-2vc3 | 2022-09-30T23:04:02Z | 2022-09-30T00:00:20Z | null | ['CVE-2022-3364'] | rdiffweb's unlimited length Fullname field can lead to DoS | rdiffweb prior to 2.5.0a3 does not validate email length, allowing users to insert an email longer than 255 characters. If a user signs up with an email with a length of 1 million or more characters and logs in, withdraws, or changes their email, the server may cause denial of service due to overload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.0a3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3364'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/b62c479ff6979563c7c23e7182942bc4f460a2c7'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab... | {'cwe_ids': ['CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T23:04:02Z', 'nvd_published_at': '2022-09-29T21:15:00Z'} |
1.4.0 | GHSA-3637-v6vq-xqqw | 2023-04-03T19:11:55Z | 2022-09-16T19:29:31Z | null | ['CVE-2022-31670'] | Harbor fails to validate the user permissions when updating tag retention policies | ### Impact
Harbor fails to validate the user permissions when updating tag retention policies. API call:
PUT /retentions/{id}
By sending a request to update a tag retention policy with an id that belongs to a project
that the currently authenticated user doesn’t have access to, the attacker could modify
tag retent... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.10.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.12'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges'... | [{'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories/GHSA-3637-v6vq-xqqw'}, {'type': 'PACKAGE', 'url': 'https://github.com/goharbor/harbor'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:29:31Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j3qw-g67q-7m64 | 2022-09-30T04:26:00Z | 2022-09-25T00:00:27Z | null | ['CVE-2022-33683'] | Apache Pulsar Brokers and Proxies vulnerable to Improper Certificate Validation | Apache Pulsar Brokers and Proxies create an internal Pulsar Admin Client that does not verify peer TLS certificates, even when tlsAllowInsecureConnection is disabled via configuration. The Pulsar Admin Client's intra-cluster and geo-replication HTTPS connections are vulnerable to man in the middle attacks, which could ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar-broker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.5'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.pulsar:pulsar-proxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-33683'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/42v5rsxj36r3nhfxhmhb2x12r5jmvx3x'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:26:00Z', 'nvd_published_at': '2022-09-23T10:15:00Z'} |
1.4.0 | GHSA-4qw4-jpp4-8gvp | 2022-09-21T18:18:05Z | 2022-09-21T18:18:05Z | null | [] | Unbounded resource exhaustion in cmark-gfm autolink extension may lead to denial of service | ### Impact
CommonMarker uses `cmark-gfm` for rendering [Github Flavored Markdown](https://github.github.com/gfm/). A polynomial time complexity issue in cmark-gfm's autolink extension may lead to unbounded resource exhaustion and subsequent denial of service.
### Patches
This vulnerability has been patched in the fo... | [] | [{'package': {'ecosystem': 'RubyGems', 'name': 'commonmarker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gjtorikian/commonmarker/security/advisories/GHSA-4qw4-jpp4-8gvp'}, {'type': 'WEB', 'url': 'https://github.com/gjtorikian/commonmarker/pull/190'}, {'type': 'PACKAGE', 'url': 'https://github.com/gjtorikian/commonmarker'}, {'type': 'WEB', 'url': 'https://github.com/gjtorikian/co... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-21T18:18:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2g5c-228j-p52x | 2022-09-16T17:21:25Z | 2022-09-16T17:21:25Z | null | ['CVE-2022-36100'] | XWiki Platform Applications Tag and XWiki Platform Tag UI vulnerable to Eval Injection | ### Impact
The tags document `Main.Tags` in XWiki didn't sanitize user inputs properly, allowing users with view rights on the document (default in a public wiki or for authenticated users on private wikis) to execute arbitrary Groovy, Python and Velocity code with programming rights. This allows bypassing all rights c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform:xwiki-platform-tag-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.10.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.xwiki.platform.applications:xwiki-application-tag'}, 'ranges': [{'type': 'ECOSYSTEM', 'event... | [{'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-2g5c-228j-p52x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36100'}, {'type': 'WEB', 'url': 'https://github.com/xwiki/xwiki-platform/commit/604868033ebd191cf2d1e94db336f0c4d9096427'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-116', 'CWE-94', 'CWE-95'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:21:25Z', 'nvd_published_at': '2022-09-08T21:15:00Z'} |
1.4.0 | GHSA-q76q-q8hw-hmpw | 2023-09-27T13:16:00Z | 2022-09-09T19:47:03Z | null | ['CVE-2022-31671'] | Harbor fails to validate the user permissions when reading job execution logs through the P2P preheat execution logs | ### Impact
Harbor fails to validate the user permissions when reading job execution logs through the P2P preheat execution logs - API call
GET /projects/{project_name}/preheat/policies/{preheat_policy_name}/executions/{execution_id}/tasks/{task_id}/logs
By sending a request that attempts to read P2P preheat executi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.10.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.12'}}, {'package': {'ecosystem': '... | [{'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories/GHSA-q76q-q8hw-hmpw'}, {'type': 'PACKAGE', 'url': 'https://github.com/goharbor/harbor'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-09T19:47:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-qf7j-25g9-r63f | 2022-09-10T02:26:45Z | 2022-09-01T22:24:26Z | null | ['CVE-2022-36058'] | elrond-go MultiESDTNFTTransfer call on a SC address with missing function name | ### Impact
Anyone who uses elrond-go to process blocks (historical or actual) that contains a transaction like this: `MultiESDTNFTTransfer@01@54444558544b4b5955532d323631626138@00@0793afc18c8da2ca@` (mind the missing function name after the last `@`)
Basic functionality like p2p messaging, storage, API requests and suc... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ElrondNetwork/elrond-go'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.34'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.3.33'}}] | [{'type': 'WEB', 'url': 'https://github.com/ElrondNetwork/elrond-go/security/advisories/GHSA-qf7j-25g9-r63f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36058'}, {'type': 'WEB', 'url': 'https://github.com/ElrondNetwork/elrond-go/commit/cb487fd7be2a2077638eb34ae771a73630c870c7'}, {'type': 'P... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-01T22:24:26Z', 'nvd_published_at': '2022-09-06T20:15:00Z'} |
1.4.0 | GHSA-7j3m-8g3c-9qqq | 2022-09-19T19:03:26Z | 2022-09-16T21:20:58Z | null | ['CVE-2022-36014'] | TensorFlow vulnerable to null-dereference in `mlir::tfg::TFOp::nameAttr` | ### Impact
When [`mlir::tfg::TFOp::nameAttr`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/ir/importexport/graphdef_import.cc) receives null type list attributes, it crashes.
```cpp
StatusOr<unsigned> GraphDefImporter::ArgNumType(const NamedAttrList &attrs,
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-7j3m-8g3c-9qqq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36014'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3a754740d5414e362512ee981eefba41561a63a6'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:20:58Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-237r-mx84-7x8c | 2022-09-19T20:22:27Z | 2022-09-16T17:11:31Z | null | ['CVE-2022-36436'] | VNCAuthProxy authentication bypass vulnerability | OSU Open Source Lab VNCAuthProxy through 1.1.1 is affected by an vncap/vnc/protocol.py VNCServerAuthenticator authentication-bypass vulnerability that could allow a malicious actor to gain unauthorized access to a VNC session or to disconnect a legitimate user from a VNC session. A remote attacker with network access t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'vncauthproxy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36436'}, {'type': 'WEB', 'url': 'https://github.com/osuosl/twisted_vncauthproxy/commit/edc149af29242178091b2d6fcd42c3ef0851644b'}, {'type': 'WEB', 'url': 'https://cert.grnet.gr/en/blog/cve-2022-36436-twisted-vnc-authentication-proxy-authentication-... | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:11:31Z', 'nvd_published_at': '2022-09-14T11:15:00Z'} |
1.4.0 | GHSA-qm4w-4995-vg7f | 2022-09-16T17:43:10Z | 2022-09-16T17:43:10Z | null | ['CVE-2022-36084'] | cruddl vulnerable to ArangoDB Query Language (AQL) injection through flexSearch | ### Impact
If a vunerable version of cruddl is used to generate a schema that uses `@flexSearchFulltext`, users of that schema may be able to inject arbitrary AQL queries that will be forwarded to and executed by ArangoDB.
Schemas that do not use `@flexSearchFulltext` are not affected.
The attacker needs to have `RE... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'cruddl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'cruddl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '2.7.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/AEB-labs/cruddl/security/advisories/GHSA-qm4w-4995-vg7f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36084'}, {'type': 'WEB', 'url': 'https://github.com/AEB-labs/cruddl/pull/253'}, {'type': 'WEB', 'url': 'https://github.com/AEB-labs/cruddl/commit/... | {'cwe_ids': ['CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:43:10Z', 'nvd_published_at': '2022-09-08T22:15:00Z'} |
1.4.0 | GHSA-w62h-8xjm-fv49 | 2022-09-19T19:38:33Z | 2022-09-16T21:19:15Z | null | ['CVE-2022-35987'] | TensorFlow vulnerable to `CHECK` fail in `DenseBincount` | ### Impact
`DenseBincount` assumes its input tensor `weights` to either have the same shape as its input tensor `input` or to be length-0. A different `weights` shape will trigger a `CHECK` fail that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
binary_output = True
input = tf.ran... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-w62h-8xjm-fv49'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35987'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/bf4c14353c2328636a18bfad1e151052c81d5f43'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:19:15Z', 'nvd_published_at': '2022-09-16T22:15:00Z'} |
1.4.0 | GHSA-3jh2-wmv7-m932 | 2022-09-22T17:28:49Z | 2022-09-18T00:00:30Z | null | ['CVE-2022-3231'] | LibreNMS stored Cross-site Scripting via Schedule Maintenance `Title` parameter | LibreNMS versions 22.8.0 and prior allow attackers to execute arbitrary JavaScript code via the Schedule Maintenance `Title` parameter. A patch is available and anticipated to be part of version 22.9.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'librenms/librenms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.9.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 22.8.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3231'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/pull/14360'}, {'type': 'WEB', 'url': 'https://github.com/librenms/librenms/commit/08050020861230ff96a6507b309cc172a9e70af8'}, {'type': 'PACKAGE', 'url': 'https://github.com/libren... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-20T18:50:11Z', 'nvd_published_at': '2022-09-17T17:15:00Z'} |
1.4.0 | GHSA-xhmf-mmv2-4hhx | 2022-09-16T20:59:43Z | 2022-09-16T20:59:43Z | null | ['CVE-2022-39213'] | Go-CVSS has Out-of-bounds Read vulnerability in ParseVector function | ### Impact
When a full CVSS v2.0 vector string is parsed using `ParseVector`, an Out-of-Bounds Read is possible due to a lack of tests. The Go module will then panic.
### Patches
The problem is patched in tag `v0.4.0`, by the commit `d9d478ff0c13b8b09ace030db9262f3c2fe031f4`.
### Workarounds
The only way to avoid it ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/pandatix/go-cvss'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.2.0'}, {'fixed': '0.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pandatix/go-cvss/security/advisories/GHSA-xhmf-mmv2-4hhx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39213'}, {'type': 'WEB', 'url': 'https://github.com/pandatix/go-cvss/commit/d9d478ff0c13b8b09ace030db9262f3c2fe031f4'}, {'type': 'PACKAGE', 'url'... | {'cwe_ids': ['CWE-125'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T20:59:43Z', 'nvd_published_at': '2022-09-15T22:15:00Z'} |
1.4.0 | GHSA-f36p-42jv-8rh2 | 2022-10-05T22:00:04Z | 2022-09-30T04:53:37Z | null | [] | Lithium vulnerable to Cross Site Scripting in provided Swagger-UI | ### Impact
A XSS vulnerability in the provided (outdated) Swagger-UI is exploitable in applications using lithium with Swagger-UI enabled.
This allows an attacker gain Remote Code Execution (RCE) and potentially exfiltrate secrets in the context of this swagger session.
### Patches
The used swagger-ui was updated by... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.wire:lithium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.2'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.wire.bots:lithium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}], 'database_specific': {'last_k... | [{'type': 'WEB', 'url': 'https://github.com/wireapp/lithium/security/advisories/GHSA-f36p-42jv-8rh2'}, {'type': 'WEB', 'url': 'https://github.com/wireapp/lithium/commit/8b9b406d608fe482ec0e7adf8705834bca92d7df'}, {'type': 'PACKAGE', 'url': 'https://github.com/wireapp/lithium'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:53:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-28m8-9j7v-x499 | 2022-09-22T17:28:05Z | 2022-09-16T19:28:49Z | null | ['CVE-2022-39215'] | Tauri's readDir Endpoint Scope can be Bypassed With Symbolic Links | ### Impact
Due to missing canonicalization when `readDir` is called recursively, it was possible to display directory listings outside of the defined `fs` scope. This required a crafted symbolic link or junction folder inside an allowed path of the `fs` scope. No arbitrary file content could be leaked.
### Patches
Th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'tauri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/security/advisories/GHSA-28m8-9j7v-x499'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-39215'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/issues/4882'}, {'type': 'WEB', 'url': 'https://github.com/tauri-apps/tauri/p... | {'cwe_ids': ['CWE-22', 'CWE-59'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:28:49Z', 'nvd_published_at': '2022-09-15T22:15:00Z'} |
1.4.0 | GHSA-fjm8-m7m6-2fjp | 2022-09-16T21:39:13Z | 2022-09-14T00:00:48Z | null | ['CVE-2022-2990'] | Buildah's incorrect handling of the supplementary groups may lead to data disclosure, modification | An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/buildah'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.27.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-2990'}, {'type': 'WEB', 'url': 'https://github.com/containers/buildah/pull/4200'}, {'type': 'WEB', 'url': 'https://github.com/containers/buildah/commit/4a8bf740e862f2438279c6feee2ea59ddf0cda0b'}, {'type': 'WEB', 'url': 'https://access.redhat.com/se... | {'cwe_ids': ['CWE-842', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:24:17Z', 'nvd_published_at': '2022-09-13T14:15:00Z'} |
1.4.0 | GHSA-g43x-pcc9-f472 | 2022-12-05T22:12:31Z | 2022-09-22T00:00:28Z | null | ['CVE-2022-41226'] | Jenkins Compuware Common Configuration Plugin vulnerable to Improper Restriction of XML External Entity Reference | Jenkins Compuware Common Configuration Plugin 1.0.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to change the contents of the Topaz Workbench CLI home directory on agents to have Jenkins parse a crafted file that uses external entities for ext... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.compuware.jenkins:compuware-common-configuration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.15'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.14'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41226'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/compuware-common-configuration-plugin/pull/24'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/compuware-common-configuration-plugin/commit/351a46798cdc10479cb6966f05a51bc2174806a... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T13:29:17Z', 'nvd_published_at': '2022-09-21T16:15:00Z'} |
1.4.0 | GHSA-g35r-369w-3fqp | 2022-09-19T19:24:30Z | 2022-09-16T22:17:57Z | null | ['CVE-2022-35970'] | TensorFlow vulnerable to segfault in `QuantizedInstanceNorm` | ### Impact
If `QuantizedInstanceNorm` is given `x_min` or `x_max` tensors of a nonzero rank, it results in a segfault that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
output_range_given = False
given_y_min = 0
given_y_max = 0
variance_epsilon = 1e-05
min_separation = 0.001
x = ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-g35r-369w-3fqp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35970'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/785d67a78a1d533759fcd2f5e8d6ef778de849e0'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:17:57Z', 'nvd_published_at': '2022-09-16T21:15:00Z'} |
1.4.0 | GHSA-cv2p-32v3-vhwq | 2022-09-19T19:09:56Z | 2022-09-16T21:39:10Z | null | ['CVE-2022-36003'] | TensorFlow vulnerable to `CHECK` fail in `RandomPoissonV2` | ### Impact
When `RandomPoissonV2` receives large input shape and rates, it gives a `CHECK` fail that can trigger a denial of service attack.
```python
import tensorflow as tf
arg_0=tf.random.uniform(shape=(4,), dtype=tf.int32, maxval=65536)
arg_1=tf.random.uniform(shape=(4, 4, 4, 4, 4), dtype=tf.float32, maxval=None)
a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-cv2p-32v3-vhwq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36003'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/552bfced6ce4809db5f3ca305f60ff80dd40c5a3'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:39:10Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-jf8p-3vjh-pq94 | 2023-04-03T19:21:49Z | 2022-09-16T19:35:47Z | null | ['CVE-2022-31666'] | Harbor fails to validate the user permissions when viewing Webhook policies | ### Impact
Harbor fails to validate the user permissions to view Webhook policies including relevant credentials configured in different projects the user doesn’t have access to, resulting in malicious users being able to read Webhook policies of other users/projects. API call is
GET /projects/{project_name_or_id}/w... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.10.13'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.10.12'}}, {'package': {'ecosystem': 'Go', 'name': 'github.com/goharbor/harbor'}, 'ranges'... | [{'type': 'WEB', 'url': 'https://github.com/goharbor/harbor/security/advisories/GHSA-jf8p-3vjh-pq94'}, {'type': 'PACKAGE', 'url': 'https://github.com/goharbor/harbor'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T19:35:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-j95r-86hx-xwxg | 2022-09-16T13:42:41Z | 2022-09-10T00:00:27Z | null | ['CVE-2022-36376'] | Rank Math SEO plugin vulnerable to Server-Side Request Forgery | Server-Side Request Forgery (SSRF) vulnerability in Rank Math SEO plugin <= 1.0.95 at WordPress. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'rankmath/seo-by-rank-math'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.0.95'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36376'}, {'type': 'PACKAGE', 'url': 'https://github.com/rankmath/seo-by-rank-math'}, {'type': 'WEB', 'url': 'https://patchstack.com/database/vulnerability/seo-by-rank-math/wordpress-rank-math-seo-plugin-1-0-95-server-side-request-forgery-ssrf-vulne... | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T13:42:41Z', 'nvd_published_at': '2022-09-09T15:15:00Z'} |
1.4.0 | GHSA-9w3m-gqgf-c4p9 | 2022-09-13T21:29:45Z | 2022-09-06T00:00:27Z | null | ['CVE-2022-38752'] | snakeYAML before 1.32 vulnerable to Denial of Service due to Out-of-bounds Write | Using snakeYAML to parse untrusted YAML files may be vulnerable to Denial of Service attacks (DoS). If the parser is running on user supplied input, an attacker may supply content that causes the parser to crash by stack-overflow. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.yaml:snakeyaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.32'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38752'}, {'type': 'PACKAGE', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml'}, {'type': 'WEB', 'url': 'https://bitbucket.org/snakeyaml/snakeyaml/issues/531/stackoverflow-oss-fuzz-47081'}, {'type': 'WEB', 'url': 'https://bugs.chromium.org/p/oss-f... | {'cwe_ids': ['CWE-121', 'CWE-787'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-13T21:29:45Z', 'nvd_published_at': '2022-09-05T10:15:00Z'} |
1.4.0 | GHSA-mgmh-g2v6-mqw5 | 2022-09-19T19:55:57Z | 2022-09-16T21:18:42Z | null | ['CVE-2022-35941'] | TensorFlow vulnerable to `CHECK` failure in `AvgPoolOp` | ### Impact
The [`AvgPoolOp`](https://github.com/tensorflow/tensorflow/blob/8d72537c6abf5a44103b57b9c2e22c14f5f49698/tensorflow/core/kernels/avgpooling_op.cc#L56-L98) function takes an argument `ksize` that must be positive but is not checked. A negative `ksize` can trigger a `CHECK` failure and crash the program.
```py... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-mgmh-g2v6-mqw5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35941'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/3a6ac52664c6c095aa2b114e742b0aa17fdce78f'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:18:42Z', 'nvd_published_at': '2022-09-16T20:15:00Z'} |
1.4.0 | GHSA-62g7-fpv9-v95f | 2022-10-03T22:14:32Z | 2022-09-30T00:00:45Z | null | ['CVE-2022-3355'] | Inventree vulnerable to Stored Cross-site Scripting | Inventree prior to 0.8.3 is vulnerable to stored cross-site scripting by uploading SVG files. Version 0.8.3 contains a patch for this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'inventree'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3355'}, {'type': 'WEB', 'url': 'https://github.com/inventree/inventree/commit/5a08ef908dd5344b4433436a4679d122f7f99e41'}, {'type': 'WEB', 'url': 'https://github.com/inventree/InvenTree/releases/tag/0.8.3'}, {'type': 'PACKAGE', 'url': 'https://githu... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-10-03T22:14:32Z', 'nvd_published_at': '2022-09-29T10:15:00Z'} |
1.4.0 | GHSA-p2xf-8hgm-hpw5 | 2022-09-19T19:40:01Z | 2022-09-16T22:30:29Z | null | ['CVE-2022-35984'] | TensorFlow vulnerable to `CHECK` fail in `ParameterizedTruncatedNormal` | ### Impact
`ParameterizedTruncatedNormal` assumes `shape` is of type `int32`. A valid `shape` of type `int64` results in a mismatched type `CHECK` fail that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
seed = 1618
seed2 = 0
shape = tf.random.uniform(shape=[3], minval=-10000, maxv... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-p2xf-8hgm-hpw5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35984'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/72180be03447a10810edca700cbc9af690dfeb51'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:30:29Z', 'nvd_published_at': '2022-09-16T22:15:00Z'} |
1.4.0 | GHSA-gqqf-g5r7-84vf | 2022-09-15T03:26:51Z | 2022-09-15T03:26:51Z | null | [] | TYPO3 HTML Sanitizer Bypasses Cross-Site Scripting Protection | > ### Meta
> * CVSS: `CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:F/RL:O/RC:C` (5.7)
### Problem
Due to a parsing issue in upstream package [`masterminds/html5`](https://packagist.org/packages/masterminds/html5), malicious markup used in a sequence with special HTML comments cannot be filtered and sanitized. This a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.0.0'}, {'fixed': '7.6.58'}]}], 'database_specific': {'last_known_affected_version_range': '<= 7.6.57'}}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': ... | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-gqqf-g5r7-84vf'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/d4f260570abd934fcf3819370a135bef33d729b7'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:26:51Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x996-7qh9-7ff7 | 2022-10-10T17:04:26Z | 2022-09-16T20:28:39Z | null | ['CVE-2022-31006'] | Hyperledger indy-node vulnerable to denial of service | ### Impact
An attacker can max out the number of client connections allowed by the ledger that was deployed using guidance provided in the indy-node repository, leaving the ledger unable to be used for its intended purpose.
The ledger content will not be impacted by the attack, and the ledger will resume servicing va... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'indy-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.12.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/hyperledger/indy-node/security/advisories/GHSA-x996-7qh9-7ff7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-31006'}, {'type': 'WEB', 'url': 'https://github.com/hyperledger/indy-node/commit/53a2a1bf1a26cb8ba710fd6adc8bcf275186a4b3'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T20:28:39Z', 'nvd_published_at': '2022-09-09T19:15:00Z'} |
1.4.0 | GHSA-c5xv-qc8p-mh2v | 2022-09-23T20:52:26Z | 2022-09-23T00:00:39Z | null | ['CVE-2022-38398'] | Apache Batik Server-Side Request Forgery | Server-Side Request Forgery (SSRF) vulnerability in Batik of Apache XML Graphics allows an attacker to load a url thru the jar protocol. This issue affects Apache XML Graphics Batik 1.14. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0'}, {'fixed': '1.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-38398'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/xmlgraphics-batik'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/BATIK-1331'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/712c9xwtmyghyokzrm2ml6sps4xlmbsx... | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-23T20:52:26Z', 'nvd_published_at': '2022-09-22T15:15:00Z'} |
1.4.0 | GHSA-m77f-652q-wwp4 | 2022-09-19T19:22:47Z | 2022-09-15T03:25:15Z | null | ['CVE-2022-3212'] | axum-core has no default limit put on request bodies | `<bytes::Bytes as axum_core::extract::FromRequest>::from_request` would not, by default, set a limit for the size of the request body. That meant if a malicious peer would send a very large (or infinite) body your server might run out of memory and crash.
This also applies to these extractors which used `Bytes::from_r... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'axum-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.8'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'axum-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.3.0-rc.1'}, {'fixed': '0.3.0-rc.2'}]}], 'versi... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3212'}, {'type': 'WEB', 'url': 'https://github.com/tokio-rs/axum/pull/1346'}, {'type': 'PACKAGE', 'url': 'https://github.com/tokio-rs/axum'}, {'type': 'WEB', 'url': 'https://rustsec.org/advisories/RUSTSEC-2022-0055.html'}] | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:25:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rfj2-q3h3-hm5j | 2022-09-21T19:53:20Z | 2022-09-16T17:12:30Z | null | ['CVE-2022-36113'] | Cargo extracting malicious crates can corrupt arbitrary files | The Rust Security Response WG was notified that Cargo did not prevent extracting some malformed packages downloaded from alternate registries. An attacker able to upload packages to an alternate registry could corrupt arbitary files when Cargo downloaded the package.
The severity of this vulnerability is "low" for use... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'cargo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.65.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'cargo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [... | [{'type': 'WEB', 'url': 'https://github.com/rust-lang/cargo/security/advisories/GHSA-rfj2-q3h3-hm5j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36113'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/cargo/commit/15f1e4b0bf4b4fc20369e0a85d9b77957c4dd52a'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-22', 'CWE-59'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:12:30Z', 'nvd_published_at': '2022-09-14T18:15:00Z'} |
1.4.0 | GHSA-fv43-93gv-vm8f | 2022-09-19T19:07:12Z | 2022-09-16T21:59:08Z | null | ['CVE-2022-36011'] | TensorFlow vulnerable to null dereference on MLIR on empty function attributes | ### Impact
When [`mlir::tfg::ConvertGenericFunctionToFunctionDef`](https://github.com/tensorflow/tensorflow/blob/master/tensorflow/core/ir/importexport/functiondef_import.cc) is given empty function attributes, it gives a null dereference.
```cpp
// Import the function attributes with a `tf.` prefix to match the curren... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-fv43-93gv-vm8f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36011'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/1cf45b831eeb0cab8655c9c7c5d06ec6f45fc41b'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T21:59:08Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-qrj3-hrgj-fm7r | 2022-09-30T04:39:38Z | 2022-09-27T00:00:17Z | null | ['CVE-2022-3272'] | rdiffweb's unlimited length email field can lead to DoS | rdiffweb prior to 2.4.8 does not validate email length, allowing users to insert an email longer than 255 characters. If a user signs up with an email with a length of 1 million or more characters and logs in, withdraws, or changes their email, the server may cause denial of service due to overload. Version 2.4.8 sets ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3272'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/667657c6fe2b336c90be37f37fb92f65df4feee3'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-datab... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-30T04:39:38Z', 'nvd_published_at': '2022-09-26T17:16:00Z'} |
1.4.0 | GHSA-qxpx-j395-pw36 | 2022-09-19T19:26:56Z | 2022-09-16T22:14:39Z | null | ['CVE-2022-35965'] | TensorFlow vulnerable to segfault in `LowerBound` and `UpperBound` | ### Impact
If `LowerBound` or `UpperBound` is given an empty`sorted_inputs` input, it results in a `nullptr` dereference, leading to a segfault that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
out_type = tf.int32
sorted_inputs = tf.constant([], shape=[10,0], dtype=tf.float32)
v... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qxpx-j395-pw36'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35965'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/bce3717eaef4f769019fd18e990464ca4a2efeea'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-476'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:14:39Z', 'nvd_published_at': '2022-09-16T21:15:00Z'} |
1.4.0 | GHSA-2hvr-h6gw-qrxp | 2022-09-21T19:54:59Z | 2022-09-16T17:12:05Z | null | ['CVE-2022-36114'] | Cargo extracting malicious crates can fill the file system | The Rust Security Response WG was notified that Cargo did not prevent extracting some malformed packages downloaded from alternate registries. An attacker able to upload packages to an alternate registry could fill the file system when Cargo downloaded the package.
The severity of this vulnerability is "low" for users... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'cargo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.65.0'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'cargo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [... | [{'type': 'WEB', 'url': 'https://github.com/rust-lang/cargo/security/advisories/GHSA-2hvr-h6gw-qrxp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-36114'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/cargo/commit/2b68d3c07a4a056264dc006ecb9f1354a0679cd3'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-400'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T17:12:05Z', 'nvd_published_at': '2022-09-14T18:15:00Z'} |
1.4.0 | GHSA-qhw4-wwr7-gjc5 | 2022-09-19T19:13:56Z | 2022-09-16T22:09:57Z | null | ['CVE-2022-35998'] | TensorFlow vulnerable to `CHECK` fail in `EmptyTensorList` | ### Impact
If `EmptyTensorList` receives an input `element_shape` with more than one dimension, it gives a `CHECK` fail that can be used to trigger a denial of service attack.
```python
import tensorflow as tf
tf.raw_ops.EmptyTensorList(element_shape=tf.ones(dtype=tf.int32, shape=[1, 0]), max_num_elements=tf.constant(... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0'}, {'fixed': '2.8.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qhw4-wwr7-gjc5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-35998'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/c8ba76d48567aed347508e0552a257641931024d'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-617'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-09-16T22:09:57Z', 'nvd_published_at': '2022-09-16T23:15:00Z'} |
1.4.0 | GHSA-qv98-3369-g364 | 2022-09-15T03:20:35Z | 2022-09-15T03:20:35Z | null | [] | KubeVirt vulnerable to arbitrary file read on host | ### Impact
Users with the permission to create VMIs can construct VMI specs which allow them to read arbitrary files on the host. There are three main attack vectors:
1. Some path fields on the VMI spec were not properly validated and allowed passing in relative paths which would have been mounted into the virt-launc... | [] | [{'package': {'ecosystem': 'Go', 'name': 'kubevirt.io/kubevirt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.20.0'}, {'fixed': '0.55.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/google/security-research/security/advisories/GHSA-cvx8-ppmc-78hm'}, {'type': 'WEB', 'url': 'https://github.com/kubevirt/kubevirt/security/advisories/GHSA-qv98-3369-g364'}, {'type': 'WEB', 'url': 'https://github.com/kubevirt/kubevirt/pull/8198'}, {'type': 'WEB', 'url': 'https:... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-09-15T03:20:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-hhqj-cfjx-vj25 | 2022-03-10T16:00:14Z | 2022-03-02T00:00:20Z | null | ['CVE-2022-0776'] | Cross site scripting in reveal.js | The onmessage event listener in /plugin/notes/speaker-view.html does not check the origin of postMessage before adding the content to the webpage. The vulnerable code allows any origin to postMessage on the browser window and feeds attacker's input to parts using which attacker can execute arbitrary javascript code on ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'reveal.js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0776'}, {'type': 'WEB', 'url': 'https://github.com/hakimel/reveal.js/commit/32cdd3b1872ba8e2267c9e87ae216cb55f40f4d2'}, {'type': 'PACKAGE', 'url': 'https://github.com/hakimel/reveal.js'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/be2b7ee4-... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-02T21:28:45Z', 'nvd_published_at': '2022-03-01T09:15:00Z'} |
1.4.0 | GHSA-r5hc-wm3g-hjw6 | 2022-03-18T20:42:54Z | 2022-03-01T22:01:30Z | null | ['CVE-2022-0768'] | Server-Side Request Forgery (SSRF) in rudloff/alltube | ### Impact
Releases prior to 3.0.2 are vulnerable to a Server-Side Request Forgery vulnerability that allows an attacker to send a request to an internal hostname.
### Patches
3.0.2 contains a fix for this vulnerability.
(The 1.x and 2.x releases are not maintained anymore.)
Part of the fix requires applying [a patch... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'rudloff/alltube'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Rudloff/alltube/security/advisories/GHSA-r5hc-wm3g-hjw6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0768'}, {'type': 'WEB', 'url': 'https://github.com/Rudloff/alltube/commit/3a4f09dda0a466662a4e52cde674749e0c668e8d'}, {'type': 'WEB', 'url': 'http... | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:01:30Z', 'nvd_published_at': '2022-02-28T10:15:00Z'} |
1.4.0 | GHSA-pcwq-7wrw-r8jv | 2022-03-14T23:02:20Z | 2022-03-05T00:00:45Z | null | ['CVE-2020-18325'] | Cross-site Scripting in intelliants/subrion | Multilple Cross Site Scripting (XSS) vulnerability exists in Intelliants Subrion CMS v4.2.1 in the Configuration panel. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-18325'}, {'type': 'WEB', 'url': 'https://github.com/hamm0nz/CVE-2020-18325'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:02:20Z', 'nvd_published_at': '2022-03-04T15:15:00Z'} |
1.4.0 | GHSA-fh5v-5f35-2rv2 | 2022-06-29T12:15:59Z | 2022-03-17T00:00:44Z | null | ['CVE-2021-20180'] | Insertion of Sensitive Information into Log File in ansible | A flaw was found in ansible module where credentials are disclosed in the console log by default and not protected by the security feature when using the bitbucket_pipeline_variable module. This flaw allows an attacker to steal bitbucket_pipeline credentials. The highest threat from this vulnerability is to confidentia... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.8.0a1'}, {'fixed': '2.8.19'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.9.0b1'}, {'fixed': '2.9.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20180'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/73242'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/pull/73243'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1915808'}, {'type': 'PACK... | {'cwe_ids': ['CWE-532'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-06-29T12:15:59Z', 'nvd_published_at': '2022-03-16T15:15:00Z'} |
1.4.0 | GHSA-w6cx-qg2q-rvq8 | 2022-03-10T15:58:38Z | 2022-03-01T22:09:18Z | null | ['CVE-2022-24718'] | Path Traversal in @finastra/ssr-pages | A path traversal issue can occur when providing untrusted input to the `svg` property as an argument to the `build(MessagePageOptions)` function.
### References
- https://github.com/Finastra/ssr-pages/pull/1
- https://github.com/Finastra/ssr-pages/pull/1/commits/c3e4c563384ae3ba3892f37dd190218577620780
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': '@finastra/ssr-pages'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Finastra/ssr-pages/security/advisories/GHSA-w6cx-qg2q-rvq8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24718'}, {'type': 'WEB', 'url': 'https://github.com/Finastra/ssr-pages/pull/1'}, {'type': 'WEB', 'url': 'https://github.com/Finastra/ssr-pages/... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:09:18Z', 'nvd_published_at': '2022-03-01T19:15:00Z'} |
1.4.0 | GHSA-9988-f88m-mr42 | 2022-03-28T22:34:41Z | 2022-03-12T00:00:37Z | null | ['CVE-2022-25512'] | Exposure of Sensitive Information to an Unauthorized Actor in FreeTAKServer-UI | FreeTAKServer-UI v1.9.8 was discovered to leak sensitive API and Websocket keys. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'FreeTAKServer-UI'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25512'}, {'type': 'WEB', 'url': 'https://github.com/FreeTAKTeam/UI/issues/26'}, {'type': 'PACKAGE', 'url': 'https://github.com/FreeTAKTeam/UI'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:14:56Z', 'nvd_published_at': '2022-03-11T00:15:00Z'} |
1.4.0 | GHSA-g795-4hxx-qqwm | 2022-03-28T20:39:40Z | 2022-03-16T00:00:47Z | null | ['CVE-2022-0893'] | Cross-site Scripting in Pimcore | Pimcore prior to 10.4.0 is vulnerable to stored cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0893'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/11447'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pi... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T20:39:40Z', 'nvd_published_at': '2022-03-15T11:15:00Z'} |
1.4.0 | GHSA-pr9q-v585-qv2w | 2022-03-30T20:03:55Z | 2022-03-19T00:01:00Z | null | ['CVE-2022-24637'] | Improper Privilege Management in Open Web Analytics | Open Web Analytics (OWA) before 1.7.4 allows an unauthenticated remote attacker to obtain sensitive user information, which can be used to gain admin privileges by leveraging cache hashes. This occurs because files generated with '<?php (instead of the intended "<?php sequence) aren't handled by the PHP interpreter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'open-web-analytics/open-web-analytics'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24637'}, {'type': 'WEB', 'url': 'https://devel0pment.de/?p=2494'}, {'type': 'PACKAGE', 'url': 'https://github.com/Open-Web-Analytics/Open-Web-Analytics'}, {'type': 'WEB', 'url': 'https://github.com/Open-Web-Analytics/Open-Web-Analytics/releases/tag... | {'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T20:03:55Z', 'nvd_published_at': '2022-03-18T16:15:00Z'} |
1.4.0 | GHSA-qmfc-6www-fjqw | 2022-03-18T17:57:04Z | 2022-03-18T17:57:04Z | null | ['CVE-2021-30181'] | Code injection in Apache Dubbo | Apache Dubbo prior to 2.6.9 and 2.7.10 supports Script routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these rules, Dubbo customers use ScriptEngine and run the rule provided by t... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.6.9'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.7.10'}]}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30181'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re22410dc704a09bc7032ddf15140cf5e7df3e8ece390fc9032ff5587%40%3Cdev.dubbo.apache.org%3E'}] | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T20:15:20Z', 'nvd_published_at': '2021-06-01T14:15:00Z'} |
1.4.0 | GHSA-cm9w-c4rj-r2cf | 2022-03-11T20:08:41Z | 2022-03-02T22:24:05Z | null | ['CVE-2022-24722'] | Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in view_component | This is an XSS vulnerability that has the potential to impact anyone using translations with the view_component gem. Data received via user input and passed as an interpolation argument to the `translate` method is not properly sanitized before display.
Versions 2.29.1 and 2.49.1 have been released and fully mitigate ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'view_component'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.31.0'}, {'fixed': '2.31.2'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'view_component'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.32.0'}, {'fixed': '2.49.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/github/view_component/security/advisories/GHSA-cm9w-c4rj-r2cf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24722'}, {'type': 'WEB', 'url': 'https://github.com/github/view_component/commit/3f82a6e62578ff6f361aba24a1feb2caccf83ff9'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-02T22:24:05Z', 'nvd_published_at': '2022-03-02T23:15:00Z'} |
1.4.0 | GHSA-5mpf-hw8f-86w9 | 2022-11-30T20:44:33Z | 2022-03-16T00:00:45Z | null | ['CVE-2022-27195'] | Sensitive parameter values captured in build metadata files by Jenkins Parameterized Trigger Plugin | Jenkins Parameterized Trigger Plugin 2.43 and earlier captures environment variables passed to builds triggered using Jenkins Parameterized Trigger Plugin, including password parameter values, in their `build.xml` files. These values are stored unencrypted and can be viewed by users with access to the Jenkins controlle... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:parameterized-trigger'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.43.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27195'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/parameterized-trigger-plugin/commit/6b7cd2272cbd9f97416bff7ea19132b9aad0898d'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/parameterized-trigger-plugin'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-532'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:44:33Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-jc4v-vvg6-xg78 | 2022-04-01T17:14:52Z | 2022-03-29T00:01:16Z | null | ['CVE-2021-26599'] | SQL Injection in ImpressCMS | ImpressCMS before 1.4.3 allows include/findusers.php groups SQL Injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26599'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1081145'}, {'type': 'PACKAGE', 'url': 'https://github.com/ImpressCMS/impresscms'}, {'type': 'WEB', 'url': 'https://github.com/ImpressCMS/impresscms/releases/tag/v1.4.3'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T17:14:52Z', 'nvd_published_at': '2022-03-28T01:15:00Z'} |
1.4.0 | GHSA-p94q-9q2m-pfh2 | 2022-09-08T00:00:35Z | 2022-03-04T00:00:17Z | null | ['CVE-2022-23898'] | SQL injection in net.mingsoft:ms-mcms | MCMS v5.2.5 was discovered to contain a SQL injection vulnerability via the categoryId parameter in the file IContentDao.xml. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23898'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/62'}, {'type': 'PACKAGE', 'url': 'https://github.com/ming-soft/MCMS'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-08T00:00:35Z', 'nvd_published_at': '2022-03-03T19:15:00Z'} |
1.4.0 | GHSA-wj78-8xrx-phr7 | 2022-11-30T20:13:37Z | 2022-03-16T00:00:43Z | null | ['CVE-2022-27207'] | Stored Cross-site Scripting vulnerability in Jenkins global-build-stats Plugin | Jenkins global-build-stats Plugin 1.5 and earlier does not escape multiple fields in the chart configuration on the 'Global Build Stats' page, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:global-build-stats'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27207'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/global-build-stats-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-1886'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-s... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:13:37Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-8p4x-fq8v-xhv4 | 2022-11-29T23:22:23Z | 2022-03-30T00:00:26Z | null | ['CVE-2022-28146'] | Arbitrary file read vulnerability in Jenkins Continuous Integration with Toad Edge Plugin | Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Item/Configure permission to read arbitrary files on the Jenkins controller by specifying an input folder on the Jenkins controller as a parameter to its build steps. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ci-with-toad-edge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28146'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ci-with-toad-edge-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2633'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T23:22:23Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-ghm8-mmx7-xvg2 | 2022-03-18T17:53:58Z | 2022-03-18T17:53:58Z | null | ['CVE-2021-30638'] | Information Exposure in Apache Tapestry | Information Exposure vulnerability in context asset handling of Apache Tapestry allows an attacker to download files inside WEB-INF if using a specially-constructed URL. This was caused by an incomplete fix for CVE-2020-13953. This issue affects Apache Tapestry Apache Tapestry 5.4.0 version to Apache Tapestry 5.6.3; Ap... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.4.0'}, {'fixed': '5.6.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.7.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30638'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r37dab61fc7f7088d4311e7f995ef4117d58d86a675f0256caa6991eb%40%3Cusers.tapestry.apache.org%3E'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20210528-0004/'},... | {'cwe_ids': ['CWE-200', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-20T22:06:22Z', 'nvd_published_at': '2021-04-27T19:15:00Z'} |
1.4.0 | GHSA-h6h5-6fmq-rh28 | 2022-03-24T00:12:46Z | 2022-03-24T00:12:46Z | null | ['CVE-2022-24731'] | Path traversal allows leaking out-of-bound files from Argo CD repo-server | ### Impact
All unpatched versions of Argo CD starting with v1.5.0 are vulnerable to a path traversal vulnerability allowing a malicious user with read/write access to leak sensitive files from Argo CD's repo-server.
A malicious Argo CD user who has been granted [`create` or `update` access to Applications](https://ar... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixed': '2.1.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2... | [{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-h6h5-6fmq-rh28'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24731'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}] | {'cwe_ids': ['CWE-22', 'CWE-284'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-24T00:12:46Z', 'nvd_published_at': '2022-03-23T21:15:00Z'} |
1.4.0 | GHSA-phrq-v4q2-hmq6 | 2023-09-21T20:00:55Z | 2022-03-26T00:15:22Z | null | ['CVE-2020-13756'] | Sabberworm PHP CSS Parser Code injection vulnerability in allSelectors() | Sabberworm PHP CSS Parser before 8.3.1 calls eval on uncontrolled data, possibly leading to remote code execution if the function allSelectors() or getSelectorsBySpecificity() is called with input from an attacker. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'sabberworm/php-css-parser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '8.3.0'}, {'fixed': '8.3.1'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sabberworm/php-css-parser'}, 'ecosystem_specific'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-13756'}, {'type': 'WEB', 'url': 'https://github.com/sabberworm/PHP-CSS-Parser/commit/2ebf59e8bfbf6cfc1653a5f0ed743b95062c62a4'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/sabberworm/php-css-parser/CVE-2... | {'cwe_ids': ['CWE-20'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:15:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5w9c-rv96-fr7g | 2022-03-22T20:33:40Z | 2022-03-22T19:28:24Z | null | [] | Removal of functional code in faker.js | Faker.js helps users create large amounts of data for testing and development. The maintainer deliberately removed the functional code from this package. This appears to be a purposeful and successful attempt to make the package unusable. This is related to the colors.js [CVE-2021-23567](https://github.com/advisories/G... | [] | [{'package': {'ecosystem': 'npm', 'name': 'faker'}, 'versions': ['6.6.6']}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23567'}, {'type': 'WEB', 'url': 'https://github.com/Marak/colors.js/issues/285'}, {'type': 'WEB', 'url': 'https://github.com/Marak/colors.js/issues/285%23issuecomment-1008212640'}, {'type': 'WEB', 'url': 'https://github.com/Marak/colors.js/commit/0... | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-22T19:28:24Z', 'nvd_published_at': None} |
1.4.0 | GHSA-fpxq-w7p9-r924 | 2022-11-30T20:10:36Z | 2022-03-16T00:00:42Z | null | ['CVE-2022-27208'] | Arbitrary file read vulnerability in Jenkins kubernetes-cd Plugin | Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows users with Credentials/Create permission to read arbitrary files on the Jenkins controller. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:kubernetes-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27208'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2096'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/15/2'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:10:36Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-hqq7-2q2v-82xq | 2022-03-21T17:20:05Z | 2022-03-17T00:00:24Z | null | ['CVE-2021-23648'] | Cross-site Scripting in sanitize-url | The package `@braintree/sanitize-url` before 6.0.0 is vulnerable to Cross-site Scripting (XSS) due to improper sanitization in the `sanitizeUrl` function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@braintree/sanitize-url'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23648'}, {'type': 'WEB', 'url': 'https://github.com/braintree/sanitize-url/pull/40'}, {'type': 'WEB', 'url': 'https://github.com/braintree/sanitize-url/pull/40/commits/e5afda45d9833682b705f73fc2c1265d34832183'}, {'type': 'PACKAGE', 'url': 'https://... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-19T00:01:56Z', 'nvd_published_at': '2022-03-16T16:15:00Z'} |
1.4.0 | GHSA-p4v2-r99v-wjc2 | 2023-09-05T19:58:23Z | 2022-03-16T00:00:38Z | null | ['CVE-2021-45848'] | Nicotine+ DoS on Null Character in Download Request | Denial of service (DoS) vulnerability in Nicotine+ starting with version 3.0.3 and prior to version 3.2.1 allows a user with a modified Soulseek client to crash Nicotine+ by sending a file download request with a file path containing a null character. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'nicotine-plus'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.3'}, {'fixed': '3.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45848'}, {'type': 'WEB', 'url': 'https://github.com/nicotine-plus/nicotine-plus/issues/1777'}, {'type': 'WEB', 'url': 'https://github.com/nicotine-plus/nicotine-plus/commit/0e3e2fac27a518f0a84330f1ddf1193424522045'}, {'type': 'PACKAGE', 'url': 'htt... | {'cwe_ids': ['CWE-116'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T15:19:03Z', 'nvd_published_at': '2022-03-15T19:15:00Z'} |
1.4.0 | GHSA-22hc-47cc-7x6f | 2022-03-28T21:38:55Z | 2022-03-16T00:00:48Z | null | ['CVE-2022-0894'] | Cross-site Scripting in Pimcore | Pimcore prior to 10.4.0 is vulnerable to stored cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.4.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0894'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/11447'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pi... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T21:38:55Z', 'nvd_published_at': '2022-03-15T11:15:00Z'} |
1.4.0 | GHSA-q7rv-6hp3-vh96 | 2023-04-13T13:57:05Z | 2022-03-25T19:26:33Z | null | ['CVE-2022-24775'] | Improper Input Validation in guzzlehttp/psr7 | ### Impact
Improper header parsing. An attacker could sneak in a carriage return character (`\r`) and pass untrusted values in both the header names and values.
### Patches
The issue is patched in 1.8.4 and 2.1.1.
### Workarounds
There are no known workarounds.
### References
* https://www.rfc-editor.org/rfc/rfc... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/psr7'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.4'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'guzzlehttp/psr7'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/guzzle/psr7/security/advisories/GHSA-q7rv-6hp3-vh96'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24775'}, {'type': 'WEB', 'url': 'https://github.com/guzzle/psr7/pull/485/commits/e55afaa3fc138c89adf3b55a8ba20dc60d17f1f1'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-25T19:26:33Z', 'nvd_published_at': '2022-03-21T19:15:00Z'} |
1.4.0 | GHSA-p737-p57g-4cpr | 2022-03-25T19:20:39Z | 2022-03-25T19:20:39Z | null | ['CVE-2022-24757'] | Insertion of Sensitive Information into Log File in Jupyter notebook | ### Impact
_What kind of vulnerability is it?_
Anytime a 5xx error is triggered, the auth cookie and other header values are recorded in Jupyter Server logs by default. Considering these logs do not require root access, an attacker can monitor these logs, steal sensitive auth/cookie information, and gain access to the... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'jupyter-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.15.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jupyter-server/jupyter_server/security/advisories/GHSA-p737-p57g-4cpr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24757'}, {'type': 'WEB', 'url': 'https://github.com/jupyter-server/jupyter_server/commit/a5683aca0b0e412672ac6218d09f74d44ca0de5a'},... | {'cwe_ids': ['CWE-532'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-25T19:20:39Z', 'nvd_published_at': '2022-03-23T21:15:00Z'} |
1.4.0 | GHSA-29rv-fqx2-4c9f | 2022-09-07T23:58:29Z | 2022-03-18T00:01:10Z | null | ['CVE-2022-0749'] | Deserialization of Untrusted Data in SinGooCMS.Utility | This affects all versions of package SinGooCMS.Utility. The socket client in the package can pass in the payload via the user-controllable input after it has been established, because this socket client transmission does not have the appropriate restrictions or type bindings for the BinaryFormatter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'SinGooCMS.Utility'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0749'}, {'type': 'WEB', 'url': 'https://github.com/SinGooCMS/SinGooCMSUtility/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/SinGooCMS/SinGooCMSUtility/blob/master/SinGooCMS.Utility/Net/SocketClient.cs'}, {'type': 'WEB', 'url': 'https://sny... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-07T23:58:29Z', 'nvd_published_at': '2022-03-17T12:15:00Z'} |
1.4.0 | GHSA-3qr6-qrqm-8v86 | 2022-03-30T20:02:35Z | 2022-03-23T00:00:23Z | null | ['CVE-2022-1036'] | Integer Overflow or Wraparound in Microweber | In Microweber prior to 1.2.12, a user can create an account with a password thousands of characters in length, leading to memory corruption/integer overflow. Version 1.2.2 sets maximum password length at 500 characters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1036'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/82be4f0b4729be870ccefdae99a04833f134aa6a'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d... | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T20:00:03Z', 'nvd_published_at': '2022-03-22T13:15:00Z'} |
1.4.0 | GHSA-65f3-3278-7m65 | 2023-06-30T22:10:59Z | 2022-03-12T00:00:34Z | 2023-06-30T22:10:59Z | [] | Duplicate Advisory: Improper Authorization in Gogs | ## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-gw5h-h6hj-f56g. This link is maintained to preserve external references.
## Original Description
### Impact
Expired PAM accounts and accounts with expired passwords are continued to be seen as valid. Installations use PAM as auth... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0871'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/64102be2c90e1b47dbdd379873ba76c80d4b0e78'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ea82cfc9-b55c-41fe-ae58-0... | {'cwe_ids': ['CWE-285', 'CWE-862', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:58:34Z', 'nvd_published_at': '2022-03-11T12:15:00Z'} |
1.4.0 | GHSA-q9qc-pp5x-mc8c | 2022-03-14T21:01:04Z | 2022-03-10T00:00:40Z | null | ['CVE-2022-0896'] | Improper Neutralization of Special Elements Used in a Template Engine in microweber | Improper Neutralization of Special Elements Used in a Template Engine in GitHub repository microweber/microweber prior to 1.3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0896'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/e0224462b3dd6b1f7c6ec1197413afc6019bc3b5'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1... | {'cwe_ids': ['CWE-1336', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T21:46:29Z', 'nvd_published_at': '2022-03-09T12:15:00Z'} |
1.4.0 | GHSA-r6hh-5g3q-wwgc | 2022-03-28T22:27:36Z | 2022-03-16T00:00:45Z | null | ['CVE-2022-0970'] | Stored Cross-site Scripting in grav | Grav prior to 1.7.31 is vulnerable to stored cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.31'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0970'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/f19297d5f70476e7bedae9f2acef6b43615538b8'}, {'type': 'PACKAGE', 'url': 'https://github.com/getgrav/grav'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/dd436c44-cbf4-48ac-... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:28:09Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-69p3-xp37-f692 | 2022-04-08T21:45:06Z | 2022-03-26T00:00:29Z | null | ['CVE-2022-0759'] | Improper Certificate Validation in kubeclient | A flaw was found in all versions of kubeclient up to (but not including) v4.9.3, the Ruby client for Kubernetes REST API, in the way it parsed kubeconfig files. When the kubeconfig file does not configure custom CA to verify certs, kubeclient ends up accepting any certificate (it wrongly returns VERIFY_NONE). Ruby appl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'kubeclient'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.9.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0759'}, {'type': 'WEB', 'url': 'https://github.com/ManageIQ/kubeclient/issues/554'}, {'type': 'WEB', 'url': 'https://github.com/ManageIQ/kubeclient/issues/555'}, {'type': 'WEB', 'url': 'https://github.com/ManageIQ/kubeclient/pull/556'}, {'type': 'W... | {'cwe_ids': ['CWE-295'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T13:12:44Z', 'nvd_published_at': '2022-03-25T19:15:00Z'} |
1.4.0 | GHSA-4fx9-vc88-q2xc | 2022-03-11T23:39:27Z | 2022-03-11T23:39:27Z | null | [] | Infinite loop in Pillow | JpegImagePlugin may append an EOF marker to the end of a truncated file, so that the last segment of the data will still be processed by the decoder.
If the EOF marker is not detected as such however, this could lead to an infinite loop where JpegImagePlugin keeps trying to end the file. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/baae9ec4b67c68e3adaf1208cf54e8de5e38a6fd'}, {'type': 'PACKAGE', 'url': 'https://github.com/python-pillow/Pillow'}, {'type': 'WEB', 'url': 'https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#ensure-jpegimageplugin-stops-at-the-end-of-a-... | {'cwe_ids': ['CWE-400'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T23:39:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f8xq-q7px-wg8c | 2022-03-18T23:11:43Z | 2022-03-18T23:11:43Z | null | ['CVE-2022-24770'] | Improper Neutralization of Formula Elements in a CSV File in Gradio Flagging | ### Impact
The `gradio` library has a flagging functionality which saves input/output data into a CSV file on the developer's computer. This can allow a user to save arbitrary text into the CSV file, such as commands. If a program like MS Excel opens such a file, then it automatically runs these commands, which could l... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'gradio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.8.11'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/security/advisories/GHSA-f8xq-q7px-wg8c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24770'}, {'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/pull/817'}, {'type': 'WEB', 'url': 'https://github.com/gradio-app/gradio/c... | {'cwe_ids': ['CWE-1236'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:11:43Z', 'nvd_published_at': '2022-03-17T21:15:00Z'} |
1.4.0 | GHSA-mh27-rxmr-8q4c | 2022-04-07T21:57:01Z | 2022-03-30T00:00:23Z | null | ['CVE-2022-28153'] | Cross-site Scripting in Jenkins SiteMonitor Plugin | Jenkins SiteMonitor Plugin 0.6 and earlier does not escape URLs of sites to monitor in tooltips, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:sitemonitor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28153'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/sitemonitor-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1932'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T21:57:01Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-w4f3-7f7c-x652 | 2022-03-18T17:49:01Z | 2022-03-18T17:49:01Z | null | ['CVE-2021-26830'] | SQL Injection in tribalsystems/zenario | SQL Injection in Tribalsystems Zenario CMS 8.8.52729 and prior allows remote attackers to access the database or delete the plugin. This is accomplished via the `ID` input field of ajax.php in the `Pugin library - delete` module. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.8.53370'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26830'}, {'type': 'WEB', 'url': 'https://github.com/TribalSystems/Zenario/commit/2c82a4d126c8446106347ef603b157f2d4175fd1'}, {'type': 'WEB', 'url': 'https://edhunter484.medium.com/blind-sql-injection-on-zenario-cms-b58b6820c32d'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-05-06T22:39:06Z', 'nvd_published_at': '2021-04-16T18:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.