schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-3gx9-37ww-9qw6
2022-08-11T21:37:05Z
2022-03-04T00:00:15Z
null
['CVE-2022-22947']
Spring Cloud Gateway vulnerable to Code Injection when Gateway Actuator endpoint enabled, exposed, unsecured
In Spring Cloud Gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed, and unsecured. A remote attacker could make a maliciously crafted request resulting in arbitrary remote execution on the remote host.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-gateway'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-gateway'}, 'ranges': [{'type': 'ECOSYSTEM', 'events':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22947'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-22947'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'},...
{'cwe_ids': ['CWE-917', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-04T21:06:22Z', 'nvd_published_at': '2022-03-03T22:15:00Z'}
1.4.0
GHSA-cr6m-62pq-hmqh
2022-04-04T21:37:38Z
2022-03-04T00:00:18Z
null
['CVE-2022-0841']
OS Command injection in npm-lockfile
npm-lockfile safely generates an npm lockfile and output it to the filename of your choice. npm-lockfile before 2.0.4 does not santize unsafe external input and invoke sensitive command execution API with the input, causing command injection vulnerability. A fix was released in version 2.0.5.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'npm-lockfile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.3'}, {'fixed': '2.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0841'}, {'type': 'WEB', 'url': 'https://github.com/ljharb/npm-lockfile/commit/bfdb84813260f0edbf759f2fde1e8c816c1478b8'}, {'type': 'PACKAGE', 'url': 'https://github.com/ljharb/npm-lockfile'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4f806...
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-04T21:20:11Z', 'nvd_published_at': '2022-03-03T16:15:00Z'}
1.4.0
GHSA-2p89-ppc2-mrq4
2022-03-18T20:45:44Z
2022-03-02T00:00:22Z
null
['CVE-2022-0743']
Cross site scripting in getgrav/grav
User input is not properly sanitized leading to cross site scrpting (xss) in grav.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.31'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0743'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/3dd0cabeac9835fe64dcb4b68c658b39f1f6be2f'}, {'type': 'PACKAGE', 'url': 'https://github.com/getgrav/grav'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/32ea4ddb-5b41-4bf9-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-02T21:20:20Z', 'nvd_published_at': '2022-02-28T23:15:00Z'}
1.4.0
GHSA-q24h-5rq3-63j9
2022-03-10T21:57:56Z
2022-03-04T00:00:19Z
null
['CVE-2022-0528']
Incorrect Authorization in @uppy/companion
@uppy/companion prior to version 3.3.1 is vulnerable to incorrect authorization. A user with URL upload access could enumerate internal companion server networks, send local webservers files to the destination server, and finally download them If each of these files had a guessable and regular name.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@uppy/companion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0528'}, {'type': 'WEB', 'url': 'https://github.com/transloadit/uppy/commit/267c34045a1e62c98406d8c31261c604a11e544a'}, {'type': 'PACKAGE', 'url': 'https://github.com/transloadit/uppy'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8b060cc3-24...
{'cwe_ids': ['CWE-200', 'CWE-863', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T21:57:56Z', 'nvd_published_at': '2022-03-03T07:15:00Z'}
1.4.0
GHSA-gw4j-4229-q4px
2022-03-18T17:56:45Z
2022-03-18T17:56:45Z
null
['CVE-2021-25640']
Server-Side Request Forgery in Apache Dubbo
In Apache Dubbo prior to 2.6.9 and 2.7.10, the usage of parseURL method will lead to the bypass of white host check which can cause open redirect or SSRF vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.7.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.alibaba:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.6.9'}]}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25640'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re4cab8855361a454d2af106fb3dad76259e723015fd7e09cb4f9eb77%40%3Cdev.dubbo.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re4cab8855361a454d2af106fb3...
{'cwe_ids': ['CWE-601', 'CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T19:51:25Z', 'nvd_published_at': '2021-06-01T14:15:00Z'}
1.4.0
GHSA-952p-fqcp-g8pc
2022-03-18T20:14:15Z
2022-03-10T17:49:26Z
null
['CVE-2022-24746']
HTML injection possibility in voucher code form in Shopware
### Impact HTML injection possibility in voucher code form ## Patches Patched in 6.4.8.1, maintainers recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ## Workarou...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.8.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.8.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': ...
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-952p-fqcp-g8pc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24746'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/651598a61073cbe59368e311817bdc6e7fb349c6'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T17:49:26Z', 'nvd_published_at': '2022-03-09T23:15:00Z'}
1.4.0
GHSA-w4f8-fxq2-j35v
2022-03-01T21:04:57Z
2022-03-01T21:04:57Z
null
[]
Possible privilege escalation via bash completion script
The bash completion script for `fscrypt` through v0.3.2 allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint pat...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/google/fscrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/google/fscrypt/security/advisories/GHSA-w4f8-fxq2-j35v'}, {'type': 'PACKAGE', 'url': 'github.com/google/fscrypt'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:04:57Z', 'nvd_published_at': None}
1.4.0
GHSA-x3m3-g8w6-mf28
2022-11-30T20:27:14Z
2022-03-16T00:00:45Z
null
['CVE-2022-27201']
Agent-to-controller security bypass in Jenkins Semantic Versioning Plugin
Jenkins Semantic Versioning Plugin defines a controller/agent message that processes a given file as XML and returns version information. The XML parser is not configured to prevent XML external entity (XXE) attacks, which is only a problem if XML documents are parsed on the Jenkins controller. Jenkins Semantic Versio...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:semantic-versioning-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27201'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/semantic-versioning-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2124'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-...
{'cwe_ids': ['CWE-611', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:27:14Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-x95c-qrqr-2v27
2022-11-30T20:17:58Z
2022-03-16T00:00:43Z
null
['CVE-2022-27205']
CSRF vulnerability and missing permission checks in Extended Choice Parameter Plugin allow SSRF
Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not perform a permission check on form validation methods. This allows attackers with Overall/Read permission to connect to an attacker-specified URL. Additionally, these form validation methods do not require POST requests, resulting in a cross-site...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:extended-choice-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '346.vd87693c5a'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27205'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/extended-choice-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-1350'}, {'type': 'WEB', 'url': 'http://www.openwall.com/list...
{'cwe_ids': ['CWE-276', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:17:58Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-x25h-f84x-wh4m
2022-11-29T22:03:56Z
2022-03-30T00:00:25Z
null
['CVE-2022-28138']
CSRF vulnerability in Jenkins RocketChat Notifier Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins RocketChat Notifier Plugin 1.4.10 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credential.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rocketchatnotifier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28138'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rocketchatnotifier-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2241'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-s...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T22:03:56Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-99wh-973f-779p
2022-03-18T21:04:06Z
2022-03-04T00:00:15Z
null
['CVE-2022-0265']
XML External Entity Reference in Hazelcast
The AbstractXmlConfigRootTagRecognizer() function makes use of SAXParser generated from a SAXParserFactory with no FEATURE_SECURE_PROCESSING set, allowing for XXE attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1-beta1'}, {'fixed': '5.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0265'}, {'type': 'WEB', 'url': 'https://github.com/hazelcast/hazelcast/pull/20407'}, {'type': 'WEB', 'url': 'https://github.com/hazelcast/hazelcast/commit/4d6b666cd0291abd618c3b95cdbb51aa4208e748'}, {'type': 'PACKAGE', 'url': 'https://github.com/ha...
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-04T19:44:17Z', 'nvd_published_at': '2022-03-03T22:15:00Z'}
1.4.0
GHSA-ch63-6cmg-gwg2
2022-11-30T20:22:38Z
2022-03-16T00:00:44Z
null
['CVE-2022-27203']
Arbitrary JSON and property file read vulnerability in Jenkins Extended Choice Parameter Plugin
Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier allows attackers with Item/Configure permission to read values from arbitrary JSON and Java properties files on the Jenkins controller.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:extended-choice-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '346.vd87693c5a'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27203'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-1351'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/15/2'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:22:38Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-x5m8-2r8v-8f97
2022-03-29T22:05:38Z
2022-03-18T00:01:11Z
null
['CVE-2022-25352']
Prototype Pollution in libnested
The package libnested before 1.5.2 are vulnerable to Prototype Pollution via the set function in index.js. **Note:** This vulnerability derives from an incomplete fix for [CVE-2020-28283](https://security.snyk.io/vuln/SNYK-JS-LIBNESTED-1054930)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'libnested'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25352'}, {'type': 'WEB', 'url': 'https://github.com/dominictarr/libnested/commit/c1129865d75fbe52b5a4f755ad3110ca5420f2e1'}, {'type': 'PACKAGE', 'url': 'https://github.com/dominictarr/libnested'}, {'type': 'WEB', 'url': 'https://github.com/dominict...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:57:55Z', 'nvd_published_at': '2022-03-17T12:15:00Z'}
1.4.0
GHSA-pvx3-gm3c-gmpr
2022-03-18T20:06:42Z
2022-03-05T00:00:46Z
null
['CVE-2022-23327']
Denial of Service in Go-Ethereum
A design flaw in Go-Ethereum 1.10.12 and older versions allows an attacker node to send 5120 future transactions with a high gas price in one message, which can purge all of pending transactions in a victim node's memory pool, causing a denial of service (DoS).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23327'}, {'type': 'WEB', 'url': 'https://dl.acm.org/doi/pdf/10.1145/3460120.3485369'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}, {'type': 'WEB', 'url': 'https://tristartom.github.io/docs/ccs21.pdf'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-09T19:20:04Z', 'nvd_published_at': '2022-03-04T12:15:00Z'}
1.4.0
GHSA-cxf7-qrc5-9446
2022-03-10T15:56:28Z
2022-03-01T22:22:26Z
null
['CVE-2022-24720']
Remote shell execution vulnerability in image_processing
### Impact When using the `#apply` method from image_processing to apply a series of operations that are coming from unsanitized user input, this allows the attacker to execute shell commands: ```rb ImageProcessing::Vips.apply({ system: "echo EXECUTED" }) #>> EXECUTED ``` This method is called internally by Active S...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'image_processing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/janko/image_processing/security/advisories/GHSA-cxf7-qrc5-9446'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24720'}, {'type': 'WEB', 'url': 'https://github.com/janko/image_processing/commit/038e4574e8f4f4b636a62394e09983c71980dada'}, {'type': 'PAC...
{'cwe_ids': ['CWE-20', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:22:26Z', 'nvd_published_at': '2022-03-01T23:15:00Z'}
1.4.0
GHSA-pv39-qp28-4mgh
2022-04-12T16:40:09Z
2022-03-26T00:00:32Z
null
['CVE-2021-43090']
Improper Restriction of XML External Entity Reference in soa-model
Soa-model is a toolkit and Java API for WSDL, WADL and XML Schema. An XML External Entity (XXE) vulnerability exists in versions of soa-model prior to 1.6.4 in the WSDLParser function. This issue has been fixed in version 1.6.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.predic8:soa-model-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.predic8:soa-model-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6....
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43090'}, {'type': 'WEB', 'url': 'https://github.com/membrane/soa-model/issues/281'}, {'type': 'WEB', 'url': 'https://github.com/membrane/soa-model/commit/19de16902468e7963cc4dc6b544574bc1ea3f251'}, {'type': 'WEB', 'url': 'https://github.com/membran...
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T15:05:12Z', 'nvd_published_at': '2022-03-25T16:15:00Z'}
1.4.0
GHSA-cjvr-mfj7-j4j8
2022-04-05T18:51:13Z
2022-03-01T22:12:47Z
null
['CVE-2022-0577']
Incorrect Authorization and Exposure of Sensitive Information to an Unauthorized Actor in scrapy
### Impact If you manually define cookies on a [`Request`](https://docs.scrapy.org/en/latest/topics/request-response.html#scrapy.http.Request) object, and that `Request` object gets a redirect response, the new `Request` object scheduled to follow the redirect keeps those user-defined cookies, regardless of the target...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'scrapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'scrapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/security/advisories/GHSA-cjvr-mfj7-j4j8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0577'}, {'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/commit/8ce01b3b76d4634f55067d6cfdf632ec70ba304a'}, {'type': 'WEB', 'url': 'https://...
{'cwe_ids': ['CWE-200', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:12:47Z', 'nvd_published_at': None}
1.4.0
GHSA-xp82-jmw8-mjxp
2022-03-30T19:58:48Z
2022-03-23T00:00:23Z
null
['CVE-2022-1034']
Unrestricted Upload of File with Dangerous Type in ShowDoc
There is a Unrestricted Upload of File vulnerability in ShowDoc prior to version 2.10.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1034'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/bd792a89c0325836fbd64784f4c4117c0171416b'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d205c489-3266...
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T19:58:48Z', 'nvd_published_at': '2022-03-22T08:15:00Z'}
1.4.0
GHSA-2v82-5746-vwqc
2022-03-18T17:49:28Z
2022-03-18T17:49:28Z
null
['CVE-2021-29625']
XSS in doc_link
### Impact Users of MySQL, MariaDB, PgSQL and SQLite are affected. XSS is in most cases prevented by strict CSP in all modern browsers. The only exception is when Adminer is using a `pdo_` extension to communicate with the database (it is used if the native extensions are not enabled). In browsers without CSP, Adminer ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'vrana/adminer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.7.8'}, {'fixed': '4.8.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/vrana/adminer/security/advisories/GHSA-2v82-5746-vwqc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29625'}, {'type': 'WEB', 'url': 'https://github.com/vrana/adminer/commit/4043092ec2c0de2258d60a99d0c5958637d051a7'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T19:18:12Z', 'nvd_published_at': '2021-05-19T22:15:00Z'}
1.4.0
GHSA-8m49-2xj8-67v9
2022-04-28T18:02:03Z
2022-03-31T00:00:24Z
null
['CVE-2022-27816']
Data Loss/Denial of Service in SWHKD
SWHKD 1.1.5 unsafely uses the /tmp/swhks.pid pathname. There can be data loss or a denial of service. A patch is available on the `1.1.0` branch of the repository.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'Simple-Wayland-HotKey-Daemon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27816'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/commit/0b620a09605afb815c6d8d8953bbb7a10a8c0575'}, {'type': 'PACKAGE', 'url': 'https://github.com/waycrate/swhkd'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/release...
{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T15:15:32Z', 'nvd_published_at': '2022-03-30T02:15:00Z'}
1.4.0
GHSA-4vvg-x86p-mvqc
2022-03-28T17:26:41Z
2022-03-14T22:43:23Z
null
['CVE-2022-24762']
Leaking of user information on Cross-Domain communication in sysend
### Impact Users that use Cross-Origin communication and send sensitive information make it possible for this data to be intercepted. This is not a big impact because it happens only on the same browser. ### Patches It has been patched in version 1.10.0 ### Workarounds The only workaround is to not send sensitive inf...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'sysend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jcubic/sysend.js/security/advisories/GHSA-4vvg-x86p-mvqc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24762'}, {'type': 'WEB', 'url': 'https://github.com/jcubic/sysend.js/issues/33'}, {'type': 'WEB', 'url': 'https://github.com/jcubic/sysend.js/com...
{'cwe_ids': ['CWE-200', 'CWE-346'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:43:23Z', 'nvd_published_at': '2022-03-14T23:15:00Z'}
1.4.0
GHSA-h99w-9q5r-gjq9
2022-08-16T19:37:40Z
2022-03-30T21:48:50Z
null
['CVE-2022-24790']
Puma vulnerable to HTTP Request Smuggling
When using Puma behind a proxy that does not properly validate that the incoming HTTP request matches the RFC7230 standard, Puma and the frontend proxy may disagree on where a request starts and ends. This would allow requests to be smuggled via the front-end proxy to Puma. The following vulnerabilities are addressed ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.6.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.12'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-h99w-9q5r-gjq9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24790'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/commit/5bb7d202e24dec00a898dca4aa11db391d7787a5'}, {'type': 'PACKAGE', 'url': 'https://git...
{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T21:48:50Z', 'nvd_published_at': '2022-03-30T22:15:00Z'}
1.4.0
GHSA-g585-j55v-38h7
2022-03-29T18:40:41Z
2022-03-16T00:00:45Z
null
['CVE-2022-0966']
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0966'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e06c0d55-00a3...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T18:40:41Z', 'nvd_published_at': '2022-03-15T16:15:00Z'}
1.4.0
GHSA-jpj5-hg26-6jgc
2022-03-23T15:47:27Z
2022-03-13T00:00:54Z
null
['CVE-2022-26533']
Cross-site Scripting in Alist
Alist versions 2.0.10 through 2.1.0 were discovered to contain a cross-site scripting (XSS) vulnerability via /i/:data/ipa.plist. This issue was fixed in version 2.1.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/Xhofe/alist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.10'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26533'}, {'type': 'WEB', 'url': 'https://github.com/Xhofe/alist/issues/645'}, {'type': 'WEB', 'url': 'https://github.com/Xhofe/alist/commit/6af17e2509a400979420f613fd7f2f9721fdcd6e'}, {'type': 'PACKAGE', 'url': 'https://github.com/Xhofe/alist'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T15:47:27Z', 'nvd_published_at': '2022-03-12T01:15:00Z'}
1.4.0
GHSA-3p22-ghq8-v749
2022-03-22T18:49:36Z
2022-03-22T18:49:36Z
null
['CVE-2022-21718']
Renderers can obtain access to random bluetooth device without permission in Electron
### Impact This vulnerability allows renderers to obtain access to a random bluetooth device via the [web bluetooth API](https://developer.mozilla.org/en-US/docs/Web/API/Web_Bluetooth_API) if the app has not configured a custom `select-bluetooth-device` event handler. The device that is accessed is random and the atta...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.6.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0-beta.1'}, {'fixed': '14.2.4'}]}]}, {'package': {'ecosy...
[{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-3p22-ghq8-v749'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21718'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/32178'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron...
{'cwe_ids': ['CWE-668', 'CWE-862'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-22T18:49:36Z', 'nvd_published_at': '2022-03-22T17:15:00Z'}
1.4.0
GHSA-8pp6-8x4q-c5mx
2022-04-07T15:30:27Z
2022-03-30T00:00:31Z
null
['CVE-2022-24789']
Server side request forgery in C1 CMS
C1 CMS is an open-source, .NET based Content Management System (CMS). Versions prior to 6.12 allow an authenticated user to exploit Server Side Request Forgery (SSRF) by causing the server to make arbitrary GET requests to other servers in the local network or on localhost. The attacker may also truncate arbitrary file...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'C1CMS.Assemblies'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.12.8122.18346'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.11.7982.26191'}}]
[{'type': 'WEB', 'url': 'https://github.com/Orckestra/C1-CMS-Foundation/security/advisories/GHSA-j9c2-gr6m-pp45'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24789'}, {'type': 'PACKAGE', 'url': 'https://github.com/Orckestra/C1-CMS-Foundation'}, {'type': 'WEB', 'url': 'https://github.com/Orck...
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:30:27Z', 'nvd_published_at': '2022-03-28T22:15:00Z'}
1.4.0
GHSA-6wrh-279j-6hvw
2022-03-18T20:15:05Z
2022-03-10T17:55:21Z
null
['CVE-2022-24747']
HTTP caching is marking private HTTP headers as public in Shopware
### Impact HTTP caching is marking private HTTP headers as public ## Patches Fixed in recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ## Workarounds For older v...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.8.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.8.1'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': ...
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-6wrh-279j-6hvw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24747'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T17:55:21Z', 'nvd_published_at': '2022-03-09T23:15:00Z'}
1.4.0
GHSA-62m3-fc7f-jpp8
2023-09-11T15:01:47Z
2022-03-26T00:09:58Z
null
['CVE-2019-10905']
Parsedown Class-Name Injection
Parsedown before 1.7.2, when safe mode is used and HTML markup is disabled, might allow attackers to execute arbitrary JavaScript code if a script (already running on the affected page) executes the contents of any element with a specific class. This occurs because spaces are permitted in code block infostrings, which ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'erusev/parsedown'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10905'}, {'type': 'WEB', 'url': 'https://github.com/erusev/parsedown/issues/699'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/erusev/parsedown/CVE-2019-10905.yaml'}, {'type': 'PACKAGE', 'url': 'https://g...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:09:58Z', 'nvd_published_at': None}
1.4.0
GHSA-7jh8-ghwc-82cw
2022-11-29T23:20:43Z
2022-03-30T00:00:24Z
null
['CVE-2022-28145']
Cross-site Scripting (XSS) vulnerability in Jenkins Continuous Integration with Toad Edge Plugin
Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier does not apply Content-Security-Policy headers to report files it serves, resulting in a stored cross-site scripting (XSS) exploitable by attackers with Item/Configure permission or otherwise able to control report contents.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ci-with-toad-edge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28145'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ci-with-toad-edge-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1892'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T23:20:43Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-9wvr-x83m-84v4
2022-11-30T18:53:13Z
2022-03-16T00:00:43Z
null
['CVE-2022-27217']
Passwords stored in plain text by Jenkins Vmware vRealize CodeStream Plugin
Jenkins Vmware vRealize CodeStream Plugin 1.2 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.vmware.vcac:vmware-vrealize-codestream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27217'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/vmware-vrealize-codestream-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2238'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lis...
{'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T18:53:13Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-r6cm-wg48-rh2r
2022-04-17T17:13:16Z
2022-03-10T00:00:40Z
null
['CVE-2022-0482']
Exposure of Private Personal Information to an Unauthorized Actor in alextselegidis/easyappointments
The software is a booking management system that has a public form to place bookings, and a private area for the calendar and management of services, users, settings, etc. There is a backend API that allows data manipulation, including listing the appointments for a specific time range. This happens on this endpoint: /...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'alextselegidis/easyappointments'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0482'}, {'type': 'WEB', 'url': 'https://github.com/alextselegidis/easyappointments/commit/44af526a6fc5e898bc1e0132b2af9eb3a9b2c466'}, {'type': 'PACKAGE', 'url': 'https://github.com/alextselegidis/easyappointments'}, {'type': 'WEB', 'url': 'https://...
{'cwe_ids': ['CWE-359', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T21:50:52Z', 'nvd_published_at': '2022-03-09T11:15:00Z'}
1.4.0
GHSA-968c-mm28-jfw4
2022-09-08T00:00:56Z
2022-03-04T00:00:17Z
null
['CVE-2022-23899']
SQL injection in net.mingsoft:ms-mcms
MCMS v5.2.5 was discovered to contain a SQL injection vulnerability via search.do in the file /web/MCmsAction.java.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23899'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/63'}, {'type': 'PACKAGE', 'url': 'https://github.com/ming-soft/MCMS'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-08T00:00:56Z', 'nvd_published_at': '2022-03-03T19:15:00Z'}
1.4.0
GHSA-v3wr-67px-44xg
2022-03-03T19:11:14Z
2022-03-03T19:11:14Z
null
[]
Execution with Unnecessary Privileges in arc-electron
### Impact When the end-user click on the response header that contains a link the target will be opened in ARC new window. This window will have the default preload script loaded which allows the scripts embedded in the link target to execute any logic that ARC has access to from the renderer process, which includes ...
[]
[{'package': {'ecosystem': 'npm', 'name': '@advanced-rest-client/base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/advanced-rest-client/arc-electron/security/advisories/GHSA-v3wr-67px-44xg'}, {'type': 'PACKAGE', 'url': 'https://github.com/advanced-rest-client/arc-electron'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T19:11:14Z', 'nvd_published_at': None}
1.4.0
GHSA-crp2-qrr5-8pq7
2022-03-29T19:11:08Z
2022-03-02T21:33:17Z
null
['CVE-2022-23648']
containerd CRI plugin: Insecure handling of image volumes
### Impact A bug was found in containerd where containers launched through containerd’s CRI implementation with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kub...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixe...
[{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23648'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70'}, {'type': 'PACKA...
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-02T21:33:17Z', 'nvd_published_at': '2022-03-03T14:15:00Z'}
1.4.0
GHSA-9gqr-xp86-f87h
2022-03-25T16:13:13Z
2022-03-18T00:01:11Z
null
['CVE-2021-23632']
Code injection in npm git
All versions of package git are vulnerable to Remote Code Execution (RCE) due to missing sanitization in the Git.git method, which allows execution of OS commands rather than just git commands. At this time, there is no known workaround. There has been no patch released.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23632'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GIT-1568518'}]
{'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:39:15Z', 'nvd_published_at': '2022-03-17T12:15:00Z'}
1.4.0
GHSA-32j9-6qqm-mq9g
2022-03-30T20:16:16Z
2022-03-17T00:00:27Z
null
['CVE-2022-21164']
Unhandled case in node-lmdb
The package node-lmdb before 0.9.7 is vulnerable to Denial of Service (DoS) when defining a non-invokable `ToString` value, which will cause a crash during type check.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-lmdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21164'}, {'type': 'WEB', 'url': 'https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a'}, {'type': 'PACKAGE', 'url': 'https://github.com/Venemo/node-lmdb'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODELMDB...
{'cwe_ids': ['CWE-241', 'CWE-703'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-19T00:10:41Z', 'nvd_published_at': '2022-03-16T16:15:00Z'}
1.4.0
GHSA-cr8c-972v-rmp3
2023-06-30T20:26:42Z
2022-03-17T00:00:24Z
null
['CVE-2022-0959']
pgAdmin 4 Path Traversal vulnerability
When run in server mode, pgAdmin 4 allows users to store files on the server under individual storage directories. Files such as SQL scripts may be uploaded through the user interface. The URI to which upload requests are made fails to validate the upload path to prevent path traversal techniques being used to store fi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pgadmin4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0959'}, {'type': 'WEB', 'url': 'https://github.com/pgadmin-org/pgadmin4/commit/dccd4f0bbaafa783d9f0360c7592b128d5cc3928'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2063759'}, {'type': 'PACKAGE', 'url': 'https://github.com...
{'cwe_ids': ['CWE-22', 'CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:26:42Z', 'nvd_published_at': '2022-03-16T15:15:00Z'}
1.4.0
GHSA-m5pq-gvj9-9vr8
2022-08-11T20:38:52Z
2022-03-08T20:00:36Z
null
['CVE-2022-24713']
Rust's regex crate vulnerable to regular expression denial of service
> This is a cross-post of [the official security advisory][advisory]. The official advisory contains a signed version with our PGP key, as well. [advisory]: https://groups.google.com/g/rustlang-security-announcements/c/NcNNL1Jq7Yw The Rust Security Response WG was notified that the `regex` crate did not properly limi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'regex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/rust-lang/regex/security/advisories/GHSA-m5pq-gvj9-9vr8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24713'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/regex/commit/ae70b41d4f46641dbc45c7a4f87954aea356283e'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-08T20:00:36Z', 'nvd_published_at': '2022-03-08T19:15:00Z'}
1.4.0
GHSA-7wfc-x4f7-gg2x
2022-03-18T17:58:01Z
2022-03-18T17:58:01Z
null
['CVE-2021-30180']
Code injection in Apache Dubbo
Apache Dubbo prior to 2.7.9 support Tag routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers may enable calling arbitrary constructors.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30180'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raed526465e56204030ddf374b1959478a290e7511971d7aba2e9e39b%40%3Cdev.dubbo.apache.org%3E'}]
{'cwe_ids': ['CWE-444', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T20:19:48Z', 'nvd_published_at': '2021-06-01T14:15:00Z'}
1.4.0
GHSA-4gr7-qw2q-jxh6
2022-03-22T21:37:08Z
2022-03-12T00:00:27Z
null
['CVE-2021-44667']
Cross-site Scripting in Nacos
A Cross Site Scripting (XSS) vulnerability exists in Nacos 2.0.3 in auth/users via the (1) pageSize and (2) pageNo parameters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba.nacos:nacos-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44667'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/issues/7359'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/commit/cd6d7e33b94f24814701f3faf8b632e5e85444c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/alibaba/naco...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:25:35Z', 'nvd_published_at': '2022-03-11T19:15:00Z'}
1.4.0
GHSA-jvfv-hrrc-6q72
2022-03-18T21:12:35Z
2022-03-05T00:00:45Z
null
['CVE-2022-0839']
Improper Restriction of XML External Entity Reference in Liquibase
The XMLChangeLogSAXParser() function in Liquibase prior to version 4.8.0 contains an issue that may lead to to Improper Restriction of XML External Entity Reference.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.liquibase:liquibase-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0839'}, {'type': 'WEB', 'url': 'https://github.com/liquibase/liquibase/commit/33d9d925082097fb1a3d2fc8e44423d964cd9381'}, {'type': 'PACKAGE', 'url': 'https://github.com/liquibase/liquibase'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f1ae5...
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T16:29:11Z', 'nvd_published_at': '2022-03-04T15:15:00Z'}
1.4.0
GHSA-vvff-6wrr-4g7q
2023-02-08T22:41:33Z
2022-03-24T00:00:17Z
null
['CVE-2021-3589']
Missing Authentication for Critical Function in Foreman Ansible
An authorization flaw was found in Foreman Ansible. An authenticated attacker with certain permissions to create and run Ansible jobs can access hosts through job templates. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'foreman_ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3589'}, {'type': 'WEB', 'url': 'https://github.com/theforeman/foreman_ansible/commit/a5e0827bc3ec6c8ab82f968907857a15646305d5'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-3589'}, {'type': 'WEB', 'url': 'https://bugzill...
{'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T20:01:57Z', 'nvd_published_at': '2022-03-23T20:15:00Z'}
1.4.0
GHSA-p6h4-93qp-jhcm
2022-04-19T18:24:25Z
2022-03-11T23:53:23Z
null
['CVE-2022-24760']
Command injection in Parse Server through prototype pollution
### Impact This is a Remote Code Execution (RCE) vulnerability in Parse Server. This vulnerability affects Parse Server in the default configuration with MongoDB. The main weakness that leads to RCE is the Prototype Pollution vulnerable code in the file `DatabaseController.js`, so it is likely to affect Postgres and an...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-p6h4-93qp-jhcm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24760'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/886bfd7cac69496e3f73d4bb536f0eec3cba0e4d'}, {...
{'cwe_ids': ['CWE-1321', 'CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T23:53:23Z', 'nvd_published_at': '2022-03-12T00:15:00Z'}
1.4.0
GHSA-m6gg-86c6-gfr9
2023-03-15T19:19:13Z
2022-03-04T00:00:15Z
2023-03-15T19:19:13Z
['CVE-2022-23710']
Withdrawn: Cross-site Scripting in Kibana
##Withdrawn: This advisory is for Kibana, not ElasticSearch as it was originally published, and is withdrawn as being out of scope of our supported ecosystems. A cross-site-scripting (XSS) vulnerability was discovered in the Data Preview Pane (previously known as Index Pattern Preview Pane) which could allow arbitrary...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.16.0'}, {'fixed': '7.17.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23710'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-17-1-security-update/298447'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220325-0009/'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-19T00:15:26Z', 'nvd_published_at': '2022-03-03T22:15:00Z'}
1.4.0
GHSA-xjp4-6w75-qrj7
2022-03-01T21:44:13Z
2022-03-01T21:44:13Z
null
['CVE-2022-24711']
Remote CLI Command Execution Vulnerability in CodeIgniter4
### Impact This vulnerability allows attackers to execute CLI routes via HTTP request. ### Patches Upgrade to v4.1.9 or later. ### Workarounds None. ### For more information If you have any questions or comments about this advisory: * Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeI...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter4/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-xjp4-6w75-qrj7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24711'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/commit/202f41ad522ba1d414b9d9c35aba1cb0c156b781'}, {'type'...
{'cwe_ids': ['CWE-20', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:44:13Z', 'nvd_published_at': '2022-02-28T16:15:00Z'}
1.4.0
GHSA-8xf4-w7qw-pjjw
2023-02-17T14:26:38Z
2022-03-30T00:00:27Z
null
['CVE-2021-46743']
Firebase PHP-JWT key/algorithm type confusion
In Firebase PHP-JWT before 6.0.0, an algorithm-confusion issue (e.g., RS256 / HS256) exists via the kid (aka Key ID) header, when multiple types of keys are loaded in a key ring. This allows an attacker to forge tokens that validate under the incorrect key. NOTE: this provides a straightforward way to use the PHP-JWT l...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'firebase/php-jwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46743'}, {'type': 'WEB', 'url': 'https://github.com/firebase/php-jwt/issues/351'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/firebase/php-jwt/CVE-2021-46743.yaml'}, {'type': 'PACKAGE', 'url': 'https://g...
{'cwe_ids': ['CWE-347', 'CWE-843'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T14:26:38Z', 'nvd_published_at': '2022-03-29T07:15:00Z'}
1.4.0
GHSA-q3x2-jvp3-wj78
2022-03-29T15:42:17Z
2022-03-16T00:00:47Z
null
['CVE-2022-0963']
Unrestricted XML files leading to cross-site scripting in Microweber
Microweber prior to 1.2.12 allows unrestricted upload of XML files, which malicious actors can exploit to cause a stored cross-site scripting attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0963'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T15:42:17Z', 'nvd_published_at': '2022-03-15T16:15:00Z'}
1.4.0
GHSA-fx95-883v-4q4h
2022-03-29T22:03:08Z
2022-03-18T00:01:11Z
null
['CVE-2022-21221']
Path traversal in github.com/valyala/fasthttp
The package github.com/valyala/fasthttp before 1.34.0 is vulnerable to Directory Traversal via the ServeFile function, due to improper sanitization. It is possible to be exploited by using a backslash %5c character in the path. **Note:** This security issue impacts Windows users only.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/valyala/fasthttp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.34.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21221'}, {'type': 'WEB', 'url': 'https://github.com/valyala/fasthttp/issues/1226'}, {'type': 'WEB', 'url': 'https://github.com/valyala/fasthttp/commit/15262ecf3c602364639d465daba1e7f3604d00e8'}, {'type': 'WEB', 'url': 'https://github.com/valyala/fa...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:58:55Z', 'nvd_published_at': '2022-03-17T12:15:00Z'}
1.4.0
GHSA-q787-qgw2-j2qf
2022-11-30T20:47:26Z
2022-03-30T00:00:21Z
null
['CVE-2022-28159']
Stored Cross-site Scripting vulnerability in Jenkins Tests Selector Plugin
Jenkins Tests Selector Plugin 1.3.3 and earlier does not escape the Properties File Path option for Choosing Tests parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:selected-tests-executor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28159'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/selected-tests-executor-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2262'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:47:26Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-m2wv-m5pf-284r
2022-04-05T18:37:01Z
2022-03-29T00:01:09Z
null
['CVE-2022-26980']
Cross-site Scripting in teampass
Teampass 2.1.26 allows reflected XSS via the index.php PATH_INFO. Someone must open a link for the Teampass Password Manager index page containing malicious payload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.26'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26980'}, {'type': 'WEB', 'url': 'https://gist.github.com/RNPG/6919286e0daebce7634d0a744e060dca'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/TeamPass/commits/teampass_2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:37:01Z', 'nvd_published_at': '2022-03-28T19:15:00Z'}
1.4.0
GHSA-4cx6-fj7j-pjx9
2022-03-18T21:10:48Z
2022-03-10T18:17:50Z
null
['CVE-2022-24753']
Code injection in Stripe CLI on windows
### Impact A vulnerability in Stripe CLI exists on Windows when certain commands are run in a directory where an attacker has planted files. The commands are `stripe login`, `stripe config -e`, `stripe community`, and `stripe open`. MacOS and Linux are unaffected. An attacker who successfully exploits the vulnerabilit...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/stripe/stripe-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.13'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/stripe/stripe-cli/security/advisories/GHSA-4cx6-fj7j-pjx9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24753'}, {'type': 'WEB', 'url': 'https://github.com/stripe/stripe-cli/commit/be38da5c0191adb77f661f769ffff2fbc7ddf6cd'}, {'type': 'PACKAGE', 'ur...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T18:17:50Z', 'nvd_published_at': '2022-03-09T23:15:00Z'}
1.4.0
GHSA-4p8f-2fwv-6xcw
2022-11-29T22:23:53Z
2022-03-30T00:00:25Z
null
['CVE-2022-28139']
Missing permission check in Jenkins RocketChat Notifier Plugin
RocketChat Notifier Plugin 1.4.10 and earlier does not perform a permission check in a method implementing form validation. This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rocketchatnotifier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28139'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rocketchatnotifier-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2241'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-s...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T22:23:53Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-wg4r-q74r-p7c8
2022-03-23T15:42:44Z
2022-03-15T00:01:03Z
null
['CVE-2022-0941']
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting due to unrestricted file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0941'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/040a910e-e689...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T14:08:21Z', 'nvd_published_at': '2022-03-14T13:15:00Z'}
1.4.0
GHSA-8g4m-cjm2-96wq
2022-03-25T16:47:42Z
2022-03-18T00:01:11Z
null
['CVE-2021-23771']
Sandbox escape in notevil and argencoders-notevil
This affects all versions of package notevil; all versions of package argencoders-notevil. It is vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing an attacker to add or modify an object's prototype. **Note:** This vulnerability derives from a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'notevil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'argencoders-notevil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23771'}, {'type': 'PACKAGE', 'url': 'https://github.com/mmckegg/notevil'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ARGENCODERSNOTEVIL-2388587'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NOTEVIL-2385946'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:07:57Z', 'nvd_published_at': '2022-03-17T12:15:00Z'}
1.4.0
GHSA-69wp-xwm7-69wm
2022-04-01T13:50:10Z
2022-03-22T00:00:43Z
null
['CVE-2022-25481']
Exposure of Resource to Wrong Sphere in ThinkPHP Framework
ThinkPHP Framework v5.0.24 was discovered to be configured without the PATHINFO parameter. This allows attackers to access all system environment parameters from index.php.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.0.24'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25481'}, {'type': 'WEB', 'url': 'https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/top-think/framework'}]
{'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T13:50:10Z', 'nvd_published_at': '2022-03-21T00:15:00Z'}
1.4.0
GHSA-9vp3-7qwq-83r9
2022-03-25T13:33:46Z
2022-03-17T00:00:48Z
null
['CVE-2021-45851']
Server-Side Request Forgery in FUXA
A Server-Side Request Forgery (SSRF) attack in FUXA 1.1.3 can be carried out leading to the obtaining of sensitive information from the server's internal environment and services, often potentially leading to the attacker executing commands on the server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@frangoteam/fuxa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45851'}, {'type': 'PACKAGE', 'url': 'https://github.com/frangoteam/FUXA'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=JE1Kcq3iJpc'}]
{'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-25T13:33:46Z', 'nvd_published_at': '2022-03-16T10:15:00Z'}
1.4.0
GHSA-5vjc-qx43-r747
2022-03-18T23:57:52Z
2022-03-18T23:57:52Z
null
[]
Stored Cross-site Scripting in folder-auth plugin
Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission. Folder-based Authorization Strategy Plugin 1.4 escapes the names...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:folder-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jenkinsci/folder-auth-plugin/security/advisories/GHSA-5vjc-qx43-r747'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/folder-auth-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2646'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:57:52Z', 'nvd_published_at': None}
1.4.0
GHSA-6pc9-xqrg-wfqw
2022-03-24T23:36:54Z
2022-03-16T00:00:47Z
null
['CVE-2022-0430']
Exposure of Sensitive information in httpie
httpie is a modern, user-friendly command-line HTTP client for the API era. Prior to version 3.1.0, all cookies saved to session storage are supercookies. At this time, there is no known workaround. Users are recommended to update to version 3.1.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'httpie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0430'}, {'type': 'WEB', 'url': 'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'}, {'type': 'PACKAGE', 'url': 'https://github.com/httpie/httpie'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tr...
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-19T00:00:15Z', 'nvd_published_at': None}
1.4.0
GHSA-4r65-35qq-ch8j
2023-02-15T19:18:40Z
2022-03-04T00:00:17Z
null
['CVE-2021-3620']
Ansible discloses sensitive information in traceback error message
Ansible is an IT automation system that handles configuration management, application deployment, cloud provisioning, ad-hoc task execution, network automation, and multi-node orchestration. A flaw was found in Ansible Engine's ansible-connection module where sensitive information, such as the Ansible user credentials,...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.27'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3620'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/fe28767970c8ec62aabe493c46b53a5de1e5fac0'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2021:3871'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errat...
{'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-24T21:40:53Z', 'nvd_published_at': '2022-03-03T19:15:00Z'}
1.4.0
GHSA-48p3-xfvw-g59c
2022-04-05T19:27:38Z
2022-03-29T00:01:16Z
null
['CVE-2021-26598']
Incorrect Access Control in ImpressCMS
ImpressCMS before 1.4.3 has Incorrect Access Control because include/findusers.php allows access by unauthenticated attackers (who are, by design, able to have a security token).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26598'}, {'type': 'WEB', 'url': 'https://github.com/ImpressCMS/impresscms/pull/967'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1081137'}, {'type': 'PACKAGE', 'url': 'https://github.com/ImpressCMS/impresscms'}, {'type': 'WEB', 'url': 'h...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T19:56:34Z', 'nvd_published_at': '2022-03-28T01:15:00Z'}
1.4.0
GHSA-w2j5-3rcx-vx7x
2022-03-15T20:02:54Z
2022-03-15T20:02:54Z
null
[]
Sysctls applied to containers with host IPC or host network namespaces can affect the host
### Impact Before setting the sysctls for a pod, the pods namespaces must be unshared (created). However, in cases where the pod is using a host network or IPC namespace, a bug in CRI-O caused the namespace creating tool [pinns](https://github.com/cri-o/cri-o/tree/main/pinns/) to configure the sysctls of the host. This...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.23.0'}, {'fixed': '1.23.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.22.0'}, {'fixed': '1.22.2'}]...
[{'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/security/advisories/GHSA-w2j5-3rcx-vx7x'}, {'type': 'PACKAGE', 'url': 'https://github.com/cri-o/cri-o'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-15T20:02:54Z', 'nvd_published_at': None}
1.4.0
GHSA-rphc-h572-2x9f
2022-03-24T22:38:55Z
2022-03-15T00:00:55Z
null
['CVE-2022-0960']
Cross-site Scripting in showdoc/showdoc
ShowDoc is a tool greatly applicable for an IT team to share documents online. showdoc/showdoc allows .properties files to upload which lead to stored XSS in versions prior to 2.10.4. This allows attackers to execute malicious scripts in the user's browser. This issue was patched in version 2.10.4. There is currently n...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0960'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/462cd8a7-b1a9...
{'cwe_ids': ['CWE-434', 'CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-15T19:26:12Z', 'nvd_published_at': '2022-03-14T15:15:00Z'}
1.4.0
GHSA-cr3q-pqgq-m8c2
2022-03-29T19:09:55Z
2022-03-12T00:00:36Z
null
['CVE-2018-25031']
Spoofing attack in swagger-ui
Swagger UI before 4.1.3 could allow a remote attacker to conduct spoofing attacks. By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25031'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/issues/4872'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/pull/7697'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}, {'type...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:31:48Z', 'nvd_published_at': '2022-03-11T07:15:00Z'}
1.4.0
GHSA-hrf4-hcpc-3345
2022-03-25T17:09:24Z
2022-03-16T00:00:48Z
null
['CVE-2022-0961']
Denial of service in microweber
Microweber is drag and drop website builder and CMS with E-commerce. The microweber prior 1.2.12 application allows large characters to insert in the input field "post title" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The post title input can be limited to 500 characters or...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0961'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/f7acbd075dff4825b35b597b74958de9edce67fc'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c...
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-19T00:16:10Z', 'nvd_published_at': '2022-03-15T15:15:00Z'}
1.4.0
GHSA-qg5x-66hp-cw5p
2022-04-05T18:52:26Z
2022-03-31T00:00:23Z
null
['CVE-2022-25598']
Uncontrolled Resource Consumption in Apache DolphinScheduler
Apache DolphinScheduler user registration is vulnerable to Regular express Denial of Service (ReDoS) attacks. Apache DolphinScheduler users should upgrade to version 2.0.5 or higher.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-dolphinscheduler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'f...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25598'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dolphinscheduler'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-dolphinscheduler/PYSEC-2022-176.yaml'}, {'type': 'WEB', 'url': 'https://list...
{'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T15:38:43Z', 'nvd_published_at': '2022-03-30T10:15:00Z'}
1.4.0
GHSA-cj78-rgw3-4h5p
2022-03-28T15:56:00Z
2022-03-11T00:02:02Z
null
['CVE-2022-26661']
Improper Restriction of XML External Entity Reference in trytond and proteus
An XXE issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An authenticated user can make the serv...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'trytond'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.46'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'trytond'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26661'}, {'type': 'WEB', 'url': 'https://discuss.tryton.org/t/security-release-for-issue11219-and-issue11244/5059'}, {'type': 'WEB', 'url': 'https://foss.heptapod.net/tryton/tryton/-/issues/11219'}, {'type': 'PACKAGE', 'url': 'https://hg.tryton.org...
{'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T15:56:00Z', 'nvd_published_at': '2022-03-10T17:47:00Z'}
1.4.0
GHSA-7r79-mrp6-8mhq
2022-03-10T16:00:56Z
2022-03-02T00:00:19Z
null
['CVE-2022-0777']
Rate limit missing in microweber
Microweber prior to version 1.3 does not rate limit password reset emails.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0777'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/a3944cf9d1d8c41a48297ddc98302934e2511b0f'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b...
{'cwe_ids': ['CWE-640'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-02T21:22:22Z', 'nvd_published_at': '2022-03-01T09:15:00Z'}
1.4.0
GHSA-j878-43hm-8gr5
2022-03-23T15:35:11Z
2022-03-12T00:00:30Z
null
['CVE-2022-0921']
Unrestricted Upload of File with Dangerous Type in Microweber
In Microweber prior to 1.2.12, a malicious actor may abuse the Backup/Restore feature to achieve Remote Code Execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0921'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/867bdda1b4660b0795ad7f87ab5abe9e44b2b318'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e...
{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T15:32:04Z', 'nvd_published_at': '2022-03-11T18:15:00Z'}
1.4.0
GHSA-6c9x-mj3g-h47x
2022-03-29T19:10:02Z
2022-03-12T00:00:36Z
null
['CVE-2021-46708']
Spoofing attack in swagger-ui-dist
The swagger-ui-dist package before 4.1.3 for Node.js could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the vi...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'swagger-ui-dist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46708'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220407-0004/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SWAGGERUIDIST-231488...
{'cwe_ids': ['CWE-1021'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:32:38Z', 'nvd_published_at': '2022-03-11T07:15:00Z'}
1.4.0
GHSA-vqp6-j452-j6wp
2022-03-11T22:27:18Z
2022-03-04T00:00:22Z
null
['CVE-2021-3654']
Open Redirect in CPython that affects users of OpenStack Nova
A vulnerability was found in CPython which is used by openstack-nova's console proxy, noVNC. By crafting a malicious URL, noVNC could be made to redirect to any desired URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '22.0.0'}, {'fixed': '22.2.3'}]}]}, {'package': {'ecosystem': 'PyPI'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3654'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/nova/+bug/1927677'}, {'type': 'WEB', 'url': 'https://bugs.python.org/issue32084'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1961439'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T22:27:18Z', 'nvd_published_at': '2022-03-02T23:15:00Z'}
1.4.0
GHSA-32x6-qvw6-mxj4
2022-03-15T18:05:24Z
2022-03-01T22:14:57Z
null
['CVE-2022-24719']
Forwarding of confidentials headers to third parties in fluture-node
### Impact Using `followRedirects` or `followRedirectsWith` with any of the redirection strategies built into fluture-node 4.0.0 or 4.0.1, paired with a request that includes confidential headers such as Authorization or Cookie, exposes you to a vulnerability where, if the destination server were to redirect the reque...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'fluture-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'request-util'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/fluture-js/fluture-node/security/advisories/GHSA-32x6-qvw6-mxj4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24719'}, {'type': 'WEB', 'url': 'https://github.com/psf/requests/pull/4718'}, {'type': 'WEB', 'url': 'https://github.com/fluture-js/flutur...
{'cwe_ids': ['CWE-200', 'CWE-212', 'CWE-359', 'CWE-601'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:14:57Z', 'nvd_published_at': '2022-03-01T21:15:00Z'}
1.4.0
GHSA-23x5-j68g-6jpw
2022-11-30T20:08:43Z
2022-03-16T00:00:43Z
null
['CVE-2022-27209']
Missing permission checks in Jenkins kubernetes-cd Plugin allow enumerating credentials IDs
kubernetes-cd Plugin 2.3.1 and earlier does not perform permission checks in several HTTP endpoints. This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:kubernetes-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27209'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kubernetes-cd-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2636'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:08:43Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-pccm-j6vj-jwwf
2022-03-29T18:54:13Z
2022-03-15T00:00:54Z
null
['CVE-2022-0962']
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.webma` file upload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0962'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7ebe3e5f-2c86-44de-b83e-2ddb6bbda908'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T18:54:13Z', 'nvd_published_at': '2022-03-14T16:15:00Z'}
1.4.0
GHSA-727h-hrw8-jg8q
2023-08-03T17:41:54Z
2022-03-11T00:02:02Z
null
['CVE-2022-26520']
Path traversal in org.postgresql:postgresql
In pgjdbc before 42.3.3, an attacker (who controls the jdbc URL or properties) can call java.util.logging.FileHandler to write to arbitrary files through the loggerFile and loggerLevel connection properties. An example situation is that an attacker could create an executable JSP file under a Tomcat web root. NOTE: the ...
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '42.1.0'}, {'fixed': '42.3.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-673j-qm5f-xpv8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26520'}, {'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/pull/2454/commits/017b929977b4f85795f9ad2fa5de6e80978b8ccc'}, {'type': 'PACKAGE', ...
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-08T00:02:20Z', 'nvd_published_at': '2022-03-10T17:47:00Z'}
1.4.0
GHSA-636j-7x7r-gvw2
2022-04-13T13:28:21Z
2022-03-31T00:00:22Z
null
['CVE-2022-1155']
Old sessions not blocked by login enable function in Snipe-IT
Snipe-IT is a FOSS project for asset management in IT Operations. In Snipe-IT versions 5.4.1 and 6.0.0-RC-5 and prior, active sessions are not revoked when a user account is disabled, allowing that user to still access information that they should no longer be able to. Workarounds include using the KillAllSessions cons...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0-RC-1'}, {'fixed': '6.0.0-RC-6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.0-RC-5'}}, {'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1155'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/pull/10876'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/bdabbbd4e98e88ee01e728ceb4fd512661fbd38d'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-...
{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T14:11:35Z', 'nvd_published_at': '2022-03-30T13:15:00Z'}
1.4.0
GHSA-h65g-jfqg-2w6m
2022-03-15T21:52:59Z
2022-03-08T00:00:31Z
null
['CVE-2022-0767']
Server-Side Request Forgery in calibreweb
calibreweb prior to version 0.6.17 is vulnerable to server-side request forgery (SSRF). This is a result of incomplete SSRF protection that can be bypassed via an HTTP redirect. An HTTP server set up to respond with a 302 redirect may redirect a request to `localhost`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'calibreweb'}, 'ecosystem_specific': {'affected_functions': ['calibreweb.cps.helper.save_cover_from_url']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0767'}, {'type': 'WEB', 'url': 'https://github.com/janeczku/calibre-web/commit/965352c8d96c9eae7a6867ff76b0db137d04b0b8'}, {'type': 'PACKAGE', 'url': 'https://github.com/janeczku/calibre-web'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b26...
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-08T18:11:08Z', 'nvd_published_at': '2022-03-07T07:15:00Z'}
1.4.0
GHSA-q73m-3q7r-fpf7
2022-03-29T15:46:18Z
2022-03-16T00:00:48Z
null
['CVE-2022-0957']
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0957'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/pull/1632'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/d1c9ed0d77ea5d56f09be0c492361dca8af745bb'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/sho...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T15:46:18Z', 'nvd_published_at': '2022-03-15T13:15:00Z'}
1.4.0
GHSA-j7xg-5549-jr3j
2022-04-01T20:09:29Z
2022-03-25T00:00:34Z
null
['CVE-2022-27820']
Improper Certificate Validation in OWASP ZAP
OWASP Zed Attack Proxy (ZAP) through w2022-03-21 does not verify the TLS certificate chain of an HTTPS server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.zaproxy:zap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.11.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27820'}, {'type': 'WEB', 'url': 'https://github.com/zaproxy/zaproxy/issues/7165'}, {'type': 'WEB', 'url': 'https://github.com/zaproxy/zaproxy/releases'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/03/23/1'}, {'type': '...
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T20:09:29Z', 'nvd_published_at': '2022-03-24T04:15:00Z'}
1.4.0
GHSA-8rx6-v5q4-xw3j
2022-04-07T21:59:30Z
2022-03-30T00:00:23Z
null
['CVE-2022-28154']
XML External Entity Reference in Jenkins Coverage/Complexity Scatter Plot Plugin
Jenkins Coverage/Complexity Scatter Plot Plugin 1.1.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:covcomplplot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28154'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/covcomplplot-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1899'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securit...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T21:59:30Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-mc92-c859-jr66
2022-11-30T20:57:48Z
2022-03-30T00:00:23Z
null
['CVE-2022-28148']
Path traversal vulnerability on Windows in Jenkins Continuous Integration with Toad Edge Plugin
The file browser in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Item/Read permission to obtain the contents of arbitrary files on Windows controllers.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ci-with-toad-edge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28148'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ci-with-toad-edge-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2654'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:57:48Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-35h9-h439-vvmr
2022-11-30T19:39:50Z
2022-03-16T00:00:42Z
null
['CVE-2022-27213']
Stored Cross-site Scripting vulnerability in Jenkins Environment Dashboard Plugin
Jenkins Environment Dashboard Plugin 1.1.10 and earlier does not escape the Environment order and the Component order configuration values in its views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:environment-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27213'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2252'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/15/2'}]
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T19:39:50Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-4qrp-27r3-66fj
2022-03-18T15:22:18Z
2022-03-14T22:38:14Z
null
['CVE-2022-24749']
Improper sanitize of SVG files during content upload ('Cross-site Scripting') in sylius/sylius
### Impact There is a possibility to upload an SVG file containing XSS code in the admin panel. In order to perform an XSS attack, the file itself has to be opened in a new card (or loaded outside of the IMG tag). The problem applies both to the files opened on the admin panel and shop pages. ### Patches The issue is ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.11'}]}]}, {'p...
[{'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/security/advisories/GHSA-4qrp-27r3-66fj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24749'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sylius/Sylius'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/releases/tag/v1.10...
{'cwe_ids': ['CWE-434', 'CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:38:14Z', 'nvd_published_at': '2022-03-14T22:15:00Z'}
1.4.0
GHSA-76j4-gggq-7rg9
2022-04-07T15:28:23Z
2022-03-28T00:00:20Z
null
['CVE-2022-26245']
SQLinjection in falcon-plus
Falcon-plus v0.3 was discovered to contain a SQL injection vulnerability via the parameter grpName in /config/service/host.go.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/open-falcon/falcon-plus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26245'}, {'type': 'WEB', 'url': 'https://github.com/open-falcon/falcon-plus/issues/951'}, {'type': 'PACKAGE', 'url': 'github.com/open-falcon/falcon-plus'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:28:23Z', 'nvd_published_at': '2022-03-27T14:15:00Z'}
1.4.0
GHSA-8c76-mxv5-w4g8
2022-03-28T17:25:37Z
2022-03-16T00:00:48Z
null
['CVE-2022-0954']
Stored Cross-site Scripting in Microweber
Microweber 1.2.11 and prior contains multiple stored cross-site scripting vulnerabilities in Shop's Other Settings, Shop's Autorespond E-mail Settings and Shops' Payments Methods.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.11'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0954'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/955471c27e671c49e4b012e3b120b004082ac3f7'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:38:20Z', 'nvd_published_at': '2022-03-15T12:15:00Z'}
1.4.0
GHSA-q67f-3jq4-mww2
2022-03-11T20:36:49Z
2022-03-05T00:00:45Z
null
['CVE-2022-0831']
Cross-site Scripting in Pimcore
Pimcore version 10.3.2 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 10.3.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.3.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0831'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/e786fd44aac46febdbf916ed6c328fbe645d80bf'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4152e3a7-27a1...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T20:36:49Z', 'nvd_published_at': '2022-03-04T14:15:00Z'}
1.4.0
GHSA-pq2f-3fg3-rw99
2022-03-29T15:26:17Z
2022-03-15T00:00:57Z
null
['CVE-2022-0254']
SQL Injection in WordPress Zero Spam WordPress plugin
The WordPress Zero Spam WordPress plugin before 5.2.13 does not properly sanitise and escape the order and orderby parameters before using them in a SQL statement in the admin dashboard, leading to a SQL injection
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'bmarshall511/wordpress_zero_spam'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0254'}, {'type': 'WEB', 'url': 'https://github.com/Highfivery/zero-spam-for-wordpress/commit/49723f696f1e2f2a76ac89375910bb036a4895f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/Highfivery/zero-spam-for-wordpress'}, {'type': 'WEB', 'url': 'ht...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T15:26:17Z', 'nvd_published_at': '2022-03-14T15:15:00Z'}
1.4.0
GHSA-vpmw-77vm-4mjg
2022-03-09T20:07:17Z
2022-03-02T00:00:21Z
null
['CVE-2022-26332']
Cross-site Scripting in Cipi
Cipi 3.1.15 allows Add Server stored cross-site scripting via the /api/servers name field.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'andreapollastri/cipi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26332'}, {'type': 'PACKAGE', 'url': 'https://github.com/andreapollastri/cipi'}, {'type': 'WEB', 'url': 'https://github.com/andreapollastri/cipi/releases'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/50788'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-09T20:07:17Z', 'nvd_published_at': '2022-03-01T01:15:00Z'}
1.4.0
GHSA-qq74-vgcf-54c3
2022-03-23T15:37:53Z
2022-03-15T00:01:00Z
null
['CVE-2022-0946']
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting via viva cshtm file upload in in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0946'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/e5d575928b1371a7e07b09b6592822298335062a'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1f8f0021-396e...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T14:16:17Z', 'nvd_published_at': '2022-03-14T14:15:00Z'}
1.4.0
GHSA-838h-jqp6-cf2f
2022-05-02T19:39:05Z
2022-03-29T22:10:10Z
null
['CVE-2022-24783']
Sandbox bypass leading to arbitrary code execution in Deno
### Impact The versions of Deno between release 1.18.0 and 1.20.2 (inclusive) are vulnerable to an attack where a malicious actor controlling the code executed in a Deno runtime could bypass permission checks and execute arbitrary shell code. There is **no** evidence that this vulnerability has been exploited in the ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'deno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.18.0'}, {'fixed': '1.20.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/denoland/deno/security/advisories/GHSA-838h-jqp6-cf2f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24783'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/pull/14115'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/commit/fcfc...
{'cwe_ids': ['CWE-269', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T22:10:10Z', 'nvd_published_at': '2022-03-25T22:15:00Z'}
1.4.0
GHSA-r5r6-v8qh-pmpq
2022-11-29T21:52:22Z
2022-03-30T00:00:25Z
null
['CVE-2022-28134']
Missing permission checks in Jekins Bitbucket Server Integration Plugin
Jenkins Bitbucket Server Integration Plugin 3.1.0 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to create, view, and delete BitBucket Server consumers.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:atlassian-bitbucket-server-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28134'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/atlassian-bitbucket-server-integration-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2640'}, {'type': 'WEB', 'url': 'http://www.open...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:52:22Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-pc32-x737-74cv
2022-03-29T15:16:23Z
2022-03-17T00:00:48Z
null
['CVE-2022-0704']
Cross-site Scripting in Pimcore
Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.3.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0704'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/11447'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pi...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T15:16:23Z', 'nvd_published_at': '2022-03-16T10:15:00Z'}
1.4.0
GHSA-5rcc-6cmj-7728
2022-03-14T21:03:33Z
2022-03-09T00:00:44Z
null
['CVE-2022-0877']
Cross-site Scripting in BookStack
Iframe tags don't have a sandbox attribute, this makes an attacker able to execute malicious javascript via an iframe and perform phishing attacks. The sandbox attribute will block script execution and prevents the content to navigate its top-level browsing context which will stop this type of attack.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'ssddanbrown/bookstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.02.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0877'}, {'type': 'WEB', 'url': 'https://github.com/bookstackapp/bookstack/commit/856fca8289b7370cafa033ea21c408e7d4303fd6'}, {'type': 'PACKAGE', 'url': 'https://github.com/bookstackapp/bookstack'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-09T18:24:00Z', 'nvd_published_at': '2022-03-08T13:15:00Z'}
1.4.0
GHSA-7756-56hr-2vcp
2022-11-30T19:41:49Z
2022-03-16T00:00:43Z
null
['CVE-2022-27212']
Stored Cross-site Scripting vulnerability in Jenkins List Git Branches Parameter Plugin
Jenkins List Git Branches Parameter Plugin 0.0.9 and earlier does not escape the name of the 'List Git branches (and more)' parameter, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:list-git-branches-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27212'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/list-git-branches-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2167'}, {'type': 'WEB', 'url': 'http://www.openwall.com/li...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T19:41:49Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-2xmm-g482-4439
2022-03-15T19:09:16Z
2022-03-15T19:09:16Z
null
['CVE-2022-24752']
DQL injection through sorting parameters blocked
### Impact Values added at the end of query sorting were passed directly to the DB. We don't know, if it could lead to direct SQL injections, however, we should not allow for easy injection of values there anyway. ### Patches The issue is fixed in version 1.10.1 and in 1.11-rc.1 ### Workarounds You have to overwrite...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/grid-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Sylius/SyliusGridBundle/security/advisories/GHSA-2xmm-g482-4439'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24752'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/SyliusGridBundle/pull/222'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-15T19:09:16Z', 'nvd_published_at': '2022-03-15T15:15:00Z'}
1.4.0
GHSA-mj6m-246h-9w56
2022-03-01T22:05:34Z
2022-03-01T22:05:34Z
null
['CVE-2022-25769']
Improper regex in htaccess file
### Impact the default .htaccess file has some restrictions in the access to PHP files to only allow specific PHP files to be executed in the root of the application. This logic isn't correct, as the regex in the second FilesMatch only checks the filename, not the full path. ### Patches Please upgrade to 3.3.5 or 4.2...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-mj6m-246h-9w56'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:05:34Z', 'nvd_published_at': None}
1.4.0
GHSA-2647-c639-qv2j
2022-03-18T21:20:46Z
2022-03-08T00:00:31Z
null
['CVE-2022-0766']
Server-Side Request Forgery in calibreweb
calibreweb prior to version 0.6.17 is vulnerable to server-side request forgery (SSRF). This is due to an incomplete fix for [CVE-2022-0339](https://github.com/advisories/GHSA-4w8p-x6g8-fv64). The blacklist does not check for `0.0.0.0`, which would result in a payload of `0.0.0.0` resolving to `localhost`.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'calibreweb'}, 'ecosystem_specific': {'affected_functions': ['calibreweb.cps.helper.save_cover_from_url']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0766'}, {'type': 'WEB', 'url': 'https://github.com/janeczku/calibre-web/commit/965352c8d96c9eae7a6867ff76b0db137d04b0b8'}, {'type': 'PACKAGE', 'url': 'https://github.com/janeczku/calibre-web'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7f2...
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-08T18:11:03Z', 'nvd_published_at': '2022-03-07T07:15:00Z'}
1.4.0
GHSA-hx3r-qwxv-5jw9
2022-11-30T20:15:12Z
2022-03-16T00:00:43Z
null
['CVE-2022-27206']
Client Secret stored in plain text by Jenkins GitLab Authentication Plugin
Jenkins GitLab Authentication Plugin 1.13 and earlier stores the GitLab client secret unencrypted in the global `config.xml` file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. This client secret can be viewed by users with access to the Jenkins controller ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gitlab-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27206'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/gitlab-oauth-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/gitlab-oauth-plugin/releases/tag/gitlab-oauth-1.14'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/secur...
{'cwe_ids': ['CWE-311', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:15:12Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-fxhp-wrw9-3r97
2022-03-18T17:46:29Z
2022-03-18T17:46:29Z
null
['CVE-2021-23901']
XML external entity (XXE) injection in Apache Nutch
An XML external entity (XXE) injection vulnerability was discovered in the Nutch DmozParser and is known to affect Nutch versions < 1.18. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows a...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nutch:nutch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23901'}, {'type': 'WEB', 'url': 'https://github.com/apache/nutch/pull/563'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/NUTCH-2841'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r090321840b44cc91086c4e317bf2baffa...
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T19:54:36Z', 'nvd_published_at': '2021-01-25T10:16:00Z'}
1.4.0
GHSA-cfm4-qjh2-4765
2022-03-18T23:09:54Z
2022-03-18T23:09:54Z
null
['CVE-2022-24771']
Improper Verification of Cryptographic Signature in node-forge
### Impact RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used. ### Patches The issue has ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-forge'}, 'ecosystem_specific': {'affected_functions': ['forge.pki.rsa']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24771'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:09:54Z', 'nvd_published_at': '2022-03-18T14:15:00Z'}
1.4.0
GHSA-fm35-jgg3-3grx
2022-03-18T17:54:38Z
2022-03-18T17:54:38Z
null
[]
NaN/INF in serverbound movement packets can crash clients and servers
### Impact A malicious client may send a `MovePlayerPacket` to the server whose position or rotation contains NaN or INF. Since neither the server nor vanilla client handles this properly, a number of interesting side effects come into play. - The server may crash in various ways if this exploit is used, because some ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.18.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.18.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-fm35-jgg3-3grx'}]
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T18:18:08Z', 'nvd_published_at': None}