schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-3gx9-37ww-9qw6 | 2022-08-11T21:37:05Z | 2022-03-04T00:00:15Z | null | ['CVE-2022-22947'] | Spring Cloud Gateway vulnerable to Code Injection when Gateway Actuator endpoint enabled, exposed, unsecured | In Spring Cloud Gateway versions prior to 3.1.1+ and 3.0.7+ , applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed, and unsecured. A remote attacker could make a maliciously crafted request resulting in arbitrary remote execution on the remote host. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-gateway'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.7'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework.cloud:spring-cloud-gateway'}, 'ranges': [{'type': 'ECOSYSTEM', 'events':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22947'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2022-22947'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr2022.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpujul2022.html'},... | {'cwe_ids': ['CWE-917', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-04T21:06:22Z', 'nvd_published_at': '2022-03-03T22:15:00Z'} |
1.4.0 | GHSA-cr6m-62pq-hmqh | 2022-04-04T21:37:38Z | 2022-03-04T00:00:18Z | null | ['CVE-2022-0841'] | OS Command injection in npm-lockfile | npm-lockfile safely generates an npm lockfile and output it to the filename of your choice. npm-lockfile before 2.0.4 does not santize unsafe external input and invoke sensitive command execution API with the input, causing command injection vulnerability. A fix was released in version 2.0.5. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'npm-lockfile'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.3'}, {'fixed': '2.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0841'}, {'type': 'WEB', 'url': 'https://github.com/ljharb/npm-lockfile/commit/bfdb84813260f0edbf759f2fde1e8c816c1478b8'}, {'type': 'PACKAGE', 'url': 'https://github.com/ljharb/npm-lockfile'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4f806... | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-04T21:20:11Z', 'nvd_published_at': '2022-03-03T16:15:00Z'} |
1.4.0 | GHSA-2p89-ppc2-mrq4 | 2022-03-18T20:45:44Z | 2022-03-02T00:00:22Z | null | ['CVE-2022-0743'] | Cross site scripting in getgrav/grav | User input is not properly sanitized leading to cross site scrpting (xss) in grav. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'getgrav/grav'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.31'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0743'}, {'type': 'WEB', 'url': 'https://github.com/getgrav/grav/commit/3dd0cabeac9835fe64dcb4b68c658b39f1f6be2f'}, {'type': 'PACKAGE', 'url': 'https://github.com/getgrav/grav'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/32ea4ddb-5b41-4bf9-... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-02T21:20:20Z', 'nvd_published_at': '2022-02-28T23:15:00Z'} |
1.4.0 | GHSA-q24h-5rq3-63j9 | 2022-03-10T21:57:56Z | 2022-03-04T00:00:19Z | null | ['CVE-2022-0528'] | Incorrect Authorization in @uppy/companion | @uppy/companion prior to version 3.3.1 is vulnerable to incorrect authorization. A user with URL upload access could enumerate internal companion server networks, send local webservers files to the destination server, and finally download them If each of these files had a guessable and regular name. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@uppy/companion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0528'}, {'type': 'WEB', 'url': 'https://github.com/transloadit/uppy/commit/267c34045a1e62c98406d8c31261c604a11e544a'}, {'type': 'PACKAGE', 'url': 'https://github.com/transloadit/uppy'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8b060cc3-24... | {'cwe_ids': ['CWE-200', 'CWE-863', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T21:57:56Z', 'nvd_published_at': '2022-03-03T07:15:00Z'} |
1.4.0 | GHSA-gw4j-4229-q4px | 2022-03-18T17:56:45Z | 2022-03-18T17:56:45Z | null | ['CVE-2021-25640'] | Server-Side Request Forgery in Apache Dubbo | In Apache Dubbo prior to 2.6.9 and 2.7.10, the usage of parseURL method will lead to the bypass of white host check which can cause open redirect or SSRF vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.7.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.alibaba:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.6.9'}]}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25640'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re4cab8855361a454d2af106fb3dad76259e723015fd7e09cb4f9eb77%40%3Cdev.dubbo.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/re4cab8855361a454d2af106fb3... | {'cwe_ids': ['CWE-601', 'CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T19:51:25Z', 'nvd_published_at': '2021-06-01T14:15:00Z'} |
1.4.0 | GHSA-952p-fqcp-g8pc | 2022-03-18T20:14:15Z | 2022-03-10T17:49:26Z | null | ['CVE-2022-24746'] | HTML injection possibility in voucher code form in Shopware | ### Impact
HTML injection possibility in voucher code form
## Patches
Patched in 6.4.8.1, maintainers recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
## Workarou... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.8.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.8.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': ... | [{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-952p-fqcp-g8pc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24746'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/651598a61073cbe59368e311817bdc6e7fb349c6'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T17:49:26Z', 'nvd_published_at': '2022-03-09T23:15:00Z'} |
1.4.0 | GHSA-w4f8-fxq2-j35v | 2022-03-01T21:04:57Z | 2022-03-01T21:04:57Z | null | [] | Possible privilege escalation via bash completion script | The bash completion script for `fscrypt` through v0.3.2 allows injection of commands via crafted mountpoint paths, allowing privilege escalation under a specific set of circumstances. A local user who has control over mountpoint paths could potentially escalate their privileges if they create a malicious mountpoint pat... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/google/fscrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/google/fscrypt/security/advisories/GHSA-w4f8-fxq2-j35v'}, {'type': 'PACKAGE', 'url': 'github.com/google/fscrypt'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:04:57Z', 'nvd_published_at': None} |
1.4.0 | GHSA-x3m3-g8w6-mf28 | 2022-11-30T20:27:14Z | 2022-03-16T00:00:45Z | null | ['CVE-2022-27201'] | Agent-to-controller security bypass in Jenkins Semantic Versioning Plugin | Jenkins Semantic Versioning Plugin defines a controller/agent message that processes a given file as XML and returns version information. The XML parser is not configured to prevent XML external entity (XXE) attacks, which is only a problem if XML documents are parsed on the Jenkins controller.
Jenkins Semantic Versio... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:semantic-versioning-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27201'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/semantic-versioning-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2124'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-... | {'cwe_ids': ['CWE-611', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:27:14Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-x95c-qrqr-2v27 | 2022-11-30T20:17:58Z | 2022-03-16T00:00:43Z | null | ['CVE-2022-27205'] | CSRF vulnerability and missing permission checks in Extended Choice Parameter Plugin allow SSRF | Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not perform a permission check on form validation methods. This allows attackers with Overall/Read permission to connect to an attacker-specified URL.
Additionally, these form validation methods do not require POST requests, resulting in a cross-site... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:extended-choice-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '346.vd87693c5a'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27205'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/extended-choice-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-1350'}, {'type': 'WEB', 'url': 'http://www.openwall.com/list... | {'cwe_ids': ['CWE-276', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:17:58Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-x25h-f84x-wh4m | 2022-11-29T22:03:56Z | 2022-03-30T00:00:25Z | null | ['CVE-2022-28138'] | CSRF vulnerability in Jenkins RocketChat Notifier Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins RocketChat Notifier Plugin 1.4.10 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credential. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rocketchatnotifier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28138'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rocketchatnotifier-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2241'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-s... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T22:03:56Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-99wh-973f-779p | 2022-03-18T21:04:06Z | 2022-03-04T00:00:15Z | null | ['CVE-2022-0265'] | XML External Entity Reference in Hazelcast | The AbstractXmlConfigRootTagRecognizer() function makes use of SAXParser generated from a SAXParserFactory with no FEATURE_SECURE_PROCESSING set, allowing for XXE attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.hazelcast:hazelcast'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1-beta1'}, {'fixed': '5.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0265'}, {'type': 'WEB', 'url': 'https://github.com/hazelcast/hazelcast/pull/20407'}, {'type': 'WEB', 'url': 'https://github.com/hazelcast/hazelcast/commit/4d6b666cd0291abd618c3b95cdbb51aa4208e748'}, {'type': 'PACKAGE', 'url': 'https://github.com/ha... | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-04T19:44:17Z', 'nvd_published_at': '2022-03-03T22:15:00Z'} |
1.4.0 | GHSA-ch63-6cmg-gwg2 | 2022-11-30T20:22:38Z | 2022-03-16T00:00:44Z | null | ['CVE-2022-27203'] | Arbitrary JSON and property file read vulnerability in Jenkins Extended Choice Parameter Plugin | Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier allows attackers with Item/Configure permission to read values from arbitrary JSON and Java properties files on the Jenkins controller. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:extended-choice-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '346.vd87693c5a'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27203'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-1351'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/15/2'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:22:38Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-x5m8-2r8v-8f97 | 2022-03-29T22:05:38Z | 2022-03-18T00:01:11Z | null | ['CVE-2022-25352'] | Prototype Pollution in libnested | The package libnested before 1.5.2 are vulnerable to Prototype Pollution via the set function in index.js. **Note:** This vulnerability derives from an incomplete fix for [CVE-2020-28283](https://security.snyk.io/vuln/SNYK-JS-LIBNESTED-1054930) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'libnested'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25352'}, {'type': 'WEB', 'url': 'https://github.com/dominictarr/libnested/commit/c1129865d75fbe52b5a4f755ad3110ca5420f2e1'}, {'type': 'PACKAGE', 'url': 'https://github.com/dominictarr/libnested'}, {'type': 'WEB', 'url': 'https://github.com/dominict... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:57:55Z', 'nvd_published_at': '2022-03-17T12:15:00Z'} |
1.4.0 | GHSA-pvx3-gm3c-gmpr | 2022-03-18T20:06:42Z | 2022-03-05T00:00:46Z | null | ['CVE-2022-23327'] | Denial of Service in Go-Ethereum | A design flaw in Go-Ethereum 1.10.12 and older versions allows an attacker node to send 5120 future transactions with a high gas price in one message, which can purge all of pending transactions in a victim node's memory pool, causing a denial of service (DoS). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23327'}, {'type': 'WEB', 'url': 'https://dl.acm.org/doi/pdf/10.1145/3460120.3485369'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}, {'type': 'WEB', 'url': 'https://tristartom.github.io/docs/ccs21.pdf'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-09T19:20:04Z', 'nvd_published_at': '2022-03-04T12:15:00Z'} |
1.4.0 | GHSA-cxf7-qrc5-9446 | 2022-03-10T15:56:28Z | 2022-03-01T22:22:26Z | null | ['CVE-2022-24720'] | Remote shell execution vulnerability in image_processing | ### Impact
When using the `#apply` method from image_processing to apply a series of operations that are coming from unsanitized user input, this allows the attacker to execute shell commands:
```rb
ImageProcessing::Vips.apply({ system: "echo EXECUTED" })
#>> EXECUTED
```
This method is called internally by Active S... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'image_processing'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.12.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/janko/image_processing/security/advisories/GHSA-cxf7-qrc5-9446'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24720'}, {'type': 'WEB', 'url': 'https://github.com/janko/image_processing/commit/038e4574e8f4f4b636a62394e09983c71980dada'}, {'type': 'PAC... | {'cwe_ids': ['CWE-20', 'CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:22:26Z', 'nvd_published_at': '2022-03-01T23:15:00Z'} |
1.4.0 | GHSA-pv39-qp28-4mgh | 2022-04-12T16:40:09Z | 2022-03-26T00:00:32Z | null | ['CVE-2021-43090'] | Improper Restriction of XML External Entity Reference in soa-model | Soa-model is a toolkit and Java API for WSDL, WADL and XML Schema. An XML External Entity (XXE) vulnerability exists in versions of soa-model prior to 1.6.4 in the WSDLParser function. This issue has been fixed in version 1.6.4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.predic8:soa-model-parent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.4'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.predic8:soa-model-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43090'}, {'type': 'WEB', 'url': 'https://github.com/membrane/soa-model/issues/281'}, {'type': 'WEB', 'url': 'https://github.com/membrane/soa-model/commit/19de16902468e7963cc4dc6b544574bc1ea3f251'}, {'type': 'WEB', 'url': 'https://github.com/membran... | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T15:05:12Z', 'nvd_published_at': '2022-03-25T16:15:00Z'} |
1.4.0 | GHSA-cjvr-mfj7-j4j8 | 2022-04-05T18:51:13Z | 2022-03-01T22:12:47Z | null | ['CVE-2022-0577'] | Incorrect Authorization and Exposure of Sensitive Information to an Unauthorized Actor in scrapy | ### Impact
If you manually define cookies on a [`Request`](https://docs.scrapy.org/en/latest/topics/request-response.html#scrapy.http.Request) object, and that `Request` object gets a redirect response, the new `Request` object scheduled to follow the redirect keeps those user-defined cookies, regardless of the target... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'scrapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'scrapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/security/advisories/GHSA-cjvr-mfj7-j4j8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0577'}, {'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/commit/8ce01b3b76d4634f55067d6cfdf632ec70ba304a'}, {'type': 'WEB', 'url': 'https://... | {'cwe_ids': ['CWE-200', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:12:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xp82-jmw8-mjxp | 2022-03-30T19:58:48Z | 2022-03-23T00:00:23Z | null | ['CVE-2022-1034'] | Unrestricted Upload of File with Dangerous Type in ShowDoc | There is a Unrestricted Upload of File vulnerability in ShowDoc prior to version 2.10.4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1034'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/bd792a89c0325836fbd64784f4c4117c0171416b'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d205c489-3266... | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T19:58:48Z', 'nvd_published_at': '2022-03-22T08:15:00Z'} |
1.4.0 | GHSA-2v82-5746-vwqc | 2022-03-18T17:49:28Z | 2022-03-18T17:49:28Z | null | ['CVE-2021-29625'] | XSS in doc_link | ### Impact
Users of MySQL, MariaDB, PgSQL and SQLite are affected. XSS is in most cases prevented by strict CSP in all modern browsers. The only exception is when Adminer is using a `pdo_` extension to communicate with the database (it is used if the native extensions are not enabled). In browsers without CSP, Adminer ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'vrana/adminer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.7.8'}, {'fixed': '4.8.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/vrana/adminer/security/advisories/GHSA-2v82-5746-vwqc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29625'}, {'type': 'WEB', 'url': 'https://github.com/vrana/adminer/commit/4043092ec2c0de2258d60a99d0c5958637d051a7'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T19:18:12Z', 'nvd_published_at': '2021-05-19T22:15:00Z'} |
1.4.0 | GHSA-8m49-2xj8-67v9 | 2022-04-28T18:02:03Z | 2022-03-31T00:00:24Z | null | ['CVE-2022-27816'] | Data Loss/Denial of Service in SWHKD | SWHKD 1.1.5 unsafely uses the /tmp/swhks.pid pathname. There can be data loss or a denial of service. A patch is available on the `1.1.0` branch of the repository. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'Simple-Wayland-HotKey-Daemon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27816'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/commit/0b620a09605afb815c6d8d8953bbb7a10a8c0575'}, {'type': 'PACKAGE', 'url': 'https://github.com/waycrate/swhkd'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/release... | {'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T15:15:32Z', 'nvd_published_at': '2022-03-30T02:15:00Z'} |
1.4.0 | GHSA-4vvg-x86p-mvqc | 2022-03-28T17:26:41Z | 2022-03-14T22:43:23Z | null | ['CVE-2022-24762'] | Leaking of user information on Cross-Domain communication in sysend | ### Impact
Users that use Cross-Origin communication and send sensitive information make it possible for this data to be intercepted.
This is not a big impact because it happens only on the same browser.
### Patches
It has been patched in version 1.10.0
### Workarounds
The only workaround is to not send sensitive inf... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'sysend'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jcubic/sysend.js/security/advisories/GHSA-4vvg-x86p-mvqc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24762'}, {'type': 'WEB', 'url': 'https://github.com/jcubic/sysend.js/issues/33'}, {'type': 'WEB', 'url': 'https://github.com/jcubic/sysend.js/com... | {'cwe_ids': ['CWE-200', 'CWE-346'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:43:23Z', 'nvd_published_at': '2022-03-14T23:15:00Z'} |
1.4.0 | GHSA-h99w-9q5r-gjq9 | 2022-08-16T19:37:40Z | 2022-03-30T21:48:50Z | null | ['CVE-2022-24790'] | Puma vulnerable to HTTP Request Smuggling | When using Puma behind a proxy that does not properly validate that the incoming HTTP request matches the RFC7230 standard, Puma and the frontend proxy may disagree on where a request starts and ends. This would allow requests to be smuggled via the front-end proxy to Puma.
The following vulnerabilities are addressed ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.6.4'}]}]}, {'package': {'ecosystem': 'RubyGems', 'name': 'puma'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.12'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/puma/puma/security/advisories/GHSA-h99w-9q5r-gjq9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24790'}, {'type': 'WEB', 'url': 'https://github.com/puma/puma/commit/5bb7d202e24dec00a898dca4aa11db391d7787a5'}, {'type': 'PACKAGE', 'url': 'https://git... | {'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T21:48:50Z', 'nvd_published_at': '2022-03-30T22:15:00Z'} |
1.4.0 | GHSA-g585-j55v-38h7 | 2022-03-29T18:40:41Z | 2022-03-16T00:00:45Z | null | ['CVE-2022-0966'] | Cross-site Scripting in ShowDoc | ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0966'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e06c0d55-00a3... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T18:40:41Z', 'nvd_published_at': '2022-03-15T16:15:00Z'} |
1.4.0 | GHSA-jpj5-hg26-6jgc | 2022-03-23T15:47:27Z | 2022-03-13T00:00:54Z | null | ['CVE-2022-26533'] | Cross-site Scripting in Alist | Alist versions 2.0.10 through 2.1.0 were discovered to contain a cross-site scripting (XSS) vulnerability via /i/:data/ipa.plist. This issue was fixed in version 2.1.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/Xhofe/alist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.10'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26533'}, {'type': 'WEB', 'url': 'https://github.com/Xhofe/alist/issues/645'}, {'type': 'WEB', 'url': 'https://github.com/Xhofe/alist/commit/6af17e2509a400979420f613fd7f2f9721fdcd6e'}, {'type': 'PACKAGE', 'url': 'https://github.com/Xhofe/alist'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T15:47:27Z', 'nvd_published_at': '2022-03-12T01:15:00Z'} |
1.4.0 | GHSA-3p22-ghq8-v749 | 2022-03-22T18:49:36Z | 2022-03-22T18:49:36Z | null | ['CVE-2022-21718'] | Renderers can obtain access to random bluetooth device without permission in Electron | ### Impact
This vulnerability allows renderers to obtain access to a random bluetooth device via the [web bluetooth API](https://developer.mozilla.org/en-US/docs/Web/API/Web_Bluetooth_API) if the app has not configured a custom `select-bluetooth-device` event handler. The device that is accessed is random and the atta... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.6.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'electron'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0-beta.1'}, {'fixed': '14.2.4'}]}]}, {'package': {'ecosy... | [{'type': 'WEB', 'url': 'https://github.com/electron/electron/security/advisories/GHSA-3p22-ghq8-v749'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21718'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron/pull/32178'}, {'type': 'WEB', 'url': 'https://github.com/electron/electron... | {'cwe_ids': ['CWE-668', 'CWE-862'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-22T18:49:36Z', 'nvd_published_at': '2022-03-22T17:15:00Z'} |
1.4.0 | GHSA-8pp6-8x4q-c5mx | 2022-04-07T15:30:27Z | 2022-03-30T00:00:31Z | null | ['CVE-2022-24789'] | Server side request forgery in C1 CMS | C1 CMS is an open-source, .NET based Content Management System (CMS). Versions prior to 6.12 allow an authenticated user to exploit Server Side Request Forgery (SSRF) by causing the server to make arbitrary GET requests to other servers in the local network or on localhost. The attacker may also truncate arbitrary file... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'C1CMS.Assemblies'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.12.8122.18346'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.11.7982.26191'}}] | [{'type': 'WEB', 'url': 'https://github.com/Orckestra/C1-CMS-Foundation/security/advisories/GHSA-j9c2-gr6m-pp45'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24789'}, {'type': 'PACKAGE', 'url': 'https://github.com/Orckestra/C1-CMS-Foundation'}, {'type': 'WEB', 'url': 'https://github.com/Orck... | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:30:27Z', 'nvd_published_at': '2022-03-28T22:15:00Z'} |
1.4.0 | GHSA-6wrh-279j-6hvw | 2022-03-18T20:15:05Z | 2022-03-10T17:55:21Z | null | ['CVE-2022-24747'] | HTTP caching is marking private HTTP headers as public in Shopware | ### Impact
HTTP caching is marking private HTTP headers as public
## Patches
Fixed in recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
## Workarounds
For older v... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.8.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.8.1'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': ... | [{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-6wrh-279j-6hvw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24747'}, {'type': 'WEB', 'url': 'https://github.com/shopware/platform/commit/d51863148f32306aafdbc7f9f48887c69fce206f'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T17:55:21Z', 'nvd_published_at': '2022-03-09T23:15:00Z'} |
1.4.0 | GHSA-62m3-fc7f-jpp8 | 2023-09-11T15:01:47Z | 2022-03-26T00:09:58Z | null | ['CVE-2019-10905'] | Parsedown Class-Name Injection | Parsedown before 1.7.2, when safe mode is used and HTML markup is disabled, might allow attackers to execute arbitrary JavaScript code if a script (already running on the affected page) executes the contents of any element with a specific class. This occurs because spaces are permitted in code block infostrings, which ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'erusev/parsedown'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-10905'}, {'type': 'WEB', 'url': 'https://github.com/erusev/parsedown/issues/699'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/erusev/parsedown/CVE-2019-10905.yaml'}, {'type': 'PACKAGE', 'url': 'https://g... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:09:58Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7jh8-ghwc-82cw | 2022-11-29T23:20:43Z | 2022-03-30T00:00:24Z | null | ['CVE-2022-28145'] | Cross-site Scripting (XSS) vulnerability in Jenkins Continuous Integration with Toad Edge Plugin | Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier does not apply Content-Security-Policy headers to report files it serves, resulting in a stored cross-site scripting (XSS) exploitable by attackers with Item/Configure permission or otherwise able to control report contents. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ci-with-toad-edge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28145'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ci-with-toad-edge-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1892'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T23:20:43Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-9wvr-x83m-84v4 | 2022-11-30T18:53:13Z | 2022-03-16T00:00:43Z | null | ['CVE-2022-27217'] | Passwords stored in plain text by Jenkins Vmware vRealize CodeStream Plugin | Jenkins Vmware vRealize CodeStream Plugin 1.2 and earlier stores passwords unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.vmware.vcac:vmware-vrealize-codestream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27217'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/vmware-vrealize-codestream-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2238'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lis... | {'cwe_ids': ['CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T18:53:13Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-r6cm-wg48-rh2r | 2022-04-17T17:13:16Z | 2022-03-10T00:00:40Z | null | ['CVE-2022-0482'] | Exposure of Private Personal Information to an Unauthorized Actor in alextselegidis/easyappointments | The software is a booking management system that has a public form to place bookings, and a private area for the calendar and management of services, users, settings, etc. There is a backend API that allows data manipulation, including listing the appointments for a specific time range. This happens on this endpoint: /... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'alextselegidis/easyappointments'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0482'}, {'type': 'WEB', 'url': 'https://github.com/alextselegidis/easyappointments/commit/44af526a6fc5e898bc1e0132b2af9eb3a9b2c466'}, {'type': 'PACKAGE', 'url': 'https://github.com/alextselegidis/easyappointments'}, {'type': 'WEB', 'url': 'https://... | {'cwe_ids': ['CWE-359', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T21:50:52Z', 'nvd_published_at': '2022-03-09T11:15:00Z'} |
1.4.0 | GHSA-968c-mm28-jfw4 | 2022-09-08T00:00:56Z | 2022-03-04T00:00:17Z | null | ['CVE-2022-23899'] | SQL injection in net.mingsoft:ms-mcms | MCMS v5.2.5 was discovered to contain a SQL injection vulnerability via search.do in the file /web/MCmsAction.java. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23899'}, {'type': 'WEB', 'url': 'https://github.com/ming-soft/MCMS/issues/63'}, {'type': 'PACKAGE', 'url': 'https://github.com/ming-soft/MCMS'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-09-08T00:00:56Z', 'nvd_published_at': '2022-03-03T19:15:00Z'} |
1.4.0 | GHSA-v3wr-67px-44xg | 2022-03-03T19:11:14Z | 2022-03-03T19:11:14Z | null | [] | Execution with Unnecessary Privileges in arc-electron | ### Impact
When the end-user click on the response header that contains a link the target will be opened in ARC new window. This window will have the default preload script loaded which allows the scripts embedded in the link target to execute any logic that ARC has access to from the renderer process, which includes ... | [] | [{'package': {'ecosystem': 'npm', 'name': '@advanced-rest-client/base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.10'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/advanced-rest-client/arc-electron/security/advisories/GHSA-v3wr-67px-44xg'}, {'type': 'PACKAGE', 'url': 'https://github.com/advanced-rest-client/arc-electron'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T19:11:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-crp2-qrr5-8pq7 | 2022-03-29T19:11:08Z | 2022-03-02T21:33:17Z | null | ['CVE-2022-23648'] | containerd CRI plugin: Insecure handling of image volumes | ### Impact
A bug was found in containerd where containers launched through containerd’s CRI implementation with a specially-crafted image configuration could gain access to read-only copies of arbitrary files and directories on the host. This may bypass any policy-based enforcement on container setup (including a Kub... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.13'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/containerd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.5.0'}, {'fixe... | [{'type': 'WEB', 'url': 'https://github.com/containerd/containerd/security/advisories/GHSA-crp2-qrr5-8pq7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23648'}, {'type': 'WEB', 'url': 'https://github.com/containerd/containerd/commit/10f428dac7cec44c864e1b830a4623af27a9fc70'}, {'type': 'PACKA... | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-02T21:33:17Z', 'nvd_published_at': '2022-03-03T14:15:00Z'} |
1.4.0 | GHSA-9gqr-xp86-f87h | 2022-03-25T16:13:13Z | 2022-03-18T00:01:11Z | null | ['CVE-2021-23632'] | Code injection in npm git | All versions of package git are vulnerable to Remote Code Execution (RCE) due to missing sanitization in the Git.git method, which allows execution of OS commands rather than just git commands. At this time, there is no known workaround. There has been no patch released. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.1.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23632'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-GIT-1568518'}] | {'cwe_ids': ['CWE-78', 'CWE-94'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:39:15Z', 'nvd_published_at': '2022-03-17T12:15:00Z'} |
1.4.0 | GHSA-32j9-6qqm-mq9g | 2022-03-30T20:16:16Z | 2022-03-17T00:00:27Z | null | ['CVE-2022-21164'] | Unhandled case in node-lmdb | The package node-lmdb before 0.9.7 is vulnerable to Denial of Service (DoS) when defining a non-invokable `ToString` value, which will cause a crash during type check. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-lmdb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21164'}, {'type': 'WEB', 'url': 'https://github.com/Venemo/node-lmdb/commit/97760104c0fd311206b88aecd91fa1f59fe2b85a'}, {'type': 'PACKAGE', 'url': 'https://github.com/Venemo/node-lmdb'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NODELMDB... | {'cwe_ids': ['CWE-241', 'CWE-703'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-19T00:10:41Z', 'nvd_published_at': '2022-03-16T16:15:00Z'} |
1.4.0 | GHSA-cr8c-972v-rmp3 | 2023-06-30T20:26:42Z | 2022-03-17T00:00:24Z | null | ['CVE-2022-0959'] | pgAdmin 4 Path Traversal vulnerability | When run in server mode, pgAdmin 4 allows users to store files on the server under individual storage directories. Files such as SQL scripts may be uploaded through the user interface. The URI to which upload requests are made fails to validate the upload path to prevent path traversal techniques being used to store fi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pgadmin4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0959'}, {'type': 'WEB', 'url': 'https://github.com/pgadmin-org/pgadmin4/commit/dccd4f0bbaafa783d9f0360c7592b128d5cc3928'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2063759'}, {'type': 'PACKAGE', 'url': 'https://github.com... | {'cwe_ids': ['CWE-22', 'CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-06-30T20:26:42Z', 'nvd_published_at': '2022-03-16T15:15:00Z'} |
1.4.0 | GHSA-m5pq-gvj9-9vr8 | 2022-08-11T20:38:52Z | 2022-03-08T20:00:36Z | null | ['CVE-2022-24713'] | Rust's regex crate vulnerable to regular expression denial of service | > This is a cross-post of [the official security advisory][advisory]. The official advisory contains a signed version with our PGP key, as well.
[advisory]: https://groups.google.com/g/rustlang-security-announcements/c/NcNNL1Jq7Yw
The Rust Security Response WG was notified that the `regex` crate did not properly limi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'regex'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/rust-lang/regex/security/advisories/GHSA-m5pq-gvj9-9vr8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24713'}, {'type': 'WEB', 'url': 'https://github.com/rust-lang/regex/commit/ae70b41d4f46641dbc45c7a4f87954aea356283e'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-08T20:00:36Z', 'nvd_published_at': '2022-03-08T19:15:00Z'} |
1.4.0 | GHSA-7wfc-x4f7-gg2x | 2022-03-18T17:58:01Z | 2022-03-18T17:58:01Z | null | ['CVE-2021-30180'] | Code injection in Apache Dubbo | Apache Dubbo prior to 2.7.9 support Tag routing which will enable a customer to route the request to the right server. These rules are used by the customers when making a request in order to find the right endpoint. When parsing these YAML rules, Dubbo customers may enable calling arbitrary constructors. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.7.0'}, {'fixed': '2.7.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30180'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/raed526465e56204030ddf374b1959478a290e7511971d7aba2e9e39b%40%3Cdev.dubbo.apache.org%3E'}] | {'cwe_ids': ['CWE-444', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T20:19:48Z', 'nvd_published_at': '2021-06-01T14:15:00Z'} |
1.4.0 | GHSA-4gr7-qw2q-jxh6 | 2022-03-22T21:37:08Z | 2022-03-12T00:00:27Z | null | ['CVE-2021-44667'] | Cross-site Scripting in Nacos | A Cross Site Scripting (XSS) vulnerability exists in Nacos 2.0.3 in auth/users via the (1) pageSize and (2) pageNo parameters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.alibaba.nacos:nacos-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44667'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/issues/7359'}, {'type': 'WEB', 'url': 'https://github.com/alibaba/nacos/commit/cd6d7e33b94f24814701f3faf8b632e5e85444c5'}, {'type': 'PACKAGE', 'url': 'https://github.com/alibaba/naco... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:25:35Z', 'nvd_published_at': '2022-03-11T19:15:00Z'} |
1.4.0 | GHSA-jvfv-hrrc-6q72 | 2022-03-18T21:12:35Z | 2022-03-05T00:00:45Z | null | ['CVE-2022-0839'] | Improper Restriction of XML External Entity Reference in Liquibase | The XMLChangeLogSAXParser() function in Liquibase prior to version 4.8.0 contains an issue that may lead to to Improper Restriction of XML External Entity Reference. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.liquibase:liquibase-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.8.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0839'}, {'type': 'WEB', 'url': 'https://github.com/liquibase/liquibase/commit/33d9d925082097fb1a3d2fc8e44423d964cd9381'}, {'type': 'PACKAGE', 'url': 'https://github.com/liquibase/liquibase'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f1ae5... | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T16:29:11Z', 'nvd_published_at': '2022-03-04T15:15:00Z'} |
1.4.0 | GHSA-vvff-6wrr-4g7q | 2023-02-08T22:41:33Z | 2022-03-24T00:00:17Z | null | ['CVE-2021-3589'] | Missing Authentication for Critical Function in Foreman Ansible | An authorization flaw was found in Foreman Ansible. An authenticated attacker with certain permissions to create and run Ansible jobs can access hosts through job templates. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'foreman_ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3589'}, {'type': 'WEB', 'url': 'https://github.com/theforeman/foreman_ansible/commit/a5e0827bc3ec6c8ab82f968907857a15646305d5'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2021-3589'}, {'type': 'WEB', 'url': 'https://bugzill... | {'cwe_ids': ['CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T20:01:57Z', 'nvd_published_at': '2022-03-23T20:15:00Z'} |
1.4.0 | GHSA-p6h4-93qp-jhcm | 2022-04-19T18:24:25Z | 2022-03-11T23:53:23Z | null | ['CVE-2022-24760'] | Command injection in Parse Server through prototype pollution | ### Impact
This is a Remote Code Execution (RCE) vulnerability in Parse Server. This vulnerability affects Parse Server in the default configuration with MongoDB. The main weakness that leads to RCE is the Prototype Pollution vulnerable code in the file `DatabaseController.js`, so it is likely to affect Postgres and an... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'parse-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.10.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/security/advisories/GHSA-p6h4-93qp-jhcm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24760'}, {'type': 'WEB', 'url': 'https://github.com/parse-community/parse-server/commit/886bfd7cac69496e3f73d4bb536f0eec3cba0e4d'}, {... | {'cwe_ids': ['CWE-1321', 'CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T23:53:23Z', 'nvd_published_at': '2022-03-12T00:15:00Z'} |
1.4.0 | GHSA-m6gg-86c6-gfr9 | 2023-03-15T19:19:13Z | 2022-03-04T00:00:15Z | 2023-03-15T19:19:13Z | ['CVE-2022-23710'] | Withdrawn: Cross-site Scripting in Kibana | ##Withdrawn: This advisory is for Kibana, not ElasticSearch as it was originally published, and is withdrawn as being out of scope of our supported ecosystems.
A cross-site-scripting (XSS) vulnerability was discovered in the Data Preview Pane (previously known as Index Pattern Preview Pane) which could allow arbitrary... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.16.0'}, {'fixed': '7.17.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23710'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-17-1-security-update/298447'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220325-0009/'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-19T00:15:26Z', 'nvd_published_at': '2022-03-03T22:15:00Z'} |
1.4.0 | GHSA-xjp4-6w75-qrj7 | 2022-03-01T21:44:13Z | 2022-03-01T21:44:13Z | null | ['CVE-2022-24711'] | Remote CLI Command Execution Vulnerability in CodeIgniter4 | ### Impact
This vulnerability allows attackers to execute CLI routes via HTTP request.
### Patches
Upgrade to v4.1.9 or later.
### Workarounds
None.
### For more information
If you have any questions or comments about this advisory:
* Open an issue in [codeigniter4/CodeIgniter4](https://github.com/codeigniter4/CodeI... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter4/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-xjp4-6w75-qrj7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24711'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/commit/202f41ad522ba1d414b9d9c35aba1cb0c156b781'}, {'type'... | {'cwe_ids': ['CWE-20', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:44:13Z', 'nvd_published_at': '2022-02-28T16:15:00Z'} |
1.4.0 | GHSA-8xf4-w7qw-pjjw | 2023-02-17T14:26:38Z | 2022-03-30T00:00:27Z | null | ['CVE-2021-46743'] | Firebase PHP-JWT key/algorithm type confusion | In Firebase PHP-JWT before 6.0.0, an algorithm-confusion issue (e.g., RS256 / HS256) exists via the kid (aka Key ID) header, when multiple types of keys are loaded in a key ring. This allows an attacker to forge tokens that validate under the incorrect key. NOTE: this provides a straightforward way to use the PHP-JWT l... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'firebase/php-jwt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46743'}, {'type': 'WEB', 'url': 'https://github.com/firebase/php-jwt/issues/351'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/firebase/php-jwt/CVE-2021-46743.yaml'}, {'type': 'PACKAGE', 'url': 'https://g... | {'cwe_ids': ['CWE-347', 'CWE-843'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-17T14:26:38Z', 'nvd_published_at': '2022-03-29T07:15:00Z'} |
1.4.0 | GHSA-q3x2-jvp3-wj78 | 2022-03-29T15:42:17Z | 2022-03-16T00:00:47Z | null | ['CVE-2022-0963'] | Unrestricted XML files leading to cross-site scripting in Microweber | Microweber prior to 1.2.12 allows unrestricted upload of XML files, which malicious actors can exploit to cause a stored cross-site scripting attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0963'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/975fc1d6d3fba598ee550849ceb81af23ce72e08'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T15:42:17Z', 'nvd_published_at': '2022-03-15T16:15:00Z'} |
1.4.0 | GHSA-fx95-883v-4q4h | 2022-03-29T22:03:08Z | 2022-03-18T00:01:11Z | null | ['CVE-2022-21221'] | Path traversal in github.com/valyala/fasthttp | The package github.com/valyala/fasthttp before 1.34.0 is vulnerable to Directory Traversal via the ServeFile function, due to improper sanitization. It is possible to be exploited by using a backslash %5c character in the path. **Note:** This security issue impacts Windows users only. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/valyala/fasthttp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.34.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21221'}, {'type': 'WEB', 'url': 'https://github.com/valyala/fasthttp/issues/1226'}, {'type': 'WEB', 'url': 'https://github.com/valyala/fasthttp/commit/15262ecf3c602364639d465daba1e7f3604d00e8'}, {'type': 'WEB', 'url': 'https://github.com/valyala/fa... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:58:55Z', 'nvd_published_at': '2022-03-17T12:15:00Z'} |
1.4.0 | GHSA-q787-qgw2-j2qf | 2022-11-30T20:47:26Z | 2022-03-30T00:00:21Z | null | ['CVE-2022-28159'] | Stored Cross-site Scripting vulnerability in Jenkins Tests Selector Plugin | Jenkins Tests Selector Plugin 1.3.3 and earlier does not escape the Properties File Path option for Choosing Tests parameters, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:selected-tests-executor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28159'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/selected-tests-executor-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2262'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:47:26Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-m2wv-m5pf-284r | 2022-04-05T18:37:01Z | 2022-03-29T00:01:09Z | null | ['CVE-2022-26980'] | Cross-site Scripting in teampass | Teampass 2.1.26 allows reflected XSS via the index.php PATH_INFO. Someone must open a link for the Teampass Password Manager index page containing malicious payload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'nilsteampassnet/teampass'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.26'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26980'}, {'type': 'WEB', 'url': 'https://gist.github.com/RNPG/6919286e0daebce7634d0a744e060dca'}, {'type': 'WEB', 'url': 'https://github.com/nilsteampassnet/TeamPass/commits/teampass_2'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T18:37:01Z', 'nvd_published_at': '2022-03-28T19:15:00Z'} |
1.4.0 | GHSA-4cx6-fj7j-pjx9 | 2022-03-18T21:10:48Z | 2022-03-10T18:17:50Z | null | ['CVE-2022-24753'] | Code injection in Stripe CLI on windows | ### Impact
A vulnerability in Stripe CLI exists on Windows when certain commands are run in a directory where an attacker has planted files. The commands are `stripe login`, `stripe config -e`, `stripe community`, and `stripe open`. MacOS and Linux are unaffected.
An attacker who successfully exploits the vulnerabilit... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/stripe/stripe-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.13'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/stripe/stripe-cli/security/advisories/GHSA-4cx6-fj7j-pjx9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24753'}, {'type': 'WEB', 'url': 'https://github.com/stripe/stripe-cli/commit/be38da5c0191adb77f661f769ffff2fbc7ddf6cd'}, {'type': 'PACKAGE', 'ur... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T18:17:50Z', 'nvd_published_at': '2022-03-09T23:15:00Z'} |
1.4.0 | GHSA-4p8f-2fwv-6xcw | 2022-11-29T22:23:53Z | 2022-03-30T00:00:25Z | null | ['CVE-2022-28139'] | Missing permission check in Jenkins RocketChat Notifier Plugin | RocketChat Notifier Plugin 1.4.10 and earlier does not perform a permission check in a method implementing form validation.
This allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified username and password. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:rocketchatnotifier'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28139'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/rocketchatnotifier-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2241'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-s... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T22:23:53Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-wg4r-q74r-p7c8 | 2022-03-23T15:42:44Z | 2022-03-15T00:01:03Z | null | ['CVE-2022-0941'] | Cross-site Scripting in ShowDoc | ShowDoc is vulnerable to stored cross-site scripting due to unrestricted file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0941'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/4b6e6603c714aab1de346c5f5cb0bbb4c871be1f'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/040a910e-e689... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T14:08:21Z', 'nvd_published_at': '2022-03-14T13:15:00Z'} |
1.4.0 | GHSA-8g4m-cjm2-96wq | 2022-03-25T16:47:42Z | 2022-03-18T00:01:11Z | null | ['CVE-2021-23771'] | Sandbox escape in notevil and argencoders-notevil | This affects all versions of package notevil; all versions of package argencoders-notevil. It is vulnerable to Sandbox Escape leading to Prototype pollution. The package fails to restrict access to the main context, allowing an attacker to add or modify an object's prototype. **Note:** This vulnerability derives from a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'notevil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.3'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'argencoders-notevil'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23771'}, {'type': 'PACKAGE', 'url': 'https://github.com/mmckegg/notevil'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-ARGENCODERSNOTEVIL-2388587'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-NOTEVIL-2385946'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:07:57Z', 'nvd_published_at': '2022-03-17T12:15:00Z'} |
1.4.0 | GHSA-69wp-xwm7-69wm | 2022-04-01T13:50:10Z | 2022-03-22T00:00:43Z | null | ['CVE-2022-25481'] | Exposure of Resource to Wrong Sphere in ThinkPHP Framework | ThinkPHP Framework v5.0.24 was discovered to be configured without the PATHINFO parameter. This allows attackers to access all system environment parameters from index.php. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'topthink/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.0.24'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25481'}, {'type': 'WEB', 'url': 'https://github.com/Lyther/VulnDiscover/blob/master/Web/ThinkPHP_InfoLeak.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/top-think/framework'}] | {'cwe_ids': ['CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T13:50:10Z', 'nvd_published_at': '2022-03-21T00:15:00Z'} |
1.4.0 | GHSA-9vp3-7qwq-83r9 | 2022-03-25T13:33:46Z | 2022-03-17T00:00:48Z | null | ['CVE-2021-45851'] | Server-Side Request Forgery in FUXA | A Server-Side Request Forgery (SSRF) attack in FUXA 1.1.3 can be carried out leading to the obtaining of sensitive information from the server's internal environment and services, often potentially leading to the attacker executing commands on the server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@frangoteam/fuxa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45851'}, {'type': 'PACKAGE', 'url': 'https://github.com/frangoteam/FUXA'}, {'type': 'WEB', 'url': 'https://www.youtube.com/watch?v=JE1Kcq3iJpc'}] | {'cwe_ids': ['CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-25T13:33:46Z', 'nvd_published_at': '2022-03-16T10:15:00Z'} |
1.4.0 | GHSA-5vjc-qx43-r747 | 2022-03-18T23:57:52Z | 2022-03-18T23:57:52Z | null | [] | Stored Cross-site Scripting in folder-auth plugin | Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.
Folder-based Authorization Strategy Plugin 1.4 escapes the names... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:folder-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jenkinsci/folder-auth-plugin/security/advisories/GHSA-5vjc-qx43-r747'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/folder-auth-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2646'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:57:52Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6pc9-xqrg-wfqw | 2022-03-24T23:36:54Z | 2022-03-16T00:00:47Z | null | ['CVE-2022-0430'] | Exposure of Sensitive information in httpie | httpie is a modern, user-friendly command-line HTTP client for the API era. Prior to version 3.1.0, all cookies saved to session storage are supercookies. At this time, there is no known workaround. Users are recommended to update to version 3.1.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'httpie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0430'}, {'type': 'WEB', 'url': 'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'}, {'type': 'PACKAGE', 'url': 'https://github.com/httpie/httpie'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tr... | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-19T00:00:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4r65-35qq-ch8j | 2023-02-15T19:18:40Z | 2022-03-04T00:00:17Z | null | ['CVE-2021-3620'] | Ansible discloses sensitive information in traceback error message | Ansible is an IT automation system that handles configuration management, application deployment, cloud provisioning, ad-hoc task execution, network automation, and multi-node orchestration. A flaw was found in Ansible Engine's ansible-connection module where sensitive information, such as the Ansible user credentials,... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'ansible'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.9.27'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3620'}, {'type': 'WEB', 'url': 'https://github.com/ansible/ansible/commit/fe28767970c8ec62aabe493c46b53a5de1e5fac0'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errata/RHSA-2021:3871'}, {'type': 'WEB', 'url': 'https://access.redhat.com/errat... | {'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-24T21:40:53Z', 'nvd_published_at': '2022-03-03T19:15:00Z'} |
1.4.0 | GHSA-48p3-xfvw-g59c | 2022-04-05T19:27:38Z | 2022-03-29T00:01:16Z | null | ['CVE-2021-26598'] | Incorrect Access Control in ImpressCMS | ImpressCMS before 1.4.3 has Incorrect Access Control because include/findusers.php allows access by unauthenticated attackers (who are, by design, able to have a security token). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26598'}, {'type': 'WEB', 'url': 'https://github.com/ImpressCMS/impresscms/pull/967'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1081137'}, {'type': 'PACKAGE', 'url': 'https://github.com/ImpressCMS/impresscms'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T19:56:34Z', 'nvd_published_at': '2022-03-28T01:15:00Z'} |
1.4.0 | GHSA-w2j5-3rcx-vx7x | 2022-03-15T20:02:54Z | 2022-03-15T20:02:54Z | null | [] | Sysctls applied to containers with host IPC or host network namespaces can affect the host | ### Impact
Before setting the sysctls for a pod, the pods namespaces must be unshared (created). However, in cases where the pod is using a host network or IPC namespace, a bug in CRI-O caused the namespace creating tool [pinns](https://github.com/cri-o/cri-o/tree/main/pinns/) to configure the sysctls of the host. This... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.23.0'}, {'fixed': '1.23.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.22.0'}, {'fixed': '1.22.2'}]... | [{'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/security/advisories/GHSA-w2j5-3rcx-vx7x'}, {'type': 'PACKAGE', 'url': 'https://github.com/cri-o/cri-o'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-15T20:02:54Z', 'nvd_published_at': None} |
1.4.0 | GHSA-rphc-h572-2x9f | 2022-03-24T22:38:55Z | 2022-03-15T00:00:55Z | null | ['CVE-2022-0960'] | Cross-site Scripting in showdoc/showdoc | ShowDoc is a tool greatly applicable for an IT team to share documents online. showdoc/showdoc allows .properties files to upload which lead to stored XSS in versions prior to 2.10.4. This allows attackers to execute malicious scripts in the user's browser. This issue was patched in version 2.10.4. There is currently n... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0960'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/92bc6a83a3a60e01a0d2effb98ab47d8d7eab28f'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/462cd8a7-b1a9... | {'cwe_ids': ['CWE-434', 'CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-15T19:26:12Z', 'nvd_published_at': '2022-03-14T15:15:00Z'} |
1.4.0 | GHSA-cr3q-pqgq-m8c2 | 2022-03-29T19:09:55Z | 2022-03-12T00:00:36Z | null | ['CVE-2018-25031'] | Spoofing attack in swagger-ui | Swagger UI before 4.1.3 could allow a remote attacker to conduct spoofing attacks. By persuading a victim to open a crafted URL, an attacker could exploit this vulnerability to display remote OpenAPI definitions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'swagger-ui'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25031'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/issues/4872'}, {'type': 'WEB', 'url': 'https://github.com/swagger-api/swagger-ui/pull/7697'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}, {'type... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:31:48Z', 'nvd_published_at': '2022-03-11T07:15:00Z'} |
1.4.0 | GHSA-hrf4-hcpc-3345 | 2022-03-25T17:09:24Z | 2022-03-16T00:00:48Z | null | ['CVE-2022-0961'] | Denial of service in microweber | Microweber is drag and drop website builder and CMS with E-commerce. The microweber prior 1.2.12 application allows large characters to insert in the input field "post title" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The post title input can be limited to 500 characters or... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0961'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/f7acbd075dff4825b35b597b74958de9edce67fc'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c... | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-19T00:16:10Z', 'nvd_published_at': '2022-03-15T15:15:00Z'} |
1.4.0 | GHSA-qg5x-66hp-cw5p | 2022-04-05T18:52:26Z | 2022-03-31T00:00:23Z | null | ['CVE-2022-25598'] | Uncontrolled Resource Consumption in Apache DolphinScheduler | Apache DolphinScheduler user registration is vulnerable to Regular express Denial of Service (ReDoS) attacks. Apache DolphinScheduler users should upgrade to version 2.0.5 or higher. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dolphinscheduler:dolphinscheduler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'apache-dolphinscheduler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'f... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25598'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/dolphinscheduler'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vulns/apache-dolphinscheduler/PYSEC-2022-176.yaml'}, {'type': 'WEB', 'url': 'https://list... | {'cwe_ids': ['CWE-1333', 'CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T15:38:43Z', 'nvd_published_at': '2022-03-30T10:15:00Z'} |
1.4.0 | GHSA-cj78-rgw3-4h5p | 2022-03-28T15:56:00Z | 2022-03-11T00:02:02Z | null | ['CVE-2022-26661'] | Improper Restriction of XML External Entity Reference in trytond and proteus | An XXE issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An authenticated user can make the serv... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'trytond'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.46'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'trytond'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26661'}, {'type': 'WEB', 'url': 'https://discuss.tryton.org/t/security-release-for-issue11219-and-issue11244/5059'}, {'type': 'WEB', 'url': 'https://foss.heptapod.net/tryton/tryton/-/issues/11219'}, {'type': 'PACKAGE', 'url': 'https://hg.tryton.org... | {'cwe_ids': ['CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T15:56:00Z', 'nvd_published_at': '2022-03-10T17:47:00Z'} |
1.4.0 | GHSA-7r79-mrp6-8mhq | 2022-03-10T16:00:56Z | 2022-03-02T00:00:19Z | null | ['CVE-2022-0777'] | Rate limit missing in microweber | Microweber prior to version 1.3 does not rate limit password reset emails. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0777'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/a3944cf9d1d8c41a48297ddc98302934e2511b0f'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b... | {'cwe_ids': ['CWE-640'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-02T21:22:22Z', 'nvd_published_at': '2022-03-01T09:15:00Z'} |
1.4.0 | GHSA-j878-43hm-8gr5 | 2022-03-23T15:35:11Z | 2022-03-12T00:00:30Z | null | ['CVE-2022-0921'] | Unrestricted Upload of File with Dangerous Type in Microweber | In Microweber prior to 1.2.12, a malicious actor may abuse the Backup/Restore feature to achieve Remote Code Execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0921'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/867bdda1b4660b0795ad7f87ab5abe9e44b2b318'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/e... | {'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T15:32:04Z', 'nvd_published_at': '2022-03-11T18:15:00Z'} |
1.4.0 | GHSA-6c9x-mj3g-h47x | 2022-03-29T19:10:02Z | 2022-03-12T00:00:36Z | null | ['CVE-2021-46708'] | Spoofing attack in swagger-ui-dist | The swagger-ui-dist package before 4.1.3 for Node.js could allow a remote attacker to hijack the clicking action of the victim. By persuading a victim to visit a malicious Web site, a remote attacker could exploit this vulnerability to hijack the victim's click actions and possibly launch further attacks against the vi... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'swagger-ui-dist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46708'}, {'type': 'PACKAGE', 'url': 'https://github.com/swagger-api/swagger-ui'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220407-0004/'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JS-SWAGGERUIDIST-231488... | {'cwe_ids': ['CWE-1021'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:32:38Z', 'nvd_published_at': '2022-03-11T07:15:00Z'} |
1.4.0 | GHSA-vqp6-j452-j6wp | 2022-03-11T22:27:18Z | 2022-03-04T00:00:22Z | null | ['CVE-2021-3654'] | Open Redirect in CPython that affects users of OpenStack Nova | A vulnerability was found in CPython which is used by openstack-nova's console proxy, noVNC. By crafting a malicious URL, noVNC could be made to redirect to any desired URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '21.2.3'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'nova'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '22.0.0'}, {'fixed': '22.2.3'}]}]}, {'package': {'ecosystem': 'PyPI'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3654'}, {'type': 'WEB', 'url': 'https://bugs.launchpad.net/nova/+bug/1927677'}, {'type': 'WEB', 'url': 'https://bugs.python.org/issue32084'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1961439'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T22:27:18Z', 'nvd_published_at': '2022-03-02T23:15:00Z'} |
1.4.0 | GHSA-32x6-qvw6-mxj4 | 2022-03-15T18:05:24Z | 2022-03-01T22:14:57Z | null | ['CVE-2022-24719'] | Forwarding of confidentials headers to third parties in fluture-node | ### Impact
Using `followRedirects` or `followRedirectsWith` with any of the redirection strategies built into fluture-node 4.0.0 or 4.0.1, paired with a request that includes confidential headers such as Authorization or Cookie, exposes you to a vulnerability where, if the destination server were to redirect the reque... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'fluture-node'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.0.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'request-util'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/fluture-js/fluture-node/security/advisories/GHSA-32x6-qvw6-mxj4'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24719'}, {'type': 'WEB', 'url': 'https://github.com/psf/requests/pull/4718'}, {'type': 'WEB', 'url': 'https://github.com/fluture-js/flutur... | {'cwe_ids': ['CWE-200', 'CWE-212', 'CWE-359', 'CWE-601'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:14:57Z', 'nvd_published_at': '2022-03-01T21:15:00Z'} |
1.4.0 | GHSA-23x5-j68g-6jpw | 2022-11-30T20:08:43Z | 2022-03-16T00:00:43Z | null | ['CVE-2022-27209'] | Missing permission checks in Jenkins kubernetes-cd Plugin allow enumerating credentials IDs | kubernetes-cd Plugin 2.3.1 and earlier does not perform permission checks in several HTTP endpoints.
This allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. Those can be used as part of an attack to capture the credentials using another vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:kubernetes-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27209'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kubernetes-cd-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2636'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:08:43Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-pccm-j6vj-jwwf | 2022-03-29T18:54:13Z | 2022-03-15T00:00:54Z | null | ['CVE-2022-0962'] | Cross-site Scripting in ShowDoc | ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.webma` file upload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0962'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7ebe3e5f-2c86-44de-b83e-2ddb6bbda908'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T18:54:13Z', 'nvd_published_at': '2022-03-14T16:15:00Z'} |
1.4.0 | GHSA-727h-hrw8-jg8q | 2023-08-03T17:41:54Z | 2022-03-11T00:02:02Z | null | ['CVE-2022-26520'] | Path traversal in org.postgresql:postgresql | In pgjdbc before 42.3.3, an attacker (who controls the jdbc URL or properties) can call java.util.logging.FileHandler to write to arbitrary files through the loggerFile and loggerLevel connection properties. An example situation is that an attacker could create an executable JSP file under a Tomcat web root. NOTE: the ... | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.postgresql:postgresql'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '42.1.0'}, {'fixed': '42.3.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/security/advisories/GHSA-673j-qm5f-xpv8'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26520'}, {'type': 'WEB', 'url': 'https://github.com/pgjdbc/pgjdbc/pull/2454/commits/017b929977b4f85795f9ad2fa5de6e80978b8ccc'}, {'type': 'PACKAGE', ... | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-08T00:02:20Z', 'nvd_published_at': '2022-03-10T17:47:00Z'} |
1.4.0 | GHSA-636j-7x7r-gvw2 | 2022-04-13T13:28:21Z | 2022-03-31T00:00:22Z | null | ['CVE-2022-1155'] | Old sessions not blocked by login enable function in Snipe-IT | Snipe-IT is a FOSS project for asset management in IT Operations. In Snipe-IT versions 5.4.1 and 6.0.0-RC-5 and prior, active sessions are not revoked when a user account is disabled, allowing that user to still access information that they should no longer be able to. Workarounds include using the KillAllSessions cons... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0-RC-1'}, {'fixed': '6.0.0-RC-6'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.0.0-RC-5'}}, {'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1155'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/pull/10876'}, {'type': 'WEB', 'url': 'https://github.com/snipe/snipe-it/commit/bdabbbd4e98e88ee01e728ceb4fd512661fbd38d'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-... | {'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T14:11:35Z', 'nvd_published_at': '2022-03-30T13:15:00Z'} |
1.4.0 | GHSA-h65g-jfqg-2w6m | 2022-03-15T21:52:59Z | 2022-03-08T00:00:31Z | null | ['CVE-2022-0767'] | Server-Side Request Forgery in calibreweb | calibreweb prior to version 0.6.17 is vulnerable to server-side request forgery (SSRF). This is a result of incomplete SSRF protection that can be bypassed via an HTTP redirect. An HTTP server set up to respond with a 302 redirect may redirect a request to `localhost`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'calibreweb'}, 'ecosystem_specific': {'affected_functions': ['calibreweb.cps.helper.save_cover_from_url']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0767'}, {'type': 'WEB', 'url': 'https://github.com/janeczku/calibre-web/commit/965352c8d96c9eae7a6867ff76b0db137d04b0b8'}, {'type': 'PACKAGE', 'url': 'https://github.com/janeczku/calibre-web'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b26... | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-08T18:11:08Z', 'nvd_published_at': '2022-03-07T07:15:00Z'} |
1.4.0 | GHSA-q73m-3q7r-fpf7 | 2022-03-29T15:46:18Z | 2022-03-16T00:00:48Z | null | ['CVE-2022-0957'] | Cross-site Scripting in ShowDoc | ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0957'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/pull/1632'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/d1c9ed0d77ea5d56f09be0c492361dca8af745bb'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/sho... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T15:46:18Z', 'nvd_published_at': '2022-03-15T13:15:00Z'} |
1.4.0 | GHSA-j7xg-5549-jr3j | 2022-04-01T20:09:29Z | 2022-03-25T00:00:34Z | null | ['CVE-2022-27820'] | Improper Certificate Validation in OWASP ZAP | OWASP Zed Attack Proxy (ZAP) through w2022-03-21 does not verify the TLS certificate chain of an HTTPS server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.zaproxy:zap'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.11.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27820'}, {'type': 'WEB', 'url': 'https://github.com/zaproxy/zaproxy/issues/7165'}, {'type': 'WEB', 'url': 'https://github.com/zaproxy/zaproxy/releases'}, {'type': 'WEB', 'url': 'https://www.openwall.com/lists/oss-security/2022/03/23/1'}, {'type': '... | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T20:09:29Z', 'nvd_published_at': '2022-03-24T04:15:00Z'} |
1.4.0 | GHSA-8rx6-v5q4-xw3j | 2022-04-07T21:59:30Z | 2022-03-30T00:00:23Z | null | ['CVE-2022-28154'] | XML External Entity Reference in Jenkins Coverage/Complexity Scatter Plot Plugin | Jenkins Coverage/Complexity Scatter Plot Plugin 1.1.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:covcomplplot'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28154'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/covcomplplot-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1899'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securit... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T21:59:30Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-mc92-c859-jr66 | 2022-11-30T20:57:48Z | 2022-03-30T00:00:23Z | null | ['CVE-2022-28148'] | Path traversal vulnerability on Windows in Jenkins Continuous Integration with Toad Edge Plugin | The file browser in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier may interpret some paths to files as absolute on Windows, resulting in a path traversal vulnerability allowing attackers with Item/Read permission to obtain the contents of arbitrary files on Windows controllers. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ci-with-toad-edge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28148'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ci-with-toad-edge-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2654'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:57:48Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-35h9-h439-vvmr | 2022-11-30T19:39:50Z | 2022-03-16T00:00:42Z | null | ['CVE-2022-27213'] | Stored Cross-site Scripting vulnerability in Jenkins Environment Dashboard Plugin | Jenkins Environment Dashboard Plugin 1.1.10 and earlier does not escape the Environment order and the Component order configuration values in its views, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with View/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:environment-dashboard'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27213'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2252'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/15/2'}] | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T19:39:50Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-4qrp-27r3-66fj | 2022-03-18T15:22:18Z | 2022-03-14T22:38:14Z | null | ['CVE-2022-24749'] | Improper sanitize of SVG files during content upload ('Cross-site Scripting') in sylius/sylius | ### Impact
There is a possibility to upload an SVG file containing XSS code in the admin panel. In order to perform an XSS attack, the file itself has to be opened in a new card (or loaded outside of the IMG tag). The problem applies both to the files opened on the admin panel and shop pages.
### Patches
The issue is ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.11'}]}]}, {'p... | [{'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/security/advisories/GHSA-4qrp-27r3-66fj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24749'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sylius/Sylius'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/releases/tag/v1.10... | {'cwe_ids': ['CWE-434', 'CWE-79', 'CWE-80'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:38:14Z', 'nvd_published_at': '2022-03-14T22:15:00Z'} |
1.4.0 | GHSA-76j4-gggq-7rg9 | 2022-04-07T15:28:23Z | 2022-03-28T00:00:20Z | null | ['CVE-2022-26245'] | SQLinjection in falcon-plus | Falcon-plus v0.3 was discovered to contain a SQL injection vulnerability via the parameter grpName in /config/service/host.go. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/open-falcon/falcon-plus'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26245'}, {'type': 'WEB', 'url': 'https://github.com/open-falcon/falcon-plus/issues/951'}, {'type': 'PACKAGE', 'url': 'github.com/open-falcon/falcon-plus'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:28:23Z', 'nvd_published_at': '2022-03-27T14:15:00Z'} |
1.4.0 | GHSA-8c76-mxv5-w4g8 | 2022-03-28T17:25:37Z | 2022-03-16T00:00:48Z | null | ['CVE-2022-0954'] | Stored Cross-site Scripting in Microweber | Microweber 1.2.11 and prior contains multiple stored cross-site scripting vulnerabilities in Shop's Other Settings, Shop's Autorespond E-mail Settings and Shops' Payments Methods. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.2.11'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0954'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/955471c27e671c49e4b012e3b120b004082ac3f7'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:38:20Z', 'nvd_published_at': '2022-03-15T12:15:00Z'} |
1.4.0 | GHSA-q67f-3jq4-mww2 | 2022-03-11T20:36:49Z | 2022-03-05T00:00:45Z | null | ['CVE-2022-0831'] | Cross-site Scripting in Pimcore | Pimcore version 10.3.2 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 10.3.3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.3.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0831'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/e786fd44aac46febdbf916ed6c328fbe645d80bf'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/4152e3a7-27a1... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T20:36:49Z', 'nvd_published_at': '2022-03-04T14:15:00Z'} |
1.4.0 | GHSA-pq2f-3fg3-rw99 | 2022-03-29T15:26:17Z | 2022-03-15T00:00:57Z | null | ['CVE-2022-0254'] | SQL Injection in WordPress Zero Spam WordPress plugin | The WordPress Zero Spam WordPress plugin before 5.2.13 does not properly sanitise and escape the order and orderby parameters before using them in a SQL statement in the admin dashboard, leading to a SQL injection | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'bmarshall511/wordpress_zero_spam'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0254'}, {'type': 'WEB', 'url': 'https://github.com/Highfivery/zero-spam-for-wordpress/commit/49723f696f1e2f2a76ac89375910bb036a4895f3'}, {'type': 'PACKAGE', 'url': 'https://github.com/Highfivery/zero-spam-for-wordpress'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T15:26:17Z', 'nvd_published_at': '2022-03-14T15:15:00Z'} |
1.4.0 | GHSA-vpmw-77vm-4mjg | 2022-03-09T20:07:17Z | 2022-03-02T00:00:21Z | null | ['CVE-2022-26332'] | Cross-site Scripting in Cipi | Cipi 3.1.15 allows Add Server stored cross-site scripting via the /api/servers name field. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'andreapollastri/cipi'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.1.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26332'}, {'type': 'PACKAGE', 'url': 'https://github.com/andreapollastri/cipi'}, {'type': 'WEB', 'url': 'https://github.com/andreapollastri/cipi/releases'}, {'type': 'WEB', 'url': 'https://www.exploit-db.com/exploits/50788'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-09T20:07:17Z', 'nvd_published_at': '2022-03-01T01:15:00Z'} |
1.4.0 | GHSA-qq74-vgcf-54c3 | 2022-03-23T15:37:53Z | 2022-03-15T00:01:00Z | null | ['CVE-2022-0946'] | Cross-site Scripting in ShowDoc | ShowDoc is vulnerable to stored cross-site scripting via viva cshtm file upload in in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0946'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/e5d575928b1371a7e07b09b6592822298335062a'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/1f8f0021-396e... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T14:16:17Z', 'nvd_published_at': '2022-03-14T14:15:00Z'} |
1.4.0 | GHSA-838h-jqp6-cf2f | 2022-05-02T19:39:05Z | 2022-03-29T22:10:10Z | null | ['CVE-2022-24783'] | Sandbox bypass leading to arbitrary code execution in Deno | ### Impact
The versions of Deno between release 1.18.0 and 1.20.2 (inclusive) are vulnerable to an attack where a malicious actor controlling the code executed in a Deno runtime could bypass permission checks and execute arbitrary shell code.
There is **no** evidence that this vulnerability has been exploited in the ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'deno'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.18.0'}, {'fixed': '1.20.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/denoland/deno/security/advisories/GHSA-838h-jqp6-cf2f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24783'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/pull/14115'}, {'type': 'WEB', 'url': 'https://github.com/denoland/deno/commit/fcfc... | {'cwe_ids': ['CWE-269', 'CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T22:10:10Z', 'nvd_published_at': '2022-03-25T22:15:00Z'} |
1.4.0 | GHSA-r5r6-v8qh-pmpq | 2022-11-29T21:52:22Z | 2022-03-30T00:00:25Z | null | ['CVE-2022-28134'] | Missing permission checks in Jekins Bitbucket Server Integration Plugin | Jenkins Bitbucket Server Integration Plugin 3.1.0 and earlier does not perform permission checks in several HTTP endpoints, allowing attackers with Overall/Read permission to create, view, and delete BitBucket Server consumers. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:atlassian-bitbucket-server-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28134'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/atlassian-bitbucket-server-integration-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2640'}, {'type': 'WEB', 'url': 'http://www.open... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:52:22Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-pc32-x737-74cv | 2022-03-29T15:16:23Z | 2022-03-17T00:00:48Z | null | ['CVE-2022-0704'] | Cross-site Scripting in Pimcore | Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.3.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0704'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/11447'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pi... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T15:16:23Z', 'nvd_published_at': '2022-03-16T10:15:00Z'} |
1.4.0 | GHSA-5rcc-6cmj-7728 | 2022-03-14T21:03:33Z | 2022-03-09T00:00:44Z | null | ['CVE-2022-0877'] | Cross-site Scripting in BookStack | Iframe tags don't have a sandbox attribute, this makes an attacker able to execute malicious javascript via an iframe and perform phishing attacks. The sandbox attribute will block script execution and prevents the content to navigate its top-level browsing context which will stop this type of attack. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'ssddanbrown/bookstack'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '22.02.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0877'}, {'type': 'WEB', 'url': 'https://github.com/bookstackapp/bookstack/commit/856fca8289b7370cafa033ea21c408e7d4303fd6'}, {'type': 'PACKAGE', 'url': 'https://github.com/bookstackapp/bookstack'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-09T18:24:00Z', 'nvd_published_at': '2022-03-08T13:15:00Z'} |
1.4.0 | GHSA-7756-56hr-2vcp | 2022-11-30T19:41:49Z | 2022-03-16T00:00:43Z | null | ['CVE-2022-27212'] | Stored Cross-site Scripting vulnerability in Jenkins List Git Branches Parameter Plugin | Jenkins List Git Branches Parameter Plugin 0.0.9 and earlier does not escape the name of the 'List Git branches (and more)' parameter, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:list-git-branches-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27212'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/list-git-branches-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2167'}, {'type': 'WEB', 'url': 'http://www.openwall.com/li... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T19:41:49Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-2xmm-g482-4439 | 2022-03-15T19:09:16Z | 2022-03-15T19:09:16Z | null | ['CVE-2022-24752'] | DQL injection through sorting parameters blocked | ### Impact
Values added at the end of query sorting were passed directly to the DB. We don't know, if it could lead to direct SQL injections, however, we should not allow for easy injection of values there anyway.
### Patches
The issue is fixed in version 1.10.1 and in 1.11-rc.1
### Workarounds
You have to overwrite... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'sylius/grid-bundle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.10.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Sylius/SyliusGridBundle/security/advisories/GHSA-2xmm-g482-4439'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24752'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/SyliusGridBundle/pull/222'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-15T19:09:16Z', 'nvd_published_at': '2022-03-15T15:15:00Z'} |
1.4.0 | GHSA-mj6m-246h-9w56 | 2022-03-01T22:05:34Z | 2022-03-01T22:05:34Z | null | ['CVE-2022-25769'] | Improper regex in htaccess file | ### Impact
the default .htaccess file has some restrictions in the access to PHP files to only allow specific PHP files to be executed in the root of the application.
This logic isn't correct, as the regex in the second FilesMatch only checks the filename, not the full path.
### Patches
Please upgrade to 3.3.5 or 4.2... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'mautic/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.2.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mautic/mautic/security/advisories/GHSA-mj6m-246h-9w56'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:05:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-2647-c639-qv2j | 2022-03-18T21:20:46Z | 2022-03-08T00:00:31Z | null | ['CVE-2022-0766'] | Server-Side Request Forgery in calibreweb | calibreweb prior to version 0.6.17 is vulnerable to server-side request forgery (SSRF). This is due to an incomplete fix for [CVE-2022-0339](https://github.com/advisories/GHSA-4w8p-x6g8-fv64). The blacklist does not check for `0.0.0.0`, which would result in a payload of `0.0.0.0` resolving to `localhost`. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'calibreweb'}, 'ecosystem_specific': {'affected_functions': ['calibreweb.cps.helper.save_cover_from_url']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0766'}, {'type': 'WEB', 'url': 'https://github.com/janeczku/calibre-web/commit/965352c8d96c9eae7a6867ff76b0db137d04b0b8'}, {'type': 'PACKAGE', 'url': 'https://github.com/janeczku/calibre-web'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/7f2... | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-08T18:11:03Z', 'nvd_published_at': '2022-03-07T07:15:00Z'} |
1.4.0 | GHSA-hx3r-qwxv-5jw9 | 2022-11-30T20:15:12Z | 2022-03-16T00:00:43Z | null | ['CVE-2022-27206'] | Client Secret stored in plain text by Jenkins GitLab Authentication Plugin | Jenkins GitLab Authentication Plugin 1.13 and earlier stores the GitLab client secret unencrypted in the global `config.xml` file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
This client secret can be viewed by users with access to the Jenkins controller ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gitlab-oauth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27206'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/gitlab-oauth-plugin'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/gitlab-oauth-plugin/releases/tag/gitlab-oauth-1.14'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/secur... | {'cwe_ids': ['CWE-311', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:15:12Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-fxhp-wrw9-3r97 | 2022-03-18T17:46:29Z | 2022-03-18T17:46:29Z | null | ['CVE-2021-23901'] | XML external entity (XXE) injection in Apache Nutch | An XML external entity (XXE) injection vulnerability was discovered in the Nutch DmozParser and is known to affect Nutch versions < 1.18. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data. It often allows a... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.nutch:nutch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.18'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23901'}, {'type': 'WEB', 'url': 'https://github.com/apache/nutch/pull/563'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/NUTCH-2841'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r090321840b44cc91086c4e317bf2baffa... | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-04-06T19:54:36Z', 'nvd_published_at': '2021-01-25T10:16:00Z'} |
1.4.0 | GHSA-cfm4-qjh2-4765 | 2022-03-18T23:09:54Z | 2022-03-18T23:09:54Z | null | ['CVE-2022-24771'] | Improper Verification of Cryptographic Signature in node-forge | ### Impact
RSA PKCS#1 v1.5 signature verification code is lenient in checking the digest algorithm structure. This can allow a crafted structure that steals padding bytes and uses unchecked portion of the PKCS#1 encoded message to forge a signature when a low public exponent is being used.
### Patches
The issue has ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-forge'}, 'ecosystem_specific': {'affected_functions': ['forge.pki.rsa']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-cfm4-qjh2-4765'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24771'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:09:54Z', 'nvd_published_at': '2022-03-18T14:15:00Z'} |
1.4.0 | GHSA-fm35-jgg3-3grx | 2022-03-18T17:54:38Z | 2022-03-18T17:54:38Z | null | [] | NaN/INF in serverbound movement packets can crash clients and servers | ### Impact
A malicious client may send a `MovePlayerPacket` to the server whose position or rotation contains NaN or INF. Since neither the server nor vanilla client handles this properly, a number of interesting side effects come into play.
- The server may crash in various ways if this exploit is used, because some ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.18.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.18.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-fm35-jgg3-3grx'}] | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-21T18:18:08Z', 'nvd_published_at': None} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.