schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-6h2c-g688-q9qr
2022-04-07T21:54:34Z
2022-03-30T00:00:24Z
null
['CVE-2022-28156']
Path traversal in Jenkins Phoenix AutoTest Plugin
Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Item/Configure permission to copy arbitrary files and directories from the Jenkins controller to the agent workspace.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.surenpi.jenkins:phoenix-autotest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28156'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2683'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T21:54:34Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-7563-75j9-6h5p
2022-03-15T21:47:08Z
2022-03-14T22:26:58Z
null
['CVE-2022-24742']
Sensitive Information Exposure in Sylius
### Impact Any other user can view the data if the browser tab remains open after logging out. Once someone logs out and leaves the browser open, the potential attacker may use the back button to see the content exposed on given screens. No action may be performed though, and any website refresh will block further read...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10'}, {'fixed': '1.10.11'}]}]}, {'pac...
[{'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/security/advisories/GHSA-7563-75j9-6h5p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24742'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sylius/Sylius'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/releases/tag/v1.10...
{'cwe_ids': ['CWE-200', 'CWE-213', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:26:58Z', 'nvd_published_at': '2022-03-14T20:15:00Z'}
1.4.0
GHSA-rjmq-6v55-4rjv
2022-03-15T19:02:36Z
2022-03-15T19:02:36Z
null
['CVE-2022-24721']
Improper Authorization in org.cometd.oort
### Impact Internal usage of Oort and Seti channels is improperly authorized, so any remote user could subscribe and publish to those channels. By subscribing to those channels, a remote user may be able to watch cluster-internal traffic that contains other user's (possibly sensitive) data. By publishing to those chann...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.cometd.java:cometd-java-oort'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.cometd.java:cometd-java-oort'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, ...
[{'type': 'WEB', 'url': 'https://github.com/cometd/cometd/security/advisories/GHSA-rjmq-6v55-4rjv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24721'}, {'type': 'WEB', 'url': 'https://github.com/cometd/cometd/issues/1146'}, {'type': 'WEB', 'url': 'https://github.com/cometd/cometd/commit/bb4...
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-15T19:02:36Z', 'nvd_published_at': '2022-03-15T14:15:00Z'}
1.4.0
GHSA-w267-m9c4-8555
2022-03-18T20:12:59Z
2022-03-10T17:37:43Z
null
['CVE-2022-24744']
Shopware user session is not logged out if the password is reset via password recovery
### Impact User session is not logged out if the password is reset via password recovery ## Patches Fixed in 6.4.8.1, maintainers recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/downl...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.8.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.8.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': ...
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-w267-m9c4-8555'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24744'}, {'type': 'WEB', 'url': 'https://github.com/shopware/core/commit/324cd1b57db58481df1b1d0030ffc307e2d9fe64'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-613'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T17:37:43Z', 'nvd_published_at': '2022-03-09T23:15:00Z'}
1.4.0
GHSA-hpm9-fx8v-w45v
2022-11-29T21:57:05Z
2022-03-30T00:00:25Z
null
['CVE-2022-28135']
Plaintext storage in Jenkins instant-messaging Plugin
Jenkins instant-messaging Plugin 1.41 and earlier stores passwords for group chats unencrypted in the global configuration file of plugins based on Jenkins instant-messaging Plugin on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:instant-messaging'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.42'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28135'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/instant-messaging-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2161'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se...
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T22:02:17Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-x28w-hvwc-mp75
2022-03-25T17:18:05Z
2022-03-11T00:02:35Z
null
['CVE-2022-0895']
Static Code Injection in Microweber
Microweber is a new generation CMS with drag and drop. Prior to version 1.3, Microweber is vulnerable to static code injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0895'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/b2baab6e582b2efe63788d367a2bb61a2fa26470'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3...
{'cwe_ids': ['CWE-94', 'CWE-96'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T20:28:04Z', 'nvd_published_at': '2022-03-10T11:15:00Z'}
1.4.0
GHSA-chxf-fjcf-7fwp
2022-03-01T21:04:07Z
2022-03-01T21:04:07Z
null
[]
Possible filesystem space exhaustion by local users
`fscrypt` through v0.3.2 creates a world-writable directory by default when setting up a filesystem, allowing unprivileged users to exhaust filesystem space. We recommend upgrading to `fscrypt` v0.3.3 or above and adjusting the permissions on existing `fscrypt` metadata directories where applicable. For more details, ...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/google/fscrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/google/fscrypt/security/advisories/GHSA-chxf-fjcf-7fwp'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/fscrypt'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:04:07Z', 'nvd_published_at': None}
1.4.0
GHSA-8v99-48m9-c8pm
2022-04-13T03:57:32Z
2022-03-28T19:33:44Z
null
['CVE-2022-24778']
Incorrect Authorization in imgcrypt
Imgcrypt implements a function `CheckAuthorization()` that is supposed to check whether a user is authorized to access an encrypted image given the keys that the user has provided on the command line that would enable decryption of the image. The check is to prevent that a user can start a container from an image that ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/imgcrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/containerd/imgcrypt/security/advisories/GHSA-8v99-48m9-c8pm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24778'}, {'type': 'WEB', 'url': 'https://github.com/containerd/imgcrypt/issues/69'}, {'type': 'WEB', 'url': 'https://github.com/containerd/img...
{'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T19:33:44Z', 'nvd_published_at': '2022-03-25T18:15:00Z'}
1.4.0
GHSA-5gjh-5j4f-cpwv
2022-03-28T16:46:41Z
2022-03-28T16:46:41Z
null
['CVE-2022-0415']
Unrestricted Upload of File with Dangerous Type in Gogs
### Impact The malicious user is able to upload a crafted `config` file into repository's `.git` directory with to gain SSH access to the server. All installations with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129) are affected....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-5gjh-5j4f-cpwv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0415'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/6833'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/pull/6838'}, {'type': '...
{'cwe_ids': ['CWE-20', 'CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T16:46:41Z', 'nvd_published_at': '2022-03-21T11:15:00Z'}
1.4.0
GHSA-3q55-66g3-p8xq
2022-03-22T19:36:42Z
2022-03-13T00:00:54Z
null
['CVE-2022-0926']
Cross-site Scripting in microweber
File upload filter bypass leading to stored XSS in GitHub repository microweber/microweber prior to 1.2.12.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0926'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/89200cfcc2cfefe5554721e7fa3cf52f6a2a9120'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:53:26Z', 'nvd_published_at': '2022-03-12T10:15:00Z'}
1.4.0
GHSA-hggv-mcp4-vxc5
2022-03-24T23:45:34Z
2022-03-12T00:00:37Z
null
['CVE-2022-25508']
Improper Authentication in FreeTAKServer
FreeTAKServer is an open source, lightweight Server for connect TAK clients. An access control issue in the component /ManageRoute/postRoute of FreeTAKServer version 1.9.8 allows unauthenticated attackers to cause a Denial of Service (DoS) via an unusually large amount of created routes, or create unsafe or false route...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'FreeTAKServer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.8.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.8'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25508'}, {'type': 'WEB', 'url': 'https://github.com/FreeTAKTeam/FreeTakServer/issues/291'}, {'type': 'PACKAGE', 'url': 'https://github.com/FreeTAKTeam/FreeTakServer'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vuln...
{'cwe_ids': ['CWE-287', 'CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:17:58Z', 'nvd_published_at': '2022-03-11T00:15:00Z'}
1.4.0
GHSA-rgg3-3wh7-w935
2022-03-28T22:21:50Z
2022-03-15T00:00:58Z
null
['CVE-2021-42171']
Unrestricted Upload of File with Dangerous Type in Zenario CMS
Zenario CMS 9.0.54156 is vulnerable to File Upload. The web server can be compromised by uploading and executing a web-shell which can run commands, browse system files, browse local resources, attack other servers, and exploit the local vulnerabilities, and so forth.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.55143'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.54156'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42171'}, {'type': 'WEB', 'url': 'https://github.com/hieuminhnv/Zenario-CMS-9.0-last-version/issues/2'}, {'type': 'WEB', 'url': 'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007'}, {'type': 'PACKAGE', 'url': '...
{'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T22:21:50Z', 'nvd_published_at': '2022-03-14T15:15:00Z'}
1.4.0
GHSA-gw5h-h6hj-f56g
2023-06-30T22:11:07Z
2022-03-14T22:58:37Z
null
['CVE-2022-0871']
Gogs vulnerable to improper PAM authorization handling
### Impact Expired PAM accounts and accounts with expired passwords are continued to be seen as valid. Installations use PAM as authentication sources are affected. ### Patches Expired PAM accounts and accounts with expired passwords are no longer being seen as valid. Users should upgrade to 0.12.5 or the latest 0.1...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-gw5h-h6hj-f56g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0871'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/6810'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/64102be2c90e1b47...
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:58:37Z', 'nvd_published_at': None}
1.4.0
GHSA-h2rj-8wgg-mm43
2023-09-21T19:54:28Z
2022-03-18T17:53:37Z
null
['CVE-2021-32470']
Craft CMS Cross-site Scripting Vulnerability
Craft CMS before 3.6.13 has an XSS vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32470'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/f9378aa154b5f9b64bed3d59cce0c4a8184bf5e6'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/3.6.13/CHANGELOG.md#security'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T20:57:59Z', 'nvd_published_at': '2021-05-07T19:31:00Z'}
1.4.0
GHSA-m4x7-44c8-jg2x
2022-11-30T19:31:12Z
2022-03-16T00:00:43Z
null
['CVE-2022-27214']
CSRF vulnerability in Jenkins Release Helper Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Release Helper Plugin 1.3.3 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:release-helper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27214'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/release-helper-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2274'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T19:31:12Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-vw83-h3mq-3qwj
2022-03-18T17:40:44Z
2022-03-18T17:40:44Z
null
['CVE-2021-22114']
Path Traversal in Spring-integration-zip
Addresses partial fix in CVE-2018-1263. Spring-integration-zip, versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename ge...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-zip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22114'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2021-22114'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T20:54:58Z', 'nvd_published_at': '2021-03-01T18:15:00Z'}
1.4.0
GHSA-mcg6-h362-cmq5
2022-03-11T20:52:04Z
2022-03-11T20:52:04Z
null
['CVE-2022-0860']
Improper Authorization in cobbler
### Impact If PAM is correctly configured and a user account is set to expired, the expired user-account is still able to successfully log into Cobbler in all places (Web UI, CLI & XMLRPC-API). The same applies to user accounts with passwords set to be expired. ### Patches There is a patch for the latest Cobbler `3...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/security/advisories/GHSA-mcg6-h362-cmq5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0860'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/commit/9044aa990a94752fa5bd5a24051adde099280bfa'}, {'type': 'ADVISORY', 'url': ...
{'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T20:52:04Z', 'nvd_published_at': '2022-03-11T13:15:00Z'}
1.4.0
GHSA-gcx5-3p5f-f8vp
2022-03-10T15:53:25Z
2022-03-03T00:00:51Z
null
['CVE-2022-23395']
Prototype Pollution in jquery.cookie
jQuery Cookie 1.4.1 is affected by prototype pollution, which can lead to DOM cross-site scripting (XSS).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'jquery.cookie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23395'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220325-0008/'}, {'type': 'WEB', 'url': 'https://snyk.io/test/npm/jquery.cookie/1.4.1?tab=issues'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T19:16:20Z', 'nvd_published_at': '2022-03-02T12:15:00Z'}
1.4.0
GHSA-37g7-8vjj-pjpj
2022-07-19T18:54:16Z
2022-03-18T17:58:59Z
null
['CVE-2020-14326']
RESTEasy 4.5.5.Final in hash flooding
A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes. This issue results in hash flooding, leading to slower requests with higher CPU time spent searching and adding the entry. This flaw allows an attacker to cause a denial of service.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.6.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.5.Final'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14326'}, {'type': 'WEB', 'url': 'https://github.com/resteasy/Resteasy/pull/2471'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1855826'}, {'type': 'PACKAGE', 'url': 'https://github.com/resteasy/Resteasy'}, {'type': 'WEB', 'u...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:18:23Z', 'nvd_published_at': '2021-06-02T12:15:00Z'}
1.4.0
GHSA-xvm2-9xvc-hx7f
2022-03-10T15:48:44Z
2022-03-02T21:30:54Z
null
['CVE-2022-23640']
Improper Restriction of XML External Entity Reference in com.monitorjbl:xlsx-streamer
### Impact Prior to xlsx-streamer 2.1.0, the XML parser that was used did not apply all the necessary settings to prevent XML Entity Expansion issues. ### Patches Upgrade to version 2.1.0. ### Workarounds No known workaround. ### References https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.monitorjbl:xlsx-streamer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/monitorjbl/excel-streaming-reader/security/advisories/GHSA-xvm2-9xvc-hx7f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23640'}, {'type': 'WEB', 'url': 'https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc29...
{'cwe_ids': ['CWE-611', 'CWE-776'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-02T21:30:54Z', 'nvd_published_at': '2022-03-02T20:15:00Z'}
1.4.0
GHSA-vq6c-fvxw-p45v
2022-11-30T20:06:48Z
2022-03-16T00:00:43Z
null
['CVE-2022-27210']
CSRF vulnerability in Jenkins kubernetes-cd Plugin allow capturing credentials
A cross-site request forgery (CSRF) vulnerability in Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:kubernetes-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27210'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kubernetes-cd-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2681'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi...
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:06:48Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-6cp7-g972-w9m9
2022-03-18T20:12:30Z
2022-03-07T16:59:31Z
null
['CVE-2022-24732']
Use of a Key Past its Expiration Date and Insufficient Session Expiration in Maddy Mail Server
### Impact Any configuration on any maddy version <0.5.4 using auth.pam is affected. No password expiry or account expiry checking is done when authenticating using PAM. ### Patches Patch is available as part of the 0.5.4 release. ### Workarounds If /etc/shadow authentication is used, it is possible to replace au...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/foxcpp/maddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/foxcpp/maddy/security/advisories/GHSA-6cp7-g972-w9m9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24732'}, {'type': 'WEB', 'url': 'https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583'}, {'type': 'PACKAGE', 'url': 'https...
{'cwe_ids': ['CWE-324', 'CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T16:59:31Z', 'nvd_published_at': '2022-03-09T20:15:00Z'}
1.4.0
GHSA-vqcx-jw4r-6fp3
2022-11-29T21:54:48Z
2022-03-30T00:00:25Z
null
['CVE-2022-28136']
CSRF vulnerability and missing permission check in Jenkins JiraTestResultReporter Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins JiraTestResultReporter Plugin 165.v817928553942 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:JiraTestResultReporter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '166.v0cc6208295b5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28136'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/JiraTestResultReporter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2236'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/o...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:54:48Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-qcgx-7p5f-hxvr
2022-03-29T22:11:45Z
2022-03-29T22:11:45Z
null
['CVE-2022-24784']
Discoverability of user password hash in Statamic CMS
## Description It was possible to confirm a single character of a user's password hash (just the hash, not the password) using a specially crafted regular expression filter in the users endpoint of the REST API. Many requests could eventually uncover the entire hash. The hash would not be in the response, however the...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'statamic/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.39'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'statamic/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/statamic/cms/security/advisories/GHSA-qcgx-7p5f-hxvr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24784'}, {'type': 'WEB', 'url': 'https://github.com/statamic/cms/issues/5604'}, {'type': 'WEB', 'url': 'https://github.com/statamic/cms/pull/5568'}, ...
{'cwe_ids': ['CWE-200', 'CWE-203', 'CWE-326'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T22:11:45Z', 'nvd_published_at': '2022-03-25T22:15:00Z'}
1.4.0
GHSA-7p99-3798-f85c
2022-03-31T22:44:47Z
2022-03-31T22:44:47Z
null
['CVE-2022-24794']
URL Redirection to Untrusted Site ('Open Redirect') in express-openid-connect
### Impact Users of the `requiresAuth` middleware, either directly or through the default `authRequired` option, are vulnerable to an Open Redirect when the middleware is applied to a catch all route. If all routes under `example.com` are protected with the `requiresAuth` middleware, a visit to `http://example.com//go...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'express-openid-connect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/auth0/express-openid-connect/security/advisories/GHSA-7p99-3798-f85c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24794'}, {'type': 'WEB', 'url': 'https://github.com/auth0/express-openid-connect/commit/0947b92164a2c5f661ebcc183d37e7f21de719ad'}, {...
{'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-31T22:44:47Z', 'nvd_published_at': '2022-03-31T23:15:00Z'}
1.4.0
GHSA-gc7m-x2cj-3775
2022-11-29T22:00:30Z
2022-03-30T00:00:25Z
null
['CVE-2022-28137']
Missing permission check in Jenkins JiraTestResultReporter Plugin
A missing permission check in Jenkins JiraTestResultReporter Plugin 165.v817928553942 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:JiraTestResultReporter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '166.v0cc6208295b5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28137'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/JiraTestResultReporter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2236'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/o...
{'cwe_ids': ['CWE-732', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T22:00:30Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-3r5x-x6xf-m8fv
2022-11-30T20:46:02Z
2022-03-30T00:00:21Z
null
['CVE-2022-28160']
Arbitrary file read vulnerability in Jenkins Tests Selector Plugin
Jenkins Tests Selector Plugin 1.3.3 and earlier allows users with Item/Configure permission to read arbitrary files on the Jenkins controller using the Choosing Tests parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:selected-tests-executor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28160'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/selected-tests-executor-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2338'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/...
{'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:46:02Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-mf79-f657-47ww
2022-03-28T15:39:13Z
2022-03-20T00:00:29Z
null
['CVE-2022-0991']
Insufficient Session Expiration in Admidio
Admidio prior to version 4.1.9 is vulnerable to insufficient session expiration. In vulnerable versions, changing the password in one session does not terminate sessions logged in with the old password, which could lead to unauthorized actors maintaining access to an account.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'admidio/admidio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0991'}, {'type': 'WEB', 'url': 'https://github.com/Admidio/admidio/issues/1238'}, {'type': 'WEB', 'url': 'https://github.com/admidio/admidio/commit/e84e472ebe517e2ff5795c46dc10b5f49dc4d46a'}, {'type': 'PACKAGE', 'url': 'https://github.com/Admidio/a...
{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T15:39:13Z', 'nvd_published_at': '2022-03-19T08:15:00Z'}
1.4.0
GHSA-rggc-4g3r-j7ff
2022-03-30T16:47:02Z
2022-03-20T00:00:30Z
null
['CVE-2022-26265']
Remote Code Execution in Contao Managed Edition
Contao Managed Edition v1.5.0 was discovered to contain a remote command execution (RCE) vulnerability via the component php_cli parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'contao/managed-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26265'}, {'type': 'WEB', 'url': 'https://github.com/JCCD/Contao-Managed-Edition-1.5-RCE/blob/main/VulnerabilityDetails.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/contao/managed-edition'}]
{'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T16:23:06Z', 'nvd_published_at': '2022-03-18T23:15:00Z'}
1.4.0
GHSA-xgx2-332h-9x6q
2022-03-30T15:24:00Z
2022-03-26T00:00:32Z
null
['CVE-2021-43091']
SQL Injection in Yeswiki
An SQL Injection vlnerability exits in Yeswiki doryphore 20211012 via the email parameter in the registration form. The issue was fixed in Yeswiki version 4.1.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'yeswiki/yeswiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43091'}, {'type': 'WEB', 'url': 'https://github.com/yeswiki/yeswiki/commit/c9785f9a92744c3475f9676a0d8f95de24750094'}, {'type': 'PACKAGE', 'url': 'https://github.com/yeswiki/yeswiki'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/07f245a7-ee9...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T15:24:00Z', 'nvd_published_at': '2022-03-25T17:15:00Z'}
1.4.0
GHSA-32gv-6cf3-wcmq
2022-03-14T22:45:11Z
2022-03-14T22:45:11Z
null
[]
HTTP/2 DoS Attacks: Ping, Reset, and Settings Floods
### Impact Twisted web servers that utilize the optional HTTP/2 support suffer from the following flow-control related vulnerabilities: Ping flood: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512 Reset flood: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514 Settings flood: https://cve.mitre.or...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'twisted'}, 'ecosystem_specific': {'affected_functions': ['twisted.web.http._GenericHTTPChannelProtocol.dataReceived']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.10.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/twisted/twisted/security/advisories/GHSA-32gv-6cf3-wcmq'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/a40ab1ce5210f231abe7a448a54d7e88e48f2d5d'}, {'type': 'PACKAGE', 'url': 'https://github.com/twisted/twisted'}]
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:45:11Z', 'nvd_published_at': None}
1.4.0
GHSA-xmq3-hgjx-6997
2022-03-29T15:16:27Z
2022-03-17T00:00:47Z
null
['CVE-2022-0705']
Cross-site Scripting in Pimcore
Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.3.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0705'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/11447'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pi...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T15:16:27Z', 'nvd_published_at': '2022-03-16T11:15:00Z'}
1.4.0
GHSA-mq47-6wwv-v79w
2022-03-18T23:23:02Z
2022-03-04T00:00:16Z
null
['CVE-2021-3762']
Path traversal in claircore
A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/quay/claircore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/quay/claircore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.1.0'}]}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3762'}, {'type': 'WEB', 'url': 'https://github.com/quay/clair/pull/1379'}, {'type': 'WEB', 'url': 'https://github.com/quay/clair/pull/1380'}, {'type': 'WEB', 'url': 'https://github.com/quay/claircore/pull/478'}, {'type': 'WEB', 'url': 'https://gith...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:23:02Z', 'nvd_published_at': '2022-03-03T22:15:00Z'}
1.4.0
GHSA-rv6r-3f5q-9rgx
2022-03-04T21:09:55Z
2022-03-03T19:02:08Z
null
['CVE-2022-21716']
Twisted SSH client and server deny of service during SSH handshake.
### Impact The Twisted SSH client and server implementation naively accepted an infinite amount of data for the peer's SSH version identifier. A malicious peer can trivially craft a request that uses all available memory and crash the server, resulting in denial of service. The attack is as simple as `nc -rv localho...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'twisted'}, 'ecosystem_specific': {'affected_functions': ['twisted.conch.ssh.transport.SSHTransportBase.dataReceived']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '21.7.0'}, {'fixed': '22.2.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/twisted/twisted/security/advisories/GHSA-rv6r-3f5q-9rgx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21716'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/98387b39e9f0b21462f6abc7a1325dc370fcdeb1'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-120', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T19:02:08Z', 'nvd_published_at': '2022-03-03T21:15:00Z'}
1.4.0
GHSA-r9cr-hvjj-496v
2022-03-24T00:04:03Z
2022-03-24T00:04:03Z
null
['CVE-2022-24730']
Path traversal and improper access control allows leaking out-of-bound files from Argo CD repo-server
### Impact All unpatched versions of Argo CD starting with v1.3.0 are vulnerable to a path traversal bug, compounded by an improper access control bug, allowing a malicious user with read-only repository access to leak sensitive files from Argo CD's repo-server. A malicious Argo CD user who has been granted [`get` ac...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '2.1.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2...
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-r9cr-hvjj-496v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24730'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}]
{'cwe_ids': ['CWE-22', 'CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-24T00:04:03Z', 'nvd_published_at': '2022-03-23T21:15:00Z'}
1.4.0
GHSA-p9gq-76fj-4p4p
2022-11-30T18:57:22Z
2022-03-16T00:00:42Z
null
['CVE-2022-27215']
Missing permission checks in Jenkins Release Helper Plugin
A missing permission check in Jenkins Release Helper Plugin 1.3.3 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:release-helper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27215'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/release-helper-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2274'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur...
{'cwe_ids': ['CWE-281', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T18:57:22Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-36p3-wjmg-h94x
2022-06-01T22:15:49Z
2022-03-31T18:30:50Z
null
['CVE-2022-22965']
Remote Code Execution in Spring Framework
Spring Framework prior to versions 5.2.20 and 5.3.18 contains a remote code execution vulnerability known as `Spring4Shell`. ## Impact A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run o...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-beans'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.20.RELEASE'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-beans'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22965'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf'}, {'type': 'WEB', 'url':...
{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-31T18:30:50Z', 'nvd_published_at': '2022-04-01T23:15:00Z'}
1.4.0
GHSA-jp6h-mxhx-pgqh
2022-03-24T00:22:07Z
2022-03-10T17:28:55Z
null
['CVE-2022-24745']
Shopware guest session is shared between customers
### Impact Guest sessions are shared between customers when HTTP cache is enabled. Setups with Varnish are not affected by this issue ## Patches We recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview. https://www.sh...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.8.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.8.1'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/storefront'}, 'ranges': [{'t...
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-jp6h-mxhx-pgqh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24745'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022?_ga=2.159980029.1931762803....
{'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T17:28:55Z', 'nvd_published_at': '2022-03-09T23:15:00Z'}
1.4.0
GHSA-h2v5-3hpc-85j5
2022-11-30T20:24:11Z
2022-03-16T00:00:44Z
null
['CVE-2022-27202']
Stored Cross-site Scripting vulnerability in Jenkins Extended Choice Parameter Plugin
Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not escape the value and description of extended choice parameters of radio buttons or check boxes type, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:extended-choice-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '346.vd87693c5a'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27202'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/extended-choice-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2232'}, {'type': 'WEB', 'url': 'http://www.openwall.com/list...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:24:11Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-3rj3-qp2j-4fj2
2022-12-15T18:25:01Z
2022-03-18T17:53:10Z
null
['CVE-2021-21655']
Cross-Site Request Forgery in Jenkins P4 Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins P4 Plugin 1.11.4 and earlier allows attackers to connect to an attacker-specified Perforce server using attacker-specified username and password. P4 Plugin 1.11.5 requires POST requests for the affected HTTP endpoints.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:p4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21655'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/p4-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2327'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:24:27Z', 'nvd_published_at': '2021-05-11T15:15:00Z'}
1.4.0
GHSA-v8mp-hhjq-h4cj
2022-03-29T17:36:00Z
2022-03-16T00:00:46Z
null
['CVE-2022-0965']
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.ofd` file upload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0965'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d66c88ce-63e2...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T17:36:00Z', 'nvd_published_at': '2022-03-15T16:15:00Z'}
1.4.0
GHSA-p2j7-6g9h-32xh
2022-04-07T22:06:36Z
2022-03-30T00:00:27Z
null
['CVE-2022-23059']
Cross site scripting in Shopizer
A Stored Cross Site Scripting (XSS) vulnerability exists in Shopizer versions v2.0.2 through v2.17.0 via the “Manage Images” tab, which allows an attacker to upload a SVG file containing malicious JavaScript code.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.shopizer:shopizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.2'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23059'}, {'type': 'WEB', 'url': 'https://github.com/shopizer-ecommerce/shopizer/commit/6b9f1ecd303b3b724d96bd08095c1a751dcc287e'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopizer-ecommerce/shopizer'}, {'type': 'WEB', 'url': 'https://www.whi...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T22:06:36Z', 'nvd_published_at': '2022-03-29T11:15:00Z'}
1.4.0
GHSA-p6j8-hgv5-m35g
2022-03-18T17:58:30Z
2022-03-18T17:58:30Z
null
['CVE-2020-35510']
Uncontrolled Resource Consumption in jboss-remoting
A flaw was found in jboss-remoting in versions before 5.0.20.SP1-redhat-00001. A malicious attacker could cause threads to hold up forever in the EJB server by writing a sequence of bytes corresponding to the expected messages of a successful EJB client request, but omitting the ACK messages, or just tamper with jboss-...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.remoting:jboss-remoting'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.20.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.19.Final'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35510'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1905796'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T20:38:29Z', 'nvd_published_at': '2021-06-02T14:15:00Z'}
1.4.0
GHSA-gcx2-gvj7-pxv3
2022-03-22T19:22:59Z
2022-03-22T19:22:59Z
null
['CVE-2022-24766']
Insufficient Protection against HTTP Request Smuggling in mitmproxy
### Impact In mitmproxy 7.0.4 and below, a malicious client or server is able to perform [HTTP request smuggling](https://en.wikipedia.org/wiki/HTTP_request_smuggling) attacks through mitmproxy. This means that a malicious client/server could smuggle a request/response through mitmproxy as part of another request/resp...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'mitmproxy'}, 'ecosystem_specific': {'affected_functions': ['mitmproxy.proxy.layers.http._http1.Http1Client.read_headers', 'mitmproxy.proxy.layers.http._http1.Http1Server.read_headers']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mitmproxy/mitmproxy/security/advisories/GHSA-gcx2-gvj7-pxv3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24766'}, {'type': 'WEB', 'url': 'https://github.com/mitmproxy/mitmproxy/commit/b06fb6d157087d526bd02e7aadbe37c56865c71b'}, {'type': 'PACKAGE',...
{'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-22T19:22:59Z', 'nvd_published_at': '2022-03-21T19:15:00Z'}
1.4.0
GHSA-3872-f48p-pxqj
2022-03-04T22:04:01Z
2022-03-04T21:15:31Z
null
['CVE-2022-23915']
Improper Neutralization of Special Elements used in a Command ('Command Injection') in Weblate
### Impact Weblate didn't correctly sanitize some arguments passed to Git and Mercurial, which allowed changing their behavior in an unintended way. ### Patches The issues were fixed in the 4.11.1 release. The following commits are addressing it: * 35d59f1f040541c358cece0a8d4a63183ca919b8 * d83672a3e7415da1490334e2c...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Weblate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/security/advisories/GHSA-3872-f48p-pxqj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23915'}, {'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/pull/7337'}, {'type': 'WEB', 'url': 'https://github.com/WeblateOrg/webla...
{'cwe_ids': ['CWE-77', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-04T21:15:31Z', 'nvd_published_at': '2022-03-04T20:15:00Z'}
1.4.0
GHSA-gff7-g5r8-mg8m
2022-03-29T13:08:19Z
2022-03-23T00:00:22Z
null
['CVE-2022-26260']
Prototype Pollution in simple-plist
simple-plist v1.3.0 was discovered to contain a prototype pollution vulnerability via .parse().
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'simple-plist'}, 'ecosystem_specific': {'affected_functions': ['simple-plist.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26260'}, {'type': 'WEB', 'url': 'https://github.com/wollardj/simple-plist/issues/60'}, {'type': 'WEB', 'url': 'https://github.com/wollardj/simple-plist/issues/60#issuecomment-1083991840'}, {'type': 'PACKAGE', 'url': 'https://github.com/wollardj/sim...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T13:08:19Z', 'nvd_published_at': '2022-03-22T19:15:00Z'}
1.4.0
GHSA-5fxv-xx5p-g2fv
2022-03-25T17:13:37Z
2022-03-16T00:00:46Z
null
['CVE-2022-0968']
Integer Overflow in microweber
Microweber is a new generation CMS with drag and drop. The microweber application allows large characters to insert in the input field "first & last name" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The first name & last name input should be limited to 50 characters or max 1...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0968'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/80e39084729a57dfe749626c3b9d35247a14c49e'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/9...
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:30:46Z', 'nvd_published_at': '2022-03-15T16:15:00Z'}
1.4.0
GHSA-82j4-vr25-x394
2022-03-23T15:41:25Z
2022-03-15T00:01:01Z
null
['CVE-2022-0940']
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting due to unrestricted file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0940'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/78522520892d4e29cc94148c6ec84a204a607b73'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/856bd2e2-db4f...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T14:04:45Z', 'nvd_published_at': '2022-03-14T11:15:00Z'}
1.4.0
GHSA-6xp6-fmc8-pmmr
2022-03-18T17:50:45Z
2022-03-18T17:50:45Z
null
['CVE-2021-20202']
Temporary Directory Hijacking Vulnerability in Keycloak
A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to data confidentiality...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.0.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-7gf3-89f6-823j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20202'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1922128'}, {'type': 'WEB', 'url': 'https://issues.redha...
{'cwe_ids': ['CWE-377'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:01:15Z', 'nvd_published_at': '2021-05-12T15:15:00Z'}
1.4.0
GHSA-75p7-527p-w8wp
2022-03-09T20:13:46Z
2022-03-09T15:17:31Z
null
['CVE-2022-24739']
Server-Side Request Forgery and Open Redirect in AllTube Download
### Impact On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured). The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'rudloff/alltube'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Rudloff/alltube/security/advisories/GHSA-75p7-527p-w8wp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24739'}, {'type': 'WEB', 'url': 'https://github.com/ytdl-org/youtube-dl/issues/30691'}, {'type': 'WEB', 'url': 'https://github.com/Rudloff/alltube...
{'cwe_ids': ['CWE-601', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-09T15:17:31Z', 'nvd_published_at': '2022-03-08T22:15:00Z'}
1.4.0
GHSA-mfjm-vh54-3f96
2022-03-01T22:13:28Z
2022-03-01T22:13:28Z
null
[]
Cookie-setting is not restricted based on the public suffix list
### Impact Responses from domain names whose public domain name suffix contains 1 or more periods (e.g. responses from `example.co.uk`, given its public domain name suffix is `co.uk`) are able to set cookies that are included in requests to any other domain sharing the same domain name suffix. ### Patches Upgrade to...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'scrapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'scrapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/security/advisories/GHSA-mfjm-vh54-3f96'}, {'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/commit/e865c4430e58a4faa0e0766b23830f8423d6167a'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:13:28Z', 'nvd_published_at': None}
1.4.0
GHSA-9cc3-5w85-pxvx
2022-03-14T23:03:31Z
2022-03-05T00:00:45Z
null
['CVE-2020-18326']
Cross Site Request Forgery in intelliants/subrion
Cross Site Request Forgery (CSRF) vulnerability exists in Intelliants Subrion CMS v4.2.1 via the Members administrator function, which could let a remote unauthenticated malicious user send an authorised request to victim and successfully create an arbitrary administrator user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-18326'}, {'type': 'WEB', 'url': 'https://github.com/hamm0nz/CVE-2020-18326'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}]
{'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:03:31Z', 'nvd_published_at': '2022-03-04T15:15:00Z'}
1.4.0
GHSA-x8wj-cqmp-3wmm
2022-03-28T22:21:45Z
2022-03-15T00:00:59Z
null
['CVE-2021-41952']
Cross-site Scripting in Zenario CMS
Zenario CMS 9.0.54156 is vulnerable to Cross Site Scripting (XSS) via upload file to *.SVG. An attacker can send malicious files to victims and steals victim's cookie leads to account takeover. The person viewing the image of a contact can be victim of XSS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.55143'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.54156'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41952'}, {'type': 'WEB', 'url': 'https://github.com/hieuminhnv/Zenario-CMS-9.0-last-version/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007'}, {'type': 'PACKAGE', 'url': '...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T22:21:45Z', 'nvd_published_at': '2022-03-14T15:15:00Z'}
1.4.0
GHSA-hf8c-xr89-vfm5
2022-03-28T18:26:27Z
2022-03-22T00:00:41Z
null
['CVE-2022-25766']
Command Injection in ungit
The package ungit before 1.5.20 are vulnerable to Remote Code Execution (RCE) via argument injection. The issue occurs when calling the /api/fetch endpoint. User controlled values (remote and ref) are passed to the git fetch command. By injecting some git options it was possible to get arbitrary command execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'ungit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.20'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25766'}, {'type': 'WEB', 'url': 'https://github.com/FredrikNoren/ungit/pull/1510'}, {'type': 'WEB', 'url': 'https://github.com/FredrikNoren/ungit/pull/1511'}, {'type': 'PACKAGE', 'url': 'https://github.com/FredrikNoren/ungit'}, {'type': 'WEB', 'url...
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T18:26:27Z', 'nvd_published_at': '2022-03-21T18:15:00Z'}
1.4.0
GHSA-4q96-9f63-p7jj
2022-03-30T19:53:50Z
2022-03-29T00:01:16Z
null
['CVE-2021-26601']
Path Traversal in ImpressCMS
ImpressCMS before 1.4.3 allows libraries/image-editor/image-edit.php image_temp Directory Traversal.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26601'}, {'type': 'WEB', 'url': 'https://github.com/ImpressCMS/impresscms/issues/914'}, {'type': 'WEB', 'url': 'https://github.com/ImpressCMS/impresscms/pull/915'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1081878'}, {'type': 'PACKAGE'...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T19:53:50Z', 'nvd_published_at': '2022-03-28T01:15:00Z'}
1.4.0
GHSA-c383-q5vf-hx55
2022-03-23T15:33:00Z
2022-03-12T00:00:36Z
null
['CVE-2022-0913']
Integer Overflow or Wraparound in Microweber
Microweber prior to 1.2.12 is vulnerable to Integer Overflow or Wraparound.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0913'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/7559e141d0707f8eeff2f9aeaa5a0ca2e3fe6583'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f...
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T15:33:00Z', 'nvd_published_at': '2022-03-11T10:15:00Z'}
1.4.0
GHSA-v222-6mr4-qj29
2023-05-16T15:46:19Z
2022-03-31T23:27:15Z
null
['CVE-2022-24803']
Command Injection vulnerability in asciidoctor-include-ext
### Impact Applications using [Asciidoctor (Ruby)](https://github.com/asciidoctor/asciidoctor) with [asciidoctor-include-ext](https://github.com/jirutka/asciidoctor-include-ext) (prior to version 0.4.0), which render user-supplied input in AsciiDoc markup, may allow an attacker to execute arbitrary system commands on ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'asciidoctor-include-ext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/jirutka/asciidoctor-include-ext/security/advisories/GHSA-v222-6mr4-qj29'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24803'}, {'type': 'WEB', 'url': 'https://github.com/jirutka/asciidoctor-include-ext/commit/c7ea001a597c7033575342c51483dab7b87ae15...
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-31T23:27:15Z', 'nvd_published_at': '2022-04-01T00:15:00Z'}
1.4.0
GHSA-cfhh-xgwq-5r67
2022-03-28T22:30:25Z
2022-03-14T22:15:19Z
null
['CVE-2022-24740']
Sudden swap of user auth tokens in Volto
### Impact Due to the usage of an outdated version of the react-cookie library, under the circumstances of given a server high load, it is possible that a user could get his/her auth cookie replaced with the auth cookie from another user, effectively giving him full access to the other users account and privileges. A p...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': '@plone/volto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0-alpha.6'}, {'fixed': '15.0.0-alpha.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 14.10.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/plone/volto/security/advisories/GHSA-cfhh-xgwq-5r67'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24740'}, {'type': 'WEB', 'url': 'https://github.com/plone/volto/pull/3051'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/volto'}]
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:15:19Z', 'nvd_published_at': '2022-03-14T23:15:00Z'}
1.4.0
GHSA-9m87-6fj3-c5xh
2022-03-30T21:04:52Z
2022-03-23T00:00:24Z
null
['CVE-2022-26183']
Untrusted Search Path in PNPM
PNPM prior to v6.15.1 was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute PNPM commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'pnpm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.15.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26183'}, {'type': 'WEB', 'url': 'https://github.com/pnpm/pnpm/commit/04b7f60861ddee8331e50d70e193d1e701abeefb'}, {'type': 'PACKAGE', 'url': 'https://github.com/pnpm/pnpm'}, {'type': 'WEB', 'url': 'https://github.com/pnpm/pnpm/releases/tag/v6.15.1'}...
{'cwe_ids': ['CWE-426'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T13:11:14Z', 'nvd_published_at': '2022-03-21T22:15:00Z'}
1.4.0
GHSA-9w4w-cpc8-h2fq
2022-03-29T22:16:56Z
2022-03-07T23:44:28Z
null
['CVE-2022-24737']
Exposure of Sensitive Information to an Unauthorized Actor in httpie
### Impact HTTPie have the practical concept of [sessions](https://httpie.io/docs/cli/sessions), which help users to persistently store some of the state that belongs to the outgoing requests and incoming responses on the disk for further usage. As an example, we can make an authenticated request and save it to a [name...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'httpie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/httpie/httpie/security/advisories/GHSA-9w4w-cpc8-h2fq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24737'}, {'type': 'WEB', 'url': 'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'}, {'type': 'PACKAGE', 'url': 'htt...
{'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T23:44:28Z', 'nvd_published_at': '2022-03-07T23:15:00Z'}
1.4.0
GHSA-xj7h-g7rh-gjcw
2022-03-15T00:23:04Z
2022-03-05T00:00:45Z
null
['CVE-2020-18324']
Cross-site Scripting in Subrion CMS
Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.1 via the `q` parameter in the Kickstart template.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-18324'}, {'type': 'WEB', 'url': 'https://github.com/hamm0nz/CVE-2020-18324'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-09T19:19:52Z', 'nvd_published_at': '2022-03-04T15:15:00Z'}
1.4.0
GHSA-r5qj-cvf9-p85h
2022-05-25T13:45:57Z
2022-03-06T00:00:16Z
null
['CVE-2022-0845']
Code Injection in PyTorch Lightning
PyTorch Lightning version 1.5.10 and prior is vulnerable to code injection. An attacker could execute commands on the target OS running the operating system by setting the `PL_TRAINER_GPUS` when using the `Trainer` module. A [patch](https://github.com/pytorchlightning/pytorch-lightning/commit/8b7a12c52e52a06408e9231647...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pytorch-lightning'}, 'ecosystem_specific': {'affected_functions': ['pytorch_lightning.utilities.argparse.parse_env_variables']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0845'}, {'type': 'WEB', 'url': 'https://github.com/PyTorchLightning/pytorch-lightning/pull/12212'}, {'type': 'WEB', 'url': 'https://github.com/pytorchlightning/pytorch-lightning/commit/8b7a12c52e52a06408e9231647839ddb4665e8ae'}, {'type': 'ADVISORY'...
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T19:58:34Z', 'nvd_published_at': '2022-03-05T22:15:00Z'}
1.4.0
GHSA-q347-cg56-pcq4
2022-03-14T22:57:00Z
2022-03-14T22:57:00Z
null
[]
SSRF in repository migration
### Impact The malicious user is able to discover services in the internal network through repository migration functionality. All installations accepting public traffic are affected. ### Patches Internal network CIDRs are prohibited to be used as repository migration targets. Users should upgrade to 0.12.5 or the l...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-q347-cg56-pcq4'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/327797d7-ae41-498f-9bff-cc0bf98cf531/'}]
{'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:57:00Z', 'nvd_published_at': None}
1.4.0
GHSA-mf3v-f2qq-pf9g
2022-03-15T21:48:34Z
2022-03-14T22:30:46Z
null
['CVE-2022-24743']
Insufficient Session Expiration in Sylius
### Impact The reset password token was not set to null after the password was changed. This is causing behaviour in which the same token can be used several times, so it can result in a leak of the existing token and an unauthorised password change. ### Patches The issue is fixed in versions: 1.10.11, 1.11.2 and abov...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.2'}]}]}...
[{'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/security/advisories/GHSA-mf3v-f2qq-pf9g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24743'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sylius/Sylius'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/releases/tag/v1.10...
{'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:30:46Z', 'nvd_published_at': '2022-03-14T21:15:00Z'}
1.4.0
GHSA-m3xv-x3ph-mq22
2022-03-24T13:44:50Z
2022-03-12T00:00:34Z
null
['CVE-2021-44618']
Server-side Template Injection in nystudio107/craft-seomatic
A Server-side Template Injection (SSTI) vulnerability exists in Nystudio107 Seomatic prior to 3.4.12 in src/helpers/UrlHelper.php via the host header.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'nystudio107/craft-seomatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44618'}, {'type': 'WEB', 'url': 'https://github.com/nystudio107/craft-seomatic/commit/0c5c0c0e0cb61000d12ec55ebf174745a5bf6469'}, {'type': 'PACKAGE', 'url': 'https://github.com/nystudio107/craft-seomatic'}, {'type': 'WEB', 'url': 'https://github.co...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:21:34Z', 'nvd_published_at': '2022-03-11T16:15:00Z'}
1.4.0
GHSA-w97x-j6rg-55v5
2022-11-29T22:57:53Z
2022-03-30T00:00:25Z
null
['CVE-2022-28141']
Password stored in plain text by Jenkins Proxmox Plugin
Jenkins Proxmox Plugin 0.5.0 and earlier stores the Proxmox Datacenter password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:proxmox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28141'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/proxmox-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2079'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202...
{'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T22:57:53Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-pm3h-mm62-pwm8
2022-03-28T15:56:34Z
2022-03-11T00:02:04Z
null
['CVE-2022-26662']
XML Entity Expansion in trytond and proteus
An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'trytond'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.46'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'trytond'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.16'}]}]}, {'package': {'ecosystem...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26662'}, {'type': 'WEB', 'url': 'https://bugs.tryton.org/issue11244'}, {'type': 'WEB', 'url': 'https://discuss.tryton.org/t/security-release-for-issue11219-and-issue11244/5059'}, {'type': 'PACKAGE', 'url': 'https://hg.tryton.org/trytond'}, {'type':...
{'cwe_ids': ['CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T15:54:14Z', 'nvd_published_at': '2022-03-10T17:47:00Z'}
1.4.0
GHSA-8c26-wmh5-6g9v
2023-08-30T13:52:18Z
2022-03-19T00:01:02Z
null
['CVE-2022-27191']
golang.org/x/crypto/ssh Denial of service via crafted Signer
The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/crypto'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20220314234659-1baeb1ce4c0b'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27191'}, {'type': 'PACKAGE', 'url': 'https://cs.opensource.google/go/x/crypto'}, {'type': 'WEB', 'url': 'https://go.dev/cl/392355'}, {'type': 'WEB', 'url': 'https://go.googlesource.com/crypto/+/1baeb1ce4c0b006eff0f294c47cb7617598dfb3d'}, {'type': '...
{'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T18:48:41Z', 'nvd_published_at': '2022-03-18T07:15:00Z'}
1.4.0
GHSA-q8hg-pf8v-cxrv
2023-09-21T20:05:33Z
2022-03-26T00:22:49Z
null
['CVE-2019-18887']
Symfony Http-Kernel has non-constant time comparison in UriSigner
When checking the signature of an URI (an ESI fragment URL for instance), the URISigner did not used a constant time string comparison function, resulting in a potential remote timing attack vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-kernel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.8.52'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-kernel'}, 'ecosystem_specific': {'affecte...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18887'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-kernel/CVE-2019-18887.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-...
{'cwe_ids': ['CWE-203'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:22:49Z', 'nvd_published_at': None}
1.4.0
GHSA-8hh2-rxm8-7fj8
2022-11-30T20:59:30Z
2022-03-30T00:00:23Z
null
['CVE-2022-28147']
Missing permission check in Jenkins Continuous Integration with Toad Edge Plugin
A missing permission check in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ci-with-toad-edge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28147'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/ci-with-toad-edge-plugin/commit/2b65d62ebb71ec727097aa409c623f9c7c3b2792'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ci-with-toad-edge-plugin'}, {'type': 'WEB', 'url': 'h...
{'cwe_ids': ['CWE-281', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:59:30Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-m8xh-cqc2-5q6f
2022-04-01T17:14:56Z
2022-03-29T00:01:16Z
null
['CVE-2021-26600']
Type Confusion in ImpressCMS
ImpressCMS before 1.4.3 has plugins/preloads/autologin.php type confusion with resultant Authentication Bypass (!= instead of !==).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26600'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1081986'}, {'type': 'PACKAGE', 'url': 'https://github.com/ImpressCMS/impresscms'}, {'type': 'WEB', 'url': 'https://github.com/ImpressCMS/impresscms/releases/tag/v1.4.3'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-843'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T17:14:56Z', 'nvd_published_at': '2022-03-28T01:15:00Z'}
1.4.0
GHSA-qgpv-86r3-87fh
2022-03-30T18:26:22Z
2022-03-30T18:26:22Z
null
['CVE-2018-1000162']
Cross-site Scripting in Parsedown
Parsedown version prior to 1.7.0 contains a Cross Site Scripting (XSS) vulnerability in `setMarkupEscaped` for escaping HTML that can result in JavaScript code execution. This attack appears to be exploitable via specially crafted markdown that allows it to side step HTML escaping by breaking AST boundaries. This vulne...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'erusev/parsedown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000162'}, {'type': 'WEB', 'url': 'https://github.com/Roave/SecurityAdvisories/issues/44#issuecomment-368594409'}, {'type': 'WEB', 'url': 'https://github.com/erusev/parsedown/pull/495'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/secur...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T18:26:22Z', 'nvd_published_at': None}
1.4.0
GHSA-mcgw-5fhw-3fq8
2023-06-30T20:15:16Z
2022-03-12T00:00:34Z
null
['CVE-2022-0932']
saleor Missing Authorization vulnerability
Missing Authorization in saleor prior to 3.1.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0932'}, {'type': 'WEB', 'url': 'https://github.com/saleor/saleor/commit/521dfd6394f3926a77c60d8633c058e16d0f916d'}, {'type': 'PACKAGE', 'url': 'https://github.com/saleor/saleor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/88ae4cbc-c697-401...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-25T19:23:00Z', 'nvd_published_at': '2022-03-11T15:15:00Z'}
1.4.0
GHSA-c3h9-896r-86jm
2022-03-28T20:28:00Z
2022-03-28T20:28:00Z
null
['CVE-2021-3121']
Improper Input Validation in GoGo Protobuf
An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the "skippy peanut butter" issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/gogo/protobuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3121'}, {'type': 'WEB', 'url': 'https://github.com/gogo/protobuf/commit/b03c65ea87cdc3521ede29f62fe3ce239267c1bc'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-23-consul-exposed-to-denial-of-service-in-gogo-protobuf-dependenc...
{'cwe_ids': ['CWE-129', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T20:28:00Z', 'nvd_published_at': '2021-01-11T06:15:00Z'}
1.4.0
GHSA-q448-6c3m-cxmj
2022-03-28T14:30:54Z
2022-03-11T00:01:59Z
null
['CVE-2021-44585']
Cross-site Scripting in jeecg-boot
jeecg-boot is a code generator. A Cross Site Scripting (XSS) vulnerabilitiy exists in jeecg-boot 3.0 in /jeecg-boot/jmreport/view with a mouseover event.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44585'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/3223'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/commit/dbba190980fe44ab5377703dc1a9487806ee2a91'}, {'type': 'PACKAGE', 'url': 'https://github.co...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T19:51:15Z', 'nvd_published_at': '2022-03-10T21:15:00Z'}
1.4.0
GHSA-pv4m-7c68-f4c5
2022-11-30T20:34:35Z
2022-03-16T00:00:44Z
null
['CVE-2022-27198']
CSRF vulnerability in Jenkins CloudBees AWS Credentials Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins CloudBees AWS Credentials Plugin 189.v3551d5642995 and earlier allows attackers with Overall/Read permission to connect to an AWS service using an attacker-specified token.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:aws-credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '189.v3551d5642995'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27198'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/aws-credentials-plugin/commit/cbf183ce58b955f17d93fdc1ac4d19a8ebe693db'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/aws-credentials-plugin'}, {'type': 'WEB', 'url': 'https...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:34:35Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-2f5v-8r3f-8pww
2022-03-24T00:18:54Z
2022-03-24T00:18:54Z
null
['CVE-2022-24768']
Improper access control allows admin privilege escalation in Argo CD
### Impact #### Impacts for versions starting with v1.0.0 All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level. To perform the following exploits, an authorized Argo CD user must have...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '2.1.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2...
[{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-2f5v-8r3f-8pww'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24768'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/af03b291d4b7e9d3ce9a6580ae9c8141af0e05cf'}, {'type': 'PACKAGE', 'url'...
{'cwe_ids': ['CWE-200', 'CWE-269', 'CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-24T00:18:54Z', 'nvd_published_at': '2022-03-23T22:15:00Z'}
1.4.0
GHSA-6vx5-cg2p-7g5v
2022-03-22T21:37:48Z
2022-03-12T00:00:35Z
null
['CVE-2022-0912']
Unrestricted Upload of File with Dangerous Type in microweber
Unrestricted Upload of File with Dangerous Type in GitHub repository microweber/microweber prior to 1.2.12.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0912'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/24245297231f5dc88bb3a2b20d0e4e25b0ebc789'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a...
{'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:18:58Z', 'nvd_published_at': '2022-03-11T10:15:00Z'}
1.4.0
GHSA-mv2w-4jqc-6fg4
2022-03-15T17:05:10Z
2022-03-15T00:00:53Z
null
['CVE-2022-21187']
Command injection in libvcs and vcspull
The package libvcs before 0.11.1 are vulnerable to Command Injection via argument injection. When calling the update_repo function (when using hg), the url parameter is passed to the hg clone command. By injecting some hg options it was possible to get arbitrary command execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'libvcs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'vcspull'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21187'}, {'type': 'WEB', 'url': 'https://github.com/vcs-python/libvcs/pull/306'}, {'type': 'WEB', 'url': 'https://github.com/vcs-python/vcspull/commit/e1b77128a1fa0754625b5f43d8bc47956f21f33e'}, {'type': 'WEB', 'url': 'https://github.com/vcs-python...
{'cwe_ids': ['CWE-74', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-15T17:05:10Z', 'nvd_published_at': '2022-03-14T18:15:00Z'}
1.4.0
GHSA-jx8f-cpx7-fv47
2022-03-18T23:18:43Z
2022-03-18T23:18:43Z
null
['CVE-2022-21822']
Allocation of Resources Without Limits or Throttling in nvflare
### Impact NVIDIA FLARE contains a vulnerability in Admin Interface, where an un-authorized attacker can cause Allocation of Resources Without Limits or Throttling, which may lead to cause system unavailable All versions before 2.0.16 are affected. ### Patches The patch will be included in nvflare==2.0.16. ### Worka...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'nvflare'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.16'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/NVIDIA/NVFlare/security/advisories/GHSA-jx8f-cpx7-fv47'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21822'}, {'type': 'PACKAGE', 'url': 'https://github.com/NVIDIA/NVFlare'}]
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:18:43Z', 'nvd_published_at': '2022-03-17T21:15:00Z'}
1.4.0
GHSA-jr2m-29wj-w9qc
2022-03-29T19:04:40Z
2022-03-12T00:00:37Z
null
['CVE-2022-25506']
SQL Injection in FreeTAKServer-UI
FreeTAKServer-UI v1.9.8 was discovered to contain a SQL injection vulnerability via the API endpoint /AuthenticateUser.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'FreeTAKServer-UI'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25506'}, {'type': 'WEB', 'url': 'https://github.com/FreeTAKTeam/UI/issues/27'}, {'type': 'PACKAGE', 'url': 'https://github.com/FreeTAKTeam/UI'}]
{'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T19:04:40Z', 'nvd_published_at': '2022-03-11T00:15:00Z'}
1.4.0
GHSA-8gr3-2gjw-jj7g
2022-03-16T23:54:33Z
2022-03-16T23:54:33Z
null
[]
Hidden functionality in node-ipc
The package node-ipc version 9.2.2 is vulnerable to hidden functionality that was introduced by the maintainer. The package uses a dependency that writes a file to disk that does not pertain to the functionality of the package and is not included in versions < 9.2.2.
[]
[{'package': {'ecosystem': 'npm', 'name': 'node-ipc'}, 'versions': ['9.2.2']}]
[{'type': 'PACKAGE', 'url': 'https://github.com/RIAEvangelist/node-ipc'}, {'type': 'WEB', 'url': 'https://github.com/RIAEvangelist/node-ipc/releases/tag/9.2.2'}]
{'cwe_ids': ['CWE-912'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-16T23:54:33Z', 'nvd_published_at': None}
1.4.0
GHSA-7mv4-4xpg-xq44
2022-03-26T00:14:34Z
2022-03-26T00:14:34Z
null
['CVE-2020-26138']
FormField with square brackets in field name skips validation
FileField with array notation skips validation The FileField class is commonly used for file upload in custom code on a Silverstripe website. This field is designed to be used with a single file upload. PHP allows for submitting multiple values by adding square brackets to the field name. When this is done to a FileF...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '4.7.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26138'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2020-26138/'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:14:34Z', 'nvd_published_at': None}
1.4.0
GHSA-47wv-vhj2-g66m
2022-03-29T19:18:32Z
2022-03-29T19:18:32Z
null
['CVE-2022-0315']
Use of insecure temporary file in Horovod
### Impact The insecure `tempfile.mktemp()` is used when Horovod is run in an LSF job with `jsrun`. In that situation, a jsrun rank file is created with `mktemp`, which could be hijacked by another process to read or manipulate the content. This issue does not impact the use of MPI, Gloo, Spark or Ray. ### Patches Th...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'horovod'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.24.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/horovod/horovod/security/advisories/GHSA-47wv-vhj2-g66m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0315'}, {'type': 'WEB', 'url': 'https://github.com/horovod/horovod/pull/3358'}, {'type': 'WEB', 'url': 'https://github.com/horovod/horovod/commit/...
{'cwe_ids': ['CWE-377', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T19:18:32Z', 'nvd_published_at': '2022-03-24T09:15:00Z'}
1.4.0
GHSA-jjp3-m93h-5jm4
2022-03-24T23:19:35Z
2022-03-12T00:00:34Z
null
['CVE-2022-0928']
Cross-site Scripting in microweber
Microweber drag and drop website builder and CMS with e-commerce. Cross-site Scripting (XSS) discovered in microweber prior to 1.2.12. There is currently no known workaround, users are recommended to update to version 1.2.12.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0928'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/fc9137c031f7edec5f50d73b300919fb519c924a'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:19:51Z', 'nvd_published_at': '2022-03-11T11:15:00Z'}
1.4.0
GHSA-29vr-79w7-p649
2023-07-31T20:36:31Z
2022-03-11T00:02:00Z
2023-07-31T20:36:31Z
['CVE-2021-44597']
Duplicate Advisory: Incorrect Authorization in Gerapy
## Duplicate Advisory This advisory has been withdrawn because it is a duplicate of GHSA-9w7f-m4j4-j3xw. This link is maintained to preserve external references. ## Original Description An Access Control vunerabiity exists in Gerapy v 0.9.7 via the spider parameter in project_configure function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'gerapy'}, 'ecosystem_specific': {'affected_functions': ['gerapy.server.core.views.project_clone', 'gerapy.server.core.views.project_configure']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44597'}, {'type': 'WEB', 'url': 'https://github.com/Gerapy/Gerapy/issues/219'}, {'type': 'WEB', 'url': 'https://github.com/Gerapy/Gerapy/commit/49bcb19be5e0320e7e1535f34fe00f16a3cf3b28'}, {'type': 'PACKAGE', 'url': 'https://github.com/Gerapy/Gerapy...
{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T14:23:45Z', 'nvd_published_at': '2022-03-10T21:15:00Z'}
1.4.0
GHSA-jh63-28gx-7p26
2022-03-15T19:43:28Z
2022-03-11T00:02:17Z
null
['CVE-2022-24193']
Command Injection in CasaOS
CasaOS before v0.2.7 was discovered to contain a command injection vulnerability via the component leave or join zerotier api.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/IceWhaleTech/CasaOS'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.8'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.2.7'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24193'}, {'type': 'WEB', 'url': 'https://github.com/IceWhaleTech/CasaOS/issues/84'}, {'type': 'WEB', 'url': 'https://github.com/IceWhaleTech/CasaOS/commit/d060968b7ab08e7f8cbfe7ca9ccdfa47afe9bb06'}, {'type': 'PACKAGE', 'url': 'https://github.com/Ic...
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-15T19:43:28Z', 'nvd_published_at': '2022-03-10T17:45:00Z'}
1.4.0
GHSA-m9cj-v55f-8x26
2022-03-18T17:55:26Z
2022-03-18T17:55:26Z
null
['CVE-2020-27826']
Authentication Bypass in keycloak
A flaw was found in Keycloak before version 12.0.0 where it is possible to update the user's metadata attributes using Account REST API. This flaw allows an attacker to change its own NameID attribute to impersonate the admin user for any particular application.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27826'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/dae4a3eaf26590b8d441b8e4bec3b700ee303b72'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2020-27826'}, {'type': 'WEB', 'url': 'https://bugzilla.redha...
{'cwe_ids': ['CWE-250'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T18:10:09Z', 'nvd_published_at': '2021-05-28T11:15:00Z'}
1.4.0
GHSA-7j52-6fjp-58gr
2022-03-14T23:22:27Z
2022-03-14T23:22:27Z
null
[]
Inconsistent storage layout for ERC2771ContextUpgradeable
### Impact The storage layout of the ERC2771ContextUpgradeable is not constant between versions. - versions `4.0.0`, `4.1.0` and `4.2.0`, the contract has a length of 51 slots. - since `4.3.0`, the contract has a length of 50 slots - future versions will continue using 50 slots. This difference in layout could res...
[]
[{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/security/advisories/GHSA-7j52-6fjp-58gr'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-transpiler/pull/86'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable...
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:22:27Z', 'nvd_published_at': None}
1.4.0
GHSA-3pg8-c473-w6rr
2022-03-25T00:07:36Z
2022-03-16T00:00:46Z
null
['CVE-2022-0967']
Stored Cross-site Scripting in showdoc
ShowDoc is a tool for an IT team to share documents online. showdoc contains a stored cross-site scripting vulnerability in the File Library page when uploading a file in .ofd format in versions prior to 2.10.4. At this time, there is no known workaround. Users should update to version 2.10.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0967'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/9dea3c98-7609...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:35:38Z', 'nvd_published_at': '2022-03-15T16:15:00Z'}
1.4.0
GHSA-54fx-gm74-q676
2022-03-18T17:55:47Z
2022-03-18T17:55:47Z
null
['CVE-2020-1729']
Permissions bypass in SmallRye
A flaw was found in SmallRye's API through version 1.6.1. The API can allow other code running within the application server to potentially obtain the ClassLoader, bypassing any permissions checks that should have been applied. The largest threat from this vulnerability is a threat to data confidentiality. This is fixe...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.smallrye.config:smallrye-config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1729'}, {'type': 'WEB', 'url': 'https://github.com/smallrye/smallrye-config/commit/fb0def6f61c09a2a80c9145e4ec6521225cd0b99'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1802444'}]
{'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T18:38:31Z', 'nvd_published_at': '2021-05-28T14:15:00Z'}
1.4.0
GHSA-gmv4-r438-p67f
2022-03-11T20:04:26Z
2022-03-03T19:23:36Z
null
['CVE-2022-24723']
Leading white space bypasses protocol validation
### Impact Whitespace characters are not removed from the beginning of the protocol, so URLs are not parsed properly and protocol validation mechanisms may fail. ### Patches Patched in 1.19.9 ### Workarounds Remove leading whitespace from values before passing them to URI.parse (e.g. via `.href(value)` or `new URI(va...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'urijs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/security/advisories/GHSA-gmv4-r438-p67f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24723'}, {'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316'}, {'type': 'PACKAGE', 'url'...
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T19:23:36Z', 'nvd_published_at': '2022-03-03T21:15:00Z'}
1.4.0
GHSA-3fvf-2gp4-89wq
2022-03-18T23:17:15Z
2022-03-18T23:17:15Z
null
[]
Possibility for Denial of Service by overwriting PHP files with language exports
### Impact Laravel Translation Manager didn't check the locale name, which allowed directory traversal when exporting files. The content would be a PHP file returning an array of translations, but this could lead to unexpected results, like denial of service. Access to the Laravel Translation Manager is required, becau...
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'barryvdh/laravel-translation-manager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/barryvdh/laravel-translation-manager/security/advisories/GHSA-3fvf-2gp4-89wq'}, {'type': 'PACKAGE', 'url': 'https://github.com/barryvdh/laravel-translation-manager'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:17:15Z', 'nvd_published_at': None}
1.4.0
GHSA-f8q4-jwww-x3wv
2022-03-29T21:33:25Z
2022-03-19T00:01:03Z
null
['CVE-2022-24302']
Race Condition in Paramiko
In Paramiko before 2.10.1, a race condition (between creation and chmod) in the write_private_key_file function could allow unauthorized information disclosure.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ecosystem_specific': {'affected_functions': ['paramiko.pkey.PKey._write_private_key_file']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ecosystem_specific'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24302'}, {'type': 'WEB', 'url': 'https://github.com/paramiko/paramiko/commit/4c491e299c9b800358b16fa4886d8d94f45abe2e'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f8q4-jwww-x3wv'}, {'type': 'PACKAGE', 'url': 'https://github.co...
{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T20:52:09Z', 'nvd_published_at': '2022-03-17T22:15:00Z'}
1.4.0
GHSA-gv26-jpj9-c8gq
2022-03-18T17:52:25Z
2022-03-18T17:52:25Z
null
['CVE-2021-29607']
Incomplete validation in `SparseSparseMinimum`
### Impact Incomplete validation in `SparseAdd` results in allowing attackers to exploit undefined behavior (dereferencing null pointers) as well as write outside of bounds of heap allocated data: ```python import tensorflow as tf a_indices = tf.ones([45, 92], dtype=tf.int64) a_values = tf.ones([45], dtype=tf.int64)...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gv26-jpj9-c8gq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29607'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2'}, {'type': 'WEB',...
{'cwe_ids': ['CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T22:18:43Z', 'nvd_published_at': '2021-05-14T20:15:00Z'}
1.4.0
GHSA-46c5-pfj8-fv65
2022-03-18T22:36:03Z
2022-03-18T22:36:03Z
null
[]
Improperly checked metadata on tools/armour itemstacks received from the client
### Impact Due to a workaround applied in 1.13, an attacker may send a negative damage/meta value in a tool or armour item's NBT, which `TypeConverter` then blindly uses as if it was valid without being checked. When this invalid metadata value reaches `Durable->setDamage()`, an exception is thrown because the metadat...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-46c5-pfj8-fv65'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/c8e1cfcbee4945fd4b63d2a7e96025c59744d4f1'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}]
{'cwe_ids': ['CWE-704'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:36:03Z', 'nvd_published_at': None}
1.4.0
GHSA-5fxf-x22x-5q38
2022-03-22T20:02:30Z
2022-03-13T00:00:54Z
null
['CVE-2022-0929']
Cross-site Scripting in microweber
XSS on dynamic_text module in GitHub repository microweber/microweber prior to 1.2.12.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0929'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/de6d17b52d261902653fbdd2ecefcaac82e54256'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:54:55Z', 'nvd_published_at': '2022-03-12T11:15:00Z'}
1.4.0
GHSA-5jgq-x857-p8xw
2022-03-18T20:07:34Z
2022-03-07T21:45:59Z
null
['CVE-2022-24738']
Account compromise in Evmos
## Impact _What kind of vulnerability is it? Who is impacted?_ ### Classification The vulnerability has been classified as `critical` with a score of `9.0` (highest). It has the potential to affect and drain unclaimed airdrop funds from Cosmos and Osmosis eligible user addresses. ### Disclosure The attack requires ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/tharsis/evmos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tharsis/evmos/security/advisories/GHSA-5jgq-x857-p8xw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24738'}, {'type': 'WEB', 'url': 'https://github.com/tharsis/evmos/commit/28870258d4ee9f1b8aeef5eba891681f89348f71'}, {'type': 'PACKAGE', 'url': 'htt...
{'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T21:45:59Z', 'nvd_published_at': '2022-03-07T22:15:00Z'}
1.4.0
GHSA-x3mh-jvjw-3xwx
2022-08-11T21:38:00Z
2022-03-16T00:00:45Z
null
['CVE-2022-0778']
openssl-src's infinite loop in `BN_mod_sqrt()` reachable when parsing certificates
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded i...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.5'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '111.18.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0778'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T20:40:34Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-xr2c-5w89-63pv
2022-09-19T20:18:27Z
2022-03-23T00:00:24Z
null
['CVE-2022-26184']
Poetry before v1.1.9 contains Untrusted Search Path
Poetry prior to v1.1.9 was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute Poetry commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'poetry'}, 'ecosystem_specific': {'affected_functions': ['poetry.core.vcs.git.GitConfig.__init__']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26184'}, {'type': 'WEB', 'url': 'https://github.com/python-poetry/poetry-core/pull/205/commits/fa9cb6f358ae840885c700f954317f34838caba7'}, {'type': 'WEB', 'url': 'https://github.com/python-poetry/poetry-core/commit/1e1a109a1009daaab2367ce90c997f0cb...
{'cwe_ids': ['CWE-426'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T13:13:52Z', 'nvd_published_at': '2022-03-21T22:15:00Z'}