schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-6h2c-g688-q9qr | 2022-04-07T21:54:34Z | 2022-03-30T00:00:24Z | null | ['CVE-2022-28156'] | Path traversal in Jenkins Phoenix AutoTest Plugin | Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Item/Configure permission to copy arbitrary files and directories from the Jenkins controller to the agent workspace. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.surenpi.jenkins:phoenix-autotest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28156'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2683'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2022/03/29/1'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T21:54:34Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-7563-75j9-6h5p | 2022-03-15T21:47:08Z | 2022-03-14T22:26:58Z | null | ['CVE-2022-24742'] | Sensitive Information Exposure in Sylius | ### Impact
Any other user can view the data if the browser tab remains open after logging out. Once someone logs out and leaves the browser open, the potential attacker may use the back button to see the content exposed on given screens. No action may be performed though, and any website refresh will block further read... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10'}, {'fixed': '1.10.11'}]}]}, {'pac... | [{'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/security/advisories/GHSA-7563-75j9-6h5p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24742'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sylius/Sylius'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/releases/tag/v1.10... | {'cwe_ids': ['CWE-200', 'CWE-213', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:26:58Z', 'nvd_published_at': '2022-03-14T20:15:00Z'} |
1.4.0 | GHSA-rjmq-6v55-4rjv | 2022-03-15T19:02:36Z | 2022-03-15T19:02:36Z | null | ['CVE-2022-24721'] | Improper Authorization in org.cometd.oort | ### Impact
Internal usage of Oort and Seti channels is improperly authorized, so any remote user could subscribe and publish to those channels.
By subscribing to those channels, a remote user may be able to watch cluster-internal traffic that contains other user's (possibly sensitive) data.
By publishing to those chann... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.cometd.java:cometd-java-oort'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.11'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.cometd.java:cometd-java-oort'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, ... | [{'type': 'WEB', 'url': 'https://github.com/cometd/cometd/security/advisories/GHSA-rjmq-6v55-4rjv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24721'}, {'type': 'WEB', 'url': 'https://github.com/cometd/cometd/issues/1146'}, {'type': 'WEB', 'url': 'https://github.com/cometd/cometd/commit/bb4... | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-15T19:02:36Z', 'nvd_published_at': '2022-03-15T14:15:00Z'} |
1.4.0 | GHSA-w267-m9c4-8555 | 2022-03-18T20:12:59Z | 2022-03-10T17:37:43Z | null | ['CVE-2022-24744'] | Shopware user session is not logged out if the password is reset via password recovery | ### Impact
User session is not logged out if the password is reset via password recovery
## Patches
Fixed in 6.4.8.1, maintainers recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/downl... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.8.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.8.0'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': ... | [{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-w267-m9c4-8555'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24744'}, {'type': 'WEB', 'url': 'https://github.com/shopware/core/commit/324cd1b57db58481df1b1d0030ffc307e2d9fe64'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-613'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T17:37:43Z', 'nvd_published_at': '2022-03-09T23:15:00Z'} |
1.4.0 | GHSA-hpm9-fx8v-w45v | 2022-11-29T21:57:05Z | 2022-03-30T00:00:25Z | null | ['CVE-2022-28135'] | Plaintext storage in Jenkins instant-messaging Plugin | Jenkins instant-messaging Plugin 1.41 and earlier stores passwords for group chats unencrypted in the global configuration file of plugins based on Jenkins instant-messaging Plugin on the Jenkins controller where they can be viewed by users with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:instant-messaging'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.42'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28135'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/instant-messaging-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2161'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-se... | {'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T22:02:17Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-x28w-hvwc-mp75 | 2022-03-25T17:18:05Z | 2022-03-11T00:02:35Z | null | ['CVE-2022-0895'] | Static Code Injection in Microweber | Microweber is a new generation CMS with drag and drop. Prior to version 1.3, Microweber is vulnerable to static code injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0895'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/b2baab6e582b2efe63788d367a2bb61a2fa26470'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3... | {'cwe_ids': ['CWE-94', 'CWE-96'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T20:28:04Z', 'nvd_published_at': '2022-03-10T11:15:00Z'} |
1.4.0 | GHSA-chxf-fjcf-7fwp | 2022-03-01T21:04:07Z | 2022-03-01T21:04:07Z | null | [] | Possible filesystem space exhaustion by local users | `fscrypt` through v0.3.2 creates a world-writable directory by default when setting up a filesystem, allowing unprivileged users to exhaust filesystem space. We recommend upgrading to `fscrypt` v0.3.3 or above and adjusting the permissions on existing `fscrypt` metadata directories where applicable.
For more details, ... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/google/fscrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/google/fscrypt/security/advisories/GHSA-chxf-fjcf-7fwp'}, {'type': 'PACKAGE', 'url': 'https://github.com/google/fscrypt'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:04:07Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8v99-48m9-c8pm | 2022-04-13T03:57:32Z | 2022-03-28T19:33:44Z | null | ['CVE-2022-24778'] | Incorrect Authorization in imgcrypt | Imgcrypt implements a function `CheckAuthorization()` that is supposed to check whether a user is authorized to access an encrypted image given the keys that the user has provided on the command line that would enable decryption of the image. The check is to prevent that a user can start a container from an image that ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/containerd/imgcrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/containerd/imgcrypt/security/advisories/GHSA-8v99-48m9-c8pm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24778'}, {'type': 'WEB', 'url': 'https://github.com/containerd/imgcrypt/issues/69'}, {'type': 'WEB', 'url': 'https://github.com/containerd/img... | {'cwe_ids': ['CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T19:33:44Z', 'nvd_published_at': '2022-03-25T18:15:00Z'} |
1.4.0 | GHSA-5gjh-5j4f-cpwv | 2022-03-28T16:46:41Z | 2022-03-28T16:46:41Z | null | ['CVE-2022-0415'] | Unrestricted Upload of File with Dangerous Type in Gogs | ### Impact
The malicious user is able to upload a crafted `config` file into repository's `.git` directory with to gain SSH access to the server. All installations with [repository upload enabled (default)](https://github.com/gogs/gogs/blob/f36eeedbf89328ee70cc3a2e239f6314f9021f58/conf/app.ini#L127-L129) are affected.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-5gjh-5j4f-cpwv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0415'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/6833'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/pull/6838'}, {'type': '... | {'cwe_ids': ['CWE-20', 'CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T16:46:41Z', 'nvd_published_at': '2022-03-21T11:15:00Z'} |
1.4.0 | GHSA-3q55-66g3-p8xq | 2022-03-22T19:36:42Z | 2022-03-13T00:00:54Z | null | ['CVE-2022-0926'] | Cross-site Scripting in microweber | File upload filter bypass leading to stored XSS in GitHub repository microweber/microweber prior to 1.2.12. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0926'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/89200cfcc2cfefe5554721e7fa3cf52f6a2a9120'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:53:26Z', 'nvd_published_at': '2022-03-12T10:15:00Z'} |
1.4.0 | GHSA-hggv-mcp4-vxc5 | 2022-03-24T23:45:34Z | 2022-03-12T00:00:37Z | null | ['CVE-2022-25508'] | Improper Authentication in FreeTAKServer | FreeTAKServer is an open source, lightweight Server for connect TAK clients. An access control issue in the component /ManageRoute/postRoute of FreeTAKServer version 1.9.8 allows unauthenticated attackers to cause a Denial of Service (DoS) via an unusually large amount of created routes, or create unsafe or false route... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'FreeTAKServer'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.8.5'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.9.8'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25508'}, {'type': 'WEB', 'url': 'https://github.com/FreeTAKTeam/FreeTakServer/issues/291'}, {'type': 'PACKAGE', 'url': 'https://github.com/FreeTAKTeam/FreeTakServer'}, {'type': 'WEB', 'url': 'https://github.com/pypa/advisory-database/tree/main/vuln... | {'cwe_ids': ['CWE-287', 'CWE-306'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:17:58Z', 'nvd_published_at': '2022-03-11T00:15:00Z'} |
1.4.0 | GHSA-rgg3-3wh7-w935 | 2022-03-28T22:21:50Z | 2022-03-15T00:00:58Z | null | ['CVE-2021-42171'] | Unrestricted Upload of File with Dangerous Type in Zenario CMS | Zenario CMS 9.0.54156 is vulnerable to File Upload. The web server can be compromised by uploading and executing a web-shell which can run commands, browse system files, browse local resources, attack other servers, and exploit the local vulnerabilities, and so forth. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.55143'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.54156'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42171'}, {'type': 'WEB', 'url': 'https://github.com/hieuminhnv/Zenario-CMS-9.0-last-version/issues/2'}, {'type': 'WEB', 'url': 'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007'}, {'type': 'PACKAGE', 'url': '... | {'cwe_ids': ['CWE-434'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T22:21:50Z', 'nvd_published_at': '2022-03-14T15:15:00Z'} |
1.4.0 | GHSA-gw5h-h6hj-f56g | 2023-06-30T22:11:07Z | 2022-03-14T22:58:37Z | null | ['CVE-2022-0871'] | Gogs vulnerable to improper PAM authorization handling | ### Impact
Expired PAM accounts and accounts with expired passwords are continued to be seen as valid. Installations use PAM as authentication sources are affected.
### Patches
Expired PAM accounts and accounts with expired passwords are no longer being seen as valid. Users should upgrade to 0.12.5 or the latest 0.1... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-gw5h-h6hj-f56g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0871'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/issues/6810'}, {'type': 'WEB', 'url': 'https://github.com/gogs/gogs/commit/64102be2c90e1b47... | {'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:58:37Z', 'nvd_published_at': None} |
1.4.0 | GHSA-h2rj-8wgg-mm43 | 2023-09-21T19:54:28Z | 2022-03-18T17:53:37Z | null | ['CVE-2021-32470'] | Craft CMS Cross-site Scripting Vulnerability | Craft CMS before 3.6.13 has an XSS vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.6.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32470'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/commit/f9378aa154b5f9b64bed3d59cce0c4a8184bf5e6'}, {'type': 'WEB', 'url': 'https://github.com/craftcms/cms/blob/3.6.13/CHANGELOG.md#security'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T20:57:59Z', 'nvd_published_at': '2021-05-07T19:31:00Z'} |
1.4.0 | GHSA-m4x7-44c8-jg2x | 2022-11-30T19:31:12Z | 2022-03-16T00:00:43Z | null | ['CVE-2022-27214'] | CSRF vulnerability in Jenkins Release Helper Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Release Helper Plugin 1.3.3 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:release-helper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27214'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/release-helper-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2274'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T19:31:12Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-vw83-h3mq-3qwj | 2022-03-18T17:40:44Z | 2022-03-18T17:40:44Z | null | ['CVE-2021-22114'] | Path Traversal in Spring-integration-zip | Addresses partial fix in CVE-2018-1263. Spring-integration-zip, versions prior to 1.0.4, exposes an arbitrary file write vulnerability, that can be achieved using a specially crafted zip archive (affects other archives as well, bzip2, tar, xz, war, cpio, 7z), that holds path traversal filenames. So when the filename ge... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework.integration:spring-integration-zip'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-22114'}, {'type': 'WEB', 'url': 'https://tanzu.vmware.com/security/cve-2021-22114'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-03-22T20:54:58Z', 'nvd_published_at': '2021-03-01T18:15:00Z'} |
1.4.0 | GHSA-mcg6-h362-cmq5 | 2022-03-11T20:52:04Z | 2022-03-11T20:52:04Z | null | ['CVE-2022-0860'] | Improper Authorization in cobbler | ### Impact
If PAM is correctly configured and a user account is set to expired, the expired user-account is still able to successfully log into Cobbler in all places (Web UI, CLI & XMLRPC-API).
The same applies to user accounts with passwords set to be expired.
### Patches
There is a patch for the latest Cobbler `3... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'cobbler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/security/advisories/GHSA-mcg6-h362-cmq5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0860'}, {'type': 'WEB', 'url': 'https://github.com/cobbler/cobbler/commit/9044aa990a94752fa5bd5a24051adde099280bfa'}, {'type': 'ADVISORY', 'url': ... | {'cwe_ids': ['CWE-285', 'CWE-863'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T20:52:04Z', 'nvd_published_at': '2022-03-11T13:15:00Z'} |
1.4.0 | GHSA-gcx5-3p5f-f8vp | 2022-03-10T15:53:25Z | 2022-03-03T00:00:51Z | null | ['CVE-2022-23395'] | Prototype Pollution in jquery.cookie | jQuery Cookie 1.4.1 is affected by prototype pollution, which can lead to DOM cross-site scripting (XSS). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'jquery.cookie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23395'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220325-0008/'}, {'type': 'WEB', 'url': 'https://snyk.io/test/npm/jquery.cookie/1.4.1?tab=issues'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T19:16:20Z', 'nvd_published_at': '2022-03-02T12:15:00Z'} |
1.4.0 | GHSA-37g7-8vjj-pjpj | 2022-07-19T18:54:16Z | 2022-03-18T17:58:59Z | null | ['CVE-2020-14326'] | RESTEasy 4.5.5.Final in hash flooding | A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes. This issue results in hash flooding, leading to slower requests with higher CPU time spent searching and adding the entry. This flaw allows an attacker to cause a denial of service. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.resteasy:resteasy-bom'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.5.6.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 4.5.5.Final'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-14326'}, {'type': 'WEB', 'url': 'https://github.com/resteasy/Resteasy/pull/2471'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1855826'}, {'type': 'PACKAGE', 'url': 'https://github.com/resteasy/Resteasy'}, {'type': 'WEB', 'u... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T21:18:23Z', 'nvd_published_at': '2021-06-02T12:15:00Z'} |
1.4.0 | GHSA-xvm2-9xvc-hx7f | 2022-03-10T15:48:44Z | 2022-03-02T21:30:54Z | null | ['CVE-2022-23640'] | Improper Restriction of XML External Entity Reference in com.monitorjbl:xlsx-streamer | ### Impact
Prior to xlsx-streamer 2.1.0, the XML parser that was used did not apply all the necessary settings to prevent XML Entity Expansion issues.
### Patches
Upgrade to version 2.1.0.
### Workarounds
No known workaround.
### References
https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.monitorjbl:xlsx-streamer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/monitorjbl/excel-streaming-reader/security/advisories/GHSA-xvm2-9xvc-hx7f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23640'}, {'type': 'WEB', 'url': 'https://github.com/monitorjbl/excel-streaming-reader/commit/0749c7b9709db078ccdeada16d46a34bc29... | {'cwe_ids': ['CWE-611', 'CWE-776'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-02T21:30:54Z', 'nvd_published_at': '2022-03-02T20:15:00Z'} |
1.4.0 | GHSA-vq6c-fvxw-p45v | 2022-11-30T20:06:48Z | 2022-03-16T00:00:43Z | null | ['CVE-2022-27210'] | CSRF vulnerability in Jenkins kubernetes-cd Plugin allow capturing credentials | A cross-site request forgery (CSRF) vulnerability in Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows attackers to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:kubernetes-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27210'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kubernetes-cd-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2681'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi... | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:06:48Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-6cp7-g972-w9m9 | 2022-03-18T20:12:30Z | 2022-03-07T16:59:31Z | null | ['CVE-2022-24732'] | Use of a Key Past its Expiration Date and Insufficient Session Expiration in Maddy Mail Server | ### Impact
Any configuration on any maddy version <0.5.4 using auth.pam is affected.
No password expiry or account expiry checking is done when authenticating using PAM.
### Patches
Patch is available as part of the 0.5.4 release.
### Workarounds
If /etc/shadow authentication is used, it is possible to replace au... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/foxcpp/maddy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.5.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/foxcpp/maddy/security/advisories/GHSA-6cp7-g972-w9m9'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24732'}, {'type': 'WEB', 'url': 'https://github.com/foxcpp/maddy/commit/7ee6a39c6a1939b376545f030a5efd6f90913583'}, {'type': 'PACKAGE', 'url': 'https... | {'cwe_ids': ['CWE-324', 'CWE-613'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T16:59:31Z', 'nvd_published_at': '2022-03-09T20:15:00Z'} |
1.4.0 | GHSA-vqcx-jw4r-6fp3 | 2022-11-29T21:54:48Z | 2022-03-30T00:00:25Z | null | ['CVE-2022-28136'] | CSRF vulnerability and missing permission check in Jenkins JiraTestResultReporter Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins JiraTestResultReporter Plugin 165.v817928553942 and earlier allows attackers to connect to an attacker-specified URL using attacker-specified credentials. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:JiraTestResultReporter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '166.v0cc6208295b5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28136'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/JiraTestResultReporter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2236'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/o... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:54:48Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-qcgx-7p5f-hxvr | 2022-03-29T22:11:45Z | 2022-03-29T22:11:45Z | null | ['CVE-2022-24784'] | Discoverability of user password hash in Statamic CMS | ## Description
It was possible to confirm a single character of a user's password hash (just the hash, not the password) using a specially crafted regular expression filter in the users endpoint of the REST API. Many requests could eventually uncover the entire hash.
The hash would not be in the response, however the... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'statamic/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.2.39'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'statamic/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.3.0'}, {'fixed': '3.3.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/statamic/cms/security/advisories/GHSA-qcgx-7p5f-hxvr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24784'}, {'type': 'WEB', 'url': 'https://github.com/statamic/cms/issues/5604'}, {'type': 'WEB', 'url': 'https://github.com/statamic/cms/pull/5568'}, ... | {'cwe_ids': ['CWE-200', 'CWE-203', 'CWE-326'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T22:11:45Z', 'nvd_published_at': '2022-03-25T22:15:00Z'} |
1.4.0 | GHSA-7p99-3798-f85c | 2022-03-31T22:44:47Z | 2022-03-31T22:44:47Z | null | ['CVE-2022-24794'] | URL Redirection to Untrusted Site ('Open Redirect') in express-openid-connect | ### Impact
Users of the `requiresAuth` middleware, either directly or through the default `authRequired` option, are vulnerable to an Open Redirect when the middleware is applied to a catch all route.
If all routes under `example.com` are protected with the `requiresAuth` middleware, a visit to `http://example.com//go... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'express-openid-connect'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/auth0/express-openid-connect/security/advisories/GHSA-7p99-3798-f85c'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24794'}, {'type': 'WEB', 'url': 'https://github.com/auth0/express-openid-connect/commit/0947b92164a2c5f661ebcc183d37e7f21de719ad'}, {... | {'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-31T22:44:47Z', 'nvd_published_at': '2022-03-31T23:15:00Z'} |
1.4.0 | GHSA-gc7m-x2cj-3775 | 2022-11-29T22:00:30Z | 2022-03-30T00:00:25Z | null | ['CVE-2022-28137'] | Missing permission check in Jenkins JiraTestResultReporter Plugin | A missing permission check in Jenkins JiraTestResultReporter Plugin 165.v817928553942 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:JiraTestResultReporter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '166.v0cc6208295b5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28137'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/JiraTestResultReporter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2236'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/o... | {'cwe_ids': ['CWE-732', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T22:00:30Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-3r5x-x6xf-m8fv | 2022-11-30T20:46:02Z | 2022-03-30T00:00:21Z | null | ['CVE-2022-28160'] | Arbitrary file read vulnerability in Jenkins Tests Selector Plugin | Jenkins Tests Selector Plugin 1.3.3 and earlier allows users with Item/Configure permission to read arbitrary files on the Jenkins controller using the Choosing Tests parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:selected-tests-executor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28160'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/selected-tests-executor-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2338'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/... | {'cwe_ids': ['CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:46:02Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-mf79-f657-47ww | 2022-03-28T15:39:13Z | 2022-03-20T00:00:29Z | null | ['CVE-2022-0991'] | Insufficient Session Expiration in Admidio | Admidio prior to version 4.1.9 is vulnerable to insufficient session expiration. In vulnerable versions, changing the password in one session does not terminate sessions logged in with the old password, which could lead to unauthorized actors maintaining access to an account. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'admidio/admidio'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0991'}, {'type': 'WEB', 'url': 'https://github.com/Admidio/admidio/issues/1238'}, {'type': 'WEB', 'url': 'https://github.com/admidio/admidio/commit/e84e472ebe517e2ff5795c46dc10b5f49dc4d46a'}, {'type': 'PACKAGE', 'url': 'https://github.com/Admidio/a... | {'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T15:39:13Z', 'nvd_published_at': '2022-03-19T08:15:00Z'} |
1.4.0 | GHSA-rggc-4g3r-j7ff | 2022-03-30T16:47:02Z | 2022-03-20T00:00:30Z | null | ['CVE-2022-26265'] | Remote Code Execution in Contao Managed Edition | Contao Managed Edition v1.5.0 was discovered to contain a remote command execution (RCE) vulnerability via the component php_cli parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'contao/managed-edition'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26265'}, {'type': 'WEB', 'url': 'https://github.com/JCCD/Contao-Managed-Edition-1.5-RCE/blob/main/VulnerabilityDetails.md'}, {'type': 'PACKAGE', 'url': 'https://github.com/contao/managed-edition'}] | {'cwe_ids': ['CWE-77'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T16:23:06Z', 'nvd_published_at': '2022-03-18T23:15:00Z'} |
1.4.0 | GHSA-xgx2-332h-9x6q | 2022-03-30T15:24:00Z | 2022-03-26T00:00:32Z | null | ['CVE-2021-43091'] | SQL Injection in Yeswiki | An SQL Injection vlnerability exits in Yeswiki doryphore 20211012 via the email parameter in the registration form. The issue was fixed in Yeswiki version 4.1.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'yeswiki/yeswiki'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43091'}, {'type': 'WEB', 'url': 'https://github.com/yeswiki/yeswiki/commit/c9785f9a92744c3475f9676a0d8f95de24750094'}, {'type': 'PACKAGE', 'url': 'https://github.com/yeswiki/yeswiki'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/07f245a7-ee9... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T15:24:00Z', 'nvd_published_at': '2022-03-25T17:15:00Z'} |
1.4.0 | GHSA-32gv-6cf3-wcmq | 2022-03-14T22:45:11Z | 2022-03-14T22:45:11Z | null | [] | HTTP/2 DoS Attacks: Ping, Reset, and Settings Floods | ### Impact
Twisted web servers that utilize the optional HTTP/2 support suffer from the following flow-control related vulnerabilities:
Ping flood: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9512
Reset flood: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9514
Settings flood: https://cve.mitre.or... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'twisted'}, 'ecosystem_specific': {'affected_functions': ['twisted.web.http._GenericHTTPChannelProtocol.dataReceived']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '19.10.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/twisted/twisted/security/advisories/GHSA-32gv-6cf3-wcmq'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/a40ab1ce5210f231abe7a448a54d7e88e48f2d5d'}, {'type': 'PACKAGE', 'url': 'https://github.com/twisted/twisted'}] | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:45:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-xmq3-hgjx-6997 | 2022-03-29T15:16:27Z | 2022-03-17T00:00:47Z | null | ['CVE-2022-0705'] | Cross-site Scripting in Pimcore | Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.3.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0705'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/11447'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pi... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T15:16:27Z', 'nvd_published_at': '2022-03-16T11:15:00Z'} |
1.4.0 | GHSA-mq47-6wwv-v79w | 2022-03-18T23:23:02Z | 2022-03-04T00:00:16Z | null | ['CVE-2021-3762'] | Path traversal in claircore | A directory traversal vulnerability was found in the ClairCore engine of Clair. An attacker can exploit this by supplying a crafted container image which, when scanned by Clair, allows for arbitrary file write on the filesystem, potentially allowing for remote code execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/quay/claircore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/quay/claircore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.1.0'}]}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3762'}, {'type': 'WEB', 'url': 'https://github.com/quay/clair/pull/1379'}, {'type': 'WEB', 'url': 'https://github.com/quay/clair/pull/1380'}, {'type': 'WEB', 'url': 'https://github.com/quay/claircore/pull/478'}, {'type': 'WEB', 'url': 'https://gith... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:23:02Z', 'nvd_published_at': '2022-03-03T22:15:00Z'} |
1.4.0 | GHSA-rv6r-3f5q-9rgx | 2022-03-04T21:09:55Z | 2022-03-03T19:02:08Z | null | ['CVE-2022-21716'] | Twisted SSH client and server deny of service during SSH handshake. | ### Impact
The Twisted SSH client and server implementation naively accepted an infinite amount of data for the peer's SSH version identifier.
A malicious peer can trivially craft a request that uses all available memory and crash the server, resulting in denial of service. The attack is as simple as `nc -rv localho... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'twisted'}, 'ecosystem_specific': {'affected_functions': ['twisted.conch.ssh.transport.SSHTransportBase.dataReceived']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '21.7.0'}, {'fixed': '22.2.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/twisted/twisted/security/advisories/GHSA-rv6r-3f5q-9rgx'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21716'}, {'type': 'WEB', 'url': 'https://github.com/twisted/twisted/commit/98387b39e9f0b21462f6abc7a1325dc370fcdeb1'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-120', 'CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T19:02:08Z', 'nvd_published_at': '2022-03-03T21:15:00Z'} |
1.4.0 | GHSA-r9cr-hvjj-496v | 2022-03-24T00:04:03Z | 2022-03-24T00:04:03Z | null | ['CVE-2022-24730'] | Path traversal and improper access control allows leaking out-of-bound files from Argo CD repo-server | ### Impact
All unpatched versions of Argo CD starting with v1.3.0 are vulnerable to a path traversal bug, compounded by an improper access control bug, allowing a malicious user with read-only repository access to leak sensitive files from Argo CD's repo-server.
A malicious Argo CD user who has been granted [`get` ac... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.3.0'}, {'fixed': '2.1.11'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2... | [{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-r9cr-hvjj-496v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24730'}, {'type': 'PACKAGE', 'url': 'https://github.com/argoproj/argo-cd'}] | {'cwe_ids': ['CWE-22', 'CWE-284'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-24T00:04:03Z', 'nvd_published_at': '2022-03-23T21:15:00Z'} |
1.4.0 | GHSA-p9gq-76fj-4p4p | 2022-11-30T18:57:22Z | 2022-03-16T00:00:42Z | null | ['CVE-2022-27215'] | Missing permission checks in Jenkins Release Helper Plugin | A missing permission check in Jenkins Release Helper Plugin 1.3.3 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified URL using attacker-specified credentials. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:release-helper'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27215'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/release-helper-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2274'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secur... | {'cwe_ids': ['CWE-281', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T18:57:22Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-36p3-wjmg-h94x | 2022-06-01T22:15:49Z | 2022-03-31T18:30:50Z | null | ['CVE-2022-22965'] | Remote Code Execution in Spring Framework | Spring Framework prior to versions 5.2.20 and 5.3.18 contains a remote code execution vulnerability known as `Spring4Shell`.
## Impact
A Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding. The specific exploit requires the application to run o... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-beans'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.20.RELEASE'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.springframework:spring-beans'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22965'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/commit/002546b3e4b8d791ea6acccb81eb3168f51abb15'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-254054.pdf'}, {'type': 'WEB', 'url':... | {'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-31T18:30:50Z', 'nvd_published_at': '2022-04-01T23:15:00Z'} |
1.4.0 | GHSA-jp6h-mxhx-pgqh | 2022-03-24T00:22:07Z | 2022-03-10T17:28:55Z | null | ['CVE-2022-24745'] | Shopware guest session is shared between customers | ### Impact
Guest sessions are shared between customers when HTTP cache is enabled. Setups with Varnish are not affected by this issue
## Patches
We recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.sh... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/platform'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.8.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.8.1'}}, {'package': {'ecosystem': 'Packagist', 'name': 'shopware/storefront'}, 'ranges': [{'t... | [{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-jp6h-mxhx-pgqh'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24745'}, {'type': 'WEB', 'url': 'https://docs.shopware.com/en/shopware-6-en/security-updates/security-update-03-2022?_ga=2.159980029.1931762803.... | {'cwe_ids': ['CWE-384'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T17:28:55Z', 'nvd_published_at': '2022-03-09T23:15:00Z'} |
1.4.0 | GHSA-h2v5-3hpc-85j5 | 2022-11-30T20:24:11Z | 2022-03-16T00:00:44Z | null | ['CVE-2022-27202'] | Stored Cross-site Scripting vulnerability in Jenkins Extended Choice Parameter Plugin | Jenkins Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not escape the value and description of extended choice parameters of radio buttons or check boxes type, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:extended-choice-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '346.vd87693c5a'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27202'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/extended-choice-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2232'}, {'type': 'WEB', 'url': 'http://www.openwall.com/list... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:24:11Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-3rj3-qp2j-4fj2 | 2022-12-15T18:25:01Z | 2022-03-18T17:53:10Z | null | ['CVE-2021-21655'] | Cross-Site Request Forgery in Jenkins P4 Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins P4 Plugin 1.11.4 and earlier allows attackers to connect to an attacker-specified Perforce server using attacker-specified username and password.
P4 Plugin 1.11.5 requires POST requests for the affected HTTP endpoints. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:p4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21655'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/p4-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2327'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:24:27Z', 'nvd_published_at': '2021-05-11T15:15:00Z'} |
1.4.0 | GHSA-v8mp-hhjq-h4cj | 2022-03-29T17:36:00Z | 2022-03-16T00:00:46Z | null | ['CVE-2022-0965'] | Cross-site Scripting in ShowDoc | ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.ofd` file upload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0965'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/d66c88ce-63e2... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T17:36:00Z', 'nvd_published_at': '2022-03-15T16:15:00Z'} |
1.4.0 | GHSA-p2j7-6g9h-32xh | 2022-04-07T22:06:36Z | 2022-03-30T00:00:27Z | null | ['CVE-2022-23059'] | Cross site scripting in Shopizer | A Stored Cross Site Scripting (XSS) vulnerability exists in Shopizer versions v2.0.2 through v2.17.0 via the “Manage Images” tab, which allows an attacker to upload a SVG file containing malicious JavaScript code. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.shopizer:shopizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.2'}, {'fixed': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23059'}, {'type': 'WEB', 'url': 'https://github.com/shopizer-ecommerce/shopizer/commit/6b9f1ecd303b3b724d96bd08095c1a751dcc287e'}, {'type': 'PACKAGE', 'url': 'https://github.com/shopizer-ecommerce/shopizer'}, {'type': 'WEB', 'url': 'https://www.whi... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T22:06:36Z', 'nvd_published_at': '2022-03-29T11:15:00Z'} |
1.4.0 | GHSA-p6j8-hgv5-m35g | 2022-03-18T17:58:30Z | 2022-03-18T17:58:30Z | null | ['CVE-2020-35510'] | Uncontrolled Resource Consumption in jboss-remoting | A flaw was found in jboss-remoting in versions before 5.0.20.SP1-redhat-00001. A malicious attacker could cause threads to hold up forever in the EJB server by writing a sequence of bytes corresponding to the expected messages of a successful EJB client request, but omitting the ACK messages, or just tamper with jboss-... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jboss.remoting:jboss-remoting'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.20.Final'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.0.19.Final'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-35510'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1905796'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-03T20:38:29Z', 'nvd_published_at': '2021-06-02T14:15:00Z'} |
1.4.0 | GHSA-gcx2-gvj7-pxv3 | 2022-03-22T19:22:59Z | 2022-03-22T19:22:59Z | null | ['CVE-2022-24766'] | Insufficient Protection against HTTP Request Smuggling in mitmproxy | ### Impact
In mitmproxy 7.0.4 and below, a malicious client or server is able to perform [HTTP request smuggling](https://en.wikipedia.org/wiki/HTTP_request_smuggling) attacks through mitmproxy. This means that a malicious client/server could smuggle a request/response through mitmproxy as part of another request/resp... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'mitmproxy'}, 'ecosystem_specific': {'affected_functions': ['mitmproxy.proxy.layers.http._http1.Http1Client.read_headers', 'mitmproxy.proxy.layers.http._http1.Http1Server.read_headers']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '8.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mitmproxy/mitmproxy/security/advisories/GHSA-gcx2-gvj7-pxv3'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24766'}, {'type': 'WEB', 'url': 'https://github.com/mitmproxy/mitmproxy/commit/b06fb6d157087d526bd02e7aadbe37c56865c71b'}, {'type': 'PACKAGE',... | {'cwe_ids': ['CWE-444'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-22T19:22:59Z', 'nvd_published_at': '2022-03-21T19:15:00Z'} |
1.4.0 | GHSA-3872-f48p-pxqj | 2022-03-04T22:04:01Z | 2022-03-04T21:15:31Z | null | ['CVE-2022-23915'] | Improper Neutralization of Special Elements used in a Command ('Command Injection') in Weblate | ### Impact
Weblate didn't correctly sanitize some arguments passed to Git and Mercurial, which allowed changing their behavior in an unintended way.
### Patches
The issues were fixed in the 4.11.1 release. The following commits are addressing it:
* 35d59f1f040541c358cece0a8d4a63183ca919b8
* d83672a3e7415da1490334e2c... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Weblate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/security/advisories/GHSA-3872-f48p-pxqj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23915'}, {'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/pull/7337'}, {'type': 'WEB', 'url': 'https://github.com/WeblateOrg/webla... | {'cwe_ids': ['CWE-77', 'CWE-88'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-04T21:15:31Z', 'nvd_published_at': '2022-03-04T20:15:00Z'} |
1.4.0 | GHSA-gff7-g5r8-mg8m | 2022-03-29T13:08:19Z | 2022-03-23T00:00:22Z | null | ['CVE-2022-26260'] | Prototype Pollution in simple-plist | simple-plist v1.3.0 was discovered to contain a prototype pollution vulnerability via .parse(). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'simple-plist'}, 'ecosystem_specific': {'affected_functions': ['simple-plist.parse']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26260'}, {'type': 'WEB', 'url': 'https://github.com/wollardj/simple-plist/issues/60'}, {'type': 'WEB', 'url': 'https://github.com/wollardj/simple-plist/issues/60#issuecomment-1083991840'}, {'type': 'PACKAGE', 'url': 'https://github.com/wollardj/sim... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T13:08:19Z', 'nvd_published_at': '2022-03-22T19:15:00Z'} |
1.4.0 | GHSA-5fxv-xx5p-g2fv | 2022-03-25T17:13:37Z | 2022-03-16T00:00:46Z | null | ['CVE-2022-0968'] | Integer Overflow in microweber | Microweber is a new generation CMS with drag and drop. The microweber application allows large characters to insert in the input field "first & last name" which can allow attackers to cause a Denial of Service (DoS) via a crafted HTTP request. The first name & last name input should be limited to 50 characters or max 1... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0968'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/80e39084729a57dfe749626c3b9d35247a14c49e'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/9... | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:30:46Z', 'nvd_published_at': '2022-03-15T16:15:00Z'} |
1.4.0 | GHSA-82j4-vr25-x394 | 2022-03-23T15:41:25Z | 2022-03-15T00:01:01Z | null | ['CVE-2022-0940'] | Cross-site Scripting in ShowDoc | ShowDoc is vulnerable to stored cross-site scripting due to unrestricted file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0940'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/78522520892d4e29cc94148c6ec84a204a607b73'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/856bd2e2-db4f... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T14:04:45Z', 'nvd_published_at': '2022-03-14T11:15:00Z'} |
1.4.0 | GHSA-6xp6-fmc8-pmmr | 2022-03-18T17:50:45Z | 2022-03-18T17:50:45Z | null | ['CVE-2021-20202'] | Temporary Directory Hijacking Vulnerability in Keycloak | A flaw was found in keycloak. Directories can be created prior to the Java process creating them in the temporary directory, but with wider user permissions, allowing the attacker to have access to the contents that keycloak stores in this directory. The highest threat from this vulnerability is to data confidentiality... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '13.0.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/JLLeitschuh/security-research/security/advisories/GHSA-7gf3-89f6-823j'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20202'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1922128'}, {'type': 'WEB', 'url': 'https://issues.redha... | {'cwe_ids': ['CWE-377'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T21:01:15Z', 'nvd_published_at': '2021-05-12T15:15:00Z'} |
1.4.0 | GHSA-75p7-527p-w8wp | 2022-03-09T20:13:46Z | 2022-03-09T15:17:31Z | null | ['CVE-2022-24739'] | Server-Side Request Forgery and Open Redirect in AllTube Download | ### Impact
On releases prior to 3.0.3, an attacker could craft a special HTML page to trigger either an open redirect attack or a Server-Side Request Forgery attack (depending on how AllTube is configured).
The impact is mitigated by the fact the SSRF attack is only possible when the `stream` option is enabled in the... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'rudloff/alltube'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Rudloff/alltube/security/advisories/GHSA-75p7-527p-w8wp'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24739'}, {'type': 'WEB', 'url': 'https://github.com/ytdl-org/youtube-dl/issues/30691'}, {'type': 'WEB', 'url': 'https://github.com/Rudloff/alltube... | {'cwe_ids': ['CWE-601', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-09T15:17:31Z', 'nvd_published_at': '2022-03-08T22:15:00Z'} |
1.4.0 | GHSA-mfjm-vh54-3f96 | 2022-03-01T22:13:28Z | 2022-03-01T22:13:28Z | null | [] | Cookie-setting is not restricted based on the public suffix list | ### Impact
Responses from domain names whose public domain name suffix contains 1 or more periods (e.g. responses from `example.co.uk`, given its public domain name suffix is `co.uk`) are able to set cookies that are included in requests to any other domain sharing the same domain name suffix.
### Patches
Upgrade to... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'scrapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.8.2'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'scrapy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.6.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/security/advisories/GHSA-mfjm-vh54-3f96'}, {'type': 'WEB', 'url': 'https://github.com/scrapy/scrapy/commit/e865c4430e58a4faa0e0766b23830f8423d6167a'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:13:28Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9cc3-5w85-pxvx | 2022-03-14T23:03:31Z | 2022-03-05T00:00:45Z | null | ['CVE-2020-18326'] | Cross Site Request Forgery in intelliants/subrion | Cross Site Request Forgery (CSRF) vulnerability exists in Intelliants Subrion CMS v4.2.1 via the Members administrator function, which could let a remote unauthenticated malicious user send an authorised request to victim and successfully create an arbitrary administrator user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-18326'}, {'type': 'WEB', 'url': 'https://github.com/hamm0nz/CVE-2020-18326'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}] | {'cwe_ids': ['CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:03:31Z', 'nvd_published_at': '2022-03-04T15:15:00Z'} |
1.4.0 | GHSA-x8wj-cqmp-3wmm | 2022-03-28T22:21:45Z | 2022-03-15T00:00:59Z | null | ['CVE-2021-41952'] | Cross-site Scripting in Zenario CMS | Zenario CMS 9.0.54156 is vulnerable to Cross Site Scripting (XSS) via upload file to *.SVG. An attacker can send malicious files to victims and steals victim's cookie leads to account takeover. The person viewing the image of a contact can be victim of XSS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'tribalsystems/zenario'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.55143'}]}], 'database_specific': {'last_known_affected_version_range': '<= 9.0.54156'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41952'}, {'type': 'WEB', 'url': 'https://github.com/hieuminhnv/Zenario-CMS-9.0-last-version/issues/1'}, {'type': 'WEB', 'url': 'https://github.com/TribalSystems/Zenario/commit/4566d8a9ac6755f098b3373252fdb17754a77007'}, {'type': 'PACKAGE', 'url': '... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T22:21:45Z', 'nvd_published_at': '2022-03-14T15:15:00Z'} |
1.4.0 | GHSA-hf8c-xr89-vfm5 | 2022-03-28T18:26:27Z | 2022-03-22T00:00:41Z | null | ['CVE-2022-25766'] | Command Injection in ungit | The package ungit before 1.5.20 are vulnerable to Remote Code Execution (RCE) via argument injection. The issue occurs when calling the /api/fetch endpoint. User controlled values (remote and ref) are passed to the git fetch command. By injecting some git options it was possible to get arbitrary command execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'ungit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.20'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25766'}, {'type': 'WEB', 'url': 'https://github.com/FredrikNoren/ungit/pull/1510'}, {'type': 'WEB', 'url': 'https://github.com/FredrikNoren/ungit/pull/1511'}, {'type': 'PACKAGE', 'url': 'https://github.com/FredrikNoren/ungit'}, {'type': 'WEB', 'url... | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T18:26:27Z', 'nvd_published_at': '2022-03-21T18:15:00Z'} |
1.4.0 | GHSA-4q96-9f63-p7jj | 2022-03-30T19:53:50Z | 2022-03-29T00:01:16Z | null | ['CVE-2021-26601'] | Path Traversal in ImpressCMS | ImpressCMS before 1.4.3 allows libraries/image-editor/image-edit.php image_temp Directory Traversal. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26601'}, {'type': 'WEB', 'url': 'https://github.com/ImpressCMS/impresscms/issues/914'}, {'type': 'WEB', 'url': 'https://github.com/ImpressCMS/impresscms/pull/915'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1081878'}, {'type': 'PACKAGE'... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T19:53:50Z', 'nvd_published_at': '2022-03-28T01:15:00Z'} |
1.4.0 | GHSA-c383-q5vf-hx55 | 2022-03-23T15:33:00Z | 2022-03-12T00:00:36Z | null | ['CVE-2022-0913'] | Integer Overflow or Wraparound in Microweber | Microweber prior to 1.2.12 is vulnerable to Integer Overflow or Wraparound. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0913'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/7559e141d0707f8eeff2f9aeaa5a0ca2e3fe6583'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f... | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T15:33:00Z', 'nvd_published_at': '2022-03-11T10:15:00Z'} |
1.4.0 | GHSA-v222-6mr4-qj29 | 2023-05-16T15:46:19Z | 2022-03-31T23:27:15Z | null | ['CVE-2022-24803'] | Command Injection vulnerability in asciidoctor-include-ext | ### Impact
Applications using [Asciidoctor (Ruby)](https://github.com/asciidoctor/asciidoctor) with [asciidoctor-include-ext](https://github.com/jirutka/asciidoctor-include-ext) (prior to version 0.4.0), which render user-supplied input in AsciiDoc markup, may allow an attacker to execute arbitrary system commands on ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'asciidoctor-include-ext'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.4.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/jirutka/asciidoctor-include-ext/security/advisories/GHSA-v222-6mr4-qj29'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24803'}, {'type': 'WEB', 'url': 'https://github.com/jirutka/asciidoctor-include-ext/commit/c7ea001a597c7033575342c51483dab7b87ae15... | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-31T23:27:15Z', 'nvd_published_at': '2022-04-01T00:15:00Z'} |
1.4.0 | GHSA-cfhh-xgwq-5r67 | 2022-03-28T22:30:25Z | 2022-03-14T22:15:19Z | null | ['CVE-2022-24740'] | Sudden swap of user auth tokens in Volto | ### Impact
Due to the usage of an outdated version of the react-cookie library, under the circumstances of given a server high load, it is possible that a user could get his/her auth cookie replaced with the auth cookie from another user, effectively giving him full access to the other users account and privileges. A p... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': '@plone/volto'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '14.0.0-alpha.6'}, {'fixed': '15.0.0-alpha.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 14.10.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/plone/volto/security/advisories/GHSA-cfhh-xgwq-5r67'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24740'}, {'type': 'WEB', 'url': 'https://github.com/plone/volto/pull/3051'}, {'type': 'PACKAGE', 'url': 'https://github.com/plone/volto'}] | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:15:19Z', 'nvd_published_at': '2022-03-14T23:15:00Z'} |
1.4.0 | GHSA-9m87-6fj3-c5xh | 2022-03-30T21:04:52Z | 2022-03-23T00:00:24Z | null | ['CVE-2022-26183'] | Untrusted Search Path in PNPM | PNPM prior to v6.15.1 was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute PNPM commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'pnpm'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.15.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26183'}, {'type': 'WEB', 'url': 'https://github.com/pnpm/pnpm/commit/04b7f60861ddee8331e50d70e193d1e701abeefb'}, {'type': 'PACKAGE', 'url': 'https://github.com/pnpm/pnpm'}, {'type': 'WEB', 'url': 'https://github.com/pnpm/pnpm/releases/tag/v6.15.1'}... | {'cwe_ids': ['CWE-426'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T13:11:14Z', 'nvd_published_at': '2022-03-21T22:15:00Z'} |
1.4.0 | GHSA-9w4w-cpc8-h2fq | 2022-03-29T22:16:56Z | 2022-03-07T23:44:28Z | null | ['CVE-2022-24737'] | Exposure of Sensitive Information to an Unauthorized Actor in httpie | ### Impact
HTTPie have the practical concept of [sessions](https://httpie.io/docs/cli/sessions), which help users to persistently store some of the state that belongs to the outgoing requests and incoming responses on the disk for further usage. As an example, we can make an authenticated request and save it to a [name... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'httpie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/httpie/httpie/security/advisories/GHSA-9w4w-cpc8-h2fq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24737'}, {'type': 'WEB', 'url': 'https://github.com/httpie/httpie/commit/65ab7d5caaaf2f95e61f9dd65441801c2ddee38b'}, {'type': 'PACKAGE', 'url': 'htt... | {'cwe_ids': ['CWE-200'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T23:44:28Z', 'nvd_published_at': '2022-03-07T23:15:00Z'} |
1.4.0 | GHSA-xj7h-g7rh-gjcw | 2022-03-15T00:23:04Z | 2022-03-05T00:00:45Z | null | ['CVE-2020-18324'] | Cross-site Scripting in Subrion CMS | Cross Site Scripting (XSS) vulnerability exists in Subrion CMS 4.2.1 via the `q` parameter in the Kickstart template. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'intelliants/subrion'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-18324'}, {'type': 'WEB', 'url': 'https://github.com/hamm0nz/CVE-2020-18324'}, {'type': 'PACKAGE', 'url': 'https://github.com/intelliants/subrion'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-09T19:19:52Z', 'nvd_published_at': '2022-03-04T15:15:00Z'} |
1.4.0 | GHSA-r5qj-cvf9-p85h | 2022-05-25T13:45:57Z | 2022-03-06T00:00:16Z | null | ['CVE-2022-0845'] | Code Injection in PyTorch Lightning | PyTorch Lightning version 1.5.10 and prior is vulnerable to code injection. An attacker could execute commands on the target OS running the operating system by setting the `PL_TRAINER_GPUS` when using the `Trainer` module. A [patch](https://github.com/pytorchlightning/pytorch-lightning/commit/8b7a12c52e52a06408e9231647... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pytorch-lightning'}, 'ecosystem_specific': {'affected_functions': ['pytorch_lightning.utilities.argparse.parse_env_variables']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0845'}, {'type': 'WEB', 'url': 'https://github.com/PyTorchLightning/pytorch-lightning/pull/12212'}, {'type': 'WEB', 'url': 'https://github.com/pytorchlightning/pytorch-lightning/commit/8b7a12c52e52a06408e9231647839ddb4665e8ae'}, {'type': 'ADVISORY'... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T19:58:34Z', 'nvd_published_at': '2022-03-05T22:15:00Z'} |
1.4.0 | GHSA-q347-cg56-pcq4 | 2022-03-14T22:57:00Z | 2022-03-14T22:57:00Z | null | [] | SSRF in repository migration | ### Impact
The malicious user is able to discover services in the internal network through repository migration functionality. All installations accepting public traffic are affected.
### Patches
Internal network CIDRs are prohibited to be used as repository migration targets. Users should upgrade to 0.12.5 or the l... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'gogs.io/gogs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/gogs/gogs/security/advisories/GHSA-q347-cg56-pcq4'}, {'type': 'PACKAGE', 'url': 'https://github.com/gogs/gogs'}, {'type': 'WEB', 'url': 'https://www.huntr.dev/bounties/327797d7-ae41-498f-9bff-cc0bf98cf531/'}] | {'cwe_ids': ['CWE-918'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:57:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mf3v-f2qq-pf9g | 2022-03-15T21:48:34Z | 2022-03-14T22:30:46Z | null | ['CVE-2022-24743'] | Insufficient Session Expiration in Sylius | ### Impact
The reset password token was not set to null after the password was changed. This is causing behaviour in which the same token can be used several times, so it can result in a leak of the existing token and an unauthorised password change.
### Patches
The issue is fixed in versions: 1.10.11, 1.11.2 and abov... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.11'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.11.0'}, {'fixed': '1.11.2'}]}]}... | [{'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/security/advisories/GHSA-mf3v-f2qq-pf9g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24743'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sylius/Sylius'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/releases/tag/v1.10... | {'cwe_ids': ['CWE-613'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:30:46Z', 'nvd_published_at': '2022-03-14T21:15:00Z'} |
1.4.0 | GHSA-m3xv-x3ph-mq22 | 2022-03-24T13:44:50Z | 2022-03-12T00:00:34Z | null | ['CVE-2021-44618'] | Server-side Template Injection in nystudio107/craft-seomatic | A Server-side Template Injection (SSTI) vulnerability exists in Nystudio107 Seomatic prior to 3.4.12 in src/helpers/UrlHelper.php via the host header. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'nystudio107/craft-seomatic'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44618'}, {'type': 'WEB', 'url': 'https://github.com/nystudio107/craft-seomatic/commit/0c5c0c0e0cb61000d12ec55ebf174745a5bf6469'}, {'type': 'PACKAGE', 'url': 'https://github.com/nystudio107/craft-seomatic'}, {'type': 'WEB', 'url': 'https://github.co... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:21:34Z', 'nvd_published_at': '2022-03-11T16:15:00Z'} |
1.4.0 | GHSA-w97x-j6rg-55v5 | 2022-11-29T22:57:53Z | 2022-03-30T00:00:25Z | null | ['CVE-2022-28141'] | Password stored in plain text by Jenkins Proxmox Plugin | Jenkins Proxmox Plugin 0.5.0 and earlier stores the Proxmox Datacenter password unencrypted in the global config.xml file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:proxmox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28141'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/proxmox-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2079'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202... | {'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T22:57:53Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-pm3h-mm62-pwm8 | 2022-03-28T15:56:34Z | 2022-03-11T00:02:04Z | null | ['CVE-2022-26662'] | XML Entity Expansion in trytond and proteus | An XML Entity Expansion (XEE) issue was discovered in Tryton Application Platform (Server) 5.x through 5.0.45, 6.x through 6.0.15, and 6.1.x and 6.2.x through 6.2.5, and Tryton Application Platform (Command Line Client (proteus)) 5.x through 5.0.11, 6.x through 6.0.4, and 6.1.x and 6.2.x through 6.2.1. An unauthenticat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'trytond'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.46'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'trytond'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '6.0.0'}, {'fixed': '6.0.16'}]}]}, {'package': {'ecosystem... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26662'}, {'type': 'WEB', 'url': 'https://bugs.tryton.org/issue11244'}, {'type': 'WEB', 'url': 'https://discuss.tryton.org/t/security-release-for-issue11219-and-issue11244/5059'}, {'type': 'PACKAGE', 'url': 'https://hg.tryton.org/trytond'}, {'type':... | {'cwe_ids': ['CWE-776'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T15:54:14Z', 'nvd_published_at': '2022-03-10T17:47:00Z'} |
1.4.0 | GHSA-8c26-wmh5-6g9v | 2023-08-30T13:52:18Z | 2022-03-19T00:01:02Z | null | ['CVE-2022-27191'] | golang.org/x/crypto/ssh Denial of service via crafted Signer | The golang.org/x/crypto/ssh package before 0.0.0-20220314234659-1baeb1ce4c0b for Go allows an attacker to crash a server in certain circumstances involving AddHostKey. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'golang.org/x/crypto'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20220314234659-1baeb1ce4c0b'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27191'}, {'type': 'PACKAGE', 'url': 'https://cs.opensource.google/go/x/crypto'}, {'type': 'WEB', 'url': 'https://go.dev/cl/392355'}, {'type': 'WEB', 'url': 'https://go.googlesource.com/crypto/+/1baeb1ce4c0b006eff0f294c47cb7617598dfb3d'}, {'type': '... | {'cwe_ids': ['CWE-327'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T18:48:41Z', 'nvd_published_at': '2022-03-18T07:15:00Z'} |
1.4.0 | GHSA-q8hg-pf8v-cxrv | 2023-09-21T20:05:33Z | 2022-03-26T00:22:49Z | null | ['CVE-2019-18887'] | Symfony Http-Kernel has non-constant time comparison in UriSigner | When checking the signature of an URI (an ESI fragment URL for instance), the URISigner did not used a constant time string comparison function, resulting in a potential remote timing attack vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-kernel'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.8.52'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'symfony/http-kernel'}, 'ecosystem_specific': {'affecte... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-18887'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/http-kernel/CVE-2019-18887.yaml'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/symfony/symfony/CVE-... | {'cwe_ids': ['CWE-203'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:22:49Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8hh2-rxm8-7fj8 | 2022-11-30T20:59:30Z | 2022-03-30T00:00:23Z | null | ['CVE-2022-28147'] | Missing permission check in Jenkins Continuous Integration with Toad Edge Plugin | A missing permission check in Jenkins Continuous Integration with Toad Edge Plugin 2.3 and earlier allows attackers with Overall/Read permission to check for the existence of an attacker-specified file path on the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:ci-with-toad-edge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28147'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/ci-with-toad-edge-plugin/commit/2b65d62ebb71ec727097aa409c623f9c7c3b2792'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ci-with-toad-edge-plugin'}, {'type': 'WEB', 'url': 'h... | {'cwe_ids': ['CWE-281', 'CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:59:30Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-m8xh-cqc2-5q6f | 2022-04-01T17:14:56Z | 2022-03-29T00:01:16Z | null | ['CVE-2021-26600'] | Type Confusion in ImpressCMS | ImpressCMS before 1.4.3 has plugins/preloads/autologin.php type confusion with resultant Authentication Bypass (!= instead of !==). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'impresscms/impresscms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-26600'}, {'type': 'WEB', 'url': 'https://hackerone.com/reports/1081986'}, {'type': 'PACKAGE', 'url': 'https://github.com/ImpressCMS/impresscms'}, {'type': 'WEB', 'url': 'https://github.com/ImpressCMS/impresscms/releases/tag/v1.4.3'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-843'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T17:14:56Z', 'nvd_published_at': '2022-03-28T01:15:00Z'} |
1.4.0 | GHSA-qgpv-86r3-87fh | 2022-03-30T18:26:22Z | 2022-03-30T18:26:22Z | null | ['CVE-2018-1000162'] | Cross-site Scripting in Parsedown | Parsedown version prior to 1.7.0 contains a Cross Site Scripting (XSS) vulnerability in `setMarkupEscaped` for escaping HTML that can result in JavaScript code execution. This attack appears to be exploitable via specially crafted markdown that allows it to side step HTML escaping by breaking AST boundaries. This vulne... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'erusev/parsedown'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-1000162'}, {'type': 'WEB', 'url': 'https://github.com/Roave/SecurityAdvisories/issues/44#issuecomment-368594409'}, {'type': 'WEB', 'url': 'https://github.com/erusev/parsedown/pull/495'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/secur... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T18:26:22Z', 'nvd_published_at': None} |
1.4.0 | GHSA-mcgw-5fhw-3fq8 | 2023-06-30T20:15:16Z | 2022-03-12T00:00:34Z | null | ['CVE-2022-0932'] | saleor Missing Authorization vulnerability | Missing Authorization in saleor prior to 3.1.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'saleor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0932'}, {'type': 'WEB', 'url': 'https://github.com/saleor/saleor/commit/521dfd6394f3926a77c60d8633c058e16d0f916d'}, {'type': 'PACKAGE', 'url': 'https://github.com/saleor/saleor'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/88ae4cbc-c697-401... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-25T19:23:00Z', 'nvd_published_at': '2022-03-11T15:15:00Z'} |
1.4.0 | GHSA-c3h9-896r-86jm | 2022-03-28T20:28:00Z | 2022-03-28T20:28:00Z | null | ['CVE-2021-3121'] | Improper Input Validation in GoGo Protobuf | An issue was discovered in GoGo Protobuf before 1.3.2. plugin/unmarshal/unmarshal.go lacks certain index validation, aka the "skippy peanut butter" issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/gogo/protobuf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-3121'}, {'type': 'WEB', 'url': 'https://github.com/gogo/protobuf/commit/b03c65ea87cdc3521ede29f62fe3ce239267c1bc'}, {'type': 'WEB', 'url': 'https://discuss.hashicorp.com/t/hcsec-2021-23-consul-exposed-to-denial-of-service-in-gogo-protobuf-dependenc... | {'cwe_ids': ['CWE-129', 'CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T20:28:00Z', 'nvd_published_at': '2021-01-11T06:15:00Z'} |
1.4.0 | GHSA-q448-6c3m-cxmj | 2022-03-28T14:30:54Z | 2022-03-11T00:01:59Z | null | ['CVE-2021-44585'] | Cross-site Scripting in jeecg-boot | jeecg-boot is a code generator. A Cross Site Scripting (XSS) vulnerabilitiy exists in jeecg-boot 3.0 in /jeecg-boot/jmreport/view with a mouseover event. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg-boot-base'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'org.jeecgframework.boot:jeecg... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44585'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/issues/3223'}, {'type': 'WEB', 'url': 'https://github.com/jeecgboot/jeecg-boot/commit/dbba190980fe44ab5377703dc1a9487806ee2a91'}, {'type': 'PACKAGE', 'url': 'https://github.co... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T19:51:15Z', 'nvd_published_at': '2022-03-10T21:15:00Z'} |
1.4.0 | GHSA-pv4m-7c68-f4c5 | 2022-11-30T20:34:35Z | 2022-03-16T00:00:44Z | null | ['CVE-2022-27198'] | CSRF vulnerability in Jenkins CloudBees AWS Credentials Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins CloudBees AWS Credentials Plugin 189.v3551d5642995 and earlier allows attackers with Overall/Read permission to connect to an AWS service using an attacker-specified token. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:aws-credentials'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '189.v3551d5642995'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27198'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/aws-credentials-plugin/commit/cbf183ce58b955f17d93fdc1ac4d19a8ebe693db'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/aws-credentials-plugin'}, {'type': 'WEB', 'url': 'https... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:34:35Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-2f5v-8r3f-8pww | 2022-03-24T00:18:54Z | 2022-03-24T00:18:54Z | null | ['CVE-2022-24768'] | Improper access control allows admin privilege escalation in Argo CD | ### Impact
#### Impacts for versions starting with v1.0.0
All unpatched versions of Argo CD starting with v1.0.0 are vulnerable to an improper access control bug, allowing a malicious user to potentially escalate their privileges to admin-level.
To perform the following exploits, an authorized Argo CD user must have... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.5.0'}, {'fixed': '2.1.14'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/argoproj/argo-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2... | [{'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/security/advisories/GHSA-2f5v-8r3f-8pww'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24768'}, {'type': 'WEB', 'url': 'https://github.com/argoproj/argo-cd/commit/af03b291d4b7e9d3ce9a6580ae9c8141af0e05cf'}, {'type': 'PACKAGE', 'url'... | {'cwe_ids': ['CWE-200', 'CWE-269', 'CWE-862'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-24T00:18:54Z', 'nvd_published_at': '2022-03-23T22:15:00Z'} |
1.4.0 | GHSA-6vx5-cg2p-7g5v | 2022-03-22T21:37:48Z | 2022-03-12T00:00:35Z | null | ['CVE-2022-0912'] | Unrestricted Upload of File with Dangerous Type in microweber | Unrestricted Upload of File with Dangerous Type in GitHub repository microweber/microweber prior to 1.2.12. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0912'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/24245297231f5dc88bb3a2b20d0e4e25b0ebc789'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a... | {'cwe_ids': ['CWE-434'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:18:58Z', 'nvd_published_at': '2022-03-11T10:15:00Z'} |
1.4.0 | GHSA-mv2w-4jqc-6fg4 | 2022-03-15T17:05:10Z | 2022-03-15T00:00:53Z | null | ['CVE-2022-21187'] | Command injection in libvcs and vcspull | The package libvcs before 0.11.1 are vulnerable to Command Injection via argument injection. When calling the update_repo function (when using hg), the url parameter is passed to the hg clone command. By injecting some hg options it was possible to get arbitrary command execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'libvcs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.11.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'vcspull'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21187'}, {'type': 'WEB', 'url': 'https://github.com/vcs-python/libvcs/pull/306'}, {'type': 'WEB', 'url': 'https://github.com/vcs-python/vcspull/commit/e1b77128a1fa0754625b5f43d8bc47956f21f33e'}, {'type': 'WEB', 'url': 'https://github.com/vcs-python... | {'cwe_ids': ['CWE-74', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-15T17:05:10Z', 'nvd_published_at': '2022-03-14T18:15:00Z'} |
1.4.0 | GHSA-jx8f-cpx7-fv47 | 2022-03-18T23:18:43Z | 2022-03-18T23:18:43Z | null | ['CVE-2022-21822'] | Allocation of Resources Without Limits or Throttling in nvflare | ### Impact
NVIDIA FLARE contains a vulnerability in Admin Interface, where an un-authorized attacker can cause Allocation of Resources Without Limits or Throttling, which may lead to cause system unavailable
All versions before 2.0.16 are affected.
### Patches
The patch will be included in nvflare==2.0.16.
### Worka... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'nvflare'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.16'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/NVIDIA/NVFlare/security/advisories/GHSA-jx8f-cpx7-fv47'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21822'}, {'type': 'PACKAGE', 'url': 'https://github.com/NVIDIA/NVFlare'}] | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:18:43Z', 'nvd_published_at': '2022-03-17T21:15:00Z'} |
1.4.0 | GHSA-jr2m-29wj-w9qc | 2022-03-29T19:04:40Z | 2022-03-12T00:00:37Z | null | ['CVE-2022-25506'] | SQL Injection in FreeTAKServer-UI | FreeTAKServer-UI v1.9.8 was discovered to contain a SQL injection vulnerability via the API endpoint /AuthenticateUser. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'FreeTAKServer-UI'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25506'}, {'type': 'WEB', 'url': 'https://github.com/FreeTAKTeam/UI/issues/27'}, {'type': 'PACKAGE', 'url': 'https://github.com/FreeTAKTeam/UI'}] | {'cwe_ids': ['CWE-89'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T19:04:40Z', 'nvd_published_at': '2022-03-11T00:15:00Z'} |
1.4.0 | GHSA-8gr3-2gjw-jj7g | 2022-03-16T23:54:33Z | 2022-03-16T23:54:33Z | null | [] | Hidden functionality in node-ipc | The package node-ipc version 9.2.2 is vulnerable to hidden functionality that was introduced by the maintainer. The package uses a dependency that writes a file to disk that does not pertain to the functionality of the package and is not included in versions < 9.2.2. | [] | [{'package': {'ecosystem': 'npm', 'name': 'node-ipc'}, 'versions': ['9.2.2']}] | [{'type': 'PACKAGE', 'url': 'https://github.com/RIAEvangelist/node-ipc'}, {'type': 'WEB', 'url': 'https://github.com/RIAEvangelist/node-ipc/releases/tag/9.2.2'}] | {'cwe_ids': ['CWE-912'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-16T23:54:33Z', 'nvd_published_at': None} |
1.4.0 | GHSA-7mv4-4xpg-xq44 | 2022-03-26T00:14:34Z | 2022-03-26T00:14:34Z | null | ['CVE-2020-26138'] | FormField with square brackets in field name skips validation | FileField with array notation skips validation
The FileField class is commonly used for file upload in custom code on a Silverstripe website. This field is designed to be used with a single file upload.
PHP allows for submitting multiple values by adding square brackets to the field name. When this is done to a FileF... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'silverstripe/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '4.7.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-26138'}, {'type': 'WEB', 'url': 'https://www.silverstripe.org/download/security-releases/cve-2020-26138/'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:14:34Z', 'nvd_published_at': None} |
1.4.0 | GHSA-47wv-vhj2-g66m | 2022-03-29T19:18:32Z | 2022-03-29T19:18:32Z | null | ['CVE-2022-0315'] | Use of insecure temporary file in Horovod | ### Impact
The insecure `tempfile.mktemp()` is used when Horovod is run in an LSF job with `jsrun`. In that situation, a jsrun rank file is created with `mktemp`, which could be hijacked by another process to read or manipulate the content.
This issue does not impact the use of MPI, Gloo, Spark or Ray.
### Patches
Th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'horovod'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.24.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/horovod/horovod/security/advisories/GHSA-47wv-vhj2-g66m'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0315'}, {'type': 'WEB', 'url': 'https://github.com/horovod/horovod/pull/3358'}, {'type': 'WEB', 'url': 'https://github.com/horovod/horovod/commit/... | {'cwe_ids': ['CWE-377', 'CWE-668'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T19:18:32Z', 'nvd_published_at': '2022-03-24T09:15:00Z'} |
1.4.0 | GHSA-jjp3-m93h-5jm4 | 2022-03-24T23:19:35Z | 2022-03-12T00:00:34Z | null | ['CVE-2022-0928'] | Cross-site Scripting in microweber | Microweber drag and drop website builder and CMS with e-commerce. Cross-site Scripting (XSS) discovered in microweber prior to 1.2.12. There is currently no known workaround, users are recommended to update to version 1.2.12. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0928'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/fc9137c031f7edec5f50d73b300919fb519c924a'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/0... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:19:51Z', 'nvd_published_at': '2022-03-11T11:15:00Z'} |
1.4.0 | GHSA-29vr-79w7-p649 | 2023-07-31T20:36:31Z | 2022-03-11T00:02:00Z | 2023-07-31T20:36:31Z | ['CVE-2021-44597'] | Duplicate Advisory: Incorrect Authorization in Gerapy | ## Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-9w7f-m4j4-j3xw. This link is maintained to preserve external references.
## Original Description
An Access Control vunerabiity exists in Gerapy v 0.9.7 via the spider parameter in project_configure function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'gerapy'}, 'ecosystem_specific': {'affected_functions': ['gerapy.server.core.views.project_clone', 'gerapy.server.core.views.project_configure']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44597'}, {'type': 'WEB', 'url': 'https://github.com/Gerapy/Gerapy/issues/219'}, {'type': 'WEB', 'url': 'https://github.com/Gerapy/Gerapy/commit/49bcb19be5e0320e7e1535f34fe00f16a3cf3b28'}, {'type': 'PACKAGE', 'url': 'https://github.com/Gerapy/Gerapy... | {'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T14:23:45Z', 'nvd_published_at': '2022-03-10T21:15:00Z'} |
1.4.0 | GHSA-jh63-28gx-7p26 | 2022-03-15T19:43:28Z | 2022-03-11T00:02:17Z | null | ['CVE-2022-24193'] | Command Injection in CasaOS | CasaOS before v0.2.7 was discovered to contain a command injection vulnerability via the component leave or join zerotier api. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/IceWhaleTech/CasaOS'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.8'}]}], 'database_specific': {'last_known_affected_version_range': '< 0.2.7'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24193'}, {'type': 'WEB', 'url': 'https://github.com/IceWhaleTech/CasaOS/issues/84'}, {'type': 'WEB', 'url': 'https://github.com/IceWhaleTech/CasaOS/commit/d060968b7ab08e7f8cbfe7ca9ccdfa47afe9bb06'}, {'type': 'PACKAGE', 'url': 'https://github.com/Ic... | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-15T19:43:28Z', 'nvd_published_at': '2022-03-10T17:45:00Z'} |
1.4.0 | GHSA-m9cj-v55f-8x26 | 2022-03-18T17:55:26Z | 2022-03-18T17:55:26Z | null | ['CVE-2020-27826'] | Authentication Bypass in keycloak | A flaw was found in Keycloak before version 12.0.0 where it is possible to update the user's metadata attributes using Account REST API. This flaw allows an attacker to change its own NameID attribute to impersonate the admin user for any particular application. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-27826'}, {'type': 'WEB', 'url': 'https://github.com/keycloak/keycloak/commit/dae4a3eaf26590b8d441b8e4bec3b700ee303b72'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/cve-2020-27826'}, {'type': 'WEB', 'url': 'https://bugzilla.redha... | {'cwe_ids': ['CWE-250'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T18:10:09Z', 'nvd_published_at': '2021-05-28T11:15:00Z'} |
1.4.0 | GHSA-7j52-6fjp-58gr | 2022-03-14T23:22:27Z | 2022-03-14T23:22:27Z | null | [] | Inconsistent storage layout for ERC2771ContextUpgradeable | ### Impact
The storage layout of the ERC2771ContextUpgradeable is not constant between versions.
- versions `4.0.0`, `4.1.0` and `4.2.0`, the contract has a length of 51 slots.
- since `4.3.0`, the contract has a length of 50 slots
- future versions will continue using 50 slots.
This difference in layout could res... | [] | [{'package': {'ecosystem': 'npm', 'name': '@openzeppelin/contracts-upgradeable'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/security/advisories/GHSA-7j52-6fjp-58gr'}, {'type': 'WEB', 'url': 'https://github.com/OpenZeppelin/openzeppelin-transpiler/pull/86'}, {'type': 'PACKAGE', 'url': 'https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable... | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:22:27Z', 'nvd_published_at': None} |
1.4.0 | GHSA-3pg8-c473-w6rr | 2022-03-25T00:07:36Z | 2022-03-16T00:00:46Z | null | ['CVE-2022-0967'] | Stored Cross-site Scripting in showdoc | ShowDoc is a tool for an IT team to share documents online. showdoc contains a stored cross-site scripting vulnerability in the File Library page when uploading a file in .ofd format in versions prior to 2.10.4. At this time, there is no known workaround. Users should update to version 2.10.4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0967'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/9dea3c98-7609... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:35:38Z', 'nvd_published_at': '2022-03-15T16:15:00Z'} |
1.4.0 | GHSA-54fx-gm74-q676 | 2022-03-18T17:55:47Z | 2022-03-18T17:55:47Z | null | ['CVE-2020-1729'] | Permissions bypass in SmallRye | A flaw was found in SmallRye's API through version 1.6.1. The API can allow other code running within the application server to potentially obtain the ClassLoader, bypassing any permissions checks that should have been applied. The largest threat from this vulnerability is a threat to data confidentiality. This is fixe... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.smallrye.config:smallrye-config'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-1729'}, {'type': 'WEB', 'url': 'https://github.com/smallrye/smallrye-config/commit/fb0def6f61c09a2a80c9145e4ec6521225cd0b99'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=1802444'}] | {'cwe_ids': ['CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-06-01T18:38:31Z', 'nvd_published_at': '2021-05-28T14:15:00Z'} |
1.4.0 | GHSA-gmv4-r438-p67f | 2022-03-11T20:04:26Z | 2022-03-03T19:23:36Z | null | ['CVE-2022-24723'] | Leading white space bypasses protocol validation | ### Impact
Whitespace characters are not removed from the beginning of the protocol, so URLs are not parsed properly and protocol validation mechanisms may fail.
### Patches
Patched in 1.19.9
### Workarounds
Remove leading whitespace from values before passing them to URI.parse (e.g. via `.href(value)` or `new URI(va... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'urijs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.19.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/security/advisories/GHSA-gmv4-r438-p67f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24723'}, {'type': 'WEB', 'url': 'https://github.com/medialize/URI.js/commit/86d10523a6f6e8dc4300d99d671335ee362ad316'}, {'type': 'PACKAGE', 'url'... | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T19:23:36Z', 'nvd_published_at': '2022-03-03T21:15:00Z'} |
1.4.0 | GHSA-3fvf-2gp4-89wq | 2022-03-18T23:17:15Z | 2022-03-18T23:17:15Z | null | [] | Possibility for Denial of Service by overwriting PHP files with language exports | ### Impact
Laravel Translation Manager didn't check the locale name, which allowed directory traversal when exporting files. The content would be a PHP file returning an array of translations, but this could lead to unexpected results, like denial of service. Access to the Laravel Translation Manager is required, becau... | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'barryvdh/laravel-translation-manager'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/barryvdh/laravel-translation-manager/security/advisories/GHSA-3fvf-2gp4-89wq'}, {'type': 'PACKAGE', 'url': 'https://github.com/barryvdh/laravel-translation-manager'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:17:15Z', 'nvd_published_at': None} |
1.4.0 | GHSA-f8q4-jwww-x3wv | 2022-03-29T21:33:25Z | 2022-03-19T00:01:03Z | null | ['CVE-2022-24302'] | Race Condition in Paramiko | In Paramiko before 2.10.1, a race condition (between creation and chmod) in the write_private_key_file function could allow unauthorized information disclosure. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ecosystem_specific': {'affected_functions': ['paramiko.pkey.PKey._write_private_key_file']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.10.0'}, {'fixed': '2.10.1'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'paramiko'}, 'ecosystem_specific'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24302'}, {'type': 'WEB', 'url': 'https://github.com/paramiko/paramiko/commit/4c491e299c9b800358b16fa4886d8d94f45abe2e'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-f8q4-jwww-x3wv'}, {'type': 'PACKAGE', 'url': 'https://github.co... | {'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T20:52:09Z', 'nvd_published_at': '2022-03-17T22:15:00Z'} |
1.4.0 | GHSA-gv26-jpj9-c8gq | 2022-03-18T17:52:25Z | 2022-03-18T17:52:25Z | null | ['CVE-2021-29607'] | Incomplete validation in `SparseSparseMinimum` | ### Impact
Incomplete validation in `SparseAdd` results in allowing attackers to exploit undefined behavior (dereferencing null pointers) as well as write outside of bounds of heap allocated data:
```python
import tensorflow as tf
a_indices = tf.ones([45, 92], dtype=tf.int64)
a_values = tf.ones([45], dtype=tf.int64)... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'tensorflow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/security/advisories/GHSA-gv26-jpj9-c8gq'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29607'}, {'type': 'WEB', 'url': 'https://github.com/tensorflow/tensorflow/commit/ba6822bd7b7324ba201a28b2f278c29a98edbef2'}, {'type': 'WEB',... | {'cwe_ids': ['CWE-754'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-17T22:18:43Z', 'nvd_published_at': '2021-05-14T20:15:00Z'} |
1.4.0 | GHSA-46c5-pfj8-fv65 | 2022-03-18T22:36:03Z | 2022-03-18T22:36:03Z | null | [] | Improperly checked metadata on tools/armour itemstacks received from the client | ### Impact
Due to a workaround applied in 1.13, an attacker may send a negative damage/meta value in a tool or armour item's NBT, which `TypeConverter` then blindly uses as if it was valid without being checked.
When this invalid metadata value reaches `Durable->setDamage()`, an exception is thrown because the metadat... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pocketmine/pocketmine-mp'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/security/advisories/GHSA-46c5-pfj8-fv65'}, {'type': 'WEB', 'url': 'https://github.com/pmmp/PocketMine-MP/commit/c8e1cfcbee4945fd4b63d2a7e96025c59744d4f1'}, {'type': 'PACKAGE', 'url': 'https://github.com/pmmp/PocketMine-MP'}] | {'cwe_ids': ['CWE-704'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:36:03Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5fxf-x22x-5q38 | 2022-03-22T20:02:30Z | 2022-03-13T00:00:54Z | null | ['CVE-2022-0929'] | Cross-site Scripting in microweber | XSS on dynamic_text module in GitHub repository microweber/microweber prior to 1.2.12. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0929'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/de6d17b52d261902653fbdd2ecefcaac82e54256'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:54:55Z', 'nvd_published_at': '2022-03-12T11:15:00Z'} |
1.4.0 | GHSA-5jgq-x857-p8xw | 2022-03-18T20:07:34Z | 2022-03-07T21:45:59Z | null | ['CVE-2022-24738'] | Account compromise in Evmos | ## Impact
_What kind of vulnerability is it? Who is impacted?_
### Classification
The vulnerability has been classified as `critical` with a score of `9.0` (highest). It has the potential to affect and drain unclaimed airdrop funds from Cosmos and Osmosis eligible user addresses.
### Disclosure
The attack requires ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/tharsis/evmos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tharsis/evmos/security/advisories/GHSA-5jgq-x857-p8xw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24738'}, {'type': 'WEB', 'url': 'https://github.com/tharsis/evmos/commit/28870258d4ee9f1b8aeef5eba891681f89348f71'}, {'type': 'PACKAGE', 'url': 'htt... | {'cwe_ids': ['CWE-287'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T21:45:59Z', 'nvd_published_at': '2022-03-07T22:15:00Z'} |
1.4.0 | GHSA-x3mh-jvjw-3xwx | 2022-08-11T21:38:00Z | 2022-03-16T00:00:45Z | null | ['CVE-2022-0778'] | openssl-src's infinite loop in `BN_mod_sqrt()` reachable when parsing certificates | The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded i... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '300.0.0'}, {'fixed': '300.0.5'}]}]}, {'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '111.18.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0778'}, {'type': 'WEB', 'url': 'https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf'}, {'type': 'WEB', 'url': 'https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=3118eb64934499d93db3230748a452351d1d9a65'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-835'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T20:40:34Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-xr2c-5w89-63pv | 2022-09-19T20:18:27Z | 2022-03-23T00:00:24Z | null | ['CVE-2022-26184'] | Poetry before v1.1.9 contains Untrusted Search Path | Poetry prior to v1.1.9 was discovered to contain an untrusted search path which causes the application to behave in unexpected ways when users execute Poetry commands in a directory containing malicious content. This vulnerability occurs when the application is ran on Windows OS. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'poetry'}, 'ecosystem_specific': {'affected_functions': ['poetry.core.vcs.git.GitConfig.__init__']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26184'}, {'type': 'WEB', 'url': 'https://github.com/python-poetry/poetry-core/pull/205/commits/fa9cb6f358ae840885c700f954317f34838caba7'}, {'type': 'WEB', 'url': 'https://github.com/python-poetry/poetry-core/commit/1e1a109a1009daaab2367ce90c997f0cb... | {'cwe_ids': ['CWE-426'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T13:13:52Z', 'nvd_published_at': '2022-03-21T22:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.