schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-7cr9-rmqr-fpqp
2022-03-28T22:34:57Z
2022-03-12T00:00:37Z
null
['CVE-2022-25511']
Path traversal in FreeTAKServer-UI
An issue in the ?filename= argument of the route /DataPackageTable in FreeTAKServer-UI v1.9.8 allows attackers to place arbitrary files anywhere on the system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'FreeTAKServer-UI'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25511'}, {'type': 'WEB', 'url': 'https://github.com/FreeTAKTeam/UI/issues/29'}, {'type': 'PACKAGE', 'url': 'https://github.com/FreeTAKTeam/UI'}]
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:14:05Z', 'nvd_published_at': '2022-03-11T00:15:00Z'}
1.4.0
GHSA-25f2-wgxj-ph29
2022-11-30T20:53:30Z
2022-03-30T00:00:23Z
null
['CVE-2022-28151']
Missing permission check in Jenkins Job and Node ownership Plugin
A missing permission check in Jenkins Job and Node ownership Plugin 0.13.0 and earlier allows attackers with Item/Read permission to change the owners and item-specific permissions of a job.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.synopsys.jenkinsci:ownership'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28151'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ownership-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:53:30Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-4c7h-f2j9-9c46
2022-04-05T19:50:57Z
2022-03-30T00:00:21Z
null
['CVE-2022-28158']
Missing permission Phoenix AutoTest Plugin
A missing permission check in Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.surenpi.jenkins:phoenix-autotest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28158'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/phoenix-autotest-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2685'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-sec...
{'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T19:50:57Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-v4rr-65x6-g69f
2022-05-03T20:56:05Z
2022-03-30T00:00:25Z
null
['CVE-2022-28140']
XXE vulnerability in Jenkins Flaky Test Handler Plugin
Jenkins Flaky Test Handler Plugin 1.2.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:flaky-test-handler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28140'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/flaky-test-handler-plugin/commit/c4ab38fef3658a02315a00288b934bdd9981b3a4'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/flaky-test-handler-plugin'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T20:56:05Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-mhfv-8rc9-w38c
2022-03-26T00:06:00Z
2022-03-26T00:06:00Z
null
[]
Arbitrary shell execution
Uses of shell_exec() and exec() were not escaping filenames and configuration settings in most cases
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'squizlabs/php_codesniffer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.8.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/squizlabs/php_codesniffer/2017-03-01.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/squizlabs/PHP_CodeSniffer'}, {'type': 'WEB', 'url': 'https://github.com/squizlabs/PHP_CodeSniffer/releases/tag/2.8.1'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:06:00Z', 'nvd_published_at': None}
1.4.0
GHSA-6h3m-36w8-hv68
2022-03-24T00:21:10Z
2022-03-10T22:07:30Z
null
['CVE-2022-26652']
Arbitrary file write in nats-server
(This document is canonically: <https://advisories.nats.io/CVE/CVE-2022-26652.txt>) ## Background NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. JetStream is the optional RAFT-based resilient persistent feature of NATS...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.7.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-streaming-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1...
[{'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/security/advisories/GHSA-6h3m-36w8-hv68'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26652'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/pull/2917'}, {'type': 'WEB', 'url': 'https://advisories.nats.io/CVE/CV...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T22:07:30Z', 'nvd_published_at': '2022-03-10T17:47:00Z'}
1.4.0
GHSA-446w-rrm4-r47f
2022-03-18T20:06:07Z
2022-03-03T19:26:11Z
null
['CVE-2022-24725']
Exposure of home directory through shescape on Unix with Bash
### Impact The issue allows for exposure of the home directory on Unix systems when using Bash with the `escape` or `escapeAll` functions from the _shescape_ API with the `interpolation` option set to `true`. Other tested shells, Dash and Zsh, are not affected. ```javascript const cp = require("child_process"); const...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'shescape'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.5.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-446w-rrm4-r47f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24725'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/issues/169'}, {'type': 'WEB', 'url': 'https://github.com/eri...
{'cwe_ids': ['CWE-200', 'CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T19:26:11Z', 'nvd_published_at': '2022-03-03T22:15:00Z'}
1.4.0
GHSA-qf2g-q4mc-w7rr
2022-03-30T21:04:25Z
2022-03-25T00:00:34Z
null
['CVE-2022-0145']
Cross-site Scripting in Fork CMS
Fork CMS prior to 5.11.1 is vulnerable to stored cross-site scripting. When uploading a new module, the description of the module can contain JavaScript code. The JavaScript code may be executed after uploading the new module and looking at the `Details` page.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0145'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/981730f1a3d59b423ca903b1f4bf79b848a1766e'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b5b8c680-3cd9...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T20:36:53Z', 'nvd_published_at': '2022-03-24T11:15:00Z'}
1.4.0
GHSA-9j59-75qj-795w
2023-09-04T17:06:16Z
2022-03-11T23:10:32Z
null
['CVE-2022-24303']
Path traversal in Pillow
Pillow before 9.0.1 allows attackers to delete files because spaces in temporary pathnames are mishandled.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24303'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/3450'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/427221ef5f19157001bf8b1ad7cfe0b905ca8c26'}, {'type': 'ADVISORY', 'url': 'https://github.com...
{'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T23:10:32Z', 'nvd_published_at': '2022-03-28T02:15:00Z'}
1.4.0
GHSA-83vp-6jqg-6cmr
2022-03-18T20:15:32Z
2022-03-10T18:02:14Z
null
['CVE-2022-24748']
Incorrect Authentication in shopware
### Impact Modify Customers, create Orders without App Permission ## Patches We recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview. https://www.shopware.com/en/download/#shopware-6 ## Workarounds For older versions...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.8.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.8.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-83vp-6jqg-6cmr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24748'}, {'type': 'WEB', 'url': 'https://github.com/shopware/core/commit/329e4d7e028dd8081496cf8bd3acc822000b0ec0'}, {'type': 'WEB', 'url': 'htt...
{'cwe_ids': ['CWE-287', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T18:02:14Z', 'nvd_published_at': '2022-03-09T23:15:00Z'}
1.4.0
GHSA-xvch-5gv4-984h
2023-02-27T14:47:14Z
2022-03-18T00:01:09Z
null
['CVE-2021-44906']
Prototype Pollution in minimist
Minimist prior to 1.2.6 and 0.2.4 is vulnerable to Prototype Pollution via file `index.js`, function `setKey()` (lines 69-95).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'minimist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'minimist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44906'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/issues/11'}, {'type': 'WEB', 'url': 'https://github.com/substack/minimist/issues/164'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/pull/24'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:13:40Z', 'nvd_published_at': '2022-03-17T16:15:00Z'}
1.4.0
GHSA-hf4q-52x6-4p57
2022-03-28T22:23:29Z
2022-03-11T00:02:36Z
null
['CVE-2022-0906']
Unrestricted file upload leads to stored cross-site scripting in Microweber
Microweber prior to version 1.2.12 allows unrestricted file upload, which could lead to stored cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0906'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/d9bae9df873c2d2a13a2eb08d512019d49ebca68'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T22:23:29Z', 'nvd_published_at': '2022-03-10T15:15:00Z'}
1.4.0
GHSA-rf54-44jr-q5vf
2022-03-28T22:33:07Z
2022-03-12T00:00:26Z
null
['CVE-2022-25839']
Improper Input Validation in url-js
The package url-js before 2.1.0 is vulnerable to Improper Input Validation due to improper parsing, which makes it is possible for the hostname to be spoofed. http://\\\\\\\\localhost and http://localhost are the same URL. However, the hostname is not parsed as localhost, and the backslash is reflected as it is.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'url-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25839'}, {'type': 'WEB', 'url': 'https://github.com/duzun/URL.js/commit/9dc9fcc99baa4cbda24403d81a589e9b0f4121d0'}, {'type': 'PACKAGE', 'url': 'https://github.com/duzun/URL.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-URLJS-2414030'}]
{'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:28:46Z', 'nvd_published_at': '2022-03-11T20:15:00Z'}
1.4.0
GHSA-2rmm-87v7-34rj
2022-03-15T21:34:09Z
2022-03-06T00:00:17Z
null
['CVE-2022-25312']
Improper Restriction of XML External Entity Reference in Any23
An XML external entity (XXE) injection vulnerability was discovered in the Any23 RDFa XSLTStylesheet extractor and is known to affect Any23 versions < 2.7. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data....
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.any23:apache-any23'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25312'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/any23'}, {'type': 'WEB', 'url': 'https://github.com/apache/any23/blob/any23-2.7/RELEASE-NOTES.md'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/y6cm5n3ksohsrhzqknqhzy7p3mtky...
{'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T20:09:23Z', 'nvd_published_at': '2022-03-05T00:15:00Z'}
1.4.0
GHSA-vpwq-6cp4-ffqc
2022-03-28T18:40:15Z
2022-03-16T00:00:49Z
null
['CVE-2022-0945']
Stored Cross-site Scripting in ShowDoc
ShowDoc prior to version 2.10.4 is vulnerable to stored cross-site scripting viva `axd` and `cshtml` file upload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0945'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/ba45d19e1d77a7eea866dab30eff5da552694891'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8702e2bf-4af2...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T18:40:15Z', 'nvd_published_at': '2022-03-15T04:15:00Z'}
1.4.0
GHSA-wfxp-4qgw-qp3c
2022-03-18T17:52:43Z
2022-03-18T17:52:43Z
null
['CVE-2021-21656']
XML external entity (XXE) attacks in Jenkins Xcode integration Plugin
Jenkins Xcode integration Plugin 2.0.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xcode-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21656'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2335'}]
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:20:58Z', 'nvd_published_at': '2021-05-11T15:15:00Z'}
1.4.0
GHSA-j6jg-w79c-7p8v
2022-03-28T19:36:26Z
2022-03-16T00:00:48Z
null
['CVE-2022-0951']
File Upload Restriction Bypass leading to Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to a file upload restriction bypass leading to stored cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0951'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b3a983a3-17f9...
{'cwe_ids': ['CWE-434', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T19:36:26Z', 'nvd_published_at': '2022-03-15T09:15:00Z'}
1.4.0
GHSA-62hc-f8qj-5xc3
2022-04-05T19:49:14Z
2022-03-30T00:00:22Z
null
['CVE-2022-28157']
Path traversal in Phoenix AutoTest Plugin
Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Item/Configure permission to upload arbitrary files from the Jenkins controller via FTP to an attacker-specified FTP server.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.surenpi.jenkins:phoenix-autotest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28157'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/phoenix-autotest-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2684'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-sec...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T19:49:14Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-6qcc-whgp-pjj2
2022-03-11T20:37:01Z
2022-03-05T00:00:45Z
null
['CVE-2022-0832']
Cross-site Scripting in Pimcore
Pimcore version 10.3.2 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 10.3.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.3.2'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0832'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/8ab06bfbb5a05a1b190731d9c7476ec45f5ee878'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/be450b60-bc8f...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T20:37:01Z', 'nvd_published_at': '2022-03-04T14:15:00Z'}
1.4.0
GHSA-3988-h75v-hwf6
2022-03-26T00:06:45Z
2022-03-26T00:06:45Z
null
[]
Arbitrary shell execution
A properly crafted filename would allow for arbitrary code execution when using the --filter=gitmodified command line option
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'squizlabs/php_codesniffer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/squizlabs/php_codesniffer/2017-05-18.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/squizlabs/PHP_CodeSniffer'}, {'type': 'WEB', 'url': 'https://github.com/squizlabs/PHP_CodeSniffer/releases/tag/3.0.1'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:06:45Z', 'nvd_published_at': None}
1.4.0
GHSA-5mc7-m686-p6jg
2022-03-18T17:57:32Z
2022-03-18T17:57:32Z
null
['CVE-2021-30179']
Deserialization of Untrusted Data in Apache Dubbo
Apache Dubbo prior to 2.6.9 and 2.7.10 by default supports generic calls to arbitrary methods exposed by provider interfaces. These invocations are handled by the GenericFilter which will find the service and method specified in the first arguments of the invocation and use the Java Reflection API to make the final cal...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.7.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.alibaba:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.6.9'}]}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30179'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rccbcbdd6593e42ea3a1e8fedd12807cb111375c9c40edb005ef36f67%40%3Cdev.dubbo.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rccbcbdd6593e42ea3a1e8fedd1...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T20:18:30Z', 'nvd_published_at': '2021-06-01T14:15:00Z'}
1.4.0
GHSA-fhhx-r983-44xc
2022-11-29T23:03:10Z
2022-03-30T00:00:27Z
null
['CVE-2022-28142']
SSL/TLS certificate validation globally disabled by Jenkins Proxmox Plugin
Jenkins Proxmox Plugin 0.6.0 and earlier disables SSL/TLS certificate validation globally for the Jenkins controller JVM when configured to ignore SSL/TLS issues.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:proxmox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28142'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/proxmox-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2081'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202...
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T23:03:10Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-3mpp-xfvh-qh37
2022-03-16T23:54:35Z
2022-03-16T23:54:35Z
null
[]
node-ipc behavior change
node-ipc version 11.0.0 and newer include a message from the maintainer that is written to the user’s desktop. Please review the version changes before proceeding.
[]
[{'package': {'ecosystem': 'npm', 'name': 'node-ipc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}]}]}]
[{'type': 'PACKAGE', 'url': 'https://github.com/RIAEvangelist/node-ipc'}, {'type': 'WEB', 'url': 'https://github.com/RIAEvangelist/node-ipc/releases/tag/v11.0.0'}]
{'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-16T23:54:35Z', 'nvd_published_at': None}
1.4.0
GHSA-4pww-fqgh-36hj
2022-03-28T15:00:56Z
2022-03-11T00:02:02Z
null
['CVE-2021-44673']
Unrestricted Upload of File with Dangerous Type in Croogo
A Remote Code Execution (RCE) vulnerability exists in Croogo 3.0.2 via admin/file-manager/attachments, which lets a malicious user upload a web shell script.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'croogo/croogo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44673'}, {'type': 'WEB', 'url': 'https://github.com/3erk1n/Vulnerabilities/blob/main/Croogo%203.0.2%20-%20Arbitrary%20File%20Upload-Remote%20Code%20Execution%20(Authenticated).txt'}, {'type': 'PACKAGE', 'url': 'https://github.com/croogo/croogo'}]
{'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T15:00:56Z', 'nvd_published_at': '2022-03-10T18:15:00Z'}
1.4.0
GHSA-2r2c-g63r-vccr
2022-03-18T23:10:48Z
2022-03-18T23:10:48Z
null
['CVE-2022-24773']
Improper Verification of Cryptographic Signature in `node-forge`
### Impact RSA PKCS#1 v1.5 signature verification code is not properly checking `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest. ### Patches The issue has been addressed in `node-forge` `1.3.0`. ### For more infor...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-forge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24773'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:10:48Z', 'nvd_published_at': '2022-03-18T14:15:00Z'}
1.4.0
GHSA-4r8q-gv9j-3xx6
2022-03-18T17:55:07Z
2022-03-18T17:55:07Z
null
['CVE-2021-32645']
Open Redirect
### Impact In some situations, it is possible to have open redirects where users can be redirected from your site to any other site using a specially crafted URL. This is only the case for installations where the default Hostname Identification is used and the environment uses tenants that have `force_https` set to `tr...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'hyn/multi-tenant'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.6.0'}, {'fixed': '5.7.2'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/tenancy/multi-tenant/security/advisories/GHSA-4r8q-gv9j-3xx6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32645'}, {'type': 'WEB', 'url': 'https://github.com/tenancy/multi-tenant/commit/9c837a21bccce9bcaeb90033ef200d84f0d9e164'}, {'type': 'WEB', '...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T20:40:11Z', 'nvd_published_at': '2021-05-27T17:15:00Z'}
1.4.0
GHSA-8v3j-jfg3-v3fv
2022-09-06T19:45:27Z
2022-03-18T00:01:11Z
null
['CVE-2021-44908']
Prototype Pollution in Sails.js
Sails.js <= 1.5.2 is vulnerable to Prototype Pollution via controller/load-action-modules.js, function loadActionModules(). A [patch](https://github.com/balderdashy/sails/commit/7c5379a656bb305c958df1dcc2b51a9668830358) is available in the `master` branch of Sails.js's GItHub repository.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'sails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44908'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/sails/issues/7209'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/sails/commit/7c5379a656bb305c958df1dcc2b51a9668830358'}, {'type': 'WEB', 'url': 'https://github.com/Marynk/J...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:04:49Z', 'nvd_published_at': '2022-03-17T12:15:00Z'}
1.4.0
GHSA-42qm-c3cf-9wv2
2022-03-10T15:55:03Z
2022-03-03T00:00:49Z
null
['CVE-2022-0819']
Code injection in dolibarr/dolibarr
Improper php function sanitization, lead to an ability to inject arbitrary PHP code and run arbitrary commands on file system. In the function "dol_eval" in file "dolibarr/htdocs/core/lib/functions.lib.php" dangerous PHP functions are sanitized using "str_replace" and can be bypassed using following code in $s paramete...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.0.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0819'}, {'type': 'WEB', 'url': 'https://github.com/dolibarr/dolibarr/commit/2a48dd349e7de0d4a38e448b0d2ecbe25e968075'}, {'type': 'PACKAGE', 'url': 'https://github.com/dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b03d4415-...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T19:12:38Z', 'nvd_published_at': '2022-03-02T16:15:00Z'}
1.4.0
GHSA-vmf7-hmh6-vv57
2022-03-18T20:06:58Z
2022-03-05T00:00:46Z
null
['CVE-2022-23328']
Denial of Service in Go-Ethereum
A design flaw in all versions of Go-Ethereum allows an attacker node to send 5120 pending transactions of a high gas price from one account that all fully spend the full balance of the account to a victim Geth node, which can purge all of pending transactions in a victim node's memory pool and then occupy the memory po...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.16'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23328'}, {'type': 'WEB', 'url': 'https://dl.acm.org/doi/pdf/10.1145/3460120.3485369'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}, {'type': 'WEB', 'url': 'https://tristartom.github.io/docs/ccs21.pdf'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-09T19:20:00Z', 'nvd_published_at': '2022-03-04T12:15:00Z'}
1.4.0
GHSA-66ww-999q-mffq
2022-03-25T14:29:33Z
2022-03-18T00:01:11Z
null
['CVE-2022-0748']
Arbitrary code execution in post-loader
post-loader is webpack loader for blog posts written in Markdown. The package post-loader from 0.0.0 is vulnerable to Arbitrary Code Execution which uses a markdown parser in an unsafe way so that any javascript code inside the markdown input files gets evaluated and executed. At this time, there is no known workaround...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'post-loader'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0748'}, {'type': 'PACKAGE', 'url': 'https://github.com/egoist/post-loader'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-POSTLOADER-2403737'}]
{'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:01:29Z', 'nvd_published_at': '2022-03-17T12:15:00Z'}
1.4.0
GHSA-h2g5-2rhx-ffgj
2022-03-14T23:12:25Z
2022-03-05T00:00:44Z
null
['CVE-2022-24727']
Command injection in Weblate
Weblate is a web based localization tool with tight version control integration. Prior to version 4.11.1, Weblate didn't properly sanitize some arguments passed to Git and Mercurial, allowing them to change their behavior in an unintended way. Instances where untrusted users cannot create new components are not affecte...
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'Weblate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/security/advisories/GHSA-3872-f48p-pxqj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24727'}, {'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/commit/35d59f1f040541c358cece0a8d4a63183ca919b8'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:12:25Z', 'nvd_published_at': '2022-03-04T17:15:00Z'}
1.4.0
GHSA-p4jg-pccf-h82c
2022-04-06T23:57:05Z
2022-03-31T00:00:24Z
null
['CVE-2022-27815']
Insecure Temporary File in SWHKD
SWHKD is a display protocol-independent hotkey daemon made in Rust. In SWHKD versions 1.1.5 and prior, SWHKD uses the /tmp/swhkd.pid pathname. As /tmp is accessible to all users, there can be an information leak or denial of service. No known workarounds exist. A patch is available on the `1.1.0` branch of the reposito...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'Simple-Wayland-HotKey-Daemon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27815'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/commit/e661a4940df78fbb7b52c622ac4ae6a3a7f7d8aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/waycrate/swhkd'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/release...
{'cwe_ids': ['CWE-377', 'CWE-59'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T15:15:36Z', 'nvd_published_at': '2022-03-30T00:15:00Z'}
1.4.0
GHSA-chr6-386q-4m3v
2022-11-30T20:28:46Z
2022-03-16T00:00:44Z
null
['CVE-2022-27200']
Stored Cross-site Scripting vulnerability in Jenkins Folder-based Authorization Strategy Plugin
Jenkins Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:folder-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27200'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/folder-auth-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2646'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:28:46Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-pq37-4c4g-v38c
2022-03-23T13:54:04Z
2022-03-15T00:01:02Z
null
['CVE-2022-0341']
Cross-site Scripting in vditor
vditor prior to version 3.8.11 is vulnerable to cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'vditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0341'}, {'type': 'WEB', 'url': 'https://github.com/Vanessa219/vditor/issues/1102'}, {'type': 'WEB', 'url': 'https://github.com/vanessa219/vditor/commit/219f8a9e272aba3cbc0096a82cac776532dbb9e5'}, {'type': 'PACKAGE', 'url': 'https://github.com/vanes...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T13:54:04Z', 'nvd_published_at': '2022-03-14T04:15:00Z'}
1.4.0
GHSA-2j6v-xpf3-xvrv
2022-03-10T15:59:41Z
2022-03-01T18:58:23Z
null
['CVE-2021-41193']
Use of Externally-Controlled Format String in wire-avs
### Impact A remote format string vulnerability allowed an attacker to cause a denial of service or possibly execute arbitrary code. ### Patches * The issue has been fixed in wire-avs 7.1.12 and is already included on all Wire products (currently used version is 8.0.x) ### Workarounds * No workaround known ### Refer...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.wire:avs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.12'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/wireapp/wire-avs/security/advisories/GHSA-2j6v-xpf3-xvrv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41193'}, {'type': 'WEB', 'url': 'https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe'}, {'type': 'PACKAGE', 'url'...
{'cwe_ids': ['CWE-134'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T18:58:23Z', 'nvd_published_at': '2022-03-01T19:15:00Z'}
1.4.0
GHSA-8g9w-5jv6-7m4x
2022-11-30T18:45:18Z
2022-03-16T00:00:42Z
null
['CVE-2022-27218']
Personal tokens stored in plain text by Jenkins incapptic connect uploader Plugin
Jenkins incapptic connect uploader Plugin 1.15 and earlier stores tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.incapptic.plugins:incapptic-connect-uploader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27218'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/incapptic-connect-uploader-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2273'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lis...
{'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T18:45:18Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-xpgc-j48j-jwv9
2022-03-30T14:53:34Z
2022-03-26T00:00:31Z
null
['CVE-2021-20323']
Cross-site Scripting in Keycloak
A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak version 15. The issue was fixed in version 17.0.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '17.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20323'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2013577'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T14:53:34Z', 'nvd_published_at': '2022-03-25T19:15:00Z'}
1.4.0
GHSA-2877-693q-pj33
2022-03-14T21:30:21Z
2022-03-07T00:00:40Z
null
['CVE-2021-46704']
OS Command Injection in GenieACS
In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'genieacs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46704'}, {'type': 'WEB', 'url': 'https://github.com/genieacs/genieacs/commit/7f295beeecc1c1f14308a93c82413bb334045af6'}, {'type': 'PACKAGE', 'url': 'https://github.com/genieacs/genieacs'}, {'type': 'WEB', 'url': 'https://github.com/genieacs/genieac...
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T20:11:56Z', 'nvd_published_at': '2022-03-06T07:15:00Z'}
1.4.0
GHSA-jr9c-h74f-2v28
2023-06-30T20:12:44Z
2022-03-11T00:02:35Z
null
['CVE-2022-0905']
Gitea Missing Authorization vulnerability
Gitea 1.16.3 and prior is vulnerable to missing authorization. A patch is available as part of the 1.16.4 release.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.16.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0905'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/commit/1314f38b59748397b3429fb9bc9f9d6bac85d2f2'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/commit/3e5c844a7758fa29126d201f4f98bf21bca6d314'}, {'type': 'PACKAGE', 'u...
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T20:32:37Z', 'nvd_published_at': '2022-03-10T15:15:00Z'}
1.4.0
GHSA-vxrc-68xx-x48g
2023-09-21T19:49:03Z
2022-03-26T00:25:25Z
null
['CVE-2019-9942']
Twig Sandbox Information Disclosure
A sandbox information disclosure exists in Twig before 1.38.0 and 2.x before 2.7.0 because, under some circumstances, it is possible to call the `__toString()` method on an object even if not allowed by the security policy in place.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'twig/twig'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.38.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'twig/twig'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ra...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9942'}, {'type': 'WEB', 'url': 'https://github.com/twigphp/Twig/commit/eac5422956e1dcca89a3669a03a3ff32f0502077'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/twig/twig/CVE-2019-9942.yaml'}, {'type': 'PAC...
{'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:25:25Z', 'nvd_published_at': '2019-03-23T15:29:00Z'}
1.4.0
GHSA-4fc4-4p5g-6w89
2022-03-30T20:05:59Z
2022-03-16T22:47:55Z
null
['CVE-2022-24728']
Cross-site Scripting in CKEditor4
### Affected packages The vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4. ### Impact A potential vulnerability has been discovered in CKEditor 4 HTML processing core module. The vulnerability allowed to inject malformed HTML bypassing content sanitiza...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'ckeditor4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.18.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-4fc4-4p5g-6w89'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24728'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/commit/d158413449692d920a778503502dcb22881bc949'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-16T22:47:55Z', 'nvd_published_at': '2022-03-16T16:15:00Z'}
1.4.0
GHSA-v2rg-8cwr-75g8
2022-03-18T17:56:08Z
2022-03-18T17:56:08Z
null
['CVE-2021-25641']
Deserializer tampering in Apache Dubbo
Each Apache Dubbo server will set a serialization id to tell the clients which serialization protocol it is working on. But for Dubbo versions before 2.7.8 or 2.6.9, an attacker can choose which serialization id the Provider will use by tampering with the byte preamble flags, aka, not following the server's instruction...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.7.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.alibaba:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.6.9'}]}]}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25641'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r99ef7fa35585d3a68762de07e8d2b2bc48b8fa669a03e8d84b9673f3%40%3Cdev.dubbo.apache.org%3E'}]
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T19:44:59Z', 'nvd_published_at': '2021-06-01T14:15:00Z'}
1.4.0
GHSA-4f7p-27jc-3c36
2022-03-18T19:00:59Z
2022-03-18T19:00:59Z
null
['CVE-2022-24761']
HTTP Request Smuggling in waitress
### Impact When using Waitress behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and where it ends. This would allow requests to be smuggled via the front-end proxy to waitress and later behav...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-4f7p-27jc-3c36'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24761'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/9e0b8c801e4d505c2ffc91b891af4ba48af715e0'}, {'type': 'PACKAGE', 'url': ...
{'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T19:00:59Z', 'nvd_published_at': '2022-03-17T13:15:00Z'}
1.4.0
GHSA-9fcc-7g44-mxrj
2022-03-29T17:30:52Z
2022-03-16T00:00:47Z
null
['CVE-2022-0942']
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via uploading files with files in `.xsd`, `.asa`, and `.aspx` formats.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0942'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a412707c-18da...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T17:30:52Z', 'nvd_published_at': '2022-03-15T14:15:00Z'}
1.4.0
GHSA-vc5r-xfc4-4x22
2022-03-30T21:03:02Z
2022-03-25T00:00:33Z
null
['CVE-2022-0955']
Cross-site Scripting in Pimcore Datahub
Pimcore Datahub prior to 1.2.4 is vulnerable to stored cross-site scripting. An admin user accessing Datahub triggers the attack, which may result in the user's cookie being stolen.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/data-hub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0955'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/data-hub/commit/15d5b57af2466eebd3bbc531ead5dafa35d0a36e'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/data-hub'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/708971a6-1e...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T21:03:02Z', 'nvd_published_at': '2022-03-24T15:15:00Z'}
1.4.0
GHSA-57j2-w4cx-62h2
2022-03-25T21:37:08Z
2022-03-12T00:00:36Z
null
['CVE-2020-36518']
Deeply nested json in jackson-databind
jackson-databind is a data-binding package for the Jackson Data Processor. jackson-databind allows a Java stack overflow exception and denial of service via a large depth of nested objects.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13.0'}, {'fixed': '2.13.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.13.2.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxm...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36518'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2816'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/fcfc4998ec23f0b1f7f8a9521c2b317b6c25892b'}, {'type': 'PACKAGE', 'url': 'https...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-22T14:36:44Z', 'nvd_published_at': '2022-03-11T07:15:00Z'}
1.4.0
GHSA-jc36-42cf-vqwj
2023-06-23T21:37:14Z
2022-03-26T00:00:33Z
null
['CVE-2018-25032']
Nokogiri affected by zlib's Out-of-bounds Write vulnerability
zlib 1.2.11 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25032'}, {'type': 'WEB', 'url': 'https://github.com/madler/zlib/issues/605'}, {'type': 'WEB', 'url': 'https://github.com/madler/zlib/commit...
{'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:37:14Z', 'nvd_published_at': '2022-03-25T09:15:00Z'}
1.4.0
GHSA-h2fw-93qx-vrcq
2022-04-01T18:03:23Z
2022-03-26T00:00:29Z
null
['CVE-2022-0983']
SQL Injection in Moodle
An SQL injection risk was identified in Badges code relating to configuring criteria. Access to the relevant capability was limited to teachers and managers by default.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.10'}]}]}...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0983'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/c2794752ea3cdda2d64a0651da08b2cdf730d9f1'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2064119'}, {'type': 'WEB', 'url': 'https://git.moodle.org/gw?p=m...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T18:03:23Z', 'nvd_published_at': '2022-03-25T19:15:00Z'}
1.4.0
GHSA-3f95-r44v-8mrg
2022-03-17T21:46:01Z
2022-03-12T00:00:33Z
null
['CVE-2022-24433']
Command injection in simple-git
The package simple-git before 3.3.0 is vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options, it was possible to get arbitrary command execution.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'simple-git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24433'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/git-js/pull/767'}, {'type': 'PACKAGE', 'url': 'https://github.com/steveukx/git-js'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/git-js/releases/tag/simple-git%403.3.0'}, {'type':...
{'cwe_ids': ['CWE-74', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:30:00Z', 'nvd_published_at': '2022-03-11T17:16:00Z'}
1.4.0
GHSA-2ccw-7px8-vmpf
2022-04-07T00:09:48Z
2022-03-25T19:27:39Z
null
['CVE-2022-24776']
Open Redirect in Flask-AppBuilder
Flask-AppBuilder is an application development framework built on top of Flask. Versions prior to 3.4.5 contain an open redirect vulnerability when using the database authentication login page. There are no known workarounds. Users are recommended to upgrade to version 3.4.5 or later. ### For more information If you h...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'Flask-AppBuilder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-2ccw-7px8-vmpf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24776'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/pull/1804'}, {'type': 'WEB', 'url': 'https://github.com/dp...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-25T19:27:39Z', 'nvd_published_at': '2022-03-24T20:15:00Z'}
1.4.0
GHSA-6fg4-36v7-xv32
2022-11-30T20:39:49Z
2022-03-16T00:00:45Z
null
['CVE-2022-27197']
Stored Cross-site Scripting vulnerability in Jenkins Dashboard View Plugin
Jenkins Dashboard View Plugin 2.18 and earlier does not perform URL validation for the Iframe Portlet's Iframe source URL, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure views. Dashboard View Plugin 2.18.1 performs URL validation for the Iframe Portlet’s Ifram...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dashboard-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.18.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27197'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/dashboard-view-plugin/commit/942c5c78fa834a6be242f144adc2b7f045ccdbc3'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dashboard-view-plugin'}, {'type': 'WEB', 'url': 'https:/...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:39:49Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-vhxc-fhm5-qcp9
2022-03-18T22:56:29Z
2022-03-18T00:01:11Z
null
['CVE-2022-25296']
Prototype Pollution in bodymen
The package bodymen from 0.0.0 are vulnerable to Prototype Pollution via the handler function which could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload. **Note:** This vulnerability derives from an incomplete fix to [CVE-2019-10792](https://security.snyk.io/vuln/SNYK-JS-BO...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'bodymen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25296'}, {'type': 'PACKAGE', 'url': 'https://github.com/diegohaz/bodymen'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BODYMEN-2342623'}]
{'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:56:29Z', 'nvd_published_at': '2022-03-17T12:15:00Z'}
1.4.0
GHSA-v94v-pxqp-5qgj
2022-03-28T19:27:08Z
2022-03-16T00:00:48Z
null
['CVE-2022-0950']
Cross-site Scripting in ShowDoc
The upload feature of ShowDoc prior to version 2.10.4 allows files with the extension `.*html`, which leads to stored cross-site scripting.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0950'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/acc23996-bd57...
{'cwe_ids': ['CWE-434', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T19:27:08Z', 'nvd_published_at': '2022-03-15T09:15:00Z'}
1.4.0
GHSA-mqvp-7rrg-9jxc
2022-03-29T19:10:58Z
2022-03-05T00:00:44Z
null
['CVE-2022-26336']
Improper Input Validation and Allocation of Resources Without Limits or Throttling in poi-scratchpad
A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supp...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.poi:poi-scratchpad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26336'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221028-0006/'}]
{'cwe_ids': ['CWE-20', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T16:12:37Z', 'nvd_published_at': '2022-03-04T16:15:00Z'}
1.4.0
GHSA-gv9j-4w24-q7vx
2022-03-01T21:03:11Z
2022-03-01T21:03:11Z
null
[]
Improper random number generation in github.com/coredns/coredns
### Impact CoreDNS before 1.6.6 (using go DNS package < 1.1.25) improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries. ### Patches The problem has been fixed in 1.6.6+. ### References - [CVE-2019-19794](https://nvd.nist.gov/vuln/detail/CVE-2019-197...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/coredns/coredns'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.6'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/coredns/coredns/security/advisories/GHSA-gv9j-4w24-q7vx'}, {'type': 'PACKAGE', 'url': 'github.com/coredns/coredns'}]
{'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:03:11Z', 'nvd_published_at': None}
1.4.0
GHSA-p93v-m2r2-4387
2022-03-01T21:05:01Z
2022-03-01T21:05:01Z
null
[]
Denial of service via insufficient metadata validation
The PAM module for `fscrypt` through v0.3.2 doesn't adequately validate `fscrypt` metadata files, allowing users to create malicious metadata files that prevent other users from logging in. A local user can cause a denial of service by creating a `fscrypt` metadata file that prevents other users from logging into the s...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/google/fscrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/google/fscrypt/security/advisories/GHSA-p93v-m2r2-4387'}, {'type': 'PACKAGE', 'url': 'github.com/google/fscrypt'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:05:01Z', 'nvd_published_at': None}
1.4.0
GHSA-4v37-24gm-h554
2022-03-01T21:47:28Z
2022-03-01T21:47:28Z
null
['CVE-2022-24712']
Cross-Site Request Forgery (CSRF) Protection Bypass Vulnerability in CodeIgniter4
### Impact This vulnerability might allow remote attackers to bypass the CodeIgniter4 CSRF protection mechanism. ### Patches Upgrade to v4.1.9 or later. ### Workarounds These are workarounds for this vulnerability, but **you will still need to code as these after upgrading to v4.1.9**. Otherwise, the CSRF protection...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter4/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.9'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-4v37-24gm-h554'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24712'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/blob/7dc2ece32401ebde67122f7d2460efcaee7c352e/user_guide_s...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:47:28Z', 'nvd_published_at': '2022-02-28T16:15:00Z'}
1.4.0
GHSA-gjh6-wvhq-h4qx
2022-03-29T19:04:44Z
2022-03-12T00:00:37Z
null
['CVE-2022-25507']
Cross-site Scripting in FreeTAKServer-UI
FreeTAKServer-UI v1.9.8 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Callsign parameter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'FreeTAKServer-UI'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25507'}, {'type': 'WEB', 'url': 'https://github.com/FreeTAKTeam/UI/issues/28'}, {'type': 'PACKAGE', 'url': 'https://github.com/FreeTAKTeam/UI'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T19:04:44Z', 'nvd_published_at': '2022-03-11T00:15:00Z'}
1.4.0
GHSA-x75r-g63m-82wj
2022-11-30T18:55:24Z
2022-03-16T00:00:43Z
null
['CVE-2022-27216']
Passwords stored in plain text by Jenkins dbCharts Plugin
Jenkins dbCharts Plugin 0.5.2 and earlier stores JDBC connection passwords unencrypted in its global configuration file `hudson.plugins.dbcharts.DbChartPublisher.xml` on the Jenkins controller as part of its configuration. These passwords can be viewed by users with access to the Jenkins controller file system.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dbCharts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27216'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dbCharts-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2159'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20...
{'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T18:55:24Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-h3q4-vmw4-cpr5
2022-03-28T22:26:45Z
2022-03-16T00:00:38Z
null
['CVE-2021-29134']
Path Traversal in Gitea
The avatar middleware in Gitea before 1.13.6 allows Directory Traversal via a crafted URL.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29134'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/15125/files'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-gitea/gitea'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/releases'}, {'type': 'WEB', 'url': 'ht...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:27:37Z', 'nvd_published_at': '2022-03-15T21:15:00Z'}
1.4.0
GHSA-mw75-qvfr-hpmr
2022-03-23T15:38:52Z
2022-03-15T00:01:01Z
null
['CVE-2022-0938']
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0938'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/830c89a4c2c5fd0dd491422bf8e97b4eb5713f55'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3eb5a8f9-24e3...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T14:09:09Z', 'nvd_published_at': '2022-03-14T08:15:00Z'}
1.4.0
GHSA-vrcc-g6vj-mh5w
2022-03-30T20:05:12Z
2022-03-18T00:01:13Z
null
['CVE-2021-42219']
Denial of service in go-ethereum
Go-Ethereum v1.10.9 was discovered to contain an issue which allows attackers to cause a denial of service (DoS) via sending an excessive amount of messages to a node. This is caused by missing memory in the component /ethash/algorithm.go.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42219'}, {'type': 'WEB', 'url': 'https://docs.google.com/document/d/1dYFSpNZPC0OV-n1mMqdc269u9yYU1XQy/edit?usp=sharing&ouid=112110745137218798745&rtpof=true&sd=true'}]
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:37:32Z', 'nvd_published_at': '2022-03-17T00:15:00Z'}
1.4.0
GHSA-fmx4-26r3-wxpf
2022-03-03T20:28:47Z
2022-03-03T20:28:47Z
null
[]
Integer overflow in cmark-gfm table parsing extension leads to heap memory corruption
### Impact CommonMarker uses `cmark-gfm` for rendering [Github Flavored Markdown](https://github.github.com/gfm/). An [integer overflow in `cmark-gfm`'s table row parsing](https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x) may lead to heap memory corruption when parsing tables who's marker ro...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'commonmarker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x'}, {'type': 'WEB', 'url': 'https://github.com/gjtorikian/commonmarker/security/advisories/GHSA-fmx4-26r3-wxpf'}, {'type': 'WEB', 'url': 'https://github.com/gjtorikian/commonmarker/commit/ab4504fd17460627a6ab255bc3c63e8e...
{'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T20:28:47Z', 'nvd_published_at': None}
1.4.0
GHSA-85f9-w9cx-h363
2022-11-30T20:54:57Z
2022-03-30T00:00:23Z
null
['CVE-2022-28150']
Cross site request forgery in Jenkins Job and Node ownership Plugin
Job and Node ownership Plugin 0.13.0 and earlier does not perform a permission check in several HTTP endpoints. This allows attackers with Item/Read permission to change the owners and item-specific permissions of a job. Additionally, this endpoint does not require POST requests, resulting in a cross-site request forge...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.synopsys.jenkinsci:ownership'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28150'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ownership-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:35:41Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-vx8q-j7h9-vf6q
2022-03-17T21:43:51Z
2022-03-11T00:02:24Z
null
['CVE-2022-0813']
Exposure of Sensitive Information to an Unauthorized Actor in PhpMyAdmin
PhpMyAdmin before 5.1.3 allows an attacker to retrieve potentially sensitive information by creating invalid requests. This affects the lang parameter, the pma_parameter, and the cookie section.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0813'}, {'type': 'WEB', 'url': 'https://www.incibe-cert.es/en/early-warning/security-advisories/phpmyadmin-exposure-sensitive-information'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/news/2022/2/11/phpmyadmin-4910-and-513-are-released/'}]
{'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:48:02Z', 'nvd_published_at': '2022-03-10T17:44:00Z'}
1.4.0
GHSA-x4jg-mjrx-434g
2022-03-30T20:07:56Z
2022-03-18T23:10:28Z
null
['CVE-2022-24772']
Improper Verification of Cryptographic Signature in node-forge
### Impact RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used. ### Patches The issue has been addressed in `...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-forge'}, 'ecosystem_specific': {'affected_functions': ['forge.pki.rsa']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24772'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1'}, {'type': 'WEB', 'ur...
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:10:28Z', 'nvd_published_at': '2022-03-18T14:15:00Z'}
1.4.0
GHSA-9hcj-449v-9234
2022-11-30T20:51:57Z
2022-03-30T00:00:23Z
null
['CVE-2022-28152']
CSRF vulnerability in Jenkins Job and Node ownership Plugin
A cross-site request forgery (CSRF) vulnerability in Jenkins Job and Node ownership Plugin 0.13.0 and earlier allows attackers to restore the default ownership of a job.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.synopsys.jenkinsci:ownership'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28152'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ownership-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:51:57Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-78fm-qhh8-8858
2023-07-12T00:02:18Z
2022-03-12T00:00:32Z
null
['CVE-2021-32478']
Moodle reflected XSS
The redirect URI in the LTI authorization endpoint required extra sanitizing to prevent reflected XSS and open redirect risks. Moodle versions 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8 and earlier unsupported versions are affected.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10'}, {'fixed': '3.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.10.3'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'EC...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32478'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/752ad3d8eb4f9ac22dbf1461aa69d6e0baee503e'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=422314'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T00:02:18Z', 'nvd_published_at': '2022-03-11T18:15:00Z'}
1.4.0
GHSA-qwh6-xwj4-9cjg
2022-03-14T22:46:48Z
2022-03-05T00:00:41Z
null
['CVE-2021-46384']
Remote code execution in net.mingsoft:ms-mcms
net.mingsoft:ms-mcms <=5.2.5 is affected by: RCE. The impact is: execute arbitrary code (remote). The attack vector is: ${"freemarker.template.utility.Execute"?new()("calc")}. ¶¶ MCMS has a pre-auth RCE vulnerability through which allows unauthenticated attacker with network access via http to compromise MCMS. Successf...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46384'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I4QZ1O'}]
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:46:48Z', 'nvd_published_at': '2022-03-04T22:15:00Z'}
1.4.0
GHSA-x63v-prhc-xx6f
2022-11-30T20:56:10Z
2022-03-30T00:00:23Z
null
['CVE-2022-28149']
Stored Cross-site Scripting vulnerability in Jenkins Job and Node ownership Plugin
Jenkins Job and Node ownership Plugin 0.13.0 and earlier does not escape the names of the secondary owners, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.synopsys.jenkinsci:ownership'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28149'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ownership-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2285'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:56:10Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-mg5h-9rhq-4cqx
2022-03-23T15:40:15Z
2022-03-15T00:01:02Z
null
['CVE-2022-0937']
Cross-site Scripting in ShowDoc
ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0937'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/42c0d9813df3035728b36116a6ce9116e6fa8ed3'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6127739d-f4f2...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T13:57:41Z', 'nvd_published_at': '2022-03-14T03:15:00Z'}
1.4.0
GHSA-r7c9-c69m-rph8
2022-04-19T20:16:49Z
2022-03-26T00:19:30Z
null
['CVE-2017-9841']
Code Injection in PHPUnit
Util/PHP/eval-stdin.php in PHPUnit starting with 4.8.19 and before 4.8.28, as well as 5.x before 5.6.3, allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a `<?php ` substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendo...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpunit/phpunit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.19'}, {'fixed': '4.8.28'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpunit/phpunit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.6.3'}]}]...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9841'}, {'type': 'WEB', 'url': 'https://github.com/sebastianbergmann/phpunit/pull/1955'}, {'type': 'WEB', 'url': 'https://github.com/sebastianbergmann/phpunit/pull/1956'}, {'type': 'WEB', 'url': 'https://github.com/sebastianbergmann/phpunit/commit/...
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:19:30Z', 'nvd_published_at': '2017-06-27T17:29:00Z'}
1.4.0
GHSA-5p9j-w2wx-qx4c
2022-03-14T21:19:27Z
2022-03-07T00:00:40Z
null
['CVE-2022-0869']
Open Redirect in django-spirit
django-spirit prior to version 0.12.3 is vulnerable to open redirect. In the /user/login endpoint, it doesn't check the value of the next parameter when the user is logged in and passes it directly to redirect which result to open redirect. This also affects /user/logout, /user/register, /user/login, /user/resend-activ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django-spirit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0869'}, {'type': 'WEB', 'url': 'https://github.com/nitely/spirit/commit/8f32f89654d6c30d56e0dd167059d32146fb32ef'}, {'type': 'PACKAGE', 'url': 'https://github.com/nitely/spirit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ed335a88-f68c-4e4...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T20:17:27Z', 'nvd_published_at': '2022-03-06T10:15:00Z'}
1.4.0
GHSA-j3ff-xp6c-6gcc
2022-03-18T18:57:53Z
2022-03-18T18:57:53Z
null
['CVE-2022-24759']
Failure to validate signature during handshake
### Impact `@chainsafe/libp2p-noise` before 4.1.2 and 5.0.3 was not correctly validating signatures during the handshake process. This may allow a man-in-the-middle to pose as other peers and get those peers banned. ### Patches Users should upgrade to 4.1.2 or 5.0.3 ### Workarounds No workarounds, just patch upgrade ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': '@chainsafe/libp2p-noise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@chainsafe/libp2p-noise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.3'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/ChainSafe/js-libp2p-noise/security/advisories/GHSA-j3ff-xp6c-6gcc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24759'}, {'type': 'WEB', 'url': 'https://github.com/ChainSafe/js-libp2p-noise/pull/130'}, {'type': 'PACKAGE', 'url': 'https://github.com...
{'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T18:57:53Z', 'nvd_published_at': '2022-03-17T17:15:00Z'}
1.4.0
GHSA-wg8p-w946-c482
2022-03-29T16:42:37Z
2022-03-16T00:00:47Z
null
['CVE-2022-0956']
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0956'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/56e450c3adf75c707500d7231a78c9fc894c7f13'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5b0e3f02-309f...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T16:42:37Z', 'nvd_published_at': '2022-03-15T13:15:00Z'}
1.4.0
GHSA-7f63-h6g3-7cwm
2022-03-10T15:59:12Z
2022-03-01T22:09:25Z
null
['CVE-2022-24717']
Cross Site Scripting (XSS) in @finastra/ssr-pages
A cross site scripting (XSS) issue can occur when providing untrusted input to the `redirect.link` property as an argument to the `build(MessagePageOptions)` function. ### References - https://github.com/Finastra/ssr-pages/pull/2 - https://github.com/Finastra/ssr-pages/pull/2/commits/133606ffaec2edd9918d9fba5771ed21da...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': '@finastra/ssr-pages'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Finastra/ssr-pages/security/advisories/GHSA-7f63-h6g3-7cwm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24717'}, {'type': 'WEB', 'url': 'https://github.com/Finastra/ssr-pages/pull/2'}, {'type': 'WEB', 'url': 'https://github.com/Finastra/ssr-pages/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:09:25Z', 'nvd_published_at': '2022-03-01T19:15:00Z'}
1.4.0
GHSA-rwg2-w82x-v57j
2022-11-30T20:49:11Z
2022-03-30T00:00:26Z
null
['CVE-2022-28155']
XML External Entity Reference vulnerability in Jenkins Pipeline: Phoenix AutoTest Plugin
Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. This allows attackers able to control the input files for the `readXml` or `writeXml` build step to have Jenkins parse a crafted file that uses external entities for extraction of se...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.surenpi.jenkins:phoenix-autotest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28155'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/phoenix-autotest-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1897'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-sec...
{'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:49:11Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}
1.4.0
GHSA-322v-p3jc-7hrg
2022-03-30T18:05:15Z
2022-03-26T00:00:34Z
null
['CVE-2022-25576']
Cross-Site Request Forgery in Anchor CMS
Anchor CMS v0.12.7 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component anchor/routes/posts.php. This vulnerability allows attackers to arbitrarily delete posts.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'anchorcms/anchor-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25576'}, {'type': 'PACKAGE', 'url': 'https://github.com/anchorcms/anchor-cms'}, {'type': 'WEB', 'url': 'https://github.com/butterflyhack/anchorcms-0.12.7-CSRF'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T18:05:15Z', 'nvd_published_at': '2022-03-24T23:15:00Z'}
1.4.0
GHSA-j34v-3552-5r7j
2022-03-01T22:04:17Z
2022-03-01T22:04:17Z
null
[]
Multiple security issues in Pomerium's embedded envoy
Envoy, which Pomerium is based on, has issued multiple CVEs impacting stability and security. Though Pomerium may not be vulnerable to all of the issues, it is recommended that all users upgrade to Pomerium v0.16.4 as soon as possible to minimize risk. ### Impact - Possible DoS or crash - Resources available to unau...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/security/advisories/GHSA-j34v-3552-5r7j'}, {'type': 'PACKAGE', 'url': 'https://github.com/pomerium/pomerium'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:04:17Z', 'nvd_published_at': None}
1.4.0
GHSA-794j-hx96-4w3m
2022-11-30T20:04:51Z
2022-03-16T00:00:42Z
null
['CVE-2022-27211']
CSRF vulnerability and missing permission checks in Jenkins kubernetes-cd Plugin allow capturing credentials
A missing/An incorrect permission check in Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:kubernetes-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27211'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kubernetes-cd-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2681'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi...
{'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:04:51Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-fqpx-xfjr-2qr9
2022-11-30T20:20:51Z
2022-03-16T00:00:44Z
null
['CVE-2022-27204']
CSRF vulnerability and missing permission checks in Jenkins Extended Choice Parameter Plugin allow SSRF
Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not perform a permission check on form validation methods. This allows attackers with Overall/Read permission to connect to an attacker-specified URL. Additionally, these form validation methods do not require POST requests, resulting in a cross-site...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:extended-choice-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '346.vd87693c5a'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27204'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/extended-choice-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-1350'}, {'type': 'WEB', 'url': 'http://www.openwall.com/list...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:20:51Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-97m3-w2cp-4xx6
2022-03-25T19:58:47Z
2022-03-16T23:54:32Z
null
['CVE-2022-23812']
Embedded Malicious Code in node-ipc
The package node-ipc versions 10.1.1 and 10.1.2 are vulnerable to embedded malicious code that was introduced by the maintainer. The malicious code was intended to overwrite arbitrary files dependent upon the geo-location of the user IP address. The maintainer removed the malicious code in version 10.1.3.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'node-ipc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.1'}, {'fixed': '10.1.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23812'}, {'type': 'WEB', 'url': 'https://github.com/RIAEvangelist/node-ipc/issues/233'}, {'type': 'WEB', 'url': 'https://github.com/RIAEvangelist/node-ipc/issues/236'}, {'type': 'WEB', 'url': 'https://github.com/RIAEvangelist/node-ipc/commit/847047...
{'cwe_ids': ['CWE-506', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-16T23:54:32Z', 'nvd_published_at': '2022-03-16T16:15:00Z'}
1.4.0
GHSA-pgq6-ccqj-hpqr
2023-07-03T21:35:11Z
2022-03-04T00:00:15Z
null
['CVE-2022-23708']
Elasticsearch privilege escalation
A flaw was discovered in Elasticsearch 7.17.0’s upgrade assistant, in which upgrading from version 6.x to 7.x would disable the in-built protections on the security index, allowing authenticated users with “*” index permissions access to this index. Users running a cluster on an affected version that had previously bee...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.16.0'}, {'fixed': '7.17.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23708'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-17-1-security-update/298447'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220729-0003/'}]
{'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-04T21:08:50Z', 'nvd_published_at': '2022-03-03T22:15:00Z'}
1.4.0
GHSA-6956-83fg-5wc5
2022-03-29T21:05:15Z
2022-03-18T00:01:11Z
null
['CVE-2022-25354']
Prototype Pollution in set-in
The package set-in before 2.0.3 is vulnerable to Prototype Pollution via the `setIn` method, as it allows an attacker to merge object prototypes into it. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-28273](https://security.snyk.io/vuln/SNYK-JS-SETIN-1048049)
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'set-in'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25354'}, {'type': 'WEB', 'url': 'https://github.com/ahdinosaur/set-in/commit/6bad255961d379e4b1f5fbc52ef9dc8420816f24'}, {'type': 'PACKAGE', 'url': 'https://github.com/ahdinosaur/set-in'}, {'type': 'WEB', 'url': 'https://github.com/ahdinosaur/set-i...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:42:31Z', 'nvd_published_at': '2022-03-17T12:15:00Z'}
1.4.0
GHSA-j29f-m23h-3p8p
2022-03-29T15:16:19Z
2022-03-17T00:00:48Z
null
['CVE-2022-0911']
Cross-site Scripting in Pimcore
Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.3.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0911'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/11447'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pi...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T15:16:19Z', 'nvd_published_at': '2022-03-16T09:15:00Z'}
1.4.0
GHSA-w749-p3v6-hccq
2022-06-21T15:59:23Z
2022-03-08T21:25:54Z
null
['CVE-2022-21831']
Possible code injection vulnerability in Rails / Active Storage
The Active Storage module of Rails starting with version 5.2.0 is possibly vulnerable to code injection. This issue was patched in versions 5.2.6.3, 6.0.4.7, 6.1.4.7, and 7.0.2.3. To work around this issue, applications should implement a strict allow-list on accepted transformation methods or arguments. Additionally,...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'activestorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.6.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.6.2'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activestorage'}, 'ranges': [{'type': 'E...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21831'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/0a72f7d670e9aa77a0bb8584cb1411ddabb7546e'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w749-p3v6-hccq'}, {'type': 'PACKAGE', 'url': 'https://github.com/rail...
{'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-08T21:25:54Z', 'nvd_published_at': '2022-05-26T17:15:00Z'}
1.4.0
GHSA-rr8m-29g8-8cgc
2022-04-01T20:06:24Z
2022-03-26T00:00:32Z
null
['CVE-2022-1064']
SQL Injection in Fork CMS
Fork CMS is vulnerable to SQL injection through marking blog comments on bulk as spam in versions prior to 5.11.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1064'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/6aca30e10b4181534f73f96d6e2ebeb45ec15069'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2f664985-c5fc...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T16:42:34Z', 'nvd_published_at': '2022-03-25T12:15:00Z'}
1.4.0
GHSA-7q88-jxvp-9gp2
2023-07-07T19:15:57Z
2022-03-22T00:00:41Z
null
['CVE-2022-26960']
Path Traversal in Studio-42 elFinder through 2.1.60
`connector.minimal.php` in std42 elFinder through 2.1.60 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'studio-42/elfinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.61'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.60'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26960'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/commit/3b758495538a448ac8830ee3559e7fb2c260c6db'}, {'type': 'WEB', 'url': 'https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html'}]
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T19:15:57Z', 'nvd_published_at': '2022-03-21T17:15:00Z'}
1.4.0
GHSA-q863-cchm-c6c6
2022-03-30T20:34:44Z
2022-03-25T00:00:33Z
null
['CVE-2022-0153']
SQL Injection in Fork CMS
Fork CMS contains a SQL injection vulnerability in versions prior to version 5.11.1. When deleting submissions which belong to a formular (made with module `FormBuilder`), the parameter `id[]` is vulnerable to SQL injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0153'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/7a12046a67ae5d8cf04face3ee75e55f03a1a608'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/841503dd-311c...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T20:36:57Z', 'nvd_published_at': '2022-03-24T17:15:00Z'}
1.4.0
GHSA-5mwx-f6w6-7w5r
2022-03-10T22:00:31Z
2022-03-04T00:00:19Z
null
['CVE-2022-24563']
Cross-site Scripting in GeniXCMS
In Genixcms v1.1.11, a stored Cross-Site Scripting (XSS) vulnerability exists in /gxadmin/index.php?page=themes&view=options" via the intro_title and intro_image parameters.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'genix/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24563'}, {'type': 'WEB', 'url': 'https://genix.me/'}, {'type': 'PACKAGE', 'url': 'https://github.com/semplon/GeniXCMS'}, {'type': 'WEB', 'url': 'https://github.com/truonghuuphuc/CVE'}, {'type': 'WEB', 'url': 'https://github.com/truonghuuphuc/CVE/bl...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T22:00:31Z', 'nvd_published_at': '2022-03-03T02:15:00Z'}
1.4.0
GHSA-ph3v-2hq5-5qfq
2022-03-11T20:30:20Z
2022-03-07T00:00:41Z
null
['CVE-2021-46703']
Code injection in RazorEngine
In the IsolatedRazorEngine component of Antaris RazorEngine through 4.5.1-alpha001, an attacker can execute arbitrary .NET code in a sandboxed environment (if users can externally control template contents). NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
[]
[{'package': {'ecosystem': 'NuGet', 'name': 'RazorEngine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.5.1-alpha001'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46703'}, {'type': 'WEB', 'url': 'https://github.com/Antaris/RazorEngine/issues/585'}]
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T20:30:20Z', 'nvd_published_at': '2022-03-06T06:15:00Z'}
1.4.0
GHSA-xm3x-787m-p66r
2022-03-29T17:35:55Z
2022-03-16T00:00:46Z
null
['CVE-2022-0964']
Cross-site Scripting in ShowDoc
ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.webmv` file upload.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0964'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/dbe39998-8eb7...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T17:33:31Z', 'nvd_published_at': '2022-03-15T16:15:00Z'}
1.4.0
GHSA-6x2m-w449-qwx7
2022-03-18T17:47:49Z
2022-03-15T20:13:38Z
null
['CVE-2022-0811']
Code Injection in CRI-O
### Impact A flaw introduced in CRI-O version 1.19 which an attacker can use to bypass the safeguards and set arbitrary kernel parameters on the host. As a result, anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime can abuse the `kernel.core_pattern` kernel parameter to achieve conta...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19.0'}, {'fixed': '1.19.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.20.0'}, {'fixed': '1.20.7'}]...
[{'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/security/advisories/GHSA-6x2m-w449-qwx7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0811'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-0811'}, {'type': 'WEB', 'url': 'https://bugs.gentoo.org/835336'}, {'ty...
{'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-15T20:13:38Z', 'nvd_published_at': '2022-03-16T15:15:00Z'}
1.4.0
GHSA-gq77-3r6x-383w
2022-03-23T14:22:08Z
2022-03-13T00:00:54Z
null
['CVE-2022-0880']
Cross-site Scripting in ShowDoc
ShowDoc version 2.10.3 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 2.10.4.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.3'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0880'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/818d7fe731f452acccacf731ce47ec27ad68049c'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/df347aa9-ed9b...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T14:22:08Z', 'nvd_published_at': '2022-03-12T04:15:00Z'}
1.4.0
GHSA-hm3x-jwwf-jpr9
2022-03-31T20:43:24Z
2022-03-24T00:00:17Z
null
['CVE-2021-4180']
Exposure of Sensitive Information to an Unauthorized Actor in OpenStack tripleo-heat-templates
An information exposure flaw in openstack-tripleo-heat-templates allows an external user to discover the internal IP or hostname. An attacker could exploit this by checking the `www_authenticate_uri parameter` (which is visible to all end users) in configuration files. This would give sensitive information which may ai...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'tripleo-heat-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.6.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4180'}, {'type': 'WEB', 'url': 'https://github.com/openstack/tripleo-heat-templates/commit/160936df134a471cfd245bd60964046027a571ea'}, {'type': 'WEB', 'url': 'https://github.com/openstack/tripleo-heat-templates/commit/2b9461e97fc5c4ceb0848d1cc4484f...
{'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-31T20:43:24Z', 'nvd_published_at': '2022-03-23T20:15:00Z'}
1.4.0
GHSA-874r-46c6-7p4r
2022-11-30T20:42:25Z
2022-03-16T00:00:45Z
null
['CVE-2022-27196']
Stored Cross-site Scripting vulnerability in Jenkins Favorite Plugin
Jenkins Favorite Plugin 2.4.0 and earlier does not escape the names of jobs in the favorite column, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure or Item/Create permissions.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:favorite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27196'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/favorite-plugin/commit/543a4d87c4fade02173f793905a99adec517bc3b'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/favorite-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:42:25Z', 'nvd_published_at': '2022-03-15T17:15:00Z'}
1.4.0
GHSA-28mg-98xm-q493
2022-03-18T21:19:29Z
2022-03-08T00:00:32Z
null
['CVE-2022-0697']
Open Redirect in archivy
archivy prior to version 1.7.1 is vulnerable to open redirect.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'archivy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0697'}, {'type': 'WEB', 'url': 'https://github.com/archivy/archivy/commit/2d8cb29853190d42572b36deb61127e68d6be574'}, {'type': 'PACKAGE', 'url': 'https://github.com/archivy/archivy'}, {'type': 'WEB', 'url': 'https://github.com/archivy/archivy/relea...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-08T17:48:14Z', 'nvd_published_at': None}
1.4.0
GHSA-4jp3-q2qm-9fmw
2022-03-28T22:31:17Z
2022-03-14T21:55:33Z
null
['CVE-2022-24733']
Improper Restriction of Rendered UI Layers or Frames in Sylius
### Impact It is possible for a page controlled by an attacker to load the website within an iframe. This will enable a clickjacking attack, in which the attacker's page overlays the target application's interface with a different interface provided by the attacker ### Patches The issue is fixed in versions: 1.9.10,...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.11'}]}]}, {'p...
[{'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/security/advisories/GHSA-4jp3-q2qm-9fmw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24733'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sylius/Sylius'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/releases/tag/v1.10...
{'cwe_ids': ['CWE-1021'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T21:55:33Z', 'nvd_published_at': '2022-03-14T19:15:00Z'}
1.4.0
GHSA-m8gq-83gh-v42v
2022-03-18T23:52:30Z
2022-03-16T00:00:49Z
null
['CVE-2022-27193']
XML External Entities Vulnerability in CVRF-CSAF-Converter
CVRF-CSAF-Converter before 1.0.0-rc2 resolves XML External Entities (XXE). This leads to the inclusion of arbitrary (local) file content into the generated output document. An attacker can exploit this to disclose information from the system running the converter.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'cvrf2csaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0rc2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0rc1'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27193'}, {'type': 'PACKAGE', 'url': 'https://github.com/csaf-tools/CVRF-CSAF-Converter'}, {'type': 'WEB', 'url': 'https://github.com/csaf-tools/CVRF-CSAF-Converter/releases/tag/1.0.0-rc2'}]
{'cwe_ids': ['CWE-552', 'CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:52:30Z', 'nvd_published_at': '2022-03-15T05:15:00Z'}
1.4.0
GHSA-45v7-65q8-x294
2022-11-29T21:49:49Z
2022-03-30T00:00:26Z
null
['CVE-2022-28133']
Stored XSS vulnerability in Jenkins Bitbucket Server Integration Plugin
Jenkins Bitbucket Server Integration Plugin 3.1.0 and earlier does not limit URL schemes for callback URLs on OAuth consumers, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create BitBucket Server consumers.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:atlassian-bitbucket-server-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '3.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28133'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/atlassian-bitbucket-server-integration-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2639'}, {'type': 'WEB', 'url': 'http://www.open...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:49:49Z', 'nvd_published_at': '2022-03-29T13:15:00Z'}