schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-7cr9-rmqr-fpqp | 2022-03-28T22:34:57Z | 2022-03-12T00:00:37Z | null | ['CVE-2022-25511'] | Path traversal in FreeTAKServer-UI | An issue in the ?filename= argument of the route /DataPackageTable in FreeTAKServer-UI v1.9.8 allows attackers to place arbitrary files anywhere on the system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'FreeTAKServer-UI'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25511'}, {'type': 'WEB', 'url': 'https://github.com/FreeTAKTeam/UI/issues/29'}, {'type': 'PACKAGE', 'url': 'https://github.com/FreeTAKTeam/UI'}] | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:14:05Z', 'nvd_published_at': '2022-03-11T00:15:00Z'} |
1.4.0 | GHSA-25f2-wgxj-ph29 | 2022-11-30T20:53:30Z | 2022-03-30T00:00:23Z | null | ['CVE-2022-28151'] | Missing permission check in Jenkins Job and Node ownership Plugin | A missing permission check in Jenkins Job and Node ownership Plugin 0.13.0 and earlier allows attackers with Item/Read permission to change the owners and item-specific permissions of a job. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.synopsys.jenkinsci:ownership'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28151'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ownership-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:53:30Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-4c7h-f2j9-9c46 | 2022-04-05T19:50:57Z | 2022-03-30T00:00:21Z | null | ['CVE-2022-28158'] | Missing permission Phoenix AutoTest Plugin | A missing permission check in Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.surenpi.jenkins:phoenix-autotest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28158'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/phoenix-autotest-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2685'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-sec... | {'cwe_ids': ['CWE-862'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T19:50:57Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-v4rr-65x6-g69f | 2022-05-03T20:56:05Z | 2022-03-30T00:00:25Z | null | ['CVE-2022-28140'] | XXE vulnerability in Jenkins Flaky Test Handler Plugin | Jenkins Flaky Test Handler Plugin 1.2.1 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:flaky-test-handler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28140'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/flaky-test-handler-plugin/commit/c4ab38fef3658a02315a00288b934bdd9981b3a4'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/flaky-test-handler-plugin'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-05-03T20:56:05Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-mhfv-8rc9-w38c | 2022-03-26T00:06:00Z | 2022-03-26T00:06:00Z | null | [] | Arbitrary shell execution | Uses of shell_exec() and exec() were not escaping filenames and configuration settings in most cases | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'squizlabs/php_codesniffer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '2.8.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/squizlabs/php_codesniffer/2017-03-01.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/squizlabs/PHP_CodeSniffer'}, {'type': 'WEB', 'url': 'https://github.com/squizlabs/PHP_CodeSniffer/releases/tag/2.8.1'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:06:00Z', 'nvd_published_at': None} |
1.4.0 | GHSA-6h3m-36w8-hv68 | 2022-03-24T00:21:10Z | 2022-03-10T22:07:30Z | null | ['CVE-2022-26652'] | Arbitrary file write in nats-server | (This document is canonically: <https://advisories.nats.io/CVE/CVE-2022-26652.txt>)
## Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
JetStream is the optional RAFT-based resilient persistent feature of NATS... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-server/v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '2.7.4'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/nats-io/nats-streaming-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.1... | [{'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/security/advisories/GHSA-6h3m-36w8-hv68'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26652'}, {'type': 'WEB', 'url': 'https://github.com/nats-io/nats-server/pull/2917'}, {'type': 'WEB', 'url': 'https://advisories.nats.io/CVE/CV... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T22:07:30Z', 'nvd_published_at': '2022-03-10T17:47:00Z'} |
1.4.0 | GHSA-446w-rrm4-r47f | 2022-03-18T20:06:07Z | 2022-03-03T19:26:11Z | null | ['CVE-2022-24725'] | Exposure of home directory through shescape on Unix with Bash | ### Impact
The issue allows for exposure of the home directory on Unix systems when using Bash with the `escape` or `escapeAll` functions from the _shescape_ API with the `interpolation` option set to `true`. Other tested shells, Dash and Zsh, are not affected.
```javascript
const cp = require("child_process");
const... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'shescape'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4.0'}, {'fixed': '1.5.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/security/advisories/GHSA-446w-rrm4-r47f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24725'}, {'type': 'WEB', 'url': 'https://github.com/ericcornelissen/shescape/issues/169'}, {'type': 'WEB', 'url': 'https://github.com/eri... | {'cwe_ids': ['CWE-200', 'CWE-78'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T19:26:11Z', 'nvd_published_at': '2022-03-03T22:15:00Z'} |
1.4.0 | GHSA-qf2g-q4mc-w7rr | 2022-03-30T21:04:25Z | 2022-03-25T00:00:34Z | null | ['CVE-2022-0145'] | Cross-site Scripting in Fork CMS | Fork CMS prior to 5.11.1 is vulnerable to stored cross-site scripting. When uploading a new module, the description of the module can contain JavaScript code. The JavaScript code may be executed after uploading the new module and looking at the `Details` page. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0145'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/981730f1a3d59b423ca903b1f4bf79b848a1766e'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b5b8c680-3cd9... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T20:36:53Z', 'nvd_published_at': '2022-03-24T11:15:00Z'} |
1.4.0 | GHSA-9j59-75qj-795w | 2023-09-04T17:06:16Z | 2022-03-11T23:10:32Z | null | ['CVE-2022-24303'] | Path traversal in Pillow | Pillow before 9.0.1 allows attackers to delete files because spaces in temporary pathnames are mishandled. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Pillow'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24303'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/pull/3450'}, {'type': 'WEB', 'url': 'https://github.com/python-pillow/Pillow/commit/427221ef5f19157001bf8b1ad7cfe0b905ca8c26'}, {'type': 'ADVISORY', 'url': 'https://github.com... | {'cwe_ids': [], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T23:10:32Z', 'nvd_published_at': '2022-03-28T02:15:00Z'} |
1.4.0 | GHSA-83vp-6jqg-6cmr | 2022-03-18T20:15:32Z | 2022-03-10T18:02:14Z | null | ['CVE-2022-24748'] | Incorrect Authentication in shopware | ### Impact
Modify Customers, create Orders without App Permission
## Patches
We recommend updating to the current version 6.4.8.2. You can get the update to 6.4.8.2 regularly via the Auto-Updater or directly via the download overview.
https://www.shopware.com/en/download/#shopware-6
## Workarounds
For older versions... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.4.8.2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 6.4.8.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/platform/security/advisories/GHSA-83vp-6jqg-6cmr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24748'}, {'type': 'WEB', 'url': 'https://github.com/shopware/core/commit/329e4d7e028dd8081496cf8bd3acc822000b0ec0'}, {'type': 'WEB', 'url': 'htt... | {'cwe_ids': ['CWE-287', 'CWE-863'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T18:02:14Z', 'nvd_published_at': '2022-03-09T23:15:00Z'} |
1.4.0 | GHSA-xvch-5gv4-984h | 2023-02-27T14:47:14Z | 2022-03-18T00:01:09Z | null | ['CVE-2021-44906'] | Prototype Pollution in minimist | Minimist prior to 1.2.6 and 0.2.4 is vulnerable to Prototype Pollution via file `index.js`, function `setKey()` (lines 69-95). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'minimist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.2.6'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'minimist'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44906'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/issues/11'}, {'type': 'WEB', 'url': 'https://github.com/substack/minimist/issues/164'}, {'type': 'WEB', 'url': 'https://github.com/minimistjs/minimist/pull/24'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:13:40Z', 'nvd_published_at': '2022-03-17T16:15:00Z'} |
1.4.0 | GHSA-hf4q-52x6-4p57 | 2022-03-28T22:23:29Z | 2022-03-11T00:02:36Z | null | ['CVE-2022-0906'] | Unrestricted file upload leads to stored cross-site scripting in Microweber | Microweber prior to version 1.2.12 allows unrestricted file upload, which could lead to stored cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'microweber/microweber'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0906'}, {'type': 'WEB', 'url': 'https://github.com/microweber/microweber/commit/d9bae9df873c2d2a13a2eb08d512019d49ebca68'}, {'type': 'PACKAGE', 'url': 'https://github.com/microweber/microweber'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T22:23:29Z', 'nvd_published_at': '2022-03-10T15:15:00Z'} |
1.4.0 | GHSA-rf54-44jr-q5vf | 2022-03-28T22:33:07Z | 2022-03-12T00:00:26Z | null | ['CVE-2022-25839'] | Improper Input Validation in url-js | The package url-js before 2.1.0 is vulnerable to Improper Input Validation due to improper parsing, which makes it is possible for the hostname to be spoofed. http://\\\\\\\\localhost and http://localhost are the same URL. However, the hostname is not parsed as localhost, and the backslash is reflected as it is. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'url-js'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25839'}, {'type': 'WEB', 'url': 'https://github.com/duzun/URL.js/commit/9dc9fcc99baa4cbda24403d81a589e9b0f4121d0'}, {'type': 'PACKAGE', 'url': 'https://github.com/duzun/URL.js'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-URLJS-2414030'}] | {'cwe_ids': ['CWE-20'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:28:46Z', 'nvd_published_at': '2022-03-11T20:15:00Z'} |
1.4.0 | GHSA-2rmm-87v7-34rj | 2022-03-15T21:34:09Z | 2022-03-06T00:00:17Z | null | ['CVE-2022-25312'] | Improper Restriction of XML External Entity Reference in Any23 | An XML external entity (XXE) injection vulnerability was discovered in the Any23 RDFa XSLTStylesheet extractor and is known to affect Any23 versions < 2.7. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML data.... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.any23:apache-any23'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25312'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/any23'}, {'type': 'WEB', 'url': 'https://github.com/apache/any23/blob/any23-2.7/RELEASE-NOTES.md'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/y6cm5n3ksohsrhzqknqhzy7p3mtky... | {'cwe_ids': ['CWE-611'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T20:09:23Z', 'nvd_published_at': '2022-03-05T00:15:00Z'} |
1.4.0 | GHSA-vpwq-6cp4-ffqc | 2022-03-28T18:40:15Z | 2022-03-16T00:00:49Z | null | ['CVE-2022-0945'] | Stored Cross-site Scripting in ShowDoc | ShowDoc prior to version 2.10.4 is vulnerable to stored cross-site scripting viva `axd` and `cshtml` file upload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0945'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/ba45d19e1d77a7eea866dab30eff5da552694891'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/8702e2bf-4af2... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T18:40:15Z', 'nvd_published_at': '2022-03-15T04:15:00Z'} |
1.4.0 | GHSA-wfxp-4qgw-qp3c | 2022-03-18T17:52:43Z | 2022-03-18T17:52:43Z | null | ['CVE-2021-21656'] | XML external entity (XXE) attacks in Jenkins Xcode integration Plugin | Jenkins Xcode integration Plugin 2.0.14 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:xcode-plugin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21656'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-05-11/#SECURITY-2335'}] | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-05-19T19:20:58Z', 'nvd_published_at': '2021-05-11T15:15:00Z'} |
1.4.0 | GHSA-j6jg-w79c-7p8v | 2022-03-28T19:36:26Z | 2022-03-16T00:00:48Z | null | ['CVE-2022-0951'] | File Upload Restriction Bypass leading to Cross-site Scripting in ShowDoc | ShowDoc prior to 2.10.4 is vulnerable to a file upload restriction bypass leading to stored cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0951'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b3a983a3-17f9... | {'cwe_ids': ['CWE-434', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T19:36:26Z', 'nvd_published_at': '2022-03-15T09:15:00Z'} |
1.4.0 | GHSA-62hc-f8qj-5xc3 | 2022-04-05T19:49:14Z | 2022-03-30T00:00:22Z | null | ['CVE-2022-28157'] | Path traversal in Phoenix AutoTest Plugin | Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier allows attackers with Item/Configure permission to upload arbitrary files from the Jenkins controller via FTP to an attacker-specified FTP server. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.surenpi.jenkins:phoenix-autotest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28157'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/phoenix-autotest-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2684'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-sec... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-05T19:49:14Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-6qcc-whgp-pjj2 | 2022-03-11T20:37:01Z | 2022-03-05T00:00:45Z | null | ['CVE-2022-0832'] | Cross-site Scripting in Pimcore | Pimcore version 10.3.2 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 10.3.3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.3.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.3.2'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0832'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/8ab06bfbb5a05a1b190731d9c7476ec45f5ee878'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/be450b60-bc8f... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T20:37:01Z', 'nvd_published_at': '2022-03-04T14:15:00Z'} |
1.4.0 | GHSA-3988-h75v-hwf6 | 2022-03-26T00:06:45Z | 2022-03-26T00:06:45Z | null | [] | Arbitrary shell execution | A properly crafted filename would allow for arbitrary code execution when using the --filter=gitmodified command line option | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'squizlabs/php_codesniffer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/squizlabs/php_codesniffer/2017-05-18.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/squizlabs/PHP_CodeSniffer'}, {'type': 'WEB', 'url': 'https://github.com/squizlabs/PHP_CodeSniffer/releases/tag/3.0.1'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:06:45Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5mc7-m686-p6jg | 2022-03-18T17:57:32Z | 2022-03-18T17:57:32Z | null | ['CVE-2021-30179'] | Deserialization of Untrusted Data in Apache Dubbo | Apache Dubbo prior to 2.6.9 and 2.7.10 by default supports generic calls to arbitrary methods exposed by provider interfaces. These invocations are handled by the GenericFilter which will find the service and method specified in the first arguments of the invocation and use the Java Reflection API to make the final cal... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.7.10'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.alibaba:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.6.9'}]}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-30179'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rccbcbdd6593e42ea3a1e8fedd12807cb111375c9c40edb005ef36f67%40%3Cdev.dubbo.apache.org%3E'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/rccbcbdd6593e42ea3a1e8fedd1... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T20:18:30Z', 'nvd_published_at': '2021-06-01T14:15:00Z'} |
1.4.0 | GHSA-fhhx-r983-44xc | 2022-11-29T23:03:10Z | 2022-03-30T00:00:27Z | null | ['CVE-2022-28142'] | SSL/TLS certificate validation globally disabled by Jenkins Proxmox Plugin | Jenkins Proxmox Plugin 0.6.0 and earlier disables SSL/TLS certificate validation globally for the Jenkins controller JVM when configured to ignore SSL/TLS issues. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:proxmox'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28142'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/proxmox-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2081'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/202... | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T23:03:10Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-3mpp-xfvh-qh37 | 2022-03-16T23:54:35Z | 2022-03-16T23:54:35Z | null | [] | node-ipc behavior change | node-ipc version 11.0.0 and newer include a message from the maintainer that is written to the user’s desktop. Please review the version changes before proceeding. | [] | [{'package': {'ecosystem': 'npm', 'name': 'node-ipc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '11.0.0'}]}]}] | [{'type': 'PACKAGE', 'url': 'https://github.com/RIAEvangelist/node-ipc'}, {'type': 'WEB', 'url': 'https://github.com/RIAEvangelist/node-ipc/releases/tag/v11.0.0'}] | {'cwe_ids': [], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-16T23:54:35Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4pww-fqgh-36hj | 2022-03-28T15:00:56Z | 2022-03-11T00:02:02Z | null | ['CVE-2021-44673'] | Unrestricted Upload of File with Dangerous Type in Croogo | A Remote Code Execution (RCE) vulnerability exists in Croogo 3.0.2 via admin/file-manager/attachments, which lets a malicious user upload a web shell script. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'croogo/croogo'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.0.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44673'}, {'type': 'WEB', 'url': 'https://github.com/3erk1n/Vulnerabilities/blob/main/Croogo%203.0.2%20-%20Arbitrary%20File%20Upload-Remote%20Code%20Execution%20(Authenticated).txt'}, {'type': 'PACKAGE', 'url': 'https://github.com/croogo/croogo'}] | {'cwe_ids': ['CWE-434'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T15:00:56Z', 'nvd_published_at': '2022-03-10T18:15:00Z'} |
1.4.0 | GHSA-2r2c-g63r-vccr | 2022-03-18T23:10:48Z | 2022-03-18T23:10:48Z | null | ['CVE-2022-24773'] | Improper Verification of Cryptographic Signature in `node-forge` | ### Impact
RSA PKCS#1 v1.5 signature verification code is not properly checking `DigestInfo` for a proper ASN.1 structure. This can lead to successful verification with signatures that contain invalid structures but a valid digest.
### Patches
The issue has been addressed in `node-forge` `1.3.0`.
### For more infor... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-forge'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-2r2c-g63r-vccr'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24773'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:10:48Z', 'nvd_published_at': '2022-03-18T14:15:00Z'} |
1.4.0 | GHSA-4r8q-gv9j-3xx6 | 2022-03-18T17:55:07Z | 2022-03-18T17:55:07Z | null | ['CVE-2021-32645'] | Open Redirect | ### Impact
In some situations, it is possible to have open redirects where users can be redirected from your site to any other site using a specially crafted URL.
This is only the case for installations where the default Hostname Identification is used and the environment uses tenants that have `force_https` set to `tr... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'hyn/multi-tenant'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.6.0'}, {'fixed': '5.7.2'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/tenancy/multi-tenant/security/advisories/GHSA-4r8q-gv9j-3xx6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32645'}, {'type': 'WEB', 'url': 'https://github.com/tenancy/multi-tenant/commit/9c837a21bccce9bcaeb90033ef200d84f0d9e164'}, {'type': 'WEB', '... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2021-05-27T20:40:11Z', 'nvd_published_at': '2021-05-27T17:15:00Z'} |
1.4.0 | GHSA-8v3j-jfg3-v3fv | 2022-09-06T19:45:27Z | 2022-03-18T00:01:11Z | null | ['CVE-2021-44908'] | Prototype Pollution in Sails.js | Sails.js <= 1.5.2 is vulnerable to Prototype Pollution via controller/load-action-modules.js, function loadActionModules(). A [patch](https://github.com/balderdashy/sails/commit/7c5379a656bb305c958df1dcc2b51a9668830358) is available in the `master` branch of Sails.js's GItHub repository. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'sails'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44908'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/sails/issues/7209'}, {'type': 'WEB', 'url': 'https://github.com/balderdashy/sails/commit/7c5379a656bb305c958df1dcc2b51a9668830358'}, {'type': 'WEB', 'url': 'https://github.com/Marynk/J... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:04:49Z', 'nvd_published_at': '2022-03-17T12:15:00Z'} |
1.4.0 | GHSA-42qm-c3cf-9wv2 | 2022-03-10T15:55:03Z | 2022-03-03T00:00:49Z | null | ['CVE-2022-0819'] | Code injection in dolibarr/dolibarr | Improper php function sanitization, lead to an ability to inject arbitrary PHP code and run arbitrary commands on file system. In the function "dol_eval" in file "dolibarr/htdocs/core/lib/functions.lib.php" dangerous PHP functions are sanitized using "str_replace" and can be bypassed using following code in $s paramete... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '15.0.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0819'}, {'type': 'WEB', 'url': 'https://github.com/dolibarr/dolibarr/commit/2a48dd349e7de0d4a38e448b0d2ecbe25e968075'}, {'type': 'PACKAGE', 'url': 'https://github.com/dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b03d4415-... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T19:12:38Z', 'nvd_published_at': '2022-03-02T16:15:00Z'} |
1.4.0 | GHSA-vmf7-hmh6-vv57 | 2022-03-18T20:06:58Z | 2022-03-05T00:00:46Z | null | ['CVE-2022-23328'] | Denial of Service in Go-Ethereum | A design flaw in all versions of Go-Ethereum allows an attacker node to send 5120 pending transactions of a high gas price from one account that all fully spend the full balance of the account to a victim Geth node, which can purge all of pending transactions in a victim node's memory pool and then occupy the memory po... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.16'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23328'}, {'type': 'WEB', 'url': 'https://dl.acm.org/doi/pdf/10.1145/3460120.3485369'}, {'type': 'PACKAGE', 'url': 'https://github.com/ethereum/go-ethereum'}, {'type': 'WEB', 'url': 'https://tristartom.github.io/docs/ccs21.pdf'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-09T19:20:00Z', 'nvd_published_at': '2022-03-04T12:15:00Z'} |
1.4.0 | GHSA-66ww-999q-mffq | 2022-03-25T14:29:33Z | 2022-03-18T00:01:11Z | null | ['CVE-2022-0748'] | Arbitrary code execution in post-loader | post-loader is webpack loader for blog posts written in Markdown. The package post-loader from 0.0.0 is vulnerable to Arbitrary Code Execution which uses a markdown parser in an unsafe way so that any javascript code inside the markdown input files gets evaluated and executed. At this time, there is no known workaround... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'post-loader'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0748'}, {'type': 'PACKAGE', 'url': 'https://github.com/egoist/post-loader'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-POSTLOADER-2403737'}] | {'cwe_ids': ['CWE-79'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:01:29Z', 'nvd_published_at': '2022-03-17T12:15:00Z'} |
1.4.0 | GHSA-h2g5-2rhx-ffgj | 2022-03-14T23:12:25Z | 2022-03-05T00:00:44Z | null | ['CVE-2022-24727'] | Command injection in Weblate | Weblate is a web based localization tool with tight version control integration. Prior to version 4.11.1, Weblate didn't properly sanitize some arguments passed to Git and Mercurial, allowing them to change their behavior in an unintended way. Instances where untrusted users cannot create new components are not affecte... | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'Weblate'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.11.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/security/advisories/GHSA-3872-f48p-pxqj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24727'}, {'type': 'WEB', 'url': 'https://github.com/WeblateOrg/weblate/commit/35d59f1f040541c358cece0a8d4a63183ca919b8'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:12:25Z', 'nvd_published_at': '2022-03-04T17:15:00Z'} |
1.4.0 | GHSA-p4jg-pccf-h82c | 2022-04-06T23:57:05Z | 2022-03-31T00:00:24Z | null | ['CVE-2022-27815'] | Insecure Temporary File in SWHKD | SWHKD is a display protocol-independent hotkey daemon made in Rust. In SWHKD versions 1.1.5 and prior, SWHKD uses the /tmp/swhkd.pid pathname. As /tmp is accessible to all users, there can be an information leak or denial of service. No known workarounds exist. A patch is available on the `1.1.0` branch of the reposito... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'Simple-Wayland-HotKey-Daemon'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27815'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/commit/e661a4940df78fbb7b52c622ac4ae6a3a7f7d8aa'}, {'type': 'PACKAGE', 'url': 'https://github.com/waycrate/swhkd'}, {'type': 'WEB', 'url': 'https://github.com/waycrate/swhkd/release... | {'cwe_ids': ['CWE-377', 'CWE-59'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T15:15:36Z', 'nvd_published_at': '2022-03-30T00:15:00Z'} |
1.4.0 | GHSA-chr6-386q-4m3v | 2022-11-30T20:28:46Z | 2022-03-16T00:00:44Z | null | ['CVE-2022-27200'] | Stored Cross-site Scripting vulnerability in Jenkins Folder-based Authorization Strategy Plugin | Jenkins Folder-based Authorization Strategy Plugin 1.3 and earlier does not escape the names of roles shown on the configuration form, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Overall/Administer permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:folder-auth'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27200'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/folder-auth-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2646'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:28:46Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-pq37-4c4g-v38c | 2022-03-23T13:54:04Z | 2022-03-15T00:01:02Z | null | ['CVE-2022-0341'] | Cross-site Scripting in vditor | vditor prior to version 3.8.11 is vulnerable to cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'vditor'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.8.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0341'}, {'type': 'WEB', 'url': 'https://github.com/Vanessa219/vditor/issues/1102'}, {'type': 'WEB', 'url': 'https://github.com/vanessa219/vditor/commit/219f8a9e272aba3cbc0096a82cac776532dbb9e5'}, {'type': 'PACKAGE', 'url': 'https://github.com/vanes... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T13:54:04Z', 'nvd_published_at': '2022-03-14T04:15:00Z'} |
1.4.0 | GHSA-2j6v-xpf3-xvrv | 2022-03-10T15:59:41Z | 2022-03-01T18:58:23Z | null | ['CVE-2021-41193'] | Use of Externally-Controlled Format String in wire-avs | ### Impact
A remote format string vulnerability allowed an attacker to cause a denial of service or possibly execute arbitrary code.
### Patches
* The issue has been fixed in wire-avs 7.1.12 and is already included on all Wire products (currently used version is 8.0.x)
### Workarounds
* No workaround known
### Refer... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.wire:avs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.1.12'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/wireapp/wire-avs/security/advisories/GHSA-2j6v-xpf3-xvrv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-41193'}, {'type': 'WEB', 'url': 'https://github.com/wireapp/wire-avs/commit/40d373ede795443ae6f2f756e9fb1f4f4ae90bbe'}, {'type': 'PACKAGE', 'url'... | {'cwe_ids': ['CWE-134'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T18:58:23Z', 'nvd_published_at': '2022-03-01T19:15:00Z'} |
1.4.0 | GHSA-8g9w-5jv6-7m4x | 2022-11-30T18:45:18Z | 2022-03-16T00:00:42Z | null | ['CVE-2022-27218'] | Personal tokens stored in plain text by Jenkins incapptic connect uploader Plugin | Jenkins incapptic connect uploader Plugin 1.15 and earlier stores tokens unencrypted in job config.xml files on the Jenkins controller where they can be viewed by users with Extended Read permission, or access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.incapptic.plugins:incapptic-connect-uploader'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27218'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/incapptic-connect-uploader-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2273'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lis... | {'cwe_ids': ['CWE-256', 'CWE-522'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T18:45:18Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-xpgc-j48j-jwv9 | 2022-03-30T14:53:34Z | 2022-03-26T00:00:31Z | null | ['CVE-2021-20323'] | Cross-site Scripting in Keycloak | A POST based reflected Cross Site Scripting vulnerability on has been identified in Keycloak version 15. The issue was fixed in version 17.0.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.keycloak:keycloak-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '15.0.0'}, {'fixed': '17.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-20323'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2013577'}, {'type': 'PACKAGE', 'url': 'https://github.com/keycloak/keycloak'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T14:53:34Z', 'nvd_published_at': '2022-03-25T19:15:00Z'} |
1.4.0 | GHSA-2877-693q-pj33 | 2022-03-14T21:30:21Z | 2022-03-07T00:00:40Z | null | ['CVE-2021-46704'] | OS Command Injection in GenieACS | In GenieACS 1.2.x before 1.2.8, the UI interface API is vulnerable to unauthenticated OS command injection via the ping host argument (lib/ui/api.ts and lib/ping.ts). The vulnerability arises from insufficient input validation combined with a missing authorization check. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'genieacs'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46704'}, {'type': 'WEB', 'url': 'https://github.com/genieacs/genieacs/commit/7f295beeecc1c1f14308a93c82413bb334045af6'}, {'type': 'PACKAGE', 'url': 'https://github.com/genieacs/genieacs'}, {'type': 'WEB', 'url': 'https://github.com/genieacs/genieac... | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T20:11:56Z', 'nvd_published_at': '2022-03-06T07:15:00Z'} |
1.4.0 | GHSA-jr9c-h74f-2v28 | 2023-06-30T20:12:44Z | 2022-03-11T00:02:35Z | null | ['CVE-2022-0905'] | Gitea Missing Authorization vulnerability | Gitea 1.16.3 and prior is vulnerable to missing authorization. A patch is available as part of the 1.16.4 release. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.16.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.16.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0905'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/commit/1314f38b59748397b3429fb9bc9f9d6bac85d2f2'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/commit/3e5c844a7758fa29126d201f4f98bf21bca6d314'}, {'type': 'PACKAGE', 'u... | {'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T20:32:37Z', 'nvd_published_at': '2022-03-10T15:15:00Z'} |
1.4.0 | GHSA-vxrc-68xx-x48g | 2023-09-21T19:49:03Z | 2022-03-26T00:25:25Z | null | ['CVE-2019-9942'] | Twig Sandbox Information Disclosure | A sandbox information disclosure exists in Twig before 1.38.0 and 2.x before 2.7.0 because, under some circumstances, it is possible to call the `__toString()` method on an object even if not allowed by the security policy in place. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'twig/twig'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.38.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'twig/twig'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ra... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-9942'}, {'type': 'WEB', 'url': 'https://github.com/twigphp/Twig/commit/eac5422956e1dcca89a3669a03a3ff32f0502077'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/twig/twig/CVE-2019-9942.yaml'}, {'type': 'PAC... | {'cwe_ids': ['CWE-200'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:25:25Z', 'nvd_published_at': '2019-03-23T15:29:00Z'} |
1.4.0 | GHSA-4fc4-4p5g-6w89 | 2022-03-30T20:05:59Z | 2022-03-16T22:47:55Z | null | ['CVE-2022-24728'] | Cross-site Scripting in CKEditor4 | ### Affected packages
The vulnerability has been discovered in the core HTML processing module and may affect all plugins used by CKEditor 4.
### Impact
A potential vulnerability has been discovered in CKEditor 4 HTML processing core module. The vulnerability allowed to inject malformed HTML bypassing content sanitiza... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'ckeditor4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.18.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/security/advisories/GHSA-4fc4-4p5g-6w89'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24728'}, {'type': 'WEB', 'url': 'https://github.com/ckeditor/ckeditor4/commit/d158413449692d920a778503502dcb22881bc949'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-16T22:47:55Z', 'nvd_published_at': '2022-03-16T16:15:00Z'} |
1.4.0 | GHSA-v2rg-8cwr-75g8 | 2022-03-18T17:56:08Z | 2022-03-18T17:56:08Z | null | ['CVE-2021-25641'] | Deserializer tampering in Apache Dubbo | Each Apache Dubbo server will set a serialization id to tell the clients which serialization protocol it is working on. But for Dubbo versions before 2.7.8 or 2.6.9, an attacker can choose which serialization id the Provider will use by tampering with the byte preamble flags, aka, not following the server's instruction... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.dubbo:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.7.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'com.alibaba:dubbo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.5.0'}, {'fixed': '2.6.9'}]}]}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25641'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread.html/r99ef7fa35585d3a68762de07e8d2b2bc48b8fa669a03e8d84b9673f3%40%3Cdev.dubbo.apache.org%3E'}] | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2021-06-02T19:44:59Z', 'nvd_published_at': '2021-06-01T14:15:00Z'} |
1.4.0 | GHSA-4f7p-27jc-3c36 | 2022-03-18T19:00:59Z | 2022-03-18T19:00:59Z | null | ['CVE-2022-24761'] | HTTP Request Smuggling in waitress | ### Impact
When using Waitress behind a proxy that does not properly validate the incoming HTTP request matches the RFC7230 standard, Waitress and the frontend proxy may disagree on where one request starts and where it ends.
This would allow requests to be smuggled via the front-end proxy to waitress and later behav... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'waitress'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/security/advisories/GHSA-4f7p-27jc-3c36'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24761'}, {'type': 'WEB', 'url': 'https://github.com/Pylons/waitress/commit/9e0b8c801e4d505c2ffc91b891af4ba48af715e0'}, {'type': 'PACKAGE', 'url': ... | {'cwe_ids': ['CWE-444'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T19:00:59Z', 'nvd_published_at': '2022-03-17T13:15:00Z'} |
1.4.0 | GHSA-9fcc-7g44-mxrj | 2022-03-29T17:30:52Z | 2022-03-16T00:00:47Z | null | ['CVE-2022-0942'] | Cross-site Scripting in ShowDoc | ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via uploading files with files in `.xsd`, `.asa`, and `.aspx` formats. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0942'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a412707c-18da... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T17:30:52Z', 'nvd_published_at': '2022-03-15T14:15:00Z'} |
1.4.0 | GHSA-vc5r-xfc4-4x22 | 2022-03-30T21:03:02Z | 2022-03-25T00:00:33Z | null | ['CVE-2022-0955'] | Cross-site Scripting in Pimcore Datahub | Pimcore Datahub prior to 1.2.4 is vulnerable to stored cross-site scripting. An admin user accessing Datahub triggers the attack, which may result in the user's cookie being stolen. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/data-hub'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0955'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/data-hub/commit/15d5b57af2466eebd3bbc531ead5dafa35d0a36e'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/data-hub'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/708971a6-1e... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T21:03:02Z', 'nvd_published_at': '2022-03-24T15:15:00Z'} |
1.4.0 | GHSA-57j2-w4cx-62h2 | 2022-03-25T21:37:08Z | 2022-03-12T00:00:36Z | null | ['CVE-2020-36518'] | Deeply nested json in jackson-databind | jackson-databind is a data-binding package for the Jackson Data Processor. jackson-databind allows a Java stack overflow exception and denial of service via a large depth of nested objects. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.fasterxml.jackson.core:jackson-databind'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.13.0'}, {'fixed': '2.13.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.13.2.0'}}, {'package': {'ecosystem': 'Maven', 'name': 'com.fasterxm... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36518'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/issues/2816'}, {'type': 'WEB', 'url': 'https://github.com/FasterXML/jackson-databind/commit/fcfc4998ec23f0b1f7f8a9521c2b317b6c25892b'}, {'type': 'PACKAGE', 'url': 'https... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-22T14:36:44Z', 'nvd_published_at': '2022-03-11T07:15:00Z'} |
1.4.0 | GHSA-jc36-42cf-vqwj | 2023-06-23T21:37:14Z | 2022-03-26T00:00:33Z | null | ['CVE-2018-25032'] | Nokogiri affected by zlib's Out-of-bounds Write vulnerability | zlib 1.2.11 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-v6gp-9mmm-c6p5'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25032'}, {'type': 'WEB', 'url': 'https://github.com/madler/zlib/issues/605'}, {'type': 'WEB', 'url': 'https://github.com/madler/zlib/commit... | {'cwe_ids': ['CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-06-23T21:37:14Z', 'nvd_published_at': '2022-03-25T09:15:00Z'} |
1.4.0 | GHSA-h2fw-93qx-vrcq | 2022-04-01T18:03:23Z | 2022-03-26T00:00:29Z | null | ['CVE-2022-0983'] | SQL Injection in Moodle | An SQL injection risk was identified in Badges code relating to configuring criteria. Access to the relevant capability was limited to teachers and managers by default. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.11.0'}, {'fixed': '3.11.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10.0'}, {'fixed': '3.10.10'}]}]}... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0983'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/c2794752ea3cdda2d64a0651da08b2cdf730d9f1'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2064119'}, {'type': 'WEB', 'url': 'https://git.moodle.org/gw?p=m... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-04-01T18:03:23Z', 'nvd_published_at': '2022-03-25T19:15:00Z'} |
1.4.0 | GHSA-3f95-r44v-8mrg | 2022-03-17T21:46:01Z | 2022-03-12T00:00:33Z | null | ['CVE-2022-24433'] | Command injection in simple-git | The package simple-git before 3.3.0 is vulnerable to Command Injection via argument injection. When calling the .fetch(remote, branch, handlerFn) function, both the remote and branch parameters are passed to the git fetch subcommand. By injecting some git options, it was possible to get arbitrary command execution. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'simple-git'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24433'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/git-js/pull/767'}, {'type': 'PACKAGE', 'url': 'https://github.com/steveukx/git-js'}, {'type': 'WEB', 'url': 'https://github.com/steveukx/git-js/releases/tag/simple-git%403.3.0'}, {'type':... | {'cwe_ids': ['CWE-74', 'CWE-77'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T23:30:00Z', 'nvd_published_at': '2022-03-11T17:16:00Z'} |
1.4.0 | GHSA-2ccw-7px8-vmpf | 2022-04-07T00:09:48Z | 2022-03-25T19:27:39Z | null | ['CVE-2022-24776'] | Open Redirect in Flask-AppBuilder | Flask-AppBuilder is an application development framework built on top of Flask. Versions prior to 3.4.5 contain an open redirect vulnerability when using the database authentication login page. There are no known workarounds. Users are recommended to upgrade to version 3.4.5 or later.
### For more information
If you h... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'Flask-AppBuilder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.4.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/security/advisories/GHSA-2ccw-7px8-vmpf'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24776'}, {'type': 'WEB', 'url': 'https://github.com/dpgaspar/Flask-AppBuilder/pull/1804'}, {'type': 'WEB', 'url': 'https://github.com/dp... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-25T19:27:39Z', 'nvd_published_at': '2022-03-24T20:15:00Z'} |
1.4.0 | GHSA-6fg4-36v7-xv32 | 2022-11-30T20:39:49Z | 2022-03-16T00:00:45Z | null | ['CVE-2022-27197'] | Stored Cross-site Scripting vulnerability in Jenkins Dashboard View Plugin | Jenkins Dashboard View Plugin 2.18 and earlier does not perform URL validation for the Iframe Portlet's Iframe source URL, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to configure views.
Dashboard View Plugin 2.18.1 performs URL validation for the Iframe Portlet’s Ifram... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dashboard-view'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.18.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27197'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/dashboard-view-plugin/commit/942c5c78fa834a6be242f144adc2b7f045ccdbc3'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dashboard-view-plugin'}, {'type': 'WEB', 'url': 'https:/... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:39:49Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-vhxc-fhm5-qcp9 | 2022-03-18T22:56:29Z | 2022-03-18T00:01:11Z | null | ['CVE-2022-25296'] | Prototype Pollution in bodymen | The package bodymen from 0.0.0 are vulnerable to Prototype Pollution via the handler function which could be tricked into adding or modifying properties of Object.prototype using a __proto__ payload. **Note:** This vulnerability derives from an incomplete fix to [CVE-2019-10792](https://security.snyk.io/vuln/SNYK-JS-BO... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'bodymen'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25296'}, {'type': 'PACKAGE', 'url': 'https://github.com/diegohaz/bodymen'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-BODYMEN-2342623'}] | {'cwe_ids': ['CWE-1321'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:56:29Z', 'nvd_published_at': '2022-03-17T12:15:00Z'} |
1.4.0 | GHSA-v94v-pxqp-5qgj | 2022-03-28T19:27:08Z | 2022-03-16T00:00:48Z | null | ['CVE-2022-0950'] | Cross-site Scripting in ShowDoc | The upload feature of ShowDoc prior to version 2.10.4 allows files with the extension `.*html`, which leads to stored cross-site scripting. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0950'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/237ac6d43bf3728bf3587c486a23b4a48ea7acb3'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/acc23996-bd57... | {'cwe_ids': ['CWE-434', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-28T19:27:08Z', 'nvd_published_at': '2022-03-15T09:15:00Z'} |
1.4.0 | GHSA-mqvp-7rrg-9jxc | 2022-03-29T19:10:58Z | 2022-03-05T00:00:44Z | null | ['CVE-2022-26336'] | Improper Input Validation and Allocation of Resources Without Limits or Throttling in poi-scratchpad | A shortcoming in the HMEF package of poi-scratchpad (Apache POI) allows an attacker to cause an Out of Memory exception. This package is used to read TNEF files (Microsoft Outlook and Microsoft Exchange Server). If an application uses poi-scratchpad to parse TNEF files and the application allows untrusted users to supp... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.poi:poi-scratchpad'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26336'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/sprg0kq986pc2271dc3v2oxb1f9qx09j'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20221028-0006/'}] | {'cwe_ids': ['CWE-20', 'CWE-770'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T16:12:37Z', 'nvd_published_at': '2022-03-04T16:15:00Z'} |
1.4.0 | GHSA-gv9j-4w24-q7vx | 2022-03-01T21:03:11Z | 2022-03-01T21:03:11Z | null | [] | Improper random number generation in github.com/coredns/coredns | ### Impact
CoreDNS before 1.6.6 (using go DNS package < 1.1.25) improperly generates random numbers because math/rand is used. The TXID becomes predictable, leading to response forgeries.
### Patches
The problem has been fixed in 1.6.6+.
### References
- [CVE-2019-19794](https://nvd.nist.gov/vuln/detail/CVE-2019-197... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/coredns/coredns'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.6.6'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/coredns/coredns/security/advisories/GHSA-gv9j-4w24-q7vx'}, {'type': 'PACKAGE', 'url': 'github.com/coredns/coredns'}] | {'cwe_ids': ['CWE-330'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:03:11Z', 'nvd_published_at': None} |
1.4.0 | GHSA-p93v-m2r2-4387 | 2022-03-01T21:05:01Z | 2022-03-01T21:05:01Z | null | [] | Denial of service via insufficient metadata validation | The PAM module for `fscrypt` through v0.3.2 doesn't adequately validate `fscrypt` metadata files, allowing users to create malicious metadata files that prevent other users from logging in. A local user can cause a denial of service by creating a `fscrypt` metadata file that prevents other users from logging into the s... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/google/fscrypt'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/google/fscrypt/security/advisories/GHSA-p93v-m2r2-4387'}, {'type': 'PACKAGE', 'url': 'github.com/google/fscrypt'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:05:01Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4v37-24gm-h554 | 2022-03-01T21:47:28Z | 2022-03-01T21:47:28Z | null | ['CVE-2022-24712'] | Cross-Site Request Forgery (CSRF) Protection Bypass Vulnerability in CodeIgniter4 | ### Impact
This vulnerability might allow remote attackers to bypass the CodeIgniter4 CSRF protection mechanism.
### Patches
Upgrade to v4.1.9 or later.
### Workarounds
These are workarounds for this vulnerability, but **you will still need to code as these after upgrading to v4.1.9**.
Otherwise, the CSRF protection... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'codeigniter4/framework'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.9'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/security/advisories/GHSA-4v37-24gm-h554'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24712'}, {'type': 'WEB', 'url': 'https://github.com/codeigniter4/CodeIgniter4/blob/7dc2ece32401ebde67122f7d2460efcaee7c352e/user_guide_s... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T21:47:28Z', 'nvd_published_at': '2022-02-28T16:15:00Z'} |
1.4.0 | GHSA-gjh6-wvhq-h4qx | 2022-03-29T19:04:44Z | 2022-03-12T00:00:37Z | null | ['CVE-2022-25507'] | Cross-site Scripting in FreeTAKServer-UI | FreeTAKServer-UI v1.9.8 was discovered to contain a stored cross-site scripting (XSS) vulnerability via the Callsign parameter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'FreeTAKServer-UI'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.9.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25507'}, {'type': 'WEB', 'url': 'https://github.com/FreeTAKTeam/UI/issues/28'}, {'type': 'PACKAGE', 'url': 'https://github.com/FreeTAKTeam/UI'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T19:04:44Z', 'nvd_published_at': '2022-03-11T00:15:00Z'} |
1.4.0 | GHSA-x75r-g63m-82wj | 2022-11-30T18:55:24Z | 2022-03-16T00:00:43Z | null | ['CVE-2022-27216'] | Passwords stored in plain text by Jenkins dbCharts Plugin | Jenkins dbCharts Plugin 0.5.2 and earlier stores JDBC connection passwords unencrypted in its global configuration file `hudson.plugins.dbcharts.DbChartPublisher.xml` on the Jenkins controller as part of its configuration.
These passwords can be viewed by users with access to the Jenkins controller file system. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:dbCharts'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27216'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/dbCharts-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2159'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/20... | {'cwe_ids': ['CWE-522'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T18:55:24Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-h3q4-vmw4-cpr5 | 2022-03-28T22:26:45Z | 2022-03-16T00:00:38Z | null | ['CVE-2021-29134'] | Path Traversal in Gitea | The avatar middleware in Gitea before 1.13.6 allows Directory Traversal via a crafted URL. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'code.gitea.io/gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-29134'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/pull/15125/files'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-gitea/gitea'}, {'type': 'WEB', 'url': 'https://github.com/go-gitea/gitea/releases'}, {'type': 'WEB', 'url': 'ht... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:27:37Z', 'nvd_published_at': '2022-03-15T21:15:00Z'} |
1.4.0 | GHSA-mw75-qvfr-hpmr | 2022-03-23T15:38:52Z | 2022-03-15T00:01:01Z | null | ['CVE-2022-0938'] | Cross-site Scripting in ShowDoc | ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0938'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/830c89a4c2c5fd0dd491422bf8e97b4eb5713f55'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/3eb5a8f9-24e3... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T14:09:09Z', 'nvd_published_at': '2022-03-14T08:15:00Z'} |
1.4.0 | GHSA-vrcc-g6vj-mh5w | 2022-03-30T20:05:12Z | 2022-03-18T00:01:13Z | null | ['CVE-2021-42219'] | Denial of service in go-ethereum | Go-Ethereum v1.10.9 was discovered to contain an issue which allows attackers to cause a denial of service (DoS) via sending an excessive amount of messages to a node. This is caused by missing memory in the component /ethash/algorithm.go. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/ethereum/go-ethereum'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.10.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-42219'}, {'type': 'WEB', 'url': 'https://docs.google.com/document/d/1dYFSpNZPC0OV-n1mMqdc269u9yYU1XQy/edit?usp=sharing&ouid=112110745137218798745&rtpof=true&sd=true'}] | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:37:32Z', 'nvd_published_at': '2022-03-17T00:15:00Z'} |
1.4.0 | GHSA-fmx4-26r3-wxpf | 2022-03-03T20:28:47Z | 2022-03-03T20:28:47Z | null | [] | Integer overflow in cmark-gfm table parsing extension leads to heap memory corruption | ### Impact
CommonMarker uses `cmark-gfm` for rendering [Github Flavored Markdown](https://github.github.com/gfm/). An [integer overflow in `cmark-gfm`'s table row parsing](https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x) may lead to heap memory corruption when parsing tables who's marker ro... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'commonmarker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.23.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/github/cmark-gfm/security/advisories/GHSA-mc3g-88wq-6f4x'}, {'type': 'WEB', 'url': 'https://github.com/gjtorikian/commonmarker/security/advisories/GHSA-fmx4-26r3-wxpf'}, {'type': 'WEB', 'url': 'https://github.com/gjtorikian/commonmarker/commit/ab4504fd17460627a6ab255bc3c63e8e... | {'cwe_ids': ['CWE-190'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-03T20:28:47Z', 'nvd_published_at': None} |
1.4.0 | GHSA-85f9-w9cx-h363 | 2022-11-30T20:54:57Z | 2022-03-30T00:00:23Z | null | ['CVE-2022-28150'] | Cross site request forgery in Jenkins Job and Node ownership Plugin | Job and Node ownership Plugin 0.13.0 and earlier does not perform a permission check in several HTTP endpoints. This allows attackers with Item/Read permission to change the owners and item-specific permissions of a job. Additionally, this endpoint does not require POST requests, resulting in a cross-site request forge... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.synopsys.jenkinsci:ownership'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28150'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ownership-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20(1)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-04-07T15:35:41Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-vx8q-j7h9-vf6q | 2022-03-17T21:43:51Z | 2022-03-11T00:02:24Z | null | ['CVE-2022-0813'] | Exposure of Sensitive Information to an Unauthorized Actor in PhpMyAdmin | PhpMyAdmin before 5.1.3 allows an attacker to retrieve potentially sensitive information by creating invalid requests. This affects the lang parameter, the pma_parameter, and the cookie section. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0813'}, {'type': 'WEB', 'url': 'https://www.incibe-cert.es/en/early-warning/security-advisories/phpmyadmin-exposure-sensitive-information'}, {'type': 'WEB', 'url': 'https://www.phpmyadmin.net/news/2022/2/11/phpmyadmin-4910-and-513-are-released/'}] | {'cwe_ids': ['CWE-200'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:48:02Z', 'nvd_published_at': '2022-03-10T17:44:00Z'} |
1.4.0 | GHSA-x4jg-mjrx-434g | 2022-03-30T20:07:56Z | 2022-03-18T23:10:28Z | null | ['CVE-2022-24772'] | Improper Verification of Cryptographic Signature in node-forge | ### Impact
RSA PKCS#1 v1.5 signature verification code does not check for tailing garbage bytes after decoding a `DigestInfo` ASN.1 structure. This can allow padding bytes to be removed and garbage data added to forge a signature when a low public exponent is being used.
### Patches
The issue has been addressed in `... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-forge'}, 'ecosystem_specific': {'affected_functions': ['forge.pki.rsa']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.3.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/security/advisories/GHSA-x4jg-mjrx-434g'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24772'}, {'type': 'WEB', 'url': 'https://github.com/digitalbazaar/forge/commit/3f0b49a0573ef1bb7af7f5673c0cfebf00424df1'}, {'type': 'WEB', 'ur... | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:10:28Z', 'nvd_published_at': '2022-03-18T14:15:00Z'} |
1.4.0 | GHSA-9hcj-449v-9234 | 2022-11-30T20:51:57Z | 2022-03-30T00:00:23Z | null | ['CVE-2022-28152'] | CSRF vulnerability in Jenkins Job and Node ownership Plugin | A cross-site request forgery (CSRF) vulnerability in Jenkins Job and Node ownership Plugin 0.13.0 and earlier allows attackers to restore the default ownership of a job. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.synopsys.jenkinsci:ownership'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28152'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ownership-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2062%20(2)'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-secu... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:51:57Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-78fm-qhh8-8858 | 2023-07-12T00:02:18Z | 2022-03-12T00:00:32Z | null | ['CVE-2021-32478'] | Moodle reflected XSS | The redirect URI in the LTI authorization endpoint required extra sanitizing to prevent reflected XSS and open redirect risks. Moodle versions 3.10 to 3.10.3, 3.9 to 3.9.6, 3.8 to 3.8.8 and earlier unsupported versions are affected. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.10'}, {'fixed': '3.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.10.3'}}, {'package': {'ecosystem': 'Packagist', 'name': 'moodle/moodle'}, 'ranges': [{'type': 'EC... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32478'}, {'type': 'WEB', 'url': 'https://github.com/moodle/moodle/commit/752ad3d8eb4f9ac22dbf1461aa69d6e0baee503e'}, {'type': 'WEB', 'url': 'https://moodle.org/mod/forum/discuss.php?d=422314'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-07-12T00:02:18Z', 'nvd_published_at': '2022-03-11T18:15:00Z'} |
1.4.0 | GHSA-qwh6-xwj4-9cjg | 2022-03-14T22:46:48Z | 2022-03-05T00:00:41Z | null | ['CVE-2021-46384'] | Remote code execution in net.mingsoft:ms-mcms | net.mingsoft:ms-mcms <=5.2.5 is affected by: RCE. The impact is: execute arbitrary code (remote). The attack vector is: ${"freemarker.template.utility.Execute"?new()("calc")}. ¶¶ MCMS has a pre-auth RCE vulnerability through which allows unauthenticated attacker with network access via http to compromise MCMS. Successf... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46384'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I4QZ1O'}] | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T22:46:48Z', 'nvd_published_at': '2022-03-04T22:15:00Z'} |
1.4.0 | GHSA-x63v-prhc-xx6f | 2022-11-30T20:56:10Z | 2022-03-30T00:00:23Z | null | ['CVE-2022-28149'] | Stored Cross-site Scripting vulnerability in Jenkins Job and Node ownership Plugin | Jenkins Job and Node ownership Plugin 0.13.0 and earlier does not escape the names of the secondary owners, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure permission. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.synopsys.jenkinsci:ownership'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.13.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28149'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/ownership-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2285'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:56:10Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-mg5h-9rhq-4cqx | 2022-03-23T15:40:15Z | 2022-03-15T00:01:02Z | null | ['CVE-2022-0937'] | Cross-site Scripting in ShowDoc | ShowDoc is vulnerable to stored cross-site scripting through file upload in versions 2.10.3 and prior. A patch is available and anticipated to be part of version 2.10.4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0937'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/42c0d9813df3035728b36116a6ce9116e6fa8ed3'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/6127739d-f4f2... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T13:57:41Z', 'nvd_published_at': '2022-03-14T03:15:00Z'} |
1.4.0 | GHSA-r7c9-c69m-rph8 | 2022-04-19T20:16:49Z | 2022-03-26T00:19:30Z | null | ['CVE-2017-9841'] | Code Injection in PHPUnit | Util/PHP/eval-stdin.php in PHPUnit starting with 4.8.19 and before 4.8.28, as well as 5.x before 5.6.3, allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a `<?php ` substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendo... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpunit/phpunit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.8.19'}, {'fixed': '4.8.28'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'phpunit/phpunit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.6.3'}]}]... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2017-9841'}, {'type': 'WEB', 'url': 'https://github.com/sebastianbergmann/phpunit/pull/1955'}, {'type': 'WEB', 'url': 'https://github.com/sebastianbergmann/phpunit/pull/1956'}, {'type': 'WEB', 'url': 'https://github.com/sebastianbergmann/phpunit/commit/... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-26T00:19:30Z', 'nvd_published_at': '2017-06-27T17:29:00Z'} |
1.4.0 | GHSA-5p9j-w2wx-qx4c | 2022-03-14T21:19:27Z | 2022-03-07T00:00:40Z | null | ['CVE-2022-0869'] | Open Redirect in django-spirit | django-spirit prior to version 0.12.3 is vulnerable to open redirect. In the /user/login endpoint, it doesn't check the value of the next parameter when the user is logged in and passes it directly to redirect which result to open redirect. This also affects /user/logout, /user/register, /user/login, /user/resend-activ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-spirit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.12.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0869'}, {'type': 'WEB', 'url': 'https://github.com/nitely/spirit/commit/8f32f89654d6c30d56e0dd167059d32146fb32ef'}, {'type': 'PACKAGE', 'url': 'https://github.com/nitely/spirit'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ed335a88-f68c-4e4... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-07T20:17:27Z', 'nvd_published_at': '2022-03-06T10:15:00Z'} |
1.4.0 | GHSA-j3ff-xp6c-6gcc | 2022-03-18T18:57:53Z | 2022-03-18T18:57:53Z | null | ['CVE-2022-24759'] | Failure to validate signature during handshake | ### Impact
`@chainsafe/libp2p-noise` before 4.1.2 and 5.0.3 was not correctly validating signatures during the handshake process.
This may allow a man-in-the-middle to pose as other peers and get those peers banned.
### Patches
Users should upgrade to 4.1.2 or 5.0.3
### Workarounds
No workarounds, just patch upgrade
... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': '@chainsafe/libp2p-noise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': '@chainsafe/libp2p-noise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.0.3'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/ChainSafe/js-libp2p-noise/security/advisories/GHSA-j3ff-xp6c-6gcc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24759'}, {'type': 'WEB', 'url': 'https://github.com/ChainSafe/js-libp2p-noise/pull/130'}, {'type': 'PACKAGE', 'url': 'https://github.com... | {'cwe_ids': ['CWE-347'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T18:57:53Z', 'nvd_published_at': '2022-03-17T17:15:00Z'} |
1.4.0 | GHSA-wg8p-w946-c482 | 2022-03-29T16:42:37Z | 2022-03-16T00:00:47Z | null | ['CVE-2022-0956'] | Cross-site Scripting in ShowDoc | ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via file upload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0956'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/56e450c3adf75c707500d7231a78c9fc894c7f13'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/5b0e3f02-309f... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T16:42:37Z', 'nvd_published_at': '2022-03-15T13:15:00Z'} |
1.4.0 | GHSA-7f63-h6g3-7cwm | 2022-03-10T15:59:12Z | 2022-03-01T22:09:25Z | null | ['CVE-2022-24717'] | Cross Site Scripting (XSS) in @finastra/ssr-pages | A cross site scripting (XSS) issue can occur when providing untrusted input to the `redirect.link` property as an argument to the `build(MessagePageOptions)` function.
### References
- https://github.com/Finastra/ssr-pages/pull/2
- https://github.com/Finastra/ssr-pages/pull/2/commits/133606ffaec2edd9918d9fba5771ed21da... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': '@finastra/ssr-pages'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Finastra/ssr-pages/security/advisories/GHSA-7f63-h6g3-7cwm'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24717'}, {'type': 'WEB', 'url': 'https://github.com/Finastra/ssr-pages/pull/2'}, {'type': 'WEB', 'url': 'https://github.com/Finastra/ssr-pages/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:09:25Z', 'nvd_published_at': '2022-03-01T19:15:00Z'} |
1.4.0 | GHSA-rwg2-w82x-v57j | 2022-11-30T20:49:11Z | 2022-03-30T00:00:26Z | null | ['CVE-2022-28155'] | XML External Entity Reference vulnerability in Jenkins Pipeline: Phoenix AutoTest Plugin | Jenkins Pipeline: Phoenix AutoTest Plugin 1.3 and earlier does not configure its XML parser to prevent XML external entity (XXE) attacks.
This allows attackers able to control the input files for the `readXml` or `writeXml` build step to have Jenkins parse a crafted file that uses external entities for extraction of se... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.surenpi.jenkins:phoenix-autotest'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28155'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/phoenix-autotest-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-1897'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-sec... | {'cwe_ids': ['CWE-611'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:49:11Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
1.4.0 | GHSA-322v-p3jc-7hrg | 2022-03-30T18:05:15Z | 2022-03-26T00:00:34Z | null | ['CVE-2022-25576'] | Cross-Site Request Forgery in Anchor CMS | Anchor CMS v0.12.7 was discovered to contain a Cross-Site Request Forgery (CSRF) via the component anchor/routes/posts.php. This vulnerability allows attackers to arbitrarily delete posts. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'anchorcms/anchor-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.12.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25576'}, {'type': 'PACKAGE', 'url': 'https://github.com/anchorcms/anchor-cms'}, {'type': 'WEB', 'url': 'https://github.com/butterflyhack/anchorcms-0.12.7-CSRF'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T18:05:15Z', 'nvd_published_at': '2022-03-24T23:15:00Z'} |
1.4.0 | GHSA-j34v-3552-5r7j | 2022-03-01T22:04:17Z | 2022-03-01T22:04:17Z | null | [] | Multiple security issues in Pomerium's embedded envoy | Envoy, which Pomerium is based on, has issued multiple CVEs impacting stability and security.
Though Pomerium may not be vulnerable to all of the issues, it is recommended that all users upgrade to Pomerium v0.16.4 as soon as possible to minimize risk.
### Impact
- Possible DoS or crash
- Resources available to unau... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/pomerium/pomerium'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.16.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/pomerium/pomerium/security/advisories/GHSA-j34v-3552-5r7j'}, {'type': 'PACKAGE', 'url': 'https://github.com/pomerium/pomerium'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-01T22:04:17Z', 'nvd_published_at': None} |
1.4.0 | GHSA-794j-hx96-4w3m | 2022-11-30T20:04:51Z | 2022-03-16T00:00:42Z | null | ['CVE-2022-27211'] | CSRF vulnerability and missing permission checks in Jenkins kubernetes-cd Plugin allow capturing credentials | A missing/An incorrect permission check in Jenkins Kubernetes Continuous Deploy Plugin 2.3.1 and earlier allows attackers with Overall/Read permission to connect to an attacker-specified SSH server using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:kubernetes-cd'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27211'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/kubernetes-cd-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-2681'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-securi... | {'cwe_ids': ['CWE-862'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:04:51Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-fqpx-xfjr-2qr9 | 2022-11-30T20:20:51Z | 2022-03-16T00:00:44Z | null | ['CVE-2022-27204'] | CSRF vulnerability and missing permission checks in Jenkins Extended Choice Parameter Plugin allow SSRF | Extended Choice Parameter Plugin 346.vd87693c5a_86c and earlier does not perform a permission check on form validation methods. This allows attackers with Overall/Read permission to connect to an attacker-specified URL.
Additionally, these form validation methods do not require POST requests, resulting in a cross-site... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:extended-choice-parameter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '346.vd87693c5a'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27204'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/extended-choice-parameter-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-15/#SECURITY-1350'}, {'type': 'WEB', 'url': 'http://www.openwall.com/list... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:20:51Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-97m3-w2cp-4xx6 | 2022-03-25T19:58:47Z | 2022-03-16T23:54:32Z | null | ['CVE-2022-23812'] | Embedded Malicious Code in node-ipc | The package node-ipc versions 10.1.1 and 10.1.2 are vulnerable to embedded malicious code that was introduced by the maintainer. The malicious code was intended to overwrite arbitrary files dependent upon the geo-location of the user IP address. The maintainer removed the malicious code in version 10.1.3. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'node-ipc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.1.1'}, {'fixed': '10.1.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23812'}, {'type': 'WEB', 'url': 'https://github.com/RIAEvangelist/node-ipc/issues/233'}, {'type': 'WEB', 'url': 'https://github.com/RIAEvangelist/node-ipc/issues/236'}, {'type': 'WEB', 'url': 'https://github.com/RIAEvangelist/node-ipc/commit/847047... | {'cwe_ids': ['CWE-506', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-16T23:54:32Z', 'nvd_published_at': '2022-03-16T16:15:00Z'} |
1.4.0 | GHSA-pgq6-ccqj-hpqr | 2023-07-03T21:35:11Z | 2022-03-04T00:00:15Z | null | ['CVE-2022-23708'] | Elasticsearch privilege escalation | A flaw was discovered in Elasticsearch 7.17.0’s upgrade assistant, in which upgrading from version 6.x to 7.x would disable the in-built protections on the security index, allowing authenticated users with “*” index permissions access to this index. Users running a cluster on an affected version that had previously bee... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.elasticsearch:elasticsearch'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '7.16.0'}, {'fixed': '7.17.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23708'}, {'type': 'WEB', 'url': 'https://discuss.elastic.co/t/elastic-stack-7-17-1-security-update/298447'}, {'type': 'WEB', 'url': 'https://security.netapp.com/advisory/ntap-20220729-0003/'}] | {'cwe_ids': ['CWE-269'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-04T21:08:50Z', 'nvd_published_at': '2022-03-03T22:15:00Z'} |
1.4.0 | GHSA-6956-83fg-5wc5 | 2022-03-29T21:05:15Z | 2022-03-18T00:01:11Z | null | ['CVE-2022-25354'] | Prototype Pollution in set-in | The package set-in before 2.0.3 is vulnerable to Prototype Pollution via the `setIn` method, as it allows an attacker to merge object prototypes into it. **Note:** This vulnerability derives from an incomplete fix of [CVE-2020-28273](https://security.snyk.io/vuln/SNYK-JS-SETIN-1048049) | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'set-in'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25354'}, {'type': 'WEB', 'url': 'https://github.com/ahdinosaur/set-in/commit/6bad255961d379e4b1f5fbc52ef9dc8420816f24'}, {'type': 'PACKAGE', 'url': 'https://github.com/ahdinosaur/set-in'}, {'type': 'WEB', 'url': 'https://github.com/ahdinosaur/set-i... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T22:42:31Z', 'nvd_published_at': '2022-03-17T12:15:00Z'} |
1.4.0 | GHSA-j29f-m23h-3p8p | 2022-03-29T15:16:19Z | 2022-03-17T00:00:48Z | null | ['CVE-2022-0911'] | Cross-site Scripting in Pimcore | Pimcore 10.3.3 and prior is vulnerable to stored cross-site scripting. A patch is available on the 10.x branch and will likely be part of version 10.4.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.4.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 10.3.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0911'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/pull/11447'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/6e0922c5b2959ac1b48500ac508d8fc5a97286f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pi... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T15:16:19Z', 'nvd_published_at': '2022-03-16T09:15:00Z'} |
1.4.0 | GHSA-w749-p3v6-hccq | 2022-06-21T15:59:23Z | 2022-03-08T21:25:54Z | null | ['CVE-2022-21831'] | Possible code injection vulnerability in Rails / Active Storage | The Active Storage module of Rails starting with version 5.2.0 is possibly vulnerable to code injection. This issue was patched in versions 5.2.6.3, 6.0.4.7, 6.1.4.7, and 7.0.2.3. To work around this issue, applications should implement a strict allow-list on accepted transformation methods or arguments. Additionally,... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'activestorage'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.2.0'}, {'fixed': '5.2.6.3'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.6.2'}}, {'package': {'ecosystem': 'RubyGems', 'name': 'activestorage'}, 'ranges': [{'type': 'E... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21831'}, {'type': 'WEB', 'url': 'https://github.com/rails/rails/commit/0a72f7d670e9aa77a0bb8584cb1411ddabb7546e'}, {'type': 'ADVISORY', 'url': 'https://github.com/advisories/GHSA-w749-p3v6-hccq'}, {'type': 'PACKAGE', 'url': 'https://github.com/rail... | {'cwe_ids': ['CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-03-08T21:25:54Z', 'nvd_published_at': '2022-05-26T17:15:00Z'} |
1.4.0 | GHSA-rr8m-29g8-8cgc | 2022-04-01T20:06:24Z | 2022-03-26T00:00:32Z | null | ['CVE-2022-1064'] | SQL Injection in Fork CMS | Fork CMS is vulnerable to SQL injection through marking blog comments on bulk as spam in versions prior to 5.11.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-1064'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/6aca30e10b4181534f73f96d6e2ebeb45ec15069'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2f664985-c5fc... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-30T16:42:34Z', 'nvd_published_at': '2022-03-25T12:15:00Z'} |
1.4.0 | GHSA-7q88-jxvp-9gp2 | 2023-07-07T19:15:57Z | 2022-03-22T00:00:41Z | null | ['CVE-2022-26960'] | Path Traversal in Studio-42 elFinder through 2.1.60 | `connector.minimal.php` in std42 elFinder through 2.1.60 is affected by path traversal. This allows unauthenticated remote attackers to read, write, and browse files outside the configured document root. This is due to improper handling of absolute file paths. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'studio-42/elfinder'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.1.61'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.1.60'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-26960'}, {'type': 'WEB', 'url': 'https://github.com/Studio-42/elFinder/commit/3b758495538a448ac8830ee3559e7fb2c260c6db'}, {'type': 'WEB', 'url': 'https://www.synacktiv.com/publications/elfinder-the-story-of-a-repwning.html'}] | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-07-07T19:15:57Z', 'nvd_published_at': '2022-03-21T17:15:00Z'} |
1.4.0 | GHSA-q863-cchm-c6c6 | 2022-03-30T20:34:44Z | 2022-03-25T00:00:33Z | null | ['CVE-2022-0153'] | SQL Injection in Fork CMS | Fork CMS contains a SQL injection vulnerability in versions prior to version 5.11.1. When deleting submissions which belong to a formular (made with module `FormBuilder`), the parameter `id[]` is vulnerable to SQL injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'forkcms/forkcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.11.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0153'}, {'type': 'WEB', 'url': 'https://github.com/forkcms/forkcms/commit/7a12046a67ae5d8cf04face3ee75e55f03a1a608'}, {'type': 'PACKAGE', 'url': 'https://github.com/forkcms/forkcms'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/841503dd-311c... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T20:36:57Z', 'nvd_published_at': '2022-03-24T17:15:00Z'} |
1.4.0 | GHSA-5mwx-f6w6-7w5r | 2022-03-10T22:00:31Z | 2022-03-04T00:00:19Z | null | ['CVE-2022-24563'] | Cross-site Scripting in GeniXCMS | In Genixcms v1.1.11, a stored Cross-Site Scripting (XSS) vulnerability exists in /gxadmin/index.php?page=themes&view=options" via the intro_title and intro_image parameters. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'genix/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24563'}, {'type': 'WEB', 'url': 'https://genix.me/'}, {'type': 'PACKAGE', 'url': 'https://github.com/semplon/GeniXCMS'}, {'type': 'WEB', 'url': 'https://github.com/truonghuuphuc/CVE'}, {'type': 'WEB', 'url': 'https://github.com/truonghuuphuc/CVE/bl... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-10T22:00:31Z', 'nvd_published_at': '2022-03-03T02:15:00Z'} |
1.4.0 | GHSA-ph3v-2hq5-5qfq | 2022-03-11T20:30:20Z | 2022-03-07T00:00:41Z | null | ['CVE-2021-46703'] | Code injection in RazorEngine | In the IsolatedRazorEngine component of Antaris RazorEngine through 4.5.1-alpha001, an attacker can execute arbitrary .NET code in a sandboxed environment (if users can externally control template contents). NOTE: This vulnerability only affects products that are no longer supported by the maintainer. | [] | [{'package': {'ecosystem': 'NuGet', 'name': 'RazorEngine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '4.5.1-alpha001'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-46703'}, {'type': 'WEB', 'url': 'https://github.com/Antaris/RazorEngine/issues/585'}] | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-11T20:30:20Z', 'nvd_published_at': '2022-03-06T06:15:00Z'} |
1.4.0 | GHSA-xm3x-787m-p66r | 2022-03-29T17:35:55Z | 2022-03-16T00:00:46Z | null | ['CVE-2022-0964'] | Cross-site Scripting in ShowDoc | ShowDoc prior to 2.10.4 is vulnerable to stored cross-site scripting via `.webmv` file upload. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0964'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/3caa32334db0c277b84e993eaca2036f5d1dbef8'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/dbe39998-8eb7... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-29T17:33:31Z', 'nvd_published_at': '2022-03-15T16:15:00Z'} |
1.4.0 | GHSA-6x2m-w449-qwx7 | 2022-03-18T17:47:49Z | 2022-03-15T20:13:38Z | null | ['CVE-2022-0811'] | Code Injection in CRI-O | ### Impact
A flaw introduced in CRI-O version 1.19 which an attacker can use to bypass the safeguards and set arbitrary kernel parameters on the host. As a result, anyone with rights to deploy a pod on a Kubernetes cluster that uses the CRI-O runtime can abuse the `kernel.core_pattern` kernel parameter to achieve conta... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.19.0'}, {'fixed': '1.19.6'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/cri-o/cri-o'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.20.0'}, {'fixed': '1.20.7'}]... | [{'type': 'WEB', 'url': 'https://github.com/cri-o/cri-o/security/advisories/GHSA-6x2m-w449-qwx7'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0811'}, {'type': 'WEB', 'url': 'https://access.redhat.com/security/cve/CVE-2022-0811'}, {'type': 'WEB', 'url': 'https://bugs.gentoo.org/835336'}, {'ty... | {'cwe_ids': ['CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-03-15T20:13:38Z', 'nvd_published_at': '2022-03-16T15:15:00Z'} |
1.4.0 | GHSA-gq77-3r6x-383w | 2022-03-23T14:22:08Z | 2022-03-13T00:00:54Z | null | ['CVE-2022-0880'] | Cross-site Scripting in ShowDoc | ShowDoc version 2.10.3 and prior is vulnerable to stored cross-site scripting. A patch is available and anticipated to be part of version 2.10.4. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'showdoc/showdoc'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.10.4'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.10.3'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0880'}, {'type': 'WEB', 'url': 'https://github.com/star7th/showdoc/commit/818d7fe731f452acccacf731ce47ec27ad68049c'}, {'type': 'PACKAGE', 'url': 'https://github.com/star7th/showdoc'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/df347aa9-ed9b... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-23T14:22:08Z', 'nvd_published_at': '2022-03-12T04:15:00Z'} |
1.4.0 | GHSA-hm3x-jwwf-jpr9 | 2022-03-31T20:43:24Z | 2022-03-24T00:00:17Z | null | ['CVE-2021-4180'] | Exposure of Sensitive Information to an Unauthorized Actor in OpenStack tripleo-heat-templates | An information exposure flaw in openstack-tripleo-heat-templates allows an external user to discover the internal IP or hostname. An attacker could exploit this by checking the `www_authenticate_uri parameter` (which is visible to all end users) in configuration files. This would give sensitive information which may ai... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'tripleo-heat-templates'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '11.6.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 11.6.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4180'}, {'type': 'WEB', 'url': 'https://github.com/openstack/tripleo-heat-templates/commit/160936df134a471cfd245bd60964046027a571ea'}, {'type': 'WEB', 'url': 'https://github.com/openstack/tripleo-heat-templates/commit/2b9461e97fc5c4ceb0848d1cc4484f... | {'cwe_ids': ['CWE-200', 'CWE-668'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-31T20:43:24Z', 'nvd_published_at': '2022-03-23T20:15:00Z'} |
1.4.0 | GHSA-874r-46c6-7p4r | 2022-11-30T20:42:25Z | 2022-03-16T00:00:45Z | null | ['CVE-2022-27196'] | Stored Cross-site Scripting vulnerability in Jenkins Favorite Plugin | Jenkins Favorite Plugin 2.4.0 and earlier does not escape the names of jobs in the favorite column, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Item/Configure or Item/Create permissions. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jvnet.hudson.plugins:favorite'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27196'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/favorite-plugin/commit/543a4d87c4fade02173f793905a99adec517bc3b'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/favorite-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-30T20:42:25Z', 'nvd_published_at': '2022-03-15T17:15:00Z'} |
1.4.0 | GHSA-28mg-98xm-q493 | 2022-03-18T21:19:29Z | 2022-03-08T00:00:32Z | null | ['CVE-2022-0697'] | Open Redirect in archivy | archivy prior to version 1.7.1 is vulnerable to open redirect. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'archivy'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.7.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0697'}, {'type': 'WEB', 'url': 'https://github.com/archivy/archivy/commit/2d8cb29853190d42572b36deb61127e68d6be574'}, {'type': 'PACKAGE', 'url': 'https://github.com/archivy/archivy'}, {'type': 'WEB', 'url': 'https://github.com/archivy/archivy/relea... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-08T17:48:14Z', 'nvd_published_at': None} |
1.4.0 | GHSA-4jp3-q2qm-9fmw | 2022-03-28T22:31:17Z | 2022-03-14T21:55:33Z | null | ['CVE-2022-24733'] | Improper Restriction of Rendered UI Layers or Frames in Sylius | ### Impact
It is possible for a page controlled by an attacker to load the website within an iframe. This will enable a clickjacking attack, in which the attacker's page overlays the target application's interface with a different interface provided by the attacker
### Patches
The issue is fixed in versions: 1.9.10,... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.9.10'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'sylius/sylius'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.10.0'}, {'fixed': '1.10.11'}]}]}, {'p... | [{'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/security/advisories/GHSA-4jp3-q2qm-9fmw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-24733'}, {'type': 'PACKAGE', 'url': 'https://github.com/Sylius/Sylius'}, {'type': 'WEB', 'url': 'https://github.com/Sylius/Sylius/releases/tag/v1.10... | {'cwe_ids': ['CWE-1021'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-14T21:55:33Z', 'nvd_published_at': '2022-03-14T19:15:00Z'} |
1.4.0 | GHSA-m8gq-83gh-v42v | 2022-03-18T23:52:30Z | 2022-03-16T00:00:49Z | null | ['CVE-2022-27193'] | XML External Entities Vulnerability in CVRF-CSAF-Converter | CVRF-CSAF-Converter before 1.0.0-rc2 resolves XML External Entities (XXE). This leads to the inclusion of arbitrary (local) file content into the generated output document. An attacker can exploit this to disclose information from the system running the converter. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'cvrf2csaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0rc2'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.0.0rc1'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-27193'}, {'type': 'PACKAGE', 'url': 'https://github.com/csaf-tools/CVRF-CSAF-Converter'}, {'type': 'WEB', 'url': 'https://github.com/csaf-tools/CVRF-CSAF-Converter/releases/tag/1.0.0-rc2'}] | {'cwe_ids': ['CWE-552', 'CWE-611'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-03-18T23:52:30Z', 'nvd_published_at': '2022-03-15T05:15:00Z'} |
1.4.0 | GHSA-45v7-65q8-x294 | 2022-11-29T21:49:49Z | 2022-03-30T00:00:26Z | null | ['CVE-2022-28133'] | Stored XSS vulnerability in Jenkins Bitbucket Server Integration Plugin | Jenkins Bitbucket Server Integration Plugin 3.1.0 and earlier does not limit URL schemes for callback URLs on OAuth consumers, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to create BitBucket Server consumers. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:atlassian-bitbucket-server-integration'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '3.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-28133'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/atlassian-bitbucket-server-integration-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-03-29/#SECURITY-2639'}, {'type': 'WEB', 'url': 'http://www.open... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:49:49Z', 'nvd_published_at': '2022-03-29T13:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.