schema_version
stringclasses
1 value
id
stringlengths
19
19
modified
stringlengths
20
20
published
stringlengths
20
20
withdrawn
stringlengths
20
20
aliases
stringlengths
2
20
summary
stringlengths
8
154
details
stringlengths
31
19.1k
severity
stringlengths
2
92
affected
stringlengths
75
28.5k
references
stringlengths
79
7.48k
database_specific
stringlengths
131
196
1.4.0
GHSA-hc5g-xf64-j49j
2022-12-12T20:45:34Z
2022-12-09T09:30:30Z
null
['CVE-2022-4375']
Mingsoft MCMS vulnerable to SQL Injection
A vulnerability was found in Mingsoft MCMS up to 5.2.9. It has been classified as critical. Affected is an unknown function of the file /cms/category/list. The manipulation of the argument sqlWhere leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.9'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4375'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I61TG5'}, {'type': 'PACKAGE', 'url': 'https://github.com/ming-soft/MCMS'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215196'}]
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T20:20:03Z', 'nvd_published_at': '2022-12-09T08:15:00Z'}
1.4.0
GHSA-j8x2-2m5w-j939
2023-04-03T19:24:00Z
2022-12-12T14:38:28Z
null
['CVE-2022-23511']
Amazon CloudWatch Agent for Windows has Privilege Escalation Vector
### Impact A privilege escalation issue exists within the Amazon CloudWatch Agent for Windows in versions up to and including v1.247354. When users trigger a repair of the Agent, a pop-up window opens with SYSTEM permissions. Users with administrative access to affected hosts may use this to create a new command prompt...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/aws/amazon-cloudwatch-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.247355.0'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/aws/amazon-cloudwatch-agent/security/advisories/GHSA-j8x2-2m5w-j939'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23511'}, {'type': 'WEB', 'url': 'https://github.com/aws/amazon-cloudwatch-agent/commit/6119858864c317ff26f41f576c169148d1250837'}, {'t...
{'cwe_ids': ['CWE-274'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T14:38:28Z', 'nvd_published_at': '2022-12-12T13:15:00Z'}
1.4.0
GHSA-3fhj-wpvj-x5w8
2022-12-30T18:03:33Z
2022-12-19T15:30:29Z
null
['CVE-2021-4262']
laravel-jqgrid vulnerable to SQL Injection
A vulnerability classified as critical was found in laravel-jqgrid. Affected by this vulnerability is the function getRows of the file src/Mgallegos/LaravelJqgrid/Repositories/EloquentRepositoryAbstract.php. The manipulation leads to sql injection. The name of the patch is fbc2d94f43d0dc772767a5bdb2681133036f935e. It i...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'mgallegos/laravel-jqgrid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4262'}, {'type': 'WEB', 'url': 'https://github.com/mgallegos/laravel-jqgrid/pull/72'}, {'type': 'WEB', 'url': 'https://github.com/mgallegos/laravel-jqgrid/commit/fbc2d94f43d0dc772767a5bdb2681133036f935e'}, {'type': 'PACKAGE', 'url': 'https://github...
{'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:03:33Z', 'nvd_published_at': '2022-12-19T14:15:00Z'}
1.4.0
GHSA-53mm-hx32-6475
2022-12-19T21:10:07Z
2022-12-14T21:30:16Z
null
['CVE-2022-47406']
TYPO3 vulnerable to Insufficient Session Expiration
An issue was discovered in the fe_change_pwd (aka Change password for frontend users) extension before 2.0.5, and 3.x before 3.0.3, for TYPO3. The extension fails to revoke existing sessions for the current user when the password has been changed.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.3'}]}]}, {'package': {'e...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47406'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/derhansen/fe_change_pwd/CVE-2022-47406.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/...
{'cwe_ids': ['CWE-613'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T21:10:07Z', 'nvd_published_at': '2022-12-14T21:15:00Z'}
1.4.0
GHSA-97jv-c342-5xhc
2022-12-29T23:37:10Z
2022-12-19T15:30:29Z
null
['CVE-2020-36618']
FurqanSoftware/node-whois vulnerable to Prototype Pollution
A vulnerability classified as critical has been found in Furqan node-whois. Affected is an unknown function of the file `index.coffee`. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). It is possible to launch the attack remotely. The name of the patch...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'whois'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.6'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36618'}, {'type': 'WEB', 'url': 'https://github.com/FurqanSoftware/node-whois/pull/105'}, {'type': 'WEB', 'url': 'https://github.com/FurqanSoftware/node-whois/commit/46ccc2aee8d063c7b6b4dee2c2834113b7286076'}, {'type': 'PACKAGE', 'url': 'https://gi...
{'cwe_ids': ['CWE-1321', 'CWE-74', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T18:24:03Z', 'nvd_published_at': '2022-12-19T14:15:00Z'}
1.4.0
GHSA-g662-qq45-ppwm
2022-12-21T18:53:51Z
2022-12-21T06:30:29Z
null
['CVE-2022-25929']
Smoothie vulnerable to Cross-site Scripting when tooltipLabel or strokeStyle are controlled by users
The package smoothie from 1.31.0 and before 1.36.1 are vulnerable to Cross-site Scripting (XSS) due to improper user input sanitization in strokeStyle and tooltipLabel properties. Exploiting this vulnerability is possible when the user can control these properties.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'smoothie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.31.0'}, {'fixed': '1.36.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25929'}, {'type': 'WEB', 'url': 'https://github.com/joewalnes/smoothie/pull/147'}, {'type': 'WEB', 'url': 'https://github.com/joewalnes/smoothie/commit/8e0920d50da82f4b6e605d56f41b69fbb9606a98'}, {'type': 'PACKAGE', 'url': 'https://github.com/joewa...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T18:53:51Z', 'nvd_published_at': '2022-12-21T05:15:00Z'}
1.4.0
GHSA-9qcm-fqj9-93m4
2022-12-14T21:32:34Z
2022-12-13T21:30:26Z
2022-12-14T21:32:34Z
[]
.NET Framework Remote Code Execution Vulnerability.
.NET Framework Remote Code Execution Vulnerability. Dupe of GHSA-2c7v-qcjp-4mg2
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.31'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41089'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41089'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T21:32:34Z', 'nvd_published_at': '2022-12-13T19:15:00Z'}
1.4.0
GHSA-7rg2-cxvp-9p7p
2022-12-02T22:25:46Z
2022-12-02T22:25:46Z
null
['CVE-2022-46146']
Prometheus Exporter-Toolkit is vulnerable to authentication bypass
### Impact Prometheus and its exporters can be secured by a web.yml file that specifies usernames and hashed passwords for basic authentication. Passwords are hashed with bcrypt, which means that even if you have access to the hash, it is very hard to find the original password back. However, a flaw in the way this ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/exporter-toolkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/exporter-toolkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8....
[{'type': 'WEB', 'url': 'https://github.com/prometheus/exporter-toolkit/security/advisories/GHSA-7rg2-cxvp-9p7p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46146'}, {'type': 'WEB', 'url': 'https://github.com/prometheus/exporter-toolkit/commit/5b1eab34484ddd353986bce736cd119d863e4ff5'}, {'t...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:25:46Z', 'nvd_published_at': '2022-11-29T14:15:00Z'}
1.4.0
GHSA-9p8j-hrgf-jc2g
2022-12-20T22:10:26Z
2022-12-20T21:30:19Z
null
['CVE-2022-46870']
Apache Zeppelin Cross-site Scripting vulnerability
An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Zeppelin allows logged-in users to execute arbitrary javascript in other users' browsers. This issue affects Apache Zeppelin before 0.8.2. Users are recommended to upgrade to a supported version of Zeppelin.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.zeppelin:zeppelin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46870'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/zeppelin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/gb1wdnrm1095xw6qznpsycfrht4lwbwc'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:10:26Z', 'nvd_published_at': '2022-12-16T13:15:00Z'}
1.4.0
GHSA-r88r-gmrh-7j83
2023-01-10T15:50:24Z
2022-12-28T00:30:23Z
null
['CVE-2021-4235']
YAML Go package vulnerable to denial of service
Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'gopkg.in/yaml.v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/go-yaml/yaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4235'}, {'type': 'WEB', 'url': 'https://github.com/go-yaml/yaml/pull/375'}, {'type': 'WEB', 'url': 'https://github.com/go-yaml/yaml/commit/bb4e33bf68bf89cad44d386192cbed201f35b241'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-yaml/yaml'}, {'...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:02:10Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-v93c-cxj5-c398
2022-12-12T22:19:23Z
2022-12-12T09:30:35Z
null
['CVE-2022-46683']
Jenkins Google Login Plugin Open Redirect vulnerability
Jenkins Google Login Plugin 1.4 through 1.6 (both inclusive) improperly determines that a redirect URL after login is legitimately pointing to Jenkins. Google Login Plugin 1.7 only redirects to relative (Jenkins) URLs.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-login'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4'}, {'fixed': '1.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46683'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/google-login-plugin/commit/532d714943ff8ae8dc862427d39a4b78b7f6a375'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/google-login-plugin'}, {'type': 'WEB', 'url': 'https://www...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:19:23Z', 'nvd_published_at': '2022-12-12T09:15:00Z'}
1.4.0
GHSA-hvwx-qh2h-xcfj
2022-12-13T16:59:12Z
2022-12-13T16:59:12Z
null
['CVE-2022-23499']
TYPO3 HTML Sanitizer vulnerable to Cross-Site Scripting
### Problem Due to a parsing issue in the upstream package [`masterminds/html5`](https://packagist.org/packages/masterminds/html5), malicious markup used in a sequence with special HTML CDATA sections cannot be filtered and sanitized. This allows bypassing the cross-site scripting mechanism of [`typo3/html-sanitizer`](...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.5.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2....
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/html-sanitizer/security/advisories/GHSA-hvwx-qh2h-xcfj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23499'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/html-sanitizer/pull/105'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/html-sa...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T16:59:12Z', 'nvd_published_at': '2022-12-13T21:15:00Z'}
1.4.0
GHSA-h972-v458-m892
2022-12-07T14:56:02Z
2022-12-05T21:30:41Z
null
['CVE-2022-37783']
Craft CMS discloses password hashes
All Craft CMS versions between 3.0.0 and 3.7.32 disclose password hashes of users who authenticate using their E-Mail address or username in Anti-CSRF-Tokens. Craft CMS uses a cookie called CRAFT_CSRF_TOKEN and a HTML hidden field called CRAFT_CSRF_TOKEN to avoid Cross Site Request Forgery attacks. The CRAFT_CSRF_TOKEN...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.7.33'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.7.32'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37783'}, {'type': 'WEB', 'url': 'https://at-trustit.tuv.at/tuev-trust-it-cves/cve-disclosure-of-password-hashes/'}, {'type': 'WEB', 'url': 'https://cves.at/posts/cve-2022-37783/writeup/'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms...
{'cwe_ids': ['CWE-200', 'CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T14:56:02Z', 'nvd_published_at': '2022-12-05T21:15:00Z'}
1.4.0
GHSA-j5p7-jf4q-742q
2023-01-10T15:38:01Z
2022-12-27T09:30:41Z
null
['CVE-2015-10005']
markdown-it vulnerable to Inefficient Regular Expression Complexity
A vulnerability was found in markdown-it up to 2.x. It has been classified as problematic. Affected is an unknown function of the file `lib/common/html_re.js`. The manipulation leads to inefficient regular expression complexity. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is 89c86201...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'markdown-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-10005'}, {'type': 'WEB', 'url': 'https://github.com/markdown-it/markdown-it/commit/89c8620157d6e38f9872811620d25138fc9d1b0d'}, {'type': 'PACKAGE', 'url': 'https://github.com/markdown-it/markdown-it'}, {'type': 'WEB', 'url': 'https://github.com/mark...
{'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:27:08Z', 'nvd_published_at': '2022-12-27T09:15:00Z'}
1.4.0
GHSA-cwrm-33qq-4w2x
2023-01-10T00:53:06Z
2022-12-29T18:30:24Z
null
['CVE-2022-4846']
usememos/memos Cross-Site Request Forgery vulnerability
Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos 0.9.0 and prior.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4846'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/38c685fc-7065-4...
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:53:12Z', 'nvd_published_at': '2022-12-29T18:15:00Z'}
1.4.0
GHSA-wpgc-5cr5-h9gg
2022-12-13T17:56:45Z
2022-12-11T15:30:44Z
null
['CVE-2022-4409']
phpMyFAQ has insecure HTTP cookies
phpMyFAQ is contains Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in versions prior to 3.1.9.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4409'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpMyFAQ/commit/c16cc2bbe2687f75aa1204b804483091fae43cba'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/8b47f38'}, {'type': 'PACKAGE', 'url': 'https://github.com/th...
{'cwe_ids': ['CWE-311', 'CWE-319', 'CWE-614'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:06:06Z', 'nvd_published_at': '2022-12-11T15:15:00Z'}
1.4.0
GHSA-rprg-4v7q-87v7
2022-12-12T20:44:53Z
2022-12-08T18:30:50Z
null
['CVE-2022-4123']
Buildah (as part of Podman) vulnerable to Path Traversal
A flaw was found in Buildah. The local path and the lowest subdirectory may be disclosed due to incorrect absolute path traversal, resulting in an impact to confidentiality.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/podman/v4'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0-rc1'}, {'last_affected': '4.4.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4123'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/issues/13293'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/pull/13531'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2144989'}, {'type': ...
{'cwe_ids': ['CWE-23'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T23:59:57Z', 'nvd_published_at': '2022-12-08T16:15:00Z'}
1.4.0
GHSA-fv6c-rfg3-gvjw
2023-01-02T20:21:28Z
2022-12-23T12:30:25Z
null
['CVE-2022-4687']
usememos/memos makes Incorrect Use of Privileged APIs
Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4687'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/dca35bde877aab6e64ef51b52e590b5d48f692f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b908377f-a61b-4...
{'cwe_ids': ['CWE-269', 'CWE-648'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:25:32Z', 'nvd_published_at': '2022-12-23T12:15:00Z'}
1.4.0
GHSA-4whf-rmx5-8frv
2023-01-03T21:25:15Z
2022-12-19T00:30:23Z
null
['CVE-2021-4250']
active_attr Improper Resource Shutdown or Release vulnerability
A vulnerability classified as problematic has been found in cgriego active_attr up to 0.15.3. This affects the function call of the file lib/active_attr/typecasting/boolean_typecaster.rb of the component Regex Handler. The manipulation of the argument value leads to denial of service. The exploit has been disclosed to ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'active_attr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4250'}, {'type': 'WEB', 'url': 'https://github.com/cgriego/active_attr/issues/184'}, {'type': 'WEB', 'url': 'https://github.com/cgriego/active_attr/pull/185'}, {'type': 'WEB', 'url': 'https://github.com/cgriego/active_attr/commit/dab95e5843b0152544...
{'cwe_ids': ['CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T18:16:23Z', 'nvd_published_at': '2022-12-18T22:15:00Z'}
1.4.0
GHSA-j563-grx4-pjpv
2022-12-29T01:48:08Z
2022-12-29T01:48:08Z
null
['CVE-2022-41966']
XStream can cause Denial of Service via stack overflow
### Impact The vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream. ### Patches XStream 1.4.20 handles the stack overflow and raises an InputManipulationException instead. ### Workarounds Th...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.20'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-j563-grx4-pjpv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41966'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2022-41966.htm...
{'cwe_ids': ['CWE-120', 'CWE-121', 'CWE-502', 'CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:48:08Z', 'nvd_published_at': '2022-12-28T00:15:00Z'}
1.4.0
GHSA-47vx-fqr5-j2gw
2022-12-22T22:03:02Z
2022-12-16T21:30:44Z
null
['CVE-2022-4565']
HuTool vulnerable to Uncontrolled Resource Consumption
A vulnerability classified as problematic was found in Dromara HuTool up to 5.8.10. This vulnerability affects unknown code of the file cn.hutool.core.util.ZipUtil.java. The manipulation leads to resource consumption. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Up...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.11'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4565'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/issues/2797'}, {'type': 'PACKAGE', 'url': 'https://github.com/dromara/hutool'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215974'}]
{'cwe_ids': ['CWE-400', 'CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T21:56:55Z', 'nvd_published_at': '2022-12-16T19:15:00Z'}
1.4.0
GHSA-f683-35w9-28g5
2023-02-08T00:23:48Z
2022-12-14T21:30:16Z
null
['CVE-2022-47408']
Multiple vulnerabilities in extension "Newsletter subscriber management" (fp_newsletter)
The CAPTCHA of the extension can be bypassed which may result in automated creation of various newsletter subscribers. It is possible to provide arbitrary subscription UIDs to the `deleteAction` of the extension resulting in all newsletter subscribers to be unsubscribed. Insufficient access checks in the `createAction`...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'fixpunkt/fp-newsletter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '3.2.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'fixpunkt/fp-newsletter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47408'}, {'type': 'WEB', 'url': 'https://github.com/bihor/fp_newsletter/commit/bc673cd9ab04f3fdd1225303f2ccb378b11a3747'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/fixpunkt/fp-newsletter/CVE-2022-47408...
{'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:23:48Z', 'nvd_published_at': '2022-12-14T21:15:00Z'}
1.4.0
GHSA-gxqf-4g4p-q3hc
2023-01-10T15:37:45Z
2022-12-29T18:30:24Z
null
['CVE-2022-4839']
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos 0.9.0 and prior.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4839'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/64e5c343c5f74b0abdf3ac0d21a6139daea58cf8'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ad954cab-f026-4...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:53:46Z', 'nvd_published_at': '2022-12-29T17:15:00Z'}
1.4.0
GHSA-q9qr-jwpw-3qvv
2023-08-29T19:36:30Z
2022-12-28T00:30:23Z
null
['CVE-2016-15005']
Golf may allow attacker to bypass CSRF protections due to weak PRNG
CSRF tokens are generated using math/rand, which is not a cryptographically secure random number generator, allowing an attacker to predict values and bypass CSRF protections with relatively few requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/dinever/golf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-15005'}, {'type': 'WEB', 'url': 'https://github.com/dinever/golf/issues/20'}, {'type': 'WEB', 'url': 'https://github.com/dinever/golf/pull/24'}, {'type': 'WEB', 'url': 'https://github.com/dinever/golf/commit/3776f338be48b5bc5e8cf9faff7851fc52a3f1fe...
{'cwe_ids': ['CWE-332', 'CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:45:18Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-5pqf-rvm7-3wgw
2022-12-29T00:36:20Z
2022-12-22T00:30:36Z
null
['CVE-2022-4638']
collective.contact.widget is vulnerable to cross-site scripting
collective.contact.widget is an add-on is part of the collective.contact.* suite. A vulnerability classified as problematic was found in collective.contact.widget up to 1.12. This vulnerability affects the function title of the file src/collective/contact/widget/widgets.py. The manipulation leads to cross site scriptin...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'collective.contact.widget'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4638'}, {'type': 'WEB', 'url': 'https://github.com/collective/collective.contact.widget/commit/5da36305ca7ed433782be8901c47387406fcda12'}, {'type': 'PACKAGE', 'url': 'https://github.com/collective/collective.contact.widget'}, {'type': 'WEB', 'url':...
{'cwe_ids': ['CWE-707', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T00:36:20Z', 'nvd_published_at': '2022-12-21T22:15:00Z'}
1.4.0
GHSA-rjf6-wj7r-5fj2
2022-12-13T17:56:27Z
2022-12-11T15:30:45Z
null
['CVE-2022-4408']
phpMyFAQ vulnerable to Cross-site Scripting
phpMyFAQ prior to version 3.1.9 is vulnerable to stored Cross-site Scripting (XSS).
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4408'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/e2ea332a2b5e798f2c39203b2489a2dabe831751'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2ec4ddd4-...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:07:20Z', 'nvd_published_at': '2022-12-11T15:15:00Z'}
1.4.0
GHSA-wf33-6x33-wcf9
2023-01-06T18:09:57Z
2022-12-27T15:30:19Z
null
['CVE-2022-4722']
rdiffweb vulnerable to Authentication Bypass by Primary Weakness
In rdiffweb prior to 2.5.5, the username field is not unique to users. This allows exploitation of primary key logic by creating the same name with different combinations & may allow unauthorized access.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4722'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/d1aaa96b665a39fba9e98d6054a9de511ba0a837'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c62126dc-d9...
{'cwe_ids': ['CWE-287', 'CWE-305'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:01:28Z', 'nvd_published_at': '2022-12-27T15:15:00Z'}
1.4.0
GHSA-5g2c-j6v9-vf94
2022-12-12T22:16:49Z
2022-12-12T09:30:35Z
null
['CVE-2022-46686']
Jenkins Custom Build Properties Plugin vulnerable to Cross-site Scripting
Jenkins Custom Build Properties Plugin 2.79.vc095ccc85094 and earlier does not escape property values and build display names on the Custom Build Properties and Build Summary pages, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to set or change these values. Custom Build P...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:custom-build-properties'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.82.v16d5b'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46686'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/custom-build-properties-plugin/commit/ff4e27181389955cbb051c1c91f0c85c6adbced0'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/custom-build-properties-plugin'}, {'type': 'WEB...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:16:49Z', 'nvd_published_at': '2022-12-12T09:15:00Z'}
1.4.0
GHSA-78m5-jpmf-ch7v
2022-12-15T21:59:23Z
2022-12-05T23:34:43Z
null
['CVE-2022-23530']
GuardDog vulnerable to arbitrary file write when scanning a specially-crafted remote PyPI package
### Summary Unsafe extracting using `shutil.unpack_archive()` from a remotely retrieved tarball may lead to writing the extracted file to an unintended destination. ### Details Extracting files using `shutil.unpack_archive()` from a potentially malicious tarball without validating that the destination file path is w...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'guarddog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.1.7'}}]
[{'type': 'WEB', 'url': 'https://github.com/DataDog/guarddog/security/advisories/GHSA-78m5-jpmf-ch7v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23530'}, {'type': 'WEB', 'url': 'https://github.com/DataDog/guarddog/commit/37c7d0767ba28f4df46117d478f97652594c491c'}, {'type': 'PACKAGE', 'url'...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:34:43Z', 'nvd_published_at': '2022-12-16T23:15:00Z'}
1.4.0
GHSA-363q-j92x-7543
2023-01-02T20:26:02Z
2022-12-25T06:30:21Z
null
['CVE-2022-44380']
Snipe-IT vulnerable to Cross Site Scripting for View Assigned Assets
Snipe-IT before 6.0.14 is vulnerable to Cross Site Scripting (XSS) for View Assigned Assets.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44380'}, {'type': 'WEB', 'url': 'https://census-labs.com/news/2022/12/23/multiple-vulnerabilities-in-snipe-it/'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:18:49Z', 'nvd_published_at': '2022-12-25T05:15:00Z'}
1.4.0
GHSA-6cr6-fmvc-vw2p
2023-02-09T21:41:23Z
2022-12-28T00:30:23Z
null
['CVE-2021-4239']
Noise vulnerable to denial of service
Noise is a Go implementation of the Noise Protocol Framework. The Noise protocol implementation suffers from weakened cryptographic security after encrypting 2^64 messages, and a potential denial of service attack. After 2^64 (~18.4 quintillion) messages are encrypted with the Encrypt function, the nonce counter will w...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/flynn/noise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4239'}, {'type': 'WEB', 'url': 'https://github.com/flynn/noise/pull/44'}, {'type': 'WEB', 'url': 'https://github.com/flynn/noise/commit/2499bf1bad239a8316c32932a993642350b3afdb'}, {'type': 'PACKAGE', 'url': 'https://github.com/flynn/noise'}, {'type...
{'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:52:11Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-47xh-qxqv-mgvg
2022-12-02T22:24:44Z
2022-12-02T22:24:44Z
null
[]
kube-httpcache is vulnerable to Cross-Site Request Forgery (CSRF)
### Impact > A request forgery attack can be performed on Varnish Cache servers that have the HTTP/2 protocol turned on. An attacker may introduce characters through the HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the...
[]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/mittwald/kube-httpcache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/mittwald/kube-httpcache/security/advisories/GHSA-47xh-qxqv-mgvg'}, {'type': 'PACKAGE', 'url': 'https://github.com/mittwald/kube-httpcache'}, {'type': 'WEB', 'url': 'https://varnish-cache.org/security/VSV00011.html#vsv00011'}]
{'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:24:44Z', 'nvd_published_at': None}
1.4.0
GHSA-8c28-5mp7-v24h
2022-12-13T17:02:09Z
2022-12-13T17:02:09Z
null
['CVE-2022-23500']
TYPO3 CMS vulnerable to Denial of Service in Page Error Handling
### Problem Requesting invalid or non-existing resources via HTTP triggers the page error handler, which again could retrieve content to be shown as an error message from another page. This leads to a scenario in which the application is calling itself recursively - amplifying the impact of the initial attack until the...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.38'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.33'}]}]...
[{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-8c28-5mp7-v24h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23500'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/1e5f44417f031c9c5a9f9d09a6a841cf89aa7b7a'}, {'type': 'WEB', 'url': 'https://git...
{'cwe_ids': ['CWE-405', 'CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:02:09Z', 'nvd_published_at': '2022-12-14T08:15:00Z'}
1.4.0
GHSA-6m4h-hfpp-x8cx
2022-12-30T17:06:17Z
2022-12-22T00:30:36Z
null
['CVE-2022-4643']
docconv OS Command Injection vulnerability
A vulnerability was found in docconv prior to version 1.2.1. It has been declared as critical. This vulnerability affects the function ConvertPDFImages of the file pdf_ocr.go. The manipulation of the argument path leads to os command injection. The attack can be initiated remotely. Upgrading to version 1.2.1 can addres...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/sajari/docconv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'code.sajari.com/docconv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.3.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4643'}, {'type': 'WEB', 'url': 'https://github.com/sajari/docconv/pull/110'}, {'type': 'WEB', 'url': 'https://github.com/sajari/docconv/commit/b19021ade3d0b71c89d35cb00eb9e589a121faa5'}, {'type': 'PACKAGE', 'url': 'https://github.com/sajari/docconv...
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:06:17Z', 'nvd_published_at': '2022-12-21T22:15:00Z'}
1.4.0
GHSA-32qh-8vg6-9g43
2023-01-10T15:59:17Z
2022-12-28T00:30:23Z
null
['CVE-2018-25046']
Cloud Foundry Archiver vulnerable to path traversal
Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudfoundry/archiver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20180523222229-09b5706aa936'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'code.cloudfoundry.org/archiver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25046'}, {'type': 'WEB', 'url': 'https://github.com/cloudfoundry/archiver/commit/09b5706aa9367972c09144a450bb4523049ee840'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudfoundry/archiver'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-...
{'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:15:54Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-89w7-5q45-r53w
2022-12-27T17:53:39Z
2022-12-20T06:30:36Z
null
['CVE-2022-25940']
lite-server vulnerable to Denial of Service
All versions of package lite-server are vulnerable to Denial of Service (DoS) when an attacker sends an HTTP request and includes control characters that the `decodeURI()` function is unable to parse.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'lite-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:lite-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25940'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/832382155e00da92bfd8bb3adea474eb'}, {'type': 'PACKAGE', 'url': 'https://github.com/johnpapa/lite-server'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSN...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T17:37:47Z', 'nvd_published_at': '2022-12-20T05:15:00Z'}
1.4.0
GHSA-j453-hm5x-c46w
2022-12-12T20:48:00Z
2022-12-07T18:30:26Z
null
['CVE-2020-36565']
Echo vulnerable to directory traversal
Due to improper sanitization of user input on Windows, the static file handler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/labstack/echo/v4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36565'}, {'type': 'WEB', 'url': 'https://github.com/labstack/echo/pull/1718'}, {'type': 'WEB', 'url': 'https://github.com/labstack/echo/commit/4422e3b66b9fd498ed1ae1d0242d660d0ed3faaa'}, {'type': 'PACKAGE', 'url': 'https://github.com/labstack/echo'...
{'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T20:46:25Z', 'nvd_published_at': '2022-12-07T17:15:00Z'}
1.4.0
GHSA-h5wp-jrqc-cwwx
2022-12-30T00:54:22Z
2022-12-27T15:30:19Z
null
['CVE-2022-4720']
rdiffweb vulnerable to Open Redirect
Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.5.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4720'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/6afaae56a29536f0118b3380d296c416aa6d078d'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/339687af-6e...
{'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T00:54:22Z', 'nvd_published_at': '2022-12-27T15:15:00Z'}
1.4.0
GHSA-x3qh-53qf-jxq9
2022-12-12T22:18:16Z
2022-12-12T09:30:35Z
null
['CVE-2022-46685']
Jenkins Gitea Plugin vulnerable to Cleartext Transmission of Sensitive Information
In Jenkins Gitea Plugin 1.4.4 and earlier, the implementation of Gitea personal access tokens did not support credentials masking, potentially exposing them through the build log. Gitea Plugin 1.4.5 adds support for masking of Gitea personal access tokens. Administrators unable to update are advised to use SSH checko...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46685'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/gitea-plugin/commit/b3b2bd869b91f9f1312bbbbf6128cad2cd86bd8c'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/gitea-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/se...
{'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:18:16Z', 'nvd_published_at': '2022-12-12T09:15:00Z'}
1.4.0
GHSA-74hc-57m5-83ch
2022-12-29T19:23:01Z
2022-12-22T12:30:17Z
null
['CVE-2020-36624']
text_helpers uses web link to untrusted target with window.opener access
A vulnerability was found in ahorner text-helpers 1.1.0/1.1.1. This vulnerability affects unknown code of the file lib/text_helpers/translation.rb. The manipulation of the argument link leads to use of web link to untrusted target with window.opener access. The attack can be initiated remotely. Upgrading to version 1.2...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'text_helpers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.2.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36624'}, {'type': 'WEB', 'url': 'https://github.com/ahorner/text-helpers/pull/19'}, {'type': 'WEB', 'url': 'https://github.com/ahorner/text-helpers/commit/184b60ded0e43c985788582aca2d1e746f9405a3'}, {'type': 'PACKAGE', 'url': 'https://github.com/ah...
{'cwe_ids': ['CWE-1022', 'CWE-266'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T20:03:04Z', 'nvd_published_at': '2022-12-22T10:15:00Z'}
1.4.0
GHSA-4fv8-w65m-3932
2022-12-30T16:57:49Z
2022-12-30T16:57:49Z
null
['CVE-2022-46174']
efs-utils and aws-efs-csi-driver have race condition during concurrent TLS mounts
### Impact A potential race condition issue exists within the Amazon EFS mount helper in efs-utils versions v1.34.3 and below, and aws-efs-csi-driver versions v1.4.7 and below. When using TLS to mount file systems, the mount helper allocates a local port for stunnel to receive NFS connections prior to applying the TLS ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes-sigs/aws-efs-csi-driver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.7'}}]
[{'type': 'WEB', 'url': 'https://github.com/aws/efs-utils/security/advisories/GHSA-4fv8-w65m-3932'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46174'}, {'type': 'WEB', 'url': 'https://github.com/aws/efs-utils/issues/125'}, {'type': 'WEB', 'url': 'https://github.com/aws/efs-utils/commit/f3a8...
{'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:57:49Z', 'nvd_published_at': '2022-12-28T07:15:00Z'}
1.4.0
GHSA-9v25-r5q2-2p6w
2022-12-12T22:03:19Z
2022-12-12T22:03:19Z
null
[]
Candy Machine Set Collection During Mint Missing Check
A problem with Candy Machine V2 allow minting NFTs to an arbitrary collection due to a missing check. Here is a description of the exploit: Details: Here is the tx/ix to exploit: Transaction: Ix 1: candy_machine v2, mint_nft, passing in empty metadata -1 Ix 2: custom handler, 0 cpi A --> token_metadata create_metada...
[]
[{'package': {'ecosystem': 'crates.io', 'name': 'mpl-candy-machine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.1'}]}], 'versions': ['4.5.0']}]
[{'type': 'WEB', 'url': 'https://github.com/metaplex-foundation/metaplex-program-library/security/advisories/GHSA-9v25-r5q2-2p6w'}, {'type': 'WEB', 'url': 'https://github.com/metaplex-foundation/metaplex-program-library/commit/e6b3aff603ac06236bf77c2ec21ead93c6836dce'}, {'type': 'PACKAGE', 'url': 'https://github.com/me...
{'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:03:19Z', 'nvd_published_at': None}
1.4.0
GHSA-5rhg-xhgr-5hfj
2023-01-10T15:58:16Z
2022-12-28T03:30:28Z
null
['CVE-2020-36563']
go-saml's XML Digital Signatures use SHA-1
XML Digital Signatures generated and validated using this package use SHA-1, which may allow an attacker to craft inputs which cause hash collisions depending on their control over the input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/RobotsAndPencils/go-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.0-20170520135329-fb13cb52a46b'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36563'}, {'type': 'WEB', 'url': 'https://github.com/RobotsAndPencils/go-saml/pull/38'}, {'type': 'PACKAGE', 'url': 'https://github.com/RobotsAndPencils/go-saml'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0047'}]
{'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:48:02Z', 'nvd_published_at': '2022-12-28T03:15:00Z'}
1.4.0
GHSA-gvfj-fxx3-j323
2023-08-30T18:49:55Z
2022-12-31T03:30:26Z
null
['CVE-2022-48195']
mellium.im/sasl authentication failure due to insufficient nonce randomness
An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end th...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'mellium.im/sasl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48195'}, {'type': 'PACKAGE', 'url': 'https://codeberg.org/mellium/sasl'}, {'type': 'WEB', 'url': 'https://codeberg.org/mellium/sasl/commit/e6cbf681b247c4efa1477eaad2cc47a01707b732'}, {'type': 'WEB', 'url': 'https://codeberg.org/mellium/sasl/release...
{'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T13:56:47Z', 'nvd_published_at': '2022-12-31T01:15:00Z'}
1.4.0
GHSA-gxq5-79m2-gvvq
2022-12-20T15:22:58Z
2022-12-15T21:30:29Z
null
['CVE-2022-32531']
Apache Bookkeeper vulnerable to Improper Certificate Validation
The Apache Bookkeeper Java Client (before 4.14.6 and also 4.15.0) does not close the connection to the bookkeeper server when TLS hostname verification fails. This leaves the bookkeeper client vulnerable to a man in the middle attack. The problem affects BookKeeper client prior to versions 4.14.6 and 4.15.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.bookkeeper:bookkeeper-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.14.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.bookkeeper:bookkeeper-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduce...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32531'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/bookkeeper'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/xyk2lfc7lzof8mksmwyympbqxts1b5s9'}]
{'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:33:41Z', 'nvd_published_at': '2022-12-15T19:15:00Z'}
1.4.0
GHSA-qv4q-mr5r-qprj
2022-12-08T03:03:33Z
2022-12-08T03:03:33Z
null
['CVE-2022-23476']
Unchecked return value from xmlTextReaderExpand
## Summary Nokogiri `1.13.8, 1.13.9` fails to check the return value from `xmlTextReaderExpand` in the method `Nokogiri::XML::Reader#attribute_hash`. This can lead to a null pointer exception when invalid markup is being parsed. For applications using `XML::Reader` to parse untrusted inputs, this may potentially be ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.8'}, {'fixed': '1.13.10'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-qv4q-mr5r-qprj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23476'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/commit/85410e38410f670cbbc8c5b00d07b843caee88ce'}, {'type': 'WEB...
{'cwe_ids': ['CWE-252', 'CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T03:03:33Z', 'nvd_published_at': '2022-12-08T04:15:00Z'}
1.4.0
GHSA-m973-4vpc-x43c
2023-01-10T15:38:49Z
2022-12-27T15:30:19Z
null
['CVE-2022-4730']
Graphite Web Cross-site Scripting vulnerability
A vulnerability was found in Graphite Web. It has been classified as problematic. Affected is an unknown function of the component Absolute Time Range Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'graphite-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4730'}, {'type': 'WEB', 'url': 'https://github.com/graphite-project/graphite-web/issues/2746'}, {'type': 'WEB', 'url': 'https://github.com/graphite-project/graphite-web/pull/2785'}, {'type': 'WEB', 'url': 'https://github.com/graphite-project/graphi...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:57:01Z', 'nvd_published_at': '2022-12-27T15:15:00Z'}
1.4.0
GHSA-p495-jxh2-wrfg
2022-12-20T18:53:51Z
2022-12-15T21:30:28Z
null
['CVE-2021-4245']
npm package rfc6902 vulnerable to Prototype Pollution
A vulnerability classified as problematic has been found in chbrown rfc6902. This affects an unknown part of the file pointer.ts. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The exploit has been disclosed to the public and may be used. The name of...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'rfc6902'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4245'}, {'type': 'WEB', 'url': 'https://github.com/chbrown/rfc6902/issues/84'}, {'type': 'WEB', 'url': 'https://github.com/chbrown/rfc6902/pull/76'}, {'type': 'WEB', 'url': 'https://github.com/chbrown/rfc6902/commit/c006ce9faa43d31edb34924f1df7b79c...
{'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:29:47Z', 'nvd_published_at': '2022-12-15T20:15:00Z'}
1.4.0
GHSA-g3wc-xv93-445q
2022-12-22T23:06:24Z
2022-12-18T12:30:20Z
null
['CVE-2021-4248']
DNS NuGet package uses insufficiently random values
A vulnerability was found in kapetan dns up to 6.1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file DNS/Protocol/Request.cs. The manipulation leads to insufficient entropy in prng. The attack may be launched remotely. Upgrading to version 7.0.0 can address this issue...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'DNS'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4248'}, {'type': 'WEB', 'url': 'https://github.com/kapetan/dns/pull/88'}, {'type': 'WEB', 'url': 'https://github.com/kapetan/dns/commit/cf7105aa2aae90d6656088fe5a8ee1d5730773b6'}, {'type': 'PACKAGE', 'url': 'https://github.com/kapetan/dns'}, {'type...
{'cwe_ids': ['CWE-330'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T23:06:24Z', 'nvd_published_at': '2022-12-18T11:15:00Z'}
1.4.0
GHSA-rmhx-9h5h-3xh3
2023-01-10T00:54:30Z
2022-12-29T18:30:24Z
null
['CVE-2022-4841']
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4841'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/64e5c343c5f74b0abdf3ac0d21a6139daea58cf8'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/fa46b3ef-c621-4...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:53:30Z', 'nvd_published_at': '2022-12-29T17:15:00Z'}
1.4.0
GHSA-g594-55mp-f6q8
2022-12-15T17:31:47Z
2022-12-12T18:30:27Z
null
['CVE-2022-4314']
Improper Privilege Management in rdiffweb
Unauthorized access to settings update, logs , history, delete etc in GitHub repository ikus060/rdiffweb prior to 2.5.2.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4314'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/b2df3679564d0daa2856213bb307d3e34bd89a25'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b2dc504d-92...
{'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:31:47Z', 'nvd_published_at': '2022-12-12T18:15:00Z'}
1.4.0
GHSA-vc39-x7w6-6vj7
2022-12-05T23:15:18Z
2022-12-02T15:30:26Z
null
['CVE-2022-46366']
Apache Tapestry allows deserialization of untrusted data
** UNSUPPORTED WHEN ASSIGNED ** Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line 3.x, ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '5.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46366'}, {'type': 'WEB', 'url': 'https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0041/MNDT-2022-0041.md'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/bwn1vjrvz1hq0wbdzj23wz322244swhj'}, {'type': 'WEB', ...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:15:18Z', 'nvd_published_at': '2022-12-02T14:15:00Z'}
1.4.0
GHSA-f5h9-qx38-2hgp
2023-01-10T15:39:09Z
2022-12-27T15:30:19Z
null
['CVE-2022-4725']
AWS SDK is vulnerable to server-side request forgery (SSRF)
A vulnerability was found in AWS SDK 2.59.0. It has been rated as critical. This issue affects the function XpathUtils of the file aws-android-sdk-core/src/main/java/com/amazonaws/util/XpathUtils.java of the component XML Parser. The manipulation leads to server-side request forgery. Upgrading to version 2.59.1 can add...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'com.amazonaws:aws-android-sdk-mobile-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.59.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.59.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4725'}, {'type': 'WEB', 'url': 'https://github.com/aws-amplify/aws-sdk-android/pull/3100'}, {'type': 'WEB', 'url': 'https://github.com/aws-amplify/aws-sdk-android/commit/c3e6d69422e1f0c80fe53f2d757b8df97619af2b'}, {'type': 'PACKAGE', 'url': 'https:...
{'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T00:54:03Z', 'nvd_published_at': '2022-12-27T15:15:00Z'}
1.4.0
GHSA-639f-hxcv-84mc
2022-12-29T17:00:41Z
2022-12-22T03:30:19Z
null
['CVE-2022-4644']
rdiffweb Open Redirect vulnerability
rdiffweb prior to version 2.5.4 has an Open Redirect vulnerability.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4644'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/5f861670ef8f38ca8eea52a98672d0e0fabb5368'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/77e5f425-c7...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T20:02:09Z', 'nvd_published_at': '2022-12-22T01:15:00Z'}
1.4.0
GHSA-894q-wpg5-mf2h
2022-12-13T19:32:22Z
2022-12-10T12:30:18Z
null
['CVE-2022-4396']
pyRdfa3 Cross-site Scripting vulnerability
A vulnerability was found in RDFlib pyrdfa3 and classified as problematic. This issue affects the function _get_option of the file pyRdfa/__init__.py. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is ffd1d62dd50d5f4190013b39cedcdfbd81f3ce3e. It is recommende...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'pyRdfa3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.5.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4396'}, {'type': 'WEB', 'url': 'https://github.com/RDFLib/pyrdfa3/issues/38'}, {'type': 'WEB', 'url': 'https://github.com/RDFLib/pyrdfa3/pull/40'}, {'type': 'WEB', 'url': 'https://github.com/RDFLib/pyrdfa3/commit/ffd1d62dd50d5f4190013b39cedcdfbd81f...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:32:22Z', 'nvd_published_at': '2022-12-10T12:15:00Z'}
1.4.0
GHSA-c2p4-8mvv-rwmv
2022-12-29T01:07:10Z
2022-12-21T18:30:22Z
null
['CVE-2022-40145']
Apache Karaf vulnerable to potential code injection
This vulnerability is about a potential code injection when an attacker has control of the target LDAP server using in the JDBC JNDI URL. The function `jaas.modules.src.main.java.porg.apache.karaf.jass.modules.jdbc.JDBCUtils#doCreateDatasource` uses `InitialContext.lookup(jndiName)` without filtering. A user can modify...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40145'}, {'type': 'WEB', 'url': 'https://github.com/apache/karaf/pull/1632'}, {'type': 'WEB', 'url': 'https://gitbox.apache.org/repos/asf?p=karaf.git;h=2a933445d1'}, {'type': 'WEB', 'url': 'https://gitbox.apache.org/repos/asf?p=karaf.git;h=3819f483...
{'cwe_ids': ['CWE-20', 'CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T18:49:57Z', 'nvd_published_at': '2022-12-21T16:15:00Z'}
1.4.0
GHSA-q5j9-f95w-f4pr
2022-12-06T21:53:44Z
2022-12-05T06:30:21Z
null
['CVE-2022-43484']
TERASOLUNA Server Framework vulnerable to ClassLoader manipulation
TERASOLUNA Global Framework 1.0.0 (Public review version) and TERASOLUNA Server Framework for Java (Rich) 2.0.0.2 to 2.0.5.1 are vulnerable to ClassLoader manipulation due to using the old version of Spring Framework which contains the vulnerability. The vulnerability is caused by an improper input validation issue in ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.terasoluna.gfw:terasoluna-gfw-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1.RELEASE'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43484'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/issues/15724'}, {'type': 'PACKAGE', 'url': 'https://github.com/terasolunaorg/terasoluna-gfw'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN54728399/index.html'...
{'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:23:07Z', 'nvd_published_at': '2022-12-05T04:15:00Z'}
1.4.0
GHSA-q99p-78hp-xg5c
2023-01-10T00:47:19Z
2022-12-27T15:30:19Z
null
['CVE-2022-4729']
Graphite Web Cross-site Scripting vulnerability
A vulnerability was found in Graphite Web and classified as problematic. This issue affects some unknown processing of the component Template Name Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the ...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'graphite-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.10'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4729'}, {'type': 'WEB', 'url': 'https://github.com/graphite-project/graphite-web/issues/2745'}, {'type': 'WEB', 'url': 'https://github.com/graphite-project/graphite-web/pull/2785'}, {'type': 'WEB', 'url': 'https://github.com/graphite-project/graphi...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:57:32Z', 'nvd_published_at': '2022-12-27T15:15:00Z'}
1.4.0
GHSA-jfm8-hwhg-r6gg
2022-12-20T17:38:21Z
2022-12-20T06:30:36Z
null
['CVE-2022-25171']
p4 vulnerable to Command Injection due to improper input sanitization
The package p4 before 0.0.7 is vulnerable to Command Injection via the run() function due to improper input sanitization
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'p4'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.7'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25171'}, {'type': 'WEB', 'url': 'https://github.com/natelong/p4/commit/ae42e251beabf67c00539ec0e1d7aa149ca445fb'}, {'type': 'PACKAGE', 'url': 'https://github.com/natelong/p4'}, {'type': 'WEB', 'url': 'https://github.com/natelong/p4/blob/master/p4.j...
{'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T17:38:21Z', 'nvd_published_at': '2022-12-20T05:15:00Z'}
1.4.0
GHSA-fjgq-224f-fq37
2023-03-01T18:36:23Z
2022-12-28T00:30:23Z
null
['CVE-2019-25073']
Goa vulnerable to path traversal
Improper path santiziation in github.com/goadesign/goa before v3.0.9, v2.0.10, or v1.4.3 allow remote attackers to read files outside of the intended directory
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/goadesign/goa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'goa.design/goa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}, {'package': {...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25073'}, {'type': 'WEB', 'url': 'https://github.com/goadesign/goa/pull/2388'}, {'type': 'WEB', 'url': 'https://github.com/goadesign/goa/commit/70b5a199d0f813d74423993832c424e1fc73fb39'}, {'type': 'PACKAGE', 'url': 'https://github.com/goadesign/goa'...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:24:57Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-vr8j-hgmm-jh9r
2023-05-02T16:35:23Z
2022-12-13T18:30:33Z
null
['CVE-2022-3996']
openssl-src subject to DoS by double-checked locking
If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affected process hangs. Policy processing being enabled on a publicly facing s...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.8'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3996'}, {'type': 'WEB', 'url': 'https://github.com/openssl/openssl/commit/7725e7bfe6f2ce8146b6552b44e0d226be7638e7'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20221213.txt'}]
{'cwe_ids': ['CWE-667'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-02T16:35:23Z', 'nvd_published_at': '2022-12-13T16:15:00Z'}
1.4.0
GHSA-hjrf-2m68-5959
2022-12-30T00:47:06Z
2022-12-22T03:33:19Z
null
['CVE-2022-23541']
jsonwebtoken's insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC
# Overview Versions `<=8.5.1` of `jsonwebtoken` library can be misconfigured so that passing a poorly implemented key retrieval function (referring to the `secretOrPublicKey` argument from the [readme link](https://github.com/auth0/node-jsonwebtoken#jwtverifytoken-secretorpublickey-options-callback)) will result in in...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'jsonwebtoken'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.5.1'}}]
[{'type': 'WEB', 'url': 'https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-hjrf-2m68-5959'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23541'}, {'type': 'WEB', 'url': 'https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3'}, {'type': 'P...
{'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T03:33:19Z', 'nvd_published_at': '2022-12-22T18:15:00Z'}
1.4.0
GHSA-6rvv-h8g7-728w
2022-12-29T23:36:19Z
2022-12-22T00:30:36Z
null
['CVE-2022-4640']
Mingsoft MCMS Cross-site Scripting vulnerability
A vulnerability has been found in Mingsoft MCMS 5.2.9 and classified as problematic. Affected by this vulnerability is the function save of the component Article Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4640'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I65KI5'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216499'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T19:58:56Z', 'nvd_published_at': '2022-12-21T22:15:00Z'}
1.4.0
GHSA-v92p-phmp-xffr
2023-01-09T08:21:08Z
2022-12-27T15:30:19Z
null
['CVE-2022-4694']
usememos/memos vulnerable to stored Cross-site Scripting
Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4694'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/65cc19c12efa392f792f6bb154b4838547e0af5e'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a4d865c2-1a2b-4...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:02:50Z', 'nvd_published_at': '2022-12-27T15:15:00Z'}
1.4.0
GHSA-4wp2-8rm2-jgmh
2023-01-09T21:49:10Z
2022-12-28T00:30:23Z
null
['CVE-2014-125026']
LZ4 vulnerable to Out-of-bounds Write
LZ4 bindings use a deprecated C API that is vulnerable to memory corruption, which could lead to arbitrary code execution if called with untrusted user input.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/golz4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20140711154735-199f5f787806'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-125026'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/golz4/issues/5'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/golz4/commit/199f5f7878062ca17a98e079f2dbe1205e2ed898'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudfla...
{'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:49:10Z', 'nvd_published_at': '2022-12-27T22:15:00Z'}
1.4.0
GHSA-6whj-8g9g-5jvx
2023-01-10T16:15:33Z
2022-12-30T18:30:44Z
null
['CVE-2022-4863']
usememos/memos vulnerable to Improper Handling of Insufficient Permissions or Privileges
Improper Handling of Insufficient Permissions or Privileges in GitHub repository usememos/memos prior to 0.9.1.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4863'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/42751929-e511-4...
{'cwe_ids': ['CWE-280'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T15:18:43Z', 'nvd_published_at': '2022-12-30T16:15:00Z'}
1.4.0
GHSA-jh82-c5jw-pxpc
2022-01-20T15:33:22Z
2022-01-21T23:20:27Z
null
['CVE-2022-21689']
Denial of Service in Onionshare
Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/). - Vulnerability ID: OTF-012 - Vulnerability type: Denial o...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/security/advisories/GHSA-jh82-c5jw-pxpc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21689'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare/'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onio...
{'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T18:48:07Z', 'nvd_published_at': '2022-01-18T22:15:00Z'}
1.4.0
GHSA-r478-c2pc-m7gx
2022-01-19T19:58:19Z
2022-01-12T20:07:10Z
null
['CVE-2022-22846']
DNS reply verification issue in dnslinb
The dnslib package through 0.9.16 for Python does not verify that the ID value in a DNS reply matches an ID value in a query.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'dnslib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22846'}, {'type': 'WEB', 'url': 'https://github.com/paulc/dnslib/issues/30'}, {'type': 'WEB', 'url': 'https://github.com/paulc/dnslib/commit/76e8677699ed098387d502c57980f58da642aeba'}, {'type': 'PACKAGE', 'url': 'https://github.com/paulc/dnslib/'}]
{'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:25:47Z', 'nvd_published_at': '2022-01-10T14:12:00Z'}
1.4.0
GHSA-jv7g-9g6q-cxvw
2022-01-27T13:51:45Z
2022-01-27T14:04:28Z
null
['CVE-2021-23631']
Path Traversal in convert-svg packages
This affects all versions of package convert-svg-core; all versions of package convert-svg-to-png; all versions of package convert-svg-to-jpeg. Using a specially crafted SVG file, an attacker could read arbitrary files from the file system and then show the file content as a converted PNG file.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'npm', 'name': 'convert-svg-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'convert-svg-to-png'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]},...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23631'}, {'type': 'WEB', 'url': 'https://gist.github.com/legndery/a248350bb25b8502a03c2f407cedeb14'}, {'type': 'PACKAGE', 'url': 'https://github.com/neocotic/convert-svg'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-1582785...
{'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T23:06:09Z', 'nvd_published_at': '2022-01-21T20:15:00Z'}
1.4.0
GHSA-f7vh-qwp3-x37m
2022-11-25T17:19:49Z
2022-01-19T00:01:15Z
null
['CVE-2022-23307']
Deserialization of Untrusted Data in Apache Log4j
CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists. Users are advised to migrate from `log4j:log4j` to `org.apache.logging.log4j:log4j` for an updated version of the library.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'log4j:log4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.17'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23307'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/rg4yyc89vs3dw6kpy3r92xop9loywyhh'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/1.2/index.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr202...
{'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:48:35Z', 'nvd_published_at': '2022-01-18T16:15:00Z'}
1.4.0
GHSA-hx7c-qpfq-xcrp
2022-01-21T13:25:18Z
2022-01-13T20:10:53Z
null
['CVE-2021-44649']
Cross-site Scripting in django-cms
Django CMS 3.7.3 does not validate the plugin_type parameter while generating error messages for an invalid plugin type, resulting in a Cross Site Scripting (XSS) vulnerability. The vulnerability allows an attacker to execute arbitrary JavaScript code in the web browser of the affected user.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'django-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.1'}]}]}, {'package': {'ecosy...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44649'}, {'type': 'PACKAGE', 'url': 'https://github.com/divio/django-cms/'}, {'type': 'WEB', 'url': 'https://sahildhar.github.io/blogpost/Django-CMS-Reflected-XSS-Vulnerability/'}, {'type': 'WEB', 'url': 'https://www.django-cms.org/en/blog/2020/07/...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-13T18:47:39Z', 'nvd_published_at': '2022-01-12T13:15:00Z'}
1.4.0
GHSA-m8gw-hjpr-rjv7
2022-01-04T17:43:26Z
2022-01-05T15:01:46Z
null
['CVE-2021-23450']
Prototype Pollution in dojo
All versions of package dojo are vulnerable to Prototype Pollution via the setObject function.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.16.4'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23450'}, {'type': 'PACKAGE', 'url': 'https://github.com/dojo/dojo'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dojo/blob/4c39c14349408fc8274e19b399ffc660512ed07c/_base/lang.js%23L172'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T17:43:26Z', 'nvd_published_at': '2021-12-17T20:15:00Z'}
1.4.0
GHSA-vcwc-6mr9-8m7c
2022-01-28T22:29:33Z
2022-01-28T22:36:28Z
null
['CVE-2022-23808']
Cross-site Scripting in phpmyadmin
An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23808'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/44eb12f15a562718bbe54c9a16af91ceea335d59'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/5118acce1dfcdb09cbc0f73927bf51c46feeaf38'}, {'type'...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T22:29:33Z', 'nvd_published_at': '2022-01-22T02:15:00Z'}
1.4.0
GHSA-c8cc-hj57-vm65
2022-11-29T21:12:29Z
2022-01-13T00:00:55Z
null
['CVE-2022-23105']
User passwords transmitted in plain text by Jenkins Active Directory Plugin
Jenkins Active Directory Plugin 2.25 and earlier does not encrypt the transmission of data between the Jenkins controller and Active Directory servers in most configurations.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:active-directory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.25.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23105'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/active-directory-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1389'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-sec...
{'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:12:29Z', 'nvd_published_at': '2022-01-12T20:15:00Z'}
1.4.0
GHSA-f9jg-8p32-2f55
2022-10-10T12:23:23Z
2022-01-08T00:00:21Z
null
['CVE-2021-25743']
ANSI escape characters not filtered
kubectl does not neutralize escape, meta or control sequences contained in the raw data it outputs to a terminal. This includes but is not limited to the unstructured string fields in objects such as Events.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes/pkg/kubectl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.25.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25743'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/101695'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/112553'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'typ...
{'cwe_ids': ['CWE-150'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-07T23:58:59Z', 'nvd_published_at': '2022-01-07T00:15:00Z'}
1.4.0
GHSA-4xww-6h7v-29jg
2022-01-12T19:34:13Z
2022-01-21T23:37:07Z
null
['CVE-2022-0083']
User enumeration in livehelperchat
livehelperchat is vulnerable to Generation of Error Message Containing Sensitive Information. There is an observable discrepancy between errors generated for users that exist and those that do not.
[]
[{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.91'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0083'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/fbed8728be59040a7218610e72f6eceb5f8bc152'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt...
{'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-12T19:34:13Z', 'nvd_published_at': '2022-01-04T07:15:00Z'}
1.4.0
GHSA-qwvx-c8j7-5g75
2023-06-13T22:01:48Z
2022-01-06T22:09:19Z
null
['CVE-2021-45703']
Use of Uninitialized Resource in tectonic_xdv
Affected versions of this crate passes an uninitialized buffer to a user-provided Read implementation. Arbitrary Read implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'tectonic_xdv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.12'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45703'}, {'type': 'WEB', 'url': 'https://github.com/tectonic-typesetting/tectonic/issues/752'}, {'type': 'WEB', 'url': 'https://github.com/tectonic-typesetting/tectonic/commit/cdff034e6d93cdfdafd13d8c6956e22fa5a57b79'}, {'type': 'PACKAGE', 'url': '...
{'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T23:41:34Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-3qpm-h9ch-px3c
2022-01-04T22:06:05Z
2022-01-06T18:31:23Z
null
[]
Remote code injection, Improper Input Validation and Uncontrolled Recursion in Log4j library
### Summary The version used of Log4j, the library used for logging by PowerNukkit, is subject to a remote code execution vulnerability via the ldap JNDI parser. It's well detailed at [CVE-2021-44228](https://github.com/advisories/GHSA-jfh8-c2jp-5v3q) and CVE-2021-45105(https://github.com/advisories/GHSA-p6xc-xr62-6r2...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.powernukkit:powernukkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5.2.0'}}]
[{'type': 'WEB', 'url': 'https://github.com/PowerNukkit/PowerNukkit/security/advisories/GHSA-3qpm-h9ch-px3c'}, {'type': 'PACKAGE', 'url': 'https://github.com/PowerNukkit/PowerNukkit'}]
{'cwe_ids': ['CWE-20', 'CWE-400', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T22:06:05Z', 'nvd_published_at': None}
1.4.0
GHSA-9qj6-4rfq-vm84
2022-01-06T18:38:16Z
2022-01-06T22:20:41Z
null
['CVE-2018-25024']
Out-of-bounds Write in actix-web
An issue was discovered in the actix-web crate before 0.7.15 for Rust. It can unsoundly coerce an immutable reference into a mutable reference, leading to memory corruption.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'actix-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.15'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25024'}, {'type': 'WEB', 'url': 'https://github.com/actix/actix-web/issues/289'}, {'type': 'PACKAGE', 'url': 'https://github.com/actix/actix-web.git'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/actix-...
{'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:38:16Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-jcxc-rh6w-wf49
2022-01-05T18:09:47Z
2022-01-06T21:36:19Z
null
['CVE-2021-23772']
Link Following in Iris
This affects all versions of package github.com/kataras/iris; all versions of package github.com/kataras/iris/v12. The unsafe handling of file names during upload using UploadFormFiles method may enable attackers to write to arbitrary locations outside the designated target folder.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/kataras/iris/v12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.2.0-alpha8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kataras/iris'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected':...
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23772'}, {'type': 'WEB', 'url': 'https://github.com/kataras/iris/commit/e213dba0d32ff66653e0ef124bc5088817264b08'}, {'type': 'PACKAGE', 'url': 'https://github.com/kataras/iris'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0272'}, {'typ...
{'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T18:09:47Z', 'nvd_published_at': '2021-12-24T12:15:00Z'}
1.4.0
GHSA-wv23-pfj7-2mjj
2022-08-11T16:54:35Z
2022-01-14T21:08:23Z
null
['CVE-2021-32649']
October/System authenticated file write leads to remote code execution
### Impact Assuming an attacker with "create, modify and delete website pages" privileges in the backend is able to execute PHP code by running specially crafted Twig code in the template markup. ### Patches Issue has been patched in Build 473 and v1.1.6 ### Workarounds Apply https://github.com/octobercms/october/...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.473'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-wv23-pfj7-2mjj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32649'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26'}, {'type': 'PACKAGE', '...
{'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-14T20:49:20Z', 'nvd_published_at': '2022-01-14T15:15:00Z'}
1.4.0
GHSA-q4xr-rc97-m4xx
2022-01-06T19:17:52Z
2022-01-06T22:22:02Z
null
['CVE-2021-23727']
OS Command Injection in celery
This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigge...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'celery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23727'}, {'type': 'WEB', 'url': 'https://github.com/celery/celery/commit/1f7ad7e6df1e02039b6ab9eec617d283598cad6b'}, {'type': 'PACKAGE', 'url': 'https://github.com/celery/celery'}, {'type': 'WEB', 'url': 'https://github.com/celery/celery/blob/maste...
{'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:17:52Z', 'nvd_published_at': '2021-12-29T17:15:00Z'}
1.4.0
GHSA-6w5m-jgc5-8cgc
2022-01-20T14:53:33Z
2022-01-21T23:57:49Z
null
['CVE-2022-0159']
orchardcore is vulnerable to Cross-site Scripting
orchardcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'OrchardCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0159'}, {'type': 'WEB', 'url': 'https://github.com/orchardcms/orchardcore/commit/4da927d39a49138527c30db09c962ff706f95202'}, {'type': 'PACKAGE', 'url': 'https://github.com/orchardcms/orchardcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-20T14:53:33Z', 'nvd_published_at': '2022-01-12T03:15:00Z'}
1.4.0
GHSA-8434-v7xw-8m9x
2022-05-27T22:48:38Z
2022-01-21T23:03:39Z
null
['CVE-2021-21386']
Improper Neutralization of Argument Delimiters in a Decompiling Package Process in APKLeaks
APKLeaks prior to v2.0.4 allows remote authenticated attackers to execute arbitrary OS commands via package name inside the application manifest. ### Impact An authenticated attacker could include arguments that allow unintended commands or code to be executed, allow sensitive data to be read or modified, or could ca...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'APKLeaks'}, 'ecosystem_specific': {'affected_functions': ['apkleaks.apkleaks.APKLeaks.decompile']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/dwisiswant0/apkleaks/security/advisories/GHSA-8434-v7xw-8m9x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21386'}, {'type': 'WEB', 'url': 'https://github.com/dwisiswant0/apkleaks/commit/a966e781499ff6fd4eea66876d7532301b13a382'}, {'type': 'PACKAGE...
{'cwe_ids': ['CWE-78', 'CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T21:03:01Z', 'nvd_published_at': '2021-03-24T21:15:00Z'}
1.4.0
GHSA-868x-rg4c-cjqg
2023-09-26T20:26:04Z
2022-01-08T00:39:20Z
null
['CVE-2021-43045']
Allocation of Resources Without Limits or Throttling in Apache Avro
A vulnerability in the .NET SDK of Apache Avro allows an attacker to allocate excessive resources, potentially causing a denial-of-service attack. This issue affects .NET applications using Apache Avro version 1.10.2 and prior versions. Users should update to version 1.11.0 which addresses this issue.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'NuGet', 'name': 'Apache.Avro'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43045'}, {'type': 'WEB', 'url': 'https://github.com/apache/avro/pull/1357'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/avro'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/AVRO-3225'}, {'type': 'WEB', 'url': 'https://is...
{'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T22:36:54Z', 'nvd_published_at': '2022-01-06T18:15:00Z'}
1.4.0
GHSA-2h63-qp69-fwvw
2022-02-08T21:33:49Z
2022-01-06T20:35:54Z
null
['CVE-2020-11987']
Server-side request forgery (SSRF) in Apache Batik
Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik-svgbrowser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11987'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/0ef5b661a1f77772d1110877ea9e0287987098f6'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/xmlgraphics-batik'}, {'type': 'WEB', 'url': 'https://issues.apache...
{'cwe_ids': ['CWE-20', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T22:47:21Z', 'nvd_published_at': '2021-02-24T18:15:00Z'}
1.4.0
GHSA-j545-frh3-r9gq
2022-11-17T20:14:48Z
2022-01-21T23:56:39Z
null
['CVE-2022-0224']
SQL Injection in dolibarr
dolibarr is vulnerable to Improper Neutralization of Special Elements used in an SQL Command.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '14.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0224'}, {'type': 'WEB', 'url': 'https://github.com/dolibarr/dolibarr/commit/b9b45fb50618aa8053961f50bc8604b188d0ea79'}, {'type': 'PACKAGE', 'url': 'https://github.com/dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f1d1ce3e-...
{'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-18T22:09:34Z', 'nvd_published_at': '2022-01-14T18:15:00Z'}
1.4.0
GHSA-p479-rwhp-rwjx
2022-12-13T17:59:48Z
2022-01-06T18:45:29Z
null
['CVE-2021-21667']
Stored XSS vulnerability in Jenkins Scriptler Plugin
Scriptler Plugin 3.2 and earlier does not escape parameter names shown in job configuration forms. This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Scriptler/Configure permission. Scriptler Plugin 3.3 escapes parameter names shown in job configuration forms.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:scriptler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21667'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/scriptler-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-06-16/#SECURITY-2224'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2...
{'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-17T17:43:32Z', 'nvd_published_at': '2021-06-16T14:15:00Z'}
1.4.0
GHSA-p523-jrph-qjc6
2022-01-06T20:17:22Z
2022-01-06T23:49:17Z
null
['CVE-2022-21652']
Insufficient Session Expiration in shopware
### Impact Automatically invalidate sessions upon password change ### Patches We recommend updating to the current version 5.7.7. You can get the update to 5.7.7 regularly via the Auto-Updater or directly via the download overview. For older versions you can use the Security Plugin: https://store.shopware.com/en/sw...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.7.3'}, {'fixed': '5.7.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-p523-jrph-qjc6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21652'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/47ebd126a94f4b019b6fde64c0df3d18d74ef7d0'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-613'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T20:17:22Z', 'nvd_published_at': '2022-01-05T20:15:00Z'}
1.4.0
GHSA-273r-mgr4-v34f
2022-01-21T13:25:59Z
2022-01-13T16:14:17Z
null
['CVE-2022-21676']
Uncaught Exception in engine.io
### Impact A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process. > RangeError: Invalid WebSocket frame: RSV2 and RSV3 must be clear > at Receiver.getInfo (/.../node_modules/ws/lib/receiver.js:176:14) > at Receiver.startLoop (/.../node_modules...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'engine.io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'engine.io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}, {'package': {'ecosystem...
[{'type': 'WEB', 'url': 'https://github.com/socketio/engine.io/security/advisories/GHSA-273r-mgr4-v34f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21676'}, {'type': 'WEB', 'url': 'https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab'}, {'type': 'WEB', 'url'...
{'cwe_ids': ['CWE-754', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-12T19:26:23Z', 'nvd_published_at': '2022-01-12T19:15:00Z'}
1.4.0
GHSA-f854-hpxv-cw9r
2022-01-06T20:21:28Z
2022-01-06T18:30:54Z
null
['CVE-2021-43839']
Drainage of FeeCollector's Block Transaction Fees in cronos
### Impact In Cronos nodes running versions before v0.6.5, it is possible to take transaction fees from Cosmos SDK's FeeCollector for the current block by sending a custom crafted MsgEthereumTx. User funds and balances are safe. ### Patches This problem has been patched in Cronos v0.6.5 on the mempool level. The nex...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}]
[{'package': {'ecosystem': 'Go', 'name': 'github.com/crypto-org-chain/cronos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/tharsis/ethermint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed':...
[{'type': 'WEB', 'url': 'https://github.com/crypto-org-chain/cronos/security/advisories/GHSA-f854-hpxv-cw9r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43839'}, {'type': 'WEB', 'url': 'https://github.com/crypto-org-chain/cronos/pull/270'}, {'type': 'WEB', 'url': 'https://github.com/crypto-...
{'cwe_ids': ['CWE-670'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T22:40:01Z', 'nvd_published_at': '2021-12-21T17:15:00Z'}
1.4.0
GHSA-897m-rjf5-jp39
2021-03-24T23:59:08Z
2022-01-06T20:35:05Z
null
['CVE-2020-28503']
Prototype Pollution in copy-props
The package copy-props before 2.0.5 are vulnerable to Prototype Pollution via the main functionality.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}]
[{'package': {'ecosystem': 'npm', 'name': 'copy-props'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28503'}, {'type': 'WEB', 'url': 'https://github.com/gulpjs/copy-props/pull/7'}, {'type': 'WEB', 'url': 'https://github.com/gulpjs/copy-props/commit/2c738f5c52cfb384b43d977a56a3ab7ce465df9b'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-O...
{'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T23:59:08Z', 'nvd_published_at': '2021-03-23T10:15:00Z'}
1.4.0
GHSA-7mhc-prgv-r3q4
2022-06-22T18:19:44Z
2022-01-16T00:00:45Z
null
['CVE-2021-24044']
Access of Resource Using Incompatible Type in Hermes
By passing invalid javascript code where await and yield were called upon non-async and non-generator getter/setter functions, Hermes would invoke generator functions and error out on invalid await/yield positions. This could result in segmentation fault as a consequence of type confusion error, with a low chance of RC...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'npm', 'name': 'hermes-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-24044'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/hermes'}, {'type': 'WEB', 'url': 'https://www.facebook.com/security/advisories/cve-2021-24044'}]
{'cwe_ids': ['CWE-843'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:19:44Z', 'nvd_published_at': '2022-01-15T01:15:00Z'}
1.4.0
GHSA-c53v-qmrx-93hg
2022-01-06T20:18:17Z
2022-01-06T23:49:19Z
null
['CVE-2022-21651']
Open redirect in shopware
### Impact Arbitrary redirect while using certain URLs ### Patches We recommend updating to the current version 5.7.7. You can get the update to 5.7.7 regularly via the Auto-Updater or directly via the download overview. For older versions you can use the Security Plugin: https://store.shopware.com/en/swag57529436...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.7.7'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-c53v-qmrx-93hg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21651'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/a90046c765c57a46c4399dce17bd174253c32886'}, {'type': 'WEB', 'url': ...
{'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T20:18:17Z', 'nvd_published_at': '2022-01-05T20:15:00Z'}
1.4.0
GHSA-9w7f-m4j4-j3xw
2023-06-01T19:43:23Z
2022-01-06T17:36:38Z
null
['CVE-2021-43857']
Gerapy < 0.9.8 may cause remote code execution
### Impact project_configure function exist remote code execute in Gerapy < 0.9.8 ### Patches Patched in version 0.9.8, please install with: ``` pip3 install -U gerapy ```
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'PyPI', 'name': 'gerapy'}, 'ecosystem_specific': {'affected_functions': ['gerapy.server.core.views.project_clone', 'gerapy.server.core.views.project_configure']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.8'}]}]}]
[{'type': 'WEB', 'url': 'https://github.com/Gerapy/Gerapy/security/advisories/GHSA-9w7f-m4j4-j3xw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43857'}, {'type': 'WEB', 'url': 'https://github.com/Gerapy/Gerapy/issues/219'}, {'type': 'WEB', 'url': 'https://github.com/Gerapy/Gerapy/commit/49bc...
{'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T20:42:01Z', 'nvd_published_at': '2021-12-27T19:15:00Z'}
1.4.0
GHSA-pm3v-qxf6-fgxv
2022-01-27T18:32:20Z
2022-01-21T18:08:43Z
null
['CVE-2022-0285']
Cross-site Scripting in pimcore
Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.2.9.
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.9'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0285'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/b432225952e2a5ab0268f401b85a14480369b835'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/321918b2-aa01...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T16:56:26Z', 'nvd_published_at': '2022-01-20T15:15:00Z'}
1.4.0
GHSA-cwvc-87xq-pc5m
2023-06-13T18:14:16Z
2022-01-06T22:08:43Z
null
['CVE-2021-45704']
Out-of-bounds Write and Race Condition in metrics-util
In the affected versions of the crate, AtomicBucket<T> unconditionally implements Send/Sync traits. Therefore, users can create a data race to the inner T: !Sync by using the AtomicBucket::data_with() API. Such data races can potentially cause memory corruption or other undefined behavior. The flaw was fixed in commit...
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}]
[{'package': {'ecosystem': 'crates.io', 'name': 'metrics-util'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45704'}, {'type': 'WEB', 'url': 'https://github.com/metrics-rs/metrics/issues/190'}, {'type': 'WEB', 'url': 'https://github.com/metrics-rs/metrics/commit/8e6daab'}, {'type': 'PACKAGE', 'url': 'https://github.com/metrics-rs/metrics'}, {'type': 'WEB'...
{'cwe_ids': ['CWE-362', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T23:21:30Z', 'nvd_published_at': '2021-12-27T00:15:00Z'}
1.4.0
GHSA-fxmx-pfm2-85m2
2022-01-19T22:37:27Z
2022-01-21T23:32:32Z
null
['CVE-2021-44217']
Cross-site Scripting in Ericsson CodeChecker
In Ericsson CodeChecker prior to 6.18.2, a Stored Cross-site scripting (XSS) vulnerability in the comments component of the reports viewer allows remote attackers to inject arbitrary web script or HTML via the POST JSON data of the /CodeCheckerService API.
[]
[{'package': {'ecosystem': 'PyPI', 'name': 'codechecker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.18.2'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44217'}, {'type': 'WEB', 'url': 'https://github.com/Ericsson/codechecker/pull/3549'}, {'type': 'WEB', 'url': 'https://github.com/Ericsson/codechecker/commit/72ee51158e6d81150320223b85410c179b9ee2b1'}, {'type': 'WEB', 'url': 'https://codechecker-dem...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T22:37:27Z', 'nvd_published_at': '2022-01-18T15:15:00Z'}
1.4.0
GHSA-2xw8-j43j-5vxp
2022-01-05T17:56:06Z
2022-01-06T21:35:42Z
null
['CVE-2021-4072']
elgg is vulnerable to Cross-site Scripting
elgg is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
[{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}]
[{'package': {'ecosystem': 'Packagist', 'name': 'elgg/elgg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.24'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4072'}, {'type': 'WEB', 'url': 'https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0'}, {'type': 'PACKAGE', 'url': 'https://github.com/elgg/elgg'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/74034253-732a-4251-a0f9-e...
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T17:56:06Z', 'nvd_published_at': '2021-12-24T14:15:00Z'}
1.4.0
GHSA-3qp6-m7hp-jrwf
2022-01-07T23:39:42Z
2022-01-08T00:46:21Z
null
['CVE-2021-36739']
Cross-site Scripting in Apache Pluto
The "first name" and "last name" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetype are vulnerable to Cross-Site Scripting (XSS) attacks.
[]
[{'package': {'ecosystem': 'Maven', 'name': 'org.apache.portals.pluto:pluto-portal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}]
[{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36739'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/portals-pluto'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/m5j87nn1lmvzp8b9lmh7gqq68g5lnb7p'}]
{'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T23:39:42Z', 'nvd_published_at': '2022-01-06T09:15:00Z'}