schema_version stringclasses 1
value | id stringlengths 19 19 | modified stringlengths 20 20 | published stringlengths 20 20 | withdrawn stringlengths 20 20 ⌀ | aliases stringlengths 2 20 | summary stringlengths 8 154 | details stringlengths 31 19.1k | severity stringlengths 2 92 | affected stringlengths 75 28.5k | references stringlengths 79 7.48k | database_specific stringlengths 131 196 |
|---|---|---|---|---|---|---|---|---|---|---|---|
1.4.0 | GHSA-hc5g-xf64-j49j | 2022-12-12T20:45:34Z | 2022-12-09T09:30:30Z | null | ['CVE-2022-4375'] | Mingsoft MCMS vulnerable to SQL Injection | A vulnerability was found in Mingsoft MCMS up to 5.2.9. It has been classified as critical. Affected is an unknown function of the file /cms/category/list. The manipulation of the argument sqlWhere leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.10'}]}], 'database_specific': {'last_known_affected_version_range': '<= 5.2.9'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4375'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I61TG5'}, {'type': 'PACKAGE', 'url': 'https://github.com/ming-soft/MCMS'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215196'}] | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-09T20:20:03Z', 'nvd_published_at': '2022-12-09T08:15:00Z'} |
1.4.0 | GHSA-j8x2-2m5w-j939 | 2023-04-03T19:24:00Z | 2022-12-12T14:38:28Z | null | ['CVE-2022-23511'] | Amazon CloudWatch Agent for Windows has Privilege Escalation Vector | ### Impact
A privilege escalation issue exists within the Amazon CloudWatch Agent for Windows in versions up to and including v1.247354. When users trigger a repair of the Agent, a pop-up window opens with SYSTEM permissions. Users with administrative access to affected hosts may use this to create a new command prompt... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/aws/amazon-cloudwatch-agent'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.247355.0'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/aws/amazon-cloudwatch-agent/security/advisories/GHSA-j8x2-2m5w-j939'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23511'}, {'type': 'WEB', 'url': 'https://github.com/aws/amazon-cloudwatch-agent/commit/6119858864c317ff26f41f576c169148d1250837'}, {'t... | {'cwe_ids': ['CWE-274'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T14:38:28Z', 'nvd_published_at': '2022-12-12T13:15:00Z'} |
1.4.0 | GHSA-3fhj-wpvj-x5w8 | 2022-12-30T18:03:33Z | 2022-12-19T15:30:29Z | null | ['CVE-2021-4262'] | laravel-jqgrid vulnerable to SQL Injection | A vulnerability classified as critical was found in laravel-jqgrid. Affected by this vulnerability is the function getRows of the file src/Mgallegos/LaravelJqgrid/Repositories/EloquentRepositoryAbstract.php. The manipulation leads to sql injection. The name of the patch is fbc2d94f43d0dc772767a5bdb2681133036f935e. It i... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'mgallegos/laravel-jqgrid'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4262'}, {'type': 'WEB', 'url': 'https://github.com/mgallegos/laravel-jqgrid/pull/72'}, {'type': 'WEB', 'url': 'https://github.com/mgallegos/laravel-jqgrid/commit/fbc2d94f43d0dc772767a5bdb2681133036f935e'}, {'type': 'PACKAGE', 'url': 'https://github... | {'cwe_ids': ['CWE-89'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:03:33Z', 'nvd_published_at': '2022-12-19T14:15:00Z'} |
1.4.0 | GHSA-53mm-hx32-6475 | 2022-12-19T21:10:07Z | 2022-12-14T21:30:16Z | null | ['CVE-2022-47406'] | TYPO3 vulnerable to Insufficient Session Expiration | An issue was discovered in the fe_change_pwd (aka Change password for frontend users) extension before 2.0.5, and 3.x before 3.0.3, for TYPO3. The extension fails to revoke existing sessions for the current user when the password has been changed. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.3'}]}]}, {'package': {'e... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47406'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/derhansen/fe_change_pwd/CVE-2022-47406.yaml'}, {'type': 'PACKAGE', 'url': 'https://github.com/TYPO3/typo3'}, {'type': 'WEB', 'url': 'https://typo3.org/... | {'cwe_ids': ['CWE-613'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T21:10:07Z', 'nvd_published_at': '2022-12-14T21:15:00Z'} |
1.4.0 | GHSA-97jv-c342-5xhc | 2022-12-29T23:37:10Z | 2022-12-19T15:30:29Z | null | ['CVE-2020-36618'] | FurqanSoftware/node-whois vulnerable to Prototype Pollution | A vulnerability classified as critical has been found in Furqan node-whois. Affected is an unknown function of the file `index.coffee`. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). It is possible to launch the attack remotely. The name of the patch... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'whois'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.13.6'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36618'}, {'type': 'WEB', 'url': 'https://github.com/FurqanSoftware/node-whois/pull/105'}, {'type': 'WEB', 'url': 'https://github.com/FurqanSoftware/node-whois/commit/46ccc2aee8d063c7b6b4dee2c2834113b7286076'}, {'type': 'PACKAGE', 'url': 'https://gi... | {'cwe_ids': ['CWE-1321', 'CWE-74', 'CWE-94'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T18:24:03Z', 'nvd_published_at': '2022-12-19T14:15:00Z'} |
1.4.0 | GHSA-g662-qq45-ppwm | 2022-12-21T18:53:51Z | 2022-12-21T06:30:29Z | null | ['CVE-2022-25929'] | Smoothie vulnerable to Cross-site Scripting when tooltipLabel or strokeStyle are controlled by users | The package smoothie from 1.31.0 and before 1.36.1 are vulnerable to Cross-site Scripting (XSS) due to improper user input sanitization in strokeStyle and tooltipLabel properties. Exploiting this vulnerability is possible when the user can control these properties. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'smoothie'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.31.0'}, {'fixed': '1.36.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25929'}, {'type': 'WEB', 'url': 'https://github.com/joewalnes/smoothie/pull/147'}, {'type': 'WEB', 'url': 'https://github.com/joewalnes/smoothie/commit/8e0920d50da82f4b6e605d56f41b69fbb9606a98'}, {'type': 'PACKAGE', 'url': 'https://github.com/joewa... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T18:53:51Z', 'nvd_published_at': '2022-12-21T05:15:00Z'} |
1.4.0 | GHSA-9qcm-fqj9-93m4 | 2022-12-14T21:32:34Z | 2022-12-13T21:30:26Z | 2022-12-14T21:32:34Z | [] | .NET Framework Remote Code Execution Vulnerability. | .NET Framework Remote Code Execution Vulnerability.
Dupe of GHSA-2c7v-qcjp-4mg2 | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Microsoft.WindowsDesktop.App.Runtime.win-x64'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.1.0'}, {'fixed': '3.1.32'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.1.31'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41089'}, {'type': 'WEB', 'url': 'https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-41089'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-14T21:32:34Z', 'nvd_published_at': '2022-12-13T19:15:00Z'} |
1.4.0 | GHSA-7rg2-cxvp-9p7p | 2022-12-02T22:25:46Z | 2022-12-02T22:25:46Z | null | ['CVE-2022-46146'] | Prometheus Exporter-Toolkit is vulnerable to authentication bypass | ### Impact
Prometheus and its exporters can be secured by a web.yml file that specifies usernames and hashed passwords for basic authentication.
Passwords are hashed with bcrypt, which means that even if you have access to the hash, it is very hard to find the original password back.
However, a flaw in the way this ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/exporter-toolkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/prometheus/exporter-toolkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.... | [{'type': 'WEB', 'url': 'https://github.com/prometheus/exporter-toolkit/security/advisories/GHSA-7rg2-cxvp-9p7p'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46146'}, {'type': 'WEB', 'url': 'https://github.com/prometheus/exporter-toolkit/commit/5b1eab34484ddd353986bce736cd119d863e4ff5'}, {'t... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:25:46Z', 'nvd_published_at': '2022-11-29T14:15:00Z'} |
1.4.0 | GHSA-9p8j-hrgf-jc2g | 2022-12-20T22:10:26Z | 2022-12-20T21:30:19Z | null | ['CVE-2022-46870'] | Apache Zeppelin Cross-site Scripting vulnerability | An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Apache Zeppelin allows logged-in users to execute arbitrary javascript in other users' browsers. This issue affects Apache Zeppelin before 0.8.2. Users are recommended to upgrade to a supported version of Zeppelin. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.zeppelin:zeppelin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.8.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46870'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/zeppelin'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/gb1wdnrm1095xw6qznpsycfrht4lwbwc'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T22:10:26Z', 'nvd_published_at': '2022-12-16T13:15:00Z'} |
1.4.0 | GHSA-r88r-gmrh-7j83 | 2023-01-10T15:50:24Z | 2022-12-28T00:30:23Z | null | ['CVE-2021-4235'] | YAML Go package vulnerable to denial of service | Due to unbounded alias chasing, a maliciously crafted YAML file can cause the system to consume significant system resources. If parsing user input, this may be used as a denial of service vector. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'gopkg.in/yaml.v2'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.2.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/go-yaml/yaml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.1.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4235'}, {'type': 'WEB', 'url': 'https://github.com/go-yaml/yaml/pull/375'}, {'type': 'WEB', 'url': 'https://github.com/go-yaml/yaml/commit/bb4e33bf68bf89cad44d386192cbed201f35b241'}, {'type': 'PACKAGE', 'url': 'https://github.com/go-yaml/yaml'}, {'... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:02:10Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-v93c-cxj5-c398 | 2022-12-12T22:19:23Z | 2022-12-12T09:30:35Z | null | ['CVE-2022-46683'] | Jenkins Google Login Plugin Open Redirect vulnerability | Jenkins Google Login Plugin 1.4 through 1.6 (both inclusive) improperly determines that a redirect URL after login is legitimately pointing to Jenkins. Google Login Plugin 1.7 only redirects to relative (Jenkins) URLs.
| [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:google-login'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.4'}, {'fixed': '1.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46683'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/google-login-plugin/commit/532d714943ff8ae8dc862427d39a4b78b7f6a375'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/google-login-plugin'}, {'type': 'WEB', 'url': 'https://www... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:19:23Z', 'nvd_published_at': '2022-12-12T09:15:00Z'} |
1.4.0 | GHSA-hvwx-qh2h-xcfj | 2022-12-13T16:59:12Z | 2022-12-13T16:59:12Z | null | ['CVE-2022-23499'] | TYPO3 HTML Sanitizer vulnerable to Cross-Site Scripting | ### Problem
Due to a parsing issue in the upstream package [`masterminds/html5`](https://packagist.org/packages/masterminds/html5), malicious markup used in a sequence with special HTML CDATA sections cannot be filtered and sanitized. This allows bypassing the cross-site scripting mechanism of [`typo3/html-sanitizer`](... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.0.0'}, {'fixed': '1.5.0'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/html-sanitizer'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed': '2.... | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/html-sanitizer/security/advisories/GHSA-hvwx-qh2h-xcfj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23499'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/html-sanitizer/pull/105'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/html-sa... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T16:59:12Z', 'nvd_published_at': '2022-12-13T21:15:00Z'} |
1.4.0 | GHSA-h972-v458-m892 | 2022-12-07T14:56:02Z | 2022-12-05T21:30:41Z | null | ['CVE-2022-37783'] | Craft CMS discloses password hashes | All Craft CMS versions between 3.0.0 and 3.7.32 disclose password hashes of users who authenticate using their E-Mail address or username in Anti-CSRF-Tokens. Craft CMS uses a cookie called CRAFT_CSRF_TOKEN and a HTML hidden field called CRAFT_CSRF_TOKEN to avoid Cross Site Request Forgery attacks. The CRAFT_CSRF_TOKEN... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'craftcms/cms'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.7.33'}]}], 'database_specific': {'last_known_affected_version_range': '<= 3.7.32'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-37783'}, {'type': 'WEB', 'url': 'https://at-trustit.tuv.at/tuev-trust-it-cves/cve-disclosure-of-password-hashes/'}, {'type': 'WEB', 'url': 'https://cves.at/posts/cve-2022-37783/writeup/'}, {'type': 'PACKAGE', 'url': 'https://github.com/craftcms/cms... | {'cwe_ids': ['CWE-200', 'CWE-522'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T14:56:02Z', 'nvd_published_at': '2022-12-05T21:15:00Z'} |
1.4.0 | GHSA-j5p7-jf4q-742q | 2023-01-10T15:38:01Z | 2022-12-27T09:30:41Z | null | ['CVE-2015-10005'] | markdown-it vulnerable to Inefficient Regular Expression Complexity | A vulnerability was found in markdown-it up to 2.x. It has been classified as problematic. Affected is an unknown function of the file `lib/common/html_re.js`. The manipulation leads to inefficient regular expression complexity. Upgrading to version 3.0.0 is able to address this issue. The name of the patch is 89c86201... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'markdown-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2015-10005'}, {'type': 'WEB', 'url': 'https://github.com/markdown-it/markdown-it/commit/89c8620157d6e38f9872811620d25138fc9d1b0d'}, {'type': 'PACKAGE', 'url': 'https://github.com/markdown-it/markdown-it'}, {'type': 'WEB', 'url': 'https://github.com/mark... | {'cwe_ids': ['CWE-1333'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:27:08Z', 'nvd_published_at': '2022-12-27T09:15:00Z'} |
1.4.0 | GHSA-cwrm-33qq-4w2x | 2023-01-10T00:53:06Z | 2022-12-29T18:30:24Z | null | ['CVE-2022-4846'] | usememos/memos Cross-Site Request Forgery vulnerability | Cross-Site Request Forgery (CSRF) in GitHub repository usememos/memos 0.9.0 and prior. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4846'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/c9bb2b785dc5852655405d5c9ab127a2d5aa3948'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/38c685fc-7065-4... | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:53:12Z', 'nvd_published_at': '2022-12-29T18:15:00Z'} |
1.4.0 | GHSA-wpgc-5cr5-h9gg | 2022-12-13T17:56:45Z | 2022-12-11T15:30:44Z | null | ['CVE-2022-4409'] | phpMyFAQ has insecure HTTP cookies | phpMyFAQ is contains Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in versions prior to 3.1.9. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4409'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpMyFAQ/commit/c16cc2bbe2687f75aa1204b804483091fae43cba'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/8b47f38'}, {'type': 'PACKAGE', 'url': 'https://github.com/th... | {'cwe_ids': ['CWE-311', 'CWE-319', 'CWE-614'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:06:06Z', 'nvd_published_at': '2022-12-11T15:15:00Z'} |
1.4.0 | GHSA-rprg-4v7q-87v7 | 2022-12-12T20:44:53Z | 2022-12-08T18:30:50Z | null | ['CVE-2022-4123'] | Buildah (as part of Podman) vulnerable to Path Traversal | A flaw was found in Buildah. The local path and the lowest subdirectory may be disclosed due to incorrect absolute path traversal, resulting in an impact to confidentiality. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/containers/podman/v4'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.1.0-rc1'}, {'last_affected': '4.4.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4123'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/issues/13293'}, {'type': 'WEB', 'url': 'https://github.com/containers/podman/pull/13531'}, {'type': 'WEB', 'url': 'https://bugzilla.redhat.com/show_bug.cgi?id=2144989'}, {'type': ... | {'cwe_ids': ['CWE-23'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T23:59:57Z', 'nvd_published_at': '2022-12-08T16:15:00Z'} |
1.4.0 | GHSA-fv6c-rfg3-gvjw | 2023-01-02T20:21:28Z | 2022-12-23T12:30:25Z | null | ['CVE-2022-4687'] | usememos/memos makes Incorrect Use of Privileged APIs | Incorrect Use of Privileged APIs in GitHub repository usememos/memos prior to 0.9.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4687'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/dca35bde877aab6e64ef51b52e590b5d48f692f9'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b908377f-a61b-4... | {'cwe_ids': ['CWE-269', 'CWE-648'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:25:32Z', 'nvd_published_at': '2022-12-23T12:15:00Z'} |
1.4.0 | GHSA-4whf-rmx5-8frv | 2023-01-03T21:25:15Z | 2022-12-19T00:30:23Z | null | ['CVE-2021-4250'] | active_attr Improper Resource Shutdown or Release vulnerability | A vulnerability classified as problematic has been found in cgriego active_attr up to 0.15.3. This affects the function call of the file lib/active_attr/typecasting/boolean_typecaster.rb of the component Regex Handler. The manipulation of the argument value leads to denial of service. The exploit has been disclosed to ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'active_attr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.15.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4250'}, {'type': 'WEB', 'url': 'https://github.com/cgriego/active_attr/issues/184'}, {'type': 'WEB', 'url': 'https://github.com/cgriego/active_attr/pull/185'}, {'type': 'WEB', 'url': 'https://github.com/cgriego/active_attr/commit/dab95e5843b0152544... | {'cwe_ids': ['CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-19T18:16:23Z', 'nvd_published_at': '2022-12-18T22:15:00Z'} |
1.4.0 | GHSA-j563-grx4-pjpv | 2022-12-29T01:48:08Z | 2022-12-29T01:48:08Z | null | ['CVE-2022-41966'] | XStream can cause Denial of Service via stack overflow | ### Impact
The vulnerability may allow a remote attacker to terminate the application with a stack overflow error resulting in a denial of service only by manipulating the processed input stream.
### Patches
XStream 1.4.20 handles the stack overflow and raises an InputManipulationException instead.
### Workarounds
Th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.thoughtworks.xstream:xstream'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.20'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/x-stream/xstream/security/advisories/GHSA-j563-grx4-pjpv'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-41966'}, {'type': 'PACKAGE', 'url': 'https://github.com/x-stream/xstream'}, {'type': 'WEB', 'url': 'https://x-stream.github.io/CVE-2022-41966.htm... | {'cwe_ids': ['CWE-120', 'CWE-121', 'CWE-502', 'CWE-674'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:48:08Z', 'nvd_published_at': '2022-12-28T00:15:00Z'} |
1.4.0 | GHSA-47vx-fqr5-j2gw | 2022-12-22T22:03:02Z | 2022-12-16T21:30:44Z | null | ['CVE-2022-4565'] | HuTool vulnerable to Uncontrolled Resource Consumption | A vulnerability classified as problematic was found in Dromara HuTool up to 5.8.10. This vulnerability affects unknown code of the file cn.hutool.core.util.ZipUtil.java. The manipulation leads to resource consumption. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Up... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'cn.hutool:hutool-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.8.11'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4565'}, {'type': 'WEB', 'url': 'https://github.com/dromara/hutool/issues/2797'}, {'type': 'PACKAGE', 'url': 'https://github.com/dromara/hutool'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.215974'}] | {'cwe_ids': ['CWE-400', 'CWE-404'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-16T21:56:55Z', 'nvd_published_at': '2022-12-16T19:15:00Z'} |
1.4.0 | GHSA-f683-35w9-28g5 | 2023-02-08T00:23:48Z | 2022-12-14T21:30:16Z | null | ['CVE-2022-47408'] | Multiple vulnerabilities in extension "Newsletter subscriber management" (fp_newsletter) | The CAPTCHA of the extension can be bypassed which may result in automated creation of various newsletter subscribers. It is possible to provide arbitrary subscription UIDs to the `deleteAction` of the extension resulting in all newsletter subscribers to be unsubscribed. Insufficient access checks in the `createAction`... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'fixpunkt/fp-newsletter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.2.0'}, {'fixed': '3.2.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'fixpunkt/fp-newsletter'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '2.0.0'}, {'fixed':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-47408'}, {'type': 'WEB', 'url': 'https://github.com/bihor/fp_newsletter/commit/bc673cd9ab04f3fdd1225303f2ccb378b11a3747'}, {'type': 'WEB', 'url': 'https://github.com/FriendsOfPHP/security-advisories/blob/master/fixpunkt/fp-newsletter/CVE-2022-47408... | {'cwe_ids': ['CWE-863'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-02-08T00:23:48Z', 'nvd_published_at': '2022-12-14T21:15:00Z'} |
1.4.0 | GHSA-gxqf-4g4p-q3hc | 2023-01-10T15:37:45Z | 2022-12-29T18:30:24Z | null | ['CVE-2022-4839'] | usememos/memos vulnerable to stored Cross-site Scripting | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos 0.9.0 and prior. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4839'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/64e5c343c5f74b0abdf3ac0d21a6139daea58cf8'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/ad954cab-f026-4... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:53:46Z', 'nvd_published_at': '2022-12-29T17:15:00Z'} |
1.4.0 | GHSA-q9qr-jwpw-3qvv | 2023-08-29T19:36:30Z | 2022-12-28T00:30:23Z | null | ['CVE-2016-15005'] | Golf may allow attacker to bypass CSRF protections due to weak PRNG | CSRF tokens are generated using math/rand, which is not a cryptographically secure random number generator, allowing an attacker to predict values and bypass CSRF protections with relatively few requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/dinever/golf'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2016-15005'}, {'type': 'WEB', 'url': 'https://github.com/dinever/golf/issues/20'}, {'type': 'WEB', 'url': 'https://github.com/dinever/golf/pull/24'}, {'type': 'WEB', 'url': 'https://github.com/dinever/golf/commit/3776f338be48b5bc5e8cf9faff7851fc52a3f1fe... | {'cwe_ids': ['CWE-332', 'CWE-352'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:45:18Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-5pqf-rvm7-3wgw | 2022-12-29T00:36:20Z | 2022-12-22T00:30:36Z | null | ['CVE-2022-4638'] | collective.contact.widget is vulnerable to cross-site scripting | collective.contact.widget is an add-on is part of the collective.contact.* suite. A vulnerability classified as problematic was found in collective.contact.widget up to 1.12. This vulnerability affects the function title of the file src/collective/contact/widget/widgets.py. The manipulation leads to cross site scriptin... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'collective.contact.widget'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.13'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4638'}, {'type': 'WEB', 'url': 'https://github.com/collective/collective.contact.widget/commit/5da36305ca7ed433782be8901c47387406fcda12'}, {'type': 'PACKAGE', 'url': 'https://github.com/collective/collective.contact.widget'}, {'type': 'WEB', 'url':... | {'cwe_ids': ['CWE-707', 'CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T00:36:20Z', 'nvd_published_at': '2022-12-21T22:15:00Z'} |
1.4.0 | GHSA-rjf6-wj7r-5fj2 | 2022-12-13T17:56:27Z | 2022-12-11T15:30:45Z | null | ['CVE-2022-4408'] | phpMyFAQ vulnerable to Cross-site Scripting | phpMyFAQ prior to version 3.1.9 is vulnerable to stored Cross-site Scripting (XSS). | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'thorsten/phpmyfaq'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4408'}, {'type': 'WEB', 'url': 'https://github.com/thorsten/phpmyfaq/commit/e2ea332a2b5e798f2c39203b2489a2dabe831751'}, {'type': 'PACKAGE', 'url': 'https://github.com/thorsten/phpmyfaq'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/2ec4ddd4-... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:07:20Z', 'nvd_published_at': '2022-12-11T15:15:00Z'} |
1.4.0 | GHSA-wf33-6x33-wcf9 | 2023-01-06T18:09:57Z | 2022-12-27T15:30:19Z | null | ['CVE-2022-4722'] | rdiffweb vulnerable to Authentication Bypass by Primary Weakness | In rdiffweb prior to 2.5.5, the username field is not unique to users. This allows exploitation of primary key logic by creating the same name with different combinations & may allow unauthorized access. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4722'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/d1aaa96b665a39fba9e98d6054a9de511ba0a837'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/c62126dc-d9... | {'cwe_ids': ['CWE-287', 'CWE-305'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:01:28Z', 'nvd_published_at': '2022-12-27T15:15:00Z'} |
1.4.0 | GHSA-5g2c-j6v9-vf94 | 2022-12-12T22:16:49Z | 2022-12-12T09:30:35Z | null | ['CVE-2022-46686'] | Jenkins Custom Build Properties Plugin vulnerable to Cross-site Scripting | Jenkins Custom Build Properties Plugin 2.79.vc095ccc85094 and earlier does not escape property values and build display names on the Custom Build Properties and Build Summary pages, resulting in a stored cross-site scripting (XSS) vulnerability exploitable by attackers able to set or change these values. Custom Build P... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'io.jenkins.plugins:custom-build-properties'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.82.v16d5b'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46686'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/custom-build-properties-plugin/commit/ff4e27181389955cbb051c1c91f0c85c6adbced0'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/custom-build-properties-plugin'}, {'type': 'WEB... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:16:49Z', 'nvd_published_at': '2022-12-12T09:15:00Z'} |
1.4.0 | GHSA-78m5-jpmf-ch7v | 2022-12-15T21:59:23Z | 2022-12-05T23:34:43Z | null | ['CVE-2022-23530'] | GuardDog vulnerable to arbitrary file write when scanning a specially-crafted remote PyPI package | ### Summary
Unsafe extracting using `shutil.unpack_archive()` from a remotely retrieved tarball may lead to writing the extracted file to an unintended destination.
### Details
Extracting files using `shutil.unpack_archive()` from a potentially malicious tarball without validating that the destination file path is w... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'guarddog'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.1.7'}}] | [{'type': 'WEB', 'url': 'https://github.com/DataDog/guarddog/security/advisories/GHSA-78m5-jpmf-ch7v'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23530'}, {'type': 'WEB', 'url': 'https://github.com/DataDog/guarddog/commit/37c7d0767ba28f4df46117d478f97652594c491c'}, {'type': 'PACKAGE', 'url'... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:34:43Z', 'nvd_published_at': '2022-12-16T23:15:00Z'} |
1.4.0 | GHSA-363q-j92x-7543 | 2023-01-02T20:26:02Z | 2022-12-25T06:30:21Z | null | ['CVE-2022-44380'] | Snipe-IT vulnerable to Cross Site Scripting for View Assigned Assets | Snipe-IT before 6.0.14 is vulnerable to Cross Site Scripting (XSS) for View Assigned Assets. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'snipe/snipe-it'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.0.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-44380'}, {'type': 'WEB', 'url': 'https://census-labs.com/news/2022/12/23/multiple-vulnerabilities-in-snipe-it/'}, {'type': 'PACKAGE', 'url': 'https://github.com/snipe/snipe-it'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:18:49Z', 'nvd_published_at': '2022-12-25T05:15:00Z'} |
1.4.0 | GHSA-6cr6-fmvc-vw2p | 2023-02-09T21:41:23Z | 2022-12-28T00:30:23Z | null | ['CVE-2021-4239'] | Noise vulnerable to denial of service | Noise is a Go implementation of the Noise Protocol Framework. The Noise protocol implementation suffers from weakened cryptographic security after encrypting 2^64 messages, and a potential denial of service attack. After 2^64 (~18.4 quintillion) messages are encrypted with the Encrypt function, the nonce counter will w... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/flynn/noise'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4239'}, {'type': 'WEB', 'url': 'https://github.com/flynn/noise/pull/44'}, {'type': 'WEB', 'url': 'https://github.com/flynn/noise/commit/2499bf1bad239a8316c32932a993642350b3afdb'}, {'type': 'PACKAGE', 'url': 'https://github.com/flynn/noise'}, {'type... | {'cwe_ids': ['CWE-311'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-29T01:52:11Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-47xh-qxqv-mgvg | 2022-12-02T22:24:44Z | 2022-12-02T22:24:44Z | null | [] | kube-httpcache is vulnerable to Cross-Site Request Forgery (CSRF) | ### Impact
> A request forgery attack can be performed on Varnish Cache servers that have the HTTP/2 protocol turned on. An attacker may introduce characters through the HTTP/2 pseudo-headers that are invalid in the context of an HTTP/1 request line, causing the Varnish server to produce invalid HTTP/1 requests to the... | [] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/mittwald/kube-httpcache'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.1'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/mittwald/kube-httpcache/security/advisories/GHSA-47xh-qxqv-mgvg'}, {'type': 'PACKAGE', 'url': 'https://github.com/mittwald/kube-httpcache'}, {'type': 'WEB', 'url': 'https://varnish-cache.org/security/VSV00011.html#vsv00011'}] | {'cwe_ids': ['CWE-352'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-02T22:24:44Z', 'nvd_published_at': None} |
1.4.0 | GHSA-8c28-5mp7-v24h | 2022-12-13T17:02:09Z | 2022-12-13T17:02:09Z | null | ['CVE-2022-23500'] | TYPO3 CMS vulnerable to Denial of Service in Page Error Handling | ### Problem
Requesting invalid or non-existing resources via HTTP triggers the page error handler, which again could retrieve content to be shown as an error message from another page. This leads to a scenario in which the application is calling itself recursively - amplifying the impact of the initial attack until the... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '9.0.0'}, {'fixed': '9.5.38'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'typo3/cms-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '10.0.0'}, {'fixed': '10.4.33'}]}]... | [{'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/security/advisories/GHSA-8c28-5mp7-v24h'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23500'}, {'type': 'WEB', 'url': 'https://github.com/TYPO3/typo3/commit/1e5f44417f031c9c5a9f9d09a6a841cf89aa7b7a'}, {'type': 'WEB', 'url': 'https://git... | {'cwe_ids': ['CWE-405', 'CWE-674'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T17:02:09Z', 'nvd_published_at': '2022-12-14T08:15:00Z'} |
1.4.0 | GHSA-6m4h-hfpp-x8cx | 2022-12-30T17:06:17Z | 2022-12-22T00:30:36Z | null | ['CVE-2022-4643'] | docconv OS Command Injection vulnerability | A vulnerability was found in docconv prior to version 1.2.1. It has been declared as critical. This vulnerability affects the function ConvertPDFImages of the file pdf_ocr.go. The manipulation of the argument path leads to os command injection. The attack can be initiated remotely. Upgrading to version 1.2.1 can addres... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/sajari/docconv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'code.sajari.com/docconv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.3.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4643'}, {'type': 'WEB', 'url': 'https://github.com/sajari/docconv/pull/110'}, {'type': 'WEB', 'url': 'https://github.com/sajari/docconv/commit/b19021ade3d0b71c89d35cb00eb9e589a121faa5'}, {'type': 'PACKAGE', 'url': 'https://github.com/sajari/docconv... | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:06:17Z', 'nvd_published_at': '2022-12-21T22:15:00Z'} |
1.4.0 | GHSA-32qh-8vg6-9g43 | 2023-01-10T15:59:17Z | 2022-12-28T00:30:23Z | null | ['CVE-2018-25046'] | Cloud Foundry Archiver vulnerable to path traversal | Due to improper path santization, archives containing relative file paths can cause files to be written (or overwritten) outside of the target directory. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudfoundry/archiver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20180523222229-09b5706aa936'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'code.cloudfoundry.org/archiver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'intr... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25046'}, {'type': 'WEB', 'url': 'https://github.com/cloudfoundry/archiver/commit/09b5706aa9367972c09144a450bb4523049ee840'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudfoundry/archiver'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-... | {'cwe_ids': ['CWE-22'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:15:54Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-89w7-5q45-r53w | 2022-12-27T17:53:39Z | 2022-12-20T06:30:36Z | null | ['CVE-2022-25940'] | lite-server vulnerable to Denial of Service | All versions of package lite-server are vulnerable to Denial of Service (DoS) when an attacker sends an HTTP request and includes control characters that the `decodeURI()` function is unable to parse. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'lite-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.6.1'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.webjars.npm:lite-server'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '2.2.0'... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25940'}, {'type': 'WEB', 'url': 'https://gist.github.com/lirantal/832382155e00da92bfd8bb3adea474eb'}, {'type': 'PACKAGE', 'url': 'https://github.com/johnpapa/lite-server'}, {'type': 'WEB', 'url': 'https://security.snyk.io/vuln/SNYK-JAVA-ORGWEBJARSN... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T17:37:47Z', 'nvd_published_at': '2022-12-20T05:15:00Z'} |
1.4.0 | GHSA-j453-hm5x-c46w | 2022-12-12T20:48:00Z | 2022-12-07T18:30:26Z | null | ['CVE-2020-36565'] | Echo vulnerable to directory traversal | Due to improper sanitization of user input on Windows, the static file handler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/labstack/echo/v4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36565'}, {'type': 'WEB', 'url': 'https://github.com/labstack/echo/pull/1718'}, {'type': 'WEB', 'url': 'https://github.com/labstack/echo/commit/4422e3b66b9fd498ed1ae1d0242d660d0ed3faaa'}, {'type': 'PACKAGE', 'url': 'https://github.com/labstack/echo'... | {'cwe_ids': ['CWE-22'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-07T20:46:25Z', 'nvd_published_at': '2022-12-07T17:15:00Z'} |
1.4.0 | GHSA-h5wp-jrqc-cwwx | 2022-12-30T00:54:22Z | 2022-12-27T15:30:19Z | null | ['CVE-2022-4720'] | rdiffweb vulnerable to Open Redirect | Open Redirect in GitHub repository ikus060/rdiffweb prior to 2.5.5. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4720'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/6afaae56a29536f0118b3380d296c416aa6d078d'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/339687af-6e... | {'cwe_ids': ['CWE-601'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T00:54:22Z', 'nvd_published_at': '2022-12-27T15:15:00Z'} |
1.4.0 | GHSA-x3qh-53qf-jxq9 | 2022-12-12T22:18:16Z | 2022-12-12T09:30:35Z | null | ['CVE-2022-46685'] | Jenkins Gitea Plugin vulnerable to Cleartext Transmission of Sensitive Information | In Jenkins Gitea Plugin 1.4.4 and earlier, the implementation of Gitea personal access tokens did not support credentials masking, potentially exposing them through the build log.
Gitea Plugin 1.4.5 adds support for masking of Gitea personal access tokens.
Administrators unable to update are advised to use SSH checko... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:gitea'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46685'}, {'type': 'WEB', 'url': 'https://github.com/jenkinsci/gitea-plugin/commit/b3b2bd869b91f9f1312bbbbf6128cad2cd86bd8c'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/gitea-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/se... | {'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:18:16Z', 'nvd_published_at': '2022-12-12T09:15:00Z'} |
1.4.0 | GHSA-74hc-57m5-83ch | 2022-12-29T19:23:01Z | 2022-12-22T12:30:17Z | null | ['CVE-2020-36624'] | text_helpers uses web link to untrusted target with window.opener access | A vulnerability was found in ahorner text-helpers 1.1.0/1.1.1. This vulnerability affects unknown code of the file lib/text_helpers/translation.rb. The manipulation of the argument link leads to use of web link to untrusted target with window.opener access. The attack can be initiated remotely. Upgrading to version 1.2... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'text_helpers'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.2.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36624'}, {'type': 'WEB', 'url': 'https://github.com/ahorner/text-helpers/pull/19'}, {'type': 'WEB', 'url': 'https://github.com/ahorner/text-helpers/commit/184b60ded0e43c985788582aca2d1e746f9405a3'}, {'type': 'PACKAGE', 'url': 'https://github.com/ah... | {'cwe_ids': ['CWE-1022', 'CWE-266'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T20:03:04Z', 'nvd_published_at': '2022-12-22T10:15:00Z'} |
1.4.0 | GHSA-4fv8-w65m-3932 | 2022-12-30T16:57:49Z | 2022-12-30T16:57:49Z | null | ['CVE-2022-46174'] | efs-utils and aws-efs-csi-driver have race condition during concurrent TLS mounts | ### Impact
A potential race condition issue exists within the Amazon EFS mount helper in efs-utils versions v1.34.3 and below, and aws-efs-csi-driver versions v1.4.7 and below. When using TLS to mount file systems, the mount helper allocates a local port for stunnel to receive NFS connections prior to applying the TLS ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kubernetes-sigs/aws-efs-csi-driver'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.8'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.4.7'}}] | [{'type': 'WEB', 'url': 'https://github.com/aws/efs-utils/security/advisories/GHSA-4fv8-w65m-3932'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46174'}, {'type': 'WEB', 'url': 'https://github.com/aws/efs-utils/issues/125'}, {'type': 'WEB', 'url': 'https://github.com/aws/efs-utils/commit/f3a8... | {'cwe_ids': ['CWE-362'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T16:57:49Z', 'nvd_published_at': '2022-12-28T07:15:00Z'} |
1.4.0 | GHSA-9v25-r5q2-2p6w | 2022-12-12T22:03:19Z | 2022-12-12T22:03:19Z | null | [] | Candy Machine Set Collection During Mint Missing Check | A problem with Candy Machine V2 allow minting NFTs to an arbitrary collection due to a missing check.
Here is a description of the exploit:
Details:
Here is the tx/ix to exploit:
Transaction:
Ix 1: candy_machine v2, mint_nft, passing in empty metadata -1
Ix 2: custom handler, 0
cpi A --> token_metadata create_metada... | [] | [{'package': {'ecosystem': 'crates.io', 'name': 'mpl-candy-machine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.5.0'}, {'fixed': '4.5.1'}]}], 'versions': ['4.5.0']}] | [{'type': 'WEB', 'url': 'https://github.com/metaplex-foundation/metaplex-program-library/security/advisories/GHSA-9v25-r5q2-2p6w'}, {'type': 'WEB', 'url': 'https://github.com/metaplex-foundation/metaplex-program-library/commit/e6b3aff603ac06236bf77c2ec21ead93c6836dce'}, {'type': 'PACKAGE', 'url': 'https://github.com/me... | {'cwe_ids': [], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-12T22:03:19Z', 'nvd_published_at': None} |
1.4.0 | GHSA-5rhg-xhgr-5hfj | 2023-01-10T15:58:16Z | 2022-12-28T03:30:28Z | null | ['CVE-2020-36563'] | go-saml's XML Digital Signatures use SHA-1 | XML Digital Signatures generated and validated using this package use SHA-1, which may allow an attacker to craft inputs which cause hash collisions depending on their control over the input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/RobotsAndPencils/go-saml'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.0.0-20170520135329-fb13cb52a46b'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-36563'}, {'type': 'WEB', 'url': 'https://github.com/RobotsAndPencils/go-saml/pull/38'}, {'type': 'PACKAGE', 'url': 'https://github.com/RobotsAndPencils/go-saml'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2020-0047'}] | {'cwe_ids': ['CWE-347'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:48:02Z', 'nvd_published_at': '2022-12-28T03:15:00Z'} |
1.4.0 | GHSA-gvfj-fxx3-j323 | 2023-08-30T18:49:55Z | 2022-12-31T03:30:26Z | null | ['CVE-2022-48195'] | mellium.im/sasl authentication failure due to insufficient nonce randomness | An issue was discovered in Mellium mellium.im/sasl before 0.3.1. When performing SCRAM-based SASL authentication, if the remote end advertises support for channel binding, no random nonce is generated (instead, the nonce is empty). This causes authentication to fail in the best case, but (if paired with a remote end th... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'mellium.im/sasl'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.3.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-48195'}, {'type': 'PACKAGE', 'url': 'https://codeberg.org/mellium/sasl'}, {'type': 'WEB', 'url': 'https://codeberg.org/mellium/sasl/commit/e6cbf681b247c4efa1477eaad2cc47a01707b732'}, {'type': 'WEB', 'url': 'https://codeberg.org/mellium/sasl/release... | {'cwe_ids': ['CWE-287'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T13:56:47Z', 'nvd_published_at': '2022-12-31T01:15:00Z'} |
1.4.0 | GHSA-gxq5-79m2-gvvq | 2022-12-20T15:22:58Z | 2022-12-15T21:30:29Z | null | ['CVE-2022-32531'] | Apache Bookkeeper vulnerable to Improper Certificate Validation | The Apache Bookkeeper Java Client (before 4.14.6 and also 4.15.0) does not close the connection to the bookkeeper server when TLS hostname verification fails. This leaves the bookkeeper client vulnerable to a man in the middle attack. The problem affects BookKeeper client prior to versions 4.14.6 and 4.15.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.bookkeeper:bookkeeper-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.14.6'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.bookkeeper:bookkeeper-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduce... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-32531'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/bookkeeper'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/xyk2lfc7lzof8mksmwyympbqxts1b5s9'}] | {'cwe_ids': ['CWE-295'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:33:41Z', 'nvd_published_at': '2022-12-15T19:15:00Z'} |
1.4.0 | GHSA-qv4q-mr5r-qprj | 2022-12-08T03:03:33Z | 2022-12-08T03:03:33Z | null | ['CVE-2022-23476'] | Unchecked return value from xmlTextReaderExpand | ## Summary
Nokogiri `1.13.8, 1.13.9` fails to check the return value from `xmlTextReaderExpand` in the method `Nokogiri::XML::Reader#attribute_hash`. This can lead to a null pointer exception when invalid markup is being parsed.
For applications using `XML::Reader` to parse untrusted inputs, this may potentially be ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'RubyGems', 'name': 'nokogiri'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.13.8'}, {'fixed': '1.13.10'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-qv4q-mr5r-qprj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23476'}, {'type': 'WEB', 'url': 'https://github.com/sparklemotion/nokogiri/commit/85410e38410f670cbbc8c5b00d07b843caee88ce'}, {'type': 'WEB... | {'cwe_ids': ['CWE-252', 'CWE-476'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-08T03:03:33Z', 'nvd_published_at': '2022-12-08T04:15:00Z'} |
1.4.0 | GHSA-m973-4vpc-x43c | 2023-01-10T15:38:49Z | 2022-12-27T15:30:19Z | null | ['CVE-2022-4730'] | Graphite Web Cross-site Scripting vulnerability | A vulnerability was found in Graphite Web. It has been classified as problematic. Affected is an unknown function of the component Absolute Time Range Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'graphite-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4730'}, {'type': 'WEB', 'url': 'https://github.com/graphite-project/graphite-web/issues/2746'}, {'type': 'WEB', 'url': 'https://github.com/graphite-project/graphite-web/pull/2785'}, {'type': 'WEB', 'url': 'https://github.com/graphite-project/graphi... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:57:01Z', 'nvd_published_at': '2022-12-27T15:15:00Z'} |
1.4.0 | GHSA-p495-jxh2-wrfg | 2022-12-20T18:53:51Z | 2022-12-15T21:30:28Z | null | ['CVE-2021-4245'] | npm package rfc6902 vulnerable to Prototype Pollution | A vulnerability classified as problematic has been found in chbrown rfc6902. This affects an unknown part of the file pointer.ts. The manipulation leads to improperly controlled modification of object prototype attributes ('prototype pollution'). The exploit has been disclosed to the public and may be used. The name of... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'rfc6902'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4245'}, {'type': 'WEB', 'url': 'https://github.com/chbrown/rfc6902/issues/84'}, {'type': 'WEB', 'url': 'https://github.com/chbrown/rfc6902/pull/76'}, {'type': 'WEB', 'url': 'https://github.com/chbrown/rfc6902/commit/c006ce9faa43d31edb34924f1df7b79c... | {'cwe_ids': ['CWE-1321'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T23:29:47Z', 'nvd_published_at': '2022-12-15T20:15:00Z'} |
1.4.0 | GHSA-g3wc-xv93-445q | 2022-12-22T23:06:24Z | 2022-12-18T12:30:20Z | null | ['CVE-2021-4248'] | DNS NuGet package uses insufficiently random values | A vulnerability was found in kapetan dns up to 6.1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file DNS/Protocol/Request.cs. The manipulation leads to insufficient entropy in prng. The attack may be launched remotely. Upgrading to version 7.0.0 can address this issue... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'DNS'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '7.0.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4248'}, {'type': 'WEB', 'url': 'https://github.com/kapetan/dns/pull/88'}, {'type': 'WEB', 'url': 'https://github.com/kapetan/dns/commit/cf7105aa2aae90d6656088fe5a8ee1d5730773b6'}, {'type': 'PACKAGE', 'url': 'https://github.com/kapetan/dns'}, {'type... | {'cwe_ids': ['CWE-330'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T23:06:24Z', 'nvd_published_at': '2022-12-18T11:15:00Z'} |
1.4.0 | GHSA-rmhx-9h5h-3xh3 | 2023-01-10T00:54:30Z | 2022-12-29T18:30:24Z | null | ['CVE-2022-4841'] | usememos/memos vulnerable to stored Cross-site Scripting | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4841'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/64e5c343c5f74b0abdf3ac0d21a6139daea58cf8'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/fa46b3ef-c621-4... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T22:53:30Z', 'nvd_published_at': '2022-12-29T17:15:00Z'} |
1.4.0 | GHSA-g594-55mp-f6q8 | 2022-12-15T17:31:47Z | 2022-12-12T18:30:27Z | null | ['CVE-2022-4314'] | Improper Privilege Management in rdiffweb | Unauthorized access to settings update, logs , history, delete etc in GitHub repository ikus060/rdiffweb prior to 2.5.2. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4314'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/b2df3679564d0daa2856213bb307d3e34bd89a25'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/b2dc504d-92... | {'cwe_ids': ['CWE-269'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-15T17:31:47Z', 'nvd_published_at': '2022-12-12T18:15:00Z'} |
1.4.0 | GHSA-vc39-x7w6-6vj7 | 2022-12-05T23:15:18Z | 2022-12-02T15:30:26Z | null | ['CVE-2022-46366'] | Apache Tapestry allows deserialization of untrusted data | ** UNSUPPORTED WHEN ASSIGNED ** Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line.
NOTE: This vulnerability only affects Apache Tapestry version line 3.x, ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.tapestry:tapestry-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0'}, {'fixed': '5.0.1'}]}], 'database_specific': {'last_known_affected_version_range': '< 4.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-46366'}, {'type': 'WEB', 'url': 'https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0041/MNDT-2022-0041.md'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/bwn1vjrvz1hq0wbdzj23wz322244swhj'}, {'type': 'WEB', ... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:15:18Z', 'nvd_published_at': '2022-12-02T14:15:00Z'} |
1.4.0 | GHSA-f5h9-qx38-2hgp | 2023-01-10T15:39:09Z | 2022-12-27T15:30:19Z | null | ['CVE-2022-4725'] | AWS SDK is vulnerable to server-side request forgery (SSRF) | A vulnerability was found in AWS SDK 2.59.0. It has been rated as critical. This issue affects the function XpathUtils of the file aws-android-sdk-core/src/main/java/com/amazonaws/util/XpathUtils.java of the component XML Parser. The manipulation leads to server-side request forgery. Upgrading to version 2.59.1 can add... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'com.amazonaws:aws-android-sdk-mobile-client'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.59.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 2.59.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4725'}, {'type': 'WEB', 'url': 'https://github.com/aws-amplify/aws-sdk-android/pull/3100'}, {'type': 'WEB', 'url': 'https://github.com/aws-amplify/aws-sdk-android/commit/c3e6d69422e1f0c80fe53f2d757b8df97619af2b'}, {'type': 'PACKAGE', 'url': 'https:... | {'cwe_ids': ['CWE-918'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T00:54:03Z', 'nvd_published_at': '2022-12-27T15:15:00Z'} |
1.4.0 | GHSA-639f-hxcv-84mc | 2022-12-29T17:00:41Z | 2022-12-22T03:30:19Z | null | ['CVE-2022-4644'] | rdiffweb Open Redirect vulnerability | rdiffweb prior to version 2.5.4 has an Open Redirect vulnerability. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'rdiffweb'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4644'}, {'type': 'WEB', 'url': 'https://github.com/ikus060/rdiffweb/commit/5f861670ef8f38ca8eea52a98672d0e0fabb5368'}, {'type': 'PACKAGE', 'url': 'https://github.com/ikus060/rdiffweb'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/77e5f425-c7... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T20:02:09Z', 'nvd_published_at': '2022-12-22T01:15:00Z'} |
1.4.0 | GHSA-894q-wpg5-mf2h | 2022-12-13T19:32:22Z | 2022-12-10T12:30:18Z | null | ['CVE-2022-4396'] | pyRdfa3 Cross-site Scripting vulnerability | A vulnerability was found in RDFlib pyrdfa3 and classified as problematic. This issue affects the function _get_option of the file pyRdfa/__init__.py. The manipulation leads to cross site scripting. The attack may be initiated remotely. The name of the patch is ffd1d62dd50d5f4190013b39cedcdfbd81f3ce3e. It is recommende... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'pyRdfa3'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '3.5.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4396'}, {'type': 'WEB', 'url': 'https://github.com/RDFLib/pyrdfa3/issues/38'}, {'type': 'WEB', 'url': 'https://github.com/RDFLib/pyrdfa3/pull/40'}, {'type': 'WEB', 'url': 'https://github.com/RDFLib/pyrdfa3/commit/ffd1d62dd50d5f4190013b39cedcdfbd81f... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-13T19:32:22Z', 'nvd_published_at': '2022-12-10T12:15:00Z'} |
1.4.0 | GHSA-c2p4-8mvv-rwmv | 2022-12-29T01:07:10Z | 2022-12-21T18:30:22Z | null | ['CVE-2022-40145'] | Apache Karaf vulnerable to potential code injection | This vulnerability is about a potential code injection when an attacker has control of the target LDAP server using in the JDBC JNDI URL. The function `jaas.modules.src.main.java.porg.apache.karaf.jass.modules.jdbc.JDBCUtils#doCreateDatasource` uses `InitialContext.lookup(jndiName)` without filtering. A user can modify... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '4.3.8'}]}]}, {'package': {'ecosystem': 'Maven', 'name': 'org.apache.karaf:apache-karaf'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.4.0'}, {'fixed... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-40145'}, {'type': 'WEB', 'url': 'https://github.com/apache/karaf/pull/1632'}, {'type': 'WEB', 'url': 'https://gitbox.apache.org/repos/asf?p=karaf.git;h=2a933445d1'}, {'type': 'WEB', 'url': 'https://gitbox.apache.org/repos/asf?p=karaf.git;h=3819f483... | {'cwe_ids': ['CWE-20', 'CWE-74'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-12-21T18:49:57Z', 'nvd_published_at': '2022-12-21T16:15:00Z'} |
1.4.0 | GHSA-q5j9-f95w-f4pr | 2022-12-06T21:53:44Z | 2022-12-05T06:30:21Z | null | ['CVE-2022-43484'] | TERASOLUNA Server Framework vulnerable to ClassLoader manipulation | TERASOLUNA Global Framework 1.0.0 (Public review version) and TERASOLUNA Server Framework for Java (Rich) 2.0.0.2 to 2.0.5.1 are vulnerable to ClassLoader manipulation due to using the old version of Spring Framework which contains the vulnerability. The vulnerability is caused by an improper input validation issue in ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.terasoluna.gfw:terasoluna-gfw-common'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.1.RELEASE'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-43484'}, {'type': 'WEB', 'url': 'https://github.com/spring-projects/spring-framework/issues/15724'}, {'type': 'PACKAGE', 'url': 'https://github.com/terasolunaorg/terasoluna-gfw'}, {'type': 'WEB', 'url': 'https://jvn.jp/en/jp/JVN54728399/index.html'... | {'cwe_ids': ['CWE-20'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-05T23:23:07Z', 'nvd_published_at': '2022-12-05T04:15:00Z'} |
1.4.0 | GHSA-q99p-78hp-xg5c | 2023-01-10T00:47:19Z | 2022-12-27T15:30:19Z | null | ['CVE-2022-4729'] | Graphite Web Cross-site Scripting vulnerability | A vulnerability was found in Graphite Web and classified as problematic. This issue affects some unknown processing of the component Template Name Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The name of the ... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'graphite-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.1.10'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4729'}, {'type': 'WEB', 'url': 'https://github.com/graphite-project/graphite-web/issues/2745'}, {'type': 'WEB', 'url': 'https://github.com/graphite-project/graphite-web/pull/2785'}, {'type': 'WEB', 'url': 'https://github.com/graphite-project/graphi... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T17:57:32Z', 'nvd_published_at': '2022-12-27T15:15:00Z'} |
1.4.0 | GHSA-jfm8-hwhg-r6gg | 2022-12-20T17:38:21Z | 2022-12-20T06:30:36Z | null | ['CVE-2022-25171'] | p4 vulnerable to Command Injection due to improper input sanitization | The package p4 before 0.0.7 is vulnerable to Command Injection via the run() function due to improper input sanitization | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'p4'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.7'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-25171'}, {'type': 'WEB', 'url': 'https://github.com/natelong/p4/commit/ae42e251beabf67c00539ec0e1d7aa149ca445fb'}, {'type': 'PACKAGE', 'url': 'https://github.com/natelong/p4'}, {'type': 'WEB', 'url': 'https://github.com/natelong/p4/blob/master/p4.j... | {'cwe_ids': ['CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-20T17:38:21Z', 'nvd_published_at': '2022-12-20T05:15:00Z'} |
1.4.0 | GHSA-fjgq-224f-fq37 | 2023-03-01T18:36:23Z | 2022-12-28T00:30:23Z | null | ['CVE-2019-25073'] | Goa vulnerable to path traversal | Improper path santiziation in github.com/goadesign/goa before v3.0.9, v2.0.10, or v1.4.3 allow remote attackers to read files outside of the intended directory | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/goadesign/goa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'goa.design/goa'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.4.3'}]}]}, {'package': {... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2019-25073'}, {'type': 'WEB', 'url': 'https://github.com/goadesign/goa/pull/2388'}, {'type': 'WEB', 'url': 'https://github.com/goadesign/goa/commit/70b5a199d0f813d74423993832c424e1fc73fb39'}, {'type': 'PACKAGE', 'url': 'https://github.com/goadesign/goa'... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T19:24:57Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-vr8j-hgmm-jh9r | 2023-05-02T16:35:23Z | 2022-12-13T18:30:33Z | null | ['CVE-2022-3996'] | openssl-src subject to DoS by double-checked locking | If an X.509 certificate contains a malformed policy constraint and policy processing is enabled, then a write lock will be taken twice recursively. On some operating systems (most widely: Windows) this results in a denial of service when the affected process hangs. Policy processing being enabled on a publicly facing s... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'openssl-src'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.0.0'}, {'fixed': '3.0.8'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-3996'}, {'type': 'WEB', 'url': 'https://github.com/openssl/openssl/commit/7725e7bfe6f2ce8146b6552b44e0d226be7638e7'}, {'type': 'WEB', 'url': 'https://www.openssl.org/news/secadv/20221213.txt'}] | {'cwe_ids': ['CWE-667'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2023-05-02T16:35:23Z', 'nvd_published_at': '2022-12-13T16:15:00Z'} |
1.4.0 | GHSA-hjrf-2m68-5959 | 2022-12-30T00:47:06Z | 2022-12-22T03:33:19Z | null | ['CVE-2022-23541'] | jsonwebtoken's insecure implementation of key retrieval function could lead to Forgeable Public/Private Tokens from RSA to HMAC | # Overview
Versions `<=8.5.1` of `jsonwebtoken` library can be misconfigured so that passing a poorly implemented key retrieval function (referring to the `secretOrPublicKey` argument from the [readme link](https://github.com/auth0/node-jsonwebtoken#jwtverifytoken-secretorpublickey-options-callback)) will result in in... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'jsonwebtoken'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '9.0.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 8.5.1'}}] | [{'type': 'WEB', 'url': 'https://github.com/auth0/node-jsonwebtoken/security/advisories/GHSA-hjrf-2m68-5959'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23541'}, {'type': 'WEB', 'url': 'https://github.com/auth0/node-jsonwebtoken/commit/e1fa9dcc12054a8681db4e6373da1b30cf7016e3'}, {'type': 'P... | {'cwe_ids': ['CWE-287'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T03:33:19Z', 'nvd_published_at': '2022-12-22T18:15:00Z'} |
1.4.0 | GHSA-6rvv-h8g7-728w | 2022-12-29T23:36:19Z | 2022-12-22T00:30:36Z | null | ['CVE-2022-4640'] | Mingsoft MCMS Cross-site Scripting vulnerability | A vulnerability has been found in Mingsoft MCMS 5.2.9 and classified as problematic. Affected by this vulnerability is the function save of the component Article Handler. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. It... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'net.mingsoft:ms-mcms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '5.2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4640'}, {'type': 'WEB', 'url': 'https://gitee.com/mingSoft/MCMS/issues/I65KI5'}, {'type': 'WEB', 'url': 'https://vuldb.com/?id.216499'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-22T19:58:56Z', 'nvd_published_at': '2022-12-21T22:15:00Z'} |
1.4.0 | GHSA-v92p-phmp-xffr | 2023-01-09T08:21:08Z | 2022-12-27T15:30:19Z | null | ['CVE-2022-4694'] | usememos/memos vulnerable to stored Cross-site Scripting | Cross-site Scripting (XSS) - Stored in GitHub repository usememos/memos prior to 0.9.0. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4694'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/65cc19c12efa392f792f6bb154b4838547e0af5e'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/a4d865c2-1a2b-4... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-12-30T18:02:50Z', 'nvd_published_at': '2022-12-27T15:15:00Z'} |
1.4.0 | GHSA-4wp2-8rm2-jgmh | 2023-01-09T21:49:10Z | 2022-12-28T00:30:23Z | null | ['CVE-2014-125026'] | LZ4 vulnerable to Out-of-bounds Write | LZ4 bindings use a deprecated C API that is vulnerable to memory corruption, which could lead to arbitrary code execution if called with untrusted user input. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/cloudflare/golz4'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.0.0-20140711154735-199f5f787806'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2014-125026'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/golz4/issues/5'}, {'type': 'WEB', 'url': 'https://github.com/cloudflare/golz4/commit/199f5f7878062ca17a98e079f2dbe1205e2ed898'}, {'type': 'PACKAGE', 'url': 'https://github.com/cloudfla... | {'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2023-01-09T21:49:10Z', 'nvd_published_at': '2022-12-27T22:15:00Z'} |
1.4.0 | GHSA-6whj-8g9g-5jvx | 2023-01-10T16:15:33Z | 2022-12-30T18:30:44Z | null | ['CVE-2022-4863'] | usememos/memos vulnerable to Improper Handling of Insufficient Permissions or Privileges | Improper Handling of Insufficient Permissions or Privileges in GitHub repository usememos/memos prior to 0.9.1. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/usememos/memos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-4863'}, {'type': 'WEB', 'url': 'https://github.com/usememos/memos/commit/3556ae4e651d9443dc3bb8a170dd3cc726517a53'}, {'type': 'PACKAGE', 'url': 'https://github.com/usememos/memos'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/42751929-e511-4... | {'cwe_ids': ['CWE-280'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2023-01-04T15:18:43Z', 'nvd_published_at': '2022-12-30T16:15:00Z'} |
1.4.0 | GHSA-jh82-c5jw-pxpc | 2022-01-20T15:33:22Z | 2022-01-21T23:20:27Z | null | ['CVE-2022-21689'] | Denial of Service in Onionshare | Between September 26, 2021 and October 8, 2021, [Radically Open Security](https://www.radicallyopensecurity.com/) conducted a penetration test of OnionShare 2.4, funded by the Open Technology Fund's [Red Team lab](https://www.opentech.fund/labs/red-team-lab/).
- Vulnerability ID: OTF-012
- Vulnerability type: Denial o... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'onionshare-cli'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.5'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/onionshare/onionshare/security/advisories/GHSA-jh82-c5jw-pxpc'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21689'}, {'type': 'PACKAGE', 'url': 'https://github.com/onionshare/onionshare/'}, {'type': 'WEB', 'url': 'https://github.com/onionshare/onio... | {'cwe_ids': ['CWE-400'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T18:48:07Z', 'nvd_published_at': '2022-01-18T22:15:00Z'} |
1.4.0 | GHSA-r478-c2pc-m7gx | 2022-01-19T19:58:19Z | 2022-01-12T20:07:10Z | null | ['CVE-2022-22846'] | DNS reply verification issue in dnslinb | The dnslib package through 0.9.16 for Python does not verify that the ID value in a DNS reply matches an ID value in a query. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'dnslib'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-22846'}, {'type': 'WEB', 'url': 'https://github.com/paulc/dnslib/issues/30'}, {'type': 'WEB', 'url': 'https://github.com/paulc/dnslib/commit/76e8677699ed098387d502c57980f58da642aeba'}, {'type': 'PACKAGE', 'url': 'https://github.com/paulc/dnslib/'}] | {'cwe_ids': [], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-11T18:25:47Z', 'nvd_published_at': '2022-01-10T14:12:00Z'} |
1.4.0 | GHSA-jv7g-9g6q-cxvw | 2022-01-27T13:51:45Z | 2022-01-27T14:04:28Z | null | ['CVE-2021-23631'] | Path Traversal in convert-svg packages | This affects all versions of package convert-svg-core; all versions of package convert-svg-to-png; all versions of package convert-svg-to-jpeg. Using a specially crafted SVG file, an attacker could read arbitrary files from the file system and then show the file content as a converted PNG file. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'npm', 'name': 'convert-svg-core'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'convert-svg-to-png'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '0.5.0'}]}]},... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23631'}, {'type': 'WEB', 'url': 'https://gist.github.com/legndery/a248350bb25b8502a03c2f407cedeb14'}, {'type': 'PACKAGE', 'url': 'https://github.com/neocotic/convert-svg'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JS-CONVERTSVGCORE-1582785... | {'cwe_ids': ['CWE-22'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-24T23:06:09Z', 'nvd_published_at': '2022-01-21T20:15:00Z'} |
1.4.0 | GHSA-f7vh-qwp3-x37m | 2022-11-25T17:19:49Z | 2022-01-19T00:01:15Z | null | ['CVE-2022-23307'] | Deserialization of Untrusted Data in Apache Log4j | CVE-2020-9493 identified a deserialization issue that was present in Apache Chainsaw. Prior to Chainsaw V2.0 Chainsaw was a component of Apache Log4j 1.2.x where the same issue exists.
Users are advised to migrate from `log4j:log4j` to `org.apache.logging.log4j:log4j` for an updated version of the library. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'log4j:log4j'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.2.17'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23307'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/rg4yyc89vs3dw6kpy3r92xop9loywyhh'}, {'type': 'WEB', 'url': 'https://logging.apache.org/log4j/1.2/index.html'}, {'type': 'WEB', 'url': 'https://www.oracle.com/security-alerts/cpuapr202... | {'cwe_ids': ['CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-20T22:48:35Z', 'nvd_published_at': '2022-01-18T16:15:00Z'} |
1.4.0 | GHSA-hx7c-qpfq-xcrp | 2022-01-21T13:25:18Z | 2022-01-13T20:10:53Z | null | ['CVE-2021-44649'] | Cross-site Scripting in django-cms | Django CMS 3.7.3 does not validate the plugin_type parameter while generating error messages for an invalid plugin type, resulting in a Cross Site Scripting (XSS) vulnerability. The vulnerability allows an attacker to execute arbitrary JavaScript code in the web browser of the affected user. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'django-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.7.0'}, {'fixed': '3.7.4'}]}]}, {'package': {'ecosystem': 'PyPI', 'name': 'django-cms'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '3.6.0'}, {'fixed': '3.6.1'}]}]}, {'package': {'ecosy... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44649'}, {'type': 'PACKAGE', 'url': 'https://github.com/divio/django-cms/'}, {'type': 'WEB', 'url': 'https://sahildhar.github.io/blogpost/Django-CMS-Reflected-XSS-Vulnerability/'}, {'type': 'WEB', 'url': 'https://www.django-cms.org/en/blog/2020/07/... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-13T18:47:39Z', 'nvd_published_at': '2022-01-12T13:15:00Z'} |
1.4.0 | GHSA-m8gw-hjpr-rjv7 | 2022-01-04T17:43:26Z | 2022-01-05T15:01:46Z | null | ['CVE-2021-23450'] | Prototype Pollution in dojo | All versions of package dojo are vulnerable to Prototype Pollution via the setObject function. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'dojo'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.16.4'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23450'}, {'type': 'PACKAGE', 'url': 'https://github.com/dojo/dojo'}, {'type': 'WEB', 'url': 'https://github.com/dojo/dojo/blob/4c39c14349408fc8274e19b399ffc660512ed07c/_base/lang.js%23L172'}, {'type': 'WEB', 'url': 'https://lists.debian.org/debian-... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T17:43:26Z', 'nvd_published_at': '2021-12-17T20:15:00Z'} |
1.4.0 | GHSA-vcwc-6mr9-8m7c | 2022-01-28T22:29:33Z | 2022-01-28T22:36:28Z | null | ['CVE-2022-23808'] | Cross-site Scripting in phpmyadmin | An issue was discovered in phpMyAdmin 5.1 before 5.1.2. An attacker can inject malicious code into aspects of the setup script, which can allow XSS or HTML injection. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'phpmyadmin/phpmyadmin'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.1.0'}, {'fixed': '5.1.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23808'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/44eb12f15a562718bbe54c9a16af91ceea335d59'}, {'type': 'WEB', 'url': 'https://github.com/phpmyadmin/phpmyadmin/commit/5118acce1dfcdb09cbc0f73927bf51c46feeaf38'}, {'type'... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-28T22:29:33Z', 'nvd_published_at': '2022-01-22T02:15:00Z'} |
1.4.0 | GHSA-c8cc-hj57-vm65 | 2022-11-29T21:12:29Z | 2022-01-13T00:00:55Z | null | ['CVE-2022-23105'] | User passwords transmitted in plain text by Jenkins Active Directory Plugin | Jenkins Active Directory Plugin 2.25 and earlier does not encrypt the transmission of data between the Jenkins controller and Active Directory servers in most configurations. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:active-directory'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.25.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-23105'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/active-directory-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2022-01-12/#SECURITY-1389'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-sec... | {'cwe_ids': ['CWE-319'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-11-29T21:12:29Z', 'nvd_published_at': '2022-01-12T20:15:00Z'} |
1.4.0 | GHSA-f9jg-8p32-2f55 | 2022-10-10T12:23:23Z | 2022-01-08T00:00:21Z | null | ['CVE-2021-25743'] | ANSI escape characters not filtered | kubectl does not neutralize escape, meta or control sequences contained in the raw data it outputs to a terminal. This includes but is not limited to the unstructured string fields in objects such as Events. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'k8s.io/kubernetes/pkg/kubectl'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '1.25.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-25743'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/issues/101695'}, {'type': 'WEB', 'url': 'https://github.com/kubernetes/kubernetes/pull/112553'}, {'type': 'PACKAGE', 'url': 'https://github.com/kubernetes/kubernetes'}, {'typ... | {'cwe_ids': ['CWE-150'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-09-07T23:58:59Z', 'nvd_published_at': '2022-01-07T00:15:00Z'} |
1.4.0 | GHSA-4xww-6h7v-29jg | 2022-01-12T19:34:13Z | 2022-01-21T23:37:07Z | null | ['CVE-2022-0083'] | User enumeration in livehelperchat | livehelperchat is vulnerable to Generation of Error Message Containing Sensitive Information. There is an observable discrepancy between errors generated for users that exist and those that do not. | [] | [{'package': {'ecosystem': 'Packagist', 'name': 'remdex/livehelperchat'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.91'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0083'}, {'type': 'WEB', 'url': 'https://github.com/livehelperchat/livehelperchat/commit/fbed8728be59040a7218610e72f6eceb5f8bc152'}, {'type': 'PACKAGE', 'url': 'https://github.com/livehelperchat/livehelperchat'}, {'type': 'WEB', 'url': 'https://hunt... | {'cwe_ids': ['CWE-209'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-12T19:34:13Z', 'nvd_published_at': '2022-01-04T07:15:00Z'} |
1.4.0 | GHSA-qwvx-c8j7-5g75 | 2023-06-13T22:01:48Z | 2022-01-06T22:09:19Z | null | ['CVE-2021-45703'] | Use of Uninitialized Resource in tectonic_xdv | Affected versions of this crate passes an uninitialized buffer to a user-provided Read implementation.
Arbitrary Read implementations can read from the uninitialized buffer (memory exposure) and also can return incorrect number of bytes written to the buffer. Reading from uninitialized memory produces undefined values... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'tectonic_xdv'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.1.12'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45703'}, {'type': 'WEB', 'url': 'https://github.com/tectonic-typesetting/tectonic/issues/752'}, {'type': 'WEB', 'url': 'https://github.com/tectonic-typesetting/tectonic/commit/cdff034e6d93cdfdafd13d8c6956e22fa5a57b79'}, {'type': 'PACKAGE', 'url': '... | {'cwe_ids': ['CWE-908'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T23:41:34Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-3qpm-h9ch-px3c | 2022-01-04T22:06:05Z | 2022-01-06T18:31:23Z | null | [] | Remote code injection, Improper Input Validation and Uncontrolled Recursion in Log4j library | ### Summary
The version used of Log4j, the library used for logging by PowerNukkit, is subject to a remote code execution vulnerability via the ldap JNDI parser.
It's well detailed at [CVE-2021-44228](https://github.com/advisories/GHSA-jfh8-c2jp-5v3q) and CVE-2021-45105(https://github.com/advisories/GHSA-p6xc-xr62-6r2... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.powernukkit:powernukkit'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.5.2.1'}]}], 'database_specific': {'last_known_affected_version_range': '<= 1.5.2.0'}}] | [{'type': 'WEB', 'url': 'https://github.com/PowerNukkit/PowerNukkit/security/advisories/GHSA-3qpm-h9ch-px3c'}, {'type': 'PACKAGE', 'url': 'https://github.com/PowerNukkit/PowerNukkit'}] | {'cwe_ids': ['CWE-20', 'CWE-400', 'CWE-502'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T22:06:05Z', 'nvd_published_at': None} |
1.4.0 | GHSA-9qj6-4rfq-vm84 | 2022-01-06T18:38:16Z | 2022-01-06T22:20:41Z | null | ['CVE-2018-25024'] | Out-of-bounds Write in actix-web | An issue was discovered in the actix-web crate before 0.7.15 for Rust. It can unsoundly coerce an immutable reference into a mutable reference, leading to memory corruption. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'actix-web'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.15'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2018-25024'}, {'type': 'WEB', 'url': 'https://github.com/actix/actix-web/issues/289'}, {'type': 'PACKAGE', 'url': 'https://github.com/actix/actix-web.git'}, {'type': 'WEB', 'url': 'https://raw.githubusercontent.com/rustsec/advisory-db/main/crates/actix-... | {'cwe_ids': ['CWE-787'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T18:38:16Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-jcxc-rh6w-wf49 | 2022-01-05T18:09:47Z | 2022-01-06T21:36:19Z | null | ['CVE-2021-23772'] | Link Following in Iris | This affects all versions of package github.com/kataras/iris; all versions of package github.com/kataras/iris/v12. The unsafe handling of file names during upload using UploadFormFiles method may enable attackers to write to arbitrary locations outside the designated target folder. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/kataras/iris/v12'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '12.2.0-alpha8'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/kataras/iris'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected':... | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23772'}, {'type': 'WEB', 'url': 'https://github.com/kataras/iris/commit/e213dba0d32ff66653e0ef124bc5088817264b08'}, {'type': 'PACKAGE', 'url': 'https://github.com/kataras/iris'}, {'type': 'WEB', 'url': 'https://pkg.go.dev/vuln/GO-2022-0272'}, {'typ... | {'cwe_ids': ['CWE-59'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T18:09:47Z', 'nvd_published_at': '2021-12-24T12:15:00Z'} |
1.4.0 | GHSA-wv23-pfj7-2mjj | 2022-08-11T16:54:35Z | 2022-01-14T21:08:23Z | null | ['CVE-2021-32649'] | October/System authenticated file write leads to remote code execution | ### Impact
Assuming an attacker with "create, modify and delete website pages" privileges in the backend is able to execute PHP code by running specially crafted Twig code in the template markup.
### Patches
Issue has been patched in Build 473 and v1.1.6
### Workarounds
Apply https://github.com/octobercms/october/... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '1.1.0'}, {'fixed': '1.1.6'}]}]}, {'package': {'ecosystem': 'Packagist', 'name': 'october/system'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.0.473'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/octobercms/october/security/advisories/GHSA-wv23-pfj7-2mjj'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-32649'}, {'type': 'WEB', 'url': 'https://github.com/octobercms/october/commit/167b592eed291ae1563c8fcc5b9b34a03a300f26'}, {'type': 'PACKAGE', '... | {'cwe_ids': ['CWE-74', 'CWE-94'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-14T20:49:20Z', 'nvd_published_at': '2022-01-14T15:15:00Z'} |
1.4.0 | GHSA-q4xr-rc97-m4xx | 2022-01-06T19:17:52Z | 2022-01-06T22:22:02Z | null | ['CVE-2021-23727'] | OS Command Injection in celery | This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigge... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'celery'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '5.2.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-23727'}, {'type': 'WEB', 'url': 'https://github.com/celery/celery/commit/1f7ad7e6df1e02039b6ab9eec617d283598cad6b'}, {'type': 'PACKAGE', 'url': 'https://github.com/celery/celery'}, {'type': 'WEB', 'url': 'https://github.com/celery/celery/blob/maste... | {'cwe_ids': ['CWE-77', 'CWE-78'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T19:17:52Z', 'nvd_published_at': '2021-12-29T17:15:00Z'} |
1.4.0 | GHSA-6w5m-jgc5-8cgc | 2022-01-20T14:53:33Z | 2022-01-21T23:57:49Z | null | ['CVE-2022-0159'] | orchardcore is vulnerable to Cross-site Scripting | orchardcore is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'OrchardCore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.2.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0159'}, {'type': 'WEB', 'url': 'https://github.com/orchardcms/orchardcore/commit/4da927d39a49138527c30db09c962ff706f95202'}, {'type': 'PACKAGE', 'url': 'https://github.com/orchardcms/orchardcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-20T14:53:33Z', 'nvd_published_at': '2022-01-12T03:15:00Z'} |
1.4.0 | GHSA-8434-v7xw-8m9x | 2022-05-27T22:48:38Z | 2022-01-21T23:03:39Z | null | ['CVE-2021-21386'] | Improper Neutralization of Argument Delimiters in a Decompiling Package Process in APKLeaks | APKLeaks prior to v2.0.4 allows remote authenticated attackers to execute arbitrary OS commands via package name inside the application manifest.
### Impact
An authenticated attacker could include arguments that allow unintended commands or code to be executed, allow sensitive data to be read or modified, or could ca... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:N'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'APKLeaks'}, 'ecosystem_specific': {'affected_functions': ['apkleaks.apkleaks.APKLeaks.decompile']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.4'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/dwisiswant0/apkleaks/security/advisories/GHSA-8434-v7xw-8m9x'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21386'}, {'type': 'WEB', 'url': 'https://github.com/dwisiswant0/apkleaks/commit/a966e781499ff6fd4eea66876d7532301b13a382'}, {'type': 'PACKAGE... | {'cwe_ids': ['CWE-78', 'CWE-88'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T21:03:01Z', 'nvd_published_at': '2021-03-24T21:15:00Z'} |
1.4.0 | GHSA-868x-rg4c-cjqg | 2023-09-26T20:26:04Z | 2022-01-08T00:39:20Z | null | ['CVE-2021-43045'] | Allocation of Resources Without Limits or Throttling in Apache Avro | A vulnerability in the .NET SDK of Apache Avro allows an attacker to allocate excessive resources, potentially causing a denial-of-service attack. This issue affects .NET applications using Apache Avro version 1.10.2 and prior versions. Users should update to version 1.11.0 which addresses this issue. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'NuGet', 'name': 'Apache.Avro'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.11.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43045'}, {'type': 'WEB', 'url': 'https://github.com/apache/avro/pull/1357'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/avro'}, {'type': 'WEB', 'url': 'https://issues.apache.org/jira/browse/AVRO-3225'}, {'type': 'WEB', 'url': 'https://is... | {'cwe_ids': ['CWE-770'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T22:36:54Z', 'nvd_published_at': '2022-01-06T18:15:00Z'} |
1.4.0 | GHSA-2h63-qp69-fwvw | 2022-02-08T21:33:49Z | 2022-01-06T20:35:54Z | null | ['CVE-2020-11987'] | Server-side request forgery (SSRF) in Apache Batik | Apache Batik 1.13 is vulnerable to server-side request forgery, caused by improper input validation by the NodePickerPanel. By using a specially-crafted argument, an attacker could exploit this vulnerability to cause the underlying server to make arbitrary GET requests. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.xmlgraphics:batik-svgbrowser'}, 'ecosystem_specific': {'affected_functions': ['']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '1.14'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-11987'}, {'type': 'WEB', 'url': 'https://github.com/apache/xmlgraphics-batik/commit/0ef5b661a1f77772d1110877ea9e0287987098f6'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/xmlgraphics-batik'}, {'type': 'WEB', 'url': 'https://issues.apache... | {'cwe_ids': ['CWE-20', 'CWE-918'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-26T22:47:21Z', 'nvd_published_at': '2021-02-24T18:15:00Z'} |
1.4.0 | GHSA-j545-frh3-r9gq | 2022-11-17T20:14:48Z | 2022-01-21T23:56:39Z | null | ['CVE-2022-0224'] | SQL Injection in dolibarr | dolibarr is vulnerable to Improper Neutralization of Special Elements used in an SQL Command. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'dolibarr/dolibarr'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'last_affected': '14.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0224'}, {'type': 'WEB', 'url': 'https://github.com/dolibarr/dolibarr/commit/b9b45fb50618aa8053961f50bc8604b188d0ea79'}, {'type': 'PACKAGE', 'url': 'https://github.com/dolibarr/dolibarr'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/f1d1ce3e-... | {'cwe_ids': ['CWE-89'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-18T22:09:34Z', 'nvd_published_at': '2022-01-14T18:15:00Z'} |
1.4.0 | GHSA-p479-rwhp-rwjx | 2022-12-13T17:59:48Z | 2022-01-06T18:45:29Z | null | ['CVE-2021-21667'] | Stored XSS vulnerability in Jenkins Scriptler Plugin | Scriptler Plugin 3.2 and earlier does not escape parameter names shown in job configuration forms.
This results in a stored cross-site scripting (XSS) vulnerability exploitable by attackers with Scriptler/Configure permission.
Scriptler Plugin 3.3 escapes parameter names shown in job configuration forms. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'Maven', 'name': 'org.jenkins-ci.plugins:scriptler'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-21667'}, {'type': 'PACKAGE', 'url': 'https://github.com/jenkinsci/scriptler-plugin'}, {'type': 'WEB', 'url': 'https://www.jenkins.io/security/advisory/2021-06-16/#SECURITY-2224'}, {'type': 'WEB', 'url': 'http://www.openwall.com/lists/oss-security/2... | {'cwe_ids': ['CWE-79'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-06-17T17:43:32Z', 'nvd_published_at': '2021-06-16T14:15:00Z'} |
1.4.0 | GHSA-p523-jrph-qjc6 | 2022-01-06T20:17:22Z | 2022-01-06T23:49:17Z | null | ['CVE-2022-21652'] | Insufficient Session Expiration in shopware | ### Impact
Automatically invalidate sessions upon password change
### Patches
We recommend updating to the current version 5.7.7. You can get the update to 5.7.7 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/sw... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.7.3'}, {'fixed': '5.7.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-p523-jrph-qjc6'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21652'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/47ebd126a94f4b019b6fde64c0df3d18d74ef7d0'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-613'], 'severity': 'LOW', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T20:17:22Z', 'nvd_published_at': '2022-01-05T20:15:00Z'} |
1.4.0 | GHSA-273r-mgr4-v34f | 2022-01-21T13:25:59Z | 2022-01-13T16:14:17Z | null | ['CVE-2022-21676'] | Uncaught Exception in engine.io | ### Impact
A specially crafted HTTP request can trigger an uncaught exception on the Engine.IO server, thus killing the Node.js process.
> RangeError: Invalid WebSocket frame: RSV2 and RSV3 must be clear
> at Receiver.getInfo (/.../node_modules/ws/lib/receiver.js:176:14)
> at Receiver.startLoop (/.../node_modules... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'engine.io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '4.0.0'}, {'fixed': '4.1.2'}]}]}, {'package': {'ecosystem': 'npm', 'name': 'engine.io'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.2.1'}]}]}, {'package': {'ecosystem... | [{'type': 'WEB', 'url': 'https://github.com/socketio/engine.io/security/advisories/GHSA-273r-mgr4-v34f'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21676'}, {'type': 'WEB', 'url': 'https://github.com/socketio/engine.io/commit/66f889fc1d966bf5bfa0de1939069153643874ab'}, {'type': 'WEB', 'url'... | {'cwe_ids': ['CWE-754', 'CWE-755'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-12T19:26:23Z', 'nvd_published_at': '2022-01-12T19:15:00Z'} |
1.4.0 | GHSA-f854-hpxv-cw9r | 2022-01-06T20:21:28Z | 2022-01-06T18:30:54Z | null | ['CVE-2021-43839'] | Drainage of FeeCollector's Block Transaction Fees in cronos | ### Impact
In Cronos nodes running versions before v0.6.5, it is possible to take transaction fees from Cosmos SDK's FeeCollector for the current block by sending a custom crafted MsgEthereumTx.
User funds and balances are safe.
### Patches
This problem has been patched in Cronos v0.6.5 on the mempool level.
The nex... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}] | [{'package': {'ecosystem': 'Go', 'name': 'github.com/crypto-org-chain/cronos'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.6.5'}]}]}, {'package': {'ecosystem': 'Go', 'name': 'github.com/tharsis/ethermint'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0.8.0'}, {'fixed':... | [{'type': 'WEB', 'url': 'https://github.com/crypto-org-chain/cronos/security/advisories/GHSA-f854-hpxv-cw9r'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43839'}, {'type': 'WEB', 'url': 'https://github.com/crypto-org-chain/cronos/pull/270'}, {'type': 'WEB', 'url': 'https://github.com/crypto-... | {'cwe_ids': ['CWE-670'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-04T22:40:01Z', 'nvd_published_at': '2021-12-21T17:15:00Z'} |
1.4.0 | GHSA-897m-rjf5-jp39 | 2021-03-24T23:59:08Z | 2022-01-06T20:35:05Z | null | ['CVE-2020-28503'] | Prototype Pollution in copy-props | The package copy-props before 2.0.5 are vulnerable to Prototype Pollution via the main functionality. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L'}] | [{'package': {'ecosystem': 'npm', 'name': 'copy-props'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '2.0.5'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2020-28503'}, {'type': 'WEB', 'url': 'https://github.com/gulpjs/copy-props/pull/7'}, {'type': 'WEB', 'url': 'https://github.com/gulpjs/copy-props/commit/2c738f5c52cfb384b43d977a56a3ab7ce465df9b'}, {'type': 'WEB', 'url': 'https://snyk.io/vuln/SNYK-JAVA-O... | {'cwe_ids': ['CWE-1321'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2021-03-24T23:59:08Z', 'nvd_published_at': '2021-03-23T10:15:00Z'} |
1.4.0 | GHSA-7mhc-prgv-r3q4 | 2022-06-22T18:19:44Z | 2022-01-16T00:00:45Z | null | ['CVE-2021-24044'] | Access of Resource Using Incompatible Type in Hermes | By passing invalid javascript code where await and yield were called upon non-async and non-generator getter/setter functions, Hermes would invoke generator functions and error out on invalid await/yield positions. This could result in segmentation fault as a consequence of type confusion error, with a low chance of RC... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'npm', 'name': 'hermes-engine'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.10.0'}]}], 'database_specific': {'last_known_affected_version_range': '<= 0.9.0'}}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-24044'}, {'type': 'PACKAGE', 'url': 'https://github.com/facebook/hermes'}, {'type': 'WEB', 'url': 'https://www.facebook.com/security/advisories/cve-2021-24044'}] | {'cwe_ids': ['CWE-843'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-06-22T18:19:44Z', 'nvd_published_at': '2022-01-15T01:15:00Z'} |
1.4.0 | GHSA-c53v-qmrx-93hg | 2022-01-06T20:18:17Z | 2022-01-06T23:49:19Z | null | ['CVE-2022-21651'] | Open redirect in shopware | ### Impact
Arbitrary redirect while using certain URLs
### Patches
We recommend updating to the current version 5.7.7. You can get the update to 5.7.7 regularly via the Auto-Updater or directly via the download overview.
For older versions you can use the Security Plugin:
https://store.shopware.com/en/swag57529436... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'shopware/shopware'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '5.0.0'}, {'fixed': '5.7.7'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/shopware/shopware/security/advisories/GHSA-c53v-qmrx-93hg'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-21651'}, {'type': 'WEB', 'url': 'https://github.com/shopware/shopware/commit/a90046c765c57a46c4399dce17bd174253c32886'}, {'type': 'WEB', 'url': ... | {'cwe_ids': ['CWE-601'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-06T20:18:17Z', 'nvd_published_at': '2022-01-05T20:15:00Z'} |
1.4.0 | GHSA-9w7f-m4j4-j3xw | 2023-06-01T19:43:23Z | 2022-01-06T17:36:38Z | null | ['CVE-2021-43857'] | Gerapy < 0.9.8 may cause remote code execution | ### Impact
project_configure function exist remote code execute in Gerapy < 0.9.8
### Patches
Patched in version 0.9.8, please install with:
```
pip3 install -U gerapy
``` | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'PyPI', 'name': 'gerapy'}, 'ecosystem_specific': {'affected_functions': ['gerapy.server.core.views.project_clone', 'gerapy.server.core.views.project_configure']}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.9.8'}]}]}] | [{'type': 'WEB', 'url': 'https://github.com/Gerapy/Gerapy/security/advisories/GHSA-9w7f-m4j4-j3xw'}, {'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-43857'}, {'type': 'WEB', 'url': 'https://github.com/Gerapy/Gerapy/issues/219'}, {'type': 'WEB', 'url': 'https://github.com/Gerapy/Gerapy/commit/49bc... | {'cwe_ids': ['CWE-78'], 'severity': 'CRITICAL', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T20:42:01Z', 'nvd_published_at': '2021-12-27T19:15:00Z'} |
1.4.0 | GHSA-pm3v-qxf6-fgxv | 2022-01-27T18:32:20Z | 2022-01-21T18:08:43Z | null | ['CVE-2022-0285'] | Cross-site Scripting in pimcore | Cross-site Scripting (XSS) - Stored in Packagist pimcore/pimcore prior to 10.2.9. | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'pimcore/pimcore'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '10.2.9'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2022-0285'}, {'type': 'WEB', 'url': 'https://github.com/pimcore/pimcore/commit/b432225952e2a5ab0268f401b85a14480369b835'}, {'type': 'PACKAGE', 'url': 'https://github.com/pimcore/pimcore'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/321918b2-aa01... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-21T16:56:26Z', 'nvd_published_at': '2022-01-20T15:15:00Z'} |
1.4.0 | GHSA-cwvc-87xq-pc5m | 2023-06-13T18:14:16Z | 2022-01-06T22:08:43Z | null | ['CVE-2021-45704'] | Out-of-bounds Write and Race Condition in metrics-util | In the affected versions of the crate, AtomicBucket<T> unconditionally implements Send/Sync traits. Therefore, users can create a data race to the inner T: !Sync by using the AtomicBucket::data_with() API. Such data races can potentially cause memory corruption or other undefined behavior.
The flaw was fixed in commit... | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}] | [{'package': {'ecosystem': 'crates.io', 'name': 'metrics-util'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '0.7.0'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-45704'}, {'type': 'WEB', 'url': 'https://github.com/metrics-rs/metrics/issues/190'}, {'type': 'WEB', 'url': 'https://github.com/metrics-rs/metrics/commit/8e6daab'}, {'type': 'PACKAGE', 'url': 'https://github.com/metrics-rs/metrics'}, {'type': 'WEB'... | {'cwe_ids': ['CWE-362', 'CWE-787'], 'severity': 'HIGH', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T23:21:30Z', 'nvd_published_at': '2021-12-27T00:15:00Z'} |
1.4.0 | GHSA-fxmx-pfm2-85m2 | 2022-01-19T22:37:27Z | 2022-01-21T23:32:32Z | null | ['CVE-2021-44217'] | Cross-site Scripting in Ericsson CodeChecker | In Ericsson CodeChecker prior to 6.18.2, a Stored Cross-site scripting (XSS) vulnerability in the comments component of the reports viewer allows remote attackers to inject arbitrary web script or HTML via the POST JSON data of the /CodeCheckerService API. | [] | [{'package': {'ecosystem': 'PyPI', 'name': 'codechecker'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '6.18.2'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-44217'}, {'type': 'WEB', 'url': 'https://github.com/Ericsson/codechecker/pull/3549'}, {'type': 'WEB', 'url': 'https://github.com/Ericsson/codechecker/commit/72ee51158e6d81150320223b85410c179b9ee2b1'}, {'type': 'WEB', 'url': 'https://codechecker-dem... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-19T22:37:27Z', 'nvd_published_at': '2022-01-18T15:15:00Z'} |
1.4.0 | GHSA-2xw8-j43j-5vxp | 2022-01-05T17:56:06Z | 2022-01-06T21:35:42Z | null | ['CVE-2021-4072'] | elgg is vulnerable to Cross-site Scripting | elgg is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') | [{'type': 'CVSS_V3', 'score': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N'}] | [{'package': {'ecosystem': 'Packagist', 'name': 'elgg/elgg'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.3.24'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-4072'}, {'type': 'WEB', 'url': 'https://github.com/elgg/elgg/commit/c30b17bf75256ed3fcc84e2083147cc3951423d0'}, {'type': 'PACKAGE', 'url': 'https://github.com/elgg/elgg'}, {'type': 'WEB', 'url': 'https://huntr.dev/bounties/74034253-732a-4251-a0f9-e... | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-05T17:56:06Z', 'nvd_published_at': '2021-12-24T14:15:00Z'} |
1.4.0 | GHSA-3qp6-m7hp-jrwf | 2022-01-07T23:39:42Z | 2022-01-08T00:46:21Z | null | ['CVE-2021-36739'] | Cross-site Scripting in Apache Pluto | The "first name" and "last name" fields of the Apache Pluto 3.1.0 MVCBean JSP portlet maven archetype are vulnerable to Cross-Site Scripting (XSS) attacks. | [] | [{'package': {'ecosystem': 'Maven', 'name': 'org.apache.portals.pluto:pluto-portal'}, 'ranges': [{'type': 'ECOSYSTEM', 'events': [{'introduced': '0'}, {'fixed': '3.1.1'}]}]}] | [{'type': 'ADVISORY', 'url': 'https://nvd.nist.gov/vuln/detail/CVE-2021-36739'}, {'type': 'PACKAGE', 'url': 'https://github.com/apache/portals-pluto'}, {'type': 'WEB', 'url': 'https://lists.apache.org/thread/m5j87nn1lmvzp8b9lmh7gqq68g5lnb7p'}] | {'cwe_ids': ['CWE-79'], 'severity': 'MODERATE', 'github_reviewed': True, 'github_reviewed_at': '2022-01-07T23:39:42Z', 'nvd_published_at': '2022-01-06T09:15:00Z'} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.